Re: How To: Manual Network Configuration without the need for Network Manager
Quote:
Originally Posted by
kevdog
Thanks -- just post
iwlist scan
Code:
dan@dan-hp:~$ iwlist scan
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
wlan0 No scan results
With sudo though I get this:
Code:
[sudo] password for dan:
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
wlan0 Scan completed :
Cell 01 - Address: 00:17:3F:6A:DD:99
ESSID:"houseoflove"
Protocol:IEEE 802.11g
Mode:Managed
Frequency:2.462 GHz (Channel 11)
Quality:39/100 Signal level:-71 dBm Noise level:-96 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
12 Mb/s; 24 Mb/s; 36 Mb/s; 9 Mb/s; 18 Mb/s
48 Mb/s; 54 Mb/s
Extra:bcn_int=100
Extra:atim=0
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Preauthentication Supported
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : TKIP CCMP
Authentication Suites (1) : PSK
Cell 02 - Address: 02:E0:62:4D:5F:38
ESSID:"ANY"
Protocol:IEEE 802.11g
Mode:Ad-Hoc
Frequency:2.412 GHz (Channel 1)
Quality:28/100 Signal level:-78 dBm Noise level:-96 dBm
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:bcn_int=100
Extra:atim=0
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : none
Authentication Suites (1) : 802.1x
Cell 03 - Address: 00:1B:63:2D:20:A9
ESSID:"girlfess"
Protocol:IEEE 802.11g
Mode:Managed
Frequency:2.412 GHz (Channel 1)
Quality:89/100 Signal level:-39 dBm Noise level:-96 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:bcn_int=100
Extra:atim=0
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : PSK
Cell 04 - Address: 00:1C:10:14:AB:84
ESSID:"Citgo-3"
Protocol:IEEE 802.11g
Mode:Managed
Frequency:2.437 GHz (Channel 6)
Quality:15/100 Signal level:-86 dBm Noise level:-96 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 18 Mb/s
24 Mb/s; 36 Mb/s; 54 Mb/s; 6 Mb/s; 9 Mb/s
12 Mb/s; 48 Mb/s
Extra:bcn_int=100
Extra:atim=0
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : PSK
Re: How To: Manual Network Configuration without the need for Network Manager
Does you wireless card connect if for example wpa is turned off and no wireless encryption is used?
Re: How To: Manual Network Configuration without the need for Network Manager
Quote:
Originally Posted by
kevdog
Does you wireless card connect if for example wpa is turned off and no wireless encryption is used?
I'm working on getting admin access to the Base Station right now. I probably won't know until tomorrow though.
Re: How To: Manual Network Configuration without the need for Network Manager
howdy, hoping someone can help here, I'm trying to connect to a hidden ssid and don't really know what I'm doing.
It support (who don't support linux clients) have kindly given me this information:
Network name: csiro-internal
Network Authentication: WPA-Enterprise EAP method PEAP
Inner EAP method: MS-CHAP v2
my wpa_supplicant.conf is like this:
Code:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=1
network={
ssid="csiro-internal"
scan_ssid=1
key_mgmt=WPA-EAP
proto=RSN
eap=PEAP
phase2="auth=MSCHAPV2"
identity="cha623"
password="" # removed
}
running wpa_supplicant -i wlan0 -D wext -c /etc/wpa_supplicant.conf -dd gives:
Code:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=14):
63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c csiro-internal
scan_ssid=1 (0x1)
key_mgmt: 0x1
proto: 0x2
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
identity - hexdump_ascii(len=6):
63 68 61 36 32 33 cha623
password - hexdump_ascii(len=9): [REMOVED]
Priority group 0
id=0 ssid='csiro-internal'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:3b:51:e1:4f
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=14):
63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c csiro-internal
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 1717 bytes of scan results (8 BSSes)
Scan results: 8
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
selected based on RSN IE
selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
Try to find non-WPA AP
Trying to associate with 00:1f:c9:66:78:b0 (SSID='csiro-internal' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=22
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=245
WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
Association info event
req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1f:c9:66:78:b0
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
No keys have been configured - skip key clearing
Associated with 00:1f:c9:66:78:b0
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=52):
00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f _networkid=csiro
2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d -internal,nasid=
72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 rbh-ccr-ap1,port
69 64 3d 30 id=0
EAP: using real identity - hexdump_ascii(len=6):
63 68 61 36 32 33 cha623
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 63 68 61 36 32 33
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 810 bytes of scan results (4 BSSes)
Scan results: 4
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
selected based on RSN IE
selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
Try to find non-WPA AP
Already associated with the selected AP.
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:1f:c9:66:78:b0 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: authWhile --> 0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=14):
63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c csiro-internal
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=245
WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
Association info event
req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1f:c9:66:78:b0
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
No keys have been configured - skip key clearing
Associated with 00:1f:c9:66:78:b0
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=52):
00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f _networkid=csiro
2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d -internal,nasid=
72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 rbh-ccr-ap1,port
69 64 3d 30 id=0
EAP: using real identity - hexdump_ascii(len=6):
63 68 61 36 32 33 cha623
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 63 68 61 36 32 33
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
Scan timeout - try to get results
Received 0 bytes
with it trying to run the auth over and over and timing out.
can someone please advise on what I need to do?
Re: How To: Manual Network Configuration without the need for Network Manager
I have no experience with MSCHAPV2 so I'm not going to be much help to you. I haven't found a lot of info in the ubuntu forums about this either. Unfortunately google might be your best friend on this one.
Re: How To: Manual Network Configuration without the need for Network Manager
Quote:
Originally Posted by
kevdog
I have no experience with MSCHAPV2 so I'm not going to be much help to you. I haven't found a lot of info in the ubuntu forums about this either. Unfortunately google might be your best friend on this one.
well I sort of got it working maybe, but not sure how.
firstly I left the above config listed 2 posts up running while I went to lunch. When I came back it seemed to have connected so I ran sudo dhclient wlan0 and it worked and all was good.
Then I killed it and attempted to re-run wpa_supplicant and had the same problem. So I fiddled with some settings and it worked again. Who knows what will happen if I try to reconnect, heh.
anyway current settings (changes: disabled EAP, fast_reauth, added full domain to my username (but was explicitly told this was not necessary)
Code:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=0
network={
ssid="csiro-internal"
scan_ssid=1
key_mgmt=WPA-EAP
proto=RSN
#eap=PEAP
phase1="peaplabel=1"
phase2="auth=MSCHAPV2"
identity=""
password=""
}
wpa_supplicant connection log:
Code:
zmc@zts:~$ sudo ifconfig wlan0 down; sudo wpa_supplicant -i wlan0 -c /etc/wpa_supplicant.conf -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=0
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=14):
63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c csiro-internal
scan_ssid=1 (0x1)
key_mgmt: 0x1
proto: 0x2
phase1 - hexdump_ascii(len=11):
70 65 61 70 6c 61 62 65 6c 3d 31 peaplabel=1
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
identity - hexdump_ascii(len=15):
password - hexdump_ascii(len=9): [REMOVED]
Priority group 0
id=0 ssid='csiro-internal'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:3b:51:e1:4f
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=14):
63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c csiro-internal
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 248 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
selected based on RSN IE
selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
Try to find non-WPA AP
Trying to associate with 00:1f:c9:66:78:b0 (SSID='csiro-internal' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=22
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=245
WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
Association info event
req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1f:c9:66:78:b0
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
No keys have been configured - skip key clearing
Associated with 00:1f:c9:66:78:b0
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=52):
00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f _networkid=csiro
2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d -internal,nasid=
72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 rbh-ccr-ap1,port
69 64 3d 30 id=0
EAP: using real identity - hexdump_ascii(len=15):
63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75 cha623@csiro.au
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 01 00 00 14 02 01 00 14 01 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=46): 01 00 00 1f 01 8a 00 1f 11 01 00 08 c8 19 1e 9a f6 6a 6a 66 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=138 method=17 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): c8 19 1e 9a f6 6a 6a 66
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=51): 01 00 00 2f 02 8a 00 2f 11 01 00 18 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=46): 01 00 00 04 03 8a 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 06 e1 1c 04 93 a9 06 f7
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=35): 01 00 00 1f 01 8a 00 1f 11 01 00 08 06 e1 1c 04 93 a9 06 f7 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=51): 01 00 00 2f 02 8a 00 2f 11 01 00 18 f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Response for LEAP method=17 id=138
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Response
EAP-LEAP: Response from AP - hexdump(len=24): f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED]
EAP-LEAP: peer_challenge - hexdump(len=8): c8 19 1e 9a f6 6a 6a 66
EAP-LEAP: peer_response - hexdump(len=24): 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48
EAP-LEAP: ap_challenge - hexdump(len=8): 06 e1 1c 04 93 a9 06 f7
EAP-LEAP: ap_response - hexdump(len=24): f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06
EAP-LEAP: master key - hexdump(len=16): [REMOVED]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:c9:66:78:b0 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
RSN: PMKID from Authenticator - hexdump(len=16): b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
RSN: no matching PMKID found
WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED]
RSN: added PMKSA cache entry for 00:1f:c9:66:78:b0
RSN: the new PMK matches with the PMKID
WPA: Renewed SNonce - hexdump(len=32): 0e b3 cb cf 39 b6 2d d9 18 b2 1e 2d f9 94 29 c1 09 7d 1c a2 77 65 7a c6 c5 3f 15 63 b1 1f 0e c1
WPA: PMK - hexdump(len=16): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 0e b3 cb cf 39 b6 2d d9 18 b2 1e 2d f9 94 29 c1 09 7d 1c a2 77 65 7a c6 c5 3f 15 63 b1 1f 0e c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 f0 78 10 29 10 96 00 27 c2 e3 ed e5 24 6f 7f 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RX EAPOL from 00:1f:c9:66:78:b0
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53 00 38 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 63 8e 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53 00 38 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
RSN: encrypted key data - hexdump(len=56): 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:1f:c9:66:78:b0 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 16 00 0f ac 01 01 00 38 1f 8e 9b 46 3e 7c 95 51 96 b5 69 9c 01 8d ea dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 d5 28 8f 9d c4 34 5e 43 46 63 5d a2 cc 04 15 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 63 8e 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:1f:c9:66:78:b0 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:1f:c9:66:78:b0 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: idleWhile --> 0
Re: How To: Manual Network Configuration without the need for Network Manager
adante
Inform me if this is successful with repeated attempts and I will add it to the front page of the guide with credit to you.
Re: How To: Manual Network Configuration without the need for Network Manager
I found a mistake. in a few places it says mode Managed with a capital "M" in managed, but it should be lower case. Thanks for the guide, it helped me on 2 computers.:)
Re: How To: Manual Network Configuration without the need for Network Manager
No it should be Managed with a capitol M:
http://linux.die.net/man/8/iwconfig
Re: How To: Manual Network Configuration without the need for Network Manager
Quote:
Originally Posted by
kevdog
adante
Inform me if this is successful with repeated attempts and I will add it to the front page of the guide with credit to you.
sadly, no
well, in the literal sense, it IS successful with repeated attempts :confused: - if I run the command and just let it sit there for some time it does eventually work. Sometimes it connects immediately and other times it will take a lunch break.
odd. I will keep you informed if I ever manage to solve this reliably.