Page 13 of 16 FirstFirst ... 31112131415 ... LastLast
Results 121 to 130 of 155

Thread: HowTo: WPA with wpa_supplicant

  1. #121
    Join Date
    Dec 2005
    Location
    capital of beer
    Beans
    547

    Re: HowTo: WPA with wpa_supplicant

    Cheers, northox - I never knew!
    repartitioning your installation / forever noob / Desktop on Debian Lenny / IBM T41 purring along on bog Kubuntu

  2. #122
    Join Date
    Dec 2007
    Location
    Chicago, IL
    Beans
    28
    Distro
    Ubuntu 9.04 Jaunty Jackalope

    Re: HowTo: WPA with wpa_supplicant

    Is anyone still checking this thread? I'm in a situation where I need a command-line wireless utility to work and this seems like a really good option, expect its not quite working :-/

    Here is my configuration file:

    Code:
    ctrl_interface=/var/run/wpa_supplicant
    #ap_scan=2
    
    network={
       ssid="rogue"
       scan_ssid=1
       proto=WPA RSN
       key_mgmt=WPA-PSK
       pairwise=CCMP TKIP
       group=CCMP TKIP
       psk=07860305771c588e6dd629021d2de1c7637a5ea05c52440a19c7fb85cd51cd8a
    }
    And here is a dump of the wpa_supplicant debug info:

    Code:
    Initializing interface 'wlan0' conf '/home/anton/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/home/anton/etc/wpa_supplicant.conf' -> '/home/anton/etc/wpa_supplicant.conf'
    Reading configuration file '/home/anton/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 4 - start of a new network block
    ssid - hexdump_ascii(len=5):
         72 6f 67 75 65                                    rogue           
    scan_ssid=1 (0x1)
    proto: 0x3
    key_mgmt: 0x2
    pairwise: 0x18
    group: 0x18
    PSK - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='rogue'
    Initializing interface (2) 'wlan0'
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:0e:2e:de:db:82
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    Setting scan request: 0 sec 100000 usec
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
    Wireless event: cmd=0x8b06 len=8
    Ignore event for foreign ifindex 3
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=5):
         72 6f 67 75 65                                    rogue           
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 0 bytes of scan results (0 BSSes)
    Scan results: 0
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    Try to find non-WPA AP
    No suitable AP found.
    Setting scan request: 0 sec 0 usec
    Starting AP scan (broadcast SSID)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b19 len=8
    Scan results: -1
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 1 sec 0 usec
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b19 len=8
    Received 674 bytes of scan results (3 BSSes)
    Scan results: 3
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:1e:58:f4:37:d5 ssid='rogue' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:1e:58:f4:37:d5 ssid='rogue'
    Try to find non-WPA AP
    Trying to associate with 00:1e:58:f4:37:d5 (SSID='rogue' freq=2462 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b1a len=13
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c02 len=189
    WEXT: Custom wireless event: 'ASSOCINFO(ReqIE2432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEdd0c00037f020101070002a44000)'
    Association info event
    req_ies - hexdump(len=47): 00 05 72 6f 67 75 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    resp_ies - hexdump(len=30): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c dd 0c 00 03 7f 02 01 01 07 00 02 a4 40 00
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:1e:58:f4:37:d5
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:1e:58:f4:37:d5
    No keys have been configured - skip key clearing
    Associated with 00:1e:58:f4:37:d5
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:1e:58:f4:37:d5
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
      key_nonce - hexdump(len=32): e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:1e:58:f4:37:d5 (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 9c 54 25 4a 98 86 f9 5d c5 30 4f 64 af dc 8a 75 33 31 fd b8 b6 83 23 e4 52 6f cc ec 2a da 11 e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 9c 54 25 4a 98 86 f9 5d c5 30 4f 64 af dc 8a 75 33 31 fd b8 b6 83 23 e4 52 6f cc ec 2a da 11 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cd a5 27 90 9c fd 0d f7 c9 97 0e 70 f9 3b 33 9f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RX EAPOL from 00:1e:58:f4:37:d5
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6b a9 6c 62 10 ca f2 7b fb 30 00 4a 37 b0 02 55 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
      key_nonce - hexdump(len=32): e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 6b a9 6c 62 10 ca f2 7b fb 30 00 4a 37 b0 02 55
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 e0 e7 26 41 c9 3c 5d d8 cb ae ba 40 73 56 5d 88 b7 2a 3a 05 78 7a f3 b8 17 27 33 73 c8 e0 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6b a9 6c 62 10 ca f2 7b fb 30 00 4a 37 b0 02 55 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:1e:58:f4:37:d5 (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 11 88 4e 01 b6 1c 67 a6 92 a1 33 23 95 8e 3d 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RX EAPOL from 00:1e:58:f4:37:d5
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 5e 19 0a db 4d 62 f6 d6 23 c8 d0 ad c4 16 cd 90 96 72 ec 03 c3 b9 13 55 ee 47 f4 05 94 2e bb 59 91 84 a5 2e f7 dc 3b ec 47 ed d6 ee 2f 72 75 a9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5d e3 53 00 c2 90 a1 e4 5b 66 2f 49 f8 34 e4 7a 00 20 35 81 2f 7a f8 16 ec e0 fd ad ee 10 7c 5b e6 e3 3b 44 4d 16 10 18 d6 f5 eb d6 c9 7b a5 57 70 d8
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
      key_nonce - hexdump(len=32): 5e 19 0a db 4d 62 f6 d6 23 c8 d0 ad c4 16 cd 90 96 72 ec 03 c3 b9 13 55 ee 47 f4 05 94 2e bb 59
      key_iv - hexdump(len=16): 91 84 a5 2e f7 dc 3b ec 47 ed d6 ee 2f 72 75 a9
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 5d e3 53 00 c2 90 a1 e4 5b 66 2f 49 f8 34 e4 7a
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 5e 19 0a db 4d 62 f6 d6 23 c8 d0 ad c4 16 cd 90 96 72 ec 03 c3 b9 13 55 ee 47 f4 05 94 2e bb 59 91 84 a5 2e f7 dc 3b ec 47 ed d6 ee 2f 72 75 a9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5d e3 53 00 c2 90 a1 e4 5b 66 2f 49 f8 34 e4 7a 00 20 35 81 2f 7a f8 16 ec e0 fd ad ee 10 7c 5b e6 e3 3b 44 4d 16 10 18 d6 f5 eb d6 c9 7b a5 57 70 d8
    WPA: RX message 1 of Group Key Handshake from 00:1e:58:f4:37:d5 (ver=1)
    State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
    WPA: Group Key - hexdump(len=32): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=1 tx=0).
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
    WPA: Sending EAPOL-Key 2/2
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 fc 21 0a 60 83 cd bc 60 5f 1a 5e 62 fb 71 2c 00 00
    WPA: Key negotiation completed with 00:1e:58:f4:37:d5 [PTK=TKIP GTK=TKIP]
    Cancelling authentication timeout
    State: GROUP_HANDSHAKE -> COMPLETED
    CTRL-EVENT-CONNECTED - Connection to 00:1e:58:f4:37:d5 completed (auth) [id=0 id_str=]
    wpa_driver_wext_set_operstate: operstate 0->1 (UP)
    WEXT: Operstate: linkmode=-1, operstate=6
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state SUCCESS
    EAP: EAP entering state DISABLED
    EAPOL: SUPP_PAE entering state AUTHENTICATED
    EAPOL: SUPP_BE entering state IDLE
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    EAPOL: startWhen --> 0
    CTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: COMPLETED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6
    There is life, it seems like there's communication taking place between the computer and router, but still no internet.

    Any help would be greatly appreciated!

    Anton

  3. #123
    Join Date
    Dec 2007
    Location
    Chicago, IL
    Beans
    28
    Distro
    Ubuntu 9.04 Jaunty Jackalope

    Re: HowTo: WPA with wpa_supplicant

    Never mind, problem was fixed by restarting...

  4. #124
    Join Date
    Mar 2009
    Location
    UK
    Beans
    32

    Re: HowTo: WPA with wpa_supplicant

    Hello guys...i'm havin' a problem connecting to WPA2 router
    Firs thanks for such an informative howto to the author!!

    wpa_supplicant says this
    Code:
    march@march-desktop:~$ sudo wpa_supplicant -Dwext -i ra0 -c/etc/wpa_supplicant.conf
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:22:69:2a:d0:ee (SSID='BTHomeHub2-3ZF4' freq=2437 MHz)
    Associated with 00:22:69:2a:d0:ee
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    Associated with 00:22:69:2a:d0:ee
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    I removed -Bw parametet because otherwise it's not working...

    interfaces config:
    Code:
    auto ra0
    iface ra0 inet dhcp
    pre-up wpa_supplicant -Dwext -ra0 -c/etc/wpa_supplicant.conf
    post-down killall -q wpa_supplicant
    and wpa_supplicant.conf:
    Code:
    ctrl_interface=/var/run/wpa_supplicant
    #ap_scan=2
    
    network={
    	ssid="BTHomeHub2-3ZF4"
           	scan_ssid=1
           	proto=WPA RSN
           	key_mgmt=WPA-PSK
           	pairwise=CCMP TKIP
           	group=CCMP TKIP
    	psk="my psk hex key"
    }
    I tried everything but still getting the same error
    If anyone can give me a hand with this, i will really appreciate that!
    Flip-Top

  5. #125
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    Please post your wpa_supplicant.conf file and use the -dd flag to generate more output -- and post this!

  6. #126
    Join Date
    Mar 2009
    Location
    UK
    Beans
    32

    Re: HowTo: WPA with wpa_supplicant

    Yeah, here is the wpa_supplicant.conf file
    Code:
    ctrl_interface=/var/run/wpa_supplicant
    #ap_scan=2
    
    network={
    	ssid="BTHomeHub2-3ZF4"
           	scan_ssid=1
           	proto=WPA RSN
           	key_mgmt=WPA-PSK
           	pairwise=CCMP TKIP
           	group=CCMP TKIP
    	psk='my key and it's 100% correct'
    }
    And that's wpa_supplicant -bb...

    Code:
    Initializing interface 'ra0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 4 - start of a new network block
    ssid - hexdump_ascii(len=15):
         42 54 48 6f 6d 65 48 75 62 32 2d 33 5a 46 34      BTHomeHub2-3ZF4 
    scan_ssid=1 (0x1)
    proto: 0x3
    key_mgmt: 0x2
    pairwise: 0x18
    group: 0x18
    PSK - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='BTHomeHub2-3ZF4'
    Initializing interface (2) 'ra0'
    Interface ra0 set UP - waiting a second for the driver to complete initialization
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:1f:1f:18:0a:7a
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface ra0
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=15):
         42 54 48 6f 6d 65 48 75 62 32 2d 33 5a 46 34      BTHomeHub2-3ZF4 
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 0 sec 0 usec
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    EAPOL: disable timer tick
    Scan timeout - try to get results
    Received 540 bytes of scan results (5 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:1e:74:a9:b2:e9 ssid='SKY45800' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
       skip - SSID mismatch
    1: 00:22:69:2a:d0:ee ssid='BTHomeHub2-3ZF4' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:22:69:2a:d0:ee ssid='BTHomeHub2-3ZF4'
    Try to find non-WPA AP
    Trying to associate with 00:22:69:2a:d0:ee (SSID='BTHomeHub2-3ZF4' freq=2437 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
    WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
    WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
    WPA: using GTK TKIP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 0f 42 54 48 6f 6d 65 48 75 62 32 2d 33 5a 46 34 01 08 82 84 8b 96 24 30 48 6c 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:22:69:2a:d0:ee
    Association info event
    req_ies - hexdump(len=47): 00 0f 42 54 48 6f 6d 65 48 75 62 32 2d 33 5a 46 34 01 08 82 84 8b 96 24 30 48 6c 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    WPA: clearing own WPA/RSN IE
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:22:69:2a:d0:ee
    No keys have been configured - skip key clearing
    Associated with 00:22:69:2a:d0:ee
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    Authentication with 00:22:69:2a:d0:ee timed out.
    Added BSSID 00:22:69:2a:d0:ee into blacklist
    wpa_driver_wext_disassociate
    No keys have been configured - skip key clearing
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    Setting scan request: 0 sec 0 usec
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=15):
         42 54 48 6f 6d 65 48 75 62 32 2d 33 5a 46 34      BTHomeHub2-3ZF4 
    Scan requested (ret=0) - scan timeout 5 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Added BSSID 00:00:00:00:00:00 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: SCANNING -> DISCONNECTED
    Then it's repeating lots of times. Thank you

    Oh yeah...also, i can connect to my friends router with no problem by WPA1 protocol, but unfortunately with my router i have to use WPA2...
    Code:
    march@march-desktop:~$ sudo wpa_supplicant -Dwext -i ra0 -c/etc/wpa_supplicant.conf
    ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:1e:74:a9:b2:e9 (SSID='SKY45800' freq=2412 MHz)
    Associated with 00:1e:74:a9:b2:e9
    WPA: Key negotiation completed with 00:1e:74:a9:b2:e9 [PTK=TKIP GTK=TKIP]
    CTRL-EVENT-CONNECTED - Connection to 00:1e:74:a9:b2:e9 completed (auth) [id=0 id_str=]
    Flip-Top

  7. #127
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    Just wondering if you can do TKIP with WPA2 and drop the CCMP (RSA) portion from your wpa_supplicant part and set router to use TKIP. Also seems that your ESSID is incorrect?

  8. #128
    Join Date
    Mar 2009
    Location
    UK
    Beans
    32

    Re: HowTo: WPA with wpa_supplicant

    Quote Originally Posted by kevdog View Post
    Just wondering if you can do TKIP with WPA2 and drop the CCMP (RSA) portion from your wpa_supplicant part and set router to use TKIP. Also seems that your ESSID is incorrect?
    thanks for the tips, i'll try tomorrow morning, and post the results
    Flip-Top

  9. #129
    Join Date
    Mar 2009
    Location
    UK
    Beans
    32

    Re: HowTo: WPA with wpa_supplicant

    Thank you! I removed RSA from confing and it's working now
    Flip-Top

  10. #130
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    You wouldn't happen to be using a Broadcom card would you?

Page 13 of 16 FirstFirst ... 31112131415 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •