You are not logged in.

#1 2011-07-03 00:31:53

mot.def
Member
Registered: 2011-07-03
Posts: 19

"DHCP IP Lease attempt failed" when connecting to WPA2 network

Hey! After using Puppy Linux at school for a few months (to avoid the horribly restrictive Windows setup they use), I really began to grow on Linux, so I've been trying to set up Arch on my home PC. However, I've seen to hit a dead end with networking.

I'm using a Netgear USB WN111v2 adapter which seems to work fine with the ath9k driver. I've been following the "Wireless Setup" and "Beginners' Guide" articles on the ArchWiki, but after configuring the network and entering "netcfg [network name]", I get the following error:

ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument

After a few moments, netcfg returns "FAIL" and stops. I also tried the manual method, but after entering "wpa_supplicant -B -Dwext -i ath0 -c /etc/wpa_supplicant.conf", I get the same error message which loops until I restart.

I noticed that Puppy Linux seems to have difficulty connecting to the same WPA2 network on the same rig, so I suspect that the ath9k driver is incompatible with WPA2 security. Unfortunately there's another 6 machines connected to this access point without issues so I'm not going to be change the security type. I was hoping I could get some pointers as to how I could disable the ath9k driver and replace it with an alternative (I tried using ndiswrapper but it seemed to have no impact on netcfg or wpa_supplicant). Thanks!

edit: new problem has arisen - see next post

Last edited by mot.def (2011-07-03 14:22:22)

Offline

#2 2011-07-03 14:02:53

stqn
Member
Registered: 2010-03-19
Posts: 1,191
Website

Re: "DHCP IP Lease attempt failed" when connecting to WPA2 network

I don't know about the ath9k driver, but have you tried wicd (wicd-gtk)? I recently switched from wired to wireless and what I did is remove the "network" daemon from rc.conf and setup wicd using its GUI. (And then add the wicd daemon to rc.conf.)

Edit: Looks like WPA2 is supported by ath9k.

Last edited by stqn (2011-07-03 14:05:55)

Offline

#3 2011-07-03 14:21:08

mot.def
Member
Registered: 2011-07-03
Posts: 19

Re: "DHCP IP Lease attempt failed" when connecting to WPA2 network

I reinstalled Arch and played around with package options, and the adapter is now recognised as wlan0. I've got a new problem, though; I'm getting "DHCP IP Lease attempt failed" when connecting through netcfg, even after extending the DHCP timeout to 20 or 30 seconds. Configuring manually through wpa_supplicant doesn't seem to work at all.

I took a look at wicd, but I wasn't entirely sure how to set it up without the use of pacman. I'll have a go at building from source.

Offline

#4 2011-07-03 14:44:07

hokasch
Member
Registered: 2007-09-23
Posts: 1,461

Re: "DHCP IP Lease attempt failed" when connecting to WPA2 network

Please post the errors you get from running wpa_supplicant.

Offline

#5 2011-07-03 15:12:48

mot.def
Member
Registered: 2011-07-03
Posts: 19

Re: "DHCP IP Lease attempt failed" when connecting to WPA2 network

wpa_supplicant -i wlan0 -c /etc/wpa_supplicant.conf -dd > /home/wpaoutput

ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
ioctl[SIOCGIWSCAN]: Device or resource busy

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=15):
     42 54 48 6f 6d 65 48 75 62 32 2d 32 36 38 46      BTHomeHub2-268F 
proto: 0x2
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='BTHomeHub2-268F'
Initializing interface (2) 'wlan0'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:33:f5:af:54
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 94 32 a3 cf 9c 9b 59 6a b4 cd 43 7d cb c3 11 56
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=48
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=-1) - scan timeout 5 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=16
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=16
Received 3003 bytes of scan results (6 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:21:04:eb:5a:72 ssid='BTHomeHub2-268F' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:21:04:eb:5a:72 ssid='BTHomeHub2-268F'
Trying to associate with 00:21:04:eb:5a:72 (SSID='BTHomeHub2-268F' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b1a len=31
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=16
Received 3003 bytes of scan results (6 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:21:04:eb:5a:72 ssid='BTHomeHub2-268F' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:21:04:eb:5a:72 ssid='BTHomeHub2-268F'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=133
AssocResp IE wireless event - hexdump(len=117): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 89 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f 2d 1a 4c 10 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0a 00 03 7f 04 01 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:21:04:eb:5a:72
Association info event
resp_ies - hexdump(len=117): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 89 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f 2d 1a 4c 10 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0a 00 03 7f 04 01 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:21:04:eb:5a:72
No keys have been configured - skip key clearing
Associated with 00:21:04:eb:5a:72
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:21:04:eb:5a:72
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:21:04:eb:5a:72 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 64 3c 1f a1 8e da b4 6f 74 4f c7 6d cc 47 68 09 e5 27 77 2e d7 e4 b7 5e 17 7a 23 56 1c aa 91 e5
WPA: PTK derivation - A1=00:1f:33:f5:af:54 A2=00:21:04:eb:5a:72
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 64 3c 1f a1 8e da b4 6f 74 4f c7 6d cc 47 68 09 e5 27 77 2e d7 e4 b7 5e 17 7a 23 56 1c aa 91 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f7 45 43 ad 84 d0 9d 50 73 03 02 27 22 68 8d d2 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:21:04:eb:5a:72
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 73 49 dc 29 aa f9 68 4e dc 05 2e 36 5b 04 38 00 50 83 77 51 d0 d0 8d a9 be f7 97 e0 1b 74 01 19 f7 32 8e bc d9 ed 1a 9d 1e 3c 7d f5 41 5f f1 ac c5 a1 8f 91 74 56 e8 5a 8b 54 b3 fe 1a 70 89 93 12 9f c2 11 62 b7 93 4e 8c fc 96 af 30 86 a8 13 88 21 7a d9 14 28 56 2a 83 63 a5 1e 60 1c ef 6d 6c
IEEE 802.1X RX: version=1 type=3 length=175
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=80
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 63 02 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 4a 73 49 dc 29 aa f9 68 4e dc 05 2e 36 5b 04 38
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 52 0f 37 65 f6 79 9f 47 00 4d 2f fd 9d 0c c6 a3 39 1b 40 76 2c 6d 28 fc 7d 4f 7f 88 75 a6 09 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 73 49 dc 29 aa f9 68 4e dc 05 2e 36 5b 04 38 00 50 83 77 51 d0 d0 8d a9 be f7 97 e0 1b 74 01 19 f7 32 8e bc d9 ed 1a 9d 1e 3c 7d f5 41 5f f1 ac c5 a1 8f 91 74 56 e8 5a 8b 54 b3 fe 1a 70 89 93 12 9f c2 11 62 b7 93 4e 8c fc 96 af 30 86 a8 13 88 21 7a d9 14 28 56 2a 83 63 a5 1e 60 1c ef 6d 6c
RSN: encrypted key data - hexdump(len=80): 83 77 51 d0 d0 8d a9 be f7 97 e0 1b 74 01 19 f7 32 8e bc d9 ed 1a 9d 1e 3c 7d f5 41 5f f1 ac c5 a1 8f 91 74 56 e8 5a 8b 54 b3 fe 1a 70 89 93 12 9f c2 11 62 b7 93 4e 8c fc 96 af 30 86 a8 13 88 21 7a d9 14 28 56 2a 83 63 a5 1e 60 1c ef 6d 6c
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:21:04:eb:5a:72 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 6d 52 c7 62 16 01 79 d0 19 ba 6e ee 7f c0 21 10 9a b6 98 42 2a 5d 2a 9b 95 a5 9f 3d 5e 9d 38 32 dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 07 bc 7f 60 96 d1 ee 13 5f 62 28 fd 76 de 59 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 63 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:21:04:eb:5a:72 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:21:04:eb:5a:72 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick

[Does nothing after this point without intervention]

CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

I can use "ifconfig wlan0 scan" without any problems, and neither Windows nor OS X have problems connecting.

Offline

#6 2011-07-04 07:08:25

hokasch
Member
Registered: 2007-09-23
Posts: 1,461

Re: "DHCP IP Lease attempt failed" when connecting to WPA2 network

Odd. Suddenly, I have the same problem (ath9k as well) - wpa_supplicant connects fine, but acquiring an IP fails with both dhcpcd and dhclient. This is with my home router, setup did not change, kernel update was one week ago and dhcpcd 3 weeks. With another wep encrypted network, dhcpcd works fine.

No idea what to make of this, but setting a static adress works - see wireless-wpa-static in /examples for netcfg.

Offline

Board footer

Powered by FluxBB