1 |
it's my fail |
2 |
i use wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf |
3 |
but correct is |
4 |
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf |
5 |
|
6 |
and i get |
7 |
|
8 |
|
9 |
Initializing interface 'wlan0' conf |
10 |
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' |
11 |
bridge 'N/A' |
12 |
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> |
13 |
'/etc/wpa_supplicant/wpa_supplicant.conf' |
14 |
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' |
15 |
ctrl_interface='/var/run/wpa_supplicant' |
16 |
ctrl_interface_group='0' |
17 |
ap_scan=1 |
18 |
Priority group 0 |
19 |
id=0 ssid='huang' |
20 |
WEXT: cfg80211-based driver detected |
21 |
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf |
22 |
capabilities: key_mgmt 0xf enc 0xf flags 0x0 |
23 |
netlink: Operstate: linkmode=1, operstate=5 |
24 |
Own MAC address: f0:7b:cb:16:52:ec |
25 |
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 |
26 |
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 |
27 |
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 |
28 |
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 |
29 |
wpa_driver_wext_set_countermeasures |
30 |
RSN: flushing PMKID list in the driver |
31 |
Setting scan request: 0 sec 100000 usec |
32 |
EAPOL: SUPP_PAE entering state DISCONNECTED |
33 |
EAPOL: Supplicant port status: Unauthorized |
34 |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE |
35 |
EAPOL: SUPP_BE entering state INITIALIZE |
36 |
EAP: EAP entering state DISABLED |
37 |
EAPOL: Supplicant port status: Unauthorized |
38 |
EAPOL: Supplicant port status: Unauthorized |
39 |
ctrl_interface_group=0 |
40 |
Added interface wlan0 |
41 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
42 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
43 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
44 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
45 |
Wireless event: cmd=0x8b06 len=8 |
46 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
47 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
48 |
Wireless event: cmd=0x8b1a len=8 |
49 |
Trying to get current scan results first without requesting a new scan to |
50 |
speed up initial association |
51 |
Received 0 bytes of scan results (0 BSSes) |
52 |
BSS: Start scan result update 1 |
53 |
Cached scan results are empty - not posting |
54 |
Selecting BSS from priority group 0 |
55 |
Try to find WPA-enabled AP |
56 |
Try to find non-WPA AP |
57 |
No suitable network found |
58 |
Setting scan request: 0 sec 0 usec |
59 |
State: DISCONNECTED -> SCANNING |
60 |
Starting AP scan for wildcard SSID |
61 |
Scan requested (ret=0) - scan timeout 5 seconds |
62 |
EAPOL: disable timer tick |
63 |
EAPOL: Supplicant port status: Unauthorized |
64 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
65 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
66 |
Wireless event: cmd=0x8b19 len=8 |
67 |
Received 2504 bytes of scan results (6 BSSes) |
68 |
BSS: Start scan result update 2 |
69 |
BSS: Add new id 0 BSSID d8:5d:4c:30:7b:82 SSID 'TP-LINK_8G' |
70 |
BSS: Add new id 1 BSSID 00:22:3f:a5:ab:f4 SSID 'huang' |
71 |
BSS: Add new id 2 BSSID 74:ea:3a:69:97:fa SSID 'CHINACRC' |
72 |
BSS: Add new id 3 BSSID d8:5d:4c:41:5d:04 SSID 'TP-LINK_12-A' |
73 |
BSS: Add new id 4 BSSID 00:16:01:f6:fe:53 SSID 'AOSS-2663879CE43' |
74 |
BSS: Add new id 5 BSSID 00:0a:eb:89:56:67 SSID 'Suen wireless' |
75 |
New scan results available |
76 |
Selecting BSS from priority group 0 |
77 |
Try to find WPA-enabled AP |
78 |
0: d8:5d:4c:30:7b:82 ssid='TP-LINK_8G' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 |
79 |
skip - SSID mismatch |
80 |
1: 00:22:3f:a5:ab:f4 ssid='huang' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 |
81 |
selected based on RSN IE |
82 |
selected WPA AP 00:22:3f:a5:ab:f4 ssid='huang' |
83 |
Trying to associate with 00:22:3f:a5:ab:f4 (SSID='huang' freq=2412 MHz) |
84 |
Cancelling scan request |
85 |
WPA: clearing own WPA/RSN IE |
86 |
Automatic auth_alg selection: 0x1 |
87 |
RSN: using IEEE 802.11i/D9.0 |
88 |
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 |
89 |
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 |
90 |
00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 |
91 |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac |
92 |
04 00 0f ac 02 01 00 00 0f ac 02 00 00 |
93 |
WPA: using GTK TKIP |
94 |
WPA: using PTK CCMP |
95 |
WPA: using KEY_MGMT WPA-PSK |
96 |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 |
97 |
00 0f ac 04 01 00 00 0f ac 02 00 00 |
98 |
No keys have been configured - skip key clearing |
99 |
State: SCANNING -> ASSOCIATING |
100 |
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) |
101 |
netlink: Operstate: linkmode=-1, operstate=5 |
102 |
wpa_driver_wext_associate |
103 |
wpa_driver_wext_set_drop_unencrypted |
104 |
wpa_driver_wext_set_psk |
105 |
Setting authentication timeout: 10 sec 0 usec |
106 |
EAPOL: External notification - EAP success=0 |
107 |
EAPOL: Supplicant port status: Unauthorized |
108 |
EAPOL: External notification - EAP fail=0 |
109 |
EAPOL: Supplicant port status: Unauthorized |
110 |
EAPOL: External notification - portControl=Auto |
111 |
EAPOL: Supplicant port status: Unauthorized |
112 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
113 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
114 |
Wireless event: cmd=0x8b1a len=8 |
115 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
116 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
117 |
Wireless event: cmd=0x8b06 len=8 |
118 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
119 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
120 |
Wireless event: cmd=0x8b04 len=12 |
121 |
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) |
122 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
123 |
Wireless event: cmd=0x8b1a len=13 |
124 |
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) |
125 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
126 |
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) |
127 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
128 |
Wireless event: cmd=0x8c08 len=61 |
129 |
AssocResp IE wireless event - hexdump(len=53): 01 08 82 84 8b 0c 12 96 18 24 |
130 |
32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 |
131 |
43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f |
132 |
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) |
133 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
134 |
Wireless event: cmd=0x8b15 len=20 |
135 |
Wireless event: new AP: 00:22:3f:a5:ab:f4 |
136 |
Association info event |
137 |
resp_ies - hexdump(len=53): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c |
138 |
dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f |
139 |
00 dd 09 00 03 7f 01 01 00 00 ff 7f |
140 |
State: ASSOCIATING -> ASSOCIATED |
141 |
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) |
142 |
netlink: Operstate: linkmode=-1, operstate=5 |
143 |
Associated to a new BSS: BSSID=00:22:3f:a5:ab:f4 |
144 |
No keys have been configured - skip key clearing |
145 |
Associated with 00:22:3f:a5:ab:f4 |
146 |
WPA: Association event - clear replay counter |
147 |
WPA: Clear old PTK |
148 |
EAPOL: External notification - portEnabled=0 |
149 |
EAPOL: Supplicant port status: Unauthorized |
150 |
EAPOL: External notification - portValid=0 |
151 |
EAPOL: Supplicant port status: Unauthorized |
152 |
EAPOL: External notification - EAP success=0 |
153 |
EAPOL: Supplicant port status: Unauthorized |
154 |
EAPOL: External notification - portEnabled=1 |
155 |
EAPOL: SUPP_PAE entering state CONNECTING |
156 |
EAPOL: enable timer tick |
157 |
EAPOL: SUPP_BE entering state IDLE |
158 |
Setting authentication timeout: 10 sec 0 usec |
159 |
Cancelling scan request |
160 |
RX EAPOL from 00:22:3f:a5:ab:f4 |
161 |
Setting authentication timeout: 10 sec 0 usec |
162 |
IEEE 802.1X RX: version=1 type=3 length=95 |
163 |
EAPOL-Key type=2 |
164 |
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) |
165 |
key_length=16 key_data_length=0 |
166 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 |
167 |
key_nonce - hexdump(len=32): 8d a4 44 fa 77 6e 9d cf 74 cf dd ee f4 ca 9a |
168 |
8e 02 7c 13 8a 4d dd f9 e5 b2 b3 79 1c 66 41 85 45 |
169 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
170 |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 |
171 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
172 |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
173 |
State: ASSOCIATED -> 4WAY_HANDSHAKE |
174 |
WPA: RX message 1 of 4-Way Handshake from 00:22:3f:a5:ab:f4 (ver=2) |
175 |
RSN: msg 1/4 key data - hexdump(len=0): |
176 |
WPA: Renewed SNonce - hexdump(len=32): 9c d0 ea 5b 04 23 cb 31 df ec b5 ff |
177 |
60 15 10 a1 39 22 14 8f 73 a8 0b 1a 45 43 3c c7 1e 6a 91 e0 |
178 |
WPA: PTK derivation - A1=f0:7b:cb:16:52:ec A2=00:22:3f:a5:ab:f4 |
179 |
WPA: PMK - hexdump(len=32): [REMOVED] |
180 |
WPA: PTK - hexdump(len=48): [REMOVED] |
181 |
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 |
182 |
0f ac 04 01 00 00 0f ac 02 00 00 |
183 |
WPA: Sending EAPOL-Key 2/4 |
184 |
RX EAPOL from 00:22:3f:a5:ab:f4 |
185 |
IEEE 802.1X RX: version=1 type=3 length=199 |
186 |
EAPOL-Key type=2 |
187 |
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure |
188 |
Encr) |
189 |
key_length=16 key_data_length=104 |
190 |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 |
191 |
key_nonce - hexdump(len=32): 8d a4 44 fa 77 6e 9d cf 74 cf dd ee f4 ca 9a |
192 |
8e 02 7c 13 8a 4d dd f9 e5 b2 b3 79 1c 66 41 85 45 |
193 |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
194 |
key_rsc - hexdump(len=8): 4b 00 00 00 00 00 00 00 |
195 |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 |
196 |
key_mic - hexdump(len=16): 94 9b 31 f7 68 fb e7 8b ea 1b ca 27 0a 90 6b 52 |
197 |
RSN: encrypted key data - hexdump(len=104): 3e 9f 34 00 53 06 de 7f 6f 1b af |
198 |
d9 e7 ee c4 f3 03 23 a5 4b ff f5 ed 60 02 01 62 6e 53 ba eb f2 7c 0e 05 c1 |
199 |
8e 0a 66 7a cd 12 fb 45 54 c9 00 6a 5f eb 43 01 19 14 fa b1 0f a4 a9 60 90 |
200 |
9c 1f 3d bf 68 21 0f 5a 37 94 38 61 4d 58 4d 52 b8 06 b0 ef 95 25 48 7b ad |
201 |
c5 b3 44 6f a2 84 e2 25 27 da 98 e5 46 30 54 50 1c 19 |
202 |
WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] |
203 |
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE |
204 |
WPA: RX message 3 of 4-Way Handshake from 00:22:3f:a5:ab:f4 (ver=2) |
205 |
WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 |
206 |
00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 |
207 |
00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 44 47 |
208 |
1c 66 20 ef 60 c0 62 56 3c e4 32 bd 8f ed f4 d1 ff 6f 11 94 d6 db 4c 44 3a |
209 |
2b b4 84 51 93 dd 00 |
210 |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 |
211 |
0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 |
212 |
WPA: WPA IE in EAPOL-Key - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 |
213 |
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 |
214 |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] |
215 |
WPA: Sending EAPOL-Key 4/4 |
216 |
WPA: Installing PTK to the driver. |
217 |
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 |
218 |
EAPOL: External notification - portValid=1 |
219 |
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE |
220 |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] |
221 |
WPA: Group Key - hexdump(len=32): [REMOVED] |
222 |
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). |
223 |
WPA: RSC - hexdump(len=6): 4b 00 00 00 00 00 |
224 |
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 |
225 |
WPA: Key negotiation completed with 00:22:3f:a5:ab:f4 [PTK=CCMP GTK=TKIP] |
226 |
Cancelling authentication timeout |
227 |
State: GROUP_HANDSHAKE -> COMPLETED |
228 |
CTRL-EVENT-CONNECTED - Connection to 00:22:3f:a5:ab:f4 completed (auth) |
229 |
[id=0 id_str=] |
230 |
wpa_driver_wext_set_operstate: operstate 0->1 (UP) |
231 |
netlink: Operstate: linkmode=-1, operstate=6 |
232 |
EAPOL: External notification - portValid=1 |
233 |
EAPOL: External notification - EAP success=1 |
234 |
EAPOL: SUPP_PAE entering state AUTHENTICATING |
235 |
EAPOL: SUPP_BE entering state SUCCESS |
236 |
EAP: EAP entering state DISABLED |
237 |
EAPOL: SUPP_PAE entering state AUTHENTICATED |
238 |
EAPOL: Supplicant port status: Authorized |
239 |
EAPOL: SUPP_BE entering state IDLE |
240 |
EAPOL authentication completed successfully |
241 |
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) |
242 |
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added |
243 |
EAPOL: startWhen --> 0 |
244 |
EAPOL: disable timer tick |
245 |
CTRL-EVENT-TERMINATING - signal 2 received |
246 |
Removing interface wlan0 |
247 |
wpa_driver_wext_deauthenticate |
248 |
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 |
249 |
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 |
250 |
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 |
251 |
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 |
252 |
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 |
253 |
State: COMPLETED -> DISCONNECTED |
254 |
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) |
255 |
netlink: Operstate: linkmode=-1, operstate=5 |
256 |
EAPOL: External notification - portEnabled=0 |
257 |
EAPOL: SUPP_PAE entering state DISCONNECTED |
258 |
EAPOL: Supplicant port status: Unauthorized |
259 |
EAPOL: SUPP_BE entering state INITIALIZE |
260 |
EAPOL: Supplicant port status: Unauthorized |
261 |
EAPOL: External notification - portValid=0 |
262 |
EAPOL: Supplicant port status: Unauthorized |
263 |
EAPOL: External notification - EAP success=0 |
264 |
EAPOL: Supplicant port status: Unauthorized |
265 |
wpa_driver_wext_set_countermeasures |
266 |
No keys have been configured - skip key clearing |
267 |
BSS: Remove id 0 BSSID d8:5d:4c:30:7b:82 SSID 'TP-LINK_8G' |
268 |
BSS: Remove id 1 BSSID 00:22:3f:a5:ab:f4 SSID 'huang' |
269 |
BSS: Remove id 2 BSSID 74:ea:3a:69:97:fa SSID 'CHINACRC' |
270 |
BSS: Remove id 3 BSSID d8:5d:4c:41:5d:04 SSID 'TP-LINK_12-A' |
271 |
BSS: Remove id 4 BSSID 00:16:01:f6:fe:53 SSID 'AOSS-2663879CE43' |
272 |
BSS: Remove id 5 BSSID 00:0a:eb:89:56:67 SSID 'Suen wireless' |
273 |
Cancelling scan request |
274 |
Cancelling authentication timeout |
275 |
netlink: Operstate: linkmode=0, operstate=6 |
276 |
|
277 |
is that OK? |
278 |
|
279 |
2011/1/14 Vortex 3 <vortex3@×××××.com> |
280 |
|
281 |
> Pete, |
282 |
> |
283 |
> |
284 |
>> wpa_supplicant_wlan0="-Dmadwifi" |
285 |
>> |
286 |
> |
287 |
> From your previous message, your are using the "madwifi" driver. However, |
288 |
> you are executing |
289 |
> |
290 |
> |
291 |
> wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf |
292 |
>> |
293 |
> |
294 |
> Where now you specify the "wext" driver. Maybe that's the problem (?) |
295 |
> |
296 |
|
297 |
|
298 |
|
299 |
-- |
300 |
pete_doherty |