1 |
On 03/23/12 15:09, Taz wrote: |
2 |
> ппоробуй ему руками указать |
3 |
> ndiswrapper |
4 |
|
5 |
Похоже wext используется по умолчанию. Сейчас стали чаще дисконнекты |
6 |
происходить. Если запускаю руками, в дебаге: |
7 |
|
8 |
CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:4e:14:d0 completed (auth) |
9 |
[id=0 id_str=] |
10 |
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 |
11 |
74 72 6c 5f 31 38 35 31 30 2d 31 00 |
12 |
wpa_driver_wext_set_operstate: operstate 0->1 (UP) |
13 |
netlink: Operstate: linkmode=-1, operstate=6 |
14 |
EAPOL: External notification - portValid=1 |
15 |
EAPOL: External notification - EAP success=1 |
16 |
EAPOL: SUPP_PAE entering state AUTHENTICATING |
17 |
EAPOL: SUPP_BE entering state SUCCESS |
18 |
EAP: EAP entering state DISABLED |
19 |
EAPOL: SUPP_PAE entering state AUTHENTICATED |
20 |
EAPOL: Supplicant port status: Authorized |
21 |
EAPOL: SUPP_BE entering state IDLE |
22 |
EAPOL authentication completed successfully |
23 |
RX EAPOL from cc:5d:4e:4e:14:d0 |
24 |
IEEE 802.1X RX: version=1 type=3 length=95 |
25 |
EAPOL-Key type=2 |
26 |
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) |
27 |
key_length=16 key_data_length=0 |
28 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 |
29 |
key_nonce - hexdump(len=32): d3 bd 6d 2a 51 f0 31 0f 95 57 7e 02 55 |
30 |
07 63 ad fc f2 9b ce 27 c3 20 f2 38 60 1c 5d 43 b3 88 1d |
31 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
32 |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 |
33 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
34 |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
35 |
00 00 |
36 |
WPA: EAPOL-Key Replay Counter did not increase - dropping packet |
37 |
RX EAPOL from cc:5d:4e:4e:14:d0 |
38 |
IEEE 802.1X RX: version=1 type=3 length=95 |
39 |
EAPOL-Key type=2 |
40 |
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) |
41 |
key_length=16 key_data_length=0 |
42 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 |
43 |
key_nonce - hexdump(len=32): 59 e1 b6 36 3c 97 cd 35 28 c7 64 a5 2e |
44 |
98 68 8f 82 c1 b5 81 c6 53 44 73 91 29 14 81 4b 31 28 a0 |
45 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
46 |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 |
47 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
48 |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
49 |
00 00 |
50 |
|
51 |
WPA: EAPOL-Key Replay Counter did not increase - dropping packet |
52 |
RX ctrl_iface - hexdump_ascii(len=4): |
53 |
50 49 4e 47 PING |
54 |
RX EAPOL from cc:5d:4e:4e:14:d0 |
55 |
IEEE 802.1X RX: version=1 type=3 length=95 |
56 |
EAPOL-Key type=2 |
57 |
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) |
58 |
key_length=16 key_data_length=0 |
59 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 |
60 |
key_nonce - hexdump(len=32): de 96 af 09 a2 91 51 81 38 18 eb a3 9b |
61 |
e8 6b 4d 51 01 86 12 0e 24 79 d5 68 84 c2 2f de ec d8 ff |
62 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
63 |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 |
64 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
65 |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
66 |
00 00 |
67 |
State: COMPLETED -> 4WAY_HANDSHAKE |
68 |
WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:4e:14:d0 (ver=2) |
69 |
RSN: msg 1/4 key data - hexdump(len=0): |
70 |
WPA: Renewed SNonce - hexdump(len=32): bc db 7b dd 4a b5 dc e7 59 9b 21 |
71 |
a2 4c ba 25 71 8d 99 f5 bd 9b 98 18 0c a9 2a bd 64 f0 e3 df 7d |
72 |
WPA: PTK derivation - A1=00:16:44:ac:77:1b A2=cc:5d:4e:4e:14:d0 |
73 |
WPA: PMK - hexdump(len=32): [REMOVED] |
74 |
WPA: PTK - hexdump(len=48): [REMOVED] |
75 |
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 |
76 |
00 0f ac 04 01 00 00 0f ac 02 08 00 |
77 |
WPA: Sending EAPOL-Key 2/4 |
78 |
RX EAPOL from cc:5d:4e:4e:14:d0 |
79 |
IEEE 802.1X RX: version=1 type=3 length=175 |
80 |
EAPOL-Key type=2 |
81 |
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC |
82 |
Secure Encr) |
83 |
key_length=16 key_data_length=80 |
84 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 |
85 |
key_nonce - hexdump(len=32): de 96 af 09 a2 91 51 81 38 18 eb a3 9b |
86 |
e8 6b 4d 51 01 86 12 0e 24 79 d5 68 84 c2 2f de ec d8 ff |
87 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
88 |
key_rsc - hexdump(len=8): 0f 02 00 00 00 00 00 00 |
89 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
90 |
key_mic - hexdump(len=16): d2 4c b7 98 60 8b 2e 21 ae 2a cc 92 dc 30 |
91 |
c9 0e |
92 |
RSN: encrypted key data - hexdump(len=80): ec 9c 92 09 ca af 8f dc 8a 4f |
93 |
6f 92 3f 83 80 1b 7b 38 8d 2f ea 24 0b 45 43 fd 79 c6 b4 ff 1d b1 a8 45 |
94 |
b5 10 aa d5 df af a9 46 de 1f b4 ba 72 37 af 2f 1d fc 2c 33 bc 85 93 98 |
95 |
9e bb f4 03 d7 13 78 0c 22 bf 91 a5 eb 8e 8e 80 e7 30 7a 52 59 28 |
96 |
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] |
97 |
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE |
98 |
WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:4e:14:d0 (ver=2) |
99 |
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f |
100 |
ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 ad 3e |
101 |
8a bf dd 14 a3 44 09 7a 52 90 58 43 c9 2d fc ca 56 f6 e4 2c a3 48 1a e0 |
102 |
99 27 6d bd 05 f1 dd 00 00 00 00 00 |
103 |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 |
104 |
00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 |
105 |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] |
106 |
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results |
107 |
Received 549 bytes of scan results (1 BSSes) |
108 |
BSS: Start scan result update 2 |
109 |
WPA: Could not find AP from the scan results |
110 |
WPA: Sending EAPOL-Key 4/4 |
111 |
WPA: Installing PTK to the driver. |
112 |
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 |
113 |
EAPOL: External notification - portValid=1 |
114 |
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE |
115 |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] |
116 |
WPA: Group Key - hexdump(len=32): [REMOVED] |
117 |
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32). |
118 |
WPA: RSC - hexdump(len=6): 0f 02 00 00 00 00 |
119 |
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 |
120 |
WPA: Key negotiation completed with cc:5d:4e:4e:14:d0 [PTK=CCMP GTK=TKIP] |
121 |
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 |
122 |
74 72 6c 5f 31 38 35 31 30 2d 31 00 |
123 |
Cancelling authentication timeout |
124 |
State: GROUP_HANDSHAKE -> COMPLETED |
125 |
EAPOL: External notification - portValid=1 |
126 |
EAPOL: External notification - EAP success=1 |
127 |
EAP: EAP entering state DISABLED |
128 |
|
129 |
|
130 |
т.е. картина на AP следующая: |
131 |
Приконнектился, 3-6 сек и дисконнект. И так по кругу. Смущает |
132 |
|
133 |
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results |
134 |
Received 549 bytes of scan results (1 BSSes) |
135 |
BSS: Start scan result update 2 |
136 |
WPA: Could not find AP from the scan results |
137 |
|
138 |
Броадкасты SSID отключены на точке. |
139 |
Мистика какая-то... |