Re: How To: Manual Network Configuration without the need for Network Manager
This is making me going nuts.
Ok, I reintalled the driver. I keep the ndiswrapper 1.52 (no reinstall). I turned of the security in my router and I tried the Wicd application. And it worked. So I turned on again the security and I am not able to connect. Neither step by step (command line) neither with Wicd.
Wicd worked fine in Feisty. So there must be something in Hardy. I do not want to go back to Feisty because Hardy performs better, but networking is really important.
So any idea??? Any body need some debug info?
Re: How To: Manual Network Configuration without the need for Network Manager
Rather than complaining it doesn't work, why don't you post some useful output from the command line that would help anyone like myself help you.
Re: How To: Manual Network Configuration without the need for Network Manager
Sorry for may last post, but I was desperate after a few hours trying to make the wireless work with no result. :(
wpa_supplicant.conf looks like
Quote:
ap_scan=1
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="NETGEAR"
scan_ssid=0
proto=WPA2 WPA RSN
key_mgmt=WPA-PSK
psk="the passwd in plain text"
#psk=e1f217aac9c73de737ad791bfa6a462e518a5a5a1ca5c 7e33dd7086f1aad5287
pairwise=TKIP CCMP
group=TKIP CCMP
}
I have tried also with scan_ssid=1 and also the psk in HEX instead of plain text.
sudo lshw -C network
Quote:
*-network
description: Wireless interface
physical id: 1
logical name: wlan0
serial: 00:18:4d:2b:ee:a0
capabilities: ethernet physical wireless
configuration: broadcast=yes driver=ndiswrapper+netwpn11 driverversion=1.52+NETGEAR,09/26/2005,1.5.0.21 link=yes multicast=yes wireless=IEEE 802.11g
But I get stuck in the following step. I have changed in my router the security level:
No security - connects ok
WPA
WPA2 can't connect
sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
Quote:
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
Associated with 00:18:4d:01:bc:5e
Associated with 00:18:4d:01:bc:5e
Associated with 00:18:4d:01:bc:5e
Authentication with 00:18:4d:01:bc:5e timed out.
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
Associated with 00:18:4d:01:bc:5e
WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
Associated with 00:18:4d:01:bc:5e
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
Associated with 00:18:4d:01:bc:5e
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
CTRL-EVENT-TERMINATING - signal 2 received
So from the logs it seems there is a problem during the negotiation
Associated with 00:18:4d:01:bc:5e
WPA: Invalid TKIP key length 16 (src=00:18:4d:01:bc:5e)
:confused:
What this log means??? Because I think that's the key of the problem. So I do not know if it is a problem with the ndiswrapper 1.52, or with the Hardy version of wpa_supplicant. But as I said before in other, I had the wireless working with Feisty.
Thanks for your help!!!!
Re: How To: Manual Network Configuration without the need for Network Manager
What are your WPA2 settings on your router? Usually it is AES for ciphertype and if using a home router PSK rather than EAP.
Ive seen others use a wpa_supplicant.conf file in this format for WPA2 before:
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="ESSID_IN_QUOTES"
psk="ASCII PSK Password in Quotes" or in HEX_WITHOUT_QUOTES
key_mgmt=WPA-PSK
proto=RSN
pairwise=CCMP
}
Re: How To: Manual Network Configuration without the need for Network Manager
Good news
wpa_supplicant.conf is working for NETGEAR WPN111 and a NETGEAR DG834PN router.
WPA2 works in the router as
WPA2-PSK - Wi-Fi Protected Access version 2 with Pre-Shared Key, use WPA2-PSK standard encryption with either TKIP or AES encryption type. WPA2 is the most secure security option available. Use WPA2 if your equipment supports it.
Quote:
ap_scan=1
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="NETGEAR"
psk=e1f217aac9c73de737ad791bfa6a462e518a5a5a1ca5c7 e33dd7086f1aad5287
key_mgmt=WPA-PSK
proto=WPA2
pairwise=CCMP
group=TKIP
}
sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
Quote:
Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
Associated with 00:18:4d:01:bc:5e
WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:18:4d:01:bc:5e completed (auth) [id=0 id_str=]
WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
Associated with 00:18:4d:01:bc:5e
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
But the the sudo dhclient wlan0 is not working. We are getting close!!! :)
sudo dhclient wlan0
There is already a pid file /var/run/dhclient.pid with pid 134519072
Internet Systems Consortium DHCP Client V3.0.6
Copyright 2004-2007 Internet Systems Consortium.
All rights reserved.
For info, please visit http://www.isc.org/sw/dhcp/
Listening on LPF/wlan0/00:18:4d:2b:ee:a0
Sending on LPF/wlan0/00:18:4d:2b:ee:a0
Sending on Socket/fallback
DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7
DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 8
DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 15
DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 1
No DHCPOFFERS received.
No working leases in persistent database - sleeping.
Re: How To: Manual Network Configuration without the need for Network Manager
Not sure if this is working or not
Open two command windows and type everything including:
sudo wpa_supplicant -w -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
May need to open another window and then type
sudo dhclient wlan0
The -dd flag gives extra verbose output to see if the wpa_supplicant process actually is working.
Re: How To: Manual Network Configuration without the need for Network Manager
Hi, I have struggled with the wireless connection since I have had Ubuntu 6.06. Now I have 8.04 and the same type of problems. I spent hours fiddling with ndiswrapper,modprobe,etc. I have a Belkin 54G usb wireless adapter. I think it is an rt2500 driver.
I had to reinstall Ubuntu yesterday. When I got to reinstalling the wireless, I tried installing through the System>Administration>Network. But that didn't work. I bypassed that when I had 6.04. I settled on a script that is very similar to kevdog's routine in his how to. It is after the section on Setting the Wireless Interface to Connect at Boot * It is very similar to that routine. Yesterday, I tried putting it in /etc/rc.local, but no cigar! I use WEP and do not broadcast my essid. I didn't do anything with ndiswrapper. It is not even installed.
Code:
On the command line enter $sudo gedit wireless
Enter the following:
#!/bin/bash
ifconfig <wired network connection interface> down
ifconfig eth0 down
dhclient -r eth0
iwconfig eth0 essid "myroutername" ## in quotes
##iwconfig <wireless_interface> mode Managed ##not used
iwconfig eth0 encryption on
iwconfig eth0 key 1x2y3z4a5b ASCII
ifconfig eth0 up
dhclient eth0
Save the file
On the file right click. Go to permissions and allow it to be executed.
Double click? on it to execute it. You may have to give your password.
Works for me. I cannot get wireless started on boot. Many hours spent trying to get that done. It is inelegant, but it works.
Re: How To: Manual Network Configuration without the need for Network Manager
Ok I did it in 2 separate windows... and nothing :( The debug info of the wpa_supplicant process is the following
I put a bit, I did not redirected the ouput to a file
Quote:
Code:
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAP: EAP entering state DISABLED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
EAPOL: startWhen --> 0
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97 00 50 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d0 62 09 a2 15 9b 11 b9 32 0b 9a 1c d6 47 97 00 50 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
RSN: encrypted key data - hexdump(len=80): 7a 3d c3 58 56 82 16 39 62 bd 08 9c f6 a4 24 06 f7 bc d8 c9 59 2e 3c 22 7d a7 b3 6e ad 6c 5e 37 2e 83 b8 f3 62 52 7a fb de ce e4 26 12 09 72 b1 fe 80 a8 0e 6f ce b8 12 6f fd aa 0d a6 0b 20 52 8a 31 37 4e b8 a2 e7 e2 56 ff b1 ef af 8e e3 ce
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: COMPLETED -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 80 23 f3 df bd a2 18 74 2c ab fd 3c 3b f9 25 7a cf 14 d2 2a 58 47 e6 91 f2 ec ea eb 8f 75 d7 f2 dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 7b c6 ee c5 26 01 bf e9 56 2b 3d 4c af 18 01 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 02 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:18:4d:01:bc:5e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAP: EAP entering state DISABLED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c07 len=66
AssocReq IE wireless event - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c08 len=35
AssocResp IE wireless event - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:4d:01:bc:5e
Association info event
req_ies - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
resp_ies - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
State: COMPLETED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:18:4d:01:bc:5e
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 6b 94 37 44 e6 b3 70 4d 56 57 22 6b 17 17 fa f3 68 22 79 86 af 4d aa f8 f5 d3 63 d6 1b a3 29 4c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6b 94 37 44 e6 b3 70 4d 56 57 22 6b 17 17 fa f3 68 22 79 86 af 4d aa f8 f5 d3 63 d6 1b a3 29 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 63 06 c2 ce 13 2a 17 14 a6 a1 b9 5e e4 02 b8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a cd 74 c5 9e 88 ca 92 19 af c2 a8 a5 5b 47 4c 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 58 fd 2a a0 08 23 7d 51 b5 46 80 a1 ee d3 2e 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 76 40 e8 13 49 52 56 1d f9 21 7e 0f 52 27 d1 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 15 0b 3b 21 2f 78 17 be 5f 4b 47 7c fb 80 b8 00 50 b8 57 ca 0e 99 f3 64 f3 f5 c6 ae f9 e1 25 ca a6 43 67 1f 3b b9 a4 cc 4b 12 c5 e1 83 d5 ed 48 28 79 ac 41 1e 69 59 8d 6f ba 22 d8 1e 89 e8 20 c9 88 bf 15 04 0a 6d 9b 4d c4 60 85 a0 7d 76 47 86 aa 7f e9 86 9e 1c 26 4b ac 8e bb ca 72 13 34 e5
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
Authentication with 00:18:4d:01:bc:5e timed out.
Added BSSID 00:18:4d:01:bc:5e into blacklist
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Scan timeout - try to get results
Received 258 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:18:4d:01:bc:5e ssid='NETGEAR' wpa_ie_len=0 rsn_ie_len=26 caps=0x11
selected based on RSN IE
selected WPA AP 00:18:4d:01:bc:5e ssid='NETGEAR'
Try to find non-WPA AP
Trying to associate with 00:18:4d:01:bc:5e (SSID='NETGEAR' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=66
AssocReq IE wireless event - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=35
AssocResp IE wireless event - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:4d:01:bc:5e
Association info event
req_ies - hexdump(len=58): 00 07 4e 45 54 47 45 41 52 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 09 00 03 7f 01 01 00 15 ff 7f
resp_ies - hexdump(len=27): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 09 00 03 7f 01 01 00 15 ff 7f
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:4d:01:bc:5e
No keys have been configured - skip key clearing
Associated with 00:18:4d:01:bc:5e
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:4d:01:bc:5e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 0a ed 10 c9 82 ed 7c 78 fc 8d b9 22 f3 bc a4 7c 14 ae a3 99 92 40 3f 37 5e 60 d0 a8 f7 ad 22 2d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 0a ed 10 c9 82 ed 7c 78 fc 8d b9 22 f3 bc a4 7c 14 ae a3 99 92 40 3f 37 5e 60 d0 a8 f7 ad 22 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 2b 52 d8 28 ee 63 61 f9 cd 9d 1b 0d 66 4a e9 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 0f fc 61 0f cf 5a 8f 8a 26 8b cb 3a ef 07 d6 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 74 39 7b 2f b7 5c 16 f3 8c 44 71 ab 21 3d b8 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f9 36 50 5f c2 dc 3c ea ee 7e 68 96 26 e2 6f 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:18:4d:01:bc:5e
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
IEEE 802.1X RX: version=1 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 1d 6f ea 48 e6 1e 3b 51 da 98 a5 ef f2 02 0a 03 5c d2 90 38 16 10 34 6f bb 57 ac ce 30 26 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 9e a1 6c 47 05 8b 45 83 8d f5 d3 b3 12 f9 6a 00 50 5f 19 6f 55 fe 2c ea d1 41 2b e7 06 76 25 60 12 05 30 77 0b 31 68 ba d3 0e 78 ff d1 f4 d8 1f 0d 3e 2c c7 27 65 07 52 0d 14 c4 cf dd 3a 7a 52 8f 37 46 04 da e0 1a 04 79 a8 e6 9d 65 de 59 b1 e9 04 b8 02 a1 9c 04 c8 f0 86 e2 7c 9a a4 cf 8d 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c09 len=32
PMKID candidate wireless event: flags=0x0 index=0 bssid=00:18:4d:01:bc:5e
RSN: PMKID candidate event - bssid=00:18:4d:01:bc:5e index=0 preauth=0
RSN: Ignored PMKID candidate without preauth flag
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 00:18:4d:01:bc:5e from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Re: How To: Manual Network Configuration without the need for Network Manager
Hi folks. Thanks for the walkthrough, but I'm having a small problem.
I'm using a Buffalo Airstation WHR-HP-G with a Panasonic CF-W5. I followed the instructions for the WPA-PSK setup, but I get stuck on the final setup. I reinstalled the iwl3945 driver that I am apparently using, but now the wireless card is "unclaimed".
I should note that I have this installed inside Windows - because I wanted to check to see if the wireless would work before doing a full install - but I'm not sure if that is affecting it.
This is the original output:
Quote:
*-network
description: Wireless interface
product: PRO/Wireless 3945ABG Network Connection
vendor: Intel Corporation
physical id: 0
bus info: pci@0000:03:00.0
logical name: wmaster0
version: 02
serial: 00:18:de:aa:bd:6c
width: 32 bits
clock: 33MHz
capabilities: bus_master cap_list logical ethernet physical wireless
configuration: broadcast=yes driver=iwl3945 latency=0 module=iwl3945 multicast=yes wireless=IEEE 802.11g
Apparently the driver wasn't found.
Quote:
sudo wpa_supplicant -w -Diwl3945 -iwmaster0 -c/etc/wpa_supplicant.conf
Unsupported driver 'iwl3945'.
So I tried reinstalling the driver, then running through the process and ignoring the output, and now...I have nothing. :-(
Quote:
*-network UNCLAIMED
description: Network controller
product: PRO/Wireless 3945ABG Network Connection
vendor: Intel Corporation
physical id: 0
bus info: pci@0000:03:00.0
version: 02
width: 32 bits
clock: 33MHz
capabilities: cap_list
configuration: latency=0
Any help that anyone could give me would be appreciated, even just a pointing in a general direction.
p.s. I did fill in the other necessary stuff first (SSID,etc.), I just didn't include the details in the post.
p.p.s. The wireless card is now recognized again after a restart, but I still can't start the wireless service for some reason.
Re: How To: Manual Network Configuration without the need for Network Manager
I'm completely and utterly frustrated with my wireless connection... I've tried several different network adapters and several different machines, but the result is about the same... my connection is great for a few seconds and then seems to stop working. Everything indicates that the connection is still up and running, but not even a ping to the router gets through.
To simplify things, I'll just talk about the one network adapter and machine...
I'm using Ubuntu 8.04 with a Broadcomm "BCM94311MCG wlan mini-PCI" adapter using the "ndiswrapper+bcmwl5" driver.
When I run the wpa_supplicant, it seems to indicate that it's connected properly, but it never returns to the terminal to allow typing the rest of the commands (it's supposed to, right??). It ends with "EAPOL: startWhen --> 0". I then type the rest of the commands in another window (while wpa_supplicant is still running) and everything seems to work correctly. However, after about 5 seconds no traffic gets through.
After running the dhclient, I tried pinging the router until it stopped working... It started out with pings around 30-200ms, then jumped to 2000-10,000 ms pings, then dropped to 1-3ms pings. Then, it paused for a long while and started reporting "ping: sendmsg: No buffer space available". I stopped it and then restarted it and started getting:
Code:
PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.
From 192.168.0.3 icmp_seq=3 Destination Host Unreachable
From 192.168.0.3 icmp_seq=6 Destination Host Unreachable
From 192.168.0.3 icmp_seq=7 Destination Host Unreachable
From 192.168.0.3 icmp_seq=9 Destination Host Unreachable
From 192.168.0.3 icmp_seq=10 Destination Host Unreachable
From 192.168.0.3 icmp_seq=13 Destination Host Unreachable
I've used this network adapter with this router before in Ubuntu 8.04 and had no trouble. The only change is that I moved it from one city to another. I'd chalk it up to radio interference, but it all works fine in Vista, XP, and Win2000.