On Tue, 2016-06-07 at 19:13 +0200, Bastien Nocera wrote: > On Tue, 2016-06-07 at 09:58 -0500, Dan Williams wrote: > > On Tue, 2016-06-07 at 16:09 +0200, Bastien Nocera wrote: > > > Hey, > > > > > > iwlist scan as root shows: > > > Cell 17 - Address: 00:24:36:9D:3B:33 > > > Channel:11 > > > Frequency:2.462 GHz (Channel 11) > > > Quality=70/70 Signal level=-32 dBm > > > Encryption key:on > > > ESSID:"WEP test" > > > Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; > > > 6 > > > Mb/s > > > 9 Mb/s; 12 Mb/s; 18 Mb/s > > > Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s > > > Mode:Master > > > Extra:tsf=00000069f3b5fd9a > > > Extra: Last beacon: 27430ms ago > > > IE: Unknown: 00085745502074657374 > > > IE: Unknown: 010882848B960C121824 > > > IE: Unknown: 03010B > > > IE: Unknown: 0706474220010D1E > > > IE: Unknown: 2A0100 > > > IE: Unknown: 32043048606C > > > IE: IEEE 802.11i/WPA2 Version 1 > > > Group Cipher : WEP-104 > > > Pairwise Ciphers (2) : CCMP TKIP > > > Authentication Suites (1) : PSK > > > IE: Unknown: > > > 2D1A2C4017FFFF000000000000000000000000000000000000000000 > > > IE: Unknown: > > > 3D160B001100000000000000000000000000000000000000 > > > IE: Unknown: 46050200010000 > > > IE: WPA Version 1 > > > Group Cipher : WEP-104 > > > Pairwise Ciphers (1) : TKIP > > > Authentication Suites (1) : PSK > > > IE: Unknown: > > > DD180050F2020101070003A4000027A4000042435E0062322F00 > > > IE: Unknown: DD07000393016B0B20 > > > IE: Unknown: DD0E0017F207000101060024369D3B33 > > > IE: Unknown: DD0B0017F20100010100000007 > > > > > > Which is a WEP access point created on an Airport Express gen 1 > > > device. > > > "nmcli -f all device wifi | grep 'WEP test'" doesn't show > > > anything > > > related to that access point? > > > > > > Any ideas on how to debug this? > > > > It depends if the supplicant has actually exposed it via D-Bus yet > > too. > > > > Grab http://people.redhat.com/dcbw/wpas-list.py and sudo-run that > > with > > the interface name of your wifi device, and see if the AP shows up > > in > > that list. It directly dumps out the supplicant's AP list in a > > more > > readable form. > > $ sudo ./wpas-list.py wlp2s0 > [sudo] password for hadess: > 54:64:d9:3e:0e:89 :: ssid='Livebox-0E88' wpa=yes wpa2=yes signal=-58% > freq=5240 > 18:1e:78:70:c4:6b :: ssid='Livebox-C46A' wpa=yes wpa2=yes signal=-62% > freq=5520 > Traceback (most recent call last): > File "./wpas-list.py", line 68, in > main() > File "./wpas-list.py", line 46, in main > props = props_iface.GetAll(WPAS_DBUS_BSSID_INTERFACE) > File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line 70, in > __call__ > return self._proxy_method(*args, **keywords) > File "/usr/lib64/python2.7/site-packages/dbus/proxies.py", line 145, in > __call__ > **keywords) > File "/usr/lib64/python2.7/site-packages/dbus/connection.py", line 651, in > call_blocking > message, timeout) > dbus.exceptions.DBusException: org.freedesktop.DBus.Error.Failed: failed to > parse RSN IE
After adding a try/except: failed for /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2 Which is the "WEP test" AP I used. $ sudo gdbus introspect --system --dest fi.w1.wpa_supplicant1 --object-path /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2 <snip> interface fi.w1.wpa_supplicant1.BSS { methods: signals: PropertiesChanged(a{sv} properties); properties: readonly ay SSID = [0x57, 0x45, 0x50, 0x20, 0x74, 0x65, 0x73, 0x74]; readonly ay BSSID = [0x00, 0x24, 0x36, 0x9d, 0x3b, 0x33]; readonly b Privacy = true; readonly s Mode = 'infrastructure'; readonly n Signal = -35; readonly q Frequency = 2462; readonly au Rates = [54000000, 48000000, 36000000, 24000000, 18000000, 12000000, 11000000, 9000000, 6000000, 5500000, 2000000, 1000000]; readonly a{sv} WPA = {'KeyMgmt': <['wpa-psk']>, 'Group': <''>, 'Pairwise': <['tkip']>}; readonly a{sv} RSN; readonly a{sv} WPS = {}; readonly ay IEs = [0x00, 0x08, 0x57, 0x45, 0x50, 0x20, 0x74, 0x65, 0x73, 0x74, 0x01, 0x08, 0x82, 0x84, 0x8b, 0x96, 0x0c, 0x12, 0x18, 0x24, 0x03, 0x01, 0x0b, 0x07, 0x06, 0x47, 0x42, 0x20, 0x01, 0x0d, 0x1e, 0x2a, 0x01, 0x00, 0x32, 0x04, 0x30, 0x48, 0x60, 0x6c, 0x30, 0x18, 0x01, 0x00, 0x00, 0x0f, 0xac, 0x05, 0x02, 0x00, 0x00, 0x0f, 0xac, 0x04, 0x00, 0x0f, 0xac, 0x02, 0x01, 0x00, 0x00, 0x0f, 0xac, 0x02, 0x00, 0x00, 0x2d, 0x1a, 0x2c, 0x40, 0x17, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3d, 0x16, 0x0b, 0x00, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x46, 0x05, 0x02, 0x00, 0x01, 0x00, 0x00, 0xdd, 0x16, 0x00, 0x50, 0xf2, 0x01, 0x01, 0x00, 0x00, 0x50, 0xf2, 0x05, 0x01, 0x00, 0x00, 0x50, 0xf2, 0x02, 0x01, 0x00, 0x00, 0x50, 0xf2, 0x02, 0xdd, 0x18, 0x00, 0x50, 0xf2, 0x02, 0x01, 0x01, 0x07, 0x00, 0x03, 0xa4, 0x00, 0x00, 0x27, 0xa4, 0x00, 0x00, 0x42, 0x43, 0x5e, 0x00, 0x62, 0x32, 0x2f, 0x00, 0xdd, 0x07, 0x00, 0x03, 0x93, 0x01, 0x6b, 0x0b, 0x20, 0xdd, 0x0e, 0x00, 0x17, 0xf2, 0x07, 0x00, 0x01, 0x01, 0x06, 0x00, 0x24, 0x36, 0x9d, 0x3b, 0x33, 0xdd, 0x0b, 0x00, 0x17, 0xf2, 0x01, 0x00, 0x01, 0x01, 0x00, 0x00, 0x00, 0x07]; readonly u Age = 104; }; I used wpa_supplicant-2.5-5.fc24.x86_64. Where do I file bugs for it? Cheers _______________________________________________ networkmanager-list mailing list networkmanager-list@gnome.org https://mail.gnome.org/mailman/listinfo/networkmanager-list