Package: wireless-tools
Version: 29~pre20-1
Severity: normal
The driver is ipw3945 built from the current ipw3945-source:
[EMAIL PROTECTED]:~$ dpkg -l |grep 3945
ii firmware-ipw3945 0.4 Binary
firmware for IPW3945
ii ipw3945-modules-2.6.20 1.2.0-5+detritus1
ipw3945 modules for Linux (kernel 2.6.20)
ii ipw3945-modules-2.6.20-1-amd64 1.2.0-5+2.6.20-2
ipw3945 modules for Linux (kernel
2.6.20-1-a
ii ipw3945-source 1.2.0-5 Source
for the Intel PRO/Wireless 3945ABG
(i
ii ipw3945d 1.7.22-4 Binary
userspace regulatory daemon for
Intel
[EMAIL PROTECTED]:~$ dmesg |grep 3945
ipw3945: Intel(R) PRO/Wireless 3945 Network Connection driver for Linux,
1.2.0dmpr
ipw3945: Copyright(c) 2003-2006 Intel Corporation
ipw3945: Detected Intel PRO/Wireless 3945ABG Network Connection
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)
The access point that I'm connected to and through which traffic is flowing
(including reporting this bug) is
configured for WPA1, group TKIP, pairwise CCMP(AES) or TKIP. My
wpa_supplicant.conf is configured for WPA-PSK, with
CCMP for pairwise keys:
network={
ssid="whirlpool"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP
psk=<key>
priority=1
}
Other devices also connect to it using WPA.
However iwlist scan reports the access point as using WEP-40:
[EMAIL PROTECTED]:~$ sudo iwlist eth1 scan
eth1 Scan completed :
Cell 01 - Address: 00:16:01:2E:CF:D7
ESSID:"whirlpool"
Protocol:IEEE 802.11bg
Mode:Master
Channel:1
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Quality=99/100 Signal level=-22 dBm Noise level=-22 dBm
IE: WPA Version 1
Group Cipher : WEP-40
Pairwise Ciphers (2) : TKIP WEP-40
Authentication Suites (1) : PSK
Extra: Last beacon: 16ms ago
instead of CCMP/AES and TKIP for pairwise and TKIP for group. No configuration
or firmware changes have been made
to the AP, and I'm fairly certain that an older version of wireless-tools
correctly identified the AP's "available"
algorithms as TKIP/CCMP for pairwise and TKIP for group.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (990, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.20 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en US, LC_CTYPE=en US (charmap=UTF-8) (ignored: LC_ALL set to
en_US.utf8)
Shell: /bin/sh linked to /bin/bash
Versions of packages wireless-tools depends on:
ii libc6 2.5-4 GNU C Library: Shared libraries
ii libiw29 29~pre20-1 Wireless tools - library
wireless-tools recommends no packages.
-- no debconf information
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]