You are not logged in.
Hello linux-pros!
As the topic says it already I`ve got a problem with getting access to a router through a wireless connection. I`m running arch (x86_64) on a "new" laptop with the following wireless card: ar5007eg. For this card a madwifi-driver would be adviseable, but I can`t create the ath0 interface because of a madwifi bug, see:
http://madwifi.org/ticket/1854
So I had to use ndiswrapper to install the net5211 driver for my card ... so the interface wlan0 gets setup correctly.
Now I use netcfg2 to setup my connection to the appropriate router. But here is the problem: Only at about 1 out of 50 tries, netcfg2 doesn`t fails with the error: "wireless association failed". iwlist scan says that the quality is usually between 20 and 25/100, I know that this isn`t too good, but yeah, why is iwlist ALWAYS able to find the access point and netcfg2 nearly never? And the reason why I`m not convinced that it`s only a "out of range"-problem is, that my Window$ can always establishes a connection to my accesspoint ...
And when netcfg2 finds the accesspoint than dhcpcd can get an IP always.
That`s my iwlist scan output:
wlan0 Scan completed :
Cell 03 - Address: 00:1F:3F:13:92:29
ESSID:"Clianta"
Protocol:IEEE 802.11g
Mode:Managed
Frequency:2.412 GHz (Channel 1)
Quality:22/100 Signal level:-88 dBm Noise level:-96 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:bcn_int=100
Extra:atim=0
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : PSK
And that`s my netcfg2 profile:
CONNECTION="wireless"
INTERFACE=wlan0
IP=dhcp
GATEWAY=192.168.0.1
#SCAN="yes"
SCAN="no"
SECURITY="wpa"
ESSID="Clianta"
KEY="***"
TIMEOUT=20
DHCP_TIMEOUT=20
So, my question is, is it a driver issue? But why does iwlist works so good than? Or yeah, I`ve no idea what the problem could be?
Thanks in advance. I hope you can help me.
And if you need further logs etc, please tell me, I`m new to linux problem solving ...
Top_se
Last edited by Top_se (2008-08-06 16:34:59)
Offline
I get this too but with iwlwifi-4965-ucode. If I sit at my desk with my laptop where I get good signal I can connect easily, no problems, but when I move downstairs where the signal is a bit weaker (100% down to about 60-80%) I get the same problems you do.
Try moving your router where you can get a better signal. Although saying that I can get the signal when I use Vista sat in the same place downstairs.
Offline
I've recently had a similar problem that turned out to be a driver issue. I use networkmanager and it worked about 50% of the time and netcfg never (not even now) worked. I think in your case, it maybe a program issue, try setting up networkmanager and see if it works.
Since you are using the 64 bit, it maybe a driver issue, but you don't have any alternatives here.
Out of curiosity why is scan set to no in netcfg? Since you can see you ap in iwlist, you should have scan=yes.
Welcome to arch and the forum, and your english is fine
Last edited by sam (2008-08-04 00:25:08)
Offline
I think in your case, it maybe a program issue, try setting up networkmanager and see if it works.
You mean setting up everything inside of /etc/rc.conf instead of /etc/network.d/"net-profile" right? (edit: I know what you mean now, I just overflow the wiki-page about networkmanager this morning) Okay, I will try to do so and tell you about the results.
Out of curiosity why is scan set to no in netcfg? Since you can see you ap in iwlist, you should have scan=yes.
Yeah, I got the impression (1000 tries or so ) that the chance for getting a connection is highter if I set scan=no. But my experience might be false of course!
My personal explanation:
When scan=yes, netcfg2 first searches whether my ap is available, but because I personally know that my ap must be available, I think that this search is redundant ... But the effect whether scan = yes or no isn`t too great i think ...
@chimpyw
thx for your answer, but unfortunately it`s impossible for me to reposition my router ...
Top_se
Last edited by Top_se (2008-08-04 13:02:57)
Offline
This is on the netcfg wiki... but I'll post it again
Association problems are usually
1) Low/Poor/Weak Reception
2) Driver bug
3) Incorrect configuration
4) Bug in software.
If it works sometimes, you can ignore 3.
You're using ndiswrapper, 1 and 2 are very common with ndiswrapper
As for 4, it's possible, though unlikely for this particular bug.
Try netcfg from [testing] and mess around with different quirk options. Some help, others don't.
Also, it might help to nag a bit on that bug, getting a native driver working is a million times better than ndiswrapper.
James
Last edited by iphitus (2008-08-04 08:54:46)
Offline
I have read the bug report, and it seems that the bug only occurs after the system comes back from suspend/hibernate, are you turning your computer on/off or putting it on standby?
So your options at this point are imited to playing with the network programs. It appears that your wireless card always works (given iwlist works), but the network program has trouble controlling the card.
You can try setting up the connection manually (ie using ifconfig iwconfig and wpa_supplication) and seeing where the problem occurs (this is similar to what netcfg is doing). The other option is to use networkmanager that relies on hal and dbus which may have better luck controlling your wireless card.
If networkmanager is not giving you better luck, then the problem is definitely the drivers. This will get more complicated because you will either have to install beta versions of ndiswrapper, you may need to recompile your 64 bit kernel to get madwifi working, you may need to use another kernel (either an older one or one from AUR), or you may need to use 32 bit arch.
Offline
Good morning!
I have read the bug report, and it seems that the bug only occurs after the system comes back from suspend/hibernate, are you turning your computer on/off or putting it on standby?
Nope, I`m putting the computer on/off and never into standby, but the errors occur nonetheless ... and in the last comment (from anonymous) there is a guy who made the same experience like me ... But @ iphitus, I will nag on it ;-)
Sam, you sugested using networkmanager and I tested it yesterday for a long time and I came to the conclusion that it`s really getting a connection way more often than netcfg2. Networkmanager is nearly as good as my windows networkmanager on this laptop! But at all, I don`t like the networkmanager, I don`t want to connect to my wlan-network per gui-program ... and as well networkmanager produces a lot of redundant output during booting and shutting down ...
Yesterday netcfg2 was behaving really worse. I once put my laptop ca. 1m next to my router and tried to connect for 3 times, but netcfg2 could not even once establish a connecting, but as I turned on my laptop this morning -> *zap* I got a connection at the first try (with the same properties, I didn`t change anything inside /etc/network.d/ or inside /etc/rc.conf ...
You can try setting up the connection manually (ie using ifconfig iwconfig and wpa_supplication) and seeing where the problem occurs (this is similar to what netcfg is doing).
Well, this was my activity during the rest of the afternoon yesterday, but I wasn`t able to establish a connection ...
1st) I commented out this line: "NETWORKS=(home)" in /etc/rc.conf to prefent netcfg2 from trying ... to establish a connection to my ap.
This is the output of iwconfig and ifconfig after booting:
wlan0 IEEE 802.11g ESSID:off/any
Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated
Bit Rate:54 Mb/s
Power Management:off
Link Quality:0 Signal level:0 Noise level:0
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:3 errors:0 dropped:0 overruns:0 frame:0
TX packets:3 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:54 (54.0 b) TX bytes:54 (54.0 b)
Than I ran the following command:
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf.clianta -dd > wpa_supplicant.output
After about 15 secs I pressed ctrg + c to abort wpa_supplicant
This is the output wpa_supplicant produced:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf.clianta' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf.clianta' -> '/etc/wpa_supplicant.conf.clianta'
Reading configuration file '/etc/wpa_supplicant.conf.clianta'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel' (DEPRECATED)
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=7):
43 6c 69 61 6e 74 61 Clianta
scan_ssid=0 (0x0)
key_mgmt: 0x3
proto: 0x3
pairwise: 0x18
group: 0x18
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='Clianta'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:3a:6d:81:7b
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=10 (from group name 'wheel')
Added interface wlan0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 696 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:3f:13:92:29 ssid='Clianta' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
selected based on RSN IE
selected WPA AP 00:1f:3f:13:92:29 ssid='Clianta'
Try to find non-WPA AP
Trying to associate with 00:1f:3f:13:92:29 (SSID='Clianta' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1f:3f:13:92:29
No keys have been configured - skip key clearing
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 2a c5 44 1d 02 66 f5 40 fa 89 bb 97 1e d3 12 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 db 85 1b 2c 1e ac 78 f7 bf d4 6e 7e b1 50 c8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 c7 05 85 2d ec 0f 8b 9d 86 44 bc 61 f0 d2 90 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 4f 6f b0 eb 7f d4 3d 92 9c 1a d5 9f 52 5e fa 01 ea 3e df 44 0e 24 c9 73 12 ae c4 38 b2 5c 6c ad 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5b 21 a8 0c 9e a3 d1 47 8b 99 dc fa f3 fb d0 7f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 6c d1 db 28 31 d7 32 58 9e ef 28 4c 61 12 67 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 8f 2b d9 e7 34 61 0a d6 ea 7e 7e 60 18 a7 12 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 3c 42 9e 51 00 e2 15 f6 ef fd b6 7a 6b 9c 20 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 52 29 dc b9 5a 29 e3 b2 31 ef 66 e3 d6 8c 0a 19 25 14 95 64 5d 26 65 95 d8 dc bc 7d df cf c4 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 95 ad c3 02 0e e2 83 44 66 3f 5c 84 e7 67 84 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 ae 5e b3 88 39 9c a6 e9 e1 9e 51 27 77 c1 48 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f d7 b1 06 2b c6 2e a3 33 e5 a4 c3 fd ad 2d 58 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b c3 9f 7e 1e 4e 9d ab f7 e6 f1 d5 23 1f cf 15 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 38 c6 55 ae 35 a4 5a 99 d0 35 e3 04 61 ae 04 71 72 4d 36 93 af 42 40 dd 6d 59 3e 66 b6 fb 0e dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 85 ed 88 5e 43 38 23 a8 b5 98 a7 5a b4 fc c5 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 34 0d 49 64 bb 03 af 77 8a f0 69 a4 d5 62 89 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d c1 46 97 3f 63 c5 c7 e2 4e f7 69 71 3e d1 d7 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 8d c3 3a 87 97 13 9a 54 f3 3c 4c 46 17 8c 18 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 d8 e7 2d de f9 cb 1a 9b 0f de e6 2a b8 1c 87 f1 0e 72 f1 92 d6 45 76 2a 2a 3c eb 2e c2 f1 b9 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 3c 0d 6a 3c fa 06 89 f5 a5 db 97 95 ce ba f4 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:1f:3f:13:92:29
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:1f:3f:13:92:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 1f fb 50 5a a6 e6 56 99 8f 78 17 97 66 29 7c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 f1 91 28 73 8e ef 1c 17 61 53 9d 8d 92 b4 11 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1f:3f:13:92:29
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 00 97 7b 6e 87 cf d0 db 43 4c 7f 6f 9a db fa 92 57 39 5d 7b 32 e0 13 fd 6d 5b 22 7d aa d7 5b 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1f:3f:13:92:29 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 bf df 8a 4d 6a 1e 27 fd dc 62 02 94 46 ac d7 d6 1a 70 8a 37 5c b5 0e 51 03 a6 67 03 96 f8 4c 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 30 99 fb 4b 00 04 ad a8 32 fa c8 15 ee 24 0c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
now I ran wpa_supplicant with the same option as above in background (-B)
This is my /etc/wpa_supplicant.conf.clianta:
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
network={
ssid="Clianta"
scan_ssid=0
key_mgmt=WPA-PSK WPA-EAP
proto=WPA RSN
pairwise=CCMP TKIP
group=CCMP TKIP
#psk="psk"
psk=e3sd1f53asd1f35ads1....etc
}
Than I ran:
iwconfig wlan0 essid "Clianta"
iwconfig-output now:
wlan0 IEEE 802.11g ESSID:"Clianta"
Mode:Managed Frequency:2.412 GHz Access Point: 00:1f:3a:6d:81:7b
Bit Rate=54 Mb/s
Power Management:off
Link Quality:56/100 Signal level:-60 dBm Noise level:-96 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:22 Invalid misc:3870 Missed beacon:0
The word behind ESSID changes from "Clianta" to off/any from time to time, but the Access Point stays there
Now the first obvious problem for me occured:
I couldn`t get an IP per:
dhcpcd wlan0 -L
-> wlan0 timed out (10 tries ... with good connection quality)
so i assigned a static ip:
ifconfig wlan0 192.168.178.30 up
ifconfig output:
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:15 errors:0 dropped:0 overruns:0 frame:0
TX packets:15 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:270 (270.0 b) TX bytes:270 (270.0 b)
wlan0 Link encap:Ethernet HWaddr 00:1F:3A:6D:81:7B
inet addr:192.168.178.30 Bcast:192.168.178.255 Mask:255.255.255.0
inet6 addr: fe80::21f:3aff:fe6d:817b/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:323 errors:0 dropped:0 overruns:0 frame:0
TX packets:349 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:36499 (35.6 Kb) TX bytes:47159 (46.0 Kb)
Interrupt:16 Memory:f2000000-f2010000
and at last I ran:
route add default gateway 192.168.178.1
(as you might have noticed I used an other gateway in my /etc/network.d/home, but I noticed that I used a false gateway there ... gateway 192.168.178.1 is 100% correct for me, I`m sure)
So, but as I try to ping my router or www.google.com now, I get:
ping: unknown host www.google.com
...
My guess is that wpa_supplicant isn`t working properly, but I`ve no idea how a good or bad wpa_supplicant output looks like ...
If networkmanager is not giving you better luck, then the problem is definitely the drivers. This will get more complicated because you will either have to install beta versions of ndiswrapper, you may need to recompile your 64 bit kernel to get madwifi working, you may need to use another kernel (either an older one or one from AUR), or you may need to use 32 bit arch.
Well oh no But I think the driver seems not to be the problem.
Try netcfg from [testing] and mess around with different quirk options
I downloaded netcfg from testing, but what do you mean with quirk options? The different options documented in "man netcfg" or other special options?
So, thankyou very much @ sam & iphitus!!! It`s nearly fun trying to figure out the problem *gg*
Top_se
EDIT: SORRY, I noticed the bug in the bb-code-parser of this forum software, but I have to leave now, I will make the wpa-supplicant-output available through an other way, later, sorry form this horrible long post
Last edited by Top_se (2008-08-05 09:58:26)
Offline
Quirks: http://wiki.archlinux.org/index.php/Net … s.2Fquirks
Only works in netcfg from testing.
There'll be another few new quirks in the next version that may also help... I'll try to release it soon.
Regarding unknown host, you need to setup DNS with a static config as well.
Offline
Couple of things:
Try running iwconfig wlan0 essid "Clianta" with root privaleges. If encryption is properly established, then you should see a line that reads "encryption key". You can also set the encryption key from iwconfig.
Why did you run dhcpcd with the -L option? From my understanding the internet is still ipv4. Try running dhcpcd without the -L option and check the daemon log for dhcpcd afterwards.
I also agree with iphitus, you need to setup the dns (in /etc/resolve.conf) and setup up your ip address manually.
You still may have a driver problem, its just that networkmanager gets around it. If networkmanager didn't work either, all that it would tell us is that it must be a driver problem. The previous statement is not necessarily true the other way around.
Out of curiosity, why do you not want a gui to set-up the network? You can automate it so that the connection gets established automatically when you login (without typing anything in), it also shows signal strength. With regard to the garbage networkmanager spits out when you shutdown (I don't have anything from networkmanger when I boot), there is a patch for that and there maybe an AUR package for it.
Offline
Huhu!
Quirks: http://wiki.archlinux.org/index.php/Net … s.2Fquirks
Only works in netcfg from testing.
Oh, sorry, I could have found this article on my own, sorry, but nonetheless I tried warious combinations for a while, but it didn`t improve netcfg2`s behavior ...
There'll be another few new quirks in the next version that may also help... I'll try to release it soon.
I`m really looking forward to them!!!
Regarding unknown host, you need to setup DNS with a static config as well.
Okay, I tried this, but if didn`t help either, and I`m not sure, but souldn`t I be at least able to ping to my router even without the proper configuration of a DNS-Server? Because pinging to 192.168.178.1 isn`t working either:
ping -c 1 192.168.178.1 results in: From 192.168.178.30 icmp_seq=1 Destination Host Unreachable (actually i uses more packets of course)
Try running iwconfig wlan0 essid "Clianta" with root privaleges.
I`m sorry I didn`t tell you, that I ran all processes where required with sudo ...
If encryption is properly established, then you should see a line that reads "encryption key". You can also set the encryption key from iwconfig.
Isn`t this encryption key for wep? (I`m not sure, but I think so) Because, when I look now at the output of iwconfig I can`t see such an encryption key either, even if my network is working properly with networkmanager:
wlan0 IEEE 802.11g ESSID:"Clianta"
Mode:Managed Frequency:2.412 GHz Access Point: 00:1F:3F:13:92:29
Bit Rate=54 Mb/s
Power Management:off
Link Quality:18/100 Signal level:-84 dBm Noise level:-96 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:1034 Invalid misc:21063 Missed beacon:0
Why did you run dhcpcd with the -L option? From my understanding the internet is still ipv4. Try running dhcpcd without the -L option and check the daemon log for dhcpcd afterwards.
I used the -L option because I didn`t want that dhcpcd would assign a random IP to my interface if it fails ... so I could rerun dhcpcd without an obstacle ...
That`s the dhcp-log, first I used the -L option -> it finished just with exiting
Than I didn`t use the -L option:
Aug 5 19:02:17 localhost dhcpcd[3060]: wlan0: dhcpcd 3.2.1 starting
Aug 5 19:02:17 localhost dhcpcd[3060]: wlan0: hardware address = 00:1f:3a:6d:81:7b
Aug 5 19:02:17 localhost dhcpcd[3060]: wlan0: removing IP address 192.168.178.23/24
Aug 5 19:02:17 localhost dhcpcd[3060]: wlan0: broadcasting for a lease
Aug 5 19:02:37 localhost dhcpcd[3060]: wlan0: exiting
Aug 5 19:02:43 localhost dhcpcd[3061]: wlan0: dhcpcd 3.2.1 starting
Aug 5 19:02:43 localhost dhcpcd[3061]: wlan0: hardware address = 00:1f:3a:6d:81:7b
Aug 5 19:02:43 localhost dhcpcd[3061]: wlan0: broadcasting for a lease
Aug 5 19:03:03 localhost dhcpcd[3061]: wlan0: trying to use old lease in `/var/lib/dhcpcd/dhcpcd-wlan0.info'
Aug 5 19:03:03 localhost dhcpcd[3061]: wlan0: probing for an IPV4LL address
Aug 5 19:03:04 localhost dhcpcd[3061]: wlan0: using IPV4LL address 169.254.218.214
Aug 5 19:03:04 localhost dhcpcd[3061]: wlan0: adding IP address 169.254.218.214/16
Aug 5 19:03:04 localhost dhcpcd[3061]: wlan0: exiting
I also agree with iphitus, you need to setup the dns (in /etc/resolve.conf) and setup up your ip address manually.
I setup my router as the nameserver in the resolv.conf but unfortunatly it didn`t help ....
You still may have a driver problem, its just that networkmanager gets around it. If networkmanager didn't work either, all that it would tell us is that it must be a driver problem. The previous statement is not necessarily true the other way around.
hmpf, this sounds striking ...
Out of curiosity, why do you not want a gui to set-up the network? You can automate it so that the connection gets established automatically when you login (without typing anything in), it also shows signal strength. With regard to the garbage networkmanager spits out when you shutdown (I don't have anything from networkmanger when I boot), there is a patch for that and there maybe an AUR package for it.
Yeah, it`s a silly "I want to do it the basic way"-attitude -> I didn`t switched to arch to do it the windows-way ...But if I can`t solve this problem here, I will be able to live with it, of course
I noticed something that seems to be important to me:
This is the output of ifconfig if the connection failed:
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:15 errors:0 dropped:0 overruns:0 frame:0
TX packets:15 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:270 (270.0 b) TX bytes:270 (270.0 b)
wlan0 Link encap:Ethernet HWaddr 00:1F:3A:6D:81:7B
inet addr:192.168.178.30 Bcast:192.168.178.255 Mask:255.255.255.0
inet6 addr: fe80::21f:3aff:fe6d:817b/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:323 errors:0 dropped:0 overruns:0 frame:0
TX packets:349 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:36499 (35.6 Kb) TX bytes:47159 (46.0 Kb)
Interrupt:16 Memory:f2000000-f2010000
And that`s the output of ifconfig when a connection is established:
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:1 errors:0 dropped:0 overruns:0 frame:0
TX packets:1 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:18 (18.0 b) TX bytes:18 (18.0 b)
wlan0 Link encap:Ethernet HWaddr 00:1F:3A:6D:81:7B
inet addr:192.168.178.23 Bcast:192.168.178.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:6 errors:0 dropped:0 overruns:0 frame:0
TX packets:5 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1570 (1.5 Kb) TX bytes:964 (964.0 b)
Interrupt:16 Memory:f2000000-f2010000
The only difference is the RUNNING-flag at the wlan0-section, right? But who sets this FLAG? The driver, wpa_supplicant, or can I do it manually? I googled for this flag but I could only find, that I had to configure ifconfig properly ... As well when I have a connection through networkmanager this flag is set ...
I can`t thank you enough for beeing so persistent in helping me!!
Top_se
EDIT: dhcp log handed in later
Last edited by Top_se (2008-08-05 18:35:53)
Offline
Couple of things I noticed that should bring us closer to the solution:
iwconfig has a very low link quality (18), are you farther from the router than the other posts?
I don't think you are using the -L option correctly, the -L option means don't use ipv4 adresses like 192.xx.xxx.xx, instead use ipv6 addresses that go like xxx::xxx::xxx::xxx. I think this is the main problem. When a connection is established you don't have an ipv6 address (inet6 addr line), whereas you have an ipv6 when it fails. Which makes sense, if you are forcing dhcp not to use ipv4 and use ipv6 instead. ipv6 is different from ipv4 and the router, internet, and network will NOT work with ipv6. So at no point should you have an ipv6 adress in ifconfig or iwconfig.
The encryption line of iwconfig should be there regardless of encryption type, you may not be able to set-up wpa or wpa2 encryption in iwconfig, but you should still see that line. I use wpa encryption and I have that line. If however, you don't have the line when you are connected, it maybe an ndiswrapper thing (I use open-source drivers).
The running flag is not one you set, but it is automatically set when the interface is working completely ie. once you are connected. So this is nothing to worry about.
Why is the inet address different when you connection is established vs when its not?
BTW There is no shame in doing things the windows way, windows does some thing better than linux and one of them is how windows deals with wireless cards. As you can see from your experience, setting up the wireless in linux tends to be a huge pain, while it is flawless in windows. I'm a huge linux advocate, especially arch, but I'm aware of the strength and weakness of each OS.
Offline
The alternative approach (the one I've liked to read) is:
1. Get madwifi-svn with the latest hal, from svn
http://svn.madwifi.org/madwifi/branches … -0.10.5.6/
2. Compile that stuff
3. Forbid ath5k from loading.
4. Configure netcfg to use wpa-config security.
5. In your wpa_supplicant.conf (or whatever you named that config file) add:
ctrl_interface=/var/run/wpa_supplicant
network={
scan_ssid=0
eapol_flags=3
(...)
}
If it doesn't work, try 'eapol_flags--' .
That solved my WPA2/AES association issues. I hope this approach works for you.
They say that if you play a Win cd backward you hear satanic messages. That's nothing! 'cause if you play it forwards, it installs windows.
Offline
Well, I`ve got to submit good news *ggg*
I tried out this newer madwifi-driver which kjon sugested and finally I got the madwifi driver working *gg* so I have now an ath0 and wifi0 interfiace and could get rid of my ndiswrapper driver.
And now, there aren`t any problems concerning netcfg2 or setting up my connection per iwconfig ifconfig or wpa_supplicant manually anymore *gg*
So at last it was definitly a driver issue and I`m thanking anyone who posted in this thread and helped me so greatly to find the solution and made me not to give up
Top_se
Last edited by Top_se (2008-08-06 16:25:28)
Offline