1 |
On Tuesday, 30 August 2022 23:26:00 BST Walter Dnes wrote: |
2 |
> I'm having problems, even running as root. As per the previous |
3 |
> message, the system is detecting the hardware, but wpa_aupplicant cannot |
4 |
> get going. I have a minimal /etc/wpa_supplicant/wpa_supplicant.conf |
5 |
> |
6 |
> ctrl_interface=/var/run/wpa_supplicant |
7 |
> update_config=1 |
8 |
|
9 |
If you have enabled the wheel group and your user is a member of this group, |
10 |
then you won't need to run things as root: |
11 |
|
12 |
DIR=/var/run/wpa_supplicant GROUP=wheel |
13 |
DIR=/var/run/wpa_supplicant GROUP=0 |
14 |
# (group can be either group name or gid) |
15 |
|
16 |
Alternatively, you can add your users gid instead. |
17 |
|
18 |
|
19 |
> From https://wiki.gentoo.org/wiki/Wpa_supplicant#Using_wpa_cli the |
20 |
> command for debugging is... |
21 |
> |
22 |
> wpa_supplicant -Dnl80211 -iwlan0 -C/var/run/wpa_supplicant/ |
23 |
> -c/etc/wpa_supplicant/wpa_supplicant.conf -dd |
24 |
> |
25 |
> ...to which I appended ">>logfile.txt 2>&1" to grab all output. I |
26 |
> waited for a minute or so, and got the logfile which I've attached. Any |
27 |
> ideas? |
28 |
|
29 |
To state the obvious, this shows your key is not accepted: |
30 |
|
31 |
nl80211: set_key failed; err=-22 Invalid argument |
32 |
|
33 |
Also I can see: |
34 |
|
35 |
key_len=0 |
36 |
|
37 |
Does this message mean you are using no passwd authentication? If so you have |
38 |
to state explicitly: |
39 |
|
40 |
set_network 0 key_mgmt NONE |
41 |
|
42 |
in wpa_cli when you try to authenticate with your AP, or in /etc/ |
43 |
wpa_supplicant/wpa_supplicant.conf add a fall back configuration at the end of |
44 |
the file for all open APs: |
45 |
|
46 |
network={ |
47 |
key_mgmt=NONE |
48 |
} |
49 |
|
50 |
You can add BSSID, SSID to the above if you only want to use no authentication |
51 |
with a specific AP rather than anything which might be within range. |
52 |
|
53 |
BTW, key and passphrase are not the same thing. A passphrase must be entered |
54 |
in quotations, or use wpa_passphrase to generate the preshared key from it: |
55 |
|
56 |
~ $ wpa_passphrase MY_SSID "My secret passphrase" |
57 |
network={ |
58 |
ssid="MY_SSID" |
59 |
#psk="My secret passphrase" |
60 |
psk=f90ff73cefa452385366f5278f64914fa832b61a5225d3c78dcd4291061b56a1 |
61 |
} |