View previous topic :: View next topic |
Author |
Message |
cmdr17 n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 11 May 2005 Posts: 27 Location: Germany
|
Posted: Sat Dec 08, 2007 8:40 pm Post subject: [solved] wpa_supplicant on ThinkPad T42 |
|
|
Hi!
I'm trying to connect to my home network using wpa_supplicant.
Here is the output I get:
Code: |
wpa_supplicant -Dwext -i eth1 -c/pathtowpaconffile/wpa_supplicant.conf -d
[...]
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: xx:xx:xx:xx:xx:xx
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 286 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: xx:xx:xx:xx:xx:xx ssid='wlan' wpa_ie_len=28 rsn_ie_len=22 caps=0x11
selected based on WPA IE
Trying to associate with xx:xx:xx:xx:xx:xx (SSID='wlan' freq=2442 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=28): xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: set AP RSN IE - hexdump(len=22): xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: added PMKSA cache candidate xx:xx:xx:xx:xx:xx prio 1000
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=14
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 286 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: xx:xx:xx:xx:xx:e1 ssid='wlan' wpa_ie_len=28 rsn_ie_len=22 caps=0x11
selected based on WPA IE
Already associated with the selected AP.
RSN: added PMKSA cache candidate xx:xx:xx:xx:xx:xx prio 1000
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: xx:xx:xx:xx:xx:xx
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx
No keys have been configured - skip key clearing
Associated with xx:xx:xx:xx:xx:xx
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from xx:xx:xx:xx:xx:xx
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 86
key_nonce - hexdump(len=32): xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
WPA: Renewed SNonce - hexdump(len=32): e7 1d a4 dc 4c fd d4 ff 5f 48 8f 54 fb de fd 69 0a e2 2e c7 94 b5 7b 94 be f0 f6 74 f0 de 65 44
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:01:e3:5c:c2:e1
IEEE 802.1X RX: version=1 type=3 length=123
EAPOL-Key type=254
key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=16 key_data_length=28
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 87
key_nonce - hexdump(len=32): 45 e4 97 f7 db b9 16 84 fa 59 e9 88 56 df 74 40 ba 2e 5e df b1 c0 2d 47 03 3f 8a aa 6f de b0 49
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 44 a5 3c 0a e1 b6 a6 f4 1c 0a 53 b4 2f d8 d4 96
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from xx:xx:xx:xx:xx:xx
IEEE 802.1X RX: version=1 type=3 length=135
EAPOL-Key type=254
key_info 0x3b2 (ver=2 keyidx=3 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=40
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 89
key_nonce - hexdump(len=32): 45 e4 97 f7 db b9 16 84 fa 59 e9 88 56 df 74 40 ba 2e 5e df b1 c0 2d 47 03 3f 8a aa 6f de b0 48
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 24 df af b1 86 3a 30 4a 58 af 04 25 86 38 a2 77
WPA: RX message 1 of Group Key Handshake from xx:xx:xx:xx:xx:xx (ver=2)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=3 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with xx:xx:xx:xx:xx:xx [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to xx:xx:xx:xx:xx:xx completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
EAPOL: startWhen --> 0
|
Please let me know if I should post the configuration files.
Any suggestions appreciated!
Last edited by cmdr17 on Sun Dec 09, 2007 1:11 am; edited 1 time in total |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
thecooptoo Veteran
![Veteran Veteran](/images/ranks/rank_rect_5_vet.gif)
Joined: 27 Apr 2003 Posts: 1353 Location: UK
|
Posted: Sat Dec 08, 2007 8:52 pm Post subject: |
|
|
whats grep ^[A-Za-z\ ] wpa_supplicant.conf _________________ join the optout - http://nhsconfidentiality.org |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
cmdr17 n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 11 May 2005 Posts: 27 Location: Germany
|
Posted: Sat Dec 08, 2007 10:17 pm Post subject: |
|
|
Thanks for your response!
My wpa_supplicant.conf file:
Code: |
network={
ssid="wlan"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP
group=TKIP
psk="MySecretPsk"
}
|
|
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
cmdr17 n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 11 May 2005 Posts: 27 Location: Germany
|
Posted: Sun Dec 09, 2007 1:10 am Post subject: |
|
|
Ok, wpa_supplicant works perfektly.
Simply forgot to run dhcpcd... ![Rolling Eyes :roll:](images/smiles/icon_rolleyes.gif) |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
|