Re: Corporate Networks & Hidden SSID



On Thu, 2007-01-25 at 10:51 +0100, Grant Williamson wrote:
> Dan,
>     here is another example, SSID Broadcast disabled on a home network.
> Using wpa_supplicant alone I can connect(less than 5 seconds).
> Using network manager I cannot. Note in both examples I have preset the 
> SSID.
> I am using NetworkManager 0.6.4 and have tried wpa_supplicant 0.4.8 & 0.5.7
> 
> ############################################################################
> cat wpa_supplicant.conf
> ctrl_interface=/var/run/wpa_supplicant

Can you try adding "ap_scan=2" here and retry the connect?  NM is using
that likely because it's a hidden network, lets try to narrow down what
the problem is.  Let us know the results.

Thanks,
Dan

> network={
>                 ssid="ATMEL"
>                 scan_ssid=1
>                 proto=WPA
>                 key_mgmt=WPA-PSK
>                 pairwise=CCMP TKIP
>                 group=CCMP TKIP WEP104 WEP40
>                 psk=<removed>
> }
> ############################################################################
> WPA_SUPPLICANT
> 
> [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL
> 
> [root lc4eb7681638218 eap]# iwconfig
> lo        no wireless extensions.
> 
> eth0      no wireless extensions.
> 
> eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
>           Mode:Managed  Channel=0  Access Point: Not-Associated  
>           Bit Rate=0 kb/s   Tx-Power:16 dBm  
>           Retry min limit:7   RTS thr:off   Fragment thr:off
>           Encryption key:off
>           Power Management:off
>           Link Quality:0  Signal level:0  Noise level:0
>           Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
>           Tx excessive retries:0  Invalid misc:5   Missed beacon:0
> 
> sit0      no wireless extensions.
> 
> 
> [root test eap]# wpa_supplicant -Dwext -w -cwpa_supplicant.conf -ieth1 -dd
> Initializing interface 'eth1' conf 'wpa_supplicant.conf' driver 'wext' 
> ctrl_interface 'N/A' bridge 'N/A'
> Configuration file 'wpa_supplicant.conf' -> '/etc/eap/wpa_supplicant.conf'
> Reading configuration file '/etc/eap/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 2 - start of a new network block
> ssid - hexdump_ascii(len=5):
>      41 54 4d 45 4c                                    ATMEL          
> scan_ssid=1 (0x1)
> proto: 0x1
> key_mgmt: 0x2
> pairwise: 0x18
> group: 0x1e
> PSK - hexdump(len=32): [REMOVED]
> Priority group 0
>    id=0 ssid='ATMEL'
> Initializing interface (2) 'eth1'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
>   capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:0c:f1:1e:89:0b
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface eth1
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=5):
>      41 54 4d 45 4c                                    ATMEL          
> Trying to get current scan results first without requesting a new scan 
> to speed up initial association
> Received 1521 bytes of scan results (6 BSSes)
> Scan results: 6
> Selecting BSS from priority group 0
> 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
> Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 
> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> ioctl[SIOCSIWFREQ]: Operation not supported
> Association request to the driver failed
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=14
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:13:10:68:4f:1c
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:13:10:68:4f:1c
> No keys have been configured - skip key clearing
> Associated with 00:13:10:68:4f:1c
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX EAPOL from 00:13:10:68:4f:1c
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 
> 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 
> 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
>   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
>   key_length=32 key_data_length=0
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
>   key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 
> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 
> 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 
> 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> WPA: Renewed SNonce - hexdump(len=32): fc 26 2c a1 e2 16 e1 1b 2d 47 d6 
> 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
> f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 
> 00 00 00 00 00 02 fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93 
> 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 18 
> 9e e9 b4 f5 f7 ea 7c 8f 72 01 f2 3c 02 d9 00 18 dd 16 00 50 f2 01 01 00 
> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:13:10:68:4f:1c
> RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 
> 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 
> 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb 
> b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 
> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
>   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
>   key_length=32 key_data_length=24
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
>   key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 
> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec
> WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 
> 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce 
> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 
> ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 
> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
> 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 
> 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 8d 77 
> ab ae 54 52 6f e5 d7 b7 b2 bb 37 b8 e9 00 00
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> EAPOL: startWhen --> 0
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX EAPOL from 00:13:10:68:4f:1c
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 
> 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 
> 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e 
> d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81 
> da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46 
> 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
> IEEE 802.1X RX: version=1 type=3 length=127
>   EAPOL-Key type=254
>   key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
>   key_length=32 key_data_length=32
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
>   key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 
> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f
>   key_iv - hexdump(len=16): 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 
> 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce 
> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 
> 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae 
> e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 
> 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
> WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)
> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 
> 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 43 99 
> 35 44 14 2b d4 f5 d1 04 31 bd d1 87 b4 00 00
> WPA: Key negotiation completed with 00:13:10:68:4f:1c [PTK=TKIP GTK=TKIP]
> Cancelling authentication timeout
> State: GROUP_HANDSHAKE -> COMPLETED
> CTRL-EVENT-CONNECTED - Connection to 00:13:10:68:4f:1c completed (auth) 
> [id=0 id_str=]
> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> WEXT: Operstate: linkmode=-1, operstate=6
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state DISABLED
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> RX ctrl_iface - hexdump_ascii(len=6):
>      53 54 41 54 55 53                                 STATUS         
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface eth1
> State: COMPLETED -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_deauthenticate
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_drop_unencrypted
> wpa_driver_wext_set_countermeasures
> No keys have been configured - skip key clearing
> Cancelling scan request
> Cancelling authentication timeout
> WEXT: Operstate: linkmode=0, operstate=6
> 
> ############################################################################
> NETWORKMANAGER
> [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL
> 
> [root lc4eb7681638218 eap]# iwconfig
> lo        no wireless extensions.
> 
> eth0      no wireless extensions.
> 
> eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
>           Mode:Managed  Channel=0  Access Point: Not-Associated  
>           Bit Rate=0 kb/s   Tx-Power:16 dBm  
>           Retry min limit:7   RTS thr:off   Fragment thr:off
>           Encryption key:off
>           Power Management:off
>           Link Quality:0  Signal level:0  Noise level:0
>           Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
>           Tx excessive retries:0  Invalid misc:5   Missed beacon:0
> 
> sit0      no wireless extensions.
> 
> [root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
> ap_scan: 2
> Key: ssid, Value: "ATMEL"
> Key: scan_ssid, Value: 1
> Key: proto, Value: WPA
> Key: key_mgmt, Value: WPA-PSK
> Key: pairwise, Value: CCMP TKIP
> Key: group, Value: CCMP TKIP WEP104 WEP40
> Key: psk, Value: 
> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f
> SUP: sending command 'INTERFACE_ADD eth1                wext    
> /var/run/wpa_supplicant '
> SUP: response was 'OK'
> SUP: sending command 'AP_SCAN 2'
> SUP: response was 'OK'
> SUP: sending command 'ADD_NETWORK'
> SUP: response was '0'
> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 proto WPA'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 psk 
> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f'
> SUP: response was 'OK'
> SUP: sending command 'ENABLE_NETWORK 0'
> SUP: response was 'OK'
> wpa_supplicant(2177): Global control interface 
> '/var/run/wpa_supplicant-global'
> wpa_supplicant(2177): RX global ctrl_iface - hexdump_ascii(len=49):
> wpa_supplicant(2177):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 
> 74   INTERFACE_ADD et
> wpa_supplicant(2177):      68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 
> 75   h1__wext_/var/ru
> wpa_supplicant(2177):      6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 
> 74   n/wpa_supplicant
> wpa_supplicant(2177):      
> 09                                                _              
> wpa_supplicant(2177): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1             
> wext   /var/run/wpa_supplicant  '
> wpa_supplicant(2177): Initializing interface 'eth1' conf 'N/A' driver 
> 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> wpa_supplicant(2177): Initializing interface (2) 'eth1'
> wpa_supplicant(2177): EAPOL: SUPP_PAE entering state DISCONNECTED
> wpa_supplicant(2177): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> wpa_supplicant(2177): EAPOL: SUPP_BE entering state INITIALIZE
> wpa_supplicant(2177): EAP: EAP entering state DISABLED
> wpa_supplicant(2177): EAPOL: External notification - portEnabled=0
> wpa_supplicant(2177): EAPOL: External notification - portValid=0
> wpa_supplicant(2177): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 
> enc_capa=0xf
> wpa_supplicant(2177):   capabilities: key_mgmt 0xf enc 0xf
> wpa_supplicant(2177): WEXT: Operstate: linkmode=1, operstate=5
> wpa_supplicant(2177): b
> wpa_supplicant(2177): wpa_driver_wext_set_wpa
> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 
> seq_len=0 key_len=0
> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 
> seq_len=0 key_len=0
> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 
> seq_len=0 key_len=0
> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 
> seq_len=0 key_len=0
> wpa_supplicant(2177): wpa_driver_wext_set_countermeasures
> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(2177): Setting scan request: 0 sec 100000 usec
> wpa_supplicant(2177): Added interface eth1
> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> wpa_supplicant(2177): Wireless event: cmd=0x8b06 len=8
> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=9):
> wpa_supplicant(2177):      41 50 5f 53 43 41 4e 20 
> 32                        AP_SCAN 2      
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=11):
> wpa_supplicant(2177):      41 44 44 5f 4e 45 54 57 4f 52 
> 4b                  ADD_NETWORK    
> wpa_supplicant(2177): CTRL_IFACE: ADD_NETWORK
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
> wpa_supplicant(2177): _NETWORK id=0 name='ssid'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(2177): ssid - hexdump_ascii(len=5):
> wpa_supplicant(2177):      41 54 4d 45 
> 4c                                    ATMEL          
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
> wpa_supplicant(2177): scan_ssid=1 (0x1)
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
> wpa_supplicant(2177): proto: 0x1
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(2177): key_mgmt: 0x2
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(2177): pairwise: 0x18
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='group'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
> wpa_supplicant(2177): group: 0x1e
> wpa_supplicant(2177):
> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> wpa_supplicant(2177): PSK - hexdump(len=32): [REMOVED]
> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=16):
> wpa_supplicant(2177):      45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 
> 30   ENABLE_NETWORK 0
> wpa_supplicant(2177): CTRL_IFACE: ENABLE_NETWORK id=0
> wpa_supplicant(2177): Setting scan request: 0 sec 0 usec
> wpa_supplicant(2177): State: DISCONNECTED -> SCANNING
> wpa_supplicant(2177): Trying to associate with SSID 'ATMEL'
> wpa_supplicant(2177): Cancelling scan request
> wpa_supplicant(2177): WPA: clearing own WPA/RSN IE
> wpa_supplicant(2177): Automatic auth_alg selection: 0x1
> wpa_supplicant(2177): WPA: No WPA/RSN IE available from association info
> wpa_supplicant(2177): WPA: Set cipher suites based on configuration
> wpa_supplicant(2177): WPA: Selected cipher suites: group 30 pairwise 24 
> key_mgmt 2 proto 1
> wpa_supplicant(2177): WPA: clearing AP WPA IE
> wpa_supplicant(2177): WPA: clearing AP RSN IE
> wpa_supplicant(2177): WPA: using GTK CCMP
> wpa_supplicant(2177): WPA: using PTK CCMP
> wpa_supplicant(2177): WPA: using KEY_MGMT WPA-PSK
> wpa_supplicant(2177): WPA: Set own WPA IE default - hexdump(len=24): dd 
> 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> wpa_supplicant(2177): No keys have been configured - skip key clearing
> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(2177): State: SCANNING -> ASSOCIATING
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> Activation (eth1/wireless): association took too long (>20s), failing 
> activation.
> sendmsg(CTRL_IFACE monitor): No such file or directory
> [root test eap]# iwconfig
> lo        no wireless extensions.
> 
> eth0      no wireless extensions.
> 
> eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
>           Mode:Managed  Channel=0  Access Point: Not-Associated  
>           Bit Rate=0 kb/s   Tx-Power:16 dBm  
>           Retry min limit:7   RTS thr:off   Fragment thr:off
>           Encryption key:off
>           Power Management:off
>           Link Quality:0  Signal level:0  Noise level:0
>           Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
>           Tx excessive retries:0  Invalid misc:6   Missed beacon:0
> 
> sit0      no wireless extensions.
> 
> 
> 
> Dan Williams wrote:
> > On Wed, 2007-01-24 at 10:15 -0500, Darren Albers wrote:
> >   
> >> On 1/24/07, Grant Williamson <traxtopel gmail com> wrote:
> >>     
> >>> Dan,
> >>> are there any plans for Network Manager to handle hidden essid's?
> >>> i.e. using wpa_supplicant I can connect with the following config.
> >>>
> >>> ctrl_interface=/var/run/wpa_supplicant
> >>> eapol_version=1
> >>> network={
> >>>                 ssid="MBI"
> >>>                 scan_ssid=1
> >>>                 eap=TLS
> >>>                 key_mgmt=IEEE8021X
> >>>                 pairwise=TKIP
> >>>                 group=WEP104
> >>>                 identity="traxtopel mbi com"
> >>>                 ca_cert="/etc/eap/cacert.pem"
> >>>                 client_cert="etc/eap/key.pem"
> >>>                 private_key="/etc/eap/key.pem"
> >>>                 private_key_passwd="whodareswins"
> >>>                 eapol_flags=3
> >>> }
> >>>
> >>> With networkmanager it never connects(the only way I have ever managed
> >>> to connect was to quickly do a iwconfig eth0 essid MBI and then fingers
> >>> crossed it worked once).
> >>>
> >>>       
> >> <snip>
> >>
> >> I don't think the issue is a hidden SSID, I think the problem is using
> >> EAP with WEP which I don't /think/ NetworkManager supports at this
> >> time.  Dan, correct me if I am wrong.
> >>     
> >
> > Ah, you're right.  This is the "compat" mode that allows WEP clients to
> > continue to work with WPA base stations; since WEP clients don't know
> > anything about pairwise keys they can work as normal, but WPA-capable
> > clients can use TKIP/CCMP for all STA<->AP communication.
> >
> > That's likely the problem, yes.
> >
> > Dan
> >
> >
> >
> >   
> 
> _______________________________________________
> NetworkManager-list mailing list
> NetworkManager-list gnome org
> http://mail.gnome.org/mailman/listinfo/networkmanager-list




[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]