Dan, ok looks like this. eth0 Scan completed : Cell 01 - Address: xx:xx:xx:xx:xx:xx ESSID:"<hidden>" Protocol:IEEE 802.11bg Mode:Master Channel:5 Encryption key:on Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s 11 Mb/s; 12 Mb/s; 18 Mb/s; 22 Mb/s; 24 Mb/s 36 Mb/s; 48 Mb/s; 54 Mb/sQuality=92/100 Signal level=-38 dBm Noise level=-38 dBm
IE: WPA Version 1 Group Cipher : TKIP Pairwise Ciphers (1) : TKIPAuthentication Suites (1) : PSK Extra: Last beacon: 96ms ago
Dan Williams wrote:
On Thu, 2007-01-25 at 18:46 +0100, Grant Williamson wrote:Dan, ok removing the scan_ssid=1 in wpa_supplicant.conf does work. Peforming the same on network manager, it works. So does scan_ssid & AP_SCAN cause a conflict? Well what I am seeing, just testing with ipw2100 .... (test1)AP_SCAN=2 & scan_ssid=1 - connection fails. (test2)AP_SCAN=1 & scan_ssid=1 - connection works most of the time. (test3)AP_SCAN=2 & no scan_ssid - very unreliable, works somewhat within Network Manager. So for people trying to connect to AP's which do not broadcast their SSID, the default setting for i.e Intel cards will not work i.e. "AP_SCAN=2 & scan_ssid=1" Is this info enough?One more thing; what does the 'iwlist ethX scan' output look for your BSS? Feel free to obfuscate the BSSID and the SSID (unless the SSID is already blank or "<hidden>"). THanks, DanDan Williams wrote:On Thu, 2007-01-25 at 15:57 +0100, Grant Williamson wrote:Dan,ok I see where it is failing, default ipw2100/ipw2200, AP_SCAN always gets set to AP_SCAN=2. When it is set to AP_SCAN=1 it works. For both broadcast and do not broadcast SSID. If you want the output for my home network for both, I will gladly send them on.Right; since your driver supports scan_ssid=1, I think the probe requests and subsequent responses make the SSID appear to be unhidden to the driver, which is why it works.I still need to test this in work situation. The following patch I put together (from various sources) is a workaround for this issue at home anyway. From information I read the mailing lists somes cards must have AP_SCAN=2. Also I needed to add the set ssid patch, otherwise it simply does not work. With ipw3945, does not seem to make any difference if I set it to 1 or 2. Fails, using 1.1.2 driver, perhaps I need to upgrade it.However, I'm not going to take the following patch. We're not going to special-case a lot of drivers, we want driver to be uniform. As a further test, can you set "ap_scan=1" and then remove the "scan_ssid=1" from the network block and retry with plain wpa_supplicant? Part of the problem here is wpa_supplicant; ap_scan=1 means that wpa_supplicant itself does scanning and tries to detect what AP to connect to. Since wpa_supplicant doesn't automatically deal with hidden SSIDs, we run into this problem. Dandiff -ur NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c NetworkManager-0.6.4/src/nm-device-802-11-wireless.c --- NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c 2007-01-25 15:07:36.000000000 +0100 +++ NetworkManager-0.6.4/src/nm-device-802-11-wireless.c 2007-01-25 15:07:44.000000000 +0100@@ -2658,6 +2658,7 @@ const char * ap_scan = "AP_SCAN 1"; guint32 caps; gboolean supports_wpa; + const char * kernel_driver;g_return_val_if_fail (self != NULL, FALSE);g_return_val_if_fail (req != NULL, FALSE); @@ -2681,8 +2682,23 @@ * - The wireless driver does not support WPA (stupid drivers...) */ is_adhoc = (nm_ap_get_mode(ap) == IW_MODE_ADHOC); - if (!nm_ap_get_broadcast (ap) || is_adhoc || !supports_wpa) - ap_scan = "AP_SCAN 2"; + kernel_driver = nm_device_get_driver (NM_DEVICE (self)); + if (!strcmp (kernel_driver, "orinoco_cs")) + ap_scan = "AP_SCAN 2"; + else if (!strcmp (kernel_driver, "prism54")) + ap_scan = "AP_SCAN 2"; + else if (!strncmp (kernel_driver, "airo", 4)) + ap_scan = "AP_SCAN 2"; + else if (!strcmp (kernel_driver, "ath_pci")) + ap_scan = "AP_SCAN 2";+ else if (!strcmp (kernel_driver, "ndiswrapper") && !nm_ap_get_broadcast (ap))+ ap_scan = "AP_SCAN 2"; + else if (is_adhoc) + ap_scan = "AP_SCAN 2"; + else if (!supports_wpa) + ap_scan = "AP_SCAN 2"; + else + ap_scan = "AP_SCAN 1";/* Tell wpa_supplicant that we'll do the scanning */ if (!nm_utils_supplicant_request_with_check (ctrl, "OK", __func__, NULL, ap_scan))@@ -2796,10 +2812,15 @@ NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;NMData * data = nm_act_request_get_data (req);const char * iface; + const char * essid; gboolean ask_user = FALSE;g_assert (ap); + essid = nm_ap_get_orig_essid (ap);+ nm_device_802_11_wireless_set_essid (self, essid); + nm_info ("TEST PATCH Setting ESSID to %s", essid); + supplicant_cleanup (self);/* If we need an encryption key, get one */Dan Williams wrote:On Thu, 2007-01-25 at 10:51 +0100, Grant Williamson wrote:Dan, here is another example, SSID Broadcast disabled on a home network. Using wpa_supplicant alone I can connect(less than 5 seconds).Using network manager I cannot. Note in both examples I have preset the SSID.I am using NetworkManager 0.6.4 and have tried wpa_supplicant 0.4.8 & 0.5.7 ############################################################################ cat wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicantCan you try adding "ap_scan=2" here and retry the connect? NM is using that likely because it's a hidden network, lets try to narrow down what the problem is. Let us know the results. Thanks, Dannetwork={ ssid="ATMEL" scan_ssid=1 proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 psk=<removed> } ############################################################################ WPA_SUPPLICANT [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL [root lc4eb7681638218 eap]# iwconfig lo no wireless extensions. eth0 no wireless extensions. eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:offEncryption key:off Power Management:off Link Quality:0 Signal level:0 Noise level:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:5 Missed beacon:0 sit0 no wireless extensions. [root test eap]# wpa_supplicant -Dwext -w -cwpa_supplicant.conf -ieth1 -ddInitializing interface 'eth1' conf 'wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'Configuration file 'wpa_supplicant.conf' -> '/etc/eap/wpa_supplicant.conf' Reading configuration file '/etc/eap/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' Line: 2 - start of a new network block ssid - hexdump_ascii(len=5):41 54 4d 45 4c ATMEL scan_ssid=1 (0x1)proto: 0x1 key_mgmt: 0x2 pairwise: 0x18 group: 0x1e PSK - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='ATMEL' Initializing interface (2) 'eth1' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:0c:f1:1e:89:0b wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted Setting scan request: 0 sec 100000 usec Added interface eth1 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b06 len=8 State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=5):41 54 4d 45 4c ATMEL Trying to get current scan results first without requesting a new scan to speed up initial associationReceived 1521 bytes of scan results (6 BSSes) Scan results: 6 Selecting BSS from priority group 0 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSKWPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate ioctl[SIOCSIWFREQ]: Operation not supported Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b1a len=14 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:13:10:68:4f:1c State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:13:10:68:4f:1c No keys have been configured - skip key clearing Associated with 00:13:10:68:4f:1c WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added RX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX EAPOL from 00:13:10:68:4f:1cRX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)WPA: Renewed SNonce - hexdump(len=32): fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2eWPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED]WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02WPA: Sending EAPOL-Key 2/4WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 18 9e e9 b4 f5 f7 ea 7c 8f 72 01 f2 3c 02 d9 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02RX EAPOL from 00:13:10:68:4f:1cRX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ecWPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02WPA: Sending EAPOL-Key 4/4WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 8d 77 ab ae 54 52 6f e5 d7 b7 b2 bb 37 b8 e9 00 00WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) RX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX EAPOL from 00:13:10:68:4f:1cRX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2fkey_iv - hexdump(len=16): 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1) State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 43 99 35 44 14 2b d4 f5 d1 04 31 bd d1 87 b4 00 00WPA: Key negotiation completed with 00:13:10:68:4f:1c [PTK=TKIP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETEDCTRL-EVENT-CONNECTED - Connection to 00:13:10:68:4f:1c completed (auth) [id=0 id_str=]wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added RX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressRX ctrl_iface - hexdump_ascii(len=6):53 54 41 54 55 53 STATUS ioctl[SIOCGIFADDR]: Cannot assign requested addressCTRL-EVENT-TERMINATING - signal 2 received Removing interface eth1 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing Cancelling scan request Cancelling authentication timeout WEXT: Operstate: linkmode=0, operstate=6 ############################################################################ NETWORKMANAGER [root lc4eb7681638218 eap]# iwconfig eth1 essid ATMEL [root lc4eb7681638218 eap]# iwconfig lo no wireless extensions. eth0 no wireless extensions. eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:offEncryption key:off Power Management:off Link Quality:0 Signal level:0 Noise level:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:5 Missed beacon:0 sit0 no wireless extensions. [root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf ap_scan: 2 Key: ssid, Value: "ATMEL" Key: scan_ssid, Value: 1 Key: proto, Value: WPA Key: key_mgmt, Value: WPA-PSK Key: pairwise, Value: CCMP TKIP Key: group, Value: CCMP TKIP WEP104 WEP40Key: psk, Value: 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant 'SUP: response was 'OK' SUP: sending command 'AP_SCAN 2' SUP: response was 'OK' SUP: sending command 'ADD_NETWORK' SUP: response was '0' SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 scan_ssid 1' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 proto WPA' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40' SUP: response was 'OK'SUP: sending command 'SET_NETWORK 0 psk 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f'SUP: response was 'OK' SUP: sending command 'ENABLE_NETWORK 0' SUP: response was 'OK'wpa_supplicant(2177): Global control interface '/var/run/wpa_supplicant-global'wpa_supplicant(2177): RX global ctrl_iface - hexdump_ascii(len=49):wpa_supplicant(2177): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et wpa_supplicant(2177): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru wpa_supplicant(2177): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicant wpa_supplicant(2177): 09 _ wpa_supplicant(2177): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant ' wpa_supplicant(2177): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'wpa_supplicant(2177): Initializing interface (2) 'eth1' wpa_supplicant(2177): EAPOL: SUPP_PAE entering state DISCONNECTED wpa_supplicant(2177): EAPOL: KEY_RX entering state NO_KEY_RECEIVE wpa_supplicant(2177): EAPOL: SUPP_BE entering state INITIALIZE wpa_supplicant(2177): EAP: EAP entering state DISABLED wpa_supplicant(2177): EAPOL: External notification - portEnabled=0 wpa_supplicant(2177): EAPOL: External notification - portValid=0wpa_supplicant(2177): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xfwpa_supplicant(2177): capabilities: key_mgmt 0xf enc 0xf wpa_supplicant(2177): WEXT: Operstate: linkmode=1, operstate=5 wpa_supplicant(2177): b wpa_supplicant(2177): wpa_driver_wext_set_wpawpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0wpa_supplicant(2177): wpa_driver_wext_set_countermeasures wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(2177): Setting scan request: 0 sec 100000 usec wpa_supplicant(2177): Added interface eth1 wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () wpa_supplicant(2177): Wireless event: cmd=0x8b06 len=8 wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=9):wpa_supplicant(2177): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2 wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=11): wpa_supplicant(2177): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK wpa_supplicant(2177): CTRL_IFACE: ADD_NETWORKwpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED] wpa_supplicant(2177): _NETWORK id=0 name='ssid' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(2177): ssid - hexdump_ascii(len=5):wpa_supplicant(2177): 41 54 4d 45 4c ATMEL wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED] wpa_supplicant(2177): scan_ssid=1 (0x1) wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED] wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='proto' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED] wpa_supplicant(2177): proto: 0x1 wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED] wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(2177): key_mgmt: 0x2 wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] wpa_supplicant(2177): pairwise: 0x18 wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED] wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='group' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED] wpa_supplicant(2177): group: 0x1e wpa_supplicant(2177): wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='psk' wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED] wpa_supplicant(2177): PSK - hexdump(len=32): [REMOVED] wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=16):wpa_supplicant(2177): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0wpa_supplicant(2177): CTRL_IFACE: ENABLE_NETWORK id=0 wpa_supplicant(2177): Setting scan request: 0 sec 0 usec wpa_supplicant(2177): State: DISCONNECTED -> SCANNING wpa_supplicant(2177): Trying to associate with SSID 'ATMEL' wpa_supplicant(2177): Cancelling scan request wpa_supplicant(2177): WPA: clearing own WPA/RSN IE wpa_supplicant(2177): Automatic auth_alg selection: 0x1 wpa_supplicant(2177): WPA: No WPA/RSN IE available from association info wpa_supplicant(2177): WPA: Set cipher suites based on configurationwpa_supplicant(2177): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1wpa_supplicant(2177): WPA: clearing AP WPA IE wpa_supplicant(2177): WPA: clearing AP RSN IE wpa_supplicant(2177): WPA: using GTK CCMP wpa_supplicant(2177): WPA: using PTK CCMP wpa_supplicant(2177): WPA: using KEY_MGMT WPA-PSKwpa_supplicant(2177): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02wpa_supplicant(2177): No keys have been configured - skip key clearing wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(2177): State: SCANNING -> ASSOCIATING ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested addressActivation (eth1/wireless): association took too long (>20s), failing activation.sendmsg(CTRL_IFACE monitor): No such file or directory [root test eap]# iwconfig lo no wireless extensions. eth0 no wireless extensions. eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"Mode:Managed Channel=0 Access Point: Not-Associated Bit Rate=0 kb/s Tx-Power:16 dBm Retry min limit:7 RTS thr:off Fragment thr:offEncryption key:off Power Management:off Link Quality:0 Signal level:0 Noise level:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:6 Missed beacon:0 sit0 no wireless extensions. Dan Williams wrote:On Wed, 2007-01-24 at 10:15 -0500, Darren Albers wrote:On 1/24/07, Grant Williamson <traxtopel gmail com> wrote:Dan, are there any plans for Network Manager to handle hidden essid's? i.e. using wpa_supplicant I can connect with the following config. ctrl_interface=/var/run/wpa_supplicant eapol_version=1 network={ ssid="MBI" scan_ssid=1 eap=TLS key_mgmt=IEEE8021X pairwise=TKIP group=WEP104 identity="traxtopel mbi com" ca_cert="/etc/eap/cacert.pem" client_cert="etc/eap/key.pem" private_key="/etc/eap/key.pem" private_key_passwd="whodareswins" eapol_flags=3 } With networkmanager it never connects(the only way I have ever managed to connect was to quickly do a iwconfig eth0 essid MBI and then fingers crossed it worked once).<snip> I don't think the issue is a hidden SSID, I think the problem is using EAP with WEP which I don't /think/ NetworkManager supports at this time. Dan, correct me if I am wrong.Ah, you're right. This is the "compat" mode that allows WEP clients to continue to work with WPA base stations; since WEP clients don't know anything about pairwise keys they can work as normal, but WPA-capable clients can use TKIP/CCMP for all STA<->AP communication. That's likely the problem, yes. Dan_______________________________________________ NetworkManager-list mailing list NetworkManager-list gnome org http://mail.gnome.org/mailman/listinfo/networkmanager-listplain text document attachment (test1.txt) Script started on Thu 25 Jan 2007 06:34:53 PM CET]0;root test:/etc/eap[root test eap]# v[Kcat wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicantap_scan=2 network={ ssid="ATMEL" scan_ssid=1 proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 psk=<removed> }]0;root test:/etc/eap[root test eap]# [6P(reverse-i-search)`':(reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s (reverse-i-search)`tes': ./nm-supplicant-[1 t (reverse-i-search)`test': ./nm-supplicant- [2 [root@test eap]# [root test eap]# ./nm-supplicant- ap_scan: 2 Key: ssid, Value: "ATMEL" Key: scan_ssid, Value: 1 Key: proto, Value: WPA Key: key_mgmt, Value: WPA-PSK Key: pairwise, Value: CCMP TKIP Key: group, Value: CCMP TKIP WEP104 WEP40 Key: psk, Value: <removed> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant ' SUP: response was 'OK' SUP: sending command 'AP_SCAN 2' SUP: response was 'OK' SUP: sending command 'ADD_NETWORK' SUP: response was '0' SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 scan_ssid 1' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 proto WPA' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 psk <removed>' SUP: response was 'OK' SUP: sending command 'ENABLE_NETWORK 0' SUP: response was 'OK' wpa_supplicant(3987): Global control interface '/var/run/wpa_supplicant-global' wpa_supplicant(3987): RX global ctrl_iface - hexdump_ascii(len=49): wpa_supplicant(3987): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et wpa_supplicant(3987): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru wpa_supplicant(3987): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicantwpa_supplicant(3987): 09 _ wpa_supplicant(3987): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant 'wpa_supplicant(3987): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A' wpa_supplicant(3987): Initializing interface (2) 'eth1' wpa_supplicant(3987): EAPOL: SUPP_PAE entering state DISCONNECTED wpa_supplicant(3987): EAPOL: KEY_RX entering state NO_KEY_RECEIVE wpa_supplicant(3987): EAPOL: SUPP_BE entering state INITIALIZE wpa_supplicant(3987): EAP: EAP entering state DISABLED wpa_supplicant(3987): EAPOL: External notification - portEnabled=0 wpa_supplicant(3987): EAPOL: External notification - portValid=0 wpa_supplicant(3987): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf wpa_supplicant(3987): capabilities: key_mgmt 0xf enc 0xf wpa_supplicant(3987): WEXT: Operstate: linkmode=1, operstate=5 wpa_supplicant(3987): b wpa_supplicant(3987): wpa_driver_wext_set_wpa wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(3987): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(3987): wpa_driver_wext_set_countermeasures wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(3987): Setting scan request: 0 sec 100000 usec wpa_supplicant(3987): Added interface eth1 wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () wpa_supplicant(3987): Wireless event: cmd=0x8b06 len=8 wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(3987): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(3987): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=9):wpa_supplicant(3987): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2 wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=11): wpa_supplicant(3987): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK wpa_supplicant(3987): CTRL_IFACE: ADD_NETWORKwpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED] wpa_supplicant(3987): _NETWORK id=0 name='ssid' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(3987): ssid - hexdump_ascii(len=5):wpa_supplicant(3987): 41 54 4d 45 4c ATMEL wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED] wpa_supplicant(3987): scan_ssid=1 (0x1) wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED] wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='proto' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED] wpa_supplicant(3987): proto: 0x1 wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED] wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(3987): key_mgmt: 0x2 wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] wpa_supplicant(3987): pairwise: 0x18 wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED] wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='group' wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED] wpa_supplicant(3987): group: 0x1ewpa_supplicant(3987): wpa_supplicant(3987): CTRL_IFACE: SET_NETWORK id=0 name='psk'wpa_supplicant(3987): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED] wpa_supplicant(3987): PSK - hexdump(len=32): [REMOVED] wpa_supplicant(3987): RX ctrl_iface - hexdump_ascii(len=16): wpa_supplicant(3987): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0 wpa_supplicant(3987): CTRL_IFACE: ENABLE_NETWORK id=0 wpa_supplicant(3987): Setting scan request: 0 sec 0 usec wpa_supplicant(3987): State: DISCONNECTED -> SCANNING wpa_supplicant(3987): Trying to associate with SSID 'ATMEL' wpa_supplicant(3987): Cancelling scan request wpa_supplicant(3987): WPA: clearing own WPA/RSN IE wpa_supplicant(3987): Automatic auth_alg selection: 0x1 wpa_supplicant(3987): WPA: No WPA/RSN IE available from association info wpa_supplicant(3987): WPA: Set cipher suites based on configuration wpa_supplicant(3987): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1 wpa_supplicant(3987): WPA: clearing AP WPA IE wpa_supplicant(3987): WPA: clearing AP RSN IE wpa_supplicant(3987): WPA: using GTK CCMP wpa_supplicant(3987): WPA: using PTK CCMP wpa_supplicant(3987): WPA: using KEY_MGMT WPA-PSK wpa_supplicant(3987): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 wpa_supplicant(3987): No keys have been configured - skip key clearing wpa_supplicant(3987): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(3987): State: SCANNING -> ASSOCIATING Activation (eth1/wireless): association took too long (>20s), failing activation. sendmsg(CTRL_IFACE monitor): No such file or directory ]0;root test:/etc/eap[root test eap]# exit Script done on Thu 25 Jan 2007 06:35:36 PM CET plain text document attachment (test2.txt) Script started on Thu 25 Jan 2007 06:35:50 PM CET]0;root test:/etc/eap[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf[root test eap]# [22Pcat[root test eap]# cat wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicantap_scan=1 network={ ssid="ATMEL" scan_ssid=1 proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 psk=<removed> } ]0;root test:/etc/eap[root test eap]# cat wpa_supplicant.conf [22 /nm-supplicant-test eth1[root test eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf ap_scan: 1Key: ssid, Value: "ATMEL" Key: scan_ssid, Value: 1 Key: proto, Value: WPA Key: key_mgmt, Value: WPA-PSK Key: pairwise, Value: CCMP TKIP Key: group, Value: CCMP TKIP WEP104 WEP40 Key: psk, Value: <removed> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant ' SUP: response was 'OK' SUP: sending command 'AP_SCAN 1' SUP: response was 'OK' SUP: sending command 'ADD_NETWORK' SUP: response was '0' SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 scan_ssid 1' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 proto WPA' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 psk <removed>' SUP: response was 'OK' SUP: sending command 'ENABLE_NETWORK 0' SUP: response was 'OK' ioctl[SIOCSIWFREQ]: Operation not supported wpa_supplicant(4041): Global control interface '/var/run/wpa_supplicant-global' wpa_supplicant(4041): RX global ctrl_iface - hexdump_ascii(len=49): wpa_supplicant(4041): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et wpa_supplicant(4041): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru wpa_supplicant(4041): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicantwpa_supplicant(4041): 09 _ wpa_supplicant(4041): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant 'wpa_supplicant(4041): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A' wpa_supplicant(4041): Initializing interface (2) 'eth1' wpa_supplicant(4041): EAPOL: SUPP_PAE entering state DISCONNECTED wpa_supplicant(4041): EAPOL: KEY_RX entering state NO_KEY_RECEIVE wpa_supplicant(4041): EAPOL: SUPP_BE entering state INITIALIZE wpa_supplicant(4041): EAP: EAP entering state DISABLED wpa_supplicant(4041): EAPOL: External notification - portEnabled=0 wpa_supplicant(4041): EAPOL: External notification - portValid=0 wpa_supplicant(4041): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf wpa_supplicant(4041): capabilities: key_mgmt 0xf enc 0xf wpa_supplicant(4041): WEXT: Operstate: linkmode=1, operstate=5 wpa_supplicant(4041): b wpa_supplicant(4041): wpa_driver_wext_set_wpa wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4041): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4041): wpa_driver_wext_set_countermeasures wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(4041): Setting scan request: 0 sec 100000 usec wpa_supplicant(4041): Added interface eth1 wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8 wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=9):wpa_supplicant(4041): 41 50 5f 53 43 41 4e 20 31 AP_SCAN 1 wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=11): wpa_supplicant(4041): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK wpa_supplicant(4041): CTRL_IFACE: ADD_NETWORKwpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED] wpa_supplicant(4041): _NETWORK id=0 name='ssid' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(4041): ssid - hexdump_ascii(len=5):wpa_supplicant(4041): 41 54 4d 45 4c ATMEL wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED] wpa_supplicant(4041): scan_ssid=1 (0x1) wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED] wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='proto' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED] wpa_supplicant(4041): proto: 0x1 wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED] wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(4041): key_mgmt: 0x2 wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] wpa_supplicant(4041): pairwise: 0x18 wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED] wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='group' wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED] wpa_supplicant(4041): group: 0x1ewpa_supplicant(4041): wpa_supplicant(4041): CTRL_IFACE: SET_NETWORK id=0 name='psk'wpa_supplicant(4041): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED] wpa_supplicant(4041): PSK - hexdump(len=32): [REMOVED] wpa_supplicant(4041): RX ctrl_iface - hexdump_ascii(len=16): wpa_supplicant(4041): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0 wpa_supplicant(4041): CTRL_IFACE: ENABLE_NETWORK id=0 wpa_supplicant(4041): Setting scan request: 0 sec 0 usec wpa_supplicant(4041): State: DISCONNECTED -> SCANNING wpa_supplicant(4041): Starting AP scan (specific SSID) wpa_supplicant(4041): Scan SSID - hexdump_ascii(len=5):wpa_supplicant(4041): 41 54 4d 45 4c ATMEL wpa_supplicant(4041): Trying to get current scan results first without requesting a new scan to speed up initial associationwpa_supplicant(4041): Received 1522 bytes of scan results (6 BSSes) wpa_supplicant(4041): Scan results: 6 wpa_supplicant(4041): Selecting BSS from priority group 0 wpa_supplicant(4041): 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 wpa_supplicant(4041): selected based on WPA IE wpa_supplicant(4041): Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz) wpa_supplicant(4041): Cancelling scan request wpa_supplicant(4041): WPA: clearing own WPA/RSN IE wpa_supplicant(4041): Automatic auth_alg selection: 0x1 wpa_supplicant(4041): WPA: using IEEE 802.11i/D3.0 wpa_supplicant(4041): proto 1 wpa_supplicant(4041): WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): WPA: clearing AP RSN IE wpa_supplicant(4041): WPA: using GTK TKIP wpa_supplicant(4041): WPA: using PTK TKIP wpa_supplicant(4041): WPA: using KEY_MGMT WPA-PSK wpa_supplicant(4041): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): No keys have been configured - skip key clearing wpa_supplicant(4041): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(4041): State: SCANNING -> ASSOCIATING wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5 wpa_supplicant(4041): wpa_driver_wext_associate wpa_supplicant(4041): Association request to the driver failed wpa_supplicant(4041): Setting authentication timeout: 5 sec 0 usec wpa_supplicant(4041): EAPOL: External notification - EAP success=0 wpa_supplicant(4041): EAPOL: External notification - EAP fail=0 wpa_supplicant(4041): EAPOL: External notification - portControl=Auto wpa_supplicant(4041): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00 wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4041): Wireless event: cmd=0x8b06 len=8 wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4041): eless event: cmd=0x8b1a len=14 wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) wpa_supplicant(4041): Wireless event: cmd=0x8b15 len=20 wpa_supplicant(4041): Wireless event: new AP: 00:13:10:68:4f:1c wpa_supplicant(4041): State: ASSOCIATING -> ASSOCIATED wpa_supplicant(4041): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) wpa_supplicant(4041): WEXT: Operstate: linkmode=-1, operstate=5 wpa_supplicant(4041): Associated to a new BSS: BSSID=00:13:10:68:4f:1c wpa_supplicant(4041): No keys have been configured - skip key clearing wpa_supplicant(4041): Associated with 00:13:10:68:4f:1c wpa_supplicant(4041): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 34 30 33 39 2d 32 00 wpa_supplicant(4041): WPA: Association event - clear replay counter wpa_supplicant(4041): EAPOL: External notification - portEnabled=0 wpa_supplicant(4041): EAPOL: External notification - portValid=0 wpa_supplicant(4041): EAPOL: External notification - EAP success=0 wpa_supplicant(4041): EAPOL: External notification - portEnabled=1 wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING wpa_supplicant(4041): EAPOL: SUPP_BE entering state IDLE wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec wpa_supplicant(4041): Cancelling scan request wpa_supplicant(4041): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) wpa_supplicant(4041): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(4041): :10:68:4f:1c wpa_supplicant(4041): RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wpa_supplicant(4041): Setting authentication timeout: 10 sec 0 usec wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=95 wpa_supplicant(4041): EAPOL-Key type=254 wpa_supplicant(4041): key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wpa_supplicant(4041): key_length=32 key_data_length=0 wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b wpa_supplicant(4041): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wpa_supplicant(4041): : 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wpa_supplicant(4041): State: ASSOCIATED -> 4WAY_HANDSHAKE wpa_supplicant(4041): WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1) wpa_supplicant(4041): WPA: Renewed SNonce - hexdump(len=32): 4d 51 e5 a2 16 0f 74 d4 90 f4 8c d9 1b a8 c4 b3 e8 09 82 cb a8 b9 f6 78 38 49 3d 58 da 5b b8 2e wpa_supplicant(4041): WPA: PMK - hexdump(len=32): [REMOVED] wpa_supplicant(4041): WPA: PTK - hexdump(len=64): [REMOVED] wpa_supplicant(4041): WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): WPA: Sending EAPOL-Key 2/4 Activation (eth1/wireless) Stage 2 of 5 (Device Configure) successful. Connected to access point '"ATMEL"'. wpa_supplicant(4041): 0 00 00 00 00 03 12 a1 08 a8 30 e0 a0 99 bf e6 87 6f 17 17 cd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c wpa_supplicant(4041): RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=119 wpa_supplicant(4041): EAPOL-Key type=254 wpa_supplicant(4041): key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) wpa_supplicant(4041): key_length=32 key_data_length=24 wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b wpa_supplicant(4041): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wpa_supplicant(4041): ): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_mic - hexdump(len=16): 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 e0 77 d9 82 6b 8c 06 77 06 40 90 f2 f1 78 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wpa_supplicant(4041): WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1) wpa_supplicant(4041): WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_supplicant(4041): WPA: Sending EAPOL-Key 4/4 wpa_supplicant(4041): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 18 43 fa 69 03 96 65 95 37 42 5c f1 df ed 6c 00 00 wpa_supplicant(4041): WPA: Installing PTK to the driver. wpa_supplicant(4041): WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_supplicant(4041): wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 wpa_supplicant(4041): State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wpa_supplicant(4041): EAPOL: startWhen --> 0 wpa_supplicant(4041): EAPOL: SUPP_PAE entering state CONNECTING wpa_supplicant(4041): EAPOL: txStart wpa_supplicant(4041): WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) wpa_supplicant(4041): RX EAPOL from 00:13:10:68:4f:1c wpa_supplicant(4041): RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51 wpa_supplicant(4041): IEEE 802.1X RX: version=1 type=3 length=127 wpa_supplicant(4041): EAPOL-Key type=254 wpa_supplicant(4041): k MIC Secure) wpa_supplicant(4041): key_length=32 key_data_length=32 wpa_supplicant(4041): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 wpa_supplicant(4041): key_nonce - hexdump(len=32): 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 wpa_supplicant(4041): key_iv - hexdump(len=16): 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c wpa_supplicant(4041): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 wpa_supplicant(4041): key_mic - hexdump(len=16): 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 wpa_supplicant(4041): WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 18 3e 1e 92 e6 33 1b 03 b5 0b 90 ca e1 5b 1f e4 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 49 85 cf 58 e5 71 ee 30 47 a6 fb 59 dc 8f 3e 90 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 9e 51 ea a9 4b de c7 85 d9 75 6e c2 4e c8 66 00 20 59 d5 d3 f1 0e 3e a4 77 2e 1d 17 eb a1 3a 64 65 68 49 b1 19 db a2 c9 b1 93 56 c4 18 da cd c6 51 wpa_supplicant(4041): WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)]0;root test:/etc/eap[root test eap]# Script done on Thu 25 Jan 2007 06:36:18 PM CETplain text document attachment (test3.txt) Script started on Thu 25 Jan 2007 06:40:07 PM CET]0;root test:/etc/eap[root test eap]# [6P(reverse-i-search)`':(reverse-i-search)`': [47 c': ./nm-supplicant-test eth1 wpa_supplicant.conf (reverse-i-search)`c[1 a (reverse-i-search)`ca': ./nm-supplicant-test eth1 wpa_suppli (reverse-i-search)`ca[21Pt': cat [3 [root@test eap]#[root test eap]# ctrl_interface=/var/run/wpa_supplicantap_scan=2 network={ ssid="ATMEL" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 psk=<removed> }]0;root test:/etc/eap[root test eap]# [6P(reverse-i-search)`':(reverse-i-search)`': [25 t': cat wpa_supplicant conf[23 e': ./nm-supplicant-test eth1[1 s (reverse-i-search)`tes': ./nm-supplicant-[1 t (reverse-i-search)`test': ./nm-supplicant- [2 [root@test eap]# [root test eap]# ./nm-supplicant- ap_scan: 2 Key: ssid, Value: "ATMEL" Key: proto, Value: WPA Key: key_mgmt, Value: WPA-PSK Key: pairwise, Value: CCMP TKIP Key: group, Value: CCMP TKIP WEP104 WEP40 Key: psk, Value: <removed> SUP: sending command 'INTERFACE_ADD eth1 wext /var/run/wpa_supplicant ' SUP: response was 'OK' SUP: sending command 'AP_SCAN 2' SUP: response was 'OK' SUP: sending command 'ADD_NETWORK' SUP: response was '0' SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 proto WPA' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40' SUP: response was 'OK' SUP: sending command 'SET_NETWORK 0 psk <removed>' SUP: response was 'OK' SUP: sending command 'ENABLE_NETWORK 0' SUP: response was 'OK' wpa_supplicant(4376): Global control interface '/var/run/wpa_supplicant-global' wpa_supplicant(4376): RX global ctrl_iface - hexdump_ascii(len=49): wpa_supplicant(4376): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74 INTERFACE_ADD et wpa_supplicant(4376): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75 h1__wext_/var/ru wpa_supplicant(4376): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 n/wpa_supplicantwpa_supplicant(4376): 09 _ wpa_supplicant(4376): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1 wext /var/run/wpa_supplicant 'wpa_supplicant(4376): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A' wpa_supplicant(4376): Initializing interface (2) 'eth1' wpa_supplicant(4376): EAPOL: SUPP_PAE entering state DISCONNECTED wpa_supplicant(4376): EAPOL: KEY_RX entering state NO_KEY_RECEIVE wpa_supplicant(4376): EAPOL: SUPP_BE entering state INITIALIZE wpa_supplicant(4376): EAP: EAP entering state DISABLED wpa_supplicant(4376): EAPOL: External notification - portEnabled=0 wpa_supplicant(4376): EAPOL: External notification - portValid=0 wpa_supplicant(4376): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf wpa_supplicant(4376): capabilities: key_mgmt 0xf enc 0xf wpa_supplicant(4376): WEXT: Operstate: linkmode=1, operstate=5 wpa_supplicant(4376): b wpa_supplicant(4376): wpa_driver_wext_set_wpa wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4376): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_supplicant(4376): wpa_driver_wext_set_countermeasures wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(4376): Setting scan request: 0 sec 100000 usec wpa_supplicant(4376): Added interface eth1 wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () wpa_supplicant(4376): Wireless event: cmd=0x8b06 len=8 wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(4376): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) wpa_supplicant(4376): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=9):wpa_supplicant(4376): 41 50 5f 53 43 41 4e 20 32 AP_SCAN 2 wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=11): wpa_supplicant(4376): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK wpa_supplicant(4376): CTRL_IFACE: ADD_NETWORKwpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED] wpa_supplicant(4376): _NETWORK id=0 name='ssid' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(4376): ssid - hexdump_ascii(len=5):wpa_supplicant(4376): 41 54 4d 45 4c ATMEL wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='proto' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED] wpa_supplicant(4376): proto: 0x1 wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED] wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] wpa_supplicant(4376): key_mgmt: 0x2 wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] wpa_supplicant(4376): pairwise: 0x18 wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED] wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='group' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED] wpa_supplicant(4376): group: 0x1e wpa_supplicant(4376): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED] wpa_supplicant(4376): CTRL_IFACE: SET_NETWORK id=0 name='psk' wpa_supplicant(4376): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED] wpa_supplicant(4376): PSK - hexdump(len=32): [REMOVED]wpa_supplicant(4376): wpa_supplicant(4376): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30 ENABLE_NETWORK 0wpa_supplicant(4376): CTRL_IFACE: ENABLE_NETWORK id=0 wpa_supplicant(4376): Setting scan request: 0 sec 0 usec wpa_supplicant(4376): State: DISCONNECTED -> SCANNING wpa_supplicant(4376): Trying to associate with SSID 'ATMEL' wpa_supplicant(4376): Cancelling scan request wpa_supplicant(4376): WPA: clearing own WPA/RSN IE wpa_supplicant(4376): Automatic auth_alg selection: 0x1 wpa_supplicant(4376): WPA: No WPA/RSN IE available from association info wpa_supplicant(4376): WPA: Set cipher suites based on configuration wpa_supplicant(4376): WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 2 proto 1 wpa_supplicant(4376): WPA: clearing AP WPA IE wpa_supplicant(4376): WPA: clearing AP RSN IE wpa_supplicant(4376): WPA: using GTK CCMP wpa_supplicant(4376): WPA: using PTK CCMP wpa_supplicant(4376): WPA: using KEY_MGMT WPA-PSK wpa_supplicant(4376): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 wpa_supplicant(4376): No keys have been configured - skip key clearing wpa_supplicant(4376): wpa_driver_wext_set_drop_unencrypted wpa_supplicant(4376): State: SCANNING -> ASSOCIATING wpa_supplicant(4376): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) wpa_supplicant(4376): WEXT: Operstate: linkmode=-1, operstate=5 wpa_supplicant(4376): wpa_driver_wext_associate wpa_supplicant(4376): Setting authentication timeout: 60 sec 0 usec ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address ioctl[SIOCGIFADDR]: Cannot assign requested address Activation (eth1/wireless): association took too long (>20s), failing activation. sendmsg(CTRL_IFACE monitor): No such file or directory