On Thu, 2016-06-09 at 15:34 +0200, Bastien Nocera wrote:
> On Tue, 2016-06-07 at 19:13 +0200, Bastien Nocera wrote:
> > 
> > On Tue, 2016-06-07 at 09:58 -0500, Dan Williams wrote:
> > > 
> > > On Tue, 2016-06-07 at 16:09 +0200, Bastien Nocera wrote:
> > > > 
> > > > Hey,
> > > > 
> > > > iwlist scan as root shows:
> > > >           Cell 17 - Address: 00:24:36:9D:3B:33
> > > >                     Channel:11
> > > >                     Frequency:2.462 GHz (Channel 11)
> > > >                     Quality=70/70  Signal level=-32 dBm  
> > > >                     Encryption key:on
> > > >                     ESSID:"WEP test"
> > > >                     Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11
> > > > Mb/s;
> > > > 6
> > > > Mb/s
> > > >                               9 Mb/s; 12 Mb/s; 18 Mb/s
> > > >                     Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54
> > > > Mb/s
> > > >                     Mode:Master
> > > >                     Extra:tsf=00000069f3b5fd9a
> > > >                     Extra: Last beacon: 27430ms ago
> > > >                     IE: Unknown: 00085745502074657374
> > > >                     IE: Unknown: 010882848B960C121824
> > > >                     IE: Unknown: 03010B
> > > >                     IE: Unknown: 0706474220010D1E
> > > >                     IE: Unknown: 2A0100
> > > >                     IE: Unknown: 32043048606C
> > > >                     IE: IEEE 802.11i/WPA2 Version 1
> > > >                         Group Cipher : WEP-104
> > > >                         Pairwise Ciphers (2) : CCMP TKIP
> > > >                         Authentication Suites (1) : PSK
> > > >                     IE: Unknown:
> > > > 2D1A2C4017FFFF000000000000000000000000000000000000000000
> > > >                     IE: Unknown:
> > > > 3D160B001100000000000000000000000000000000000000
> > > >                     IE: Unknown: 46050200010000
> > > >                     IE: WPA Version 1
> > > >                         Group Cipher : WEP-104
> > > >                         Pairwise Ciphers (1) : TKIP
> > > >                         Authentication Suites (1) : PSK
> > > >                     IE: Unknown:
> > > > DD180050F2020101070003A4000027A4000042435E0062322F00
> > > >                     IE: Unknown: DD07000393016B0B20
> > > >                     IE: Unknown:
> > > > DD0E0017F207000101060024369D3B33
> > > >                     IE: Unknown: DD0B0017F20100010100000007
> > > > 
> > > > Which is a WEP access point created on an Airport Express gen 1
> > > > device.
> > > > "nmcli -f all device wifi | grep 'WEP test'" doesn't show
> > > > anything
> > > > related to that access point?
> > > > 
> > > > Any ideas on how to debug this?
> > > It depends if the supplicant has actually exposed it via D-Bus
> > > yet
> > > too.
> > > 
> > > Grab http://people.redhat.com/dcbw/wpas-list.py and sudo-run that
> > > with
> > > the interface name of your wifi device, and see if the AP shows
> > > up
> > > in
> > > that list.  It directly dumps out the supplicant's AP list in a
> > > more
> > > readable form.
> > $ sudo ./wpas-list.py wlp2s0
> > [sudo] password for hadess: 
> >   54:64:d9:3e:0e:89  ::  ssid='Livebox-
> > 0E88'  wpa=yes  wpa2=yes  signal=-58%  freq=5240
> >   18:1e:78:70:c4:6b  ::  ssid='Livebox-
> > C46A'  wpa=yes  wpa2=yes  signal=-62%  freq=5520
> > Traceback (most recent call last):
> >   File "./wpas-list.py", line 68, in 
> >     main()
> >   File "./wpas-list.py", line 46, in main
> >     props = props_iface.GetAll(WPAS_DBUS_BSSID_INTERFACE)
> >   File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line
> > 70, in __call__
> >     return self._proxy_method(*args, **keywords)
> >   File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line
> > 145, in __call__
> >     **keywords)
> >   File "/usr/lib64/python2.7/site-packages/dbus/connection.py",
> > line 651, in call_blocking
> >     message, timeout)
> > dbus.exceptions.DBusException: org.freedesktop.DBus.Error.Failed:
> > failed to parse RSN IE
> After adding a try/except:
> failed for /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2
> 
> Which is the "WEP test" AP I used.

So I missed it before.  But your AP isn't actually set for WEP, it's
set for WPA/TKIP.  If it's actually using just WEP, you won't see any
of the RSN/WPA IEs in the beacon.

Dan
_______________________________________________
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list

Reply via email to