Page 86 of 98 FirstFirst ... 3676848586878896 ... LastLast
Results 851 to 860 of 978

Thread: How To: Manual Network Configuration without the need for Network Manager

  1. #851
    Join Date
    Oct 2007
    Location
    hk
    Beans
    706
    Distro
    Ubuntu 7.10 Gutsy Gibbon

    Re: How To: Troubleshoot your Wireless Network Connection - Connecting at Command Li

    Hi, I have problem.
    sudo wpa_supplicant -D<wext> -i<wlan0> -c/etc/wpa_supplicant.conf -dd
    bash: wext: No such file or directory

    what to do? thanks!
    Ubuntu 7.10 on P4 1.8G and PIII 933mHz

  2. #852
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,721
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Options preferenced with <> mean these are options you must fill in -- flags. If you want wext as the driver type -- which in most cases you do -- its
    -Dwext
    -i wlan0

    Do not use <> explicitly.

  3. #853
    Join Date
    Oct 2007
    Location
    hk
    Beans
    706
    Distro
    Ubuntu 7.10 Gutsy Gibbon

    Re: How To: Manual Network Configuration without the need for Network Manager

    I have followed your instructions and trying to establish a WPA(1) but not success. My chip is Realtek 8187L and currently I'm using ndiswrapper with Realtek 8187L windows 98 driver to establish an unencrypted connection without big problems (but signal strength seems weaker than in win xp)

    here's my lshw -C network

    Code:
     *-network               
           description: Ethernet interface
           product: 191 Gigabit Ethernet Adapter
           vendor: Silicon Integrated Systems [SiS]
           physical id: 4
           bus info: pci@0000:00:04.0
           logical name: eth0
           version: 02
           serial: 00:03:0d:af:c3:b5
           width: 32 bits
           clock: 33MHz
           capabilities: bus_master cap_list ethernet physical
           configuration: broadcast=yes driver=sis190 driverversion=1.2 latency=0 module=sis190 multicast=yes
      *-network
           description: Wireless interface
           physical id: 2
           logical name: wlan0
           serial: 00:22:43:74:7b:05
           capabilities: ethernet physical wireless
           configuration: broadcast=yes driver=ndiswrapper+netrtuw driverversion=1.53+Realtek Semiconductor Corp. multicast=yes wireless=IEEE 802.11g
    Here's my /etc/wpa_supplicant.conf

    HTML Code:
    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant 
    
    network={
            ssid="dlink"
            scan_ssid=0
            proto=WPA
            key_mgmt=WPA-PSK
            psk="A57B5675567A65D6765E675E76F51463E33A223A3A3A62B9E8DD99E0138CEF"
            pairwise=TKIP
            group=TKIP
    }
    Here's the result from
    sudo dhclient -r wlan0
    Code:
    There is already a pid file /var/run/dhclient.pid with pid 9088
    killed old client process, removed PID file
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPRELEASE on wlan0 to 192.168.123.1 port 67
    send_packet: Network is unreachable
    send_packet: please consult README file regarding broadcast address.
    
    
    Here's the result of
    
    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd 
    
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ap_scan=1
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 4 - start of a new network block
    ssid - hexdump_ascii(len=5):
         64 6c 69 6e 6b                                    dlink           
    scan_ssid=0 (0x0)
    proto: 0x1
    key_mgmt: 0x2
    PSK (ASCII passphrase) - hexdump_ascii(len=62): [REMOVED]
    pairwise: 0x8
    group: 0x8
    PSK (from passphrase) - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='dlink'
    Initializing interface (2) 'wlan0'
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:22:43:74:7b:05
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    EAPOL: disable timer tick
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0a 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
      key_nonce - hexdump(len=32): 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0a 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 2a 68 8b 10 c9 db 15 f5 d3 a7 99 68 0d 29 de f4 14 a2 1e f4 5b a4 34 55 35 cd 65 87 87 99 d1 98
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 0a 2a 68 8b 10 c9 db 15 f5 d3 a7 99 68 0d 29 de f4 14 a2 1e f4 5b a4 34 55 35 cd 65 87 87 99 d1 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9d 89 29 a0 8b 09 e0 b8 fb 6c 73 10 7f db 42 43 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0b 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 5f a8 c5 2d 6e 3c a0 8e 99 d2 0c a3 11 04 44 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
      key_nonce - hexdump(len=32): 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 21 5f a8 c5 2d 6e 3c a0 8e 99 d2 0c a3 11 04 44
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0b 7f 7f c0 b4 89 35 a3 be 7d e8 a2 5f a0 a6 cd 5f 9d 42 09 d8 71 27 a8 66 fe 76 79 14 c2 c8 fb 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 5f a8 c5 2d 6e 3c a0 8e 99 d2 0c a3 11 04 44 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d d1 16 7c 6c 9f b1 84 78 b5 d4 dc 16 48 d9 17 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:19:5b:df:63:da into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: GROUP_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    Scan timeout - try to get results
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0c 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
      key_nonce - hexdump(len=32): 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0c 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): a3 cd e4 55 a9 fe 60 c3 99 e9 55 26 00 2e 52 92 87 76 f5 33 cc 71 f3 e0 b4 f9 49 69 f2 a4 83 67
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 0c a3 cd e4 55 a9 fe 60 c3 99 e9 55 26 00 2e 52 92 87 76 f5 33 cc 71 f3 e0 b4 f9 49 69 f2 a4 83 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 98 a1 01 0b 80 fd e2 a3 54 2d bc 1b a3 a3 7d 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0d 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 68 83 09 99 fb 96 92 77 da cb d0 e6 53 79 ad 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
      key_nonce - hexdump(len=32): 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 12 68 83 09 99 fb 96 92 77 da cb d0 e6 53 79 ad
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0d 35 97 61 70 e2 6f 2d ea e0 8c e4 10 7f 74 a3 68 9a 2a a0 2c 8f 58 75 a5 0c ff 7e a8 1e b9 75 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 68 83 09 99 fb 96 92 77 da cb d0 e6 53 79 ad 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 95 38 3c 76 88 cf 6d fa f4 a4 6a 41 b7 9d f1 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0e 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5 00 20 48 8b 9a 22 18 8a 80 24 67 7c 56 b2 69 89 52 f6 9f c6 b3 b2 c9 28 b6 7f cf b7 c0 1a fb 33 87 b8
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
      key_nonce - hexdump(len=32): 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64
      key_iv - hexdump(len=16): 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66
      key_rsc - hexdump(len=8): 2b 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0e 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5 00 20 48 8b 9a 22 18 8a 80 24 67 7c 56 b2 69 89 52 f6 9f c6 b3 b2 c9 28 b6 7f cf b7 c0 1a fb 33 87 b8
    WPA: RX message 1 of Group Key Handshake from 00:19:5b:df:63:da (ver=1)
    State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
    WPA: Group Key - hexdump(len=32): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
    WPA: RSC - hexdump(len=6): 2b 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
    WPA: Sending EAPOL-Key 2/2
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 5f 31 77 05 d7 11 ec 37 d9 db f1 74 db 32 1d 00 00
    WPA: Key negotiation completed with 00:19:5b:df:63:da [PTK=TKIP GTK=TKIP]
    Cancelling authentication timeout
    Removed BSSID 00:19:5b:df:63:da from blacklist
    State: GROUP_HANDSHAKE -> COMPLETED
    CTRL-EVENT-CONNECTED - Connection to 00:19:5b:df:63:da completed (auth) [id=0 id_str=]
    wpa_driver_wext_set_operstate: operstate 0->1 (UP)
    WEXT: Operstate: linkmode=-1, operstate=6
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state SUCCESS
    EAP: EAP entering state DISABLED
    EAPOL: SUPP_PAE entering state AUTHENTICATED
    EAPOL: SUPP_BE entering state IDLE
    EAPOL authentication completed successfully
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0e 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5 00 20 48 8b 9a 22 18 8a 80 24 67 7c 56 b2 69 89 52 f6 9f c6 b3 b2 c9 28 b6 7f cf b7 c0 1a fb 33 87 b8
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
      key_nonce - hexdump(len=32): 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64
      key_iv - hexdump(len=16): 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66
      key_rsc - hexdump(len=8): 2b 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0e 0c d1 81 07 98 0c db cc 4c 8b fe 5d 36 19 5e 80 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 64 1b 04 ce d7 d5 9f f0 61 2d 7b 6c 41 62 13 fd 66 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 32 9d d5 46 9e 3a 12 c4 66 c7 45 73 b3 8e c5 00 20 48 8b 9a 22 18 8a 80 24 67 7c 56 b2 69 89 52 f6 9f c6 b3 b2 c9 28 b6 7f cf b7 c0 1a fb 33 87 b8
    WPA: EAPOL-Key Replay Counter did not increase - dropping packet
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    ^CCTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: COMPLETED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6
    Here's the result of

    sudo dhclient wlan0

    Code:
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 5
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 9
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 17
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 14
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 9
    No DHCPOFFERS received.
    No working leases in persistent database - sleeping.
    In my router I choose WPA-PSK and TKIP.

    Sorry for my long post. Thanks in advance!
    Ubuntu 7.10 on P4 1.8G and PIII 933mHz

  4. #854
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,721
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Just a follow up

    psk="A57B5675567A65D6765E675E76F51463E33A223A3A3A6 2B9E8DD99E0138CEF"

    Is the password given above the hex key or the actual password? It looks like hex to me!

  5. #855
    Join Date
    May 2008
    Location
    Scotland
    Beans
    51
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: How To: Manual Network Configuration without the need for Network Manager

    Hi, thanks for that. I'm still having a problem with my connection though. When I type in sudo dhclient eth1, this is what I get

    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/

    Listening on LPF/eth1/00:0e:35:8a:8e:94
    Sending on LPF/eth1/00:0e:35:8a:8e:94
    Sending on Socket/fallback
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 5
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 5
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 5
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 9
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 10
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 10
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 16
    DHCPDISCOVER on eth1 to 225.225.225.225 port 67 interval 1
    No DHCPOFFERS recieved.
    No working leases in persistent database - sleeping.

    Please tell me how I can wake it up?

    Many thanks.

  6. #856
    Join Date
    Oct 2007
    Location
    hk
    Beans
    706
    Distro
    Ubuntu 7.10 Gutsy Gibbon

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    Just a follow up

    psk="A57B5675567A65D6765E675E76F51463E33A223A3A3A6 2B9E8DD99E0138CEF"

    Is the password given above the hex key or the actual password? It looks like hex to me!
    I don't know if it is HEX or not. But I think it is the actual password. That long password was typed by me manually. This time I set the key as abcdefgh and set it again. Please have a look at my router setting page (see screenshots).
    Code:
    sudo dhclient -r wlan0
    There is already a pid file /var/run/dhclient.pid with pid 6136
    killed old client process, removed PID file
    
    (Is this pid file having problem?)
    
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPRELEASE on wlan0 to 192.168.123.1 port 67
    Code:
    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd 
    [sudo] password for coppen: 
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ap_scan=1
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 4 - start of a new network block
    ssid - hexdump_ascii(len=5):
         64 6c 69 6e 6b                                    dlink           
    scan_ssid=0 (0x0)
    proto: 0x1
    key_mgmt: 0x2
    PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
    pairwise: 0x8
    group: 0x8
    PSK (from passphrase) - hexdump(len=32): [REMOVED]
    Priority group 0
       id=0 ssid='dlink'
    Initializing interface (2) 'wlan0'
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:22:43:74:7b:05
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    EAPOL: disable timer tick
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0e 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
      key_nonce - hexdump(len=32): 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0e 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 6e 18 89 40 ee b5 88 c9 96 ce 02 06 2a 08 02 52 6e b6 40 3f e4 14 06 03 8f a8 12 8b 50 fa 33 20
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 0e 6e 18 89 40 ee b5 88 c9 96 ce 02 06 2a 08 02 52 6e b6 40 3f e4 14 06 03 8f a8 12 8b 50 fa 33 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b 7a e0 06 a4 28 79 e8 04 b3 c5 f2 7c e4 f6 26 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0f 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 42 dc 52 d9 60 30 e3 b9 2d 71 e2 14 1e b0 67 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
      key_nonce - hexdump(len=32): 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): a7 42 dc 52 d9 60 30 e3 b9 2d 71 e2 14 1e b0 67
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0f 2a 61 4b dd c7 c0 1c b1 ec f5 5c 09 54 ea 08 a4 de ed 21 74 89 2b 6d 0d 75 40 1e ce b6 7a 0d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 42 dc 52 d9 60 30 e3 b9 2d 71 e2 14 1e b0 67 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 73 8f 15 89 0c 07 77 af 2f f1 32 4b 66 28 8e 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:19:5b:df:63:da into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: GROUP_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    Scan timeout - try to get results
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 10 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
      key_nonce - hexdump(len=32): 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 10 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 2a ce 6f 3d 08 67 18 05 af b6 aa 6c 88 98 4e 11 df 30 7f f3 55 11 62 ea e9 e0 e9 00 2c c7 34 a5
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 10 2a ce 6f 3d 08 67 18 05 af b6 aa 6c 88 98 4e 11 df 30 7f f3 55 11 62 ea e9 e0 e9 00 2c c7 34 a5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 67 81 48 a6 00 ac 25 32 28 91 e1 3e e0 a4 f3 79 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 11 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 33 1d 6a e3 6f e3 09 d3 02 28 cd 13 da 0b dd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 11
      key_nonce - hexdump(len=32): 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 61 33 1d 6a e3 6f e3 09 d3 02 28 cd 13 da 0b dd
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 11 5c 48 33 8e 13 4b 2c 8a 2a 50 a6 48 b7 09 09 5a 7f 76 95 00 1e 14 a5 d4 09 ab 20 3b fa ac 65 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 33 1d 6a e3 6f e3 09 d3 02 28 cd 13 da 0b dd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 c0 44 27 3b 4e 27 9f 5a 0f d2 9e 45 d5 82 e0 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 12 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f 00 20 af 76 06 32 84 ea 66 9c 91 e0 0a ef 00 7c 8a 3b 79 57 76 b9 9c f1 d5 e7 3c 4f 95 2d d1 6e 05 73
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
      key_nonce - hexdump(len=32): 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05
      key_iv - hexdump(len=16): ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07
      key_rsc - hexdump(len=8): 14 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 12 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f 00 20 af 76 06 32 84 ea 66 9c 91 e0 0a ef 00 7c 8a 3b 79 57 76 b9 9c f1 d5 e7 3c 4f 95 2d d1 6e 05 73
    WPA: RX message 1 of Group Key Handshake from 00:19:5b:df:63:da (ver=1)
    State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
    WPA: Group Key - hexdump(len=32): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
    WPA: RSC - hexdump(len=6): 14 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
    WPA: Sending EAPOL-Key 2/2
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 99 2c 35 31 ad d2 26 59 4b a9 c9 5b fb 69 e5 00 00
    WPA: Key negotiation completed with 00:19:5b:df:63:da [PTK=TKIP GTK=TKIP]
    Cancelling authentication timeout
    Removed BSSID 00:19:5b:df:63:da from blacklist
    State: GROUP_HANDSHAKE -> COMPLETED
    CTRL-EVENT-CONNECTED - Connection to 00:19:5b:df:63:da completed (auth) [id=0 id_str=]
    wpa_driver_wext_set_operstate: operstate 0->1 (UP)
    WEXT: Operstate: linkmode=-1, operstate=6
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state SUCCESS
    EAP: EAP entering state DISABLED
    EAPOL: SUPP_PAE entering state AUTHENTICATED
    EAPOL: SUPP_BE entering state IDLE
    EAPOL authentication completed successfully
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 12 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f 00 20 af 76 06 32 84 ea 66 9c 91 e0 0a ef 00 7c 8a 3b 79 57 76 b9 9c f1 d5 e7 3c 4f 95 2d d1 6e 05 73
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
      key_nonce - hexdump(len=32): 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05
      key_iv - hexdump(len=16): ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07
      key_rsc - hexdump(len=8): 14 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 12 82 3d d6 ac 22 f5 aa 16 09 06 9c 88 eb c5 33 c6 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 05 ef 74 ae a4 04 5a c9 03 2b 03 4f f3 cc eb 0c 07 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 b2 dc ec 7d ca 79 5a e1 f0 d5 11 a1 88 af 0f 00 20 af 76 06 32 84 ea 66 9c 91 e0 0a ef 00 7c 8a 3b 79 57 76 b9 9c f1 d5 e7 3c 4f 95 2d d1 6e 05 73
    WPA: EAPOL-Key Replay Counter did not increase - dropping packet
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    
    It seemed stop here so I pressed Ctrl+C
    
    ^CCTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: COMPLETED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6
    Code:
     sudo dhclient wlan0
    [sudo] password for coppen: 
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 8
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 10
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 20
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 13
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 10
    No DHCPOFFERS received.
    No working leases in persistent database - sleeping.


    Last edited by afeasfaerw23231233; March 1st, 2009 at 07:13 AM.
    Ubuntu 7.10 on P4 1.8G and PIII 933mHz

  7. #857
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,721
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Run this command in one terminal:

    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd

    And this in another:

    sudo dhclient wlan0

    And just for testing purposes, try a simple password like fred or something. I want to make sure you are not having any transposition errors. Later on you can increase the numbers.

    I have the same router as you -- and I can confirm this router should work with what you are trying to do!

  8. #858
    Join Date
    Oct 2007
    Location
    hk
    Beans
    706
    Distro
    Ubuntu 7.10 Gutsy Gibbon

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    Run this command in one terminal:

    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd

    And this in another:

    sudo dhclient wlan0

    And just for testing purposes, try a simple password like fred or something. I want to make sure you are not having any transposition errors. Later on you can increase the numbers.

    I have the same router as you -- and I can confirm this router should work with what you are trying to do!
    This time I set it as fredfred as the router doesn't allow me to enter less than 8 characters.
    Code:
    cat /etc/wpa_supplicant.conf
    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant 
    
    network={
            ssid="dlink"
            scan_ssid=0
            proto=WPA
            key_mgmt=WPA-PSK
            psk="fredfred"
            pairwise=TKIP
            group=TKIP
    }
    Code:
    coppen@coppen-laptop:~$ sudo dhclient -r wlan0
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPRELEASE on wlan0 to 192.168.123.1 port 67
    send_packet: Network is unreachable
    send_packet: please consult README file regarding broadcast address.
    coppen@coppen-laptop:~$

    this time
    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
    is longer than before and some old lines disappear.
    Code:
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 29 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 29
      key_nonce - hexdump(len=32): 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 29 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 0b d9 61 4e 5f bf 7d 3b 1a 01 86 32 2e 40 e0 87 d8 8f e7 25 98 93 a8 a9 aa ad 81 21 d2 47 47 19
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 29 0b d9 61 4e 5f bf 7d 3b 1a 01 86 32 2e 40 e0 87 d8 8f e7 25 98 93 a8 a9 aa ad 81 21 d2 47 47 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 84 4a 25 32 d8 39 9c e3 a1 f4 38 f6 7f a0 43 db 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2a 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 e0 aa 1f 1c 93 5f f4 42 09 cb 83 49 a9 3b ae 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2a
      key_nonce - hexdump(len=32): 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): f5 e0 aa 1f 1c 93 5f f4 42 09 cb 83 49 a9 3b ae
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2a 43 05 75 51 ed 21 dd 5a e6 e5 3f 4e 96 32 dc 80 21 e6 08 a2 39 a1 f5 0e 67 d9 3a 7e ea 34 43 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 e0 aa 1f 1c 93 5f f4 42 09 cb 83 49 a9 3b ae 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a a0 77 aa fe de fa 91 ab 7b 00 58 1e da 9c 84 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:19:5b:df:63:da into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: GROUP_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    Scan timeout - try to get results
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 2b 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2b
      key_nonce - hexdump(len=32): 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 2b 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): 24 00 39 aa f3 ea 62 c6 e6 7d af 67 31 84 0a e0 8f a0 a3 f2 c3 8f 4f e8 07 c7 03 61 59 42 b0 cb
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 2b 24 00 39 aa f3 ea 62 c6 e6 7d af 67 31 84 0a e0 8f a0 a3 f2 c3 8f 4f e8 07 c7 03 61 59 42 b0 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 a5 08 4d 72 a3 33 61 5a c3 4d 68 c3 cf 77 59 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2c 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af 93 c5 54 72 54 70 5a f5 6e 6f 6e 29 12 a5 e0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2c
      key_nonce - hexdump(len=32): 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): af 93 c5 54 72 54 70 5a f5 6e 6f 6e 29 12 a5 e0
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2c 75 db d1 7f 4c 17 54 40 93 14 48 bf aa 46 2a ea 89 81 3f b1 35 b2 9f 08 d4 97 77 bd 8e f6 de 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af 93 c5 54 72 54 70 5a f5 6e 6f 6e 29 12 a5 e0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 16 83 e7 ee f3 76 e6 5f 11 18 41 6b b3 08 f2 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    BSSID 00:19:5b:df:63:da blacklist count incremented to 2
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    State: GROUP_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    Scan timeout - try to get results
    Received 254 bytes of scan results (1 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       skip - blacklisted
    Try to find non-WPA AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       skip - blacklisted
    No APs found - clear blacklist and try again
    Removed BSSID 00:19:5b:df:63:da from blacklist (clear)
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:19:5b:df:63:da ssid='dlink' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:19:5b:df:63:da ssid='dlink'
    Try to find non-WPA AP
    Trying to associate with 00:19:5b:df:63:da (SSID='dlink' freq=2452 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=8
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c07 len=55
    AssocReq IE wireless event - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:19:5b:df:63:da
    Association info event
    req_ies - hexdump(len=47): 00 05 64 6c 69 6e 6b 01 0c 82 84 8b 96 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:19:5b:df:63:da
    No keys have been configured - skip key clearing
    Associated with 00:19:5b:df:63:da
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 2d 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Setting authentication timeout: 10 sec 0 usec
    IEEE 802.1X RX: version=1 type=3 length=95
      EAPOL-Key type=254
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
      key_length=32 key_data_length=0
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2d
      key_nonce - hexdump(len=32): 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 2d 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    State: ASSOCIATED -> 4WAY_HANDSHAKE
    WPA: RX message 1 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: Renewed SNonce - hexdump(len=32): f5 5a 07 24 64 aa fb b5 5d 63 23 09 c9 45 3c de 4d 9b 88 03 ee 81 af e7 10 ee a7 58 4d cd 9c 59
    WPA: PTK derivation - A1=00:22:43:74:7b:05 A2=00:19:5b:df:63:da
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    WPA: Sending EAPOL-Key 2/4
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 2d f5 5a 07 24 64 aa fb b5 5d 63 23 09 c9 45 3c de 4d 9b 88 03 ee 81 af e7 10 ee a7 58 4d cd 9c 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 0c c7 a5 96 12 6f ac f6 d6 9f c6 cb eb 20 f5 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2e 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 54 e3 d3 dd d1 99 79 b3 e0 f0 ae fb ea 44 30 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    IEEE 802.1X RX: version=1 type=3 length=119
      EAPOL-Key type=254
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
      key_length=32 key_data_length=24
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2e
      key_nonce - hexdump(len=32): 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 63 54 e3 d3 dd d1 99 79 b3 e0 f0 ae fb ea 44 30
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 2e 52 ad 00 7f 32 d3 9a aa 8f 81 15 30 e5 54 7b 2f e2 d0 95 ab 16 c9 46 7f 2f 2c 0a a5 39 a3 5e 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 54 e3 d3 dd d1 99 79 b3 e0 f0 ae fb ea 44 30 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
    WPA: RX message 3 of 4-Way Handshake from 00:19:5b:df:63:da (ver=1)
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 e3 29 19 23 bb e3 09 c4 9c 77 84 f0 0a f0 09 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 2f a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec 00 20 a1 2a 90 9c 9f 5b 3c 37 56 24 e7 fe f9 05 4a 63 21 3c 21 0c 92 3e 1c c3 aa 3a 33 4c c7 02 30 b4
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2f
      key_nonce - hexdump(len=32): a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59
      key_iv - hexdump(len=16): 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 2f a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec 00 20 a1 2a 90 9c 9f 5b 3c 37 56 24 e7 fe f9 05 4a 63 21 3c 21 0c 92 3e 1c c3 aa 3a 33 4c c7 02 30 b4
    WPA: RX message 1 of Group Key Handshake from 00:19:5b:df:63:da (ver=1)
    State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
    WPA: Group Key - hexdump(len=32): [REMOVED]
    WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
    WPA: Sending EAPOL-Key 2/2
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae bc 0d 67 91 be 47 4c 24 55 94 40 c6 53 6a f8 00 00
    WPA: Key negotiation completed with 00:19:5b:df:63:da [PTK=TKIP GTK=TKIP]
    Cancelling authentication timeout
    State: GROUP_HANDSHAKE -> COMPLETED
    CTRL-EVENT-CONNECTED - Connection to 00:19:5b:df:63:da completed (auth) [id=0 id_str=]
    wpa_driver_wext_set_operstate: operstate 0->1 (UP)
    WEXT: Operstate: linkmode=-1, operstate=6
    EAPOL: External notification - portValid=1
    EAPOL: External notification - EAP success=1
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state SUCCESS
    EAP: EAP entering state DISABLED
    EAPOL: SUPP_PAE entering state AUTHENTICATED
    EAPOL: SUPP_BE entering state IDLE
    EAPOL authentication completed successfully
    RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:19:5b:df:63:da
    RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 2f a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec 00 20 a1 2a 90 9c 9f 5b 3c 37 56 24 e7 fe f9 05 4a 63 21 3c 21 0c 92 3e 1c c3 aa 3a 33 4c c7 02 30 b4
    IEEE 802.1X RX: version=1 type=3 length=127
      EAPOL-Key type=254
      key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
      key_length=32 key_data_length=32
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2f
      key_nonce - hexdump(len=32): a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59
      key_iv - hexdump(len=16): 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
      key_mic - hexdump(len=16): 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec
    WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 2f a4 76 f1 d1 2f 35 55 8b 4c 37 ac 8d 83 0e bd 7c 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 59 83 a5 d8 f1 96 7f b9 4a 3e 28 1e 24 c9 08 1d 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 89 11 10 fe 7a 0c f0 36 d1 f0 d6 e5 2b af ec 00 20 a1 2a 90 9c 9f 5b 3c 37 56 24 e7 fe f9 05 4a 63 21 3c 21 0c 92 3e 1c c3 aa 3a 33 4c c7 02 30 b4
    WPA: EAPOL-Key Replay Counter did not increase - dropping packet
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    
    it seems stop here again so i press ctrl+c
    
    ^CCTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: COMPLETED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6
    coppen@coppen-laptop:~$
    Code:
    coppen@coppen-laptop:~$ sudo dhclient wlan0
    [sudo] password for coppen: 
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    Listening on LPF/wlan0/00:22:43:74:7b:05
    Sending on   LPF/wlan0/00:22:43:74:7b:05
    Sending on   Socket/fallback
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 11
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 12
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 18
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7
    DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 6
    No DHCPOFFERS received.
    No working leases in persistent database - sleeping.
    p.s. thanks a lot for your patient!
    Ubuntu 7.10 on P4 1.8G and PIII 933mHz

  9. #859
    Join Date
    Oct 2007
    Location
    hk
    Beans
    706
    Distro
    Ubuntu 7.10 Gutsy Gibbon

    Re: How To: Manual Network Configuration without the need for Network Manager

    Now I have a doubt if my driver is working correctly. A few hours ago I booted into win xp and the wireless connection broken randomly. I search in website of the producer of my notebook and find out a new driver (the name is still realtek 8187 so I really don't know what version it is. But very likely it should be 8187B or 8187L). I reinstall it and it works great.

    I compared the speed of copying big files in ubuntu and win xp by samba. I find out the speed in xp is around 2.6MB/s steady but in ubuntu it flutuates from 600KB to 2.2MB/s. That's a bit odd it keeps dropping to around 600KB/s for half a second and than goes up again. The signal strength in both OS is around 70%. And in both OS I notice no random disconnection. And WPA works well in xp too.

    So should I reinstall the ndiswrapper driver? (The current driver in ubuntu is the windows 98 version as I mention in my previous post). Arrr... I am a noob and I forget the way how to get ndiswrapper work.. I need to search the forum again?

    p.s. sorry for my bad english too
    Ubuntu 7.10 on P4 1.8G and PIII 933mHz

  10. #860
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,721
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    it seems stop here again so i press ctrl+c

    Why do you do this? Again, in one window do the wpa_supplicant thing, (do not stop it when it stops), and then in the other window do the dhclient command. You have to have wpa_supplicant running at all times (either in the foreground) or in the background (which can be done with use of the -B flag). However if you run it in the background you get no debugging output.

    As far as the windows driver and things --- I don't know.

    Lets try without ndiswrapper for now -- its the preferrable solution if it works!

Page 86 of 98 FirstFirst ... 3676848586878896 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •