Page 50 of 98 FirstFirst ... 40484950515260 ... LastLast
Results 491 to 500 of 978

Thread: How To: Manual Network Configuration without the need for Network Manager

  1. #491
    Join Date
    Apr 2007
    Beans
    15

    Re: How To: Manual Network Configuration without the need for Network Manager

    This is making me going nuts.
    Ok, I reintalled the driver. I keep the ndiswrapper 1.52 (no reinstall). I turned of the security in my router and I tried the Wicd application. And it worked. So I turned on again the security and I am not able to connect. Neither step by step (command line) neither with Wicd.

    Wicd worked fine in Feisty. So there must be something in Hardy. I do not want to go back to Feisty because Hardy performs better, but networking is really important.

    So any idea??? Any body need some debug info?

  2. #492
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Rather than complaining it doesn't work, why don't you post some useful output from the command line that would help anyone like myself help you.

  3. #493
    Join Date
    Apr 2007
    Beans
    15

    Re: How To: Manual Network Configuration without the need for Network Manager

    Sorry for may last post, but I was desperate after a few hours trying to make the wireless work with no result.

    wpa_supplicant.conf looks like
    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant
    network={
    ssid="NETGEAR"
    scan_ssid=0
    proto=WPA2 WPA RSN
    key_mgmt=WPA-PSK
    psk="the passwd in plain text"
    #psk=e1f217aac9c73de737ad791bfa6a462e518a5a5a1ca5c 7e33dd7086f1aad5287
    pairwise=TKIP CCMP
    group=TKIP CCMP
    }
    I have tried also with scan_ssid=1 and also the psk in HEX instead of plain text.

    sudo lshw -C network

    *-network
    description: Wireless interface
    physical id: 1
    logical name: wlan0
    serial: 00:18:4d:2b:ee:a0
    capabilities: ethernet physical wireless
    configuration: broadcast=yes driver=ndiswrapper+netwpn11 driverversion=1.52+NETGEAR,09/26/2005,1.5.0.21 link=yes multicast=yes wireless=IEEE 802.11g
    But I get stuck in the following step. I have changed in my router the security level:
    No security - connects ok
    WPA
    WPA2 can't connect

    sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
    Associated with 00:18:4d:01:bc:5e
    Associated with 00:18:4d:01:bc:5e
    Associated with 00:18:4d:01:bc:5e
    Authentication with 00:18:4d:01:bc:5e timed out.
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
    Associated with 00:18:4d:01:bc:5e
    WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
    WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
    WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
    WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
    Associated with 00:18:4d:01:bc:5e
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    Associated with 00:18:4d:01:bc:5e
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    CTRL-EVENT-TERMINATING - signal 2 received
    So from the logs it seems there is a problem during the negotiation
    Associated with 00:18:4d:01:bc:5e
    WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)


    What this log means??? Because I think that's the key of the problem. So I do not know if it is a problem with the ndiswrapper 1.52, or with the Hardy version of wpa_supplicant. But as I said before in other, I had the wireless working with Feisty.

    Thanks for your help!!!!

  4. #494
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    What are your WPA2 settings on your router? Usually it is AES for ciphertype and if using a home router PSK rather than EAP.

    Ive seen others use a wpa_supplicant.conf file in this format for WPA2 before:

    ctrl_interface=/var/run/wpa_supplicant

    network={
    ssid="ESSID_IN_QUOTES"
    psk="ASCII PSK Password in Quotes" or in HEX_WITHOUT_QUOTES
    key_mgmt=WPA-PSK
    proto=RSN
    pairwise=CCMP
    }

  5. #495
    Join Date
    Apr 2007
    Beans
    15

    Re: How To: Manual Network Configuration without the need for Network Manager

    Good news
    wpa_supplicant.conf is working for NETGEAR WPN111 and a NETGEAR DG834PN router.
    WPA2 works in the router as
    WPA2-PSK - Wi-Fi Protected Access version 2 with Pre-Shared Key, use WPA2-PSK standard encryption with either TKIP or AES encryption type. WPA2 is the most secure security option available. Use WPA2 if your equipment supports it.

    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant

    network={
    ssid="NETGEAR"
    psk=e1f217aac9c73de737ad791bfa6a462e518a5a5a1ca5c7 e33dd7086f1aad5287
    key_mgmt=WPA-PSK
    proto=WPA2
    pairwise=CCMP
    group=TKIP
    }

    sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
    Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
    Associated with 00:18:4d:01:bc:5e
    WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
    CTRL-EVENT-CONNECTED - Connection to 00:18:4d:01:bc:5e completed (auth) [id=0 id_str=]
    WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
    WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
    WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
    Associated with 00:18:4d:01:bc:5e
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    But the the sudo dhclient wlan0 is not working. We are getting close!!!
    sudo dhclient wlan0
    There is already a pid file /var/run/dhclient.pid with pid 134519072
    Internet Systems Consortium DHCP Client V3.0.6
    Copyright 2004-2007 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/

    Listening on LPF/wlan0/00:18:4d:2b:ee:a0
    Sending on LPF/wlan0/00:18:4d:2b:ee:a0
    Sending on Socket/fallback
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 8
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 15
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 1
    No DHCPOFFERS received.
    No working leases in persistent database - sleeping.

  6. #496
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,958
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Not sure if this is working or not

    Open two command windows and type everything including:

    sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd

    May need to open another window and then type

    sudo dhclient wlan0

    The -dd flag gives extra verbose output to see if the wpa_supplicant process actually is working.

  7. #497
    Join Date
    Oct 2006
    Beans
    39
    Distro
    Ubuntu 8.04 Hardy Heron

    Re: How To: Manual Network Configuration without the need for Network Manager

    Hi, I have struggled with the wireless connection since I have had Ubuntu 6.06. Now I have 8.04 and the same type of problems. I spent hours fiddling with ndiswrapper,modprobe,etc. I have a Belkin 54G usb wireless adapter. I think it is an rt2500 driver.

    I had to reinstall Ubuntu yesterday. When I got to reinstalling the wireless, I tried installing through the System>Administration>Network. But that didn't work. I bypassed that when I had 6.04. I settled on a script that is very similar to kevdog's routine in his how to. It is after the section on Setting the Wireless Interface to Connect at Boot * It is very similar to that routine. Yesterday, I tried putting it in /etc/rc.local, but no cigar! I use WEP and do not broadcast my essid. I didn't do anything with ndiswrapper. It is not even installed.

    Code:
    On the command line enter $sudo gedit wireless
    
    Enter the following:
    #!/bin/bash
    ifconfig <wired network connection interface> down
    ifconfig eth0 down
    dhclient -r eth0
    iwconfig eth0 essid "myroutername"   ## in quotes
    ##iwconfig <wireless_interface> mode Managed  ##not used
    iwconfig eth0 encryption on
    iwconfig eth0 key 1x2y3z4a5b ASCII
    ifconfig eth0 up
    dhclient eth0
    Save the file
    On the file right click. Go to permissions and allow it to be executed.

    Double click? on it to execute it. You may have to give your password.

    Works for me. I cannot get wireless started on boot. Many hours spent trying to get that done. It is inelegant, but it works.
    Last edited by jerrallan; May 20th, 2008 at 02:14 PM. Reason: missed line

  8. #498
    Join Date
    Apr 2007
    Beans
    15

    Re: How To: Manual Network Configuration without the need for Network Manager

    Ok I did it in 2 separate windows... and nothing The debug info of the wpa_supplicant process is the following

    I put a bit, I did not redirected the ouput to a file

    Code:
    State: GROUP_HANDSHAKE -> COMPLETED
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAP: EAP entering state DISABLED
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    EAPOL: startWhen --> 0
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97 00 50 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97 00 50 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
    RSN: encrypted key data - hexdump(len=80): 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
    WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
    State: COMPLETED -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
    WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 80 23 f3 df bd a2 18 74 2c ab fd 3c 3b f9 25 7a cf 14 d2 2a 58 47 e6 91 f2 ec ea eb 8f 75 d7 f2 dd 00 00 00 00 00
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 7b c6 ee c5 26 01 bf e9 56 2b 3d 4c af 18 01 00 00
    WPA: Installing PTK to the driver.
    wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
    EAPOL: External notification - portValid=1
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
    WPA: Group Key - hexdump(len=32): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=2 tx=0).
    WPA: RSC - hexdump(len=6): 02 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
    WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
    Cancelling authentication timeout
    State: GROUP_HANDSHAKE -> COMPLETED
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAP: EAP entering state DISABLED
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c07 len=66
    AssocReq IE wireless event - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c08 len=35
    AssocResp IE wireless event - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:18:4d:01:bc:5e
    Association info event
    req_ies - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
    resp_ies - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    State: COMPLETED -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated with 00:18:4d:01:bc:5e
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=2
      key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=16 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
    RSN: msg 1/4 key data - hexdump(len=0):
    WPA: Renewed SNonce - hexdump(len=32): 6b 94 37 44 e6 b3 70 4d 56 57 22 6b 17 17 fa f3 68 22 79 86 af 4d aa f8 f5 d3 63 d6 1b a3 29 4c
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6b 94 37 44 e6 b3 70 4d 56 57 22 6b 17 17 fa f3 68 22 79 86 af 4d aa f8 f5 d3 63 d6 1b a3 29 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 63 06 c2 ce 13 2a 17 14 a6 a1 b9 5e e4 02 b8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    EAPOL: startWhen --> 0
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    Authentication with 00:18:4d:01:bc:5e timed out.
    Added BSSID 00:18:4d:01:bc:5e into blacklist
    wpa_driver_wext_disassociate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: 4WAY_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    Setting scan request: 0 sec 0 usec
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Added BSSID 00:00:00:00:00:00 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: SCANNING -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Scan timeout - try to get results
    Received 258 bytes of scan results (1 BSSes)
    Scan results: 1
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:18:4d:01:bc:5e ssid='NETGEAR' wpa_ie_len=0 rsn_ie_len=26 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:18:4d:01:bc:5e ssid='NETGEAR'
    Try to find non-WPA AP
    Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
    WPA: using GTK TKIP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: DISCONNECTED -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b1a len=15
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c07 len=66
    AssocReq IE wireless event - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c08 len=35
    AssocResp IE wireless event - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:18:4d:01:bc:5e
    Association info event
    req_ies - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
    resp_ies - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:18:4d:01:bc:5e
    No keys have been configured - skip key clearing
    Associated with 00:18:4d:01:bc:5e
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=2
      key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=16 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
    RSN: msg 1/4 key data - hexdump(len=0):
    WPA: Renewed SNonce - hexdump(len=32): 0a ed 10 c9 82 ed 7c 78 fc 8d b9 22 f3 bc a4 7c 14 ae a3 99 92 40 3f 37 5e 60 d0 a8 f7 ad 22 2d
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 0a ed 10 c9 82 ed 7c 78 fc 8d b9 22 f3 bc a4 7c 14 ae a3 99 92 40 3f 37 5e 60 d0 a8 f7 ad 22 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 2b 52 d8 28 ee 63 61 f9 cd 9d 1b 0d 66 4a e9 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    EAPOL: startWhen --> 0
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RX EAPOL from 00:18:4d:01:bc:5e
    RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    IEEE 802.1X RX: version=1 type=3 length=175
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=80
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
      key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a
    WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
    WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
    WPA: Invalid EAPOL-Key MIC - dropping packet
    RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    Wireless event: cmd=0x8c09 len=32
    PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
    RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
    RSN: Ignored PMKID candidate without preauth flag
    CTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: 4WAY_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    No keys have been configured - skip key clearing
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:18:4d:01:bc:5e from blacklist (clear)
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6

  9. #499
    Join Date
    May 2008
    Beans
    5

    Re: How To: Manual Network Configuration without the need for Network Manager

    Hi folks. Thanks for the walkthrough, but I'm having a small problem.

    I'm using a Buffalo Airstation WHR-HP-G with a Panasonic CF-W5. I followed the instructions for the WPA-PSK setup, but I get stuck on the final setup. I reinstalled the iwl3945 driver that I am apparently using, but now the wireless card is "unclaimed".

    I should note that I have this installed inside Windows - because I wanted to check to see if the wireless would work before doing a full install - but I'm not sure if that is affecting it.

    This is the original output:

    *-network
    description: Wireless interface
    product: PRO/Wireless 3945ABG Network Connection
    vendor: Intel Corporation
    physical id: 0
    bus info: pci@0000:03:00.0
    logical name: wmaster0
    version: 02
    serial: 00:18:de:aa:bd:6c
    width: 32 bits
    clock: 33MHz
    capabilities: bus_master cap_list logical ethernet physical wireless
    configuration: broadcast=yes driver=iwl3945 latency=0 module=iwl3945 multicast=yes wireless=IEEE 802.11g

    Apparently the driver wasn't found.

    sudo wpa_supplicant -w -Diwl3945 -iwmaster0 -c/etc/wpa_supplicant.conf
    Unsupported driver 'iwl3945'.
    So I tried reinstalling the driver, then running through the process and ignoring the output, and now...I have nothing.


    *-network UNCLAIMED
    description: Network controller
    product: PRO/Wireless 3945ABG Network Connection
    vendor: Intel Corporation
    physical id: 0
    bus info: pci@0000:03:00.0
    version: 02
    width: 32 bits
    clock: 33MHz
    capabilities: cap_list
    configuration: latency=0
    Any help that anyone could give me would be appreciated, even just a pointing in a general direction.

    p.s. I did fill in the other necessary stuff first (SSID,etc.), I just didn't include the details in the post.

    p.p.s. The wireless card is now recognized again after a restart, but I still can't start the wireless service for some reason.
    Last edited by bakarocket; May 21st, 2008 at 01:55 PM. Reason: clarification

  10. #500
    Join Date
    Apr 2008
    Beans
    3

    Re: How To: Manual Network Configuration without the need for Network Manager

    I'm completely and utterly frustrated with my wireless connection... I've tried several different network adapters and several different machines, but the result is about the same... my connection is great for a few seconds and then seems to stop working. Everything indicates that the connection is still up and running, but not even a ping to the router gets through.

    To simplify things, I'll just talk about the one network adapter and machine...

    I'm using Ubuntu 8.04 with a Broadcomm "BCM94311MCG wlan mini-PCI" adapter using the "ndiswrapper+bcmwl5" driver.

    When I run the wpa_supplicant, it seems to indicate that it's connected properly, but it never returns to the terminal to allow typing the rest of the commands (it's supposed to, right??). It ends with "EAPOL: startWhen --> 0". I then type the rest of the commands in another window (while wpa_supplicant is still running) and everything seems to work correctly. However, after about 5 seconds no traffic gets through.

    After running the dhclient, I tried pinging the router until it stopped working... It started out with pings around 30-200ms, then jumped to 2000-10,000 ms pings, then dropped to 1-3ms pings. Then, it paused for a long while and started reporting "ping: sendmsg: No buffer space available". I stopped it and then restarted it and started getting:

    Code:
    PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.
    From 192.168.0.3 icmp_seq=3 Destination Host Unreachable
    From 192.168.0.3 icmp_seq=6 Destination Host Unreachable
    From 192.168.0.3 icmp_seq=7 Destination Host Unreachable
    From 192.168.0.3 icmp_seq=9 Destination Host Unreachable
    From 192.168.0.3 icmp_seq=10 Destination Host Unreachable
    From 192.168.0.3 icmp_seq=13 Destination Host Unreachable
    I've used this network adapter with this router before in Ubuntu 8.04 and had no trouble. The only change is that I moved it from one city to another. I'd chalk it up to radio interference, but it all works fine in Vista, XP, and Win2000.

Page 50 of 98 FirstFirst ... 40484950515260 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •