Chuckk Hubbard wrote: > 64studio:/home/chuckk# ifconfig eth1 > eth1 Link encap:Ethernet HWaddr 00:14:A5:D0:1C:7A > inet6 addr: fe80::214:a5ff:fed0:1c7a/64 Scope:Link > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:33 errors:0 dropped:3762 overruns:0 frame:0 > TX packets:114 errors:0 dropped:0 overruns:0 carrier:0 > collisions:0 txqueuelen:1000 > RX bytes:3916 (3.8 KiB) TX bytes:7512 ( 7.3 KiB) > Interrupt:11 > > 64studio:/home/chuckk# iwconfig eth1 > eth1 IEEE 802.11b/g ESSID:"frank" Nickname:"Broadcom 4311" > Mode:Managed Frequency=2.462 GHz Access Point: > 00:0E:A6:71:DE:05 > Bit Rate=24 Mb/s Tx-Power=18 dBm > RTS thr:off Fragment thr:off > Encryption key:74B5-71F1-C9 Security mode:open > Link Quality=85/100 Signal level=-49 dBm Noise level=-69 dBm > Rx invalid nwid:0 Rx invalid crypt:3764 Rx invalid frag:0 > Tx excessive retries:0 Invalid misc:0 Missed beacon:0
If the encryption key shown above is the correct one, everything seems OK except for having a valid IPV4 address. Are you planning on using static or dynamic addresses? If dynamic, you need to issue a dhclient command. When I on't use NetworkManager, mine is automatic based on the information in /etc/sysconfig/network/ifcfg-eth1, but I think 'dhclient -d eth1' should be sufficient. Once this is working, you should change your encryption key. It isn't quite all that is needed to hack your computer, but it is enough to listen to your wireless transmissions. I strongly recommend switching to WPA-PSK. If your PSK secret is longer than 20 characters and not found in a dictionary, it is essentially uncrackable. Your 64-bit WEP encryption can be cracked in as little as 1 minute. Larry _______________________________________________ Bcm43xx-dev mailing list [email protected] https://lists.berlios.de/mailman/listinfo/bcm43xx-dev
