Wpasupplicant non si avvia sotto feisty

Networking, configurazione della connessione, periferiche e condivisioni di rete.
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

si certo, cambia la solfa ma nn si connette lo stesso...

Codice: Seleziona tutto

oscar@oscar-desktop:~$ sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd 
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=7):
     77 69 66 69 6c 61 6e                              wifilan         
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='wifilan'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:c0:49:53:61:94
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=7):
     77 69 66 69 6c 61 6e                              wifilan         
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 256 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:c0:02:b7:d2:22 ssid='wifilan' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:c0:02:b7:d2:22 (SSID='wifilan' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=57
AssocReq IE wireless event - hexdump(len=49): 00 07 77 69 66 69 6c 61 6e 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:c0:02:b7:d2:22
Association info event
req_ies - hexdump(len=49): 00 07 77 69 66 69 6c 61 6e 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:c0:02:b7:d2:22
No keys have been configured - skip key clearing
Associated with 00:c0:02:b7:d2:22
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:c0:02:b7:d2:22 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 37 1c ce c3 e1 40 25 76 b1 64 b9 34 d1 80 f2 c4 3e 6d 13 ef 98 af d5 65 d3 bf 23 cb 6d 58 e3 81
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 37 1c ce c3 e1 40 25 76 b1 64 b9 34 d1 80 f2 c4 3e 6d 13 ef 98 af d5 65 d3 bf 23 cb 6d 58 e3 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 ed 77 3e 44 cf 82 0d 61 97 bf 10 26 05 ae 89 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 0d 04 22 e4 09 61 4d 51 20 a6 19 1b ef 3f ce 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 46 0d 04 22 e4 09 61 4d 51 20 a6 19 1b ef 3f ce
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 0d 04 22 e4 09 61 4d 51 20 a6 19 1b ef 3f ce 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:c0:02:b7:d2:22 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 a2 cd 42 10 cf e7 4b 97 63 79 46 32 80 d7 1b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 04 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 27 41 d4 33 dd 78 4d 49 f1 9d bf 1a de 57 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): f5 27 41 d4 33 dd 78 4d 49 f1 9d bf 1a de 57 3d
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 04 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 27 41 d4 33 dd 78 4d 49 f1 9d bf 1a de 57 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: GROUP_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:c0:02:b7:d2:22 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 ba 5b b0 f9 31 18 e6 cc 9f a4 2c 05 51 4c 2e 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 05 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 53 ae d3 29 66 13 25 78 a4 1d cc 76 e8 fa 5d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 4c 53 ae d3 29 66 13 25 78 a4 1d cc 76 e8 fa 5d
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 05 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 53 ae d3 29 66 13 25 78 a4 1d cc 76 e8 fa 5d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: GROUP_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:c0:02:b7:d2:22 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 09 1d 16 5c 85 2d 11 f2 91 d2 67 be 68 e3 a8 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 06 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 c7 5e d5 1e 7f e1 89 f5 4f 85 58 c4 a1 0f bb 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 27 c7 5e d5 1e 7f e1 89 f5 4f 85 58 c4 a1 0f bb
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 06 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 c7 5e d5 1e 7f e1 89 f5 4f 85 58 c4 a1 0f bb 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: GROUP_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:c0:02:b7:d2:22 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 95 91 87 14 a8 cb e7 2e 43 11 81 1c 73 c2 ef 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:c0:02:b7:d2:22
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e3
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e7 0f 2e a2 96 cd a3 62 7b 37 e6 cb 97 f4 af f8 72 20 85 bc 52 54 89 14 e0 1b 58 ae a2 24 7e e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Replay Counter did not increase - dropping packet
Authentication with 00:c0:02:b7:d2:22 timed out.
Added BSSID 00:c0:02:b7:d2:22 into blacklist
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:c0:02:b7:d2:22 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Scan timeout - try to get results
Received 256 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:c0:02:b7:d2:22 ssid='wifilan' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 00:c0:02:b7:d2:22 from blacklist (clear)
Selecting BSS from priority group 0
0: 00:c0:02:b7:d2:22 ssid='wifilan' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:c0:02:b7:d2:22 (SSID='wifilan' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=57
AssocReq IE wireless event - hexdump(len=49): 00 07 77 69 66 69 6c 61 6e 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:c0:02:b7:d2:22
Association info event
req_ies - hexdump(len=49): 00 07 77 69 66 69 6c 61 6e 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:c0:02:b7:d2:22
No keys have been configured - skip key clearing
Associated with 00:c0:02:b7:d2:22
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Cancelling scan request
>:( >:( >:(

Volevo premettere che con edgy si collegava con le medesime impostazioni sia sul lato wpa_supplicant che lato router


p.s. grazie peri complimenti il mac ringrazia :D
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

/etc/default/wpasupplicant

va con

Codice: Seleziona tutto

ENABLED=1
???

L'interfaccia wlan0 non va configurata da Sistema>Amministrazione>Rete  o /etc/network/interfaces che dir si voglia?

che strana roba.... ::) ::)
Avatar utente
AleXit
Imperturbabile Insigne
Imperturbabile Insigne
Messaggi: 3110
Iscrizione: giovedì 12 gennaio 2006, 15:32
Località: Firenze // Castel San Niccolò (Ar)
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da AleXit »

Beh un miglioramento nel log c'è... almeno riconosce la rete e tenta di associarsi...
Quello che non capisco è perchè non si autentica.
La chiave psk che hai messo è ASCII o esadecimale?
Che driver wireless utilizza la tua scheda, hai idea? Che scheda è ?
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

AleXit ha scritto: Beh un miglioramento nel log c'è... almeno riconosce la rete e tenta di associarsi...
Quello che non capisco è perchè non si autentica.
La chiave psk che hai messo è ASCII o esadecimale?
Che driver wireless utilizza la tua scheda, hai idea? Che scheda è ?
la chiave psk è esadecimale, ma posso metterla ascii se può cambiare le cose...
la scheda è una USR5422 e usa driver di windows con ndiswrapper
(di sistema usa il modulo prism54usb, che è stato blacklistato per far funzionare ndiswrapper)

Stessa scheda, con stessi dirver, con stesse impostazioni router, sotto edgy funzionava alla perfezione. :-\
Avatar utente
AleXit
Imperturbabile Insigne
Imperturbabile Insigne
Messaggi: 3110
Iscrizione: giovedì 12 gennaio 2006, 15:32
Località: Firenze // Castel San Niccolò (Ar)
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da AleXit »

esadecimale?
allora togli le virgolette dalla chiave:

Codice: Seleziona tutto

network={
ssid="wifilan"
scan_ssid=1
psk=1426187623
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
}
Se anche cosi non va, io proverei ad aggiornare ndsiwrapper all'ultima vesione, compilandolo da sorgenti...
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

proverò....poi ti faccio sapere..
nel mentre ti ringrazio. >:(  >:(
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

non è che nella config di wpasupplicant va aggiunto anche
ctrl_interface e bridge??

io non so piu cosa fare ;:S
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

ho reinstallato ndiswrapper da sorgenti ma non va nemmeno così......
>:(
Avatar utente
AleXit
Imperturbabile Insigne
Imperturbabile Insigne
Messaggi: 3110
Iscrizione: giovedì 12 gennaio 2006, 15:32
Località: Firenze // Castel San Niccolò (Ar)
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da AleXit »

allora, prova a usare un file di configurazione fatto cosi:

Codice: Seleziona tutto

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=1000
update_config=1

network={
ssid="wifilan"
scan_ssid=1
psk=1426187623
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
}
Poi postami il risultato del comando

Codice: Seleziona tutto

sudo wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

ma perdonami non è la password in ascii che va senza le virgolette??

te lo chiedo xche se me la faccio generare da wpa_passphrase, mi mette tra virgolette la esadecimale ma non la ascii.... ???
Avatar utente
AleXit
Imperturbabile Insigne
Imperturbabile Insigne
Messaggi: 3110
Iscrizione: giovedì 12 gennaio 2006, 15:32
Località: Firenze // Castel San Niccolò (Ar)
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da AleXit »

la ascii dovrebbe andare tra virgolette, la esadecimale senza:

Codice: Seleziona tutto

ale@acero:~$ wpa_passphrase retewifi
# reading passphrase from stdin
passwordwpa
network={
        ssid="retewifi"
        #psk="passwordwpa"
        psk=ae5a279e9fc938e6f74127b789a52092c09251c6ae790096f9be17d92c950042
}
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

perdonami ero io che confondevo le due...
cmq morale della favola la chiave usb nn si accende e ndiswrapper non si carica...
faccio prima a fare una reinstallazione che non a risolverla....
poi provo... :S
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

Nulla da fare...
ho provato tutte le soluzioni ma non funziona qualcosa...

Aspetto che ci sia un aggiornamento di qualche pacchetto perchè a questo punto penso che sia un problema di incompatibilità HW/SW dato che prima ha sempre funzionato.... >:(
Avatar utente
Skaman
Prode Principiante
Messaggi: 219
Iscrizione: martedì 5 aprile 2005, 9:47
Località: Cagliari/Bologna
Contatti:

Re: Wpasupplicant non si avvia sotto feisty

Messaggio da Skaman »

wpasupplicant sembra ora funzionare..ma ad un certo punto si impalla.....

sembra abbia qualche problema con il dhcp, ma immettendo un indirizzo manuale non si risolve....
si associa...e poi si disconnette.... e cosi via finche nn si impalla...
>:(
:(
Scrivi risposta

Ritorna a “Connessione e configurazione delle reti”

Chi c’è in linea

Visualizzano questa sezione: 0 utenti iscritti e 2 ospiti