Launchpad has imported 37 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1241930.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2015-07-10T12:50:50+00:00 Kevin wrote:

Description of problem:  After updating to wpa_supplicant 2.4-3 on July
1, was unable to connect to my corporate wifi access point.  Subsequent
downgrade to wpa_supplicant 2.3-3 fixed access problem, so I think this
is a wpa_supplicant bug


Version-Release number of selected component (if applicable): wpa_supplicant 
2.4-3


How reproducible:  Upgrade to 2.4-3 try to access wpa/wpa2 wifi with TTLS 
authentication that has been working for well over a year now.  Fails.  
Downgrade to 2.3-3 and it works again.


Steps to Reproduce: See above
1. Select network in NetworkManager
2. Does not connect
3. Keeps asking for password

Actual results:

>From /etc/wpa_supplicant.log after upgrade:

wlp12s0: SME: Trying to authenticate with e0:1c:41:34:19:e9 (SSID='CICS' 
freq=5220 MHz)
wlp12s0: Trying to associate with e0:1c:41:34:19:e9 (SSID='CICS' freq=5220 MHz)
wlp12s0: Associated with e0:1c:41:34:19:e9
wlp12s0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
wlp12s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp12s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
wlp12s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=The Go Daddy Group, 
Inc./OU=Go Daddy Class 2 Certification Authori
ty' hash=c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=The Go Daddy Group, 
Inc./OU=Go Daddy Class 2 Certification Authori
ty' hash=c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, 
Inc./OU=http://certificates.g
odaddy.com/repository/CN=Go Daddy Secure Certification 
Authority/serialNumber=07969287' hash=09ed6e991fc3273d8fea317d339c0204
1861973549cfa6e1558f411f11211aa3
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/OU=Domain Control 
Validated/CN=cicsnc.org' hash=598c9bcc63d9e114262181d14
dfed5372381b7ae0eb762e701b689b0e309f9b7
wlp12s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:cicsnc.org
wlp12s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:www.cicsnc.org
wlp12s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:osx.cicsnc.org
wlp12s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:osx2.cicsnc.org
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:handshake failure
OpenSSL: openssl_handshake - SSL_connect error:14082174:SSL 
routines:SSL3_CHECK_CERT_AND_ALGORITHM:dh key too small
wlp12s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
wlp12s0: Authentication with e0:1c:41:34:19:e9 timed out.
wlp12s0: CTRL-EVENT-DISCONNECTED bssid=e0:1c:41:34:19:e9 reason=3 
locally_generated=1
wlp12s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="CICS" auth_failures=1 
duration=10 reason=AUTH_FAILED
wlp12s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="CICS" auth_failures=2 
duration=35 reason=CONN_FAILED


After downgrade:

wlp12s0: Trying to associate with e0:1c:41:34:19:e9 (SSID='CICS' freq=5220 MHz)
wlp12s0: Associated with e0:1c:41:34:19:e9
wlp12s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp12s0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
wlp12s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
wlp12s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=The Go Daddy Group, 
Inc./OU=Go Daddy Class 2 Certification Authori
ty'
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=The Go Daddy Group, 
Inc./OU=Go Daddy Class 2 Certification Authori
ty'
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, 
Inc./OU=http://certificates.g
odaddy.com/repository/CN=Go Daddy Secure Certification 
Authority/serialNumber=07969287'
wlp12s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/OU=Domain Control 
Validated/CN=cicsnc.org'
EAP-MSCHAPV2: Authentication succeeded
wlp12s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
wlp12s0: WPA: Key negotiation completed with e0:1c:41:34:19:e9 [PTK=CCMP 
GTK=CCMP]
wlp12s0: CTRL-EVENT-CONNECTED - Connection to e0:1c:41:34:19:e9 completed [id=0 
id_str=]
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-62 noise=9999 txrate=6000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-59 noise=9999 txrate=81000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-67 noise=9999 txrate=135000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-59 noise=9999 txrate=6000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-67 noise=9999 txrate=121500
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-61 noise=9999 txrate=135000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-67 noise=9999 txrate=6000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-61 noise=9999 txrate=6000
wlp12s0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-67 noise=9999 txrate=135000




Expected results:  The latter results are expected


Additional info:  PEAP, TLS, other authentication protocols produced the same 
ssl handshake error (dh key too small).  "No CA required" was checked in 
NetworkManager in both cases, but I'm not sure if I snipped out the right part 
of the wpa_supplicant log in the failure case--I was trying everything.  The 
SSL handshake failure was consistent under all attempts to authenticate no 
matter what drop downs/boxes were selected in NetworkManager under 2.4-3.  Now 
that I have it working, I am loathe to break it again.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/0

------------------------------------------------------------------------
On 2015-07-16T00:07:26+00:00 Wallace wrote:

I'm using Fedora 22.
After updating the package wpa_supplicant 2.3 to 2.4 can not connect to the 
wireless network (PEAP-MSCHAPv2, no CA Certificate).

Please see this thead http://community.arubanetworks.com/t5/Unified-
Wired-Wireless-Access/Internal-radius-server-incompatibility-with-the-
new-wpa/td-p/236602

After downgrade to 2.3 it works again.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/1

------------------------------------------------------------------------
On 2015-07-17T13:15:18+00:00 Major wrote:

I ran through a git bisect this morning and found that once this patch
was applied, I couldn't hop on my corporate Aruba wifi network:

https://w1.fi/cgit/hostap/commit/?id=674f6c073f6f7cd9e04e5f117710f03d5e09ad63

_______________________________________________
commit 674f6c073f6f7cd9e04e5f117710f03d5e09ad63
Author: Eliad Peller <[email protected]>
Date:   Wed Oct 22 08:03:56 2014 -0400

    WMM AC: Add basic ADDTS/DELTS sending functions
    
    Add basic implementation for ADDTS and DELTS sending
    functions.
    
    wpas_wmm_ac_addts() will send ADDTS request public action,
    containing TSPEC (traffic stream specification) with
    the given params.
    
    wpas_wmm_ac_delts() will look for the saved tspec with
    the given tid, and send DELTS public action for it.
    
    (Handling of ADDTS response and actually configuring the admission
    control params will be added in following patches.)
    
    Signed-off-by: Moshe Benji <[email protected]>
    Signed-off-by: Eliad Peller <[email protected]>
_______________________________________________

A simple 'git revert' was insufficient as additional patches have piled
into these same files afterwards. :/

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/2

------------------------------------------------------------------------
On 2015-07-17T15:11:22+00:00 Dan wrote:

(In reply to Kevin Havener from comment #0)
> Description of problem:  After updating to wpa_supplicant 2.4-3 on July 1,
> was unable to connect to my corporate wifi access point.  Subsequent
> downgrade to wpa_supplicant 2.3-3 fixed access problem, so I think this is a
> wpa_supplicant bug
> 
> 
> Version-Release number of selected component (if applicable): wpa_supplicant
> 2.4-3
> 
> 
> How reproducible:  Upgrade to 2.4-3 try to access wpa/wpa2 wifi with TTLS
> authentication that has been working for well over a year now.  Fails. 
> Downgrade to 2.3-3 and it works again.

This appears to be an OpenSSL issue, not a wpa_supplicant one:

SSL: SSL3 alert: write (local SSL3 detected an error):fatal:handshake failure
OpenSSL: openssl_handshake - SSL_connect error:14082174:SSL 
routines:SSL3_CHECK_CERT_AND_ALGORITHM:dh key too small
wlp12s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed

for exmaple, see:

https://bbs.archlinux.org/viewtopic.php?id=198796
http://alicevixie.blogspot.com/2015/06/dh-key-too-small.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/3

------------------------------------------------------------------------
On 2015-07-17T15:19:31+00:00 Dan wrote:

(In reply to Wallace Hermano from comment #1)
> I'm using Fedora 22.
> After updating the package wpa_supplicant 2.3 to 2.4 can not connect to the
> wireless network (PEAP-MSCHAPv2, no CA Certificate).
> 
> Please see this thead
> http://community.arubanetworks.com/t5/Unified-Wired-Wireless-Access/Internal-
> radius-server-incompatibility-with-the-new-wpa/td-p/236602
> 
> After downgrade to 2.3 it works again.

Your issue is likely due to wpa_supplicant enabling TLSv1.2 support (in
response to recent attacks against SSLv3, TLSv1.0, and TLSv1.1, like the
recent Firefox updates that disabled SSLv3 and TLSv1.0 negotiation).
Unfortunately, not all RADIUS servers are prepared for that, and they
accept the TLSv1.2 connection but generate a mismatching key than the
supplicant does.  That bug is in the RADIUS server...

There are some patches floating around that will detect this condition
and fall back to the less-secure TLSv1.1 automatically, and we'll
probably have to add those to Fedora until the RADIUS server vendors
like Cisco, Aruba, etc catch up and fix their products.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/4

------------------------------------------------------------------------
On 2015-07-17T16:41:56+00:00 Dan wrote:

(In reply to Dan Williams from comment #3)
> (In reply to Kevin Havener from comment #0)
> > Description of problem:  After updating to wpa_supplicant 2.4-3 on July 1,
> > was unable to connect to my corporate wifi access point.  Subsequent
> > downgrade to wpa_supplicant 2.3-3 fixed access problem, so I think this is a
> > wpa_supplicant bug
> > 
> > 
> > Version-Release number of selected component (if applicable): wpa_supplicant
> > 2.4-3
> > 
> > 
> > How reproducible:  Upgrade to 2.4-3 try to access wpa/wpa2 wifi with TTLS
> > authentication that has been working for well over a year now.  Fails. 
> > Downgrade to 2.3-3 and it works again.
> 
> This appears to be an OpenSSL issue, not a wpa_supplicant one:
> 
> SSL: SSL3 alert: write (local SSL3 detected an error):fatal:handshake failure
> OpenSSL: openssl_handshake - SSL_connect error:14082174:SSL
> routines:SSL3_CHECK_CERT_AND_ALGORITHM:dh key too small
> wlp12s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
> 
> for exmaple, see:
> 
> https://bbs.archlinux.org/viewtopic.php?id=198796
> http://alicevixie.blogspot.com/2015/06/dh-key-too-small.html

More info: wpa_supplicant 2.4 may trigger this where 2.3 would not,
becuase 2.4 enables some new ciphers for use with TLSv1.2, and the
server may have enabled DH only for those ciphers that are now enabled.

The options are to either get your network admins to fix the DH key
issue by using something > 768 bits, or to disable TLSv1.2 for now until
they fix it.

But as a test, here's a wpa_supplicant with TLSv1.2 disabled by default.
If you could test it on your network where you get the "dh key too
small" error to see if that fixes the issue, then great, we can proceed
with a more general solution.  But if it doesn't fix the issue, then
we'll need to dig a bit deeper and there may not be a general fix.

http://koji.fedoraproject.org/koji/taskinfo?taskID=10392924

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/5

------------------------------------------------------------------------
On 2015-07-17T17:57:18+00:00 Major wrote:

I tried the koji build from the last comment and I'm unable to connect.
With debug wpa_supplicant logs, I get:

SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect:error in SSLv3 read finished A

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/6

------------------------------------------------------------------------
On 2015-07-20T14:45:30+00:00 Kevin wrote:

I also tried the Koji build.  Got the same error as I originally
submitted:

SSL: SSL3 alert: write (local SSL3 detected an error):fatal:handshake failure
OpenSSL: openssl_handshake - SSL_connect error:14082174:SSL 
routines:SSL3_CHECK_CERT_AND_ALGORITHM:dh key too small
wlp12s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed

I

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/7

------------------------------------------------------------------------
On 2015-08-18T15:01:42+00:00 Virgilio wrote:

I can also confirm that a downgrade of the wpa_supplicant package to
version 2.3.3 on Fedora 22 x86_64 makes it possible again to connect to
a WPA2 Enterprise/PEAP/MSCHAPV2 network, like eduroam.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/8

------------------------------------------------------------------------
On 2015-08-21T16:44:13+00:00 Hannes wrote:

I can further confirm that downgrading wpa_supplicant to 2.3.3 allowed
me to immediately connect to eduroam.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/9

------------------------------------------------------------------------
On 2015-08-24T12:43:04+00:00 Gregor wrote:

I can confirm the same behavior. Immediately after downgrading the
wpa_supplicant to 2.3.3 allowed me to connect to our company WIFI.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/10

------------------------------------------------------------------------
On 2015-09-03T13:45:43+00:00 Luiz wrote:

I can confirm the same behavior.

I downgraded to 2.3.3 and I was able to connect successfully to connect
to the wifi, but then I upgraded the kernel to 4.1.6 and it installed an
wpa_supplicant-gui and some other wpa packages, and it stopped working
again.

Can I get some help identifying if the issue is from the same root
cause?

Because the wpa_supplicant-gui has the same 2.4.4 version of the
wpa_supplicant and I tried to downgrade the *-gui one and it failed, due
to not having package available.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/11

------------------------------------------------------------------------
On 2015-09-03T13:56:27+00:00 Kent wrote:

FYI: I have seen the same (or at least very similar problems). Upgrading
to 2.4-3 or 2.4-4 broke my eduroam connection. Downgrading to 2.3-3
again made it work.

I talked to the people running the authentication server (Radiator) used
when I log in to eduroam. They upgraded OpenSSL and a related Perl
module on the server. After that, eduroam survived an upgrade to 2.4-4
on my laptop.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/12

------------------------------------------------------------------------
On 2015-09-08T12:46:42+00:00 Luiz wrote:

Solved the issue removing the wpa_supplicant, and it removed anaconda
and anaconda-gui. Then I re-installed the wpa_supplicant,
NetworkManager-wifi, and downgraded the wpa_supplicant.

If someday has a fix I would be very happy to un-block wpa_supplicant
packages from my dnf exceptions.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/13

------------------------------------------------------------------------
On 2015-09-11T09:55:33+00:00 Germano wrote:

*** Bug 1244188 has been marked as a duplicate of this bug. ***

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/14

------------------------------------------------------------------------
On 2015-09-11T10:44:17+00:00 Germano wrote:

Lastest wpa supplicant working with WPA Enterprise connections:
wpa_supplicant-2.3-3.fc22.x86_64

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/15

------------------------------------------------------------------------
On 2015-09-11T13:15:10+00:00 David wrote:

(In reply to Germano Massullo from comment #15)
> Lastest wpa supplicant working with WPA Enterprise connections:
> wpa_supplicant-2.3-3.fc22.x86_64

Just to avoid confusion:

The lastest wpa supplicant that works with WPA Enterprise connections is
wpa_supplicant-2.3-3.fc22.x86_64

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/16

------------------------------------------------------------------------
On 2015-10-02T16:50:33+00:00 Ville wrote:

eduroam broke for me with 2.4 as well. I tried upgrading to 2.5 locally
but it remained similarly broken. Works with 2.3-3.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/20

------------------------------------------------------------------------
On 2015-10-02T16:51:16+00:00 Ville wrote:

*** Bug 1245766 has been marked as a duplicate of this bug. ***

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/21

------------------------------------------------------------------------
On 2015-10-14T00:54:02+00:00 Michael wrote:

(In reply to Gregor Fuis from comment #10)
> I can confirm the same behavior. Immediately after downgrading the
> wpa_supplicant to 2.3.3 allowed me to connect to our company WIFI.

I had the same issue. The workaround with version 2.3.3 did the trick
for me as well.

(In reply to Dan Williams from comment #4)
> Your issue is likely due to wpa_supplicant enabling TLSv1.2 support (in
> response to recent attacks against SSLv3, TLSv1.0, and TLSv1.1, like the
> recent Firefox updates that disabled SSLv3 and TLSv1.0 negotiation). 
> Unfortunately, not all RADIUS servers are prepared for that, and they accept
> the TLSv1.2 connection but generate a mismatching key than the supplicant
> does.  That bug is in the RADIUS server...

I can confirm that updating FreeRADIUS (server/network infrastructure)
to version freeradius-2.2.6-6.el6_7.x86_64 fixed the issue with
wpa_supplicant as well as a (probably similar) issue with android 6.0 as
described here
https://code.google.com/p/android/issues/detail?id=188867#c29

I am now running wpa_supplicant-2.4-4.fc22.x86_64 on fedora and can
connect successful to a WiFi using PEAP-MSCHAPv2 (with and without a
server certificate check against a CA Certificate)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/24

------------------------------------------------------------------------
On 2015-10-14T14:50:20+00:00 Fedora wrote:

This package has changed ownership in the Fedora Package Database.
Reassigning to the new owner of this component.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/25

------------------------------------------------------------------------
On 2015-10-15T10:40:30+00:00 Wallace wrote:

I'm testing Fedora 23 beta but i can't downgrade the wpa_supplicant.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/26

------------------------------------------------------------------------
On 2015-10-15T11:45:55+00:00 Nick wrote:

I wouldn't bother degrading client security by forcing TLS 1.1

The fact that Google have shipped with TLS 1.2 in Android 6.0
(Marshmallow) is quickly identifying and mopping up broken
authentication servers.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/27

------------------------------------------------------------------------
On 2015-10-15T11:46:40+00:00 Nick wrote:

I posted in the Google issue tracker:

" suspect that you all are hitting this issue because the new version of
Android is now negotiating, correctly, with TLS 1.2 and you have a
broken backend.

If so, this issue should be marked as being invalid.

This applies to anybody with WPA2-Enterprise/802.1X SSIDs backed by
either FreeRADIUS 2.2.6 with all TLS-based EAP types, 2.2.6 through
2.2.8 with EAP-TTLS, 3.0.7 with all TLS-based EAP types, and 3.0.7
through  3.0.9 with EAP-TTLS, or Radiator 4.14 or later when used in
conjunction with Net::SSLeay 1.52 or earlier.

These unfortunately experience a critical bug where they miscalculate
session keying material, the MPPE keys, when the TLS 1.2 protocol is
negotiated by EAP clients (supplicant).

Clients that negotiate with the TLS 1.2 protocol version in the TLS
Client Hello will not be able to get a usable association to affected
wireless networks.

Two MPPE keys, the MS-MPPE-Recv-Key (MasterReceiveKey) and MS-MPPE-Send-
Key (MasterSendKey), are used to derive the Master Session Key (MSK).
This is absolutely essential to get a usable association.

The mismatch occurs because the client derives the correct MSK and the
AP derives a different, incorrect MSK due to the incorrectly calculated
MPPE keys supplied in the RADIUS Access-Accept.

This is more of an acute issue as Red Hat ship with a broken FreeRADIUS
2.2.6 package in RHEL 6.7. There is an update now to address this:
https://rhn.redhat.com/errata/RHBA-2015-1829.html

CentOS 6.7 is similarly affected as it derives from Red Hat's sources.

I should also mention that there is a difference between
implementing/offering TLS 1.2 or not and being intolerant to it. It is
the latter that is a problem with the introduction of TLS 1.2 for EAP.

The issue above, loosely, concerns intolerance because the subsequent
MPPE keys generated are miscalculated.

Deployments that continue to offer just TLS 1.0 will continue to
function correctly as TLS 1.0 will be negotiated by EAP clients
(supplicants) despite it offering TLS 1.2 in the client hello in their
default configuration. (TLS has a version negotiation mechanism, you
just need an intersection of supported versions and cipher suites.)"

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/28

------------------------------------------------------------------------
On 2015-11-07T13:01:14+00:00 Nick wrote:

This bug needs to be closed as NOTABUG.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/32

------------------------------------------------------------------------
On 2015-11-16T16:43:51+00:00 Luiz wrote:

Hey Nick,

I am not using Android, I am using the Fedora 23 as an SO and this error
is really annoying, I tried to check which TLS version I am using and
still dont have any clue.

Can you help checking or to use the TLS that doesnt error out?

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/34

------------------------------------------------------------------------
On 2015-11-16T16:50:38+00:00 Nick wrote:

Anywhere that is using wpa_supplicant 2.4 or later without specific
configuration to disable TLS 1.2 will hit this issue with affected
RADIUS servers. TLS 1.2 is rightly enabled by default.

(Android Marshmallow uses such a version of wpa_supplicant).

You can certainly disable TLS 1.2 in the configuration for
wpa_supplicant if you absolutely must get a usable connection.

Do so with phase1="tls_disable_tlsv1_2=1"

Ideally though you would seek to get the RADIUS server updates to a
version that isn't broken.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/35

------------------------------------------------------------------------
On 2015-11-24T17:15:48+00:00 Luiz wrote:

I am trying to understand better the last choice, I could connect with the 
command line, but its kind of annoying still. My version of the freeradius is 
this
[~] $ sudo dnf info freeradius
Last metadata expiration check performed 3:05:10 ago on Tue Nov 24 12:08:27 
2015.
Pacotes instalados
Name        : freeradius
Arq.        : x86_64
Epoch       : 0
Versão      : 3.0.8
Release     : 3.fc23
Tam.        : 3.4 M
Repo        : @System
>From repo   : fedora

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/39

------------------------------------------------------------------------
On 2015-11-25T20:57:19+00:00 Michael wrote:

I'm not sure if I get you right. Are you using Fedora as a server
operating system to provide radius authentication for your network
infrastructure?

TLS1.2 is the currently newest and (hopefully) most secure version of
the TLS protocol and therefore it is a good choice using it. So
disabling TLS1.2 is a bad idea as stated in comment #26. Use a radius
server version that implements TLS1.2 correctly instead.

Version 3.0.8 is affected when using EAP-TTLS as mentioned in comment
#23 so if you have trouble use a different server version or a different
EAP type.

If I've got you totally wrong and you are not the network operator ask
your network operator to fix the problem and remove freeradius from your
notebook/workstation.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/40

------------------------------------------------------------------------
On 2015-11-26T09:42:45+00:00 Luiz wrote:

Yeah, I am a software developer using Fedora as a workstation.
Unfortunately my network administrators like Windows, the solution they
provided me is to use Ubuntu. If I want to use Linux. I prefer Fedora
because I use it since version 13.

I removed the freeradius. The command line is not connecting anymore.
Here is my log. Any thoughts?

Successfully initialized wpa_supplicant
wlp6s0: SME: Trying to authenticate with 94:b4:0f:1b:bc:c5 
(SSID='ciandt.private' freq=2462 MHz)
wlp6s0: Trying to associate with 94:b4:0f:1b:bc:c5 (SSID='ciandt.private' 
freq=2462 MHz)
wlp6s0: Associated with 94:b4:0f:1b:bc:c5
wlp6s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp6s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
wlp6s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=GeoTrust 
Inc./CN=GeoTrust Global CA' 
hash=ff856a2d251dcd88d36656f450126798cfabaade40799c722de4d2b5db36a73a
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=GeoTrust 
Inc./OU=Domain Validated SSL/CN=GeoTrust DV SSL CA' 
hash=c27fd4b85e96d3777c68ab7df6aa4e626bf3ff8c72b1ce81d1eb78babeb1a074
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/serialNumber=lLUge2fRPkWcJe7boLSVdsKOFK8wv3MF/C=US/O=securelogin.arubanetworks.com/OU=GT28470348/OU=See
 www.geotrust.com/resources/cps (c)11/OU=Domain Control Validated - QuickSSL(R) 
Premium/CN=securelogin.arubanetworks.com' 
hash=47fa89956f2aa349e8814b21a7bbd64c9b597f0f192bfe073559945a7a846534
wlp6s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:securelogin.arubanetworks.com
wlp6s0: CTRL-EVENT-DISCONNECTED bssid=94:b4:0f:1b:bc:c5 reason=3 
locally_generated=1
wlp6s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp6s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BR
wlp6s0: SME: Trying to authenticate with 94:b4:0f:1b:bc:c5 
(SSID='ciandt.private' freq=2462 MHz)
wlp6s0: Trying to associate with 94:b4:0f:1b:bc:c5 (SSID='ciandt.private' 
freq=2462 MHz)
wlp6s0: Associated with 94:b4:0f:1b:bc:c5
wlp6s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp6s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
wlp6s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=GeoTrust 
Inc./CN=GeoTrust Global CA' 
hash=ff856a2d251dcd88d36656f450126798cfabaade40799c722de4d2b5db36a73a
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=GeoTrust 
Inc./OU=Domain Validated SSL/CN=GeoTrust DV SSL CA' 
hash=c27fd4b85e96d3777c68ab7df6aa4e626bf3ff8c72b1ce81d1eb78babeb1a074
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/serialNumber=lLUge2fRPkWcJe7boLSVdsKOFK8wv3MF/C=US/O=securelogin.arubanetworks.com/OU=GT28470348/OU=See
 www.geotrust.com/resources/cps (c)11/OU=Domain Control Validated - QuickSSL(R) 
Premium/CN=securelogin.arubanetworks.com' 
hash=47fa89956f2aa349e8814b21a7bbd64c9b597f0f192bfe073559945a7a846534
wlp6s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:securelogin.arubanetworks.com
wlp6s0: CTRL-EVENT-DISCONNECTED bssid=94:b4:0f:1b:bc:c5 reason=3 
locally_generated=1
wlp6s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp6s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BR
wlp6s0: SME: Trying to authenticate with 94:b4:0f:1b:bc:c5 
(SSID='ciandt.private' freq=2462 MHz)
wlp6s0: Trying to associate with 94:b4:0f:1b:bc:c5 (SSID='ciandt.private' 
freq=2462 MHz)
wlp6s0: Associated with 94:b4:0f:1b:bc:c5
wlp6s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp6s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
wlp6s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=GeoTrust 
Inc./CN=GeoTrust Global CA' 
hash=ff856a2d251dcd88d36656f450126798cfabaade40799c722de4d2b5db36a73a
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=GeoTrust 
Inc./OU=Domain Validated SSL/CN=GeoTrust DV SSL CA' 
hash=c27fd4b85e96d3777c68ab7df6aa4e626bf3ff8c72b1ce81d1eb78babeb1a074
wlp6s0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/serialNumber=lLUge2fRPkWcJe7boLSVdsKOFK8wv3MF/C=US/O=securelogin.arubanetworks.com/OU=GT28470348/OU=See
 www.geotrust.com/resources/cps (c)11/OU=Domain Control Validated - QuickSSL(R) 
Premium/CN=securelogin.arubanetworks.com' 
hash=47fa89956f2aa349e8814b21a7bbd64c9b597f0f192bfe073559945a7a846534
wlp6s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:securelogin.arubanetworks.com


I am still wondering if the issue is on wpa_supplicant or on the hardware, 
because I know a guy who has another PC using Fedora 22 with wpa_supplicant 2.4 
that connects in the network via NetworkManager.

Also that configuration of the phase1, Can I set somewhere in the
NetworkManager so I don't have to run command lines to connect to the
network?

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/41

------------------------------------------------------------------------
On 2015-11-26T20:52:11+00:00 Vincent wrote:

(In reply to Luiz  Pegoraro from comment #29)
> I am still wondering if the issue is on wpa_supplicant or on the hardware,
> because I know a guy who has another PC using Fedora 22 with wpa_supplicant
> 2.4 that connects in the network via NetworkManager.

For F22 with wpa_supplicant 2.4 check this bug too, it seems the openssl
library version matters:
https://bugzilla.redhat.com/show_bug.cgi?id=1276073

> Also that configuration of the phase1, Can I set somewhere in the
> NetworkManager so I don't have to run command lines to connect to the
> network?

I got it working (F23/wpa_supplicant-2.4-7/openssl-1.0.2d-2) with a custom 
wpa_supplicant config and some manual steps:
network={
        ssid="corpwifi"
        key_mgmt=WPA-EAP
        eap=PEAP
        phase1="peaplabel=auto tls_disable_tlsv1_2=1"
        phase2="auth=MSCHAPV2"
        identity="***"
        password="***"
}
Unfortunately, I couldn't get the above working with the Networkmanager 
(/etc/wpa_supplicant/wpa_supplicant.conf and ifcg-corpwifi). The config set in 
/etc/wpa_supplicant/wpa_supplicant.conf wasn't used.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/42

------------------------------------------------------------------------
On 2015-11-30T09:01:55+00:00 Eran wrote:

(In reply to Vincent P. from comment #30)

Sorry for the rookie questions, but:
1. Did you change /etc/wpa_supplicant/wpa_supplicant.conf or did you replace it?
2. After the change in /etc/wpa_supplicant/wpa_supplicant.conf, how am I to 
connect if not by the Networkmanager?

Thanks

> (In reply to Luiz  Pegoraro from comment #29)
> > I am still wondering if the issue is on wpa_supplicant or on the hardware,
> > because I know a guy who has another PC using Fedora 22 with wpa_supplicant
> > 2.4 that connects in the network via NetworkManager.
> 
> For F22 with wpa_supplicant 2.4 check this bug too, it seems the openssl
> library version matters: https://bugzilla.redhat.com/show_bug.cgi?id=1276073
> 
> > Also that configuration of the phase1, Can I set somewhere in the
> > NetworkManager so I don't have to run command lines to connect to the
> > network?
> 
> I got it working (F23/wpa_supplicant-2.4-7/openssl-1.0.2d-2) with a custom
> wpa_supplicant config and some manual steps:
> network={
>       ssid="corpwifi"
>       key_mgmt=WPA-EAP
>       eap=PEAP
>       phase1="peaplabel=auto tls_disable_tlsv1_2=1"
>       phase2="auth=MSCHAPV2"
>       identity="***"
>       password="***"
> }
> Unfortunately, I couldn't get the above working with the Networkmanager
> (/etc/wpa_supplicant/wpa_supplicant.conf and ifcg-corpwifi). The config set
> in /etc/wpa_supplicant/wpa_supplicant.conf wasn't used.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/43

------------------------------------------------------------------------
On 2015-11-30T21:49:52+00:00 Vincent wrote:

I'm not sure if this is the right place te respond, but hey..wth.

(In reply to Eran B. from comment #31)
> (In reply to Vincent P. from comment #30)
> 
> Sorry for the rookie questions, but:
> 1. Did you change /etc/wpa_supplicant/wpa_supplicant.conf or did you replace
> it?
After I did some manual testing (see next answer), I tried to update 
/etc/wpa_supplicant.conf with my corpwifi config and reconnect via the 
Networkmanager. Unfortunately, it didn't work.

> 2. After the change in /etc/wpa_supplicant/wpa_supplicant.conf, how am I to
> connect if not by the Networkmanager?
I turned off wifi via the Networkmanager. I created a new wpa_supplicant.conf 
in /root/ and rand some manual commands:

1. Connect to wifi:
# wpa_supplicant -f /var/log/wpa_supplicant.log -dd -P 
/var/run/wpa_supplicant.pid -c wpa_supplicant.conf -Dwext -iwlp3s0

2. Get an IP:
# dhclient wlp3s0

After this you should get an IP.

During my tests I fiddled with 'rfkill list all', 'rfkill unblock wifi'
and 'ip l set wlp3s0 up' too, but if you get an IP with the above steps,
you don't need too.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/44

------------------------------------------------------------------------
On 2015-12-16T17:20:10+00:00 Alberto wrote:

Also reported in
<https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588>.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/49

------------------------------------------------------------------------
On 2015-12-18T16:50:36+00:00 Luiz wrote:

SOLVED TODAY!!! BY NETWORKMANAGER!! Just dnf update -y
I am so thrilled! Thanks you guys!

I guess it was a problem in firmwares, I looked into the logs and there
were a lot of new packages for firmwares.

Thanks a lot, I guess saying by using Fedora 23, this can be closed now.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/52

------------------------------------------------------------------------
On 2015-12-18T18:13:43+00:00 Kevin wrote:

As the opener of this bug, I think it can be closed now.  While other
folks seem to have wireless problems, I don't think they are related to
my problem which was fixed for me by an upgrade to our corporate
wireless access points.  It has continued to work after upgrading from
F22 to F23 and a couple of iterations of wpa_supplicant as well.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/53

------------------------------------------------------------------------
On 2015-12-18T20:41:48+00:00 Dan wrote:

Yeah, for TLSv1.2 issues updating the RADIUS server or corporate network
is obviously the best choice.  If that's not possible then the
workaround with the supplicant config must be used, but the problem is
at the RADIUS server.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1501588/comments/54


** Changed in: hostap
       Status: Unknown => Fix Released

** Changed in: hostap
   Importance: Unknown => Medium

** Bug watch added: code.google.com/p/android/issues #188867
   http://code.google.com/p/android/issues/detail?id=188867

** Bug watch added: Red Hat Bugzilla #1276073
   https://bugzilla.redhat.com/show_bug.cgi?id=1276073

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1501588

Title:
  Wily's wpasupplicant frequently fails on WPA enterprise networks

Status in hostap:
  Fix Released
Status in wpa package in Ubuntu:
  Incomplete

Bug description:
  Ever since I upgraded from vivid to wily on my laptop, I'm running
  into problems when connecting to my home WPA2 enterprise network.

  Typically the first connection immediately after the driver is loaded
  works as expected, however any further reconnection and the occasional
  roaming between APs cause wpasupplicant to freeze entirely requiring
  me to kill it and most often also reload my wireless driver to get
  things working again.

  ## A failed (hanging) association looks like:
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  (wlan0): Activation: 
(wifi) connection 'stgraber.net-secure' has security, and secrets exist.  No 
new secrets needed.
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 'ssid' 
value 'stgraber.net-secure'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'scan_ssid' value '1'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'key_mgmt' value 'WPA-EAP'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 'eap' 
value 'TLS'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'fragment_size' value '1300'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'ca_cert' value '/home/stgraber/data/certs/stgraber-radius/ca.crt'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'private_key' value '/home/stgraber/data/certs/stgraber-radius/castiana.p12'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'private_key_passwd' value '<omitted>'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'identity' value 'castiana'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'bgscan' value 'simple:30:-65:300'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: added 
'proactive_key_caching' value '1'
  Sep 30 23:31:06 castiana NetworkManager[25815]: <warn>  Connection 
disconnected (reason -3)
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: associated -> disconnected
  Sep 30 23:31:06 castiana NetworkManager[25815]: <warn>  Failed to 
GDBus.Error:fi.w1.wpa_supplicant1.NotConnected: This interface is not 
connected: disconnect.
  Sep 30 23:31:06 castiana NetworkManager[25815]: <warn>  Failed to 
GDBus.Error:fi.w1.wpa_supplicant1.NotConnected: This interface is not 
connected: disconnect.
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  Config: set interface 
ap_scan to 1
  Sep 30 23:31:06 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: disconnected -> scanning
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: SME: Trying to 
authenticate with 24:a4:3c:c8:69:03 (SSID='stgraber.net-secure' freq=2412 MHz)
  Sep 30 23:31:07 castiana kernel: [102903.079940] wlan0: authenticate with 
24:a4:3c:c8:69:03
  Sep 30 23:31:07 castiana kernel: [102903.085128] wlan0: send auth to 
24:a4:3c:c8:69:03 (try 1/3)
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: Trying to associate 
with 24:a4:3c:c8:69:03 (SSID='stgraber.net-secure' freq=2412 MHz)
  Sep 30 23:31:07 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: scanning -> authenticating
  Sep 30 23:31:07 castiana kernel: [102903.086942] wlan0: authenticated
  Sep 30 23:31:07 castiana kernel: [102903.090103] wlan0: associate with 
24:a4:3c:c8:69:03 (try 1/3)
  Sep 30 23:31:07 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: authenticating -> associating
  Sep 30 23:31:07 castiana kernel: [102903.101962] wlan0: RX AssocResp from 
24:a4:3c:c8:69:03 (capab=0x411 status=0 aid=1)
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: Associated with 
24:a4:3c:c8:69:03
  Sep 30 23:31:07 castiana kernel: [102903.103701] wlan0: associated
  Sep 30 23:31:07 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: associating -> associated
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: CTRL-EVENT-EAP-STARTED 
EAP authentication started
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: 
CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: CTRL-EVENT-EAP-METHOD 
EAP vendor 0 method 13 (TLS) selected
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=2 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=stgraber.net Root CA/name=stgraber.net Infrastructure Root 
CA/[email protected]' 
hash=87b9750baadddac7f05164d7fde3a0eb3d3efe0c948b430a3ecd093c629956e9
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=radius/name=stgraber.net Infrastructure Root 
CA/[email protected]' 
hash=1fc5a4237c625f445a8eaf3794d4ee475d47dd7be31301a0215ee9701dee46e0
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=freeradius01/name=stgraber.net Internal Infrastructure Radius 
CA/[email protected]' 
hash=9fa224ec6e74510d80257cc4dd43e660e0015642959b2fdea8995cbc71c6abf8
  Sep 30 23:31:07 castiana wpa_supplicant[25653]: l2_packet_send - sendto: 
Message too long
  Sep 30 23:31:28 castiana wpa_supplicant[25653]: message repeated 3 times: [ 
l2_packet_send - sendto: Message too long]
  Sep 30 23:31:31 castiana NetworkManager[25815]: <warn>  (wlan0): Activation: 
(wifi) association took too long
  Sep 30 23:31:31 castiana NetworkManager[25815]: <info>  (wlan0): device state 
change: config -> failed (reason 'no-secrets') [50 120 7]
  Sep 30 23:31:31 castiana NetworkManager[25815]: <info>  NetworkManager state 
is now CONNECTED_LOCAL
  Sep 30 23:31:31 castiana kernel: [102927.404913] wlan0: deauthenticating from 
24:a4:3c:c8:69:03 by local choice (Reason: 3=DEAUTH_LEAVING)
  Sep 30 23:31:31 castiana NetworkManager[25815]: <warn>  (wlan0): Activation: 
failed for connection 'stgraber.net-secure'
  Sep 30 23:31:31 castiana NetworkManager[25815]: <info>  (wlan0): device state 
change: failed -> disconnected (reason 'none') [120 30 0]
  Sep 30 23:31:31 castiana wpa_supplicant[25653]: wlan0: 
CTRL-EVENT-DISCONNECTED bssid=24:a4:3c:c8:69:03 reason=3 locally_generated=1
  Sep 30 23:31:31 castiana NetworkManager[25815]: <info>  Device 'wlan0' has no 
connection; scheduling activate_check in 0 seconds.
  Sep 30 23:31:31 castiana NetworkManager[25815]: <warn>  Connection 
disconnected (reason -3)
  Sep 30 23:31:31 castiana NetworkManager[25815]: <info>  (wlan0): supplicant 
interface state: associated -> disconnected
  Sep 30 23:31:31 castiana kernel: [102927.422121] IPv6: ADDRCONF(NETDEV_UP): 
wlan0: link is not ready
  Sep 30 23:31:31 castiana NetworkManager[25815]: <warn>  Failed to 
GDBus.Error:fi.w1.wpa_supplicant1.NotConnected: This interface is not 
connected: disconnect.


  ## A successful association (as seen after restart wpasupplicant) looks like:
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): Activation: 
(wifi) connection 'stgraber.net-secure' has security, and secrets exist.  No 
new secrets needed.
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 'ssid' 
value 'stgraber.net-secure'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'scan_ssid' value '1'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'key_mgmt' value 'WPA-EAP'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 'eap' 
value 'TLS'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'fragment_size' value '1300'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'ca_cert' value '/home/stgraber/data/certs/stgraber-radius/ca.crt'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'private_key' value '/home/stgraber/data/certs/stgraber-radius/castiana.p12'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'private_key_passwd' value '<omitted>'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'identity' value 'castiana'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 'bgscan' 
value 'simple:30:-65:300'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: added 
'proactive_key_caching' value '1'
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  Config: set interface 
ap_scan to 1
  Oct  1 00:21:49 castiana kernel: [105943.745716] wlan0: authenticate with 
24:a4:3c:c8:69:13
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: SME: Trying to 
authenticate with 24:a4:3c:c8:69:13 (SSID='stgraber.net-secure' freq=5805 MHz)
  Oct  1 00:21:49 castiana kernel: [105943.756236] wlan0: send auth to 
24:a4:3c:c8:69:13 (try 1/3)
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): supplicant 
interface state: inactive -> authenticating
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: Trying to associate 
with 24:a4:3c:c8:69:13 (SSID='stgraber.net-secure' freq=5805 MHz)
  Oct  1 00:21:49 castiana kernel: [105943.842803] wlan0: authenticated
  Oct  1 00:21:49 castiana kernel: [105943.845837] wlan0: associate with 
24:a4:3c:c8:69:13 (try 1/3)
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: Associated with 
24:a4:3c:c8:69:13
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): supplicant 
interface state: authenticating -> associating
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: CTRL-EVENT-EAP-STARTED 
EAP authentication started
  Oct  1 00:21:49 castiana kernel: [105943.846886] wlan0: RX AssocResp from 
24:a4:3c:c8:69:13 (capab=0x11 status=0 aid=1)
  Oct  1 00:21:49 castiana kernel: [105943.848105] wlan0: associated
  Oct  1 00:21:49 castiana kernel: [105943.848134] IPv6: 
ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): supplicant 
interface state: associating -> associated
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: 
CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: CTRL-EVENT-EAP-METHOD 
EAP vendor 0 method 13 (TLS) selected
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=2 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=stgraber.net Root CA/name=stgraber.net Infrastructure Root 
CA/[email protected]' 
hash=87b9750baadddac7f05164d7fde3a0eb3d3efe0c948b430a3ecd093c629956e9
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=radius/name=stgraber.net Infrastructure Root 
CA/[email protected]' 
hash=1fc5a4237c625f445a8eaf3794d4ee475d47dd7be31301a0215ee9701dee46e0
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: 
CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/C=CA/ST=Quebec/L=Montreal/O=stgraber.net/OU=Internal 
Infrastructure/CN=freeradius01/name=stgraber.net Internal Infrastructure Radius 
CA/[email protected]' 
hash=9fa224ec6e74510d80257cc4dd43e660e0015642959b2fdea8995cbc71c6abf8
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: CTRL-EVENT-EAP-SUCCESS 
EAP authentication completed successfully
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: nl80211: Unexpected encryption 
algorithm 5
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): supplicant 
interface state: associated -> 4-way handshake
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: WPA: Key negotiation 
completed with 24:a4:3c:c8:69:13 [PTK=CCMP GTK=CCMP]
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: CTRL-EVENT-CONNECTED - 
Connection to 24:a4:3c:c8:69:13 completed [id=0 id_str=]
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): supplicant 
interface state: 4-way handshake -> completed
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): Activation: 
(wifi) Stage 2 of 5 (Device Configure) successful.  Connected to wireless 
network 'stgraber.net-secure'.
  Oct  1 00:21:49 castiana NetworkManager[9615]: <info>  (wlan0): device state 
change: config -> ip-config (reason 'none') [50 70 0]
  Oct  1 00:21:49 castiana gnome-session[1907]: (deja-dup-monitor:5926): 
GLib-CRITICAL **: Source ID 1789 was not found when attempting to remove it
  Oct  1 00:21:49 castiana wpa_supplicant[9608]: wlan0: 
CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-63 noise=9999 txrate=9000

  ProblemType: Bug
  DistroRelease: Ubuntu 15.10
  Package: wpasupplicant 2.4-0ubuntu2
  ProcVersionSignature: Ubuntu 4.2.0-11.13-generic 4.2.1
  Uname: Linux 4.2.0-11-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.19-0ubuntu1
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Thu Oct  1 00:24:02 2015
  InstallationDate: Installed on 2015-04-23 (160 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422)
  SourcePackage: wpa
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/hostap/+bug/1501588/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to