You are not logged in.
Hey guys, I have installed Arch Linux, with all 4 groups of packages off the CD (Base, devel, lib and support). I have a Netgear MA111v2, (the v2 means second version, which I think is important to note). This is a wireless USB adaptor. How do I set up Arch to connect to my wireless internet router, and use WPA-PSK TKIP encryption?
I heard you possibly could use NDSwrapper and use the windows driver under linux, or possibly wlan package, but I thought I read somewhere that wlan wouldn't work with MA111v2, only v1.
So does wlan now support MA111v2, or is there some other driver included on the CD or do I have to use NDSwrapper, or something else?
Thankyou very much,
nekosuki ![]()
edit:
I haven't tried using wlan-ng or NDISwrapper yet
double-edit:
MA111v2 definitely uses the SIS162 chipset
Last edited by nekosuki (2007-12-27 04:46:27)
Offline
Identify the chipset first - lsusb should tell you something about it. Once you have that, you can decide if wlan-ng26 provides the right driver (prism2_usb). If it doesn't, use ndiswrapper.
Offline
lsusb says
Bus 002 Device 002: ID 0846:4230 NetGear, Inc. MA111 WiFi
Bus 002 Device 001: ID 0000:0000
Bus 001 Device 002: ID 046d:c00c Logitech, Inc. Optical Wheel Mouse
Bus 001 Device 001: ID 0000:0000
it's actually MA111v2, which means its version 2, which is different from the first version
so what do I do now?
Thanks!
nekosuki
Last edited by nekosuki (2007-12-27 04:01:14)
Offline
Here is more verbose info
Bus 002 Device 002: ID 0846:4230 NetGear, Inc. MA111 WiFi
Device Descriptor:
bLength 18
bDescriptorType 1
bcdUSB 1.10
bDeviceClass 0 (Defined at Interface level)
bDeviceSubClass 0
bDeviceProtocol 0
bMaxPacketSize0 64
idVendor 0x0846 NetGear, Inc.
idProduct 0x4230 MA111 WiFi
bcdDevice 1.00
iManufacturer 0
iProduct 0
iSerial 0
bNumConfigurations 1
Configuration Descriptor:
bLength 9
bDescriptorType 2
wTotalLength 39
bNumInterfaces 1
bConfigurationValue 1
iConfiguration 0
bmAttributes 0x80
(Bus Powered)
MaxPower 256mA
Interface Descriptor:
bLength 9
bDescriptorType 4
bInterfaceNumber 0
bAlternateSetting 0
bNumEndpoints 3
bInterfaceClass 255 Vendor Specific Class
bInterfaceSubClass 0
bInterfaceProtocol 0
iInterface 0
Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x01 EP 1 OUT
bmAttributes 2
Transfer Type Bulk
Synch Type None
Usage Type Data
wMaxPacketSize 0x0040 1x 64 bytes
bInterval 1
Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x82 EP 2 IN
bmAttributes 2
Transfer Type Bulk
Synch Type None
Usage Type Data
wMaxPacketSize 0x0040 1x 64 bytes
bInterval 1
Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x83 EP 3 IN
bmAttributes 3
Transfer Type Interrupt
Synch Type None
Usage Type Data
wMaxPacketSize 0x0040 1x 64 bytes
bInterval 8
Device Status: 0x0000
(Bus Powered)
So what do I do now ![]()
Last edited by nekosuki (2007-12-27 04:00:21)
Offline
Do I use do I use wlancfg, wlanconfig, or wlanctl-ng? for my key? (if I want to use wlan?)
and once I know which one to use, how do I use it? Can't I use a prebuilt script or something?
Last edited by nekosuki (2007-12-27 04:08:50)
Offline
OK as written in the edit in the first post, MA111v2 definitely uses SIS162, not PRISM anymore.
Offline
I've made some progress, but when I type
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
I get:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=15):
74 68 65 62 65 73 74 73 73 69 64 65 76 65 72 thebestssidever
PSK (ASCII passphrase) - hexdump_ascii(len=18): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 8: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 0
id=0 ssid='thebestssidever'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xd
capabilities: key_mgmt 0x5 enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0f:b5:fa:c3:f6
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 812 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:18:4d:18:85:14 ssid='GALWAY' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
skip - SSID mismatch
1: 00:18:4d:98:17:9e ssid='thebestssidever' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:18:4d:98:17:9e ssid='thebestssidever'
Try to find non-WPA AP
Trying to associate with 00:18:4d:98:17:9e (SSID='thebestssidever' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=55
AssocReq IE wireless event - hexdump(len=47): 00 0f 74 68 65 62 65 73 74 73 73 69 64 65 76 65 72 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=28
AssocResp IE wireless event - hexdump(len=20): 01 04 82 84 8b 96 dd 0c 00 03 7f 02 01 01 0b 00 02 a4 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:4d:98:17:9e
Association info event
req_ies - hexdump(len=47): 00 0f 74 68 65 62 65 73 74 73 73 69 64 65 76 65 72 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=20): 01 04 82 84 8b 96 dd 0c 00 03 7f 02 01 01 0b 00 02 a4 40 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:4d:98:17:9e
No keys have been configured - skip key clearing
Associated with 00:18:4d:98:17:9e
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:4d:98:17:9e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): e9 23 23 c3 d7 b4 f6 ed 2f 47 11 5a e0 d2 39 bd 31 e1 97 89 38 b1 b6 5b fa 28 7b 8d b1 71 5e 5b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 e9 23 23 c3 d7 b4 f6 ed 2f 47 11 5a e0 d2 39 bd 31 e1 97 89 38 b1 b6 5b fa 28 7b 8d b1 71 5e 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 13 4b 72 4b 26 3b ab 2d 59 b0 0d b8 b5 38 28 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:4d:98:17:9e (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 2d d4 74 7d 7e f7 53 f7 a9 9a d1 e9 b8 21 19 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c 00 20 e9 79 71 36 08 d2 f6 47 b9 7c 49 9f 90 c0 e2 3c 7c 79 03 07 ec 18 fa 20 d9 49 32 c1 3c 45 f7 f2
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e
key_iv - hexdump(len=16): ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c 00 20 e9 79 71 36 08 d2 f6 47 b9 7c 49 9f 90 c0 e2 3c 7c 79 03 07 ec 18 fa 20 d9 49 32 c1 3c 45 f7 f2
WPA: RX message 1 of Group Key Handshake from 00:18:4d:98:17:9e (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b 90 17 df 3a 3c 31 7c 89 d0 df da 5d b7 d5 3b 00 00
WPA: Key negotiation completed with 00:18:4d:98:17:9e [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:4d:98:17:9e completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0 //Just hangs here forever.....
CTRL-EVENT-TERMINATING - signal 2 received // I hit control C here because it stopped there ![]()
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
So basically it hangs where I said in the log (I made a comment with "//" )
Any Ideas?
Thanks,
Nekosuki
Last edited by nekosuki (2007-12-27 07:48:11)
Offline