Gentoo Archives: gentoo-user-ru

From: Sergey Kobzar <sergey.kobzar@××××.ru>
To: gentoo-user-ru@l.g.o
Subject: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] wpa_supplicant не соединяется с AP
Date: Fri, 23 Mar 2012 13:35:30
Message-Id: 4F6C7BFA.2050709@mail.ru
In Reply to: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] Re: [gentoo-user-ru] wpa_supplicant не соединяется с AP by Sergey Kobzar
1 On 03/23/12 15:32, Sergey Kobzar wrote:
2 > On 03/23/12 15:09, Taz wrote:
3 >> ппоробуй ему руками указать
4 >> ndiswrapper
5 >
6 > Похоже wext используется по умолчанию. Сейчас стали чаще дисконнекты
7 > происходить. Если запускаю руками, в дебаге:
8 >
9 > CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:4e:14:d0 completed (auth)
10 > [id=0 id_str=]
11 > CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
12 > 74 72 6c 5f 31 38 35 31 30 2d 31 00
13 > wpa_driver_wext_set_operstate: operstate 0->1 (UP)
14 > netlink: Operstate: linkmode=-1, operstate=6
15 > EAPOL: External notification - portValid=1
16 > EAPOL: External notification - EAP success=1
17 > EAPOL: SUPP_PAE entering state AUTHENTICATING
18 > EAPOL: SUPP_BE entering state SUCCESS
19 > EAP: EAP entering state DISABLED
20 > EAPOL: SUPP_PAE entering state AUTHENTICATED
21 > EAPOL: Supplicant port status: Authorized
22 > EAPOL: SUPP_BE entering state IDLE
23 > EAPOL authentication completed successfully
24 > RX EAPOL from cc:5d:4e:4e:14:d0
25 > IEEE 802.1X RX: version=1 type=3 length=95
26 > EAPOL-Key type=2
27 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
28 > key_length=16 key_data_length=0
29 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
30 > key_nonce - hexdump(len=32): d3 bd 6d 2a 51 f0 31 0f 95 57 7e 02 55 07
31 > 63 ad fc f2 9b ce 27 c3 20 f2 38 60 1c 5d 43 b3 88 1d
32 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
33 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
34 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
35 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
36 > WPA: EAPOL-Key Replay Counter did not increase - dropping packet
37 > RX EAPOL from cc:5d:4e:4e:14:d0
38 > IEEE 802.1X RX: version=1 type=3 length=95
39 > EAPOL-Key type=2
40 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
41 > key_length=16 key_data_length=0
42 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
43 > key_nonce - hexdump(len=32): 59 e1 b6 36 3c 97 cd 35 28 c7 64 a5 2e 98
44 > 68 8f 82 c1 b5 81 c6 53 44 73 91 29 14 81 4b 31 28 a0
45 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
46 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
47 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
48 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
49 >
50 > WPA: EAPOL-Key Replay Counter did not increase - dropping packet
51 > RX ctrl_iface - hexdump_ascii(len=4):
52 > 50 49 4e 47 PING
53 > RX EAPOL from cc:5d:4e:4e:14:d0
54 > IEEE 802.1X RX: version=1 type=3 length=95
55 > EAPOL-Key type=2
56 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
57 > key_length=16 key_data_length=0
58 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
59 > key_nonce - hexdump(len=32): de 96 af 09 a2 91 51 81 38 18 eb a3 9b e8
60 > 6b 4d 51 01 86 12 0e 24 79 d5 68 84 c2 2f de ec d8 ff
61 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
62 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
63 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
64 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
65 > State: COMPLETED -> 4WAY_HANDSHAKE
66 > WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:4e:14:d0 (ver=2)
67 > RSN: msg 1/4 key data - hexdump(len=0):
68 > WPA: Renewed SNonce - hexdump(len=32): bc db 7b dd 4a b5 dc e7 59 9b 21
69 > a2 4c ba 25 71 8d 99 f5 bd 9b 98 18 0c a9 2a bd 64 f0 e3 df 7d
70 > WPA: PTK derivation - A1=00:16:44:ac:77:1b A2=cc:5d:4e:4e:14:d0
71 > WPA: PMK - hexdump(len=32): [REMOVED]
72 > WPA: PTK - hexdump(len=48): [REMOVED]
73 > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
74 > 00 0f ac 04 01 00 00 0f ac 02 08 00
75 > WPA: Sending EAPOL-Key 2/4
76 > RX EAPOL from cc:5d:4e:4e:14:d0
77 > IEEE 802.1X RX: version=1 type=3 length=175
78 > EAPOL-Key type=2
79 > key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure
80 > Encr)
81 > key_length=16 key_data_length=80
82 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
83 > key_nonce - hexdump(len=32): de 96 af 09 a2 91 51 81 38 18 eb a3 9b e8
84 > 6b 4d 51 01 86 12 0e 24 79 d5 68 84 c2 2f de ec d8 ff
85 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
86 > key_rsc - hexdump(len=8): 0f 02 00 00 00 00 00 00
87 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
88 > key_mic - hexdump(len=16): d2 4c b7 98 60 8b 2e 21 ae 2a cc 92 dc 30 c9 0e
89 > RSN: encrypted key data - hexdump(len=80): ec 9c 92 09 ca af 8f dc 8a 4f
90 > 6f 92 3f 83 80 1b 7b 38 8d 2f ea 24 0b 45 43 fd 79 c6 b4 ff 1d b1 a8 45
91 > b5 10 aa d5 df af a9 46 de 1f b4 ba 72 37 af 2f 1d fc 2c 33 bc 85 93 98
92 > 9e bb f4 03 d7 13 78 0c 22 bf 91 a5 eb 8e 8e 80 e7 30 7a 52 59 28
93 > WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
94 > State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
95 > WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:4e:14:d0 (ver=2)
96 > WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f
97 > ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 ad 3e
98 > 8a bf dd 14 a3 44 09 7a 52 90 58 43 c9 2d fc ca 56 f6 e4 2c a3 48 1a e0
99 > 99 27 6d bd 05 f1 dd 00 00 00 00 00
100 > WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02
101 > 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
102 > WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
103 > WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
104 > Received 549 bytes of scan results (1 BSSes)
105 > BSS: Start scan result update 2
106 > WPA: Could not find AP from the scan results
107 > WPA: Sending EAPOL-Key 4/4
108 > WPA: Installing PTK to the driver.
109 > wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
110 > EAPOL: External notification - portValid=1
111 > State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
112 > RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
113 > WPA: Group Key - hexdump(len=32): [REMOVED]
114 > WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
115 > WPA: RSC - hexdump(len=6): 0f 02 00 00 00 00
116 > wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
117 > WPA: Key negotiation completed with cc:5d:4e:4e:14:d0 [PTK=CCMP GTK=TKIP]
118 > CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
119 > 74 72 6c 5f 31 38 35 31 30 2d 31 00
120 > Cancelling authentication timeout
121 > State: GROUP_HANDSHAKE -> COMPLETED
122 > EAPOL: External notification - portValid=1
123 > EAPOL: External notification - EAP success=1
124 > EAP: EAP entering state DISABLED
125 >
126 >
127 > т.е. картина на AP следующая:
128 > Приконнектился, 3-6 сек и дисконнект. И так по кругу. Смущает
129 >
130 > WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
131 > Received 549 bytes of scan results (1 BSSes)
132 > BSS: Start scan result update 2
133 > WPA: Could not find AP from the scan results
134 >
135 > Броадкасты SSID отключены на точке.
136 > Мистика какая-то...
137
138 Успешное подключение выглядитвот так:
139
140 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
141 WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:4e:14:d0 (ver=2)
142 WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f
143 ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 3b c3
144 53 dc 4a 18 be 9d ad c8 3e df da e2 75 43 cd 2d 9f 25 67 d9 1e 51 22 6f
145 e9 60 ba 4b 5e 6c dd 00 00 00 00 00
146 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02
147 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
148 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
149 WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
150 Received 581 bytes of scan results (1 BSSes)
151 BSS: Start scan result update 1
152 BSS: Add new id 0 BSSID cc:5d:4e:4e:14:d0 SSID ''
153 CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
154 74 72 6c 5f 31 38 36 39 37 2d 31 00
155 WPA: Could not find AP from the scan results
156 WPA: Sending EAPOL-Key 4/4
157 WPA: Installing PTK to the driver.
158 wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
159 EAPOL: External notification - portValid=1
160 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
161 RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
162 WPA: Group Key - hexdump(len=32): [REMOVED]
163 WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
164 WPA: RSC - hexdump(len=6): 00 01 00 00 00 00
165 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
166 WPA: Key negotiation completed with cc:5d:4e:4e:14:d0 [PTK=CCMP GTK=TKIP]
167 CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
168 74 72 6c 5f 31 38 36 39 37 2d 31 00
169 Cancelling authentication timeout
170 State: GROUP_HANDSHAKE -> COMPLETED
171 CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:4e:14:d0 completed (auth)
172 [id=0 id_str=]
173 CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
174 74 72 6c 5f 31 38 36 39 37 2d 31 00
175 wpa_driver_wext_set_operstate: operstate 0->1 (UP)
176 netlink: Operstate: linkmode=-1, operstate=6
177 EAPOL: External notification - portValid=1
178 EAPOL: External notification - EAP success=1
179 EAPOL: SUPP_PAE entering state AUTHENTICATING
180 EAPOL: SUPP_BE entering state SUCCESS
181 EAP: EAP entering state DISABLED
182 EAPOL: SUPP_PAE entering state AUTHENTICATED
183 EAPOL: Supplicant port status: Authorized
184 EAPOL: SUPP_BE entering state IDLE
185 EAPOL authentication completed successfully
186 EAPOL: startWhen --> 0
187 EAPOL: disable timer tick
188 RX ctrl_iface - hexdump_ascii(len=4):
189 50 49 4e 47 PING
190 RX ctrl_iface - hexdump_ascii(len=4):
191 50 49 4e 47 PING
192 RX ctrl_iface - hexdump_ascii(len=4):
193 50 49 4e 47 PING
194 RX ctrl_iface - hexdump_ascii(len=4):
195 50 49 4e 47 PING
196 RX ctrl_iface - hexdump_ascii(len=4):
197 50 49 4e 47 PING
198 RX ctrl_iface - hexdump_ascii(len=4):
199 50 49 4e 47 PING
200 ...

Replies