On Thu, 2016-06-09 at 15:34 +0200, Bastien Nocera wrote: > On Tue, 2016-06-07 at 19:13 +0200, Bastien Nocera wrote: > > > > On Tue, 2016-06-07 at 09:58 -0500, Dan Williams wrote: > > > > > > On Tue, 2016-06-07 at 16:09 +0200, Bastien Nocera wrote: > > > > > > > > Hey, > > > > > > > > iwlist scan as root shows: > > > > Cell 17 - Address: 00:24:36:9D:3B:33 > > > > Channel:11 > > > > Frequency:2.462 GHz (Channel 11) > > > > Quality=70/70 Signal level=-32 dBm > > > > Encryption key:on > > > > ESSID:"WEP test" > > > > Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 > > > > Mb/s; > > > > 6 > > > > Mb/s > > > > 9 Mb/s; 12 Mb/s; 18 Mb/s > > > > Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 > > > > Mb/s > > > > Mode:Master > > > > Extra:tsf=00000069f3b5fd9a > > > > Extra: Last beacon: 27430ms ago > > > > IE: Unknown: 00085745502074657374 > > > > IE: Unknown: 010882848B960C121824 > > > > IE: Unknown: 03010B > > > > IE: Unknown: 0706474220010D1E > > > > IE: Unknown: 2A0100 > > > > IE: Unknown: 32043048606C > > > > IE: IEEE 802.11i/WPA2 Version 1 > > > > Group Cipher : WEP-104 > > > > Pairwise Ciphers (2) : CCMP TKIP > > > > Authentication Suites (1) : PSK > > > > IE: Unknown: > > > > 2D1A2C4017FFFF000000000000000000000000000000000000000000 > > > > IE: Unknown: > > > > 3D160B001100000000000000000000000000000000000000 > > > > IE: Unknown: 46050200010000 > > > > IE: WPA Version 1 > > > > Group Cipher : WEP-104 > > > > Pairwise Ciphers (1) : TKIP > > > > Authentication Suites (1) : PSK > > > > IE: Unknown: > > > > DD180050F2020101070003A4000027A4000042435E0062322F00 > > > > IE: Unknown: DD07000393016B0B20 > > > > IE: Unknown: > > > > DD0E0017F207000101060024369D3B33 > > > > IE: Unknown: DD0B0017F20100010100000007 > > > > > > > > Which is a WEP access point created on an Airport Express gen 1 > > > > device. > > > > "nmcli -f all device wifi | grep 'WEP test'" doesn't show > > > > anything > > > > related to that access point? > > > > > > > > Any ideas on how to debug this? > > > It depends if the supplicant has actually exposed it via D-Bus > > > yet > > > too. > > > > > > Grab http://people.redhat.com/dcbw/wpas-list.py and sudo-run that > > > with > > > the interface name of your wifi device, and see if the AP shows > > > up > > > in > > > that list. It directly dumps out the supplicant's AP list in a > > > more > > > readable form. > > $ sudo ./wpas-list.py wlp2s0 > > [sudo] password for hadess: > > 54:64:d9:3e:0e:89 :: ssid='Livebox- > > 0E88' wpa=yes wpa2=yes signal=-58% freq=5240 > > 18:1e:78:70:c4:6b :: ssid='Livebox- > > C46A' wpa=yes wpa2=yes signal=-62% freq=5520 > > Traceback (most recent call last): > > File "./wpas-list.py", line 68, in > > main() > > File "./wpas-list.py", line 46, in main > > props = props_iface.GetAll(WPAS_DBUS_BSSID_INTERFACE) > > File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line > > 70, in __call__ > > return self._proxy_method(*args, **keywords) > > File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line > > 145, in __call__ > > **keywords) > > File "/usr/lib64/python2.7/site-packages/dbus/connection.py", > > line 651, in call_blocking > > message, timeout) > > dbus.exceptions.DBusException: org.freedesktop.DBus.Error.Failed: > > failed to parse RSN IE > After adding a try/except: > failed for /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2 > > Which is the "WEP test" AP I used.
So I missed it before. But your AP isn't actually set for WEP, it's set for WPA/TKIP. If it's actually using just WEP, you won't see any of the RSN/WPA IEs in the beacon. Dan _______________________________________________ networkmanager-list mailing list networkmanager-list@gnome.org https://mail.gnome.org/mailman/listinfo/networkmanager-list