Page 14 of 16 FirstFirst ... 41213141516 LastLast
Results 131 to 140 of 155

Thread: HowTo: WPA with wpa_supplicant

  1. #131
    Join Date
    Mar 2009
    Location
    Vancouver
    Beans
    7
    Distro
    Ubuntu 8.10 Intrepid Ibex

    Re: HowTo: WPA with wpa_supplicant

    Hello. So I have tried a number of things to get WPA encryption to work, but I'm at a loss and can't decipher the debug info for what is really going wrong. This thread and its previous suggestions have been great and if I can't get this working, I'm probably going to give wicd a try.

    wpa_supplicant says:
    Code:
    rusty@rusty-ubuntu:~$ sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 5 - start of a new network block
    ssid - hexdump_ascii(len=13):
         44 41 56 45 53 20 4e 45 54 57 4f 52 4b            DAVES NETWORK   
    scan_ssid=1 (0x1)
    proto: 0x1
    key_mgmt: 0x2
    pairwise: 0x8
    group: 0x8
    PSK - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='DAVES NETWORK'
    Initializing interface (2) 'wlan0'
    Interface wlan0 set UP - waiting a second for the driver to complete initialization
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xd
      capabilities: key_mgmt 0x5 enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:0c:41:a6:56:dc
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=13):
         44 41 56 45 53 20 4e 45 54 57 4f 52 4b            DAVES NETWORK   
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 460 bytes of scan results (2 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:16:b6:60:9e:e8 ssid='DAVES NETWORK' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:16:b6:60:9e:e8 ssid='DAVES NETWORK'
    Try to find non-WPA AP
    Trying to associate with 00:16:b6:60:9e:e8 (SSID='DAVES NETWORK' freq=2447 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=59
    AssocReq IE wireless event - hexdump(len=51): 00 0d 44 41 56 45 53 20 4e 45 54 57 4f 52 4b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 5a 11 0f 50 cb 4c
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c08 len=24
    AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:16:b6:60:9e:e8
    Association info event
    req_ies - hexdump(len=51): 00 0d 44 41 56 45 53 20 4e 45 54 57 4f 52 4b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 5a 11 0f 50 cb 4c
    resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated with 00:00:00:00:00:00
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:16:b6:60:9e:e8 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    ...Rinse and Repeat...
    interfaces config:
    Code:
    auto lo
    iface lo inet loopback
    auto wlan0
    iface wlan0 inet dhcp
    wireless-essid 'DAVES NETWORK'
    pre-up wpa_supplicant -B -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
    post-down killall -q wpa_supplicant
    and wpa_supplicant.conf:
    Code:
    ctrl_interface=/var/run/wpa_supplicant
    #ap_scan=2
    
    network={
    	ssid="DAVES NETWORK"
    	scan_ssid=1
    	proto=WPA
    	key_mgmt=WPA-PSK
    	pairwise=TKIP
    	group=TKIP
    	psk=myhexkey
    }
    I've tried static/dhcp, including the RSN/CCMP lines, ap_scan values 0/1/2, and emptying the values and allowing Network-Manager to do the work. Unencrypted works. Would be willing to WEP, but the consensus is Linksys WMP11v4 doesn't support it. I know WPA works with WMP11v4 as I've tried following these instructions.

    I hope someone can give me some input, I'm willing to try anything. Thank you.

  2. #132
    Join Date
    Aug 2007
    Beans
    2

    Re: HowTo: WPA with wpa_supplicant

    I've gotten most of this working. One strange thing is that wpa_supplicant will not allow me to use ndiswrapper as the driver, only wext, which is strange as my WG111T driver is installed using ndiswrapper.

    If I reboot, it hangs at 'Configuring network interfaces". I can remove the WG111T, reboot and then re-insert the WG111T and manually bring the interface up with a '/etc/init.d/networking restart'.

    Could it be that ndiswrapper is not starting before the networking comes up?

  3. #133
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    wpa_supplicant newer releases from package or repository are only compiled with limited options such as using wext. This is not a drawback, but an advantage, since it simplifies setup. Everything should work with just specifying wext. If you need to specifically have the ndiswrapper option (which I can't think off the top of my head any reason you should need this), you need to compile from source.

  4. #134
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    flyingsolow

    The space in your essid name may be what is causing problems.

  5. #135
    Join Date
    Mar 2009
    Location
    Vancouver
    Beans
    7
    Distro
    Ubuntu 8.10 Intrepid Ibex

    Re: HowTo: WPA with wpa_supplicant

    Quote Originally Posted by kevdog View Post
    flyingsolow

    The space in your essid name may be what is causing problems.
    Thanks for your help kevdog. I guess that's something I should've anticipated. Turns out that solves that initial problem. I've switched the ESSID to davesnetwork now.

    I've been working on getting it working now, however, I've quickly hit another road block. I get an error that specifies the "pre-shared key may be incorrect" and I will admit, that's a very specific sounding error. However, I've attempted to use the wpa_passphrase and just the ASCII PSK and they both come up with the same result. My router is set to use WPA Personal, TKIP, and the PSK = mypresharedkey. I've attached the output I get and my wpa_supplicant.conf. Hopefully someone has some some ideas on possible things to solve the pre-shared key issue. Thanks.

    Code:
    rusty@rusty-ubuntu:~$ sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 5 - start of a new network block
    ssid - hexdump_ascii(len=12):
         64 61 76 65 73 6e 65 74 77 6f 72 6b               davesnetwork    
    scan_ssid=1 (0x1)
    proto: 0x1
    key_mgmt: 0x2
    pairwise: 0x8
    group: 0x8
    PSK - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='davesnetwork'
    Initializing interface (2) 'wlan0'
    Interface wlan0 set UP - waiting a second for the driver to complete initialization
    ioctl[SIOCSIWPMKSA]: Invalid argument
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xd
      capabilities: key_mgmt 0x5 enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:0c:41:a6:56:dc
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    ioctl[SIOCSIWPMKSA]: Invalid argument
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=12):
         64 61 76 65 73 6e 65 74 77 6f 72 6b               davesnetwork    
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 459 bytes of scan results (2 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:16:b6:60:9e:e8 ssid='davesnetwork' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:16:b6:60:9e:e8 ssid='davesnetwork'
    Try to find non-WPA AP
    Trying to associate with 00:16:b6:60:9e:e8 (SSID='davesnetwork' freq=2447 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    ioctl[SIOCSIWESSID]: Invalid argument
    Association request to the driver failed
    Setting authentication timeout: 5 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=58
    AssocReq IE wireless event - hexdump(len=50): 00 0c 64 61 76 65 73 6e 65 74 77 6f 72 6b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 81 42 3f 3f 78 a7
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c08 len=24
    AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:16:b6:60:9e:e8
    Association info event
    req_ies - hexdump(len=50): 00 0c 64 61 76 65 73 6e 65 74 77 6f 72 6b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 81 42 3f 3f 78 a7
    resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:16:b6:60:9e:e8
    No keys have been configured - skip key clearing
    Associated with 00:16:b6:60:9e:e8
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:16:b6:60:9e:e8
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 57 ee f4 89 00 00 00 01
      key_nonce - hexdump(len=32): c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:16:b6:60:9e:e8 (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c
    WPA: PTK derivation - A1=00:0c:41:a6:56:dc A2=00:16:b6:60:9e:e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 57 ee f4 89 00 00 00 01 ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 98 29 4c da 59 ba 86 69 0f aa 97 5c a7 b1 94 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RX EAPOL from 00:16:b6:60:9e:e8
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 57 ee f4 89 00 00 00 01
      key_nonce - hexdump(len=32): c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:16:b6:60:9e:e8 (ver=1)
    WPA: PTK derivation - A1=00:0c:41:a6:56:dc A2=00:16:b6:60:9e:e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 57 ee f4 89 00 00 00 01 ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 98 29 4c da 59 ba 86 69 0f aa 97 5c a7 b1 94 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RX EAPOL from 00:16:b6:60:9e:e8
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 57 ee f4 89 00 00 00 01
      key_nonce - hexdump(len=32): c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:16:b6:60:9e:e8 (ver=1)
    WPA: PTK derivation - A1=00:0c:41:a6:56:dc A2=00:16:b6:60:9e:e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 57 ee f4 89 00 00 00 01 ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 98 29 4c da 59 ba 86 69 0f aa 97 5c a7 b1 94 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RX EAPOL from 00:16:b6:60:9e:e8
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 57 ee f4 89 00 00 00 01
      key_nonce - hexdump(len=32): c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:16:b6:60:9e:e8 (ver=1)
    WPA: PTK derivation - A1=00:0c:41:a6:56:dc A2=00:16:b6:60:9e:e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 57 ee f4 89 00 00 00 01 ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 98 29 4c da 59 ba 86 69 0f aa 97 5c a7 b1 94 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RX EAPOL from 00:16:b6:60:9e:e8
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 57 ee f4 89 00 00 00 01
      key_nonce - hexdump(len=32): c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 57 ee f4 89 00 00 00 01 c5 c4 21 d7 b6 69 3c cd 39 09 9d a8 12 44 d1 c0 2c f3 bc 49 93 c2 59 dd 2c db 26 57 f7 4c 32 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:16:b6:60:9e:e8 (ver=1)
    WPA: PTK derivation - A1=00:0c:41:a6:56:dc A2=00:16:b6:60:9e:e8
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 57 ee f4 89 00 00 00 01 ae 4e bc 51 58 47 7d 7d 05 70 1e 7f ff 58 60 3e 08 f0 0a d2 a5 20 ef 41 5e 4b ef 58 9c 58 d0 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 98 29 4c da 59 ba 86 69 0f aa 97 5c a7 b1 94 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    WPA: 4-Way Handshake failed - pre-shared key may be incorrect
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:16:b6:60:9e:e8 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: 4WAY_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    Code:
    ctrl_interface=/var/run/wpa_supplicant
    #ap_scan=2
    
    network={
    	ssid="davesnetwork"
    	scan_ssid=1
    	proto=WPA
    	key_mgmt=WPA-PSK
    	pairwise=TKIP
    	group=TKIP
    	#psk="mypresharedkey"
    	psk=6bec7c28fd56128f96b54acb0241d5eb850aea35a0751b5b1538b51587bdaf14
    }

  6. #136
    Join Date
    Feb 2007
    Beans
    50
    Distro
    Kubuntu 10.04 Lucid Lynx

    Re: HowTo: WPA with wpa_supplicant

    I'm having a problem with what once was a working wpa_supplicant.conf file.

    the out put of
    Code:
    sudo sudo wpa_supplicant -D wext -i eth1 -c /ect/wpa_supplicant/wpa_supplicant.conf -dd
    gives me
    Code:
    Initializing interface 'eth1' conf '/ect/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/ect/wpa_supplicant/wpa_supplicant.conf' -> '/ect/wpa_supplicant/wpa_supplicant.conf'
    Reading configuration file '/ect/wpa_supplicant/wpa_supplicant.conf'
    Failed to read or parse configuration '/ect/wpa_supplicant/wpa_supplicant.conf'.
    Failed to add interface eth1
    Cancelling scan request
    Cancelling authentication timeout
    I belive that my problem lies some where in the ctrl interface 'N/A' bridge 'N/A'

    Did I break something? and where?


    here's my snip of my wpa_supplicant.conf file
    Code:
    #PEAP with MSCHAPv2
    #for use with RADIUS servers that use old peaplabel
    #(e.g., Funk Odyssey and SBR, Meetinghouse Aegis, Interlink RAD-Series)
    
    
    ctrl_interface=/var/run/wpa_supplicant
    #eapol_version=1
    #ap_scan=1
    #fast_reauth=1
    
    network={
        ssid="UCM-WiFi-Secured"
        key_mgmt=IEEE8021X
        eap=PEAP
        identity="*******"
        password="*******"
        ca_cert="path to.cer"
        phase2="auth=MSCHAPV2"
    }
    Thanks in advance.

  7. #137
    Join Date
    Nov 2007
    Beans
    14

    Re: HowTo: WPA with wpa_supplicant

    All I'm getting is

    CTRL-EVENT-SCAN-RESULTS
    CTRL-EVENT-SCAN-RESULTS
    CTRL-EVENT-SCAN-RESULTS

    using backtrack 4 with an RTL8187 series card....

    did a networking restart... card is in managed mode.... don't know what to do....

  8. #138
    Join Date
    Nov 2007
    Beans
    14

    Re: HowTo: WPA with wpa_supplicant

    hooooolyyyy crap that took a long time..... that whole -dd thing is really helpful at least..... airport extreme's are so useless....

  9. #139
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: HowTo: WPA with wpa_supplicant

    Your syntax is wrong:

    sudo sudo wpa_supplicant -D wext -i eth1 -c /ect/wpa_supplicant/wpa_supplicant.conf -dd

    Its /etc/wpa_supplicant......

    Note the spelling problem.

  10. #140
    Join Date
    Apr 2007
    Beans
    35

    Re: HowTo: WPA with wpa_supplicant

    Since upgrading to Ubuntu 8.10 I have had successive problems with WiFi. Having upgraded to 9.10 I can run wpa_supplicant and dhclient manually and get connectivity. Trying to do this automatically (as per the original post) prints the wpa_supplicant help message.

    Also, when I get a connection, dns doesn't seem to work, or at least not via firefox.

    Sure I must be missing something obvious.

    I have an Atheros AR5001X+ D-Link card.

Page 14 of 16 FirstFirst ... 41213141516 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •