Page 60 of 99 FirstFirst ... 1050585960616270 ... LastLast
Results 591 to 600 of 981

Thread: How To: Manual Network Configuration without the need for Network Manager

  1. #591
    Join Date
    Jan 2008
    Beans
    72

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    Thanks -- just post
    iwlist scan
    Code:
    dan@dan-hp:~$ iwlist scan
    lo        Interface doesn't support scanning.
    
    eth0      Interface doesn't support scanning.
    
    wlan0     No scan results
    With sudo though I get this:
    Code:
    [sudo] password for dan: 
    lo        Interface doesn't support scanning.
    
    eth0      Interface doesn't support scanning.
    
    wlan0     Scan completed :
              Cell 01 - Address: 00:17:3F:6A:DD:99
                        ESSID:"houseoflove"
                        Protocol:IEEE 802.11g
                        Mode:Managed
                        Frequency:2.462 GHz (Channel 11)
                        Quality:39/100  Signal level:-71 dBm  Noise level:-96 dBm
                        Encryption key:on
                        Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
                                  12 Mb/s; 24 Mb/s; 36 Mb/s; 9 Mb/s; 18 Mb/s
                                  48 Mb/s; 54 Mb/s
                        Extra:bcn_int=100
                        Extra:atim=0
                        IE: IEEE 802.11i/WPA2 Version 1
                            Group Cipher : TKIP
                            Pairwise Ciphers (1) : CCMP
                            Authentication Suites (1) : PSK
                           Preauthentication Supported
                        IE: WPA Version 1
                            Group Cipher : TKIP
                            Pairwise Ciphers (2) : TKIP CCMP
                            Authentication Suites (1) : PSK
              Cell 02 - Address: 02:E0:62:4D:5F:38
                        ESSID:"ANY"
                        Protocol:IEEE 802.11g
                        Mode:Ad-Hoc
                        Frequency:2.412 GHz (Channel 1)
                        Quality:28/100  Signal level:-78 dBm  Noise level:-96 dBm
                        Encryption key:off
                        Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
                                  9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                                  48 Mb/s; 54 Mb/s
                        Extra:bcn_int=100
                        Extra:atim=0
                        IE: IEEE 802.11i/WPA2 Version 1
                            Group Cipher : CCMP
                            Pairwise Ciphers (1) : none
                            Authentication Suites (1) : 802.1x
              Cell 03 - Address: 00:1B:63:2D:20:A9
                        ESSID:"girlfess"
                        Protocol:IEEE 802.11g
                        Mode:Managed
                        Frequency:2.412 GHz (Channel 1)
                        Quality:89/100  Signal level:-39 dBm  Noise level:-96 dBm
                        Encryption key:on
                        Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
                                  11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                                  48 Mb/s; 54 Mb/s
                        Extra:bcn_int=100
                        Extra:atim=0
                        IE: IEEE 802.11i/WPA2 Version 1
                            Group Cipher : TKIP
                            Pairwise Ciphers (2) : CCMP TKIP
                            Authentication Suites (1) : PSK
                        IE: WPA Version 1
                            Group Cipher : TKIP
                            Pairwise Ciphers (1) : TKIP
                            Authentication Suites (1) : PSK
              Cell 04 - Address: 00:1C:10:14:AB:84
                        ESSID:"Citgo-3"
                        Protocol:IEEE 802.11g
                        Mode:Managed
                        Frequency:2.437 GHz (Channel 6)
                        Quality:15/100  Signal level:-86 dBm  Noise level:-96 dBm
                        Encryption key:on
                        Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 18 Mb/s
                                  24 Mb/s; 36 Mb/s; 54 Mb/s; 6 Mb/s; 9 Mb/s
                                  12 Mb/s; 48 Mb/s
                        Extra:bcn_int=100
                        Extra:atim=0
                        IE: WPA Version 1
                            Group Cipher : TKIP
                            Pairwise Ciphers (1) : TKIP
                            Authentication Suites (1) : PSK

  2. #592
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,552
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How To: Manual Network Configuration without the need for Network Manager

    Does you wireless card connect if for example wpa is turned off and no wireless encryption is used?

  3. #593
    Join Date
    Jan 2008
    Beans
    72

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    Does you wireless card connect if for example wpa is turned off and no wireless encryption is used?
    I'm working on getting admin access to the Base Station right now. I probably won't know until tomorrow though.
    Last edited by SlingerXL; June 26th, 2008 at 10:16 PM.

  4. #594
    Join Date
    Jul 2007
    Beans
    21

    Re: How To: Manual Network Configuration without the need for Network Manager

    howdy, hoping someone can help here, I'm trying to connect to a hidden ssid and don't really know what I'm doing.

    It support (who don't support linux clients) have kindly given me this information:
    Network name: csiro-internal
    Network Authentication: WPA-Enterprise EAP method PEAP
    Inner EAP method: MS-CHAP v2

    my wpa_supplicant.conf is like this:

    Code:
    ctrl_interface=/var/run/wpa_supplicant
            eapol_version=1
            ap_scan=1
            fast_reauth=1
    	network={
    		ssid="csiro-internal"
    		scan_ssid=1
    		key_mgmt=WPA-EAP
    		proto=RSN
    		eap=PEAP
    		phase2="auth=MSCHAPV2"
    		identity="cha623" 
    		password="" # removed
    		}
    running wpa_supplicant -i wlan0 -D wext -c /etc/wpa_supplicant.conf -dd gives:

    Code:
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    eapol_version=1
    ap_scan=1
    fast_reauth=1
    Line: 8 - start of a new network block
    ssid - hexdump_ascii(len=14):
         63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c         csiro-internal  
    scan_ssid=1 (0x1)
    key_mgmt: 0x1
    proto: 0x2
    eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
    phase2 - hexdump_ascii(len=13):
         61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2   
    identity - hexdump_ascii(len=6):
         63 68 61 36 32 33                                 cha623          
    password - hexdump_ascii(len=9): [REMOVED]
    Priority group 0
       id=0 ssid='csiro-internal'
    Initializing interface (2) 'wlan0'
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:1f:3b:51:e1:4f
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    Setting scan request: 0 sec 100000 usec
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
    Wireless event: cmd=0x8b06 len=8
    Ignore event for foreign ifindex 3
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=14):
         63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c         csiro-internal  
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 0 bytes of scan results (0 BSSes)
    Scan results: 0
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    Try to find non-WPA AP
    No suitable AP found.
    Setting scan request: 0 sec 0 usec
    Starting AP scan (broadcast SSID)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b19 len=8
    Received 1717 bytes of scan results (8 BSSes)
    Scan results: 8
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
    Try to find non-WPA AP
    Trying to associate with 00:1f:c9:66:78:b0 (SSID='csiro-internal' freq=2412 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
    WPA: using GTK CCMP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT 802.1X
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b1a len=22
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c02 len=245
    WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
    Association info event
    req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:1f:c9:66:78:b0
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
    No keys have been configured - skip key clearing
    Associated with 00:1f:c9:66:78:b0
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_PAE entering state RESTART
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
    EAP: EAP entering state IDENTITY
    CTRL-EVENT-EAP-STARTED EAP authentication started
    EAP: EAP-Request Identity data - hexdump_ascii(len=52):
         00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f   _networkid=csiro
         2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d   -internal,nasid=
         72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74   rbh-ccr-ap1,port
         69 64 3d 30                                       id=0            
    EAP: using real identity - hexdump_ascii(len=6):
         63 68 61 36 32 33                                 cha623          
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 63 68 61 36 32 33
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: startWhen --> 0
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b19 len=8
    Received 810 bytes of scan results (4 BSSes)
    Scan results: 4
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
    Try to find non-WPA AP
    Already associated with the selected AP.
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:1f:c9:66:78:b0 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portValid=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    EAPOL: authWhile --> 0
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=14):
         63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c         csiro-internal  
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c02 len=245
    WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
    Association info event
    req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:1f:c9:66:78:b0
    State: SCANNING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
    No keys have been configured - skip key clearing
    Associated with 00:1f:c9:66:78:b0
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_PAE entering state RESTART
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
    EAP: EAP entering state IDENTITY
    CTRL-EVENT-EAP-STARTED EAP authentication started
    EAP: EAP-Request Identity data - hexdump_ascii(len=52):
         00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f   _networkid=csiro
         2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d   -internal,nasid=
         72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74   rbh-ccr-ap1,port
         69 64 3d 30                                       id=0            
    EAP: using real identity - hexdump_ascii(len=6):
         63 68 61 36 32 33                                 cha623          
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 63 68 61 36 32 33
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: startWhen --> 0
    Scan timeout - try to get results
    Received 0 bytes
    with it trying to run the auth over and over and timing out.

    can someone please advise on what I need to do?

  5. #595
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,552
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How To: Manual Network Configuration without the need for Network Manager

    I have no experience with MSCHAPV2 so I'm not going to be much help to you. I haven't found a lot of info in the ubuntu forums about this either. Unfortunately google might be your best friend on this one.

  6. #596
    Join Date
    Jul 2007
    Beans
    21

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    I have no experience with MSCHAPV2 so I'm not going to be much help to you. I haven't found a lot of info in the ubuntu forums about this either. Unfortunately google might be your best friend on this one.
    well I sort of got it working maybe, but not sure how.

    firstly I left the above config listed 2 posts up running while I went to lunch. When I came back it seemed to have connected so I ran sudo dhclient wlan0 and it worked and all was good.

    Then I killed it and attempted to re-run wpa_supplicant and had the same problem. So I fiddled with some settings and it worked again. Who knows what will happen if I try to reconnect, heh.

    anyway current settings (changes: disabled EAP, fast_reauth, added full domain to my username (but was explicitly told this was not necessary)

    Code:
    ctrl_interface=/var/run/wpa_supplicant
    
            eapol_version=1
            ap_scan=1
            fast_reauth=0
    
    
            network={
                    ssid="csiro-internal"
                    scan_ssid=1
                    key_mgmt=WPA-EAP
                    proto=RSN
                    #eap=PEAP
                    phase1="peaplabel=1"
                    phase2="auth=MSCHAPV2"
                    identity=""
                    password=""
                    }
    wpa_supplicant connection log:
    Code:
    zmc@zts:~$ sudo ifconfig wlan0 down; sudo wpa_supplicant -i wlan0 -c /etc/wpa_supplicant.conf -dd
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ctrl_interface='/var/run/wpa_supplicant'
    eapol_version=1
    ap_scan=1
    fast_reauth=0
    Line: 8 - start of a new network block
    ssid - hexdump_ascii(len=14):
         63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c         csiro-internal  
    scan_ssid=1 (0x1)
    key_mgmt: 0x1
    proto: 0x2
    phase1 - hexdump_ascii(len=11):
         70 65 61 70 6c 61 62 65 6c 3d 31                  peaplabel=1     
    phase2 - hexdump_ascii(len=13):
         61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2   
    identity - hexdump_ascii(len=15):
    
    password - hexdump_ascii(len=9): [REMOVED]
    Priority group 0
       id=0 ssid='csiro-internal'
    Initializing interface (2) 'wlan0'
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:1f:3b:51:e1:4f
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    Setting scan request: 0 sec 100000 usec
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
    Wireless event: cmd=0x8b06 len=8
    Ignore event for foreign ifindex 3
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=14):
         63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c         csiro-internal  
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 248 bytes of scan results (1 BSSes)
    Scan results: 1
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:1f:c9:66:78:b0 ssid='csiro-internal' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:1f:c9:66:78:b0 ssid='csiro-internal'
    Try to find non-WPA AP
    Trying to associate with 00:1f:c9:66:78:b0 (SSID='csiro-internal' freq=2412 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
    WPA: using GTK CCMP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT 802.1X
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    Wireless event: cmd=0x8b1a len=22
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8c02 len=245
    WEXT: Custom wireless event: 'ASSOCINFO(ReqIE010802040b160c12182432043048606c30140100000fac040100000fac040100000fac010000dd070050f202000100 RespIEdd180050f2020101820003a5000027a500004254bc0062436600)'
    Association info event
    req_ies - hexdump(len=63): 00 0e 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a5 00 00 27 a5 00 00 42 54 bc 00 62 43 66 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:1f:c9:66:78:b0
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:1f:c9:66:78:b0
    No keys have been configured - skip key clearing
    Associated with 00:1f:c9:66:78:b0
    WPA: Association event - clear replay counter
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=61): 01 00 00 39 01 01 00 39 01 00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f 2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d 72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74 69 64 3d 30
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_PAE entering state RESTART
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
    EAP: EAP entering state IDENTITY
    CTRL-EVENT-EAP-STARTED EAP authentication started
    EAP: EAP-Request Identity data - hexdump_ascii(len=52):
         00 6e 65 74 77 6f 72 6b 69 64 3d 63 73 69 72 6f   _networkid=csiro
         2d 69 6e 74 65 72 6e 61 6c 2c 6e 61 73 69 64 3d   -internal,nasid=
         72 62 68 2d 63 63 72 2d 61 70 31 2c 70 6f 72 74   rbh-ccr-ap1,port
         69 64 3d 30                                       id=0            
    EAP: using real identity - hexdump_ascii(len=15):
         63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75      cha623@csiro.au 
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL - hexdump(len=24): 01 00 00 14 02 01 00 14 01 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=46): 01 00 00 1f 01 8a 00 1f 11 01 00 08 c8 19 1e 9a f6 6a 6a 66 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75 00 00 00 00 00 00 00 00 00 00 00
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=138 method=17 vendor=0 vendorMethod=0
    EAP: EAP entering state GET_METHOD
    EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
    CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
    EAP: EAP entering state METHOD
    EAP-LEAP: Processing EAP-Request
    EAP-LEAP: Challenge from AP - hexdump(len=8): c8 19 1e 9a f6 6a 6a 66
    EAP-LEAP: Generating Challenge Response
    EAP-LEAP: Response - hexdump(len=24): 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL - hexdump(len=51): 01 00 00 2f 02 8a 00 2f 11 01 00 18 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=46): 01 00 00 04 03 8a 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Success
    EAP: EAP entering state METHOD
    EAP-LEAP: Processing EAP-Success
    EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 06 e1 1c 04 93 a9 06 f7
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL - hexdump(len=35): 01 00 00 1f 01 8a 00 1f 11 01 00 08 06 e1 1c 04 93 a9 06 f7 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=51): 01 00 00 2f 02 8a 00 2f 11 01 00 18 f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06 63 68 61 36 32 33 40 63 73 69 72 6f 2e 61 75
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Response for LEAP method=17 id=138
    EAP: EAP entering state METHOD
    EAP-LEAP: Processing EAP-Response
    EAP-LEAP: Response from AP - hexdump(len=24): f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06
    EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
    EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED]
    EAP-LEAP: peer_challenge - hexdump(len=8): c8 19 1e 9a f6 6a 6a 66
    EAP-LEAP: peer_response - hexdump(len=24): 16 27 91 20 dc 1f 7e fb 1a 9d 85 18 63 78 b3 13 67 9b ac 64 aa 9e b7 48
    EAP-LEAP: ap_challenge - hexdump(len=8): 06 e1 1c 04 93 a9 06 f7
    EAP-LEAP: ap_response - hexdump(len=24): f7 6b 9d 95 bd 94 b2 86 94 50 72 cf a2 90 ce 9a 28 04 d2 4c 0a 73 8e 06
    EAP-LEAP: master key - hexdump(len=16): [REMOVED]
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAP: EAP entering state SUCCESS
    CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: SUPP_BE entering state SUCCESS
    EAPOL: SUPP_BE entering state IDLE
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
    EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
    IEEE 802.1X RX: version=2 type=3 length=117
      EAPOL-Key type=2
      key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=16 key_data_length=22
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
      key_nonce - hexdump(len=32): db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:1f:c9:66:78:b0 (ver=2)
    RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
    RSN: PMKID from Authenticator - hexdump(len=16): b6 0d 39 bd 9c 39 eb 9d 30 50 87 1e 8c af 96 51
    RSN: no matching PMKID found
    WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED]
    RSN: added PMKSA cache entry for 00:1f:c9:66:78:b0
    RSN: the new PMK matches with the PMKID
    WPA: Renewed SNonce - hexdump(len=32): 0e b3 cb cf 39 b6 2d d9 18 b2 1e 2d f9 94 29 c1 09 7d 1c a2 77 65 7a c6 c5 3f 15 63 b1 1f 0e c1
    WPA: PMK - hexdump(len=16): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 0e b3 cb cf 39 b6 2d d9 18 b2 1e 2d f9 94 29 c1 09 7d 1c a2 77 65 7a c6 c5 3f 15 63 b1 1f 0e c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 f0 78 10 29 10 96 00 27 c2 e3 ed e5 24 6f 7f 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RX EAPOL from 00:1f:c9:66:78:b0
    RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53 00 38 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
    EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
    IEEE 802.1X RX: version=2 type=3 length=151
      EAPOL-Key type=2
      key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
      key_length=16 key_data_length=56
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
      key_nonce - hexdump(len=32): db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 63 8e 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53
    WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 db 38 6f 30 b9 4e 69 02 a5 a5 01 24 00 ef 68 11 5e 4d 6f d2 f0 f4 75 35 f8 71 32 1a 5f d7 f2 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 81 91 c6 76 c8 12 eb 08 78 b5 ca 10 8b 16 53 00 38 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
    RSN: encrypted key data - hexdump(len=56): 72 a9 4b 20 ef 0d 6f 0a 39 e5 e3 9a 85 14 74 56 bc 78 2e 3a 00 43 d8 e3 82 e9 f3 06 6b a0 a6 da a0 9a ce bd b6 ec fe 91 50 47 bb 15 b4 e3 71 b5 5f 97 d8 d5 7e b4 74 74
    WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:1f:c9:66:78:b0 (ver=2)
    WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 16 00 0f ac 01 01 00 38 1f 8e 9b 46 3e 7c 95 51 96 b5 69 9c 01 8d ea dd 00
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 d5 28 8f 9d c4 34 5e 43 46 63 5d a2 cc 04 15 00 00
    WPA: Installing PTK to the driver.
    wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
    EAPOL: External notification - portValid=1
    EAPOL: SUPP_PAE entering state AUTHENTICATED
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
    WPA: Group Key - hexdump(len=16): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=1 tx=0).
    WPA: RSC - hexdump(len=6): 63 8e 00 00 00 00
    wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
    WPA: Key negotiation completed with 00:1f:c9:66:78:b0 [PTK=CCMP GTK=CCMP]
    Cancelling authentication timeout
    State: GROUP_HANDSHAKE -> COMPLETED
    CTRL-EVENT-CONNECTED - Connection to 00:1f:c9:66:78:b0 completed (auth) [id=0 id_str=]
    wpa_driver_wext_set_operstate: operstate 0->1 (UP)
    WEXT: Operstate: linkmode=-1, operstate=6
    EAPOL: External notification - portValid=1
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    EAPOL: startWhen --> 0
    EAPOL: authWhile --> 0
    EAPOL: idleWhile --> 0

  7. #597
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,552
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How To: Manual Network Configuration without the need for Network Manager

    adante

    Inform me if this is successful with repeated attempts and I will add it to the front page of the guide with credit to you.

  8. #598
    Join Date
    May 2008
    Location
    Us, California
    Beans
    90
    Distro
    Ubuntu Studio 10.10 Maverick Meerkat

    Re: How To: Manual Network Configuration without the need for Network Manager

    I found a mistake. in a few places it says mode Managed with a capital "M" in managed, but it should be lower case. Thanks for the guide, it helped me on 2 computers.

  9. #599
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,552
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How To: Manual Network Configuration without the need for Network Manager

    No it should be Managed with a capitol M:
    http://linux.die.net/man/8/iwconfig

  10. #600
    Join Date
    Jul 2007
    Beans
    21

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    adante

    Inform me if this is successful with repeated attempts and I will add it to the front page of the guide with credit to you.
    sadly, no

    well, in the literal sense, it IS successful with repeated attempts - if I run the command and just let it sit there for some time it does eventually work. Sometimes it connects immediately and other times it will take a lunch break.

    odd. I will keep you informed if I ever manage to solve this reliably.

Page 60 of 99 FirstFirst ... 1050585960616270 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •