auftisch
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Hi, ich möchte, dass sich ubuntu schon beim Booten automatisch mit meinem versteckten WLAN verbindert. Leider habe ich jedoch Probleme, eine Verbindung herzustellen. Ich habe im Router nur WPA2 eingestellt. Zuerst habe ich es manuell mit den Konfigurationsdateien versucht, dann mit wcid. Der network-manager ist deinstalliert und danach habe ich neugestartet. Ich habe es zu Hause nur mit dem Netz mit der SSID "LV" versucht, wobei ich diese und den PSK schon wesentlich vereinfacht habe, um rauszufinden, ob es daran liegt. wcid sagt "Falsches Passwort". Mit dem network-manager hat die Verbindung funktioniert, jedoch will ich mein Netz verstecken und dieses automatisch verbinden. Hier sind meine Konfigurationsdateien und Abfragen aus dem Terminal:
wpa_supplicant.conf:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
# 0: Der Treiber des Interfaces kümmert sich um das Scannen von Netzen und die AP-Auswahl.
# Dieser Modus sollte benutzt werden, wenn man eine Verschlüsselung auf ein Kabelnetzwerk legt.
# 1: wpa_supplicant kümmert sich um das Scannen von Netzen und die AP-Auswahl.
# 2: Fast wie 0, es wird aber mit Hilfe von Sicherheitsrichtlinien und der SSID zu APs verbunden (BSSID wird nicht unterstützt)
#
# Normalerweise funktioniert entweder Modus 1 oder Modus 2.
ap_scan=1
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev
update_config=1
network={
ssid="LV"
scan_ssid=1
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP
psk="okumnn56"
id_str="home"
}
network={
ssid="uni"
key_mgmt=IEEE8021X
eap=TTLS #Verschlüsselung während der Authentifizierung
anonymous_identity="anonymous" #Äussere Identität
identity="username" #Innere Identität
password="passwort" #Passwort
ca_cert="/usr/share/ca-certificates/telesec.de/deutsche-telekom-root-ca-2.crt" #Lokal vorhanden!
phase2="auth=PAP"
id_str="default"
}
interfaces:
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
# The loopback network interface
auto lo
iface lo inet loopback
# Schnittstelle prüfen
pre-up ifconfig eth1 up
pre-up ifconfig eth1 down
# Mehrfachkonfiguration aktivieren
iface eth1 inet manual
wpa-driver wext
# Roaming aktivieren
wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf
iface default inet dhcp # Wenn ID-String=default, dann verwende DHCP
iface home inet static # Wenn ID-String=spezial, dann verwende die folgende statische Kofiguration
address 10.8.97.4 # Adresse
netmask 255.255.255.0 # Netzwerkmaske
hostname blade # Hostname
gateway 10.8.97.2 # Standard Gateway
dns-nameservers 10.8.97.2 10.10.0.2
sudo iwlist scanning
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
eth1 Failed to read scan data : Invalid argument sudo wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf -d
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
update_config=1
Priority group 0
id=0 ssid='LV'
id=1 ssid='ubi'
Initializing interface (2) 'eth1'
Interface eth1 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:26:82:20:35:ad
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 04 96 45 b8 3f 73 58 4c b8 df e6 0f 01 ca 14 d4
WPS: Build Beacon and Probe Response IEs
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Response Type (2)
WPS: * UUID-E
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * Config Methods (0)
WPS: * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=112 (from group name 'netdev')
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=40
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Trying to get current scan results first without requesting a new scan to speed up initial association
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=29
EAPOL: disable timer tick
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='LV' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:04:0e:39:f7:0a ssid='LV'
Trying to associate with 00:04:0e:39:f7:0a (SSID='LV' freq=2467 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
ioctl[SIOCSIWAP]: Device or resource busy
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=10
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:04:00:00:f7:0a
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:04:0e:39:f7:0a
No keys have been configured - skip key clearing
Associated with 00:04:0e:39:f7:0a
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:04:0e:39:f7:0a
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 08 3d 88 44 f2 b9 9b 3c 35 a3 df 9e 6a 60 73 3e d8 5e 90 90 b8 56 3f 63 e4 49 69 a5 00 20 06 22
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): be d8 26 2a 84 ac af e9 2c 06 51 5d d2 ea 9c 7a 19 59 5c fc 27 e6 3f 50 94 49 e4 12 a2 3c c2 1f
WPA: PTK derivation - A1=00:26:82:20:35:ad A2=00:04:0e:39:f7:0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:04:0e:39:f7:0a
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 08 3d 88 44 f2 b9 9b 3c 35 a3 df 9e 6a 60 73 3e d8 5e 90 90 b8 56 3f 63 e4 49 69 a5 00 20 06 22
key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): c5 c7 76 f6 29 6a 36 fe 9f 70 63 68 35 13 b9 c4
RSN: encrypted key data - hexdump(len=56): f4 58 77 03 f0 66 41 f8 5a 25 71 cf 95 79 26 13 c9 b3 f3 2d f9 2d 8f cc b1 ef 16 3e 33 0f 59 3f dc 78 7b e1 1a fd bb 47 87 3e c1 fe ab f2 a9 32 a4 58 a7 15 eb 08 24 01
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 22 73 e4 43 81 b2 e6 f6 b2 6b 01 76 15 e3 bf 8b dd 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:04:0e:39:f7:0a [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:39:f7:0a completed (auth) [id=0 id_str=home]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=26
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=27
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:04:0e:39:f7:0a into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
l2_packet_receive - recvfrom: Network is down
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX ctrl_iface - hexdump_ascii(len=9):
54 45 52 4d 49 4e 41 54 45 TERMINATE
Removing interface eth1
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:04:0e:39:f7:0a from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6 sudo iwlist scanning
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
eth1 Scan completed :
Cell 01 - Address: 00:04:0E:39:F7:0A
ESSID:"\x00\x00"
Mode:Managed
Frequency:2.467 GHz (Channel 12)
Quality:5/5 Signal level:-48 dBm Noise level:-92 dBm
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s iwconfig lo no wireless extensions.
eth0 no wireless extensions.
eth1 IEEE 802.11 Access Point: Not-Associated
Link Quality:5 Signal level:0 Noise level:164
Rx invalid nwid:0 invalid crypt:0 invalid misc:0
Profil "hidden" für wcid: name=hidden
require key *Key Hessid *HESSID bssid *BSSID
----
ctrl_interface=DIR=/var/run/wpa_supplicant
network={
ssid="$_HESSID"
bssid=$_BSSID
scan_ssid=1
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP
psk=$_PSK
}
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Habe das Problem immer noch. Braucht ihr noch mehr Informationen?
Ich kann nur sagen, dass das Passwort richtig ist, habe es zu dem Zweck ja auch extra vereinfacht.
Übrigens: wcid arbeitet eine Zeit und zeigt in der Statusleiste die richtige SSID und "Authenticating" für einige Sekunden an. Dann kommt besagte Meldung.
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Auch mit Verschlüsselung aus, SSID-Broadcasting an und einem noch einfacheren Passwort hat es nicht geklappt. Ich habe hier noch mehr Informationen:
auftisch@auftisch:~$ uname -a; lspci -nnk | grep -i net -A2
Linux auftisch 2.6.35-23-generic #41-Ubuntu SMP Wed Nov 24 10:18:49 UTC 2010 i686 GNU/Linux
02:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit Ethernet controller [10ec:8168] (rev 03)
Subsystem: Lenovo Device [17aa:38a0]
Kernel driver in use: r8169
--
03:00.0 Network controller [0280]: Broadcom Corporation BCM4312 802.11b/g LP-PHY [14e4:4315] (rev 01)
Subsystem: Broadcom Corporation Device [14e4:04ad]
Kernel driver in use: wl
auftisch@auftisch:~$ egrep -v "^$|^#" /etc/network/interfaces
auto lo
iface lo inet loopback
pre-up ifconfig eth1 up
pre-up ifconfig eth1 down
iface eth1 inet manual
wpa-driver wext
wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf
iface default inet dhcp # Wenn ID-String=default, dann verwende DHCP
iface home inet static # Wenn ID-String=spezial, dann verwende die folgende statische Kofiguration
address 10.8.97.4 # Adresse
netmask 255.255.255.0 # Netzwerkmaske
hostname blade # Hostname
gateway 10.8.97.2 # Standard Gateway
dns-nameservers 10.8.97.2 10.10.0.2
auftisch@auftisch:~$ egrep -v "^$|^#" /etc/resolv.conf
nameserver 10.8.97.2
auftisch@auftisch:~$ egrep -v "^$|^#" /etc/hosts
10.8.97.4 bluerelax # Added by NetworkManager
127.0.0.1 localhost.localdomain localhost
::1 bluerelax localhost6.localdomain6 localhost6
127.0.1.1 bluerelax
::1 localhost ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
auftisch@auftisch:~$ cat /etc/udev/rules.d/70-persistent-net.rules
# This file was automatically generated by the /lib/udev/write_net_rules
# program, run by the persistent-net-generator.rules rules file.
#
# You can modify it, as long as you keep each rule on a single
# line, and change only the value of the NAME= key.
# PCI device 0x10ec:0x8168 (r8169)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:26:22:d3:fe:bd", ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="eth*", NAME="eth0"
# PCI device 0x14e4:0x4315 (b43-pci-bridge)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:26:82:20:35:ad", ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="wlan*", NAME="wlan0"
# PCI device 0x14e4:0x4315 (wl)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:26:82:20:35:ad", ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="eth*", NAME="eth1"
auftisch@auftisch:~$ ifconfig
eth0 Link encap:Ethernet Hardware Adresse 00:26:22:d3:fe:bd
inet Adresse:10.8.97.4 Bcast:10.8.97.255 Maske:255.255.255.0
inet6-Adresse: fe80::226:22ff:fed3:febd/64 Gültigkeitsbereich:Verbindung
UP BROADCAST RUNNING MULTICAST MTU:1500 Metrik:1
RX packets:85821 errors:0 dropped:0 overruns:0 frame:0
TX packets:83413 errors:0 dropped:9 overruns:0 carrier:0
Kollisionen:0 Sendewarteschlangenlänge:1000
RX bytes:52620661 (52.6 MB) TX bytes:8722267 (8.7 MB)
Interrupt:44 Basisadresse:0x6000
eth1 Link encap:Ethernet Hardware Adresse 00:26:82:20:35:ad
inet6-Adresse: fe80::226:82ff:fe20:35ad/64 Gültigkeitsbereich:Verbindung
UP BROADCAST MULTICAST MTU:1500 Metrik:1
RX packets:630 errors:0 dropped:0 overruns:0 frame:164
TX packets:713 errors:738 dropped:0 overruns:0 carrier:0
Kollisionen:0 Sendewarteschlangenlänge:1000
RX bytes:462688 (462.6 KB) TX bytes:185222 (185.2 KB)
Interrupt:17
lo Link encap:Lokale Schleife
inet Adresse:127.0.0.1 Maske:255.0.0.0
inet6-Adresse: ::1/128 Gültigkeitsbereich:Maschine
UP LOOPBACK RUNNING MTU:16436 Metrik:1
RX packets:3722 errors:0 dropped:0 overruns:0 frame:0
TX packets:3722 errors:0 dropped:0 overruns:0 carrier:0
Kollisionen:0 Sendewarteschlangenlänge:0
RX bytes:289989 (289.9 KB) TX bytes:289989 (289.9 KB)
auftisch@auftisch:~$ route -n
Kernel-IP-Routentabelle
Ziel Router Genmask Flags Metric Ref Use Iface
10.8.97.0 0.0.0.0 255.255.255.0 U 1 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 1000 0 0 eth0
0.0.0.0 10.8.97.2 0.0.0.0 UG 0 0 0 eth0
auftisch@auftisch:~$ iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
eth1 IEEE 802.11 Access Point: Not-Associated
Link Quality:5 Signal level:0 Noise level:163
Rx invalid nwid:0 invalid crypt:0 invalid misc:0
auftisch@auftisch:~$ iwlist chan
lo no frequency information.
eth0 no frequency information.
eth1 no frequency information.
auftisch@auftisch:~$ sudo iwlist scan
[sudo] password for daniel:
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
eth1 Failed to read scan data : Invalid argument
auftisch@auftisch:~$ rfkill list
3: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
auftisch@auftisch:~$ lsmod
Module Size Used by
usblp 10651 0
nls_utf8 1069 1
udf 79366 1
crc_itu_t 1383 1 udf
nls_iso8859_1 3261 0
nls_cp437 4931 0
vfat 9201 0
fat 48240 1 vfat
usb_storage 40172 0
binfmt_misc 6599 1
rfcomm 33811 6
sco 7998 2
bnep 9542 2
l2cap 37008 16 rfcomm,bnep
parport_pc 26058 0
ppdev 5556 0
joydev 8735 0
snd_hda_codec_atihdmi 2411 1
snd_hda_codec_realtek 217971 1
snd_hda_intel 22107 2
snd_hda_codec 87552 3 snd_hda_codec_atihdmi,snd_hda_codec_realtek,snd_hda_intel
lib80211_crypt_tkip 7736 0
snd_hwdep 5040 1 snd_hda_codec
snd_pcm 71475 2 snd_hda_intel,snd_hda_codec
wl 1959533 0
snd_seq_midi 4588 0
snd_rawmidi 17783 1 snd_seq_midi
snd_seq_midi_event 6047 1 snd_seq_midi
snd_seq 47174 2 snd_seq_midi,snd_seq_midi_event
snd_timer 19067 2 snd_pcm,snd_seq
xts 2043 0
btusb 10969 2
gf128mul 8059 1 xts
snd_seq_device 5744 3 snd_seq_midi,snd_rawmidi,snd_seq
snd 49006 13 snd_hda_codec_realtek,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_pcm,snd_rawmidi,snd_seq,snd_timer,snd_seq_device
bluetooth 50500 9 rfcomm,sco,bnep,l2cap,btusb
soundcore 880 1 snd
uvcvideo 55847 0
snd_page_alloc 7120 2 snd_hda_intel,snd_pcm
lib80211 5058 2 lib80211_crypt_tkip,wl
videodev 43098 1 uvcvideo
v4l1_compat 13359 2 uvcvideo,videodev
lp 7342 0
psmouse 59033 0
serio_raw 4022 0
parport 31492 3 parport_pc,ppdev,lp
sha256_generic 11267 2
aes_i586 7280 2
aes_generic 26875 1 aes_i586
dm_crypt 11385 1
radeon 827837 4
usbhid 36882 0
ttm 56633 1 radeon
drm_kms_helper 30168 1 radeon
hid 67742 1 usbhid
r8169 36489 0
drm 168054 6 radeon,ttm,drm_kms_helper
intel_agp 26424 0
ahci 19013 0
mii 4425 1 r8169
libahci 21667 6 ahci
video 18712 0
agpgart 32011 3 ttm,intel_agp,drm
i2c_algo_bit 5168 1 radeon
output 1883 1 video
auftisch@auftisch:~$ mesg | egrep 'net|eth|sky|sis|via|3c3|3c5|e100|8139|8169|acx|air|ath|ar91|atme|at7|herm|iwl|ipw|rtl8|r81|rt2|rt6|rt7|tg3|ssb|wl|b43|b44|ori|pri|p5|zd|ndis'
auftisch@auftisch:~$ cat /var/lib/NetworkManager/NetworkManager.state
[main]
NetworkingEnabled=true
WirelessEnabled=true
WWANEnabled=true
auftisch@auftisch:~$ cat /etc/NetworkManager/nm-system-settings.conf
# This file is installed into /etc/NetworkManager, and is loaded by
# NetworkManager by default. To override, specify: '--config file'
# during NM startup. This can be done by appending to DAEMON_OPTS in
# the file:
#
# /etc/default/NetworkManager
#
[main]
plugins=ifupdown,keyfile
[ifupdown]
managed=false
|
elektronenblitz63
Anmeldungsdatum: 16. Januar 2007
Beiträge: 29307
Wohnort: NRW
|
Hallo, Mit dem network-manager hat die Verbindung funktioniert, jedoch will ich mein Netz verstecken und dieses automatisch verbinden.
das ist sicherheitstechnischer Unsinn. Die manuelle Verbindung zum Router wird vollständig hergestellt. Verschlüsselungseinstellungen und Kennwort sind ok, anscheinend wurde der Network-Manager nicht vollständig deinstalliert. Es finden mehrere Zugriffe auf die Schnittstelle statt und blockieren die Verbindung. Was zeigt denn
ps aux | egrep 'Network|wpa'
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Ich habe das einmal mit deinstalliertem network-manager probiert, da gings auch nicht. Zwischenzeitlich wieder installiert, und jetzt wieder deinstalliert. Es klappt immer noch nicht. wicd kann doch nicht dazwischenfunken, oder? ps aux | egrep 'Network|wpa'
auftisch 2717 0.0 0.0 5160 760 pts/0 S+ 00:17 0:00 egrep --color=auto Network|wpa
Sicherheitstechnisch: Nur ein kleiner Gewinn, und natürlich gar nichts im Vergleich zur Verschlüsselung. Außerdem mehr Privatsphäre - keiner brauch wissen, dass ich ein WLAN benutze.
|
mickydoutza
Anmeldungsdatum: 31. Dezember 2010
Beiträge: 2185
|
auftisch schrieb: ... - keiner brauch wissen, dass ich ein WLAN benutze.
Wie versteckst Du dein WLAN? Ich wollte das mal auch, nur zum Testen, probieren. Es gelingt mit aber nicht. Was ich verstecken kann, das ist nur der Name des WLAN-Funknetzes (d. h. die SSID). Die MAC-Adresse des Routers im WLAN, ist trotzdem beim Scannen weiter sichtbar.
|
elektronenblitz63
Anmeldungsdatum: 16. Januar 2007
Beiträge: 29307
Wohnort: NRW
|
Hier sollte die Ausgabe eigentlich stehenbleiben. Mir ist nicht klar warum der Supplicant dann fortfährt:
...
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=26
EAPOL: startWhen --> 0
EAPOL: disable timer tick # ab hier sollte nichts weiter passieren
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
...
Grundsätzlich ist also kein Fehler in der Konfiguration. Entferne testweise mal die Konfiguration für die Uni aus der Konfigurationsdatei.
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
@mickydoutza
Ja, das "Verstecken" ist nur das Deaktivieren des aktiven SSID-Broadastings, bei mir auch. Gefunden werden kann das Netz immer noch. Ich habe jetzt die uni-Konfiguration entfernt, und es hat sich nichts geändert. Ich verstehe gar nicht, was das Problem ist, wenn er sagt: Already associated. Die folgende Ausgabe hat aber ziemlich lange gedauert, bestimmt 20 Minuten. Das ist jetzt der Ausschnitt, der noch im Terminal war: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:04:0e:39:f7:0a [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
Removed BSSID 00:04:0e:39:f7:0a from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:39:f7:0a completed (reauth) [id=0 id_str=home]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='LV' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:04:0e:39:f7:0a ssid='LV'
Already associated with the selected AP.
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:04:0e:39:f7:0a into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=25
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RX EAPOL from 00:04:0e:39:f7:0a
Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:04:00:00:f7:0a
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:04:0e:39:f7:0a
No keys have been configured - skip key clearing
Associated with 00:04:0e:39:f7:0a
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Process pending EAPOL frame that was received just before association notification
RX EAPOL from 00:04:0e:39:f7:0a
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 86
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 6c 3b af 40 1e 3b 14 2d 44 0b f5 85 d6 c7 41 50 19 e3 17 29 2c 5f 0d da 16 8e 8f d1 ba f8 7a 50
WPA: PTK derivation - A1=00:26:82:20:35:ad A2=00:04:0e:39:f7:0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
RX EAPOL from 00:04:0e:39:f7:0a
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 86
key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e2 f8 f3 25 23 78 db 7a 2f 84 03 d9 f9 1c 2d 65
RSN: encrypted key data - hexdump(len=56): 89 95 d0 de 85 81 86 91 13 a7 44 58 00 dd 49 99 34 47 b3 e5 56 f1 84 25 7d 68 1c 86 85 65 80 ea ff 6c c3 6c 82 70 f8 20 7e e9 3a 57 00 05 65 4e 17 9e d3 24 d0 29 e7 6b
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 b9 01 2b 4f 0a 7d f9 29 d5 90 1a d7 10 ea 9a 29 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:04:0e:39:f7:0a [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
Removed BSSID 00:04:0e:39:f7:0a from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:39:f7:0a completed (reauth) [id=0 id_str=home]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='LV' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:04:0e:39:f7:0a ssid='LV'
Already associated with the selected AP.
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:04:0e:39:f7:0a into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=25
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:04:00:00:f7:0a
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:04:0e:39:f7:0a
No keys have been configured - skip key clearing
Associated with 00:04:0e:39:f7:0a
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:04:0e:39:f7:0a
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 88
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 0e 89 67 60 8c 04 66 77 c7 b6 d5 f9 49 46 b3 2f d7 84 d8 74 8d ad dd a6 fc 50 d0 ba 2e 22 1c e3
WPA: PTK derivation - A1=00:26:82:20:35:ad A2=00:04:0e:39:f7:0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:04:0e:39:f7:0a
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 88
key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): cd e8 be 31 32 69 e8 4e 2b 41 4f de 9f d1 7f 77
RSN: encrypted key data - hexdump(len=56): 32 15 d9 f3 7a 03 b6 38 60 6c e3 c4 27 96 9d eb 3a fd 16 b7 13 be 82 21 14 43 2e 09 88 ad 46 f6 8e dc 91 27 3f e6 21 12 90 e2 d0 1b 09 e9 7b bc 88 2d 76 53 f0 94 ef 2c
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 1c 93 5d 3d 8c d8 45 a1 b5 5d 9c 34 86 ae 78 69 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:04:0e:39:f7:0a [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
Removed BSSID 00:04:0e:39:f7:0a from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:39:f7:0a completed (reauth) [id=0 id_str=home]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='LV' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:04:0e:39:f7:0a ssid='LV'
Already associated with the selected AP.
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:04:0e:39:f7:0a into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=25
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:04:00:00:f7:0a
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:04:0e:39:f7:0a
No keys have been configured - skip key clearing
Associated with 00:04:0e:39:f7:0a
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:04:0e:39:f7:0a
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 8a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 2e a9 1d cb 7c 35 af 33 c1 43 10 a5 8b bd a2 97 d6 a8 b5 e1 3f 78 e4 f0 d6 70 b0 89 f9 a1 8c e9
WPA: PTK derivation - A1=00:26:82:20:35:ad A2=00:04:0e:39:f7:0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:04:0e:39:f7:0a
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 38 39 13 a0 66 75 8a 08 16 89 ae 04 d4 03 37 a9 de f5 1b f8 72 4a b8 6e 0f 94 39 13 1e 79 51 8a
key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4a a3 e0 d4 37 5e d2 3a 95 90 1f 12 ec 8a 18 90
RSN: encrypted key data - hexdump(len=56): 9d e3 fc cb f8 15 3f 46 7c b0 c1 6c d1 d8 1f c6 40 b2 68 ea 5d 19 a1 ee 95 3b b8 30 56 b0 48 ff 50 bc 6e 87 95 ef ba 41 05 bc 66 9b cd 58 84 78 0c 68 1b 1f 5c 4f 2a 0a
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:04:0e:39:f7:0a (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 fb 39 37 7d 2b 29 c3 36 26 e3 2f 79 af 70 e8 d1 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:04:0e:39:f7:0a [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
Removed BSSID 00:04:0e:39:f7:0a from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:39:f7:0a completed (reauth) [id=0 id_str=home]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c03 len=20
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='LV' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:04:0e:39:f7:0a ssid='LV'
Already associated with the selected AP.
|
elektronenblitz63
Anmeldungsdatum: 16. Januar 2007
Beiträge: 29307
Wohnort: NRW
|
Dann entferne noch die statische Konfiguration für die Schnittstelle, oder starte direkt mal mit
sudo wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf -B
Die Authentifizierung ist ja ok.
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Habs ausprobiert. Ich bekomme auch eine IP-Adresse zugewiesen, wenn ich dhclient ausführe, nachdem ich den DHCP Server des WLAN-Routers aktiviert habe. Allerdings keine Internetverbindung. auftisch@auftisch:~$ sudo wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf -B
[sudo] password for daniel:
auftisch@auftisch:~$ sudo dhclient eth1
Internet Systems Consortium DHCP Client V3.1.3
Copyright 2004-2009 Internet Systems Consortium.
All rights reserved.
For info, please visit https://www.isc.org/software/dhcp/
Listening on LPF/eth1/00:26:82:20:35:ad
Sending on LPF/eth1/00:26:82:20:35:ad
Sending on Socket/fallback
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 3
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 6
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 10
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 13
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 20
DHCPOFFER of 10.8.97.20 from 10.8.97.10
DHCPREQUEST of 10.8.97.20 on eth1 to 255.255.255.255 port 67
DHCPACK of 10.8.97.20 from 10.8.97.10
bound to 10.8.97.20 -- renewal in 425776 seconds.
auftisch@auftisch:~$ sudo wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf -d
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
update_config=1
Priority group 0
id=0 ssid='LV'
Initializing interface (2) 'eth1'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:26:82:20:35:ad
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 04 96 45 b8 3f 73 58 4c b8 df e6 0f 01 ca 14 d4
WPS: Build Beacon and Probe Response IEs
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Response Type (2)
WPS: * UUID-E
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * Config Methods (0)
WPS: * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
ctrl_interface_group=112 (from group name 'netdev')
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists and seems to be in use - cannot override it
Delete '/var/run/wpa_supplicant/eth1' manually if it is not used anymore
Failed to initialize control interface 'DIR=/var/run/wpa_supplicant GROUP=netdev'.
You may have another wpa_supplicant process already running or the file was
left by an unclean termination of wpa_supplicant in which case you will need
to manually remove this file before starting wpa_supplicant again.
Failed to add interface eth1
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
auftisch@auftisch:~$ sudo rm /var/run/wpa_supplicant/eth1rm: Entfernen von „/var/run/wpa_supplicant/eth1“ nicht möglich: No such file or directory
auftisch@auftisch:~$ sudo wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf -d
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
update_config=1
Priority group 0
id=0 ssid='LV'
Initializing interface (2) 'eth1'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:26:82:20:35:ad
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 04 96 45 b8 3f 73 58 4c b8 df e6 0f 01 ca 14 d4
WPS: Build Beacon and Probe Response IEs
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Response Type (2)
WPS: * UUID-E
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * Config Methods (0)
WPS: * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=112 (from group name 'netdev')
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=40
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Trying to get current scan results first without requesting a new scan to speed up initial association
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=29
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=40
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=40
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
l2_packet_receive - recvfrom: Network is down
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b1a len=10
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b04 len=12
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=2):
4c 56 LV
Scan requested (ret=0) - scan timeout 5 seconds
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Invalid argument
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Scan timeout - try to get results
Received 196 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:04:0e:39:f7:0a ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
l2_packet_receive - recvfrom: Network is down
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX ctrl_iface - hexdump_ascii(len=9):
54 45 52 4d 49 4e 41 54 45 TERMINATE
Removing interface eth1
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
auftisch@auftisch:~$
|
elektronenblitz63
Anmeldungsdatum: 16. Januar 2007
Beiträge: 29307
Wohnort: NRW
|
Routingtabelle mit zugewiesener IP-Adresse?
route -n
Ping auf die Router-IP geht?
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Ping geht, auf beide Router. Ich habe einen WLAN-Router an einen normalen Router angeschlossen, der die Internetverbindung aufbaut, weil am WLAN-Router nicht genug Buchsen für die anderen Computer sind. Ich habe es aber auch schon mit nur dem WLAN-Router ausprobiert, als der direkt die DSL-Verbindung aufgebaut hat.
Die Routingtabelle sieht irgendwie aufgesplittet aus:
route -n
Kernel-IP-Routentabelle
Ziel Router Genmask Flags Metric Ref Use Iface
10.8.97.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
0.0.0.0 10.8.97.10 0.0.0.0 UG 0 0 0 eth1 edit: Ich sehe gerade, da ist meine IP 10.8.97.20 gar nicht bei. Darf das sein?
|
elektronenblitz63
Anmeldungsdatum: 16. Januar 2007
Beiträge: 29307
Wohnort: NRW
|
Die Routingtabelle ist so grundsätzlich ok
Ziel Router Genmask Flags Metric Ref Use Iface
10.8.97.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 # das Netzwerk
0.0.0.0 10.8.97.10 0.0.0.0 UG 0 0 0 eth1 # das Gateway im Netzwerk, sollte der Router ohne WLAN sein
Ist jetzt die Frage wer ist der DNS/NAT in der Kombination. Ich habe einen WLAN-Router an einen normalen Router angeschlossen ...
Der Normale Router sollte die Steuerung des Netzwerks übernehmen (NAT, Firewall, DHCP usw.) Adresse z.B. 10.8.97.1, beim WLAN-Router muss alles deaktiviert sein und dieser bekommt dann die fixe Adresse 10.8.97.2 und leitet alles nur an 10.8.97.1 weiter.
|
auftisch
(Themenstarter)
Anmeldungsdatum: 1. August 2007
Beiträge: 144
|
Ich habe zuerst beim Hauptrouter DHCP aktiviert, dabei habe ich keine Adresse zugewiesen bekommen. dhclient hatte Probleme, es hat keinen DHCP-Server gefunden. Dabei war der DHCP-Server des WLAN-Routers deaktiviert. Dann habe ich es andersherum gemacht, d.h. vom WLAN-Router bekomme ich eine Adresse zugewiesen.
Gateway und DNS-Server war immer der Hauptrouter.
10.8.97.10 ist bei mir der WLAN-Router!
Ich habe aber entsprechende Routingtabellen in den Routern angelegt, die alles zum WLAN-Router weiterleiten sollen.
|