[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

wpasupplicant mit ipw oder prism54



Hi,

bevor ich mich mittels bugreport an den Maintainer wende (der sowieso
ziemlich inaktiv zu sein scheint), frag ich mal hier rum:

Hat einer von euch mit obigen Chipsaetzen und WPA-PSK wpasupplicant
zum laufen gebracht? Ich krieg nichtmal ne dauerhafte WLAN-Verbindung
hin. 

wpasupplicant.conf:

,----
| ctrl_interface=/var/run/wpa_supplicant
| ctrl_interface_group=0
| 
| eapol_version=1
| 
| ap_scan=1
| 
| network={
| 	ssid="pakulat"
| 	scan_ssid=1
| 	proto=WPA
| 	key_mgmt=WPA-PSK
| 	psk="abcdefghijkl" 
| }
`----

Debug-Ausgabe von wpasupplicant mit prism54:

,----
| ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported
| Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'prism54'
| Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
| Reading configuration file '/etc/wpa_supplicant.conf'
| ctrl_interface='/var/run/wpa_supplicant'
| ctrl_interface_group=0
| eapol_version=1
| ap_scan=1
| Priority group 0
|    id=0 ssid='pakulat'
| Initializing interface (2) 'eth1'
| EAPOL: SUPP_PAE entering state DISCONNECTED
| EAPOL: KEY_RX entering state NO_KEY_RECEIVE
| EAPOL: SUPP_BE entering state INITIALIZE
| EAP: EAP entering state DISABLED
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| Own MAC address: 00:09:5b:89:e3:1d
| wpa_driver_prism54_set_countermeasures - not yet implemented
| Setting scan request: 0 sec 100000 usec
| Wireless event: cmd=0x8b06 len=8
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
| Starting AP scan (specific SSID)
| Scan SSID - hexdump_ascii(len=7):
|      70 61 6b 75 6c 61 74                              pakulat         
| Failed to initiate AP scan.
| Setting scan request: 10 sec 0 usec
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Scan timeout - try to get results
| Received 150 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
| Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=2462 MHz)
| Cancelling scan request
| Automatic auth_alg selection: 0x1
| WPA: using IEEE 802.11i/D3.0
| WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2
| WPA: using GTK WEP104
| WPA: using PTK TKIP
| WPA: using KEY_MGMT WPA-PSK
| WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02
| No keys have been configured - skip key clearing
| Setting authentication timeout: 5 sec 0 usec
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - EAP fail=0
| EAPOL: External notification - portControl=Auto
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=76
| Custom wireless event: 'Authenticate request (ex) to 00:60:B3:99:15:70  : ACCEPTED  (00)'
| Wireless event: cmd=0x8c02 len=76
| Custom wireless event: 'Authenticate request (ex) to 00:60:B3:99:15:70  : ACCEPTED  (00)'
| Wireless event: cmd=0x8b04 len=12
| Wireless event: cmd=0x8b1a len=20
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Wireless event: cmd=0x8c02 len=67
| Custom wireless event: 'Received a probe from client to 00:60:B3:99:15:70  (00)'
| Authentication with 00:00:00:00:00:00 timed out.
| Added BSSID 00:00:00:00:00:00 into blacklist
| No keys have been configured - skip key clearing
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| Setting scan request: 0 sec 0 usec
| Starting AP scan (broadcast SSID)
| Scan timeout - try to get results
| Received 150 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
| Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=2462 MHz)
| Cancelling scan request
| Automatic auth_alg selection: 0x1
| WPA: using IEEE 802.11i/D3.0
| WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2
| WPA: using GTK WEP104
| WPA: using PTK TKIP
| WPA: using KEY_MGMT WPA-PSK
| WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02
| No keys have been configured - sioctl[SIOCSIWSCAN{,EXT}]: Operation not supported
`----

Wieso will der keine Keys finden???

Debug-Ausgabe mit ipw Treiber:

,----
| ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported
| Initializing interface 'eth2' conf '/etc/wpa_supplicant.conf' driver 'ipw'
| Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
| Reading configuration file '/etc/wpa_supplicant.conf'
| ctrl_interface='/var/run/wpa_supplicant'
| ctrl_interface_group=0
| eapol_version=1
| ap_scan=1
| Priority group 0
|    id=0 ssid='pakulat'
| Initializing interface (2) 'eth2'
| EAPOL: SUPP_PAE entering state DISCONNECTED
| EAPOL: KEY_RX entering state NO_KEY_RECEIVE
| EAPOL: SUPP_BE entering state INITIALIZE
| EAP: EAP entering state DISABLED
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| wpa_driver_ipw_init is called
| Own MAC address: 00:04:23:7f:cf:f4
| wpa_driver_ipw_set_wpa: enabled=1
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_countermeasures: enabled=0
| wpa_driver_ipw_set_drop_unencrypted: enabled=1
| Setting scan request: 0 sec 100000 usec
| Wireless event: cmd=0x8b06 len=8
| Starting AP scan (specific SSID)
| Scan SSID - hexdump_ascii(len=7):
|      70 61 6b 75 6c 61 74                              pakulat         
| Failed to initiate AP scan.
| Setting scan request: 10 sec 0 usec
| Scan timeout - try to get results
| Received 275 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
| Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=0 MHz)
| Cancelling scan request
| Automatic auth_alg selection: 0x1
| wpa_driver_ipw_set_auth_alg: auth_alg=0x1
| WPA: using IEEE 802.11i/D3.0
| WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2
| WPA: using GTK WEP104
| WPA: using PTK TKIP
| WPA: using KEY_MGMT WPA-PSK
| WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02
| No keys have been configured - skip key clearing
| wpa_driver_ipw_set_drop_unencrypted: enabled=1
| Setting authentication timeout: 5 sec 0 usec
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - EAP fail=0
| EAPOL: External notification - portControl=Auto
| Wireless event: cmd=0x8b1a len=20
| Wireless event: cmd=0x8b15 len=20
| Wireless event: new AP: 00:60:b3:99:15:70
| Association event - clear replay counter
| Associated to a new BSS: BSSID=00:60:b3:99:15:70
| No keys have been configured - skip key clearing
| Associated with 00:60:b3:99:15:70
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - portEnabled=1
| EAPOL: SUPP_PAE entering state CONNECTING
| EAPOL: txStart
| WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
| EAPOL: SUPP_BE entering state IDLE
| EAP: EAP entering state INITIALIZE
| EAP: EAP entering state IDLE
| Setting authentication timeout: 10 sec 0 usec
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
| RX EAPOL from 00:60:b3:99:15:70
| Setting authentication timeout: 10 sec 0 usec
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=95
|   EAPOL-Key type=254
| WPA: RX message 1 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02
| WPA: Renewed SNonce - hexdump(len=32): af 04 de 0d 96 ec b2 ba 6f a4 11 6e 1f 3d 33 d6 d1 27 24 e7 e4 0b fb 54 60 7c 68 b3 f7 19 54 e8
| WPA: PMK - hexdump(len=32): [REMOVED]
| WPA: PTK - hexdump(len=64): [REMOVED]
| WPA: EAPOL-Key MIC - hexdump(len=16): 25 08 7f d7 d1 9c 20 b9 3f de 34 c7 40 1c e2 8b
| WPA: Sending EAPOL-Key 2/4
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=121
|   EAPOL-Key type=254
| WPA: RX message 3 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
| WPA: Sending EAPOL-Key 4/4
| WPA: Installing PTK to the driver.
| WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
| wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=108
|   EAPOL-Key type=254
| WPA: RX message 1 of Group Key Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: Group Key - hexdump(len=13): [REMOVED]
| WPA: Installing GTK to the driver (keyidx=0 tx=0).
| WPA: RSC - hexdump(len=0):
| wpa_driver_ipw_set_key: alg=WEP key_idx=0 set_tx=0 seq_len=0 key_len=13
| WPA: Sending EAPOL-Key 2/2
| WPA: Key negotiation completed with 00:60:b3:99:15:70 [PTK=TKIP GTK=WEP-104]
| Cancelling authentication timeout
| EAPOL: External notification - portValid=1
| EAPOL: External notification - EAP success=1
| EAPOL: SUPP_PAE entering state AUTHENTICATING
| EAPOL: SUPP_BE entering state SUCCESS
| EAPOL: SUPP_PAE entering state AUTHENTICATED
| EAPOL: SUPP_BE entering state IDLE
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
| Wireless event: cmd=0x8b15 len=20
| Wireless event: new AP: 00:00:00:00:00:00
| Setting scan request: 0 sec 100000 usec
| Added BSSID 00:60:b3:99:15:70 into blacklist
`----

Wieso macht er dass?

,----
| EAPOL: External notification - portEnabled=0
| EAPOL: SUPP_PAE entering state DISCONNECTED
| EAPOL: SUPP_BE entering state INITIALIZE
| EAP: EAP entering state DISABLED
| EAPOL: External notification - portValid=0
| EAPOL: External notification - EAP success=0
| Disconnect event - remove keys
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| Starting AP scan (broadcast SSID)
| Scan timeout - try to get results
| Received 276 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
`----

Um dann wieder von vorne Anzufangen??

,----
|    skip - blacklisted
| No APs found - clear blacklist and try again
| Removed BSSID 00:60:b3:99:15:70 from blacklist (clear)
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
`----

-- 
Bridge ahead.  Pay troll.



Reply to: