You are not logged in.

#1 2008-01-15 03:20:49

semperfiguy
Member
Registered: 2007-12-03
Posts: 224

Ndiswrapper WPA troubles.

Okay, for a while now I haven't been able to connect to my WPA encrypted network.  I can connect to an unencrypted network fine however.  I believe the problem came after I upgraded from ndiswrapper 1.49 So I may have to end up downgrading that and all packages connected if I cant work this out.

I am just going to post the output of different commands to see if that helps anything.

My /etc/wpa_supplicant.conf file reads as:

ctrl_interface=/var/run/wpa_supplicant

network={
        ssid="netw0rk"
        psk="passward"
        key_mgmt=WPA-PSK
        proto=WPA
        pairwise=TKIP
}

I run
ifconfig wlan0 down
dhclient -r wlan0
and  wpa_supplicant -w -D wext -i wlan0 -c /etc/wpa_supplicant.conf -dd
and the output is:

wpa_supplicant -w -D wext -i wlan0 -c /etc/wpa_supplicant.conf -dd 
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 3 - start of a new network block
ssid - hexdump_ascii(len=8):
     6d 79 6e 65 74 35 34 67                           mynet54g        
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 9: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 0
   id=0 ssid='mynet54g'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0c:41:2e:73:40
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 704 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:12:17:e2:e9:84 ssid='mynet54g' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:12:17:e2:e9:84 ssid='mynet54g'
Try to find non-WPA AP
Trying to associate with 00:12:17:e2:e9:84 (SSID='mynet54g' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=76
AssocReq IE wireless event - hexdump(len=68): 00 08 6d 79 6e 65 74 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=32
AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:17:e2:e9:84
Association info event
req_ies - hexdump(len=68): 00 08 6d 79 6e 65 74 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04
WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:12:17:e2:e9:84
No keys have been configured - skip key clearing
Associated with 00:12:17:e2:e9:84
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:12:17:e2:e9:84
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:12:17:e2:e9:84 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 1b cf 24 0c b1 10 cf ab 7b fc 83 52 fd 4c 02 8c be 63 63 02 f8 6e 9e 23 25 ca a0 68 ed 6f dd 34
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 00 1b cf 24 0c b1 10 cf ab 7b fc 83 52 fd 4c 02 8c be 63 63 02 f8 6e 9e 23 25 ca a0 68 ed 6f dd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 8a 24 0d 64 28 bb d7 20 2b 62 a0 2d 3d 7c 99 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
RX EAPOL from 00:12:17:e2:e9:84
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf de d0 ce d4 0b 63 ce af 8f b5 25 1d 22 41 57 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): cf de d0 ce d4 0b 63 ce af 8f b5 25 1d 22 41 57
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 cd 09 c1 17 d1 62 02 09 66 3e 82 9b ff 85 27 1a 64 47 59 f9 75 dd 07 4a 32 07 ae b6 dc cd 06 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf de d0 ce d4 0b 63 ce af 8f b5 25 1d 22 41 57 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:12:17:e2:e9:84 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e1 9a a6 95 fe 67 6a f9 a8 f9 84 ad 87 e9 50 1c 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

Also running
wpa_supplicant -i wlan0 -D wext -c /etc/wpa_supplicant.conf
Returns this:

Trying to associate with 00:12:17:e2:e9:84 (SSID='mynet54g' freq=2437 MHz)
Associated with 00:12:17:e2:e9:84
Associated with 00:12:17:e2:e9:84

I then run
ifconfig wlan0 up
dhcpcd -d wlan0
and the output is:

Info, wlan0: dhcpcd 3.1.8 starting
Info, wlan0: hardware address = 00:0c:41:2e:73:40
Info, wlan0: broadcasting for a lease
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: waiting on select for 20 seconds
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Debug, wlan0: sending DHCP_DISCOVER with xid 0x65dedeba
Error, wlan0: timed out
Info, wlan0: trying to use old lease in `/var/lib/dhcpcd/dhcpcd-wlan0.info'
Info, wlan0: probing for an IPV4LL address
Debug, wlan0: sending ARP probe #1
Debug, wlan0: sending ARP probe #2
Debug, wlan0: sending ARP probe #3
Debug, wlan0: sending ARP claim #1
Debug, wlan0: sending ARP claim #2
Warning, wlan0: using IPV4LL address 169.254.252.5
Info, wlan0: adding IP address 169.254.252.5/16
Debug, wlan0: no dns information to write
Debug, wlan0: writing /var/lib/dhcpcd/dhcpcd-wlan0.info
Debug, wlan0: forking to background

Maybe someone could interpret this for me.  Or point me how to downgrade to the older versions of ndiswrapper and the kernel. (I already cleared my cache I fear)

Offline

#2 2008-01-16 01:44:48

T-Dawg
Forum Fellow
From: Charlotte, NC
Registered: 2005-01-29
Posts: 2,736

Re: Ndiswrapper WPA troubles.

try rebuilding ndiswrapper from abs and install via pacman.

Offline

#3 2008-01-16 02:26:55

semperfiguy
Member
Registered: 2007-12-03
Posts: 224

Re: Ndiswrapper WPA troubles.

yup.. took a little tweaking.. (had to adjust the PKGBUILDS to point back to 1.49) but now it worked.. we will see if it breaks again or gets fixed in a future release...

Edit: took a dive again.. finnicky garbage... maybe its a hardware issues..

Last edited by semperfiguy (2008-01-16 02:35:18)

Offline

Board footer

Powered by FluxBB