You are not logged in.

#1 2008-08-03 12:42:50

Top_se
Member
From: Germany
Registered: 2008-08-03
Posts: 31

[solved] wireless association failed <- a bit too often

Hello linux-pros!

As the topic says it already I`ve got a problem with getting access to a router through a wireless connection. I`m running arch (x86_64) on a "new" laptop with the following wireless card: ar5007eg. For this card a madwifi-driver would be adviseable, but I can`t create the ath0 interface because of a madwifi bug, see:
http://madwifi.org/ticket/1854
So I had to use ndiswrapper to install the net5211 driver for my card ... so the interface wlan0 gets setup correctly.

Now I use netcfg2 to setup my connection to the appropriate router. But here is the problem: Only at about 1 out of 50 tries, netcfg2 doesn`t fails with the error: "wireless association failed". iwlist scan says that the quality is usually between 20 and 25/100, I know that this isn`t too good, but yeah, why is iwlist ALWAYS able to find the access point and netcfg2 nearly never? And the reason why I`m not convinced that it`s only a "out of range"-problem is, that my Window$ can always establishes a connection to my accesspoint ...

And when netcfg2 finds the accesspoint than dhcpcd can get an IP always.

That`s my iwlist scan output:

wlan0     Scan completed :
          Cell 03 - Address: 00:1F:3F:13:92:29
                    ESSID:"Clianta"
                    Protocol:IEEE 802.11g
                    Mode:Managed
                    Frequency:2.412 GHz (Channel 1)
                    Quality:22/100  Signal level:-88 dBm  Noise level:-96 dBm
                    Encryption key:on
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
                              9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                              48 Mb/s; 54 Mb/s
                    Extra:bcn_int=100
                    Extra:atim=0
                    IE: IEEE 802.11i/WPA2 Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (1) : CCMP
                        Authentication Suites (1) : PSK
                    IE: WPA Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : PSK

And that`s my netcfg2 profile:

CONNECTION="wireless"
INTERFACE=wlan0
IP=dhcp
GATEWAY=192.168.0.1
#SCAN="yes"
SCAN="no"
SECURITY="wpa"
ESSID="Clianta"
KEY="***"
TIMEOUT=20
DHCP_TIMEOUT=20


So, my question is, is it a driver issue? But why does iwlist works so good than? Or yeah, I`ve no idea what the problem could be?

Thanks in advance. I hope you can help me.

And if you need further logs etc, please tell me, I`m new to linux problem solving ...

Top_se

Last edited by Top_se (2008-08-06 16:34:59)

Offline

#2 2008-08-03 22:50:28

chimpyw
Member
Registered: 2007-02-14
Posts: 21

Re: [solved] wireless association failed <- a bit too often

I get this too but with iwlwifi-4965-ucode.  If I sit at my desk with my laptop where I get good signal I can connect easily, no problems, but when I move downstairs where the signal is a bit weaker (100% down to about 60-80%) I get the same problems you do.

Try moving your router where you can get a better signal.  Although saying that I can get the signal when I use Vista sat in the same place downstairs.

Offline

#3 2008-08-04 00:24:51

sam
Member
Registered: 2008-05-23
Posts: 82

Re: [solved] wireless association failed <- a bit too often

I've recently had a similar problem that turned out to be a driver issue.  I use networkmanager and it worked about 50% of the time and netcfg never (not even now) worked.  I think in your case, it maybe a program issue, try setting up networkmanager and see if it works. 

Since you are using the 64 bit, it maybe a driver issue, but you don't have any alternatives here.

Out of curiosity why is scan set to no in netcfg?  Since you can see you ap in iwlist, you should have scan=yes.

Welcome to arch and the forum, and your english is fine wink

Last edited by sam (2008-08-04 00:25:08)

Offline

#4 2008-08-04 05:50:08

Top_se
Member
From: Germany
Registered: 2008-08-03
Posts: 31

Re: [solved] wireless association failed <- a bit too often

sam wrote:

I think in your case, it maybe a program issue, try setting up networkmanager and see if it works.

You mean setting up everything inside of /etc/rc.conf instead of /etc/network.d/"net-profile" right? (edit: I know what you mean now, I just overflow the wiki-page about networkmanager this morning) Okay, I will try to do so and tell you about the results.

sam wrote:

Out of curiosity why is scan set to no in netcfg?  Since you can see you ap in iwlist, you should have scan=yes.

Yeah, I got the impression (1000 tries or so big_smile) that the chance for getting a connection is highter if I set scan=no. But my experience might be false of course!
My personal explanation:
When scan=yes, netcfg2 first searches whether my ap is available, but because I personally know that my ap must be available, I think that this search is redundant ... But the effect whether scan = yes or no isn`t too great i think ...

@chimpyw
thx for your answer, but unfortunately it`s impossible for me to reposition my router ...

Top_se

Last edited by Top_se (2008-08-04 13:02:57)

Offline

#5 2008-08-04 08:53:30

iphitus
Forum Fellow
From: Melbourne, Australia
Registered: 2004-10-09
Posts: 4,927

Re: [solved] wireless association failed <- a bit too often

This is on the netcfg wiki... but I'll post it again smile

Association problems are usually
1) Low/Poor/Weak Reception
2) Driver bug
3) Incorrect configuration
4) Bug in software.

If it works sometimes, you can ignore 3.
You're using ndiswrapper, 1 and 2 are very common with ndiswrapper
As for 4, it's possible, though unlikely for this particular bug.

Try netcfg from [testing] and mess around with different quirk options. Some help, others don't.

Also, it might help to nag a bit on that bug, getting a native driver working is a million times better than ndiswrapper.

James

Last edited by iphitus (2008-08-04 08:54:46)

Offline

#6 2008-08-04 20:02:05

sam
Member
Registered: 2008-05-23
Posts: 82

Re: [solved] wireless association failed <- a bit too often

I have read the bug report, and it seems that the bug only occurs after the system comes back from suspend/hibernate, are you turning your computer on/off or putting it on standby?

So your options at this point are imited to playing with the network programs.  It appears that your wireless card always works (given iwlist works), but the network program has trouble controlling the card. 

You can try setting up the connection manually (ie using ifconfig iwconfig and wpa_supplication) and seeing where the problem occurs (this is similar to what netcfg is doing).  The other option is to use networkmanager that relies on hal and dbus which may have better luck controlling your wireless card.

If networkmanager is not giving you better luck, then the problem is definitely the drivers.  This will get more complicated because you will either have to install beta versions of ndiswrapper, you may need to recompile your 64 bit kernel to get madwifi working, you may need to use another kernel (either an older one or one from AUR),  or you may need to use 32 bit arch.

Offline

#7 2008-08-05 09:55:25

Top_se
Member
From: Germany
Registered: 2008-08-03
Posts: 31

Re: [solved] wireless association failed <- a bit too often

Good morning!

sam wrote:

I have read the bug report, and it seems that the bug only occurs after the system comes back from suspend/hibernate, are you turning your computer on/off or putting it on standby?

Nope, I`m putting the computer on/off and never into standby, but the errors occur nonetheless ... and in the last comment (from anonymous) there is a guy who made the same experience like me ... But @ iphitus, I will nag on it ;-)

Sam, you sugested using networkmanager and I tested it yesterday for a long time and I came to the conclusion that it`s really getting a connection way more often than netcfg2. Networkmanager is nearly as good as my windows networkmanager on this laptop! But at all, I don`t like the networkmanager, I don`t want to connect to my wlan-network per gui-program ... and as well networkmanager produces  a lot of redundant output during booting and shutting down ...
Yesterday netcfg2 was behaving really worse. I once put my laptop ca. 1m next to my router and tried to connect for 3 times, but netcfg2 could not even once establish a connecting, but as I turned on my laptop this morning -> *zap* I got a connection at the first try (with the same properties, I didn`t change anything inside /etc/network.d/ or inside /etc/rc.conf ...

sam wrote:

You can try setting up the connection manually (ie using ifconfig iwconfig and wpa_supplication) and seeing where the problem occurs (this is similar to what netcfg is doing).

Well, this was my activity during the rest of the afternoon yesterday, but I wasn`t able to establish a connection ...
1st) I commented out this line: "NETWORKS=(home)" in /etc/rc.conf to prefent netcfg2 from trying ... to establish a connection to my ap.

This is the output of iwconfig and ifconfig after booting:

wlan0     IEEE 802.11g  ESSID:off/any  
          Mode:Managed  Frequency:2.412 GHz  Access Point: Not-Associated   
          Bit Rate:54 Mb/s   
          Power Management:off
          Link Quality:0  Signal level:0  Noise level:0
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:0   Missed beacon:0
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:3 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:54 (54.0 b)  TX bytes:54 (54.0 b)

Than I ran the following command:

wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf.clianta -dd > wpa_supplicant.output

After about 15 secs I pressed ctrg + c to abort wpa_supplicant
This is the output wpa_supplicant produced:

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf.clianta' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf.clianta' -> '/etc/wpa_supplicant.conf.clianta'
Reading configuration file '/etc/wpa_supplicant.conf.clianta'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel' (DEPRECATED)
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=7):
     43 6c 69 61 6e 74 61                              Clianta         
scan_ssid=0 (0x0)
key_mgmt: 0x3
proto: 0x3
pairwise: 0x18
group: 0x18
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='Clianta'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:3a:6d:81:7b
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=10 (from group name 'wheel')
Added interface wlan0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 696 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:3f:13:92:29 ssid='Clianta' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:1f:3f:13:92:29 ssid='Clianta'
Try to find non-WPA AP
Trying to associate with 00:1f:3f:13:92:29 (SSID='Clianta' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1f:3f:13:92:29
No keys have been configured - skip key clearing
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 2a c5 44 1d 02 66 f5 40 fa 89 bb 97 1e d3 12 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 db 85 1b 2c 1e ac 78 f7 bf d4 6e 7e b1 50 c8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 c7 05 85 2d ec 0f 8b 9d 86 44 bc 61 f0 d2 90 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5b 21 a8 0c 9e a3 d1 47 8b 99 dc fa f3 fb d0 7f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 6c d1 db 28 31 d7 32 58 9e ef 28 4c 61 12 67 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 8f 2b d9 e7 34 61 0a d6 ea 7e 7e 60 18 a7 12 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 3c 42 9e 51 00 e2 15 f6 ef fd b6 7a 6b 9c 20 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 95 ad c3 02 0e e2 83 44 66 3f 5c 84 e7 67 84 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 ae 5e b3 88 39 9c a6 e9 e1 9e 51 27 77 c1 48 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f d7 b1 06 2b c6 2e a3 33 e5 a4 c3 fd ad 2d 58 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b c3 9f 7e 1e 4e 9d ab f7 e6 f1 d5 23 1f cf 15 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 85 ed 88 5e 43 38 23 a8 b5 98 a7 5a b4 fc c5 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 34 0d 49 64 bb 03 af 77 8a f0 69 a4 d5 62 89 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d c1 46 97 3f 63 c5 c7 e2 4e f7 69 71 3e d1 d7 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 8d c3 3a 87 97 13 9a 54 f3 3c 4c 46 17 8c 18 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 3c 0d 6a 3c fa 06 89 f5 a5 db 97 95 ce ba f4 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 1f fb 50 5a a6 e6 56 99 8f 78 17 97 66 29 7c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 f1 91 28 73 8e ef 1c 17 61 53 9d 8d 92 b4 11 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 30 99 fb 4b 00 04 ad a8 32 fa c8 15 ee 24 0c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

now I ran wpa_supplicant with the same option as above in background (-B)

This is my /etc/wpa_supplicant.conf.clianta:

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel

network={
    ssid="Clianta"
    scan_ssid=0
    key_mgmt=WPA-PSK WPA-EAP
    proto=WPA RSN
    pairwise=CCMP TKIP
    group=CCMP TKIP
    #psk="psk"
    psk=e3sd1f53asd1f35ads1....etc
}

Than I ran:

iwconfig wlan0 essid "Clianta"

iwconfig-output now:

wlan0     IEEE 802.11g  ESSID:"Clianta"  
          Mode:Managed  Frequency:2.412 GHz  Access Point: 00:1f:3a:6d:81:7b
          Bit Rate=54 Mb/s   
          Power Management:off
          Link Quality:56/100  Signal level:-60 dBm  Noise level:-96 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:22  Invalid misc:3870   Missed beacon:0

The word behind ESSID changes from "Clianta" to off/any from time to time, but the Access Point stays there

Now the first obvious problem for me occured:
I couldn`t get an IP per:

dhcpcd wlan0 -L

-> wlan0 timed out (10 tries ... with good connection quality)
so i assigned a static ip:

ifconfig wlan0 192.168.178.30 up

ifconfig output:

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:15 errors:0 dropped:0 overruns:0 frame:0
          TX packets:15 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:270 (270.0 b)  TX bytes:270 (270.0 b)

wlan0     Link encap:Ethernet  HWaddr 00:1F:3A:6D:81:7B  
          inet addr:192.168.178.30  Bcast:192.168.178.255  Mask:255.255.255.0
          inet6 addr: fe80::21f:3aff:fe6d:817b/64 Scope:Link
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:323 errors:0 dropped:0 overruns:0 frame:0
          TX packets:349 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:36499 (35.6 Kb)  TX bytes:47159 (46.0 Kb)
          Interrupt:16 Memory:f2000000-f2010000

and at last I ran:

route add default gateway 192.168.178.1

(as you might have noticed I used an other gateway in my /etc/network.d/home, but I noticed that I used a false gateway there ... gateway 192.168.178.1 is 100% correct for me, I`m sure)

So, but as I try to ping my router or www.google.com now, I get:

ping: unknown host www.google.com

...

My guess is that wpa_supplicant isn`t working properly, but I`ve no idea how a good or bad wpa_supplicant output looks like ...

sam wrote:

If networkmanager is not giving you better luck, then the problem is definitely the drivers.  This will get more complicated because you will either have to install beta versions of ndiswrapper, you may need to recompile your 64 bit kernel to get madwifi working, you may need to use another kernel (either an older one or one from AUR),  or you may need to use 32 bit arch.

Well big_smile oh no big_smile But I think the driver seems not to be the problem.

iphitus wrote:

Try netcfg from [testing] and mess around with different quirk options

I downloaded netcfg from testing, but what do you mean with quirk options? The different options documented in "man netcfg" or other special options?

So, thankyou very much @ sam & iphitus!!! It`s nearly fun trying to figure out the problem *gg*

Top_se

EDIT: SORRY, I noticed the bug in the bb-code-parser of this forum software, but I have to leave now, I will make the wpa-supplicant-output available through an other way, later, sorry form this horrible long post

Last edited by Top_se (2008-08-05 09:58:26)

Offline

#8 2008-08-05 10:57:11

iphitus
Forum Fellow
From: Melbourne, Australia
Registered: 2004-10-09
Posts: 4,927

Re: [solved] wireless association failed <- a bit too often

Quirks: http://wiki.archlinux.org/index.php/Net … s.2Fquirks
Only works in netcfg from testing.

There'll be another few new quirks in the next version that may also help... I'll try to release it soon.

Regarding unknown host, you need to setup DNS with a static config as well.

Offline

#9 2008-08-05 16:08:22

sam
Member
Registered: 2008-05-23
Posts: 82

Re: [solved] wireless association failed <- a bit too often

Couple of things:
Try running iwconfig wlan0 essid "Clianta" with root privaleges.  If encryption is properly established, then you should see a line that reads "encryption key".  You can also set the encryption key from iwconfig.

Why did you run dhcpcd with the -L option? From my understanding the internet is still ipv4.  Try running dhcpcd without the -L option and check the daemon log for dhcpcd afterwards.

I also agree with iphitus, you need to setup the dns (in /etc/resolve.conf) and setup up your ip address manually.

You still may have a driver problem, its just that networkmanager gets around it.  If networkmanager didn't work either, all that it would tell us is that it must be a driver problem.  The previous statement is not necessarily true the other way around.

Out of curiosity, why do you not want a gui to set-up the network?  You can automate it so that the connection gets established automatically when you login (without typing anything in), it also shows signal strength.  With regard to the garbage networkmanager spits out when you shutdown (I don't have anything from networkmanger when I boot), there is a patch for that and there maybe an AUR package for it.

Offline

#10 2008-08-05 18:21:39

Top_se
Member
From: Germany
Registered: 2008-08-03
Posts: 31

Re: [solved] wireless association failed <- a bit too often

Huhu!

iphitus wrote:

Quirks: http://wiki.archlinux.org/index.php/Net … s.2Fquirks
Only works in netcfg from testing.

Oh, sorry, I could have found this article on my own, sorry, but nonetheless I tried warious combinations for a while, but it didn`t improve netcfg2`s behavior ...

iphitus wrote:

There'll be another few new quirks in the next version that may also help... I'll try to release it soon.

I`m really looking forward to them!!!

iphitus wrote:

Regarding unknown host, you need to setup DNS with a static config as well.

Okay, I tried this, but if didn`t help either, and I`m not sure, but souldn`t I be at least able to ping to my router even without the proper configuration of a DNS-Server? Because pinging to 192.168.178.1 isn`t working either:

ping -c 1 192.168.178.1 results in: From 192.168.178.30 icmp_seq=1 Destination Host Unreachable (actually i uses more packets of course)

sam wrote:

Try running iwconfig wlan0 essid "Clianta" with root privaleges.

I`m sorry I didn`t tell you, that I ran all processes where required with sudo ...

If encryption is properly established, then you should see a line that reads "encryption key".  You can also set the encryption key from iwconfig.

Isn`t this encryption key for wep? (I`m not sure, but I think so) Because, when I look now at the output of iwconfig I can`t see such an encryption key either, even if my network is working properly with networkmanager:

wlan0     IEEE 802.11g  ESSID:"Clianta"  
          Mode:Managed  Frequency:2.412 GHz  Access Point: 00:1F:3F:13:92:29   
          Bit Rate=54 Mb/s   
          Power Management:off
          Link Quality:18/100  Signal level:-84 dBm  Noise level:-96 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:1034  Invalid misc:21063   Missed beacon:0

Why did you run dhcpcd with the -L option? From my understanding the internet is still ipv4.  Try running dhcpcd without the -L option and check the daemon log for dhcpcd afterwards.

I used the -L option because I didn`t want that dhcpcd would assign a random IP to my interface if it fails ... so I could rerun dhcpcd without an obstacle ...
That`s the dhcp-log, first I used the -L option -> it finished just with exiting
Than I didn`t use the -L option:

Aug  5 19:02:17 localhost dhcpcd[3060]: wlan0: dhcpcd 3.2.1 starting
Aug  5 19:02:17 localhost dhcpcd[3060]: wlan0: hardware address = 00:1f:3a:6d:81:7b
Aug  5 19:02:17 localhost dhcpcd[3060]: wlan0: removing IP address 192.168.178.23/24
Aug  5 19:02:17 localhost dhcpcd[3060]: wlan0: broadcasting for a lease
Aug  5 19:02:37 localhost dhcpcd[3060]: wlan0: exiting
Aug  5 19:02:43 localhost dhcpcd[3061]: wlan0: dhcpcd 3.2.1 starting
Aug  5 19:02:43 localhost dhcpcd[3061]: wlan0: hardware address = 00:1f:3a:6d:81:7b
Aug  5 19:02:43 localhost dhcpcd[3061]: wlan0: broadcasting for a lease
Aug  5 19:03:03 localhost dhcpcd[3061]: wlan0: trying to use old lease in `/var/lib/dhcpcd/dhcpcd-wlan0.info'
Aug  5 19:03:03 localhost dhcpcd[3061]: wlan0: probing for an IPV4LL address
Aug  5 19:03:04 localhost dhcpcd[3061]: wlan0: using IPV4LL address 169.254.218.214
Aug  5 19:03:04 localhost dhcpcd[3061]: wlan0: adding IP address 169.254.218.214/16
Aug  5 19:03:04 localhost dhcpcd[3061]: wlan0: exiting

I also agree with iphitus, you need to setup the dns (in /etc/resolve.conf) and setup up your ip address manually.

I setup my router as the nameserver in the resolv.conf but unfortunatly it didn`t help ....

You still may have a driver problem, its just that networkmanager gets around it.  If networkmanager didn't work either, all that it would tell us is that it must be a driver problem.  The previous statement is not necessarily true the other way around.

hmpf, this sounds striking ...

Out of curiosity, why do you not want a gui to set-up the network?  You can automate it so that the connection gets established automatically when you login (without typing anything in), it also shows signal strength.  With regard to the garbage networkmanager spits out when you shutdown (I don't have anything from networkmanger when I boot), there is a patch for that and there maybe an AUR package for it.

Yeah, it`s a silly "I want to do it the basic way"-attitude -> I didn`t switched to arch to do it the windows-way ...But if I can`t solve this problem here, I will be able to live with it, of course big_smile

I noticed something that seems to be important to me:

This is the output of ifconfig if the connection failed:

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:15 errors:0 dropped:0 overruns:0 frame:0
          TX packets:15 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:270 (270.0 b)  TX bytes:270 (270.0 b)

wlan0     Link encap:Ethernet  HWaddr 00:1F:3A:6D:81:7B  
          inet addr:192.168.178.30  Bcast:192.168.178.255  Mask:255.255.255.0
          inet6 addr: fe80::21f:3aff:fe6d:817b/64 Scope:Link
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:323 errors:0 dropped:0 overruns:0 frame:0
          TX packets:349 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:36499 (35.6 Kb)  TX bytes:47159 (46.0 Kb)
          Interrupt:16 Memory:f2000000-f2010000

And that`s the output of ifconfig when a connection is established:

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:1 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:18 (18.0 b)  TX bytes:18 (18.0 b)

wlan0     Link encap:Ethernet  HWaddr 00:1F:3A:6D:81:7B  
          inet addr:192.168.178.23  Bcast:192.168.178.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:6 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:1570 (1.5 Kb)  TX bytes:964 (964.0 b)
          Interrupt:16 Memory:f2000000-f2010000

The only difference is the RUNNING-flag at the wlan0-section, right? But who sets this FLAG? The driver, wpa_supplicant, or can I do it manually? I googled for this flag but I could only find, that I had to configure ifconfig properly ... As well when I have a connection through networkmanager this flag is set ...

I can`t thank you enough for beeing so persistent in helping me!!

Top_se

EDIT: dhcp log handed in later

Last edited by Top_se (2008-08-05 18:35:53)

Offline

#11 2008-08-05 19:16:26

sam
Member
Registered: 2008-05-23
Posts: 82

Re: [solved] wireless association failed <- a bit too often

Couple of things I noticed that should bring us closer to the solution:
iwconfig has a very low link quality (18), are you farther from the router than the other posts?

I don't think you are using the -L option correctly, the -L option means don't use ipv4 adresses like 192.xx.xxx.xx, instead use ipv6 addresses that go like xxx::xxx::xxx::xxx.  I think this is the main problem.  When a connection is established you don't have an ipv6 address (inet6 addr line), whereas you have an ipv6 when it fails.  Which makes sense, if you are forcing dhcp not to use ipv4 and use ipv6 instead.  ipv6 is different from ipv4 and the router, internet, and network will NOT work with ipv6.  So at no point should you have an ipv6 adress in ifconfig or iwconfig.

The encryption line of iwconfig should be there regardless of encryption type, you may not be able to set-up wpa or wpa2 encryption in iwconfig, but you should still see that line.  I use wpa encryption and I have that line.  If however, you don't have the line when you are connected, it maybe an ndiswrapper thing (I use open-source drivers).

The running flag is not one you set, but it is automatically set when the interface is working completely ie. once you are connected.  So this is nothing to worry about.

Why is the inet address different when you connection is established vs when its not?

BTW There is no shame in doing things the windows way, windows does some thing better than linux and one of them is how windows deals with wireless cards.  As you can see from your experience, setting up the wireless in linux tends to be a huge pain, while it is flawless in windows.  I'm a huge linux advocate, especially arch, but I'm aware of the strength and weakness of each OS.

Offline

#12 2008-08-05 21:11:53

kjon
Member
From: Temuco, Chile
Registered: 2008-04-16
Posts: 398

Re: [solved] wireless association failed <- a bit too often

The alternative approach (the one I've liked to read) is:

1. Get madwifi-svn with the latest hal, from svn
http://svn.madwifi.org/madwifi/branches … -0.10.5.6/

2. Compile that stuff

3. Forbid ath5k from loading.

4. Configure netcfg to use wpa-config security.

5. In your wpa_supplicant.conf (or whatever you named that config file) add:

ctrl_interface=/var/run/wpa_supplicant
network={
  scan_ssid=0
  eapol_flags=3
(...)
}

If it doesn't work, try 'eapol_flags--' big_smile.
That solved my WPA2/AES association issues. I hope this approach works for you.


They say that if you play a Win cd backward you hear satanic messages. That's nothing! 'cause if you play it forwards, it installs windows.

Offline

#13 2008-08-06 16:24:22

Top_se
Member
From: Germany
Registered: 2008-08-03
Posts: 31

Re: [solved] wireless association failed <- a bit too often

Well, I`ve got to submit good news *ggg*

I tried out this newer madwifi-driver which kjon sugested and finally I got the madwifi driver working *gg* so I have now an ath0 and wifi0 interfiace and could get rid of my ndiswrapper driver.

And now, there aren`t any problems concerning netcfg2 or setting up my connection per iwconfig ifconfig or wpa_supplicant manually anymore *gg*

So at last it was definitly a driver issue and I`m thanking anyone who posted in this thread and helped me so greatly to find the solution and made me not to give up smile

Top_se

Last edited by Top_se (2008-08-06 16:25:28)

Offline

Board footer

Powered by FluxBB