View previous topic :: View next topic |
Author |
Message |
grube300 n00b
Joined: 01 Apr 2005 Posts: 7
|
Posted: Thu Sep 21, 2006 9:37 pm Post subject: linksys WUSB54G (Ralink rt2570) + ndiswrapper + wpasupplican |
|
|
Having ndiswrapper and rt2500usb for the above card I can not get wpa_supplicant working correctly
Starting the supplicant with
wpa_supplicant -Dwext -iwlan0 -c /etc/wpa_supplicant.conf -dd
just as written in https://forums.gentoo.org/viewtopic-t-487857-highlight-wpasupplicant+rt2500.html
and /etc/wpa_supplicant.conf
>>>>>>>>>
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
network={
ssid="erdberg1"
scan_ssid=1
proto=WPA
key_mgmt=WPA-PSK
pairwise=TKIP
group=TKIP
psk="xxxxxxxx"
priority=5
}
<<<<<<<<<<<<<<
does not connect to my linksys AP wiht WPA-PSK / TKIP and the correct passphrase
supplicant output is
# wpa_supplicant -Dwext -iwlan0 -c /etc/wpa_supplicant.conf -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
dot11RSNAConfigSATimeout=600
Line: 355 - start of a new network block
ssid - hexdump_ascii(len=:
65 72 64 62 65 72 67 31 erdberg1
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=27): [REMOVED]
priority=5 (0x5)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 5
id=0 ssid='erdberg1'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Invalid argument
SIOCGIWRANGE: WE(compiled)=19 WE(source)=18 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:16:b6:94:a6:17
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=:
65 72 64 62 65 72 67 31 erdberg1
Wireless event: cmd=0x8c07 len=56
AssocReq IE wireless event - hexdump(len=4: 00 08 65 72 64 62 65 72 67 31 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8c08 len=48
AssocResp IE wireless event - hexdump(len=40): 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:16:b6:19:63:11
Association info event
req_ies - hexdump(len=4: 00 08 65 72 64 62 65 72 67 31 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=40): 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: SCANNING -> ASSOCIATED
Associated to a new BSS: BSSID=00:16:b6:19:63:11
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:16:b6:19:63:11
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:16:b6:19:63:11
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:16:b6:19:63:11 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 2e 44 99 3d 51 a6 31 b0 3d ef de e2 2e 85 51 92 31 42 59 2c 9d 23 1b 7c f3 0f 34 5b 28 5a 33 b7
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 2e 44 99 3d 51 a6 31 b0 3d ef de e2 2e 85 51 92 31 42 59 2c 9d 23 1b 7c f3 0f 34 5b 28 5a 33 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 33 6e 84 22 6d 88 c3 a5 ab dc 26 9e 50 59 54 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Scan timeout - try to get results
Received 271 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 5
0: 00:16:b6:19:63:11 ssid='erdberg1' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Already associated with the selected AP.
RX EAPOL from 00:16:b6:19:63:11
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:16:b6:19:63:11 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 2e 44 99 3d 51 a6 31 b0 3d ef de e2 2e 85 51 92 31 42 59 2c 9d 23 1b 7c f3 0f 34 5b 28 5a 33 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c f5 55 56 fd 63 17 ec 76 83 ae d1 aa d5 e7 a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:16:b6:19:63:11
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 95 2e 85 99 f7 0f ef b1 28 16 a1 17 dc d6 dd f2 08 e0 24 72 22 02 56 1e 07 66 f0 87 3c ad 7c 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:16:b6:19:63:11 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 2e 44 99 3d 51 a6 31 b0 3d ef de e2 2e 85 51 92 31 42 59 2c 9d 23 1b 7c f3 0f 34 5b 28 5a 33 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 54 56 94 71 d6 de 76 4d 00 96 db ea 75 90 1e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:16:b6:19:63:11 into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
-> It seems that in message 2 of 4-wayhandshake something is wrong, that causes the AP to resend message one , but what is wrong ?
Any hints welcome |
|
Back to top |
|
|
solamour l33t
Joined: 21 Dec 2004 Posts: 726 Location: San Diego, CA
|
|
Back to top |
|
|
pappy_mcfae Watchman
Joined: 27 Dec 2007 Posts: 5999 Location: Pomona, California.
|
Posted: Sat Jan 12, 2008 7:17 am Post subject: |
|
|
If you are using ndiswrapper and wpa_supplicant, you are invoking wpa_supplicant improperly. Below is an /etc/conf.d/net file that works. I know, because that file worked on my system before I reconfigured it to automatically detect whether or not my wired NIC was plugged into the hub.
Code: | modules=( "wpa_supplicant" )
wpa_supplicant_wlan0="-Dndiswrapper"
config_wlan0=( "192.168.0.100" )
routes_wlan0=( "default via 192.168.0.1" ) |
Below is my /etc/wpa_supplicant/wpa_supplicant.conf
Code: |
ctrl_interface=/var/run/wpa_supplicant
update_config=1
ap_scan=1
fast_reauth=1
network={
ssid="pappynet"
psk="**************"
proto=WPA
disabled=0
}
|
Technically, the only thing you really need in the "network=" section of /etc/wpa_supplicant/wpa_supplicant.conf file is the ssid and the psk. The stuff above that part of the file is the bare minimum needed. I have found that when it comes to networking setups, simple is always better. As always, your mileage may vary.
Hope that works out.
Blessed be!
Pappy |
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|