From: "Алексей Данилович" <mlists@list.ru>
To: ALT Linux Community general discussions <community@lists.altlinux.org>
Subject: Re: [Comm] Опять про NM, etcnet и wpa_supplicant.conf
Date: Sun, 15 Feb 2009 20:45:10 +0300
Message-ID: <94a6689a0902150945m1b36be0i52c915e1ea3eefe8@mail.gmail.com> (raw)
In-Reply-To: <200902022354.54904.sem@altlinux.ru>
[-- Attachment #1: Type: text/plain, Size: 681 bytes --]
Прошу прощения за поздний ответ, я был в командировке. Сделал. Файл
прикладываю. Только вот оно не выходит из этой команды, толи висит,
толи в цикле. Я подождал 3 минуты и прервал. И что из этого следует?
> Если эти установки соответствуют вашей AP - должно работать.
> Судя по всему у вас проблема при подключении к самой точке, до получения ip и
> т.д. дело не доходит. Попробуйте от root:
> service NetworkManager stop
> service network stop
> wpa_supplicant -dddt -ieth1 -Dwext -c path/to/wpa_supplicant.conf
> (если я правильно понимаю, что eth1 - это ваш wifi интерфейс) и покажите что
> он выводит.
Большое спасибо.
PS. Опять я не усмотрел, куда гмыло письмо послало (((
[-- Attachment #2: wpa.txt --]
[-- Type: text/plain, Size: 13893 bytes --]
1234719318.647139: Initializing interface 'eth1' conf '/etc/net/ifaces/eth1/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
1234719318.647240: Configuration file '/etc/net/ifaces/eth1/wpa_supplicant.conf' -> '/etc/net/ifaces/eth1/wpa_supplicant.conf'
1234719318.647248: Reading configuration file '/etc/net/ifaces/eth1/wpa_supplicant.conf'
1234719318.647316: ctrl_interface='/var/run/wpa_supplicant'
1234719318.647339: update_config=1
1234719318.647346: Line: 4 - start of a new network block
1234719318.647363: ssid - hexdump_ascii(len=10):
77 6f 6c 61 6e 64 5f 6e 65 74 woland_net
1234719318.647388: scan_ssid=1 (0x1)
1234719318.647397: key_mgmt: 0x2
1234719318.647404: PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
1234719318.647416: proto: 0x2
1234719318.647423: pairwise: 0x8
1234719318.647430: group: 0xe
1234719318.692476: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1234719318.692539: Priority group 0
1234719318.692546: id=0 ssid='woland_net'
1234719318.692557: Initializing interface (2) 'eth1'
1234719318.698431: EAPOL: SUPP_PAE entering state DISCONNECTED
1234719318.698442: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1234719318.698450: EAPOL: SUPP_BE entering state INITIALIZE
1234719318.698456: EAP: EAP entering state DISABLED
1234719318.698465: EAPOL: External notification - portEnabled=0
1234719318.698470: EAPOL: External notification - portValid=0
1234719318.699083: SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
1234719318.699091: capabilities: key_mgmt 0xf enc 0xf
1234719318.699190: WEXT: Operstate: linkmode=1, operstate=5
1234719318.699295: Own MAC address: 00:15:00:44:19:25
1234719318.699304: wpa_driver_wext_set_wpa
1234719318.699313: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1234719318.699327: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1234719318.699337: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1234719318.699347: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1234719318.699357: wpa_driver_wext_set_countermeasures
1234719318.699363: wpa_driver_wext_set_drop_unencrypted
1234719318.699379: Setting scan request: 0 sec 100000 usec
1234719318.699542: Added interface eth1
1234719318.699600: RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
1234719318.699608: Wireless event: cmd=0x8b06 len=8
1234719318.699622: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1234719318.699630: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1234719318.714612: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1234719318.714617: Wireless event: cmd=0x8b15 len=20
1234719318.714620: Wireless event: new AP: 00:13:46:a5:86:22
1234719318.714624: State: DISCONNECTED -> ASSOCIATED
1234719318.714627: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1234719318.714630: WEXT: Operstate: linkmode=-1, operstate=5
1234719318.714646: Associated to a new BSS: BSSID=00:13:46:a5:86:22
1234719318.714651: No keys have been configured - skip key clearing
1234719318.714658: Network configuration found for the current AP
1234719318.714661: WPA: No WPA/RSN IE available from association info
1234719318.714665: WPA: Set cipher suites based on configuration
1234719318.714667: WPA: Selected cipher suites: group 14 pairwise 8 key_mgmt 2 proto 2
1234719318.714672: WPA: clearing AP WPA IE
1234719318.714675: WPA: clearing AP RSN IE
1234719318.714678: WPA: using GTK TKIP
1234719318.714681: WPA: using PTK TKIP
1234719318.714684: WPA: using KEY_MGMT WPA-PSK
1234719318.714687: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
1234719318.714696: EAPOL: External notification - EAP success=0
1234719318.714699: EAPOL: External notification - EAP fail=0
1234719318.714702: EAPOL: External notification - portControl=Auto
1234719318.714707: Associated with 00:13:46:a5:86:22
1234719318.714710: WPA: Association event - clear replay counter
1234719318.714712: EAPOL: External notification - portEnabled=0
1234719318.714715: EAPOL: External notification - portValid=0
1234719318.714746: EAPOL: External notification - EAP success=0
1234719318.714749: EAPOL: External notification - portEnabled=1
1234719318.714752: EAPOL: SUPP_PAE entering state CONNECTING
1234719318.714754: EAPOL: SUPP_BE entering state IDLE
1234719318.714758: Setting authentication timeout: 10 sec 0 usec
1234719318.714763: Cancelling scan request
1234719318.714767: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1234719318.714771: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1234719320.544378: RX EAPOL from 00:13:46:a5:86:22
1234719320.544397: RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 89 00 20 00 00 00 00 00 00 00 01 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1234719320.544475: Setting authentication timeout: 10 sec 0 usec
1234719320.544493: IEEE 802.1X RX: version=1 type=3 length=95
1234719320.544504: EAPOL-Key type=2
1234719320.544509: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1234719320.544517: key_length=32 key_data_length=0
1234719320.544522: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1234719320.544533: key_nonce - hexdump(len=32): 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4
1234719320.544557: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1234719320.544572: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1234719320.544582: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1234719320.544593: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1234719320.544610: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 89 00 20 00 00 00 00 00 00 00 01 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1234719320.544696: State: ASSOCIATED -> 4WAY_HANDSHAKE
1234719320.544702: WPA: RX message 1 of 4-Way Handshake from 00:13:46:a5:86:22 (ver=1)
1234719320.544710: RSN: msg 1/4 key data - hexdump(len=0):
1234719320.547206: WPA: Renewed SNonce - hexdump(len=32): be 5d d8 62 0e ae b2 62 45 82 36 26 4c b6 fe ce 77 4c 1c 82 c2 08 e5 fd a6 df 7c d5 b0 57 9d cf
1234719320.547263: WPA: PMK - hexdump(len=32): [REMOVED]
1234719320.547269: WPA: PTK - hexdump(len=64): [REMOVED]
1234719320.547278: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
1234719320.547300: WPA: Sending EAPOL-Key 2/4
1234719320.547328: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 09 00 00 00 00 00 00 00 00 00 01 be 5d d8 62 0e ae b2 62 45 82 36 26 4c b6 fe ce 77 4c 1c 82 c2 08 e5 fd a6 df 7c d5 b0 57 9d cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 b4 8c f0 81 cb 80 1f d8 5c 03 a5 ca 8f 4d 6b 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
1234719320.552599: RX EAPOL from 00:13:46:a5:86:22
1234719320.552608: RX EAPOL - hexdump(len=161): 01 03 00 9d 02 13 c9 00 20 00 00 00 00 00 00 00 02 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4 b7 a4 5f 29 8b 78 37 ec a6 15 72 1b e0 6d 1b f3 d4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 5c c5 b3 23 f9 26 88 66 41 1b b5 9b 90 c4 0a 00 3e 4d d6 c3 8e dc 8d 38 74 39 43 fe 07 a5 f2 d0 5d 04 96 5d c7 a7 c8 8f ca fc 04 69 f8 93 8b c2 e1 f1 cd ca cb 33 51 86 a3 d5 55 b0 0e b0 c1 99 bc 8b ac 29 25 b6 7d 95 75 29 ca 6b d9 9a 6c
1234719320.552711: IEEE 802.1X RX: version=1 type=3 length=157
1234719320.552716: EAPOL-Key type=2
1234719320.552721: key_info 0x13c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1234719320.552729: key_length=32 key_data_length=62
1234719320.552734: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1234719320.552810: key_nonce - hexdump(len=32): 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4
1234719320.552834: key_iv - hexdump(len=16): b7 a4 5f 29 8b 78 37 ec a6 15 72 1b e0 6d 1b f3
1234719320.552848: key_rsc - hexdump(len=8): d4 02 00 00 00 00 00 00
1234719320.552858: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1234719320.552868: key_mic - hexdump(len=16): 2b 5c c5 b3 23 f9 26 88 66 41 1b b5 9b 90 c4 0a
1234719320.552883: WPA: RX EAPOL-Key - hexdump(len=161): 01 03 00 9d 02 13 c9 00 20 00 00 00 00 00 00 00 02 62 39 33 88 ef 7d f5 1a 6d 4e 28 5c 40 cf 4a 10 18 77 10 86 7c 11 b3 d5 b6 96 e2 92 ea aa 06 d4 b7 a4 5f 29 8b 78 37 ec a6 15 72 1b e0 6d 1b f3 d4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 5c c5 b3 23 f9 26 88 66 41 1b b5 9b 90 c4 0a 00 3e 4d d6 c3 8e dc 8d 38 74 39 43 fe 07 a5 f2 d0 5d 04 96 5d c7 a7 c8 8f ca fc 04 69 f8 93 8b c2 e1 f1 cd ca cb 33 51 86 a3 d5 55 b0 0e b0 c1 99 bc 8b ac 29 25 b6 7d 95 75 29 ca 6b d9 9a 6c
1234719320.552990: RSN: encrypted key data - hexdump(len=62): 4d d6 c3 8e dc 8d 38 74 39 43 fe 07 a5 f2 d0 5d 04 96 5d c7 a7 c8 8f ca fc 04 69 f8 93 8b c2 e1 f1 cd ca cb 33 51 86 a3 d5 55 b0 0e b0 c1 99 bc 8b ac 29 25 b6 7d 95 75 29 ca 6b d9 9a 6c
1234719320.553041: WPA: decrypted EAPOL-Key key data - hexdump(len=62): [REMOVED]
1234719320.553047: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1234719320.553053: WPA: RX message 3 of 4-Way Handshake from 00:13:46:a5:86:22 (ver=1)
1234719320.553060: WPA: IE KeyData - hexdump(len=62): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 01 00 35 c7 6d 98 5c fd 91 4c 1d 3d 01 df c2 2f a9 17 c5 8c c4 02 59 69 7a 7b 87 f7 2f 86 ff fe b3 f0
1234719320.553105: WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
1234719320.553173: Received 255 bytes of scan results (1 BSSes)
1234719320.553180: Scan results: 1
1234719320.553187: WPA: clearing AP WPA IE
1234719320.553192: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00
1234719320.553212: WPA: Found the current AP from updated scan results
1234719320.553218: WPA: Sending EAPOL-Key 4/4
1234719320.553228: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 09 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 3d 1d 9f 28 4f 25 a6 7e 7f 5a ac f9 13 b3 b6 00 00
1234719320.553306: WPA: Installing PTK to the driver.
1234719320.553311: wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
1234719320.553343: EAPOL: External notification - portValid=1
1234719320.553350: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1234719320.553355: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1234719320.553361: WPA: Group Key - hexdump(len=32): [REMOVED]
1234719320.553367: WPA: Installing GTK to the driver (keyidx=1 tx=0).
1234719320.553372: WPA: RSC - hexdump(len=6): d4 02 00 00 00 00
1234719320.553381: wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
1234719320.553404: WPA: Key negotiation completed with 00:13:46:a5:86:22 [PTK=TKIP GTK=TKIP]
1234719320.553411: Cancelling authentication timeout
1234719320.553416: State: GROUP_HANDSHAKE -> COMPLETED
1234719320.553427: CTRL-EVENT-CONNECTED - Connection to 00:13:46:a5:86:22 completed (auth) [id=0 id_str=]
1234719320.553432: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1234719320.553439: WEXT: Operstate: linkmode=-1, operstate=6
1234719320.553931: EAPOL: External notification - portValid=1
1234719320.553937: EAPOL: External notification - EAP success=1
1234719320.553941: EAPOL: SUPP_PAE entering state AUTHENTICATING
1234719320.553946: EAPOL: SUPP_BE entering state SUCCESS
1234719320.553950: EAP: EAP entering state DISABLED
1234719320.553955: EAPOL: SUPP_PAE entering state AUTHENTICATED
1234719320.553960: EAPOL: SUPP_BE entering state IDLE
1234719320.553983: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
1234719320.554018: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1234719321.703738: EAPOL: startWhen --> 0
1234719430.501334: CTRL-EVENT-TERMINATING - signal 2 received
1234719430.501350: Removing interface eth1
1234719430.501356: State: COMPLETED -> DISCONNECTED
1234719430.501363: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1234719430.501369: WEXT: Operstate: linkmode=-1, operstate=5
1234719430.501883: wpa_driver_wext_deauthenticate
1234719430.501897: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1234719430.501913: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1234719430.501924: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1234719430.501934: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1234719430.501944: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1234719430.501955: EAPOL: External notification - portEnabled=0
1234719430.501960: EAPOL: SUPP_PAE entering state DISCONNECTED
1234719430.501964: EAPOL: SUPP_BE entering state INITIALIZE
1234719430.501971: EAPOL: External notification - portValid=0
1234719430.501976: wpa_driver_wext_set_wpa
1234719430.502207: wpa_driver_wext_set_drop_unencrypted
1234719430.502217: wpa_driver_wext_set_countermeasures
1234719430.502224: No keys have been configured - skip key clearing
1234719430.503802: Cancelling scan request
1234719430.503812: Cancelling authentication timeout
1234719430.504482: WEXT: Operstate: linkmode=0, operstate=6
next prev parent reply other threads:[~2009-02-15 17:45 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-25 21:34 Алексей Данилович
2009-01-29 11:46 ` Алексей Данилович
2009-01-29 12:28 ` Alexei V. Mezin
2009-01-29 14:17 ` Mikhail Efremov
2009-01-29 19:15 ` Maks Re
2009-01-29 19:50 ` Mikhail Efremov
2009-01-31 10:01 ` Алексей Данилович
2009-01-31 10:15 ` Алексей Данилович
2009-02-02 20:54 ` Mikhail Efremov
2009-02-15 17:45 ` Алексей Данилович [this message]
2009-02-16 13:38 ` Mikhail Efremov
2009-02-16 14:14 ` Dmitriy Kruglikov
2009-02-16 14:23 ` Michael Shigorin
2009-02-16 15:26 ` Dmitriy Kruglikov
2009-02-16 15:36 ` Андрей Новосёлов
2009-02-17 11:28 ` Dmitriy Kruglikov
2009-02-26 13:40 ` Michael Shigorin
2009-02-16 15:38 ` Mikhail Efremov
2009-02-16 15:41 ` Mikhail Efremov
2009-02-16 21:17 ` Алексей Данилович
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=94a6689a0902150945m1b36be0i52c915e1ea3eefe8@mail.gmail.com \
--to=mlists@list.ru \
--cc=community@lists.altlinux.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
ALT Linux Community general discussions
This inbox may be cloned and mirrored by anyone:
git clone --mirror http://lore.altlinux.org/community/0 community/git/0.git
# If you have public-inbox 1.1+ installed, you may
# initialize and index your mirror using the following commands:
public-inbox-init -V2 community community/ http://lore.altlinux.org/community \
mandrake-russian@linuxteam.iplabs.ru community@lists.altlinux.org community@lists.altlinux.ru community@lists.altlinux.com
public-inbox-index community
Example config snippet for mirrors.
Newsgroup available over NNTP:
nntp://lore.altlinux.org/org.altlinux.lists.community
AGPL code for this site: git clone https://public-inbox.org/public-inbox.git