LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices

Reply
 
LinkBack Search this Thread
Old 12-28-2007, 12:46 PM   #1
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Rep: Reputation: 15
Set up wireless in Slackware 12


Hi I just rebuilt my kernel in slackware 12.

I'm trying to get my wireless to work but having trouble. it's worked before and i have the ipw2100 installed as a module and the firmware in the /lib/firmware. Seems wpa_supplicant is saying driver failed. any ideas?


root@gobo:/etc/rc.d# wpa_supplicant -Dwext -ieth1 -c/etc/wpa_supplicant.conf
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Associated with 00:0f:66:e3:64:fe
ioctl[SIOCSIWENCODEEXT]: Invalid argument
WPA: Failed to set PTK to the driver.
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Associated with 00:0f:66:e3:64:fe
ioctl[SIOCSIWENCODEEXT]: Invalid argument
WPA: Failed to set PTK to the driver.
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Associated with 00:0f:66:e3:64:fe
ioctl[SIOCSIWENCODEEXT]: Invalid argument
WPA: Failed to set PTK to the driver.
CTRL-EVENT-TERMINATING - signal 2 received
ioctl[SIOCSIWAP]: Device or resource busy


root@gobo:/etc/rc.d# lsmod
Module Size Used by
pcmcia 31380 0
pcmcia_core 33428 1 pcmcia
parport_pc 32548 0
parport 33736 1 parport_pc
ipw2100 115812 0
ieee80211 30408 1 ipw2100
ieee80211_crypt 8320 1 ieee80211
e1000 110400 0
 
Old 12-28-2007, 08:58 PM   #2
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
Should I try, taking off the password on my router and connecting without the wpa_supplicant. I mean if i can get that, at least the wireless is working, just the wpa is messed up.
 
Old 12-29-2007, 01:55 AM   #3
Alien_Hominid
Senior Member
 
Registered: Oct 2005
Location: Lithuania
Distribution: Hybrid
Posts: 2,247

Rep: Reputation: 53
Of course, just try. Why do you ask if you can try... when you can. BTW, what's the kernel version? Is it the same you had previously or did you upgrade to newer one?
 
Old 12-29-2007, 11:19 AM   #4
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
I'm using 2.6.21.5, before i was using the 2.6.21.5-smp that came pre-installed. and actually i just tried connecting to my router without WPA and it works. I think the problem is with the wpa_supplicant i must be missing something.

I'm guessing it's something to do with the driver because wpa_supplicant says:
"Association request to the driver failed"

but im still new that whole thing any clue?

Here's a more verbose look at what's going on:

Code:
root@gobo:/etc# wpa_supplicant -Dwext -ieth1 -dd -c/etc/wpa_supplicant.conf
Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0' (DEPRECATED)
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 17 - start of a new network block
scan_ssid=0 (0x0)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
ssid - hexdump_ascii(len=3):
     62 6f 62                                          bob             
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='bob'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0c:f1:34:3f:b5
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=0
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1022 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 2218 bytes of scan results (9 BSSes)
Scan results: 9
Selecting BSS from priority group 0
0: 00:0f:66:e3:64:fe ssid='bob' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b1a len=11
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:e3:64:fe
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:0f:66:e3:64:fe
No keys have been configured - skip key clearing
Associated with 00:0f:66:e3:64:fe
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0f:66:e3:64:fe
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:e3:64:fe (ver=2)
WPA: Renewed SNonce - hexdump(len=32): 96 24 bf e0 f4 68 9a 83 36 51 19 aa ea f2 7e c2 ca 3e 2a 08 fa df c9 36 8d 29 cd 7b 40 09 9f 23
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 96 24 bf e0 f4 68 9a 83 36 51 19 aa ea f2 7e c2 ca 3e 2a 08 fa df c9 36 8d 29 cd 7b 40 09 9f 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 37 32 83 c5 81 6c e5 48 3d db 7c 03 cc 18 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:e3:64:fe
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 ca 00 10 00 00 00 00 00 00 00 02 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 41 ba eb 70 ba 9f a4 29 89 cc ad 4a f1 23 06 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=16 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 12 41 ba eb 70 ba 9f a4 29 89 cc ad 4a f1 23 06
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 ca 00 10 00 00 00 00 00 00 00 02 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 41 ba eb 70 ba 9f a4 29 89 cc ad 4a f1 23 06 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:e3:64:fe (ver=2)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 48 7d 8a d9 51 93 55 1e 2d 9f 37 f8 45 f7 09 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
WPA: Failed to set PTK to the driver.
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0f:66:e3:64:fe into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 1958 bytes of scan results (8 BSSes)
Scan results: 8
Selecting BSS from priority group 0
0: 00:0f:66:e3:64:fe ssid='bob' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b1a len=11
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:e3:64:fe
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:0f:66:e3:64:fe
No keys have been configured - skip key clearing
Associated with 00:0f:66:e3:64:fe
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0f:66:e3:64:fe
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:e3:64:fe (ver=2)
WPA: Renewed SNonce - hexdump(len=32): 44 b0 52 57 34 4c 94 9c db 4a f6 c9 ea 26 38 3a b7 1c 4b 3d 80 b2 ef 6d 05 3b ff 79 72 b7 ee 6c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 44 b0 52 57 34 4c 94 9c db 4a f6 c9 ea 26 38 3a b7 1c 4b 3d 80 b2 ef 6d 05 3b ff 79 72 b7 ee 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 14 e4 ae a5 38 d5 2c c5 c4 58 71 11 c9 ba 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:e3:64:fe
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 ca 00 10 00 00 00 00 00 00 00 02 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab bf fd 58 a0 00 b1 61 dd d3 cc 36 03 01 31 1a 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=16 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): ab bf fd 58 a0 00 b1 61 dd d3 cc 36 03 01 31 1a
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 ca 00 10 00 00 00 00 00 00 00 02 b6 c7 c2 80 04 0a e6 e8 ba 29 fc 7c 89 f5 34 79 02 18 a7 4e 75 98 73 97 6e f0 d8 35 f8 45 91 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab bf fd 58 a0 00 b1 61 dd d3 cc 36 03 01 31 1a 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:e3:64:fe (ver=2)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d3 c1 45 88 c8 ff ad 10 fd 2f 8e bb dc 9a ab 3b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
WPA: Failed to set PTK to the driver.
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
BSSID 00:0f:66:e3:64:fe blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 1799 bytes of scan results (7 BSSes)
Scan results: 7
Selecting BSS from priority group 0
0: 00:0f:66:e3:64:fe ssid='bob' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   skip - blacklisted
1: 00:11:24:60:e4:a1 ssid='Big Kermit' wpa_ie_len=26 rsn_ie_len=26 caps=0x11
   skip - SSID mismatch
2: 00:19:e3:33:c3:bd ssid='Big Kermit' wpa_ie_len=24 rsn_ie_len=26 caps=0x11
   skip - SSID mismatch
3: 00:19:7e:84:a6:c2 ssid='PS3-7775395' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
4: 00:0d:88:bb:13:0d ssid='gumboyaya_SafeACv' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
5: 00:13:a3:5f:83:74 ssid='Bogie85' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
6: 00:17:3f:ec:30:17 ssid='Belkin_G_Plus_MIMO_785000' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 00:0f:66:e3:64:fe from blacklist (clear)
Selecting BSS from priority group 0
0: 00:0f:66:e3:64:fe ssid='bob' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:0f:66:e3:64:fe (SSID='bob' freq=2422 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b1a len=11
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:e3:64:fe
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:0f:66:e3:64:fe
No keys have been configured - skip key clearing
Associated with 00:0f:66:e3:64:fe
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0f:66:e3:64:fe

Last edited by spids; 12-29-2007 at 11:43 AM.
 
Old 12-29-2007, 12:17 PM   #5
duhwhat123
LQ Newbie
 
Registered: Dec 2007
Posts: 16

Rep: Reputation: 0
there are at least 3 places so far that i've identified where you can enter wireless information: rc.inet1.conf, rc.wireless.conf, and wpa_supplicant.conf. do any of these files conflict with each other? can anyone make a guide to getting wpa working out of the box?
 
Old 12-29-2007, 12:36 PM   #6
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
Here are my config files, everything else should be default.

rc.inet1.conf ( for eth1 )

Code:
# Config information for eth1:  
IFNAME[1]="eth1"
IPADDR[1]=""
NETMASK[1]=""
USE_DHCP[1]="yes"
DHCP_HOSTNAME[1]=""
WLAN_WPACONF[1]="/etc/wpa_supplicant.conf"
WLAN_ESSID[1]="bob"
WLAN_WPA[1]="wpa_supplicant"
WLAN_WPADRIVER[1]="wext"
wpa_supplicant.conf

Code:
root@gobo:/etc# cat wpa_supplicant.conf
# See /usr/doc/wpa_supplicant-0.5.7/wpa_supplicant.conf.sample
# for many more options that you can use in this file.

# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)
ctrl_interface=/var/run/wpa_supplicant
# By default, only root (group 0) may use wpa_cli
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1


# Plaintext connection (no WPA, no IEEE 802.1X),
# nice for hotel/airport types of WiFi network.
# You'll need a recent version of wireless-tools for this!
network={
  scan_ssid=0
  proto=WPA
  key_mgmt=WPA-PSK
  pairwise=CCMP
  group=CCMP
  ssid="bob"
  psk=b91d7ef9665cafab559e60e1f102454e70c66ca79769940fb9179bda6c23c9d6

}
 
Old 12-29-2007, 01:15 PM   #7
Alien_Hominid
Senior Member
 
Registered: Oct 2005
Location: Lithuania
Distribution: Hybrid
Posts: 2,247

Rep: Reputation: 53
Check there:
http://alien.slackbook.org/dokuwiki/..._configuration
 
Old 12-29-2007, 01:40 PM   #8
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
thats a good link, i've used it in the past. Only thing is that i had WPA working with the old kernel. using the same config, im guessing i've forgot to include a module just can't figure out which one and if you look at the wpa_supplicant messages "WPA: Failed to set PTK to the driver." looks like theres some sort of driver issue. does WPA rely on additional drivers that i might not have added to the kernel?
 
Old 12-31-2007, 06:24 PM   #9
zzzy
LQ Newbie
 
Registered: Jun 2006
Distribution: slackware, darwin
Posts: 5
Blog Entries: 1

Rep: Reputation: 0
I would try building the wpa_supplicant package from scratch using Alien's wpa_supplicant Slackbuild. Assuming you have the kernel sources pkgs installed, this should produce a workable slackware package and binary that are consistent with all your libs. Any compile error should point to the actual source of trouble on your system (i.e., any missing libraries).

All you need to do is download the content of the above web directory in a temporary work directory, then
Code:
chmod 755 wpa_supplicant.SlackBuild
and execute it. Detailed instructions are available in Alien's Slackbuild Readme

Hope this helps, please post back the result.
 
Old 01-01-2008, 08:46 AM   #10
duhwhat123
LQ Newbie
 
Registered: Dec 2007
Posts: 16

Rep: Reputation: 0
you compiled a new kernel?

recompile and reinstall your drivers whenever you recompile the kernel.
 
Old 01-01-2008, 01:27 PM   #11
Alien Bob
Slackware Contributor
 
Registered: Sep 2005
Location: Eindhoven, The Netherlands
Distribution: Slackware
Posts: 5,116

Rep: Reputation: Disabled
Quote:
Originally Posted by duhwhat123 View Post
you compiled a new kernel?

recompile and reinstall your drivers whenever you recompile the kernel.
I wonder if you even attempted to read and understand the previous posts in this thread.

Eric
 
Old 01-02-2008, 01:33 AM   #12
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
Quote:
Originally Posted by duhwhat123 View Post
you compiled a new kernel?

recompile and reinstall your drivers whenever you recompile the kernel.
Sounds good, honestly I'm a little new to making my own kernel.

So far I've:

1) ran "make menuconfig" selected what i want
2) ran "make clean"
3) ran "make bzImage"
4) ran "make modules"
5) ran "make modules_install"
6) copied all that over and ran lilo


but im a little fuzzy on the "recompile and reinstall your drivers" but that's prob what im missing how do i recompile the drivers for the wireless?

Last edited by spids; 01-02-2008 at 01:36 AM.
 
Old 01-02-2008, 05:23 AM   #13
samwise17
Member
 
Registered: Jul 2007
Location: Sydney
Distribution: Arch,Slackware,Puppy
Posts: 87

Rep: Reputation: 15
Did you compile ipw2100 from source with make? It compiles against the current kernel source. So if you changed your kernel, you will need to recompile and reinstall the ipw2100 module seperately, while running the new kernel.

You have to do the same thing with any module that isn't in the linux-2.6.xx.x directory, e.g. I have to recompile ipw3945 and kqemu. (When I forgot to do that last time i upgraded my kernel, the kernel actually panicked when it tried to load the old ipw3945 module)
 
Old 01-02-2008, 11:51 AM   #14
spids
LQ Newbie
 
Registered: Mar 2003
Distribution: Slackware 12.0
Posts: 24

Original Poster
Rep: Reputation: 15
Quote:
Originally Posted by samwise17 View Post
Did you compile ipw2100 from source with make? It compiles against the current kernel source. So if you changed your kernel, you will need to recompile and reinstall the ipw2100 module seperately, while running the new kernel.

You have to do the same thing with any module that isn't in the linux-2.6.xx.x directory, e.g. I have to recompile ipw3945 and kqemu. (When I forgot to do that last time i upgraded my kernel, the kernel actually panicked when it tried to load the old ipw3945 module)
the ipw2100, wasn't from source i just selected it as a module before i compiled. but i did a "make modules" and a "make modules_install"

also i downloaded and installed the wpa_supplicant from the link above. but it's still saying it has issues with the driver.

is there any logs that i could grab that might help?
 
Old 01-02-2008, 08:52 PM   #15
zzzy
LQ Newbie
 
Registered: Jun 2006
Distribution: slackware, darwin
Posts: 5
Blog Entries: 1

Rep: Reputation: 0
Spids, looking closer at your verbose logs, the driver selectively understands only parts of the communication from wpa_supplicant while failing to interpret others. Could module recompilation have (partly somehow) failed? With the risk of causing a kernel panic, does the original ipw2100 packaged module for 2.6.21.5 work with your compiled kernel? (i.e., try it with modprobe after rmmod-ing the newly-compiled one) Any chance that the firmware got corrupted? Just thinking out loud while not being an expert...
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off
Trackbacks are Off
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Startup Errors with wireless networking Error for wireless request "Set Encode" Cryptoniks Linux - Wireless Networking 1 03-21-2006 07:06 AM
Set the path systemwide/Set the path for a user with Slackware jayhel Slackware 1 06-12-2005 12:24 AM
I would like to set up a linksys WUSB54G USB wireless adaptor on Slackware 10.0 insainiac Linux - Wireless Networking 2 10-25-2004 03:38 AM


All times are GMT -5. The time now is 02:47 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration