You are not logged in.
I can't understand why I can't connect to wpa_cli interface, even after the successful internet connection was established. So there is what I did:
> sudo su
> ip link set wlp10s0b1 up
> wpa_supplicant -B -D nl80211,wext -i wlp10s0b1 -c <(wpa_passphrase name pass)
> dhcpcd wlp10s0b1
# from here internet works!
> wpa_cli
wpa_cli v2.5
Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi> and contributors
...
Interactive mode
Could not connect to wpa_supplicant: (nil) - re-trying
As you can see at the end - wpa_cli fails. I've read one topic regarding to the problem at Stackoverflow: http://unix.stackexchange.com/questions … supplicant, but unfortunately it didn't help me. Any ideas?
Last edited by timfayz (2016-02-13 13:53:24)
Offline
Try wpa_cli -i wlp10s0b1
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way
Offline
Already tried, the same error.
Offline
In your wpa_supplicant configuration file add these lines:
update_config=1
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
Your user will need to be in the "wheel" group.
It is also possible to use "GID=$GID" instead -- see the comments in the stock /etc/wpa_supplicant/wpa_supplicant.conf file.
EDIT: Sorry, you're not using a configuration file, are you?
Create one with wpa_passphrase(8):
# wpa_passphrase $SSID $PASSWORD > /full/path/to/configuration/file
Then call the path to the file in the wpa_supplicant(8) command using the "-c" flag.
EDIT: BTW this is pretty much identical to the solution given in your linked thread
Last edited by Head_on_a_Stick (2016-02-12 20:26:45)
Para todos todo, para nosotros nada
Offline
Something new..After your suggestion, I did the following:
[root@timur-laptop timur]# groups timur
wheel audio timur
[root@timur-laptop timur]# cat /home/timur/.config/wpa_supplicant.conf
update_config=1
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
network={
ssid="Hangglide"
#psk="passcode"
psk=edc369d51cc8a663393dc57990838c7c347c083286d74306084a146037bf1f50
}
[root@timur-laptop timur]# wpa_supplicant -i wlp10s0b1 -B -Dn180211,wext -c/home/timur/.config/wpa_supplicant.conf
Successfully initialized wpa_supplicant
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
[root@timur-laptop timur]# wpa_cli
wpa_cli v2.5
Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi> and contributors
This software may be distributed under the terms of the BSD license.
See README for more details.
Selected interface 'wlp10s0b1'
Interactive mode
<3>Authentication with 20:4e:7f:3b:86:1d timed out.
<3>CTRL-EVENT-DISCONNECTED bssid=20:4e:7f:3b:86:1d reason=3 locally_generated=1
<3>WPA: 4-Way Handshake failed - pre-shared key may be incorrect
<3>CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Hangglide" auth_failures=1 duration=10 reason=WRONG_KEY
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>CTRL-EVENT-DISCONNECTED bssid=20:4e:7f:3b:86:1d reason=3 locally_generated=1
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>CTRL-EVENT-DISCONNECTED bssid=20:4e:7f:3b:86:1d reason=3 locally_generated=1
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>CTRL-EVENT-DISCONNECTED bssid=20:4e:7f:3b:86:1d reason=3 locally_generated=1
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>CTRL-EVENT-SSID-REENABLED id=0 ssid="Hangglide"
<3>Trying to associate with 20:4e:7f:3b:86:1d (SSID='Hangglide' freq=2422 MHz)
<3>Association request to the driver failed
<3>Associated with 20:4e:7f:3b:86:1d
<3>CTRL-EVENT-DISCONNECTED bssid=20:4e:7f:3b:86:1d reason=0
<3>CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Hangglide" auth_failures=2 duration=23 reason=CONN_FAILED
<3>CTRL-EVENT-SCAN-FAILED ret=-1 retry=1
<3>CTRL-EVENT-SCAN-RESULTS
....
The result is no internet connection. Had I something missed?
Last edited by timfayz (2016-02-13 09:59:35)
Offline
Wierd
I tried my suggestion before posting and it worked fine in my system.
Run the `wpa_supplicant` command again but replace the "-B" flag with "-dd" to get a more verbose output.
Just to check: you did replace $PASSWORD with your actual password, right?
Does the wpa_supplicant configuration file allow a connection if you remove the two lines I suggested that you add?
Finally, try creating the configuration file as root and use a file in /etc rather than $HOME
Para todos todo, para nosotros nada
Offline
I double checked my pass, but it's correct.
Does the wpa_supplicant configuration file allow a connection if you remove the two lines I suggested that you add?
Finally, try creating the configuration file as root and use a file in /etc rather than $HOME
Tried - the same.
So here is the loooong output of using -dd flag:
[root@timur-laptop timur]# wpa_supplicant -dd -Dn180211,wext -i wlp10s0b1 -c/home/timur/.config/wpa_supplicant.conf
wpa_supplicant v2.5
Successfully initialized wpa_supplicant
Initializing interface 'wlp10s0b1' conf '/home/timur/.config/wpa_supplicant.conf' driver 'n180211,wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/timur/.config/wpa_supplicant.conf' -> '/home/timur/.config/wpa_supplicant.conf'
Reading configuration file '/home/timur/.config/wpa_supplicant.conf'
update_config=1
ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=wheel'
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=9):
48 61 6e 67 67 6c 69 64 65 Hangglide
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='Hangglide'
WEXT: cfg80211-based driver detected
wext: interface wlp10s0b1 phy: phy0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=9 type=2 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0x1f flags 0x0
WEXT: Driver: brcmsmac
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Add interface wlp10s0b1 to a new radio phy0
wlp10s0b1: Own MAC address: c0:18:85:49:ae:94
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlp10s0b1: RSN: flushing PMKID list in the driver
wlp10s0b1: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp10s0b1: WPS: UUID based on MAC address: 4fc09d5a-bacc-5514-9fe3-6171763ff742
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=10 (from group name 'wheel')
wlp10s0b1: Added interface wlp10s0b1
wlp10s0b1: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
wlp10s0b1: State: DISCONNECTED -> SCANNING
wlp10s0b1: Starting AP scan for wildcard SSID
wlp10s0b1: Add radio work 'scan'@0x12f1eb0
wlp10s0b1: First radio work item in the queue - schedule start immediately
wlp10s0b1: Starting radio work 'scan'@0x12f1eb0 after 0.000018 second wait
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=16
wlp10s0b1: Event SCAN_RESULTS (3) received
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5573 bytes of scan results (10 BSSes)
wlp10s0b1: BSS: Start scan result update 1
wlp10s0b1: BSS: Add new id 0 BSSID 20:4e:7f:3b:86:1d SSID 'Hangglide' freq 2422
wlp10s0b1: BSS: Add new id 1 BSSID 38:2c:4a:c3:5c:e8 SSID 'Isaev 1996' freq 2412
wlp10s0b1: BSS: Add new id 2 BSSID 00:37:b7:c7:71:dd SSID 'REZEDA' freq 2462
wlp10s0b1: BSS: Add new id 3 BSSID 2c:ab:25:db:66:4a SSID 'Tattelecom_DB664B' freq 2447
wlp10s0b1: BSS: Add new id 4 BSSID bc:96:80:e9:18:cd SSID 'halava' freq 2412
wlp10s0b1: BSS: Add new id 5 BSSID f8:1a:67:4f:75:ac SSID 'DUIVOL' freq 2437
wlp10s0b1: BSS: Add new id 6 BSSID 00:37:b7:c7:71:de SSID 'wifi.tattele.com' freq 2462
wlp10s0b1: BSS: Add new id 7 BSSID 2c:ab:25:db:66:4b SSID 'wifi.tattele.com' freq 2447
wlp10s0b1: BSS: Add new id 8 BSSID fa:8f:ca:66:55:6c SSID '' freq 2437
wlp10s0b1: BSS: Add new id 9 BSSID 28:28:5d:79:b8:50 SSID 'rusgafar' freq 2447
BSS: last_scan_res_used=10/32
wlp10s0b1: New scan results available (own=0 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 20:4e:7f:3b:86:1d type 0 added
WPS: AP 38:2c:4a:c3:5c:e8 type 0 added
WPS: AP bc:96:80:e9:18:cd type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP f8:1a:67:4f:75:ac type 0 added
WPS: AP[0] 20:4e:7f:3b:86:1d type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 38:2c:4a:c3:5c:e8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[2] bc:96:80:e9:18:cd type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[3] f8:1a:67:4f:75:ac type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp10s0b1: Radio work 'scan'@0x12f1eb0 done in 0.924415 seconds
wlp10s0b1: Selecting BSS from priority group 0
wlp10s0b1: 0: 20:4e:7f:3b:86:1d ssid='Hangglide' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-10 freq=2422 wps
wlp10s0b1: selected based on RSN IE
wlp10s0b1: selected BSS 20:4e:7f:3b:86:1d ssid='Hangglide'
wlp10s0b1: Considering connect request: reassociate: 0 selected: 20:4e:7f:3b:86:1d bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x12d3a00 current_ssid=(nil)
wlp10s0b1: Request association with 20:4e:7f:3b:86:1d
wlp10s0b1: Add radio work 'connect'@0x12f1eb0
wlp10s0b1: First radio work item in the queue - schedule start immediately
wlp10s0b1: Starting radio work 'connect'@0x12f1eb0 after 0.000111 second wait
wlp10s0b1: Trying to associate with 20:4e:7f:3b:86:1d (SSID='Hangglide' freq=2422 MHz)
wlp10s0b1: Cancelling scan request
wlp10s0b1: WPA: clearing own WPA/RSN IE
wlp10s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x12d3a00 try_opportunistic=0
RSN: Search for BSSID 20:4e:7f:3b:86:1d
RSN: No PMKSA cache entry found
wlp10s0b1: RSN: using IEEE 802.11i/D9.0
wlp10s0b1: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlp10s0b1: WPA: Selected mgmt group cipher 32
wlp10s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp10s0b1: WPA: using GTK CCMP
wlp10s0b1: WPA: using PTK CCMP
wlp10s0b1: WPA: using KEY_MGMT WPA-PSK
wlp10s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp10s0b1: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Limit connection to BSSID 20:4e:7f:3b:86:1d freq=2422 MHz based on scan results (bssid_set=0)
wlp10s0b1: set_disable_max_amsdu: -1
wlp10s0b1: set_ampdu_factor: -1
wlp10s0b1: set_ampdu_density: -1
wlp10s0b1: set_disable_ht40: 0
wlp10s0b1: set_disable_sgi: 0
wlp10s0b1: set_disable_ldpc: 0
wlp10s0b1: Determining shared radio frequencies (max len 1)
wlp10s0b1: Shared frequencies (len=0): completed iteration
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
ioctl[SIOCSIWFREQ]: Device or resource busy
wlp10s0b1: Association request to the driver failed
wlp10s0b1: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=25
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=201
AssocResp IE wireless event - hexdump(len=185): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 08 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 08 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 0a 00 03 7f 04 01 00 00 00 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 20:4e:7f:3b:86:1d
wlp10s0b1: Event ASSOCINFO (4) received
wlp10s0b1: Association info event
resp_ies - hexdump(len=185): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 08 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 08 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 0a 00 03 7f 04 01 00 00 00 40 00
wlp10s0b1: Event ASSOC (0) received
wlp10s0b1: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp10s0b1: Associated to a new BSS: BSSID=20:4e:7f:3b:86:1d
wlp10s0b1: Associated with 20:4e:7f:3b:86:1d
wlp10s0b1: WPA: Association event - clear replay counter
wlp10s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlp10s0b1: Setting authentication timeout: 10 sec 0 usec
wlp10s0b1: Cancelling scan request
l2_packet_receive: src=20:4e:7f:3b:86:1d len=99
wlp10s0b1: RX EAPOL from 20:4e:7f:3b:86:1d
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp10s0b1: Setting authentication timeout: 10 sec 0 usec
wlp10s0b1: IEEE 802.1X RX: version=2 type=3 length=95
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp10s0b1: EAPOL-Key type=2
wlp10s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp10s0b1: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp10s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp10s0b1: WPA: RX message 1 of 4-Way Handshake from 20:4e:7f:3b:86:1d (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 30 cd dc 63 6a 9f d6 f9 f0 4c 3a fb bc 62 21 77 13 2a 54 f6 43 b7 6f 50 8f a4 e5 b6 11 94 3b 17
WPA: PTK derivation - A1=c0:18:85:49:ae:94 A2=20:4e:7f:3b:86:1d
WPA: Nonce1 - hexdump(len=32): 30 cd dc 63 6a 9f d6 f9 f0 4c 3a fb bc 62 21 77 13 2a 54 f6 43 b7 6f 50 8f a4 e5 b6 11 94 3b 17
WPA: Nonce2 - hexdump(len=32): 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlp10s0b1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 4a 8b 29 a2 67 e2 83 d4 bf 9f 5a 99 40 1c 29 29
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 30 cd dc 63 6a 9f d6 f9 f0 4c 3a fb bc 62 21 77 13 2a 54 f6 43 b7 6f 50 8f a4 e5 b6 11 94 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 8b 29 a2 67 e2 83 d4 bf 9f 5a 99 40 1c 29 29 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
l2_packet_receive: src=20:4e:7f:3b:86:1d len=155
wlp10s0b1: RX EAPOL from 20:4e:7f:3b:86:1d
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 d7 5c 49 48 f1 e4 79 48 e1 53 50 02 86 a0 3d 00 38 a8 85 c2 a7 0e 64 63 93 aa 08 9b d2 c9 1f 6c 69 fc 41 d1 b4 8a ab e0 49 5a 32 d5 37 52 12 b8 14 ef 75 77 f5 c3 4a 8b 60 c5 e9 7e e3 77 d6 55 58 59 62 26 9c c3 ed 81 aa
wlp10s0b1: IEEE 802.1X RX: version=2 type=3 length=151
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 d7 5c 49 48 f1 e4 79 48 e1 53 50 02 86 a0 3d 00 38 a8 85 c2 a7 0e 64 63 93 aa 08 9b d2 c9 1f 6c 69 fc 41 d1 b4 8a ab e0 49 5a 32 d5 37 52 12 b8 14 ef 75 77 f5 c3 4a 8b 60 c5 e9 7e e3 77 d6 55 58 59 62 26 9c c3 ed 81 aa
wlp10s0b1: EAPOL-Key type=2
wlp10s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp10s0b1: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 5c 3b ff 11 e1 ef b1 1c 3c 4a 5a 3d ad 7f 85 5e 9d e0 80 66 33 29 fa 2f 8a f7 c3 f7 57 8c 5b cb
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 14 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a7 d7 5c 49 48 f1 e4 79 48 e1 53 50 02 86 a0 3d
RSN: encrypted key data - hexdump(len=56): a8 85 c2 a7 0e 64 63 93 aa 08 9b d2 c9 1f 6c 69 fc 41 d1 b4 8a ab e0 49 5a 32 d5 37 52 12 b8 14 ef 75 77 f5 c3 4a 8b 60 c5 e9 7e e3 77 d6 55 58 59 62 26 9c c3 ed 81 aa
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlp10s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp10s0b1: WPA: RX message 3 of 4-Way Handshake from 20:4e:7f:3b:86:1d (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 0d ce 6e f8 98 86 25 53 54 88 f8 8c 23 53 07 94 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlp10s0b1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 1d 52 94 b4 98 9b f8 c5 cd 89 4c f9 77 5b e5 25
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1d 52 94 b4 98 9b f8 c5 cd 89 4c f9 77 5b e5 25 00 00
wlp10s0b1: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlp10s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlp10s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 14 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
wlp10s0b1: WPA: Key negotiation completed with 20:4e:7f:3b:86:1d [PTK=CCMP GTK=CCMP]
wlp10s0b1: Cancelling authentication timeout
wlp10s0b1: State: GROUP_HANDSHAKE -> COMPLETED
wlp10s0b1: Radio work 'connect'@0x12f1eb0 done in 0.069691 seconds
wlp10s0b1: CTRL-EVENT-CONNECTED - Connection to 20:4e:7f:3b:86:1d completed [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=SUCCESS
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp10s0b1' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Offline
Try placing the configuration file at /etc/wpa_supplicant.conf instead (this is the location given in the EXAMPLES section of wpa_supplicant(8)).
Try dropping the "-D nl80211,wext" flag, it is not needed at all.
It is very confusing that the basic configuration file (ie, just the network block) does not work as this is exactly equivalent to the command you used with success in your OP
As a sanity check, run this command again and confirm that it still works:
# wpa_supplicant -B -D nl80211,wext -i wlp10s0b1 -c <(wpa_passphrase $SSID $PASSWORD)
Para todos todo, para nosotros nada
Offline
Hey! After some doings (actually I don't know what I did) the same command run successful! Thank to god everything (and what you suggested too) work as expected!
But what I really can't ignore now is that internet speed is SLOW, very slow (given that I sit right in front of the router). What can I do? Or should I create another topic?
Offline
should I create another topic?
^ This.
Include the output of:
lspci -knn|grep -iA2 net
Make sure you check the "Troubleshooting" section of the ArchWiki wireless page and apply any solutions given for your specific card before opening a new thread.
See https://wiki.archlinux.org/index.php/Wi … leshooting
List all the solutions you have tried (by this I mean the *exact* commands used, *not* vague descriptions of the commands used) and post any error messages verbatim in your new thread.
You should also search these boards.
EDIT: Link added.
Last edited by Head_on_a_Stick (2016-02-13 13:17:35)
Para todos todo, para nosotros nada
Offline
Ok, got it!
the output is:
[root@timur-laptop timur]# lspci -knn|grep -iA2 net
0a:00.0 Network controller [0280]: Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
Subsystem: Hewlett-Packard Company Device [103c:1795]
Kernel driver in use: bcma-pci-bridge
--
0b:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller [10ec:8168] (rev 07)
Subsystem: Hewlett-Packard Company Device [103c:1818]
Kernel driver in use: r8169
Offline
^ That should go in your new thread, it's a little off-topic here
EDIT: Please mark this thread [SOLVED]
Last edited by Head_on_a_Stick (2016-02-13 13:20:16)
Para todos todo, para nosotros nada
Offline