Re: Corporate Networks & Hidden SSID



Dan,
    ok removing the scan_ssid=1 in wpa_supplicant.conf does work.
Peforming the same on network manager, it works.  So does scan_ssid &
AP_SCAN cause a conflict?

Well what I am seeing, just testing with ipw2100 ....

(test1)AP_SCAN=2 & scan_ssid=1 - connection fails.
(test2)AP_SCAN=1 & scan_ssid=1  - connection works most of the time.
(test3)AP_SCAN=2 & no scan_ssid - very unreliable, works somewhat within
Network Manager.

So for people trying to connect to AP's which do not broadcast their
SSID, the
default setting for i.e Intel cards will not work i.e. "AP_SCAN=2 &
scan_ssid=1"

Is this info enough?

Dan Williams wrote:
On Thu, 2007-01-25 at 15:57 +0100, Grant Williamson wrote:
Dan,
ok I see where it is failing, default ipw2100/ipw2200, AP_SCAN always gets set to AP_SCAN=2. When it is set to AP_SCAN=1 it works. For both broadcast and do not broadcast SSID. If you want the output for my home network for both, I will gladly send them on.

Right; since your driver supports scan_ssid=1, I think the probe
requests and subsequent responses make the SSID appear to be unhidden to
the driver, which is why it works.

I still need to test this in work situation. The following patch I put together (from various sources) is a workaround for this issue at home anyway. From information I read the mailing lists somes cards must have AP_SCAN=2. Also I needed to add the set ssid patch, otherwise it simply does not work. With ipw3945, does not seem to make any difference if I set it to 1 or 2. Fails, using 1.1.2 driver, perhaps I need to upgrade it.

However, I'm not going to take the following patch.  We're not going to
special-case a lot of drivers, we want driver to be uniform.  As a
further test, can you set "ap_scan=1" and then remove the "scan_ssid=1"
from the network block and retry with plain wpa_supplicant?

Part of the problem here is wpa_supplicant; ap_scan=1 means that
wpa_supplicant itself does scanning and tries to detect what AP to
connect to.  Since wpa_supplicant doesn't automatically deal with hidden
SSIDs, we run into this problem.

Dan

diff -ur NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c NetworkManager-0.6.4/src/nm-device-802-11-wireless.c --- NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c 2007-01-25 15:07:36.000000000 +0100 +++ NetworkManager-0.6.4/src/nm-device-802-11-wireless.c 2007-01-25 15:07:44.000000000 +0100
@@ -2658,6 +2658,7 @@
        const char *            ap_scan = "AP_SCAN 1";
        guint32                 caps;
        gboolean                        supports_wpa;
+       const char *            kernel_driver;
g_return_val_if_fail (self != NULL, FALSE);
        g_return_val_if_fail (req != NULL, FALSE);
@@ -2681,8 +2682,23 @@
         * - The wireless driver does not support WPA (stupid drivers...)
         */
        is_adhoc = (nm_ap_get_mode(ap) == IW_MODE_ADHOC);
-       if (!nm_ap_get_broadcast (ap) || is_adhoc || !supports_wpa)
-               ap_scan = "AP_SCAN 2";
+        kernel_driver = nm_device_get_driver (NM_DEVICE (self));
+        if (!strcmp (kernel_driver, "orinoco_cs"))
+                ap_scan = "AP_SCAN 2";
+        else if (!strcmp (kernel_driver, "prism54"))
+                ap_scan = "AP_SCAN 2";
+        else if (!strncmp (kernel_driver, "airo", 4))
+                ap_scan = "AP_SCAN 2";
+        else if (!strcmp (kernel_driver, "ath_pci"))
+                ap_scan = "AP_SCAN 2";
+ else if (!strcmp (kernel_driver, "ndiswrapper") && !nm_ap_get_broadcast (ap))
+                ap_scan = "AP_SCAN 2";
+        else if (is_adhoc)
+                ap_scan = "AP_SCAN 2";
+        else if (!supports_wpa)
+                ap_scan = "AP_SCAN 2";
+        else
+                ap_scan = "AP_SCAN 1";
/* Tell wpa_supplicant that we'll do the scanning */ if (!nm_utils_supplicant_request_with_check (ctrl, "OK", __func__, NULL, ap_scan))
@@ -2796,10 +2812,15 @@
        NMActStageReturn                ret = NM_ACT_STAGE_RETURN_FAILURE;
NMData * data = nm_act_request_get_data (req);
        const char *                    iface;
+       const char *                    essid;
        gboolean                                ask_user = FALSE;
g_assert (ap); + essid = nm_ap_get_orig_essid (ap);
+        nm_device_802_11_wireless_set_essid (self, essid);
+       nm_info ("TEST PATCH Setting ESSID to %s", essid);
+
        supplicant_cleanup (self);
/* If we need an encryption key, get one */


Dan Williams wrote:
On Thu, 2007-01-25 at 10:51 +0100, Grant Williamson wrote:
Dan,
    here is another example, SSID Broadcast disabled on a home network.
Using wpa_supplicant alone I can connect(less than 5 seconds).
Using network manager I cannot. Note in both examples I have preset the SSID.
I am using NetworkManager 0.6.4 and have tried wpa_supplicant 0.4.8 & 0.5.7

############################################################################
cat wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
Can you try adding "ap_scan=2" here and retry the connect?  NM is using
that likely because it's a hidden network, lets try to narrow down what
the problem is.  Let us know the results.

Thanks,
Dan

network={
                ssid="ATMEL"
                scan_ssid=1
                proto=WPA
                key_mgmt=WPA-PSK
                pairwise=CCMP TKIP
                group=CCMP TKIP WEP104 WEP40
                psk=<removed>
}
############################################################################
WPA_SUPPLICANT

[root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL

[root lc4eb7681638218 eap]# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:off
          Encryption key:off
          Power Management:off
          Link Quality:0  Signal level:0  Noise level:0
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:5   Missed beacon:0

sit0      no wireless extensions.


[root test eap]# wpa_supplicant -Dwext -w -cwpa_supplicant.conf -ieth1 -dd
Initializing interface 'eth1' conf 'wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa_supplicant.conf' -> '/etc/eap/wpa_supplicant.conf'
Reading configuration file '/etc/eap/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=5):
41 54 4d 45 4c ATMEL scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='ATMEL'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0c:f1:1e:89:0b
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=5):
41 54 4d 45 4c ATMEL Trying to get current scan results first without requesting a new scan to speed up initial association
Received 1521 bytes of scan results (6 BSSes)
Scan results: 6
Selecting BSS from priority group 0
0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=14
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:68:4f:1c
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:68:4f:1c
No keys have been configured - skip key clearing
Associated with 00:13:10:68:4f:1c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX EAPOL from 00:13:10:68:4f:1c
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
WPA: Renewed SNonce - hexdump(len=32): fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 18 9e e9 b4 f5 f7 ea 7c 8f 72 01 f2 3c 02 d9 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:68:4f:1c
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 8d 77 ab ae 54 52 6f e5 d7 b7 b2 bb 37 b8 e9 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX EAPOL from 00:13:10:68:4f:1c
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f
  key_iv - hexdump(len=16): 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 43 99 35 44 14 2b d4 f5 d1 04 31 bd d1 87 b4 00 00
WPA: Key negotiation completed with 00:13:10:68:4f:1c [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:68:4f:1c completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested address
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

############################################################################
NETWORKMANAGER
[root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL

[root lc4eb7681638218 eap]# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:off
          Encryption key:off
          Power Management:off
          Link Quality:0  Signal level:0  Noise level:0
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:5   Missed beacon:0

sit0      no wireless extensions.

[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
ap_scan: 2
Key: ssid, Value: "ATMEL"
Key: scan_ssid, Value: 1
Key: proto, Value: WPA
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP WEP104 WEP40
Key: psk, Value: 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant '
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 2'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(2177): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(2177): RX global ctrl_iface - hexdump_ascii(len=49):
wpa_supplicant(2177): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et wpa_supplicant(2177): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru wpa_supplicant(2177): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicant wpa_supplicant(2177): 09 _ wpa_supplicant(2177): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant ' wpa_supplicant(2177): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(2177): Initializing interface (2) 'eth1'
wpa_supplicant(2177): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(2177): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(2177): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(2177): EAP: EAP entering state DISABLED
wpa_supplicant(2177): EAPOL: External notification - portEnabled=0
wpa_supplicant(2177): EAPOL: External notification - portValid=0
wpa_supplicant(2177): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
wpa_supplicant(2177):   capabilities: key_mgmt 0xf enc 0xf
wpa_supplicant(2177): WEXT: Operstate: linkmode=1, operstate=5
wpa_supplicant(2177): b
wpa_supplicant(2177): wpa_driver_wext_set_wpa
wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(2177): wpa_driver_wext_set_countermeasures
wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(2177): Setting scan request: 0 sec 100000 usec
wpa_supplicant(2177): Added interface eth1
wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
wpa_supplicant(2177): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(2177): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2 wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=11): wpa_supplicant(2177): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK wpa_supplicant(2177): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
wpa_supplicant(2177): _NETWORK id=0 name='ssid'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(2177): ssid - hexdump_ascii(len=5):
wpa_supplicant(2177): 41 54 4d 45 4c ATMEL wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
wpa_supplicant(2177): scan_ssid=1 (0x1)
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='proto'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
wpa_supplicant(2177): proto: 0x1
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(2177): key_mgmt: 0x2
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(2177): pairwise: 0x18
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='group'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
wpa_supplicant(2177): group: 0x1e
wpa_supplicant(2177):
wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='psk'
wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
wpa_supplicant(2177): PSK - hexdump(len=32): [REMOVED]
wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=16):
wpa_supplicant(2177): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0
wpa_supplicant(2177): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(2177): Setting scan request: 0 sec 0 usec
wpa_supplicant(2177): State: DISCONNECTED -> SCANNING
wpa_supplicant(2177): Trying to associate with SSID 'ATMEL'
wpa_supplicant(2177): Cancelling scan request
wpa_supplicant(2177): WPA: clearing own WPA/RSN IE
wpa_supplicant(2177): Automatic auth_alg selection: 0x1
wpa_supplicant(2177): WPA: No WPA/RSN IE available from association info
wpa_supplicant(2177): WPA: Set cipher suites based on configuration
wpa_supplicant(2177): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1
wpa_supplicant(2177): WPA: clearing AP WPA IE
wpa_supplicant(2177): WPA: clearing AP RSN IE
wpa_supplicant(2177): WPA: using GTK CCMP
wpa_supplicant(2177): WPA: using PTK CCMP
wpa_supplicant(2177): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(2177): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
wpa_supplicant(2177): No keys have been configured - skip key clearing
wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(2177): State: SCANNING -> ASSOCIATING
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
Activation (eth1/wireless): association took too long (>20s), failing activation.
sendmsg(CTRL_IFACE monitor): No such file or directory
[root test eap]# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

eth1      unassociated  ESSID:"ATMEL"  Nickname:"ipw2100"
Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:off
          Encryption key:off
          Power Management:off
          Link Quality:0  Signal level:0  Noise level:0
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:6   Missed beacon:0

sit0      no wireless extensions.



Dan Williams wrote:
On Wed, 2007-01-24 at 10:15 -0500, Darren Albers wrote:
On 1/24/07, Grant Williamson <traxtopel gmail com> wrote:
Dan,
are there any plans for Network Manager to handle hidden essid's?
i.e. using wpa_supplicant I can connect with the following config.

ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
network={
                ssid="MBI"
                scan_ssid=1
                eap=TLS
                key_mgmt=IEEE8021X
                pairwise=TKIP
                group=WEP104
                identity="traxtopel mbi com"
                ca_cert="/etc/eap/cacert.pem"
                client_cert="etc/eap/key.pem"
                private_key="/etc/eap/key.pem"
                private_key_passwd="whodareswins"
                eapol_flags=3
}

With networkmanager it never connects(the only way I have ever managed
to connect was to quickly do a iwconfig eth0 essid MBI and then fingers
crossed it worked once).

<snip>

I don't think the issue is a hidden SSID, I think the problem is using
EAP with WEP which I don't /think/ NetworkManager supports at this
time.  Dan, correct me if I am wrong.
Ah, you're right.  This is the "compat" mode that allows WEP clients to
continue to work with WPA base stations; since WEP clients don't know
anything about pairwise keys they can work as normal, but WPA-capable
clients can use TKIP/CCMP for all STA<->AP communication.

That's likely the problem, yes.

Dan



_______________________________________________
NetworkManager-list mailing list
NetworkManager-list gnome org
http://mail.gnome.org/mailman/listinfo/networkmanager-list




Script started on Thu 25 Jan 2007 06:34:53 PM CET
]0;root test:/etc/eap[root test eap]# vcat wpa_supplicant.conf 
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
network={
		ssid="ATMEL"
		scan_ssid=1
		proto=WPA
		key_mgmt=WPA-PSK
		pairwise=CCMP TKIP
		group=CCMP TKIP WEP104 WEP40
		psk=<removed>
}
]0;root test:/etc/eap[root test eap]# 
(reverse-i-search)`':
(reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s
(reverse-i-search)`tes': ./nm-supplicant-[1 t
(reverse-i-search)`test': ./nm-supplicant-
[2 [root@test eap]#
[root test eap]# ./nm-supplicant-
ap_scan: 2
Key: ssid, Value: "ATMEL"
Key: scan_ssid, Value: 1
Key: proto, Value: WPA
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP WEP104 WEP40
Key: psk, Value: <removed>
SUP: sending command 'INTERFACE_ADD eth1		wext	/var/run/wpa_supplicant	'
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 2'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk <removed>'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(3987): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(3987): RX global ctrl_iface - hexdump_ascii(len=49):
wpa_supplicant(3987):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74   INTERFACE_ADD et
wpa_supplicant(3987):      68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75   h1__wext_/var/ru
wpa_supplicant(3987):      6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74   n/wpa_supplicant
wpa_supplicant(3987):      09                                                _               
wpa_supplicant(3987): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1		wext	/var/run/wpa_supplicant	'
wpa_supplicant(3987): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(3987): Initializing interface (2) 'eth1'
wpa_supplicant(3987): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(3987): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(3987): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(3987): EAP: EAP entering state DISABLED
wpa_supplicant(3987): EAPOL: External notification - portEnabled=0
wpa_supplicant(3987): EAPOL: External notification - portValid=0
wpa_supplicant(3987): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
wpa_supplicant(3987):   capabilities: key_mgmt 0xf enc 0xf
wpa_supplicant(3987): WEXT: Operstate: linkmode=1, operstate=5
wpa_supplicant(3987): b
wpa_supplicant(3987): wpa_driver_wext_set_wpa
wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(3987): wpa_driver_wext_set_countermeasures
wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(3987): Setting scan request: 0 sec 100000 usec
wpa_supplicant(3987): Added interface eth1
wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
wpa_supplicant(3987): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(3987):      41 50 5f 53 43 41 4e 20 32                        AP_SCAN 2       
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=11):
wpa_supplicant(3987):      41 44 44 5f 4e 45 54 57 4f 52 4b                  ADD_NETWORK     
wpa_supplicant(3987): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
wpa_supplicant(3987): _NETWORK id=0 name='ssid'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(3987): ssid - hexdump_ascii(len=5):
wpa_supplicant(3987):      41 54 4d 45 4c                                    ATMEL           
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
wpa_supplicant(3987): scan_ssid=1 (0x1)
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='proto'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
wpa_supplicant(3987): proto: 0x1
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(3987): key_mgmt: 0x2
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(3987): pairwise: 0x18
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='group'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
wpa_supplicant(3987): group: 0x1e
wpa_supplicant(3987): 
wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='psk'
wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
wpa_supplicant(3987): PSK - hexdump(len=32): [REMOVED]
wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=16):
wpa_supplicant(3987):      45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30   ENABLE_NETWORK 0
wpa_supplicant(3987): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(3987): Setting scan request: 0 sec 0 usec
wpa_supplicant(3987): State: DISCONNECTED -> SCANNING
wpa_supplicant(3987): Trying to associate with SSID 'ATMEL'
wpa_supplicant(3987): Cancelling scan request
wpa_supplicant(3987): WPA: clearing own WPA/RSN IE
wpa_supplicant(3987): Automatic auth_alg selection: 0x1
wpa_supplicant(3987): WPA: No WPA/RSN IE available from association info
wpa_supplicant(3987): WPA: Set cipher suites based on configuration
wpa_supplicant(3987): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1
wpa_supplicant(3987): WPA: clearing AP WPA IE
wpa_supplicant(3987): WPA: clearing AP RSN IE
wpa_supplicant(3987): WPA: using GTK CCMP
wpa_supplicant(3987): WPA: using PTK CCMP
wpa_supplicant(3987): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(3987): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
wpa_supplicant(3987): No keys have been configured - skip key clearing
wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(3987): State: SCANNING -> ASSOCIATING
Activation (eth1/wireless): association took too long (>20s), failing activation.
sendmsg(CTRL_IFACE monitor): No such file or directory
]0;root test:/etc/eap[root test eap]# exit

Script done on Thu 25 Jan 2007 06:35:36 PM CET

Script started on Thu 25 Jan 2007 06:35:50 PM CET
]0;root test:/etc/eap[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf 

[root test eap]# cat
[root test eap]# cat wpa_supplicant.conf 
ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
network={
		ssid="ATMEL"
		scan_ssid=1
		proto=WPA
		key_mgmt=WPA-PSK
		pairwise=CCMP TKIP
		group=CCMP TKIP WEP104 WEP40
		psk=<removed>
}
]0;root test:/etc/eap[root test eap]# cat wpa_supplicant.conf [22  /nm-supplicant-test eth1
[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf 
ap_scan: 1
Key: ssid, Value: "ATMEL"
Key: scan_ssid, Value: 1
Key: proto, Value: WPA
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP WEP104 WEP40
Key: psk, Value: <removed>
SUP: sending command 'INTERFACE_ADD eth1		wext	/var/run/wpa_supplicant	'
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 1'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk <removed>'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
ioctl[SIOCSIWFREQ]: Operation not supported
wpa_supplicant(4041): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(4041): RX global ctrl_iface - hexdump_ascii(len=49):
wpa_supplicant(4041):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74   INTERFACE_ADD et
wpa_supplicant(4041):      68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75   h1__wext_/var/ru
wpa_supplicant(4041):      6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74   n/wpa_supplicant
wpa_supplicant(4041):      09                                                _               
wpa_supplicant(4041): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1		wext	/var/run/wpa_supplicant	'
wpa_supplicant(4041): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(4041): Initializing interface (2) 'eth1'
wpa_supplicant(4041): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(4041): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(4041): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(4041): EAP: EAP entering state DISABLED
wpa_supplicant(4041): EAPOL: External notification - portEnabled=0
wpa_supplicant(4041): EAPOL: External notification - portValid=0
wpa_supplicant(4041): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
wpa_supplicant(4041):   capabilities: key_mgmt 0xf enc 0xf
wpa_supplicant(4041): WEXT: Operstate: linkmode=1, operstate=5
wpa_supplicant(4041): b
wpa_supplicant(4041): wpa_driver_wext_set_wpa
wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4041): wpa_driver_wext_set_countermeasures
wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(4041): Setting scan request: 0 sec 100000 usec
wpa_supplicant(4041): Added interface eth1
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(4041):      41 50 5f 53 43 41 4e 20 31                        AP_SCAN 1       
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=11):
wpa_supplicant(4041):      41 44 44 5f 4e 45 54 57 4f 52 4b                  ADD_NETWORK     
wpa_supplicant(4041): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
wpa_supplicant(4041): _NETWORK id=0 name='ssid'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(4041): ssid - hexdump_ascii(len=5):
wpa_supplicant(4041):      41 54 4d 45 4c                                    ATMEL           
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
wpa_supplicant(4041): scan_ssid=1 (0x1)
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='proto'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
wpa_supplicant(4041): proto: 0x1
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(4041): key_mgmt: 0x2
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(4041): pairwise: 0x18
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='group'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
wpa_supplicant(4041): group: 0x1e
wpa_supplicant(4041): 
wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='psk'
wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
wpa_supplicant(4041): PSK - hexdump(len=32): [REMOVED]
wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=16):
wpa_supplicant(4041):      45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30   ENABLE_NETWORK 0
wpa_supplicant(4041): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(4041): Setting scan request: 0 sec 0 usec
wpa_supplicant(4041): State: DISCONNECTED -> SCANNING
wpa_supplicant(4041): Starting AP scan (specific SSID)
wpa_supplicant(4041): Scan SSID - hexdump_ascii(len=5):
wpa_supplicant(4041):      41 54 4d 45 4c                                    ATMEL           
wpa_supplicant(4041): Trying to get current scan results first without requesting a new scan to speed up initial association
wpa_supplicant(4041): Received 1522 bytes of scan results (6 BSSes)
wpa_supplicant(4041): Scan results: 6
wpa_supplicant(4041): Selecting BSS from priority group 0
wpa_supplicant(4041): 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
wpa_supplicant(4041):    selected based on WPA IE
wpa_supplicant(4041): Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
wpa_supplicant(4041): Cancelling scan request
wpa_supplicant(4041): WPA: clearing own WPA/RSN IE
wpa_supplicant(4041): Automatic auth_alg selection: 0x1
wpa_supplicant(4041): WPA: using IEEE 802.11i/D3.0
wpa_supplicant(4041): proto 1
wpa_supplicant(4041): WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): WPA: clearing AP RSN IE
wpa_supplicant(4041): WPA: using GTK TKIP
wpa_supplicant(4041): WPA: using PTK TKIP
wpa_supplicant(4041): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(4041): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): No keys have been configured - skip key clearing
wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(4041): State: SCANNING -> ASSOCIATING
wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5
wpa_supplicant(4041): wpa_driver_wext_associate
wpa_supplicant(4041): Association request to the driver failed
wpa_supplicant(4041): Setting authentication timeout: 5 sec 0 usec
wpa_supplicant(4041): EAPOL: External notification - EAP success=0
wpa_supplicant(4041): EAPOL: External notification - EAP fail=0
wpa_supplicant(4041): EAPOL: External notification - portControl=Auto
wpa_supplicant(4041): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4041): eless event: cmd=0x8b1a len=14
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(4041): Wireless event: cmd=0x8b15 len=20
wpa_supplicant(4041): Wireless event: new AP: 00:13:10:68:4f:1c
wpa_supplicant(4041): State: ASSOCIATING -> ASSOCIATED
wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5
wpa_supplicant(4041): Associated to a new BSS: BSSID=00:13:10:68:4f:1c
wpa_supplicant(4041): No keys have been configured - skip key clearing
wpa_supplicant(4041): Associated with 00:13:10:68:4f:1c
wpa_supplicant(4041): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00
wpa_supplicant(4041): WPA: Association event - clear replay counter
wpa_supplicant(4041): EAPOL: External notification - portEnabled=0
wpa_supplicant(4041): EAPOL: External notification - portValid=0
wpa_supplicant(4041): EAPOL: External notification - EAP success=0
wpa_supplicant(4041): EAPOL: External notification - portEnabled=1
wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING
wpa_supplicant(4041): EAPOL: SUPP_BE entering state IDLE
wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec
wpa_supplicant(4041): Cancelling scan request
wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(4041): :10:68:4f:1c
wpa_supplicant(4041): RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec
wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=95
wpa_supplicant(4041):   EAPOL-Key type=254
wpa_supplicant(4041):   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
wpa_supplicant(4041):   key_length=32 key_data_length=0
wpa_supplicant(4041):   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wpa_supplicant(4041):   key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b
wpa_supplicant(4041):   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(4041): : 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(4041): State: ASSOCIATED -> 4WAY_HANDSHAKE
wpa_supplicant(4041): WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
wpa_supplicant(4041): WPA: Renewed SNonce - hexdump(len=32): 4d 51 e5 a2 16 0f 74 d4 90 f4 8c d9 1b a8 c4 b3 e8 09 82 cb a8 b9 f6 78 38 49 3d 58 da 5b b8 2e
wpa_supplicant(4041): WPA: PMK - hexdump(len=32): [REMOVED]
wpa_supplicant(4041): WPA: PTK - hexdump(len=64): [REMOVED]
wpa_supplicant(4041): WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): WPA: Sending EAPOL-Key 2/4
Activation (eth1/wireless) Stage 2 of 5 (Device Configure) successful.  Connected to access point '"ATMEL"'.
wpa_supplicant(4041): 0 00 00 00 00 03 12 a1 08 a8 30 e0 a0 99 bf e6 87 6f 17 17 cd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c
wpa_supplicant(4041): RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=119
wpa_supplicant(4041):   EAPOL-Key type=254
wpa_supplicant(4041):   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
wpa_supplicant(4041):   key_length=32 key_data_length=24
wpa_supplicant(4041):   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wpa_supplicant(4041):   key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b
wpa_supplicant(4041):   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(4041): ): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_mic - hexdump(len=16): 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03
wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wpa_supplicant(4041): WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
wpa_supplicant(4041): WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(4041): WPA: Sending EAPOL-Key 4/4
wpa_supplicant(4041): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 18 43 fa 69 03 96 65 95 37 42 5c f1 df ed 6c 00 00
wpa_supplicant(4041): WPA: Installing PTK to the driver.
wpa_supplicant(4041): WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_supplicant(4041): wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
wpa_supplicant(4041): EAPOL: startWhen --> 0
wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING
wpa_supplicant(4041): EAPOL: txStart
wpa_supplicant(4041): WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c
wpa_supplicant(4041): RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51
wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=127
wpa_supplicant(4041):   EAPOL-Key type=254
wpa_supplicant(4041): k MIC Secure)
wpa_supplicant(4041):   key_length=32 key_data_length=32
wpa_supplicant(4041):   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
wpa_supplicant(4041):   key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49
wpa_supplicant(4041):   key_iv - hexdump(len=16): 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c
wpa_supplicant(4041):   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(4041):   key_mic - hexdump(len=16): 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66
wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51
wpa_supplicant(4041): WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)

]0;root test:/etc/eap[root test eap]# 
Script done on Thu 25 Jan 2007 06:36:18 PM CET

Script started on Thu 25 Jan 2007 06:40:07 PM CET
]0;root test:/etc/eap[root test eap]# 
(reverse-i-search)`':
(reverse-i-search)`': [47 c': ./nm-supplicant-test eth1 wpa_supplicant.conf

(reverse-i-search)`c[1 a
(reverse-i-search)`ca': ./nm-supplicant-test eth1 wpa_suppli

(reverse-i-search)`cat': cat
[3 [root@test eap]#
[root test eap]# 
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
network={
		ssid="ATMEL"
		proto=WPA
		key_mgmt=WPA-PSK
		pairwise=CCMP TKIP
		group=CCMP TKIP WEP104 WEP40
		psk=<removed>
}
]0;root test:/etc/eap[root test eap]# 
(reverse-i-search)`':
(reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s
(reverse-i-search)`tes': ./nm-supplicant-[1 t
(reverse-i-search)`test': ./nm-supplicant-
[2 [root@test eap]#
[root test eap]# ./nm-supplicant-
ap_scan: 2
Key: ssid, Value: "ATMEL"
Key: proto, Value: WPA
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP WEP104 WEP40
Key: psk, Value: <removed>
SUP: sending command 'INTERFACE_ADD eth1		wext	/var/run/wpa_supplicant	'
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 2'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk <removed>'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(4376): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(4376): RX global ctrl_iface - hexdump_ascii(len=49):
wpa_supplicant(4376):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74   INTERFACE_ADD et
wpa_supplicant(4376):      68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75   h1__wext_/var/ru
wpa_supplicant(4376):      6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74   n/wpa_supplicant
wpa_supplicant(4376):      09                                                _               
wpa_supplicant(4376): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1		wext	/var/run/wpa_supplicant	'
wpa_supplicant(4376): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(4376): Initializing interface (2) 'eth1'
wpa_supplicant(4376): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(4376): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(4376): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(4376): EAP: EAP entering state DISABLED
wpa_supplicant(4376): EAPOL: External notification - portEnabled=0
wpa_supplicant(4376): EAPOL: External notification - portValid=0
wpa_supplicant(4376): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
wpa_supplicant(4376):   capabilities: key_mgmt 0xf enc 0xf
wpa_supplicant(4376): WEXT: Operstate: linkmode=1, operstate=5
wpa_supplicant(4376): b
wpa_supplicant(4376): wpa_driver_wext_set_wpa
wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(4376): wpa_driver_wext_set_countermeasures
wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(4376): Setting scan request: 0 sec 100000 usec
wpa_supplicant(4376): Added interface eth1
wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
wpa_supplicant(4376): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(4376):      41 50 5f 53 43 41 4e 20 32                        AP_SCAN 2       
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=11):
wpa_supplicant(4376):      41 44 44 5f 4e 45 54 57 4f 52 4b                  ADD_NETWORK     
wpa_supplicant(4376): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
wpa_supplicant(4376): _NETWORK id=0 name='ssid'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(4376): ssid - hexdump_ascii(len=5):
wpa_supplicant(4376):      41 54 4d 45 4c                                    ATMEL           
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='proto'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
wpa_supplicant(4376): proto: 0x1
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(4376): key_mgmt: 0x2
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(4376): pairwise: 0x18
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='group'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
wpa_supplicant(4376): group: 0x1e
wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED]
wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='psk'
wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
wpa_supplicant(4376): PSK - hexdump(len=32): [REMOVED]
wpa_supplicant(4376): 
wpa_supplicant(4376):      45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30   ENABLE_NETWORK 0
wpa_supplicant(4376): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(4376): Setting scan request: 0 sec 0 usec
wpa_supplicant(4376): State: DISCONNECTED -> SCANNING
wpa_supplicant(4376): Trying to associate with SSID 'ATMEL'
wpa_supplicant(4376): Cancelling scan request
wpa_supplicant(4376): WPA: clearing own WPA/RSN IE
wpa_supplicant(4376): Automatic auth_alg selection: 0x1
wpa_supplicant(4376): WPA: No WPA/RSN IE available from association info
wpa_supplicant(4376): WPA: Set cipher suites based on configuration
wpa_supplicant(4376): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1
wpa_supplicant(4376): WPA: clearing AP WPA IE
wpa_supplicant(4376): WPA: clearing AP RSN IE
wpa_supplicant(4376): WPA: using GTK CCMP
wpa_supplicant(4376): WPA: using PTK CCMP
wpa_supplicant(4376): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(4376): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
wpa_supplicant(4376): No keys have been configured - skip key clearing
wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(4376): State: SCANNING -> ASSOCIATING
wpa_supplicant(4376): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
wpa_supplicant(4376): WEXT: Operstate: linkmode=-1, operstate=5
wpa_supplicant(4376): wpa_driver_wext_associate
wpa_supplicant(4376): Setting authentication timeout: 60 sec 0 usec
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
ioctl[SIOCGIFADDR]: Cannot assign requested address
Activation (eth1/wireless): association took too long (>20s), failing activation.
sendmsg(CTRL_IFACE monitor): No such file or directory



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]