Skocz do zawartości

Wpa_supplicant + Ipw2200 + Fc7


rawson11

Rekomendowane odpowiedzi

Witam.

 

Mam problem z podłączeniem Dell D610 (ipw2200) z Linksys54GC po WPA. Wszystko działa przy kodowaniu WEP, jednak żadne WPA nie chce ruszyć :-(. Mam zainstalowane sterowniki ipw2200-firmware. Zacząłem od WPA_GUI. Nie widzi Adaptera oraz Sieci oraz "Could get status from wpa_supplicant". Przy obecnej konfiguracji wpa_supplicant.conf wygląda następująco:

# WPA-PSK/TKIP

ctrl_interface=/var/run/wpa_supplicant
ap_scan=1

network={
    ssid="policja"
    key_mgmt=WPA-PSK
    proto=WPA
    pairwise=TKIP
    group=TKIP
    psk="lanosiklanosik"
}

psk - otwartym tekstem wpisałem taki kod jak w AP.

 

Uruchamiam:

[root@localhost ~]# wpa_supplicant -i eth1 -c/etc/wpa_supplicant/wpa_supplicant.conf -d

 

no i otrzymuję coś takiego:

Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Priority group 0
  id=0 ssid='policja'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
 capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:13:ce:d6:c5:0e
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 1220 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:18:39:3a:a6:ae ssid='policja' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  selected based on WPA IE
Trying to associate with 00:18:39:3a:a6:ae (SSID='policja' freq=2422 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b19 len=8
Received 1220 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:18:39:3a:a6:ae ssid='policja' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  selected based on WPA IE
Already associated with the selected AP.
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([uP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:39:3a:a6:ae
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:39:3a:a6:ae
No keys have been configured - skip key clearing
Associated with 00:18:39:3a:a6:ae
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([uP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:18:39:3a:a6:ae
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
 EAPOL-Key type=254
 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=32 key_data_length=0
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
 key_nonce - hexdump(len=32): 56 1d 0a 9b 2f a1 e7 8c c7 77 7d 1a 63 59 95 c9 02 2c ec 9c e4 d0 f6 93 4c 1a e2 4e 5d 85 cc c2
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 61 78 2d 61 67 65 3d 36
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:39:3a:a6:ae (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 58 96 a3 e8 f0 77 d4 68 bc 46 c9 bf 72 66 8b 98 6a 6e cc 5a 22 52 67 31 93 6f 7d 40 0d 70 06 64
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:18:39:3a:a6:ae
IEEE 802.1X RX: version=1 type=3 length=95
 EAPOL-Key type=254
 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=32 key_data_length=0
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
 key_nonce - hexdump(len=32): 56 1d 0a 9b 2f a1 e7 8c c7 77 7d 1a 63 59 95 c9 02 2c ec 9c e4 d0 f6 93 4c 1a e2 4e 5d 85 cc c2
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:39:3a:a6:ae (ver=1)
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:18:39:3a:a6:ae
IEEE 802.1X RX: version=1 type=3 length=95
 EAPOL-Key type=254
 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=32 key_data_length=0
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
 key_nonce - hexdump(len=32): 56 1d 0a 9b 2f a1 e7 8c c7 77 7d 1a 63 59 95 c9 02 2c ec 9c e4 d0 f6 93 4c 1a e2 4e 5d 85 cc c2
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:39:3a:a6:ae (ver=1)
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:39:3a:a6:ae into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b19 len=8
Received 1219 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:18:39:3a:a6:ae ssid='policja' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  selected based on WPA IE
Trying to associate with 00:18:39:3a:a6:ae (SSID='policja' freq=2422 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b1a len=15
EAPOL: startWhen --> 0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([uP])
Wireless event: cmd=0x8b19 len=8
Received 1220 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:18:39:3a:a6:ae ssid='policja' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  selected based on WPA IE
Already associated with the selected AP.
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([uP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:39:3a:a6:ae
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:39:3a:a6:ae
No keys have been configured - skip key clearing
Associated with 00:18:39:3a:a6:ae
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([uP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:18:39:3a:a6:ae
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
 EAPOL-Key type=254
 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=32 key_data_length=0
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
 key_nonce - hexdump(len=32): 16 b6 0a 78 ab 09 9c a4 89 3b b8 20 40 37 6a 95 1a b5 64 4b 40 e6 ee 65 e4 52 cc cb 57 f7 3e 44
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:39:3a:a6:ae (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 72 5c ed 3d 08 32 a3 8a 89 76 bb d3 8b b3 be 7b 77 e8 b2 54 4c f7 ab d8 88 35 c0 22 b7 5b d5 ee
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 00:18:39:3a:a6:ae from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
[root@localhost ~]# 

w czym może być problem ?

 

HELP - dodajcie mi wiary w FC7

Edytowane przez lszk
uzywaj codebox do długich listingów [powyżej 15 linijek]
Odnośnik do komentarza
Udostępnij na innych stronach

Jeśli chcesz dodać odpowiedź, zaloguj się lub zarejestruj nowe konto

Jedynie zarejestrowani użytkownicy mogą komentować zawartość tej strony.

Zarejestruj nowe konto

Załóż nowe konto. To bardzo proste!

Zarejestruj się

Zaloguj się

Posiadasz już konto? Zaloguj się poniżej.

Zaloguj się
×
×
  • Dodaj nową pozycję...