Re: Corporate Networks & Hidden SSID
- From: Dan Williams <dcbw redhat com>
- To: Grant Williamson <traxtopel gmail com>
- Cc: networkmanager-list gnome org
- Subject: Re: Corporate Networks & Hidden SSID
- Date: Thu, 25 Jan 2007 12:52:26 -0500
On Thu, 2007-01-25 at 18:46 +0100, Grant Williamson wrote:
> Dan,
> ok removing the scan_ssid=1 in wpa_supplicant.conf does work.
> Peforming the same on network manager, it works. So does scan_ssid &
> AP_SCAN cause a conflict?
>
> Well what I am seeing, just testing with ipw2100 ....
>
> (test1)AP_SCAN=2 & scan_ssid=1 - connection fails.
> (test2)AP_SCAN=1 & scan_ssid=1 - connection works most of the time.
> (test3)AP_SCAN=2 & no scan_ssid - very unreliable, works somewhat within
> Network Manager.
>
> So for people trying to connect to AP's which do not broadcast their
> SSID, the
> default setting for i.e Intel cards will not work i.e. "AP_SCAN=2 &
> scan_ssid=1"
>
> Is this info enough?
One more thing; what does the 'iwlist ethX scan' output look for your
BSS? Feel free to obfuscate the BSSID and the SSID (unless the SSID is
already blank or "<hidden>").
THanks,
Dan
> Dan Williams wrote:
> > On Thu, 2007-01-25 at 15:57 +0100, Grant Williamson wrote:
> >
> >> Dan,
> >> ok I see where it is failing, default ipw2100/ipw2200, AP_SCAN
> >> always gets set to AP_SCAN=2.
> >> When it is set to AP_SCAN=1 it works. For both broadcast and do not
> >> broadcast SSID. If you want the output for my home network for both, I
> >> will gladly send them on.
> >>
> >
> > Right; since your driver supports scan_ssid=1, I think the probe
> > requests and subsequent responses make the SSID appear to be unhidden to
> > the driver, which is why it works.
> >
> >
> >> I still need to test this in work situation. The following patch I put
> >> together (from various sources) is a workaround for this issue at home
> >> anyway. From information I read the mailing lists somes cards must have
> >> AP_SCAN=2. Also I needed to add the set ssid patch, otherwise it simply
> >> does not work.
> >> With ipw3945, does not seem to make any difference if I set it to 1 or
> >> 2. Fails, using 1.1.2 driver, perhaps I need to upgrade it.
> >>
> >
> > However, I'm not going to take the following patch. We're not going to
> > special-case a lot of drivers, we want driver to be uniform. As a
> > further test, can you set "ap_scan=1" and then remove the "scan_ssid=1"
> > from the network block and retry with plain wpa_supplicant?
> >
> > Part of the problem here is wpa_supplicant; ap_scan=1 means that
> > wpa_supplicant itself does scanning and tries to detect what AP to
> > connect to. Since wpa_supplicant doesn't automatically deal with hidden
> > SSIDs, we run into this problem.
> >
> > Dan
> >
> >
> >> diff -ur NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c
> >> NetworkManager-0.6.4/src/nm-device-802-11-wireless.c
> >> --- NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c
> >> 2007-01-25 15:07:36.000000000 +0100
> >> +++ NetworkManager-0.6.4/src/nm-device-802-11-wireless.c
> >> 2007-01-25 15:07:44.000000000 +0100
> >> @@ -2658,6 +2658,7 @@
> >> const char * ap_scan = "AP_SCAN 1";
> >> guint32 caps;
> >> gboolean supports_wpa;
> >> + const char * kernel_driver;
> >>
> >> g_return_val_if_fail (self != NULL, FALSE);
> >> g_return_val_if_fail (req != NULL, FALSE);
> >> @@ -2681,8 +2682,23 @@
> >> * - The wireless driver does not support WPA (stupid drivers...)
> >> */
> >> is_adhoc = (nm_ap_get_mode(ap) == IW_MODE_ADHOC);
> >> - if (!nm_ap_get_broadcast (ap) || is_adhoc || !supports_wpa)
> >> - ap_scan = "AP_SCAN 2";
> >> + kernel_driver = nm_device_get_driver (NM_DEVICE (self));
> >> + if (!strcmp (kernel_driver, "orinoco_cs"))
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (!strcmp (kernel_driver, "prism54"))
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (!strncmp (kernel_driver, "airo", 4))
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (!strcmp (kernel_driver, "ath_pci"))
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (!strcmp (kernel_driver, "ndiswrapper") &&
> >> !nm_ap_get_broadcast (ap))
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (is_adhoc)
> >> + ap_scan = "AP_SCAN 2";
> >> + else if (!supports_wpa)
> >> + ap_scan = "AP_SCAN 2";
> >> + else
> >> + ap_scan = "AP_SCAN 1";
> >>
> >> /* Tell wpa_supplicant that we'll do the scanning */
> >> if (!nm_utils_supplicant_request_with_check (ctrl, "OK",
> >> __func__, NULL, ap_scan))
> >> @@ -2796,10 +2812,15 @@
> >> NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
> >> NMData * data =
> >> nm_act_request_get_data (req);
> >> const char * iface;
> >> + const char * essid;
> >> gboolean ask_user = FALSE;
> >>
> >> g_assert (ap);
> >>
> >> + essid = nm_ap_get_orig_essid (ap);
> >> + nm_device_802_11_wireless_set_essid (self, essid);
> >> + nm_info ("TEST PATCH Setting ESSID to %s", essid);
> >> +
> >> supplicant_cleanup (self);
> >>
> >> /* If we need an encryption key, get one */
> >>
> >>
> >> Dan Williams wrote:
> >>
> >>> On Thu, 2007-01-25 at 10:51 +0100, Grant Williamson wrote:
> >>>
> >>>
> >>>> Dan,
> >>>> here is another example, SSID Broadcast disabled on a home network.
> >>>> Using wpa_supplicant alone I can connect(less than 5 seconds).
> >>>> Using network manager I cannot. Note in both examples I have preset the
> >>>> SSID.
> >>>> I am using NetworkManager 0.6.4 and have tried wpa_supplicant 0.4.8 & 0.5.7
> >>>>
> >>>> ############################################################################
> >>>> cat wpa_supplicant.conf
> >>>> ctrl_interface=/var/run/wpa_supplicant
> >>>>
> >>>>
> >>> Can you try adding "ap_scan=2" here and retry the connect? NM is using
> >>> that likely because it's a hidden network, lets try to narrow down what
> >>> the problem is. Let us know the results.
> >>>
> >>> Thanks,
> >>> Dan
> >>>
> >>>
> >>>
> >>>> network={
> >>>> ssid="ATMEL"
> >>>> scan_ssid=1
> >>>> proto=WPA
> >>>> key_mgmt=WPA-PSK
> >>>> pairwise=CCMP TKIP
> >>>> group=CCMP TKIP WEP104 WEP40
> >>>> psk=<removed>
> >>>> }
> >>>> ############################################################################
> >>>> WPA_SUPPLICANT
> >>>>
> >>>> [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL
> >>>>
> >>>> [root lc4eb7681638218 eap]# iwconfig
> >>>> lo no wireless extensions.
> >>>>
> >>>> eth0 no wireless extensions.
> >>>>
> >>>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
> >>>> Mode:Managed Channel=0 Access Point: Not-Associated
> >>>> Bit Rate=0 kb/s Tx-Power:16 dBm
> >>>> Retry min limit:7 RTS thr:off Fragment thr:off
> >>>> Encryption key:off
> >>>> Power Management:off
> >>>> Link Quality:0 Signal level:0 Noise level:0
> >>>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
> >>>> Tx excessive retries:0 Invalid misc:5 Missed beacon:0
> >>>>
> >>>> sit0 no wireless extensions.
> >>>>
> >>>>
> >>>> [root test eap]# wpa_supplicant -Dwext -w -cwpa_supplicant.conf -ieth1 -dd
> >>>> Initializing interface 'eth1' conf 'wpa_supplicant.conf' driver 'wext'
> >>>> ctrl_interface 'N/A' bridge 'N/A'
> >>>> Configuration file 'wpa_supplicant.conf' -> '/etc/eap/wpa_supplicant.conf'
> >>>> Reading configuration file '/etc/eap/wpa_supplicant.conf'
> >>>> ctrl_interface='/var/run/wpa_supplicant'
> >>>> Line: 2 - start of a new network block
> >>>> ssid - hexdump_ascii(len=5):
> >>>> 41 54 4d 45 4c ATMEL
> >>>> scan_ssid=1 (0x1)
> >>>> proto: 0x1
> >>>> key_mgmt: 0x2
> >>>> pairwise: 0x18
> >>>> group: 0x1e
> >>>> PSK - hexdump(len=32): [REMOVED]
> >>>> Priority group 0
> >>>> id=0 ssid='ATMEL'
> >>>> Initializing interface (2) 'eth1'
> >>>> EAPOL: SUPP_PAE entering state DISCONNECTED
> >>>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> >>>> EAPOL: SUPP_BE entering state INITIALIZE
> >>>> EAP: EAP entering state DISABLED
> >>>> EAPOL: External notification - portEnabled=0
> >>>> EAPOL: External notification - portValid=0
> >>>> SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
> >>>> capabilities: key_mgmt 0xf enc 0xf
> >>>> WEXT: Operstate: linkmode=1, operstate=5
> >>>> Own MAC address: 00:0c:f1:1e:89:0b
> >>>> wpa_driver_wext_set_wpa
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_countermeasures
> >>>> wpa_driver_wext_set_drop_unencrypted
> >>>> Setting scan request: 0 sec 100000 usec
> >>>> Added interface eth1
> >>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >>>> Wireless event: cmd=0x8b06 len=8
> >>>> State: DISCONNECTED -> SCANNING
> >>>> Starting AP scan (specific SSID)
> >>>> Scan SSID - hexdump_ascii(len=5):
> >>>> 41 54 4d 45 4c ATMEL
> >>>> Trying to get current scan results first without requesting a new scan
> >>>> to speed up initial association
> >>>> Received 1521 bytes of scan results (6 BSSes)
> >>>> Scan results: 6
> >>>> Selecting BSS from priority group 0
> >>>> 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
> >>>> selected based on WPA IE
> >>>> Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
> >>>> Cancelling scan request
> >>>> WPA: clearing own WPA/RSN IE
> >>>> Automatic auth_alg selection: 0x1
> >>>> WPA: using IEEE 802.11i/D3.0
> >>>> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> >>>> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
> >>>> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> WPA: clearing AP RSN IE
> >>>> WPA: using GTK TKIP
> >>>> WPA: using PTK TKIP
> >>>> WPA: using KEY_MGMT WPA-PSK
> >>>> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
> >>>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> No keys have been configured - skip key clearing
> >>>> wpa_driver_wext_set_drop_unencrypted
> >>>> State: SCANNING -> ASSOCIATING
> >>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> >>>> WEXT: Operstate: linkmode=-1, operstate=5
> >>>> wpa_driver_wext_associate
> >>>> ioctl[SIOCSIWFREQ]: Operation not supported
> >>>> Association request to the driver failed
> >>>> Setting authentication timeout: 5 sec 0 usec
> >>>> EAPOL: External notification - EAP success=0
> >>>> EAPOL: External notification - EAP fail=0
> >>>> EAPOL: External notification - portControl=Auto
> >>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >>>> Wireless event: cmd=0x8b06 len=8
> >>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >>>> Wireless event: cmd=0x8b1a len=14
> >>>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> >>>> Wireless event: cmd=0x8b15 len=20
> >>>> Wireless event: new AP: 00:13:10:68:4f:1c
> >>>> State: ASSOCIATING -> ASSOCIATED
> >>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> >>>> WEXT: Operstate: linkmode=-1, operstate=5
> >>>> Associated to a new BSS: BSSID=00:13:10:68:4f:1c
> >>>> No keys have been configured - skip key clearing
> >>>> Associated with 00:13:10:68:4f:1c
> >>>> WPA: Association event - clear replay counter
> >>>> EAPOL: External notification - portEnabled=0
> >>>> EAPOL: External notification - portValid=0
> >>>> EAPOL: External notification - EAP success=0
> >>>> EAPOL: External notification - portEnabled=1
> >>>> EAPOL: SUPP_PAE entering state CONNECTING
> >>>> EAPOL: SUPP_BE entering state IDLE
> >>>> Setting authentication timeout: 10 sec 0 usec
> >>>> Cancelling scan request
> >>>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> >>>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX EAPOL from 00:13:10:68:4f:1c
> >>>> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
> >>>> 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b
> >>>> 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> Setting authentication timeout: 10 sec 0 usec
> >>>> IEEE 802.1X RX: version=1 type=3 length=95
> >>>> EAPOL-Key type=254
> >>>> key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
> >>>> key_length=32 key_data_length=0
> >>>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> >>>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
> >>>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
> >>>> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
> >>>> 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5
> >>>> 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> State: ASSOCIATED -> 4WAY_HANDSHAKE
> >>>> WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> >>>> WPA: Renewed SNonce - hexdump(len=32): fc 26 2c a1 e2 16 e1 1b 2d 47 d6
> >>>> 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e
> >>>> WPA: PMK - hexdump(len=32): [REMOVED]
> >>>> WPA: PTK - hexdump(len=64): [REMOVED]
> >>>> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
> >>>> f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> WPA: Sending EAPOL-Key 2/4
> >>>> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00
> >>>> 00 00 00 00 00 02 fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93
> >>>> 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 18
> >>>> 9e e9 b4 f5 f7 ea 7c 8f 72 01 f2 3c 02 d9 00 18 dd 16 00 50 f2 01 01 00
> >>>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> RX EAPOL from 00:13:10:68:4f:1c
> >>>> RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
> >>>> 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05
> >>>> 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb
> >>>> b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
> >>>> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> IEEE 802.1X RX: version=1 type=3 length=119
> >>>> EAPOL-Key type=254
> >>>> key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
> >>>> key_length=32 key_data_length=24
> >>>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> >>>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
> >>>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
> >>>> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_mic - hexdump(len=16): 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec
> >>>> WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
> >>>> 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce
> >>>> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70
> >>>> ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00
> >>>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> >>>> WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> >>>> WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
> >>>> 01 00 00 50 f2 02 01 00 00 50 f2 02
> >>>> WPA: Sending EAPOL-Key 4/4
> >>>> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00
> >>>> 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 8d 77
> >>>> ab ae 54 52 6f e5 d7 b7 b2 bb 37 b8 e9 00 00
> >>>> WPA: Installing PTK to the driver.
> >>>> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> >>>> wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> >>>> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> >>>> EAPOL: startWhen --> 0
> >>>> EAPOL: SUPP_PAE entering state CONNECTING
> >>>> EAPOL: txStart
> >>>> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX EAPOL from 00:13:10:68:4f:1c
> >>>> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00
> >>>> 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05
> >>>> 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e
> >>>> d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81
> >>>> da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46
> >>>> 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
> >>>> IEEE 802.1X RX: version=1 type=3 length=127
> >>>> EAPOL-Key type=254
> >>>> key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
> >>>> key_length=32 key_data_length=32
> >>>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
> >>>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
> >>>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f
> >>>> key_iv - hexdump(len=16): 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32
> >>>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> >>>> key_mic - hexdump(len=16): c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75
> >>>> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00
> >>>> 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce
> >>>> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae
> >>>> 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae
> >>>> e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3
> >>>> 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
> >>>> WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)
> >>>> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> >>>> WPA: Group Key - hexdump(len=32): [REMOVED]
> >>>> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> >>>> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> >>>> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> >>>> WPA: Sending EAPOL-Key 2/2
> >>>> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00
> >>>> 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 43 99
> >>>> 35 44 14 2b d4 f5 d1 04 31 bd d1 87 b4 00 00
> >>>> WPA: Key negotiation completed with 00:13:10:68:4f:1c [PTK=TKIP GTK=TKIP]
> >>>> Cancelling authentication timeout
> >>>> State: GROUP_HANDSHAKE -> COMPLETED
> >>>> CTRL-EVENT-CONNECTED - Connection to 00:13:10:68:4f:1c completed (auth)
> >>>> [id=0 id_str=]
> >>>> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> >>>> WEXT: Operstate: linkmode=-1, operstate=6
> >>>> EAPOL: External notification - portValid=1
> >>>> EAPOL: External notification - EAP success=1
> >>>> EAPOL: SUPP_PAE entering state AUTHENTICATING
> >>>> EAPOL: SUPP_BE entering state SUCCESS
> >>>> EAP: EAP entering state DISABLED
> >>>> EAPOL: SUPP_PAE entering state AUTHENTICATED
> >>>> EAPOL: SUPP_BE entering state IDLE
> >>>> RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> >>>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> RX ctrl_iface - hexdump_ascii(len=6):
> >>>> 53 54 41 54 55 53 STATUS
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> CTRL-EVENT-TERMINATING - signal 2 received
> >>>> Removing interface eth1
> >>>> State: COMPLETED -> DISCONNECTED
> >>>> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> >>>> WEXT: Operstate: linkmode=-1, operstate=5
> >>>> wpa_driver_wext_deauthenticate
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> >>>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> >>>> EAPOL: External notification - portEnabled=0
> >>>> EAPOL: SUPP_PAE entering state DISCONNECTED
> >>>> EAPOL: SUPP_BE entering state INITIALIZE
> >>>> EAPOL: External notification - portValid=0
> >>>> wpa_driver_wext_set_wpa
> >>>> wpa_driver_wext_set_drop_unencrypted
> >>>> wpa_driver_wext_set_countermeasures
> >>>> No keys have been configured - skip key clearing
> >>>> Cancelling scan request
> >>>> Cancelling authentication timeout
> >>>> WEXT: Operstate: linkmode=0, operstate=6
> >>>>
> >>>> ############################################################################
> >>>> NETWORKMANAGER
> >>>> [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL
> >>>>
> >>>> [root lc4eb7681638218 eap]# iwconfig
> >>>> lo no wireless extensions.
> >>>>
> >>>> eth0 no wireless extensions.
> >>>>
> >>>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
> >>>> Mode:Managed Channel=0 Access Point: Not-Associated
> >>>> Bit Rate=0 kb/s Tx-Power:16 dBm
> >>>> Retry min limit:7 RTS thr:off Fragment thr:off
> >>>> Encryption key:off
> >>>> Power Management:off
> >>>> Link Quality:0 Signal level:0 Noise level:0
> >>>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
> >>>> Tx excessive retries:0 Invalid misc:5 Missed beacon:0
> >>>>
> >>>> sit0 no wireless extensions.
> >>>>
> >>>> [root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
> >>>> ap_scan: 2
> >>>> Key: ssid, Value: "ATMEL"
> >>>> Key: scan_ssid, Value: 1
> >>>> Key: proto, Value: WPA
> >>>> Key: key_mgmt, Value: WPA-PSK
> >>>> Key: pairwise, Value: CCMP TKIP
> >>>> Key: group, Value: CCMP TKIP WEP104 WEP40
> >>>> Key: psk, Value:
> >>>> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f
> >>>> SUP: sending command 'INTERFACE_ADD eth1 wext
> >>>> /var/run/wpa_supplicant '
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'AP_SCAN 2'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'ADD_NETWORK'
> >>>> SUP: response was '0'
> >>>> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 proto WPA'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'SET_NETWORK 0 psk
> >>>> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f'
> >>>> SUP: response was 'OK'
> >>>> SUP: sending command 'ENABLE_NETWORK 0'
> >>>> SUP: response was 'OK'
> >>>> wpa_supplicant(2177): Global control interface
> >>>> '/var/run/wpa_supplicant-global'
> >>>> wpa_supplicant(2177): RX global ctrl_iface - hexdump_ascii(len=49):
> >>>> wpa_supplicant(2177): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65
> >>>> 74 INTERFACE_ADD et
> >>>> wpa_supplicant(2177): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72
> >>>> 75 h1__wext_/var/ru
> >>>> wpa_supplicant(2177): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e
> >>>> 74 n/wpa_supplicant
> >>>> wpa_supplicant(2177):
> >>>> 09 _
> >>>> wpa_supplicant(2177): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1
> >>>> wext /var/run/wpa_supplicant '
> >>>> wpa_supplicant(2177): Initializing interface 'eth1' conf 'N/A' driver
> >>>> 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> >>>> wpa_supplicant(2177): Initializing interface (2) 'eth1'
> >>>> wpa_supplicant(2177): EAPOL: SUPP_PAE entering state DISCONNECTED
> >>>> wpa_supplicant(2177): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> >>>> wpa_supplicant(2177): EAPOL: SUPP_BE entering state INITIALIZE
> >>>> wpa_supplicant(2177): EAP: EAP entering state DISABLED
> >>>> wpa_supplicant(2177): EAPOL: External notification - portEnabled=0
> >>>> wpa_supplicant(2177): EAPOL: External notification - portValid=0
> >>>> wpa_supplicant(2177): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18
> >>>> enc_capa=0xf
> >>>> wpa_supplicant(2177): capabilities: key_mgmt 0xf enc 0xf
> >>>> wpa_supplicant(2177): WEXT: Operstate: linkmode=1, operstate=5
> >>>> wpa_supplicant(2177): b
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_wpa
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0
> >>>> seq_len=0 key_len=0
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0
> >>>> seq_len=0 key_len=0
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0
> >>>> seq_len=0 key_len=0
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0
> >>>> seq_len=0 key_len=0
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_countermeasures
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
> >>>> wpa_supplicant(2177): Setting scan request: 0 sec 100000 usec
> >>>> wpa_supplicant(2177): Added interface eth1
> >>>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> >>>> wpa_supplicant(2177): Wireless event: cmd=0x8b06 len=8
> >>>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >>>> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> >>>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >>>> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=9):
> >>>> wpa_supplicant(2177): 41 50 5f 53 43 41 4e 20
> >>>> 32 AP_SCAN 2
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=11):
> >>>> wpa_supplicant(2177): 41 44 44 5f 4e 45 54 57 4f 52
> >>>> 4b ADD_NETWORK
> >>>> wpa_supplicant(2177): CTRL_IFACE: ADD_NETWORK
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
> >>>> wpa_supplicant(2177): _NETWORK id=0 name='ssid'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> >>>> wpa_supplicant(2177): ssid - hexdump_ascii(len=5):
> >>>> wpa_supplicant(2177): 41 54 4d 45
> >>>> 4c ATMEL
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
> >>>> wpa_supplicant(2177): scan_ssid=1 (0x1)
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
> >>>> wpa_supplicant(2177): proto: 0x1
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> >>>> wpa_supplicant(2177): key_mgmt: 0x2
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> >>>> wpa_supplicant(2177): pairwise: 0x18
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='group'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
> >>>> wpa_supplicant(2177): group: 0x1e
> >>>> wpa_supplicant(2177):
> >>>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> >>>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> >>>> wpa_supplicant(2177): PSK - hexdump(len=32): [REMOVED]
> >>>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=16):
> >>>> wpa_supplicant(2177): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20
> >>>> 30 ENABLE_NETWORK 0
> >>>> wpa_supplicant(2177): CTRL_IFACE: ENABLE_NETWORK id=0
> >>>> wpa_supplicant(2177): Setting scan request: 0 sec 0 usec
> >>>> wpa_supplicant(2177): State: DISCONNECTED -> SCANNING
> >>>> wpa_supplicant(2177): Trying to associate with SSID 'ATMEL'
> >>>> wpa_supplicant(2177): Cancelling scan request
> >>>> wpa_supplicant(2177): WPA: clearing own WPA/RSN IE
> >>>> wpa_supplicant(2177): Automatic auth_alg selection: 0x1
> >>>> wpa_supplicant(2177): WPA: No WPA/RSN IE available from association info
> >>>> wpa_supplicant(2177): WPA: Set cipher suites based on configuration
> >>>> wpa_supplicant(2177): WPA: Selected cipher suites: group 30 pairwise 24
> >>>> key_mgmt 2 proto 1
> >>>> wpa_supplicant(2177): WPA: clearing AP WPA IE
> >>>> wpa_supplicant(2177): WPA: clearing AP RSN IE
> >>>> wpa_supplicant(2177): WPA: using GTK CCMP
> >>>> wpa_supplicant(2177): WPA: using PTK CCMP
> >>>> wpa_supplicant(2177): WPA: using KEY_MGMT WPA-PSK
> >>>> wpa_supplicant(2177): WPA: Set own WPA IE default - hexdump(len=24): dd
> >>>> 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> >>>> wpa_supplicant(2177): No keys have been configured - skip key clearing
> >>>> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
> >>>> wpa_supplicant(2177): State: SCANNING -> ASSOCIATING
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> ioctl[SIOCGIFADDR]: Cannot assign requested address
> >>>> Activation (eth1/wireless): association took too long (>20s), failing
> >>>> activation.
> >>>> sendmsg(CTRL_IFACE monitor): No such file or directory
> >>>> [root test eap]# iwconfig
> >>>> lo no wireless extensions.
> >>>>
> >>>> eth0 no wireless extensions.
> >>>>
> >>>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
> >>>> Mode:Managed Channel=0 Access Point: Not-Associated
> >>>> Bit Rate=0 kb/s Tx-Power:16 dBm
> >>>> Retry min limit:7 RTS thr:off Fragment thr:off
> >>>> Encryption key:off
> >>>> Power Management:off
> >>>> Link Quality:0 Signal level:0 Noise level:0
> >>>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
> >>>> Tx excessive retries:0 Invalid misc:6 Missed beacon:0
> >>>>
> >>>> sit0 no wireless extensions.
> >>>>
> >>>>
> >>>>
> >>>> Dan Williams wrote:
> >>>>
> >>>>
> >>>>> On Wed, 2007-01-24 at 10:15 -0500, Darren Albers wrote:
> >>>>>
> >>>>>
> >>>>>
> >>>>>> On 1/24/07, Grant Williamson <traxtopel gmail com> wrote:
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>> Dan,
> >>>>>>> are there any plans for Network Manager to handle hidden essid's?
> >>>>>>> i.e. using wpa_supplicant I can connect with the following config.
> >>>>>>>
> >>>>>>> ctrl_interface=/var/run/wpa_supplicant
> >>>>>>> eapol_version=1
> >>>>>>> network={
> >>>>>>> ssid="MBI"
> >>>>>>> scan_ssid=1
> >>>>>>> eap=TLS
> >>>>>>> key_mgmt=IEEE8021X
> >>>>>>> pairwise=TKIP
> >>>>>>> group=WEP104
> >>>>>>> identity="traxtopel mbi com"
> >>>>>>> ca_cert="/etc/eap/cacert.pem"
> >>>>>>> client_cert="etc/eap/key.pem"
> >>>>>>> private_key="/etc/eap/key.pem"
> >>>>>>> private_key_passwd="whodareswins"
> >>>>>>> eapol_flags=3
> >>>>>>> }
> >>>>>>>
> >>>>>>> With networkmanager it never connects(the only way I have ever managed
> >>>>>>> to connect was to quickly do a iwconfig eth0 essid MBI and then fingers
> >>>>>>> crossed it worked once).
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>> <snip>
> >>>>>>
> >>>>>> I don't think the issue is a hidden SSID, I think the problem is using
> >>>>>> EAP with WEP which I don't /think/ NetworkManager supports at this
> >>>>>> time. Dan, correct me if I am wrong.
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>> Ah, you're right. This is the "compat" mode that allows WEP clients to
> >>>>> continue to work with WPA base stations; since WEP clients don't know
> >>>>> anything about pairwise keys they can work as normal, but WPA-capable
> >>>>> clients can use TKIP/CCMP for all STA<->AP communication.
> >>>>>
> >>>>> That's likely the problem, yes.
> >>>>>
> >>>>> Dan
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>> _______________________________________________
> >>>> NetworkManager-list mailing list
> >>>> NetworkManager-list gnome org
> >>>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
> >>>>
> >>>>
> >>>
> >>>
> >
> >
> >
>
>
> plain text document attachment (test1.txt)
> Script started on Thu 25 Jan 2007 06:34:53 PM CET
> ]0;root test:/etc/eap[root test eap]# v[Kcat wpa_supplicant.conf
> ctrl_interface=/var/run/wpa_supplicant
> ap_scan=2
> network={
> ssid="ATMEL"
> scan_ssid=1
> proto=WPA
> key_mgmt=WPA-PSK
> pairwise=CCMP TKIP
> group=CCMP TKIP WEP104 WEP40
> psk=<removed>
> }
> ]0;root test:/etc/eap[root test eap]#
> [6P(reverse-i-search)`':
> (reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s
> (reverse-i-search)`tes': ./nm-supplicant-[1 t
> (reverse-i-search)`test': ./nm-supplicant-
> [2 [root@test eap]#
> [root test eap]# ./nm-supplicant-
> ap_scan: 2
> Key: ssid, Value: "ATMEL"
> Key: scan_ssid, Value: 1
> Key: proto, Value: WPA
> Key: key_mgmt, Value: WPA-PSK
> Key: pairwise, Value: CCMP TKIP
> Key: group, Value: CCMP TKIP WEP104 WEP40
> Key: psk, Value: <removed>
> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant '
> SUP: response was 'OK'
> SUP: sending command 'AP_SCAN 2'
> SUP: response was 'OK'
> SUP: sending command 'ADD_NETWORK'
> SUP: response was '0'
> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 proto WPA'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 psk <removed>'
> SUP: response was 'OK'
> SUP: sending command 'ENABLE_NETWORK 0'
> SUP: response was 'OK'
> wpa_supplicant(3987): Global control interface '/var/run/wpa_supplicant-global'
> wpa_supplicant(3987): RX global ctrl_iface - hexdump_ascii(len=49):
> wpa_supplicant(3987): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et
> wpa_supplicant(3987): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru
> wpa_supplicant(3987): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicant
> wpa_supplicant(3987): 09 _
> wpa_supplicant(3987): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant '
> wpa_supplicant(3987): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> wpa_supplicant(3987): Initializing interface (2) 'eth1'
> wpa_supplicant(3987): EAPOL: SUPP_PAE entering state DISCONNECTED
> wpa_supplicant(3987): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> wpa_supplicant(3987): EAPOL: SUPP_BE entering state INITIALIZE
> wpa_supplicant(3987): EAP: EAP entering state DISABLED
> wpa_supplicant(3987): EAPOL: External notification - portEnabled=0
> wpa_supplicant(3987): EAPOL: External notification - portValid=0
> wpa_supplicant(3987): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
> wpa_supplicant(3987): capabilities: key_mgmt 0xf enc 0xf
> wpa_supplicant(3987): WEXT: Operstate: linkmode=1, operstate=5
> wpa_supplicant(3987): b
> wpa_supplicant(3987): wpa_driver_wext_set_wpa
> wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(3987): wpa_driver_wext_set_countermeasures
> wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(3987): Setting scan request: 0 sec 100000 usec
> wpa_supplicant(3987): Added interface eth1
> wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> wpa_supplicant(3987): Wireless event: cmd=0x8b06 len=8
> wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=9):
> wpa_supplicant(3987): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=11):
> wpa_supplicant(3987): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK
> wpa_supplicant(3987): CTRL_IFACE: ADD_NETWORK
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
> wpa_supplicant(3987): _NETWORK id=0 name='ssid'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(3987): ssid - hexdump_ascii(len=5):
> wpa_supplicant(3987): 41 54 4d 45 4c ATMEL
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
> wpa_supplicant(3987): scan_ssid=1 (0x1)
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
> wpa_supplicant(3987): proto: 0x1
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(3987): key_mgmt: 0x2
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(3987): pairwise: 0x18
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='group'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
> wpa_supplicant(3987): group: 0x1e
> wpa_supplicant(3987):
> wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> wpa_supplicant(3987): PSK - hexdump(len=32): [REMOVED]
> wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=16):
> wpa_supplicant(3987): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0
> wpa_supplicant(3987): CTRL_IFACE: ENABLE_NETWORK id=0
> wpa_supplicant(3987): Setting scan request: 0 sec 0 usec
> wpa_supplicant(3987): State: DISCONNECTED -> SCANNING
> wpa_supplicant(3987): Trying to associate with SSID 'ATMEL'
> wpa_supplicant(3987): Cancelling scan request
> wpa_supplicant(3987): WPA: clearing own WPA/RSN IE
> wpa_supplicant(3987): Automatic auth_alg selection: 0x1
> wpa_supplicant(3987): WPA: No WPA/RSN IE available from association info
> wpa_supplicant(3987): WPA: Set cipher suites based on configuration
> wpa_supplicant(3987): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1
> wpa_supplicant(3987): WPA: clearing AP WPA IE
> wpa_supplicant(3987): WPA: clearing AP RSN IE
> wpa_supplicant(3987): WPA: using GTK CCMP
> wpa_supplicant(3987): WPA: using PTK CCMP
> wpa_supplicant(3987): WPA: using KEY_MGMT WPA-PSK
> wpa_supplicant(3987): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> wpa_supplicant(3987): No keys have been configured - skip key clearing
> wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(3987): State: SCANNING -> ASSOCIATING
> Activation (eth1/wireless): association took too long (>20s), failing activation.
> sendmsg(CTRL_IFACE monitor): No such file or directory
> ]0;root test:/etc/eap[root test eap]# exit
>
> Script done on Thu 25 Jan 2007 06:35:36 PM CET
>
> plain text document attachment (test2.txt)
> Script started on Thu 25 Jan 2007 06:35:50 PM CET
> ]0;root test:/etc/eap[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
>
> [root test eap]# [22Pcat
> [root test eap]# cat wpa_supplicant.conf
> ctrl_interface=/var/run/wpa_supplicant
> ap_scan=1
> network={
> ssid="ATMEL"
> scan_ssid=1
> proto=WPA
> key_mgmt=WPA-PSK
> pairwise=CCMP TKIP
> group=CCMP TKIP WEP104 WEP40
> psk=<removed>
> }
> ]0;root test:/etc/eap[root test eap]# cat wpa_supplicant.conf [22 /nm-supplicant-test eth1
> [root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
> ap_scan: 1
> Key: ssid, Value: "ATMEL"
> Key: scan_ssid, Value: 1
> Key: proto, Value: WPA
> Key: key_mgmt, Value: WPA-PSK
> Key: pairwise, Value: CCMP TKIP
> Key: group, Value: CCMP TKIP WEP104 WEP40
> Key: psk, Value: <removed>
> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant '
> SUP: response was 'OK'
> SUP: sending command 'AP_SCAN 1'
> SUP: response was 'OK'
> SUP: sending command 'ADD_NETWORK'
> SUP: response was '0'
> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 proto WPA'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 psk <removed>'
> SUP: response was 'OK'
> SUP: sending command 'ENABLE_NETWORK 0'
> SUP: response was 'OK'
> ioctl[SIOCSIWFREQ]: Operation not supported
> wpa_supplicant(4041): Global control interface '/var/run/wpa_supplicant-global'
> wpa_supplicant(4041): RX global ctrl_iface - hexdump_ascii(len=49):
> wpa_supplicant(4041): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et
> wpa_supplicant(4041): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru
> wpa_supplicant(4041): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicant
> wpa_supplicant(4041): 09 _
> wpa_supplicant(4041): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant '
> wpa_supplicant(4041): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> wpa_supplicant(4041): Initializing interface (2) 'eth1'
> wpa_supplicant(4041): EAPOL: SUPP_PAE entering state DISCONNECTED
> wpa_supplicant(4041): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> wpa_supplicant(4041): EAPOL: SUPP_BE entering state INITIALIZE
> wpa_supplicant(4041): EAP: EAP entering state DISABLED
> wpa_supplicant(4041): EAPOL: External notification - portEnabled=0
> wpa_supplicant(4041): EAPOL: External notification - portValid=0
> wpa_supplicant(4041): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
> wpa_supplicant(4041): capabilities: key_mgmt 0xf enc 0xf
> wpa_supplicant(4041): WEXT: Operstate: linkmode=1, operstate=5
> wpa_supplicant(4041): b
> wpa_supplicant(4041): wpa_driver_wext_set_wpa
> wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4041): wpa_driver_wext_set_countermeasures
> wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(4041): Setting scan request: 0 sec 100000 usec
> wpa_supplicant(4041): Added interface eth1
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=9):
> wpa_supplicant(4041): 41 50 5f 53 43 41 4e 20 31 AP_SCAN 1
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=11):
> wpa_supplicant(4041): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK
> wpa_supplicant(4041): CTRL_IFACE: ADD_NETWORK
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
> wpa_supplicant(4041): _NETWORK id=0 name='ssid'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(4041): ssid - hexdump_ascii(len=5):
> wpa_supplicant(4041): 41 54 4d 45 4c ATMEL
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
> wpa_supplicant(4041): scan_ssid=1 (0x1)
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
> wpa_supplicant(4041): proto: 0x1
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(4041): key_mgmt: 0x2
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(4041): pairwise: 0x18
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='group'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
> wpa_supplicant(4041): group: 0x1e
> wpa_supplicant(4041):
> wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> wpa_supplicant(4041): PSK - hexdump(len=32): [REMOVED]
> wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=16):
> wpa_supplicant(4041): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0
> wpa_supplicant(4041): CTRL_IFACE: ENABLE_NETWORK id=0
> wpa_supplicant(4041): Setting scan request: 0 sec 0 usec
> wpa_supplicant(4041): State: DISCONNECTED -> SCANNING
> wpa_supplicant(4041): Starting AP scan (specific SSID)
> wpa_supplicant(4041): Scan SSID - hexdump_ascii(len=5):
> wpa_supplicant(4041): 41 54 4d 45 4c ATMEL
> wpa_supplicant(4041): Trying to get current scan results first without requesting a new scan to speed up initial association
> wpa_supplicant(4041): Received 1522 bytes of scan results (6 BSSes)
> wpa_supplicant(4041): Scan results: 6
> wpa_supplicant(4041): Selecting BSS from priority group 0
> wpa_supplicant(4041): 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
> wpa_supplicant(4041): selected based on WPA IE
> wpa_supplicant(4041): Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
> wpa_supplicant(4041): Cancelling scan request
> wpa_supplicant(4041): WPA: clearing own WPA/RSN IE
> wpa_supplicant(4041): Automatic auth_alg selection: 0x1
> wpa_supplicant(4041): WPA: using IEEE 802.11i/D3.0
> wpa_supplicant(4041): proto 1
> wpa_supplicant(4041): WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): WPA: clearing AP RSN IE
> wpa_supplicant(4041): WPA: using GTK TKIP
> wpa_supplicant(4041): WPA: using PTK TKIP
> wpa_supplicant(4041): WPA: using KEY_MGMT WPA-PSK
> wpa_supplicant(4041): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): No keys have been configured - skip key clearing
> wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(4041): State: SCANNING -> ASSOCIATING
> wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5
> wpa_supplicant(4041): wpa_driver_wext_associate
> wpa_supplicant(4041): Association request to the driver failed
> wpa_supplicant(4041): Setting authentication timeout: 5 sec 0 usec
> wpa_supplicant(4041): EAPOL: External notification - EAP success=0
> wpa_supplicant(4041): EAPOL: External notification - EAP fail=0
> wpa_supplicant(4041): EAPOL: External notification - portControl=Auto
> wpa_supplicant(4041): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4041): eless event: cmd=0x8b1a len=14
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(4041): Wireless event: cmd=0x8b15 len=20
> wpa_supplicant(4041): Wireless event: new AP: 00:13:10:68:4f:1c
> wpa_supplicant(4041): State: ASSOCIATING -> ASSOCIATED
> wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5
> wpa_supplicant(4041): Associated to a new BSS: BSSID=00:13:10:68:4f:1c
> wpa_supplicant(4041): No keys have been configured - skip key clearing
> wpa_supplicant(4041): Associated with 00:13:10:68:4f:1c
> wpa_supplicant(4041): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00
> wpa_supplicant(4041): WPA: Association event - clear replay counter
> wpa_supplicant(4041): EAPOL: External notification - portEnabled=0
> wpa_supplicant(4041): EAPOL: External notification - portValid=0
> wpa_supplicant(4041): EAPOL: External notification - EAP success=0
> wpa_supplicant(4041): EAPOL: External notification - portEnabled=1
> wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING
> wpa_supplicant(4041): EAPOL: SUPP_BE entering state IDLE
> wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec
> wpa_supplicant(4041): Cancelling scan request
> wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(4041): :10:68:4f:1c
> wpa_supplicant(4041): RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec
> wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=95
> wpa_supplicant(4041): EAPOL-Key type=254
> wpa_supplicant(4041): key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
> wpa_supplicant(4041): key_length=32 key_data_length=0
> wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b
> wpa_supplicant(4041): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): : 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): State: ASSOCIATED -> 4WAY_HANDSHAKE
> wpa_supplicant(4041): WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> wpa_supplicant(4041): WPA: Renewed SNonce - hexdump(len=32): 4d 51 e5 a2 16 0f 74 d4 90 f4 8c d9 1b a8 c4 b3 e8 09 82 cb a8 b9 f6 78 38 49 3d 58 da 5b b8 2e
> wpa_supplicant(4041): WPA: PMK - hexdump(len=32): [REMOVED]
> wpa_supplicant(4041): WPA: PTK - hexdump(len=64): [REMOVED]
> wpa_supplicant(4041): WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): WPA: Sending EAPOL-Key 2/4
> Activation (eth1/wireless) Stage 2 of 5 (Device Configure) successful. Connected to access point '"ATMEL"'.
> wpa_supplicant(4041): 0 00 00 00 00 03 12 a1 08 a8 30 e0 a0 99 bf e6 87 6f 17 17 cd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c
> wpa_supplicant(4041): RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=119
> wpa_supplicant(4041): EAPOL-Key type=254
> wpa_supplicant(4041): key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
> wpa_supplicant(4041): key_length=32 key_data_length=24
> wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b
> wpa_supplicant(4041): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): ): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_mic - hexdump(len=16): 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03
> wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> wpa_supplicant(4041): WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
> wpa_supplicant(4041): WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> wpa_supplicant(4041): WPA: Sending EAPOL-Key 4/4
> wpa_supplicant(4041): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 18 43 fa 69 03 96 65 95 37 42 5c f1 df ed 6c 00 00
> wpa_supplicant(4041): WPA: Installing PTK to the driver.
> wpa_supplicant(4041): WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_supplicant(4041): wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> wpa_supplicant(4041): EAPOL: startWhen --> 0
> wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING
> wpa_supplicant(4041): EAPOL: txStart
> wpa_supplicant(4041): WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c
> wpa_supplicant(4041): RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51
> wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=127
> wpa_supplicant(4041): EAPOL-Key type=254
> wpa_supplicant(4041): k MIC Secure)
> wpa_supplicant(4041): key_length=32 key_data_length=32
> wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
> wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49
> wpa_supplicant(4041): key_iv - hexdump(len=16): 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c
> wpa_supplicant(4041): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(4041): key_mic - hexdump(len=16): 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66
> wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51
> wpa_supplicant(4041): WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)
>
> ]0;root test:/etc/eap[root test eap]#
> Script done on Thu 25 Jan 2007 06:36:18 PM CET
>
> plain text document attachment (test3.txt)
> Script started on Thu 25 Jan 2007 06:40:07 PM CET
> ]0;root test:/etc/eap[root test eap]#
> [6P(reverse-i-search)`':
> (reverse-i-search)`': [47 c': ./nm-supplicant-test eth1 wpa_supplicant.conf
>
> (reverse-i-search)`c[1 a
> (reverse-i-search)`ca': ./nm-supplicant-test eth1 wpa_suppli
>
> (reverse-i-search)`ca[21Pt': cat
> [3 [root@test eap]#
> [root test eap]#
> ctrl_interface=/var/run/wpa_supplicant
> ap_scan=2
> network={
> ssid="ATMEL"
> proto=WPA
> key_mgmt=WPA-PSK
> pairwise=CCMP TKIP
> group=CCMP TKIP WEP104 WEP40
> psk=<removed>
> }
> ]0;root test:/etc/eap[root test eap]#
> [6P(reverse-i-search)`':
> (reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s
> (reverse-i-search)`tes': ./nm-supplicant-[1 t
> (reverse-i-search)`test': ./nm-supplicant-
> [2 [root@test eap]#
> [root test eap]# ./nm-supplicant-
> ap_scan: 2
> Key: ssid, Value: "ATMEL"
> Key: proto, Value: WPA
> Key: key_mgmt, Value: WPA-PSK
> Key: pairwise, Value: CCMP TKIP
> Key: group, Value: CCMP TKIP WEP104 WEP40
> Key: psk, Value: <removed>
> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant '
> SUP: response was 'OK'
> SUP: sending command 'AP_SCAN 2'
> SUP: response was 'OK'
> SUP: sending command 'ADD_NETWORK'
> SUP: response was '0'
> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 proto WPA'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 psk <removed>'
> SUP: response was 'OK'
> SUP: sending command 'ENABLE_NETWORK 0'
> SUP: response was 'OK'
> wpa_supplicant(4376): Global control interface '/var/run/wpa_supplicant-global'
> wpa_supplicant(4376): RX global ctrl_iface - hexdump_ascii(len=49):
> wpa_supplicant(4376): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et
> wpa_supplicant(4376): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru
> wpa_supplicant(4376): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicant
> wpa_supplicant(4376): 09 _
> wpa_supplicant(4376): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant '
> wpa_supplicant(4376): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> wpa_supplicant(4376): Initializing interface (2) 'eth1'
> wpa_supplicant(4376): EAPOL: SUPP_PAE entering state DISCONNECTED
> wpa_supplicant(4376): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> wpa_supplicant(4376): EAPOL: SUPP_BE entering state INITIALIZE
> wpa_supplicant(4376): EAP: EAP entering state DISABLED
> wpa_supplicant(4376): EAPOL: External notification - portEnabled=0
> wpa_supplicant(4376): EAPOL: External notification - portValid=0
> wpa_supplicant(4376): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
> wpa_supplicant(4376): capabilities: key_mgmt 0xf enc 0xf
> wpa_supplicant(4376): WEXT: Operstate: linkmode=1, operstate=5
> wpa_supplicant(4376): b
> wpa_supplicant(4376): wpa_driver_wext_set_wpa
> wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(4376): wpa_driver_wext_set_countermeasures
> wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(4376): Setting scan request: 0 sec 100000 usec
> wpa_supplicant(4376): Added interface eth1
> wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> wpa_supplicant(4376): Wireless event: cmd=0x8b06 len=8
> wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=9):
> wpa_supplicant(4376): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=11):
> wpa_supplicant(4376): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK
> wpa_supplicant(4376): CTRL_IFACE: ADD_NETWORK
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
> wpa_supplicant(4376): _NETWORK id=0 name='ssid'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(4376): ssid - hexdump_ascii(len=5):
> wpa_supplicant(4376): 41 54 4d 45 4c ATMEL
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
> wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
> wpa_supplicant(4376): proto: 0x1
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(4376): key_mgmt: 0x2
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(4376): pairwise: 0x18
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
> wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='group'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
> wpa_supplicant(4376): group: 0x1e
> wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED]
> wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> wpa_supplicant(4376): PSK - hexdump(len=32): [REMOVED]
> wpa_supplicant(4376):
> wpa_supplicant(4376): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0
> wpa_supplicant(4376): CTRL_IFACE: ENABLE_NETWORK id=0
> wpa_supplicant(4376): Setting scan request: 0 sec 0 usec
> wpa_supplicant(4376): State: DISCONNECTED -> SCANNING
> wpa_supplicant(4376): Trying to associate with SSID 'ATMEL'
> wpa_supplicant(4376): Cancelling scan request
> wpa_supplicant(4376): WPA: clearing own WPA/RSN IE
> wpa_supplicant(4376): Automatic auth_alg selection: 0x1
> wpa_supplicant(4376): WPA: No WPA/RSN IE available from association info
> wpa_supplicant(4376): WPA: Set cipher suites based on configuration
> wpa_supplicant(4376): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1
> wpa_supplicant(4376): WPA: clearing AP WPA IE
> wpa_supplicant(4376): WPA: clearing AP RSN IE
> wpa_supplicant(4376): WPA: using GTK CCMP
> wpa_supplicant(4376): WPA: using PTK CCMP
> wpa_supplicant(4376): WPA: using KEY_MGMT WPA-PSK
> wpa_supplicant(4376): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> wpa_supplicant(4376): No keys have been configured - skip key clearing
> wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(4376): State: SCANNING -> ASSOCIATING
> wpa_supplicant(4376): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> wpa_supplicant(4376): WEXT: Operstate: linkmode=-1, operstate=5
> wpa_supplicant(4376): wpa_driver_wext_associate
> wpa_supplicant(4376): Setting authentication timeout: 60 sec 0 usec
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> ioctl[SIOCGIFADDR]: Cannot assign requested address
> Activation (eth1/wireless): association took too long (>20s), failing activation.
> sendmsg(CTRL_IFACE monitor): No such file or directory
>
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]