LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General > LinuxQuestions.org Member Success Stories
User Name
Password
LinuxQuestions.org Member Success Stories Just spent four hours configuring your favorite program? Just figured out a Linux problem that has been stumping you for months?
Post your Linux Success Stories here.

Notices


Reply
  Search this Thread
Old 08-17-2004, 03:14 PM   #1
Tarry
Member
 
Registered: Aug 2004
Posts: 33

Rep: Reputation: 15
Belkin wireless card F5D7010 WPA-PSK TKIP Works!!!!!!


OS: Fedora Core 2
Wireless Card: Belkin 54M
Router : Belkin
Wrapper: ndiswrapper
WPA: wpa Supplicant

BTW : Correction it aint PSA it is PSK(Pre Shared Key)


What I did....................



STEP 1: Install ndiswrapper 0.9

Follow instructions .....

/*****

Did you read the INSTALL files?

Install file follows:

* Quickstart guide *

====================



Prerequisites

-------------

* You need a recent kernel (at least 2.6.0 or 2.4.20) with source.

* Make sure there is a link to the source from the modules directory:

'/lib/modules/<VERSION>/build' should be a link to the kernel

source, where <VERSION> is the version of the kernel you are running.

* Some vendors ship ndiswrapper in their distributions. Either use

it or make sure you remove it before installing ndiswrapper by

yourself.



Upgrading

=========



If you are upgrading from version 0.4 or earlier make sure you delete any

old version of loadndisdriver and any configuration in modules.conf and

modprobe.conf since the new commands are not compatible with this release.



Installation

============



1. Compile and install

----------------------

As root run



> make install



This should compile both the kernel module and the userspace utilities.



2. Install your windows driver

------------------------------

Download the Windows XP drivers, unpack it and locate the .inf for your card.

Run ndiswrapper -i to install the driver



> ndiswrapper -i </path/to/inffile.inf>



This copies all necessary files to /etc/ndiswrapper and creates the config

files for your card.



After installing you can run



> ndiswrapper -l



to see the status of your installed drivers. If you have installed the correct

driver you should see something like this:



Installed ndis drivers:

bcmwl5 present



Where "present" means that you have a PCI-device present that can be used with the

driver bcmwl5.



3. Load module

--------------

To load the module type



> modprobe ndiswrapper.



If you get no error the driver should now be loaded and active. You can verify

this by checking system log (produced by 'dmesg'). If the driver is loaded

successfully, you should see a message:



wlan0: ndiswrapper ethernet device xx:xx:xx:xx:xx:xx



4. Configure interface

----------------------

Use iwconfig to configure wireless network interface. First, locate

the wireless interface:



> iwconfig



This will print the wireless interface (e.g., wlan0). In

the examples below wlan0 is used; replace wlan0 with the interface

reported by iwconfig above.



Set the operating mode of the interface according to your setup. In

most cases, it is Managed:



> iwconfig wlan0 mode Managed



If you use encryption (WEP), set the key:



> iwconfig wlan0 key restricted XXXXXXXX



You can use 6 hex digits for 40-bit encryption or 10 hex digits for

128-bit encryption. You may need to use 'open' security mode instead

of 'restricted' depending on the setup of your AP (access point).



Set the network name:



> iwconfig wlan0 essid ESSID



Replace ESSID with the network name used by your AP.



Now, setup the network parameters for the interface wlan0. This varies

from distribution to distribution. Refer to your distribution's

documents on how to do this. Once this is done, you can use network

tools to bring up the network; e.g.,



> ifconfig wlan0 up



5. Automate

-----------

Once everything works fine you can write the correct modeprobe settings to

load ndiswrapper automatically by running



> ndiswrapper -m

******************/


STEP2 : Install WPA supplicant.........(if you are using WPA-PSK TKIP or other)

/****************
Follow simle instructions in the readme file of wpa_supplicant file

***/

STEP 3: Network configuration I left everythin on "Auto"
check out print screens--Gotta find a way to post/upload them

STEP 4: Edited the /etc/pcmcia/wireless.opts options

Was that necessary, dunno??? Will find out if I have to restart the machine
Idea is to make pcmcia do the scanning by spawning the process/wpa_supplicant.

STEP 5: wpa_supplicant file in my /etc/wpa_supplicant.conf looks like this as I have a
WPA-PSK TKIP encryption.

Voila, all this I am writing on my fedora core 2 box and posting on the website....





Contents of my /etc/pcmcia/wireless.opts file..that I added.

MODE="Managed"
WPA="y"
case "$ADDRESS" in

# NOTE : Remove the following four lines to activate the samples below ...

if [ "$WPA" = "y" -a -x /usr/local/bin/wpa_supplicant ]; then
/usr/local/bin/wpa_supplicant -Bw -c/etc/wpa_supplicant.conf \
-i$DEVICE
fi

if [ "$WPA" = "y" -a -x /usr/local/bin/wpa_supplicant ]; then
killall wpa_supplicant
fi




Contents of my wpa_suplicant.conf

/*****************************************************

##### Example wpa_supplicant configuration file ###############################
# Empty lines and lines starting with # are ignored

# NOTE! This file may contain password information and should probably be made
# readable only by root user on multiuser systems.

# global configuration (shared by all network blocks)
#
# Interface for separate control program. If this is specified, wpa_supplicant
# will create this directory and a UNIX domain socket for listening to requests
# from external programs (CLI/GUI, etc.) for status information and
# configuration. The socket file will be named based on the interface name, so
# multiple wpa_supplicant processes can be run at the same time if more than
# one interface is used.
# /var/run/wpa_supplicant is the recommended directory for sockets and by
# default, wpa_cli will use it when trying to connect with wpa_supplicant.
ctrl_interface=/var/run/wpa_supplicant

# Access control for the control interface can be configured by setting the
# directory to allow only members of a group to use sockets. This way, it is
# possible to run wpa_supplicant as root (since it needs to change network
# configuration and open raw sockets) and still allow GUI/CLI components to be
# run as non-root users. However, since the control interface can be used to
# change the network configuration, this access needs to be protected in many
# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you
# want to allow non-root users to use the contron interface, add a new group
# and change this value to match with that group. Add users that should have
# control interface access to this group.
#
# This variable can be a group name or gid.
#ctrl_interface_group=wheel
#ctrl_interface_group=0

# IEEE 802.1X/EAPOL version
# wpa_supplicant was implemented based on IEEE 802-1X-REV-d8 which defines
# EAPOL version 2. However, there are many APs that do not handle the new
# version number correctly (they seem to drop the frames completely). In order
# to make wpa_supplicant interoperate with these APs, the version number is set
# to 1 by default. This configuration value can be used to set it to the new
# version (2).
#eapol_version=1

# AP scanning/selection
# By default, wpa_supplicant requests driver to perform AP scanning and then
# uses the scan results to select a suitable AP. Another alternative is to
# allow the driver to take care of AP scanning and selection and use
# wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
# information from the driver.
# 1: wpa_supplicant initiates scanning and AP selection
# 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
# parameters (e.g., WPA IE generation); this mode can also be used with
# non-WPA drivers when using IEEE 802.1X mode
ap_scan=1

network={
ssid="belkin54g"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
psk="my secure phrase"
priority=2
}

*************************************************************************************/


Commands on the console.........

First this.....

/**********************

[root@localhost root]# wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplican t.conf -dd
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Line: 55 - start of a new network block
SSID - hexdump_ascii(len=9):
62 65 6c 6b 69 6e 35 34 67 belkin54g
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
PSK (ASCII passphrase) - hexdump_ascii(len=16):
24 6f 72 61 5f 68 6f 6d 65 5f 75 33 76 56 56
priority=2
PSK (from passphrase) - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 02 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e
Priority group 2
id=0 ssid='belkin54g'
Using existing control interface directory.
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 618 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 2
0: 00:30:bd:fe:c7:9a ssid='belkin54g' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:30:bd:fe:c7:9a (SSID='belkin54g' freq=2462 MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8c02 len=201
Custom wireless event: 'ASSOCINFO(ReqIE9624304 86c32040c121860dd050010180100dd160050f20101000050f20201000050f20201000050f202 Re spIEdd050010180100)'
Association info event
req_ies - hexdump(len=58): 00 09 62 65 6c 6b 69 6e 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f 2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:30:bd:fe:c7:9a
Association event - clear replay counter
Associated to a new BSS: BSSID=00:30:bd:fe:c7:9a
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 7 3 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0 0 00 00 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 72 66 96 ad 3a 19 9a 82 55 31 10 42 8c 39 2a 4d 77 96 93 c7 87 64 b7 d4 f5 44 e8 bb d0 9b 15 d1
WPA: PMK - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 0 2 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e
WPA: PTK - hexdump(len=64): c6 a0 49 da f3 a6 4d 8d 1f 24 c4 92 e0 74 63 f4 94 4 3 1b 16 77 35 0f f2 d8 e0 2f 4a 8b dd c0 23 10 be d2 0b df f7 d9 ac 90 91 ed 4f 63 e4 e0 62 64 15 07 d3 c9 1c c6 a5 a9 8b dd de 20 61 df bc
WPA: EAPOL-Key MIC - hexdump(len=16): 11 67 ef e7 eb 77 48 23 7d 8f e9 d2 af 09 44 a4
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 72 66 96 ad 3a 19 9a 82 5 5 31 10 42 8c 39 2a 4d 77 96 93 c7 87 64 b7 d4 f5 44 e8 bb d0 9b 15 d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 67 ef e7 eb 77 48 23 7d 8f e9 d2 af 09 44 a4 00 18 dd 16 00 50 f2 01 0 1 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 bb 15 e4 f8 0e 62 e9 77 e3 bd a7 97 34 5b 0e 72 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 15 e4 f8 0e 62 e9 77 e3 bd a7 97 34 5b 0e 72 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Could not verify EAPOL-Key MIC - dropping packet
Authentication with 00:30:bd:fe:c7:9a timed out.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 618 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 2
0: 00:30:bd:fe:c7:9a ssid='belkin54g' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:30:bd:fe:c7:9a (SSID='belkin54g' freq=2462 MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8c02 len=201
Custom wireless event: 'ASSOCINFO(ReqIE9624304 86c32040c121860dd050010180100dd160050f20101000050f20201000050f20201000050f202 Re spIEdd050010180100)'
Association info event
req_ies - hexdump(len=58): 00 09 62 65 6c 6b 69 6e 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f 2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:30:bd:fe:c7:9a
Association event - clear replay counter
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 7 3 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0 0 00 00 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 04 83 cb eb b5 37 5a b7 88 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c
WPA: PMK - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 0 2 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e
WPA: PTK - hexdump(len=64): c6 5e 9d 3e da 38 fe d5 f6 95 d9 7d 05 73 05 15 40 8 e 5f 72 f0 a9 42 2a 5f ee 30 47 64 30 ca 55 11 5f 15 6b 61 4b f0 b2 a4 49 b3 11 80 9e c4 dc 49 16 3b b5 8a 2a e9 5f 60 c5 0d dc db 2e 32 a3
WPA: EAPOL-Key MIC - hexdump(len=16): 78 55 bc 63 3a c7 03 9f 60 a8 a0 8f 2a bf 86 53
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 04 83 cb eb b5 37 5a b7 8 8 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 55 bc 63 3a c7 03 9f 60 a8 a0 8f 2a bf 86 53 00 18 dd 16 00 50 f2 01 0 1 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 bf ab bc 18 ff 14 46 cc 69 aa 63 c3 48 3c 51 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 bf ab bc 18 ff 14 46 cc 69 aa 63 c3 48 3c 51 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1)
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 04 83 cb eb b5 37 5a b7 8 8 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 ec 34 74 9f b1 c3 20 1a 11 81 4a 88 85 ee 63 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 02 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ec 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 60 74 23 15 89 3d cd 85 23 c4 44 ad 07 d2 b8 dd 00 20 64 7f ca 2e 39 c7 b9 56 b3 df 23 d7 d5 39 13 73 f1 e4 dc ea 72 59 43 25 66 bb 2e b9 d3 f3 6b 8a
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 02 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ec 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 60 74 23 15 89 3d cd 85 23 c4 44 ad 07 d2 b8 dd 00 20 64 7f ca 2e 39 c7 b9 56 b3 df 23 d7 d5 39 13 73 f1 e4 dc ea 72 59 43 25 66 bb 2e b9 d3 f3 6b 8a
WPA: RX message 1 of Group Key Handshake from 00:30:bd:fe:c7:9a (ver=1)
WPA: Group Key - hexdump(len=32): b6 eb 7f e0 9c 53 3b a0 e0 24 2d 91 32 c3 e7 4 f 04 72 74 98 83 f0 00 30 9c 75 48 a9 ad c4 b2 57
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 fb 75 a2 d2 68 b6 e9 d9 68 ff 20 98 3f 37 99 00 00
WPA: Key negotiation completed with 00:30:bd:fe:c7:9a
Cancelling authentication timeout
RX EAPOL from 00:30:bd:fe:c7:9a
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f2 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 0d 49 4c 63 b4 cb eb 5d b7 48 5e 81 64 dc da 53 00 20 bf da ab 13 dd 46 70 87 2e 8f 7a 07 45 c8 46 c2 00 24 ae 6a 88 5a 47 8c 52 f0 e8 3b f0 13 fc a6
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f2 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 49 4c 63 b4 cb eb 5d b7 48 5e 81 64 dc da 53 00 20 bf da ab 13 dd 46 70 87 2e 8f 7a 07 45 c8 46 c2 00 24 ae 6a 88 5a 47 8c 52 f0 e8 3b f0 13 fc a6
WPA: RX message 1 of Group Key Handshake from 00:30:bd:fe:c7:9a (ver=1)
WPA: Group Key - hexdump(len=32): 15 14 2f 10 31 ce 84 20 16 fe 40 73 2a a7 74 d 4 9a 92 ad d6 13 d0 ac 9b da 0d 6f 56 37 03 d3 bf
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 48 c6 91 5a da 9b 84 97 30 65 4f a5 9d d9 c7 00 00
WPA: Key negotiation completed with 00:30:bd:fe:c7:9a
Cancelling authentication timeout




******************************************/

rem Note since this long debugged mungo is not what you'll be interested, start next time(hopefully the
rem pcmcia will spawn everything up on machine startup(I'll report back anyways if it does)
rem then do a simple " wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplican t.conf -B" without
rem these duoble quotes ofcourse :-)


Second this..........actually simultaneously.........

/*********************************************
[root@localhost root]# dhclient wlan0 Internet Systems Consortium DHCP Client V3.0.1rc14
Copyright 2004 Internet Systems Consortium.
All rights reserved.
For info, please visit http://www.isc.org/products/DHCP

sit0: unknown hardware address type 776
sit0: unknown hardware address type 776
Listening on LPF/wlan0/00:30:bd:f4:c1:13
Sending on LPF/wlan0/00:30:bd:f4:c1:13
Sending on Socket/fallback
DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 8
DHCPOFFER from 172.22.202.1
DHCPREQUEST on wlan0 to 255.255.255.255 port 67
DHCPACK from 172.22.202.1
bound to 172.22.202.2 -- renewal in 493108294 seconds.
[root@localhost root]#

******************************************/

rem Voila I could talk to my router/dhcp server as well and I am browsing on internet from my fedora core 2 OS.


Yoohooooooooooooooooooo.............


Cheers

Tarry


Last edited by Tarry; 05-17-2005 at 03:54 AM.
 
Old 08-23-2004, 04:15 PM   #2
kikker
LQ Newbie
 
Registered: Aug 2003
Distribution: Fedora Core 2
Posts: 3

Rep: Reputation: 0
Does this installation also work for AES encryption ?

Sincerely,

Kikker
 
Old 08-27-2004, 03:10 AM   #3
kikker
LQ Newbie
 
Registered: Aug 2003
Distribution: Fedora Core 2
Posts: 3

Rep: Reputation: 0
I can't get this to work with ndiswrapper 0.10.
Ndiswrapper works but I can't get it to work with the wpa_supplicant 2.4
(hardware is Belkin card F5D7010)

Any ideas ?

Failed to enable wpa in the driver.

Sincerely,

Kikker
 
Old 08-28-2004, 07:47 AM   #4
Tarry
Member
 
Registered: Aug 2004
Posts: 33

Original Poster
Rep: Reputation: 15
Well I used ndiswrapper 0.9(was latest then) and supplicant 2.4.

You've got the same card , it has got to work..I gave a very detailed expl. up there. Where does it go wrong?

starting supplicant?
doing dhcp discovery?

questions? questions?

And yes supplicant has AES support as well....But what's wrong with TKIP?
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Belkin F5D7010 PCMCIA Wireless NIC logos2000 Linux - Hardware 2 09-28-2005 09:42 PM
Belkin F5D7010 Wireless PCMCIA card zenzen Linux - Laptop and Netbook 20 05-16-2005 03:17 AM
BELKIN F5D7010 wireless cardbus RedHat 9 TurboChicken Linux - Wireless Networking 12 08-11-2004 05:01 PM
troubles configuring WLAN card Belkin F5D7010 on Suse 9.0 distro vbeernaert Linux - Wireless Networking 2 11-12-2003 01:16 PM
Belkin wireless F5D7010 on RedHat9.0 ? tomto Linux - Laptop and Netbook 1 06-11-2003 12:36 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - General > LinuxQuestions.org Member Success Stories

All times are GMT -5. The time now is 06:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration