Dan,
ok I see where it is failing, default ipw2100/ipw2200, AP_SCAN
always gets set to AP_SCAN=2.
When it is set to AP_SCAN=1 it works. For both broadcast and do not
broadcast SSID. If you want the output for my home network for both, I
will gladly send them on.
I still need to test this in work situation. The following patch I put
together (from various sources) is a workaround for this issue at home
anyway. From information I read the mailing lists somes cards must have
AP_SCAN=2. Also I needed to add the set ssid patch, otherwise it simply
does not work.
With ipw3945, does not seem to make any difference if I set it to 1 or
2. Fails, using 1.1.2 driver, perhaps I need to upgrade it.
diff -ur NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c
NetworkManager-0.6.4/src/nm-device-802-11-wireless.c
--- NetworkManager-0.6.4.orig/src/nm-device-802-11-wireless.c
2007-01-25 15:07:36.000000000 +0100
+++ NetworkManager-0.6.4/src/nm-device-802-11-wireless.c
2007-01-25 15:07:44.000000000 +0100
@@ -2658,6 +2658,7 @@
const char * ap_scan = "AP_SCAN 1";
guint32 caps;
gboolean supports_wpa;
+ const char * kernel_driver;
g_return_val_if_fail (self != NULL, FALSE);
g_return_val_if_fail (req != NULL, FALSE);
@@ -2681,8 +2682,23 @@
* - The wireless driver does not support WPA (stupid drivers...)
*/
is_adhoc = (nm_ap_get_mode(ap) == IW_MODE_ADHOC);
- if (!nm_ap_get_broadcast (ap) || is_adhoc || !supports_wpa)
- ap_scan = "AP_SCAN 2";
+ kernel_driver = nm_device_get_driver (NM_DEVICE (self));
+ if (!strcmp (kernel_driver, "orinoco_cs"))
+ ap_scan = "AP_SCAN 2";
+ else if (!strcmp (kernel_driver, "prism54"))
+ ap_scan = "AP_SCAN 2";
+ else if (!strncmp (kernel_driver, "airo", 4))
+ ap_scan = "AP_SCAN 2";
+ else if (!strcmp (kernel_driver, "ath_pci"))
+ ap_scan = "AP_SCAN 2";
+ else if (!strcmp (kernel_driver, "ndiswrapper") &&
!nm_ap_get_broadcast (ap))
+ ap_scan = "AP_SCAN 2";
+ else if (is_adhoc)
+ ap_scan = "AP_SCAN 2";
+ else if (!supports_wpa)
+ ap_scan = "AP_SCAN 2";
+ else
+ ap_scan = "AP_SCAN 1";
/* Tell wpa_supplicant that we'll do the scanning */
if (!nm_utils_supplicant_request_with_check (ctrl, "OK",
__func__, NULL, ap_scan))
@@ -2796,10 +2812,15 @@
NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
NMData * data =
nm_act_request_get_data (req);
const char * iface;
+ const char * essid;
gboolean ask_user = FALSE;
g_assert (ap);
+ essid = nm_ap_get_orig_essid (ap);
+ nm_device_802_11_wireless_set_essid (self, essid);
+ nm_info ("TEST PATCH Setting ESSID to %s", essid);
+
supplicant_cleanup (self);
/* If we need an encryption key, get one */
Dan Williams wrote:
> On Thu, 2007-01-25 at 10:51 +0100, Grant Williamson wrote:
>
>> Dan,
>> here is another example, SSID Broadcast disabled on a home network.
>> Using wpa_supplicant alone I can connect(less than 5 seconds).
>> Using network manager I cannot. Note in both examples I have preset the
>> SSID.
>> I am using NetworkManager 0.6.4 and have tried wpa_supplicant 0.4.8 & 0.5.7
>>
>> ############################################################################
>> cat wpa_supplicant.conf
>> ctrl_interface=/var/run/wpa_supplicant
>>
>
> Can you try adding "ap_scan=2" here and retry the connect? NM is using
> that likely because it's a hidden network, lets try to narrow down what
> the problem is. Let us know the results.
>
> Thanks,
> Dan
>
>
>> network={
>> ssid="ATMEL"
>> scan_ssid=1
>> proto=WPA
>> key_mgmt=WPA-PSK
>> pairwise=CCMP TKIP
>> group=CCMP TKIP WEP104 WEP40
>> psk=<removed>
>> }
>> ############################################################################
>> WPA_SUPPLICANT
>>
>> [EMAIL PROTECTED] eap]# iwconfig eth1 essid ATMEL
>>
>> [EMAIL PROTECTED] eap]# iwconfig
>> lo no wireless extensions.
>>
>> eth0 no wireless extensions.
>>
>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
>> Mode:Managed Channel=0 Access Point: Not-Associated
>> Bit Rate=0 kb/s Tx-Power:16 dBm
>> Retry min limit:7 RTS thr:off Fragment thr:off
>> Encryption key:off
>> Power Management:off
>> Link Quality:0 Signal level:0 Noise level:0
>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
>> Tx excessive retries:0 Invalid misc:5 Missed beacon:0
>>
>> sit0 no wireless extensions.
>>
>>
>> [EMAIL PROTECTED] eap]# wpa_supplicant -Dwext -w -cwpa_supplicant.conf
>> -ieth1 -dd
>> Initializing interface 'eth1' conf 'wpa_supplicant.conf' driver 'wext'
>> ctrl_interface 'N/A' bridge 'N/A'
>> Configuration file 'wpa_supplicant.conf' -> '/etc/eap/wpa_supplicant.conf'
>> Reading configuration file '/etc/eap/wpa_supplicant.conf'
>> ctrl_interface='/var/run/wpa_supplicant'
>> Line: 2 - start of a new network block
>> ssid - hexdump_ascii(len=5):
>> 41 54 4d 45 4c ATMEL
>> scan_ssid=1 (0x1)
>> proto: 0x1
>> key_mgmt: 0x2
>> pairwise: 0x18
>> group: 0x1e
>> PSK - hexdump(len=32): [REMOVED]
>> Priority group 0
>> id=0 ssid='ATMEL'
>> Initializing interface (2) 'eth1'
>> EAPOL: SUPP_PAE entering state DISCONNECTED
>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>> EAPOL: SUPP_BE entering state INITIALIZE
>> EAP: EAP entering state DISABLED
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
>> capabilities: key_mgmt 0xf enc 0xf
>> WEXT: Operstate: linkmode=1, operstate=5
>> Own MAC address: 00:0c:f1:1e:89:0b
>> wpa_driver_wext_set_wpa
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_countermeasures
>> wpa_driver_wext_set_drop_unencrypted
>> Setting scan request: 0 sec 100000 usec
>> Added interface eth1
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> State: DISCONNECTED -> SCANNING
>> Starting AP scan (specific SSID)
>> Scan SSID - hexdump_ascii(len=5):
>> 41 54 4d 45 4c ATMEL
>> Trying to get current scan results first without requesting a new scan
>> to speed up initial association
>> Received 1521 bytes of scan results (6 BSSes)
>> Scan results: 6
>> Selecting BSS from priority group 0
>> 0: 00:13:10:68:4f:1c ssid='ATMEL' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
>> selected based on WPA IE
>> Trying to associate with 00:13:10:68:4f:1c (SSID='ATMEL' freq=2432 MHz)
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: using IEEE 802.11i/D3.0
>> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
>> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
>> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> WPA: clearing AP RSN IE
>> WPA: using GTK TKIP
>> WPA: using PTK TKIP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> ioctl[SIOCSIWFREQ]: Operation not supported
>> Association request to the driver failed
>> Setting authentication timeout: 5 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=14
>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>> Wireless event: cmd=0x8b15 len=20
>> Wireless event: new AP: 00:13:10:68:4f:1c
>> State: ASSOCIATING -> ASSOCIATED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> Associated to a new BSS: BSSID=00:13:10:68:4f:1c
>> No keys have been configured - skip key clearing
>> Associated with 00:13:10:68:4f:1c
>> WPA: Association event - clear replay counter
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - portEnabled=1
>> EAPOL: SUPP_PAE entering state CONNECTING
>> EAPOL: SUPP_BE entering state IDLE
>> Setting authentication timeout: 10 sec 0 usec
>> Cancelling scan request
>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX EAPOL from 00:13:10:68:4f:1c
>> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
>> 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05 0b
>> 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00
>> Setting authentication timeout: 10 sec 0 usec
>> IEEE 802.1X RX: version=1 type=3 length=95
>> EAPOL-Key type=254
>> key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
>> key_length=32 key_data_length=0
>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
>> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
>> 00 00 00 00 02 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5
>> 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> State: ASSOCIATED -> 4WAY_HANDSHAKE
>> WPA: RX message 1 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
>> WPA: Renewed SNonce - hexdump(len=32): fc 26 2c a1 e2 16 e1 1b 2d 47 d6
>> 67 09 c4 60 45 46 93 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e
>> WPA: PMK - hexdump(len=32): [REMOVED]
>> WPA: PTK - hexdump(len=64): [REMOVED]
>> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
>> f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> WPA: Sending EAPOL-Key 2/4
>> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00
>> 00 00 00 00 00 02 fc 26 2c a1 e2 16 e1 1b 2d 47 d6 67 09 c4 60 45 46 93
>> 5e 9f 3b 1d 26 01 b9 16 d8 40 f7 1a 20 2e 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 18
>> 9e e9 b4 f5 f7 ea 7c 8f 72 01 f2 3c 02 d9 00 18 dd 16 00 50 f2 01 01 00
>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> RX EAPOL from 00:13:10:68:4f:1c
>> RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
>> 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05
>> 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70 ed 56 bb
>> b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
>> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> IEEE 802.1X RX: version=1 type=3 length=119
>> EAPOL-Key type=254
>> key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
>> key_length=32 key_data_length=24
>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31
>> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_mic - hexdump(len=16): 9f 70 ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec
>> WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
>> 00 00 00 00 00 03 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce
>> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 31 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 70
>> ed 56 bb b6 2f 11 81 4c 4a 77 8f a4 5a ec 00 18 dd 16 00 50 f2 01 01 00
>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
>> WPA: RX message 3 of 4-Way Handshake from 00:13:10:68:4f:1c (ver=1)
>> WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
>> 01 00 00 50 f2 02 01 00 00 50 f2 02
>> WPA: Sending EAPOL-Key 4/4
>> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00
>> 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 8d 77
>> ab ae 54 52 6f e5 d7 b7 b2 bb 37 b8 e9 00 00
>> WPA: Installing PTK to the driver.
>> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
>> wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
>> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
>> EAPOL: startWhen --> 0
>> EAPOL: SUPP_PAE entering state CONNECTING
>> EAPOL: txStart
>> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX EAPOL from 00:13:10:68:4f:1c
>> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00
>> 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce e5 98 05
>> 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e
>> d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae e1 31 81
>> da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3 65 2c 46
>> 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
>> IEEE 802.1X RX: version=1 type=3 length=127
>> EAPOL-Key type=254
>> key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
>> key_length=32 key_data_length=32
>> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
>> key_nonce - hexdump(len=32): b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20
>> 09 21 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f
>> key_iv - hexdump(len=16): 81 ce e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 32
>> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>> key_mic - hexdump(len=16): c3 ae e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75
>> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00
>> 00 00 00 00 00 05 b9 0a 64 80 93 14 3d 57 ca d2 01 18 ef 20 09 21 81 ce
>> e5 98 05 0b 53 f0 ee ae 8b 2a 5e d4 f4 2f 81 ce e5 98 05 0b 53 f0 ee ae
>> 8b 2a 5e d4 f4 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 ae
>> e1 31 81 da 33 ec 5a 13 93 df 03 c1 f5 75 00 20 41 95 1f 51 7a 69 e2 a3
>> 65 2c 46 30 c0 7d fe 4a 1a 22 5b dc fb ad 37 c7 3b c9 9d 99 ca 62 7d 41
>> WPA: RX message 1 of Group Key Handshake from 00:13:10:68:4f:1c (ver=1)
>> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
>> WPA: Group Key - hexdump(len=32): [REMOVED]
>> WPA: Installing GTK to the driver (keyidx=2 tx=0).
>> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
>> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
>> WPA: Sending EAPOL-Key 2/2
>> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00
>> 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 43 99
>> 35 44 14 2b d4 f5 d1 04 31 bd d1 87 b4 00 00
>> WPA: Key negotiation completed with 00:13:10:68:4f:1c [PTK=TKIP GTK=TKIP]
>> Cancelling authentication timeout
>> State: GROUP_HANDSHAKE -> COMPLETED
>> CTRL-EVENT-CONNECTED - Connection to 00:13:10:68:4f:1c completed (auth)
>> [id=0 id_str=]
>> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
>> WEXT: Operstate: linkmode=-1, operstate=6
>> EAPOL: External notification - portValid=1
>> EAPOL: External notification - EAP success=1
>> EAPOL: SUPP_PAE entering state AUTHENTICATING
>> EAPOL: SUPP_BE entering state SUCCESS
>> EAP: EAP entering state DISABLED
>> EAPOL: SUPP_PAE entering state AUTHENTICATED
>> EAPOL: SUPP_BE entering state IDLE
>> RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> RX ctrl_iface - hexdump_ascii(len=6):
>> 53 54 41 54 55 53 STATUS
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> CTRL-EVENT-TERMINATING - signal 2 received
>> Removing interface eth1
>> State: COMPLETED -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_deauthenticate
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> EAPOL: External notification - portEnabled=0
>> EAPOL: SUPP_PAE entering state DISCONNECTED
>> EAPOL: SUPP_BE entering state INITIALIZE
>> EAPOL: External notification - portValid=0
>> wpa_driver_wext_set_wpa
>> wpa_driver_wext_set_drop_unencrypted
>> wpa_driver_wext_set_countermeasures
>> No keys have been configured - skip key clearing
>> Cancelling scan request
>> Cancelling authentication timeout
>> WEXT: Operstate: linkmode=0, operstate=6
>>
>> ############################################################################
>> NETWORKMANAGER
>> [EMAIL PROTECTED] eap]# iwconfig eth1 essid ATMEL
>>
>> [EMAIL PROTECTED] eap]# iwconfig
>> lo no wireless extensions.
>>
>> eth0 no wireless extensions.
>>
>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
>> Mode:Managed Channel=0 Access Point: Not-Associated
>> Bit Rate=0 kb/s Tx-Power:16 dBm
>> Retry min limit:7 RTS thr:off Fragment thr:off
>> Encryption key:off
>> Power Management:off
>> Link Quality:0 Signal level:0 Noise level:0
>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
>> Tx excessive retries:0 Invalid misc:5 Missed beacon:0
>>
>> sit0 no wireless extensions.
>>
>> [EMAIL PROTECTED] eap]# ./nm-supplicant-test eth1 wpa_supplicant.conf
>> ap_scan: 2
>> Key: ssid, Value: "ATMEL"
>> Key: scan_ssid, Value: 1
>> Key: proto, Value: WPA
>> Key: key_mgmt, Value: WPA-PSK
>> Key: pairwise, Value: CCMP TKIP
>> Key: group, Value: CCMP TKIP WEP104 WEP40
>> Key: psk, Value:
>> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f
>> SUP: sending command 'INTERFACE_ADD eth1 wext
>> /var/run/wpa_supplicant '
>> SUP: response was 'OK'
>> SUP: sending command 'AP_SCAN 2'
>> SUP: response was 'OK'
>> SUP: sending command 'ADD_NETWORK'
>> SUP: response was '0'
>> SUP: sending command 'SET_NETWORK 0 ssid "ATMEL"'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 proto WPA'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP WEP104 WEP40'
>> SUP: response was 'OK'
>> SUP: sending command 'SET_NETWORK 0 psk
>> 2fe06ac721b4c2e049589625ae2681278d3d047c9b4f4960e8c239e9f03d4e1f'
>> SUP: response was 'OK'
>> SUP: sending command 'ENABLE_NETWORK 0'
>> SUP: response was 'OK'
>> wpa_supplicant(2177): Global control interface
>> '/var/run/wpa_supplicant-global'
>> wpa_supplicant(2177): RX global ctrl_iface - hexdump_ascii(len=49):
>> wpa_supplicant(2177): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65
>> 74 INTERFACE_ADD et
>> wpa_supplicant(2177): 68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72
>> 75 h1__wext_/var/ru
>> wpa_supplicant(2177): 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e
>> 74 n/wpa_supplicant
>> wpa_supplicant(2177):
>> 09 _
>> wpa_supplicant(2177): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1
>> wext /var/run/wpa_supplicant '
>> wpa_supplicant(2177): Initializing interface 'eth1' conf 'N/A' driver
>> 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
>> wpa_supplicant(2177): Initializing interface (2) 'eth1'
>> wpa_supplicant(2177): EAPOL: SUPP_PAE entering state DISCONNECTED
>> wpa_supplicant(2177): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>> wpa_supplicant(2177): EAPOL: SUPP_BE entering state INITIALIZE
>> wpa_supplicant(2177): EAP: EAP entering state DISABLED
>> wpa_supplicant(2177): EAPOL: External notification - portEnabled=0
>> wpa_supplicant(2177): EAPOL: External notification - portValid=0
>> wpa_supplicant(2177): SIOCGIWRANGE: WE(compiled)=20 WE(source)=18
>> enc_capa=0xf
>> wpa_supplicant(2177): capabilities: key_mgmt 0xf enc 0xf
>> wpa_supplicant(2177): WEXT: Operstate: linkmode=1, operstate=5
>> wpa_supplicant(2177): b
>> wpa_supplicant(2177): wpa_driver_wext_set_wpa
>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0
>> seq_len=0 key_len=0
>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0
>> seq_len=0 key_len=0
>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0
>> seq_len=0 key_len=0
>> wpa_supplicant(2177): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0
>> seq_len=0 key_len=0
>> wpa_supplicant(2177): wpa_driver_wext_set_countermeasures
>> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
>> wpa_supplicant(2177): Setting scan request: 0 sec 100000 usec
>> wpa_supplicant(2177): Added interface eth1
>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
>> wpa_supplicant(2177): Wireless event: cmd=0x8b06 len=8
>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
>> wpa_supplicant(2177): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> wpa_supplicant(2177): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=9):
>> wpa_supplicant(2177): 41 50 5f 53 43 41 4e 20
>> 32 AP_SCAN 2
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=11):
>> wpa_supplicant(2177): 41 44 44 5f 4e 45 54 57 4f 52
>> 4b ADD_NETWORK
>> wpa_supplicant(2177): CTRL_IFACE: ADD_NETWORK
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=26): [REMOVED]
>> wpa_supplicant(2177): _NETWORK id=0 name='ssid'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
>> wpa_supplicant(2177): ssid - hexdump_ascii(len=5):
>> wpa_supplicant(2177): 41 54 4d 45
>> 4c ATMEL
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=25): [REMOVED]
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
>> wpa_supplicant(2177): scan_ssid=1 (0x1)
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=23): [REMOVED]
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='proto'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=3): [REMOVED]
>> wpa_supplicant(2177): proto: 0x1
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
>> wpa_supplicant(2177): key_mgmt: 0x2
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
>> wpa_supplicant(2177): pairwise: 0x18
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=42): [REMOVED]
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='group'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=22): [REMOVED]
>> wpa_supplicant(2177): group: 0x1e
>> wpa_supplicant(2177):
>> wpa_supplicant(2177): CTRL_IFACE: SET_NETWORK id=0 name='psk'
>> wpa_supplicant(2177): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
>> wpa_supplicant(2177): PSK - hexdump(len=32): [REMOVED]
>> wpa_supplicant(2177): RX ctrl_iface - hexdump_ascii(len=16):
>> wpa_supplicant(2177): 45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20
>> 30 ENABLE_NETWORK 0
>> wpa_supplicant(2177): CTRL_IFACE: ENABLE_NETWORK id=0
>> wpa_supplicant(2177): Setting scan request: 0 sec 0 usec
>> wpa_supplicant(2177): State: DISCONNECTED -> SCANNING
>> wpa_supplicant(2177): Trying to associate with SSID 'ATMEL'
>> wpa_supplicant(2177): Cancelling scan request
>> wpa_supplicant(2177): WPA: clearing own WPA/RSN IE
>> wpa_supplicant(2177): Automatic auth_alg selection: 0x1
>> wpa_supplicant(2177): WPA: No WPA/RSN IE available from association info
>> wpa_supplicant(2177): WPA: Set cipher suites based on configuration
>> wpa_supplicant(2177): WPA: Selected cipher suites: group 30 pairwise 24
>> key_mgmt 2 proto 1
>> wpa_supplicant(2177): WPA: clearing AP WPA IE
>> wpa_supplicant(2177): WPA: clearing AP RSN IE
>> wpa_supplicant(2177): WPA: using GTK CCMP
>> wpa_supplicant(2177): WPA: using PTK CCMP
>> wpa_supplicant(2177): WPA: using KEY_MGMT WPA-PSK
>> wpa_supplicant(2177): WPA: Set own WPA IE default - hexdump(len=24): dd
>> 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
>> wpa_supplicant(2177): No keys have been configured - skip key clearing
>> wpa_supplicant(2177): wpa_driver_wext_set_drop_unencrypted
>> wpa_supplicant(2177): State: SCANNING -> ASSOCIATING
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> ioctl[SIOCGIFADDR]: Cannot assign requested address
>> Activation (eth1/wireless): association took too long (>20s), failing
>> activation.
>> sendmsg(CTRL_IFACE monitor): No such file or directory
>> [EMAIL PROTECTED] eap]# iwconfig
>> lo no wireless extensions.
>>
>> eth0 no wireless extensions.
>>
>> eth1 unassociated ESSID:"ATMEL" Nickname:"ipw2100"
>> Mode:Managed Channel=0 Access Point: Not-Associated
>> Bit Rate=0 kb/s Tx-Power:16 dBm
>> Retry min limit:7 RTS thr:off Fragment thr:off
>> Encryption key:off
>> Power Management:off
>> Link Quality:0 Signal level:0 Noise level:0
>> Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
>> Tx excessive retries:0 Invalid misc:6 Missed beacon:0
>>
>> sit0 no wireless extensions.
>>
>>
>>
>> Dan Williams wrote:
>>
>>> On Wed, 2007-01-24 at 10:15 -0500, Darren Albers wrote:
>>>
>>>
>>>> On 1/24/07, Grant Williamson <[EMAIL PROTECTED]> wrote:
>>>>
>>>>
>>>>> Dan,
>>>>> are there any plans for Network Manager to handle hidden essid's?
>>>>> i.e. using wpa_supplicant I can connect with the following config.
>>>>>
>>>>> ctrl_interface=/var/run/wpa_supplicant
>>>>> eapol_version=1
>>>>> network={
>>>>> ssid="MBI"
>>>>> scan_ssid=1
>>>>> eap=TLS
>>>>> key_mgmt=IEEE8021X
>>>>> pairwise=TKIP
>>>>> group=WEP104
>>>>> identity="[EMAIL PROTECTED]"
>>>>> ca_cert="/etc/eap/cacert.pem"
>>>>> client_cert="etc/eap/key.pem"
>>>>> private_key="/etc/eap/key.pem"
>>>>> private_key_passwd="whodareswins"
>>>>> eapol_flags=3
>>>>> }
>>>>>
>>>>> With networkmanager it never connects(the only way I have ever managed
>>>>> to connect was to quickly do a iwconfig eth0 essid MBI and then fingers
>>>>> crossed it worked once).
>>>>>
>>>>>
>>>>>
>>>> <snip>
>>>>
>>>> I don't think the issue is a hidden SSID, I think the problem is using
>>>> EAP with WEP which I don't /think/ NetworkManager supports at this
>>>> time. Dan, correct me if I am wrong.
>>>>
>>>>
>>> Ah, you're right. This is the "compat" mode that allows WEP clients to
>>> continue to work with WPA base stations; since WEP clients don't know
>>> anything about pairwise keys they can work as normal, but WPA-capable
>>> clients can use TKIP/CCMP for all STA<->AP communication.
>>>
>>> That's likely the problem, yes.
>>>
>>> Dan
>>>
>>>
>>>
>>>
>>>
>> _______________________________________________
>> NetworkManager-list mailing list
>> [email protected]
>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
>>
>
>
>
_______________________________________________
NetworkManager-list mailing list
[email protected]
http://mail.gnome.org/mailman/listinfo/networkmanager-list