Page 89 of 98 FirstFirst ... 39798788899091 ... LastLast
Results 881 to 890 of 978

Thread: How To: Manual Network Configuration without the need for Network Manager

  1. #881
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,716
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Forget about the serial monkey drivers for now.

    Are you telling me sometimes you actually can connect via WPA, but sometimes it also doesn't work?

    I'm not too sure if I can be of too much help to you if the connection is spotty!

  2. #882
    Join Date
    Mar 2009
    Location
    Helsinki, Finland
    Beans
    650
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: How To: Manual Network Configuration without the need for Network Manager

    Ok, so I have a Dell Truemobile 1400 minipci card on my friends laptop that has a Broadcom Corporation BCM4309 (rev 02) chip on it. Got it set up with NDISWrapper and it connects flawlessly with open networks. However, when I try to get into a WPA encrypted one, things go sour.

    Tried the instructions given here and just can't figure out what's wrong. Wpa_supplicant says it gets associated with my routers MAC address, but dhclient finds no DHCP offers. Also checked NDISWrappers site and it said with this driver setup the card has been known to connect to open, WEP and WPA networks.

    With the -dd option, the wpa_supplicant gives around 2k lines of output in the time space that it takes for dhclient to run through the different intervals, so if someone wants to read through all of that, I can supply the text file, but here should be one cycle of the debug info:

    Code:
    WPA: Installing PTK to the driver.                                                                                                               
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00                                                                                                     
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32                                                                           
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE                                                                                                         
    EAPOL: startWhen --> 0                                                                                                                           
    EAPOL: disable timer tick                                                                                                                        
    EAPOL: SUPP_PAE entering state CONNECTING                                                                                                        
    EAPOL: enable timer tick                                                                                                                         
    EAPOL: txStart                                                                                                                                   
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)                                                                                        
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])                                                                                      
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                
    Wireless event: cmd=0x8c07 len=85                                                                                                                
    AssocReq IE wireless event - hexdump(len=77): 00 06 54 6f 6d 70 70 61 01 08 82 84 0b 16 24 30 48 6c 21 02 08 0e 24 02 01 0e 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00              
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])                                                                                      
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                
    Wireless event: cmd=0x8c08 len=24                                                                                                                
    AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c                                                   
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])                                                                                      
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added                                                                                                
    Wireless event: cmd=0x8b15 len=20                                                                                                                
    Wireless event: new AP: 00:1e:ab:00:e4:f1                                                                                                        
    Association info event                                                                                                                           
    req_ies - hexdump(len=77): 00 06 54 6f 6d 70 70 61 01 08 82 84 0b 16 24 30 48 6c 21 02 08 0e 24 02 01 0e 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00                                 
    resp_ies - hexdump(len=16): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c                                                                      
    WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00                         
    State: GROUP_HANDSHAKE -> ASSOCIATED                                                                                                             
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)                                                                                          
    WEXT: Operstate: linkmode=-1, operstate=5                                                                                                        
    Associated with 00:1e:ab:00:e4:f1                                                                                                                
    WPA: Association event - clear replay counter                                                                                                    
    WPA: Clear old PTK                                                                                                                               
    EAPOL: External notification - portEnabled=0                                                                                                     
    EAPOL: SUPP_PAE entering state DISCONNECTED                                                                                                      
    EAPOL: SUPP_BE entering state INITIALIZE                                                                                                         
    EAPOL: External notification - portValid=0                                                                                                       
    EAPOL: External notification - EAP success=0                                                                                                     
    EAPOL: External notification - portEnabled=1                                                                                                     
    EAPOL: SUPP_PAE entering state CONNECTING                                                                                                        
    EAPOL: SUPP_BE entering state IDLE                                                                                                               
    Setting authentication timeout: 10 sec 0 usec                                                                                                    
    Cancelling scan request                                                                                                                          
    RX EAPOL from 00:1e:ab:00:e4:f1                                                                                                                  
    RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 01 29 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                                                                                                               
    Setting authentication timeout: 10 sec 0 usec                                                                                                    
    IEEE 802.1X RX: version=1 type=3 length=95                                                                                                       
      EAPOL-Key type=254                                                                                                                             
      key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)                                                                                             
      key_length=32 key_data_length=0                                                                                                                
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 29                                                                                       
      key_nonce - hexdump(len=32): 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85                   
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                                                                      
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00                                                                                              
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00                                                                                    
      key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                                                                     
    WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 01 29 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                                                                                                      
    State: ASSOCIATED -> 4WAY_HANDSHAKE                                                                                                              
    WPA: RX message 1 of 4-Way Handshake from 00:1e:ab:00:e4:f1 (ver=1)                                                                              
    WPA: Renewed SNonce - hexdump(len=32): 70 13 a0 47 92 f0 5a 00 aa 5a 18 e6 78 e5 76 a9 cf e1 78 5f a6 2d ac d5 c0 14 56 f2 03 18 b3 e9           
    WPA: PTK derivation - A1=00:90:4b:66:b3:f2 A2=00:1e:ab:00:e4:f1                                                                                  
    WPA: PMK - hexdump(len=32): [REMOVED]                                                                                                            
    WPA: PTK - hexdump(len=64): [REMOVED]                                                                                                            
    WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00                         
    WPA: Sending EAPOL-Key 2/4                                                                                                                       
    WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 01 29 70 13 a0 47 92 f0 5a 00 aa 5a 18 e6 78 e5 76 a9 cf e1 78 5f a6 2d ac d5 c0 14 56 f2 03 18 b3 e9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c6 2b f3 2d 21 e9 39 20 e3 d0 ac 5f 51 c2 fe ce 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00                       
    RX EAPOL from 00:1e:ab:00:e4:f1                                                                                                                  
    RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 01 2a 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 14 5e fd 0e 49 54 f6 4b 4f 86 97 16 58 28 e7 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02                                      
    IEEE 802.1X RX: version=1 type=3 length=119                                                                                                      
      EAPOL-Key type=254                                                                                                                             
      key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)                                                                                
      key_length=32 key_data_length=24                                                                                                               
      replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 2a                                                                                       
      key_nonce - hexdump(len=32): 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85                   
      key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                                                                      
      key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00                                                                                              
      key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00                                                                                    
      key_mic - hexdump(len=16): 2e 14 5e fd 0e 49 54 f6 4b 4f 86 97 16 58 28 e7                                                                     
    WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 01 2a 62 48 f5 fa 1a 76 2c 8a 3c a7 e6 45 6e 60 23 a3 6a 01 c6 e1 02 50 1d ec 58 f4 8c e5 85 b6 75 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 14 5e fd 0e 49 54 f6 4b 4f 86 97 16 58 28 e7 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02                             
    State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE                                                                                                          
    WPA: RX message 3 of 4-Way Handshake from 00:1e:ab:00:e4:f1 (ver=1)                                                                              
    WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02                                       
    WPA: Sending EAPOL-Key 4/4
    WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 01 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 cc 03 d2 35 4d 07 a8 28 30 a1 ba d9 36 a4 e9 00 00
    WPA: Installing PTK to the driver.
    WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
    wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
    State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: txStart
    WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
    ^CCTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: GROUP_HANDSHAKE -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6
    So, any ideas what to do next?

  3. #883
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,716
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    When wpa_supplicant associates, it stops scrolling. If it keeps scrolling its not being authenticated.

    Is there a reason you are using ndiswrapper other than b43?

    Have you tried WICD?

    Can you post your wpa_supplicant.conf file?

  4. #884
    Join Date
    Mar 2009
    Location
    Helsinki, Finland
    Beans
    650
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: How To: Manual Network Configuration without the need for Network Manager

    Well, as you can see, it periodically does say "Associated with 00:1e:ab:00:e4:f1". So, it's just outputting that for kicks?

    Couldn't get b43 to work actually, the proprietary driver on Hardware Drivers never does anything when I press enable and setting it up manually ran into various issues. And since there doesn't seem to be much motivation to get new drivers for this chip (neither the STA nor OpenFWWF support it), figured might as well go for NDISWrapper. If b43 is far superior though, I suppose I could have round #2 with it.

    Yes, I have tried WICD, it's currently installed and it doesn't help much. Currently (that worked before I tried the manual route) it can't even establish a connection over open network though, something that even Network Manager managed to accomplish.

    Code:
    ~$cat /etc/wpa_supplicant.conf
    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant
    
    network={
            ssid="my_essid"
            scan_ssid=0
            proto=WPA
            key_mgmt=WPA-PSK
            psk="my_password"
            pairwise=TKIP
            group=TKIP
    }
    And yes, I set my router to WPA Pre-Shared Key with TKIP, since the advice was to first get WPA working before trying WPA2.

    EDIT: Now that you mentioned the NDISWrapper, dmesg says: [ 31.340935] wlan0: encryption modes supported: WEP; TKIP with WPA; AES/CCMP with WPA. So, I guess I'll have to have a go with b43 eventually anyway to get WPA2 support. It should work with WPA though.
    Last edited by t0mppa; May 24th, 2009 at 07:04 PM. Reason: added the dmesg bit

  5. #885
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,716
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    Does it work with just this:

    ctrl_interface=/var/run/wpa_supplicant

    network={
    ssid="my_essid"
    proto=WPA
    key_mgmt=WPA-PSK
    psk="my_password"
    pairwise=TKIP
    group=TKIP
    }

  6. #886
    Join Date
    Mar 2009
    Location
    Helsinki, Finland
    Beans
    650
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: How To: Manual Network Configuration without the need for Network Manager

    That will have to wait a while. Conveniently NDISwrapper just started producing kernel panics whenever I enable my wireless through the kill switch. Nothing is ever easy.

  7. #887
    Join Date
    Dec 2007
    Location
    Chicago
    Beans
    Hidden!

    Re: How To: Manual Network Configuration without the need for Network Manager

    I'm looking to ditch network manager and connect to a WPA secured wifi connection from the command line. Tried following your guide but I'm stuck. In case it matters, I'm running Jaunty.

    lshw -C network lists my driver as.

    driver=iwl3945

    my wpa_supplicant.conf file looks like:

    ap_scan=1
    ctrl_interface=/var/run/wpa_supplicant

    network={
    ssid="xb332"
    scan_ssid=1
    proto=WPA
    key_mgmt=WPA-PSK
    psk="mykey"
    pairwise=TKIP
    group=TKIP
    }

    Then i run

    sudo ifconfig wlan0 down
    sudo dhclient -r wlan0
    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -d
    and it gives the following output and never goes any farther.

    Code:
    sudo ifconfig wlan0 down
    sudo dhclient -r wlan0
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/
    
    wmaster0: unknown hardware address type 801
    wmaster0: unknown hardware address type 801
    Listening on LPF/wlan0/00:1c:bf:0d:05:20
    Sending on   LPF/wlan0/00:1c:bf:0d:05:20
    Sending on   Socket/fallback
    
    sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -d
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ap_scan=1
    ctrl_interface='/var/run/wpa_supplicant'
    Priority group 0
       id=0 ssid='xb332'
    Initializing interface (2) 'wlan0'
    Interface wlan0 set UP - waiting a second for the driver to complete initialization
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:1c:bf:0d:05:20
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    Ignore event for foreign ifindex 3
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=12
    State: DISCONNECTED -> SCANNING
    Trying to associate with SSID 'xb332'
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: No WPA/RSN IE available from association info
    WPA: Set cipher suites based on configuration
    WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: clearing AP WPA IE
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 60 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=12
    EAPOL: disable timer tick
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=16
    Received 788 bytes of scan results (2 BSSes)
    CTRL-EVENT-SCAN-RESULTS
    Any help would be appreciated.
    Last edited by Icehuck; May 25th, 2009 at 03:37 AM.
    Hey, you created me. I didn't create some loser alter-ego to make myself feel better. Take some responsibility! -Tyler Durden, Fight Club

  8. #888
    Join Date
    Mar 2007
    Location
    Denver, CO
    Beans
    7,716
    Distro
    Ubuntu Mate 16.04 Xenial Xerus

    Re: How To: Manual Network Configuration without the need for Network Manager

    IceHuck

    Just to confirm -- the terminal output stops -- correct?

    This means you have been appropriately authenticated -- remember with the -d switch you are running this process in the foreground.

    Just pop open another terminal window and type:
    sudo dhclient wlan0

    Once everything is up and working, the next time you want to connect, skip the -d flag and just use the -B flag which sends the process to the background without providing information. You can then request a dhcp address within the same terminal.

  9. #889
    Join Date
    Dec 2007
    Location
    Chicago
    Beans
    Hidden!

    Re: How To: Manual Network Configuration without the need for Network Manager

    Quote Originally Posted by kevdog View Post
    IceHuck

    Just to confirm -- the terminal output stops -- correct?

    This means you have been appropriately authenticated -- remember with the -d switch you are running this process in the foreground.

    Just pop open another terminal window and type:
    sudo dhclient wlan0

    Once everything is up and working, the next time you want to connect, skip the -d flag and just use the -B flag which sends the process to the background without providing information. You can then request a dhcp address within the same terminal.
    It was stopping after that line. However; after I turned my machine off and then started it up to try your suggestion I recieved a new error. This following output repeats for at least 10 minutes(that how long I left it going for). When I have ap_scan1 and scan_ssid=1 set that means my AP should be broadcasting it's SSID right?

    Code:
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    ap_scan=1
    ctrl_interface='/var/run/wpa_supplicant'
    Priority group 0
       id=0 ssid='xb332'
    Initializing interface (2) 'wlan0'
    Interface wlan0 set UP - waiting a second for the driver to complete initialization
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:1c:bf:0d:05:20
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    Ignore event for foreign ifindex 3
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=12
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=5):
         78 62 33 33 32                                    xb332           
    Trying to get current scan results first without requesting a new scan to speed up initial association
    ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 0 sec 0 usec
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=16
    ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 1 sec 0 usec
    EAPOL: disable timer tick
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=5):
         78 62 33 33 32                                    xb332           
    Scan requested (ret=0) - scan timeout 30 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=16
    Received 788 bytes of scan results (2 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 0
    Try to find WPA-enabled AP
    0: 00:21:91:18:d4:2e ssid='xb332' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
       selected based on WPA IE
       selected WPA AP 00:21:91:18:d4:2e ssid='xb332'
    Trying to associate with 00:21:91:18:d4:2e (SSID='xb332' freq=2462 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    WPA: using IEEE 802.11i/D3.0
    WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
    WPA: clearing AP RSN IE
    WPA: using GTK TKIP
    WPA: using PTK TKIP
    WPA: using KEY_MGMT WPA-PSK
    WPA: not using MGMT group cipher
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b06 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=16
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c02 len=216
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=24
    Wireless event: new AP: 00:21:91:18:d4:2e
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:21:91:18:d4:2e
    No keys have been configured - skip key clearing
    Associated with 00:21:91:18:d4:2e
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: enable timer tick
    EAPOL: SUPP_BE entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=24
    Wireless event: new AP: 00:00:00:00:00:00
    Setting scan request: 0 sec 100000 usec
    Added BSSID 00:21:91:18:d4:2e into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    ioctl[SIOCSIWENCODEEXT]: No such file or directory
    Driver did not support SIOCSIWENCODEEXT
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 30 seconds
    EAPOL: startWhen --> 0
    EAPOL: disable timer tick
    Authentication with 00:00:00:00:00:00 timed out.
    Added BSSID 00:00:00:00:00:00 into blacklist
    No keys have been configured - skip key clearing
    State: SCANNING -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - EAP success=0
    Setting scan request: 0 sec 0 usec
    State: DISCONNECTED -> SCANNING
    Starting AP scan (specific SSID)
    Scan SSID - hexdump_ascii(len=5):
         78 62 33 33 32                                    xb332
    BTW - Thanks for the quick response you gave on that.
    Hey, you created me. I didn't create some loser alter-ego to make myself feel better. Take some responsibility! -Tyler Durden, Fight Club

  10. #890
    Join Date
    Mar 2009
    Location
    Helsinki, Finland
    Beans
    650
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: How To: Manual Network Configuration without the need for Network Manager

    @kevdog: I switched to b43 and it works now. Only the problem is that even though this is a a/b/g card, b43 recognizes it as a b card and puts b43legacy in control of it. That means a bit rate of 6 Mb/s instead of 54 Mb/s. But I guess that's the best possible solution for this card & Ubuntu, at least it's better than 0 Mb/s.

    And it connects to WPA2 with no trouble on WICD, so thanks for your help and sorry about wasting your time with the NDISWrapper adventures.

Page 89 of 98 FirstFirst ... 39798788899091 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •