LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 06-07-2012, 06:05 PM   #1
Munra
LQ Newbie
 
Registered: Mar 2008
Location: Colombia
Distribution: slackware64 14
Posts: 27

Rep: Reputation: 1
What it is wrong in this wpa_supplant


Hello:
I can't connect wireless and I don't know why, first I thought that wicd was the problem but now I don't think so.
The tread related to the wicd problem and how I came to here is in this tread
now here is my wpa_supplant.conf and the result of this command

Quote:
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -ddd -t |tee wpa-log.txt


wpa_supplant.conf
Quote:
network={
# scan_ssid=1
»···ssid="camila"
»···#psk="some password"
»···psk=[a lot of numbers here]
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=TKIP
# group=TKIP
# priority=10
}
the result of the command
Quote:
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -ddd -t |tee wpa-log.txt
Code:
1339109534.163389: Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
1339109534.163448: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
1339109534.163454: Reading configuration file '/etc/wpa_supplicant.conf'
1339109534.163502: Line: 15 - start of a new network block
1339109534.163529: ssid - hexdump_ascii(len=6):
     63 61 6d 69 6c 61                                 camila          
1339109534.163551: PSK - hexdump(len=32): [REMOVED]
1339109534.163584: Priority group 0
1339109534.163588:    id=0 ssid='camila'
1339109534.163668: WEXT: cfg80211-based driver detected
1339109535.736840: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
1339109535.736850:   capabilities: key_mgmt 0xf enc 0xf flags 0x0
1339109535.743192: netlink: Operstate: linkmode=1, operstate=5
1339109535.751372: Own MAC address: 00:24:2c:21:0d:3b
1339109535.751391: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1339109535.751404: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1339109535.751408: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1339109535.751411: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1339109535.751415: wpa_driver_wext_set_countermeasures
1339109535.751419: RSN: flushing PMKID list in the driver
1339109535.751439: Setting scan request: 0 sec 100000 usec
1339109535.751502: WPS: UUID based on MAC address - hexdump(len=16): 34 d9 2a 49 a2 74 56 9b a3 3a f0 fd 02 f4 09 20
1339109535.752471: EAPOL: SUPP_PAE entering state DISCONNECTED
1339109535.752479: EAPOL: Supplicant port status: Unauthorized
1339109535.752481: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1339109535.752483: EAPOL: SUPP_BE entering state INITIALIZE
1339109535.752487: EAP: EAP entering state DISABLED
1339109535.752490: EAPOL: Supplicant port status: Unauthorized
1339109535.752492: EAPOL: Supplicant port status: Unauthorized
1339109535.752502: Added interface wlan0
1339109535.752539: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109535.752545: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109535.752551: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109535.752554: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109535.752556: Wireless event: cmd=0x8b06 len=12
1339109535.752560: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109535.752562: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109535.752564: Wireless event: cmd=0x8b1a len=16
1339109535.851616: State: DISCONNECTED -> SCANNING
1339109535.851623: Starting AP scan for wildcard SSID
1339109535.852022: Scan requested (ret=0) - scan timeout 5 seconds
1339109536.753477: EAPOL: disable timer tick
1339109536.753489: EAPOL: Supplicant port status: Unauthorized
1339109537.144665: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109537.144678: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.144684: Wireless event: cmd=0x8b19 len=16
1339109537.144776: Received 4070 bytes of scan results (10 BSSes)
1339109537.144802: BSS: Start scan result update 1
1339109537.144807: BSS: Add new id 0 BSSID 20:f3:a3:6d:f1:84 SSID 'camila'
1339109537.144813: BSS: Add new id 1 BSSID 00:1e:4c:3e:ab:ef SSID 'NEZAHUALCOYOTL'
1339109537.144819: BSS: Add new id 2 BSSID 20:2b:c1:b3:f8:48 SSID 'RODRIGUEZ'
1339109537.144824: BSS: Add new id 3 BSSID 00:14:6c:25:34:da SSID 'dmvs'
1339109537.144829: BSS: Add new id 4 BSSID 54:e6:fc:99:ff:d8 SSID 'AUDITORIO2'
1339109537.144834: BSS: Add new id 5 BSSID 00:26:44:5d:9f:51 SSID 'Arenas'
1339109537.144840: BSS: Add new id 6 BSSID 00:1e:4c:3c:e6:76 SSID 'AMALIA'
1339109537.144845: BSS: Add new id 7 BSSID e0:cb:4e:6e:b8:1c SSID 'DANI'
1339109537.144850: BSS: Add new id 8 BSSID 00:1f:c6:7a:a4:91 SSID 'Luisa Fernanda'
1339109537.144855: BSS: Add new id 9 BSSID 00:1d:d9:64:a0:35 SSID 'SaraCadavidUne'
1339109537.145055: New scan results available
1339109537.145061: WPS: attr type=0x104a len=1
1339109537.145079: WPS: attr type=0x1044 len=1
1339109537.145082: WPS: attr type=0x104a len=1
1339109537.145096: WPS: attr type=0x1044 len=1
1339109537.145105: Selecting BSS from priority group 0
1339109537.145107: Try to find WPA-enabled AP
1339109537.145110: 0: 20:f3:a3:6d:f1:84 ssid='camila' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1339109537.145119:    selected based on WPA IE
1339109537.145121:    selected WPA AP 20:f3:a3:6d:f1:84 ssid='camila'
1339109537.145135: Trying to associate with 20:f3:a3:6d:f1:84 (SSID='camila' freq=2462 MHz)
1339109537.145139: Cancelling scan request
1339109537.145141: WPA: clearing own WPA/RSN IE
1339109537.145144: Automatic auth_alg selection: 0x1
1339109537.145148: WPA: using IEEE 802.11i/D3.0
1339109537.145150: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
1339109537.145154: WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339109537.145164: WPA: clearing AP RSN IE
1339109537.145166: WPA: using GTK TKIP
1339109537.145169: WPA: using PTK TKIP
1339109537.145175: WPA: using KEY_MGMT WPA-PSK
1339109537.145178: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339109537.145188: No keys have been configured - skip key clearing
1339109537.145190: State: SCANNING -> ASSOCIATING
1339109537.145194: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339109537.145197: netlink: Operstate: linkmode=-1, operstate=5
1339109537.145210: wpa_driver_wext_associate
1339109537.145222: wpa_driver_wext_set_drop_unencrypted
1339109537.145238: wpa_driver_wext_set_psk
1339109537.154001: Setting authentication timeout: 10 sec 0 usec
1339109537.154014: EAPOL: External notification - EAP success=0
1339109537.154019: EAPOL: Supplicant port status: Unauthorized
1339109537.154028: EAPOL: External notification - EAP fail=0
1339109537.154032: EAPOL: Supplicant port status: Unauthorized
1339109537.154037: EAPOL: External notification - portControl=Auto
1339109537.154041: EAPOL: Supplicant port status: Unauthorized
1339109537.154108: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109537.154113: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.154119: Wireless event: cmd=0x8b1a len=16
1339109537.154124: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109537.154128: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.154132: Wireless event: cmd=0x8b06 len=12
1339109537.154137: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109537.154141: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.154144: Wireless event: cmd=0x8b04 len=16
1339109537.154147: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109537.154150: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.154153: Wireless event: cmd=0x8b1a len=22
1339109537.160933: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339109537.160942: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.160947: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339109537.160950: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.160952: Wireless event: cmd=0x8c08 len=67
1339109537.160955: AssocResp IE wireless event - hexdump(len=51): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 0c 43 04 00 00 00
1339109537.160969: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339109537.160971: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109537.160973: Wireless event: cmd=0x8b15 len=24
1339109537.160975: Wireless event: new AP: 20:f3:a3:6d:f1:84
1339109537.160978: Association info event
1339109537.160980: resp_ies - hexdump(len=51): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 0c 43 04 00 00 00
1339109537.160991: State: ASSOCIATING -> ASSOCIATED
1339109537.160994: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339109537.160996: netlink: Operstate: linkmode=-1, operstate=5
1339109537.161013: Associated to a new BSS: BSSID=20:f3:a3:6d:f1:84
1339109537.161024: No keys have been configured - skip key clearing
1339109537.161028: Associated with 20:f3:a3:6d:f1:84
1339109537.161031: WPA: Association event - clear replay counter
1339109537.161037: WPA: Clear old PTK
1339109537.161039: EAPOL: External notification - portEnabled=0
1339109537.161042: EAPOL: Supplicant port status: Unauthorized
1339109537.161045: EAPOL: External notification - portValid=0
1339109537.161047: EAPOL: Supplicant port status: Unauthorized
1339109537.161049: EAPOL: External notification - EAP success=0
1339109537.161051: EAPOL: Supplicant port status: Unauthorized
1339109537.161053: EAPOL: External notification - portEnabled=1
1339109537.161055: EAPOL: SUPP_PAE entering state CONNECTING
1339109537.161057: EAPOL: enable timer tick
1339109537.161061: EAPOL: SUPP_BE entering state IDLE
1339109537.161064: Setting authentication timeout: 10 sec 0 usec
1339109537.161068: Cancelling scan request
1339109538.162128: EAPOL: startWhen --> 0
1339109538.162138: EAPOL: disable timer tick
1339109538.162141: EAPOL: SUPP_PAE entering state CONNECTING
1339109538.162143: EAPOL: enable timer tick
1339109538.162148: EAPOL: txStart
1339109538.162151: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1339109541.910119: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109541.910133: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109541.910140: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109541.910144: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109541.910146: Wireless event: cmd=0x8b15 len=24
1339109541.910150: Wireless event: new AP: 00:00:00:00:00:00
1339109541.910154: Disassociation notification
1339109541.910161: Setting scan request: 0 sec 100000 usec
1339109541.910167: Added BSSID 20:f3:a3:6d:f1:84 into blacklist
1339109541.910174: CTRL-EVENT-DISCONNECTED bssid=20:f3:a3:6d:f1:84 reason=0
1339109541.910176: Disconnect event - remove keys
1339109541.910179: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1339109541.910194: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1339109541.910199: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1339109541.910203: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1339109541.910208: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1339109541.910213: State: ASSOCIATED -> DISCONNECTED
1339109541.910216: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339109541.910220: netlink: Operstate: linkmode=-1, operstate=5
1339109541.910233: EAPOL: External notification - portEnabled=0
1339109541.910236: EAPOL: SUPP_PAE entering state DISCONNECTED
1339109541.910238: EAPOL: Supplicant port status: Unauthorized
1339109541.910241: EAPOL: SUPP_BE entering state INITIALIZE
1339109541.910244: EAPOL: Supplicant port status: Unauthorized
1339109541.910247: EAPOL: External notification - portValid=0
1339109541.910249: EAPOL: Supplicant port status: Unauthorized
1339109541.910252: EAPOL: External notification - EAP success=0
1339109541.910254: EAPOL: Supplicant port status: Unauthorized
1339109542.010351: State: DISCONNECTED -> SCANNING
1339109542.010363: Starting AP scan for wildcard SSID
1339109542.010743: Scan requested (ret=0) - scan timeout 30 seconds
1339109542.165631: EAPOL: Supplicant port status: Unauthorized
1339109543.166704: EAPOL: Supplicant port status: Unauthorized
1339109543.307645: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109543.307652: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109543.307657: Wireless event: cmd=0x8b19 len=16
1339109543.307747: Received 4078 bytes of scan results (10 BSSes)
1339109543.307761: BSS: Start scan result update 2
1339109543.307783: New scan results available
1339109543.307789: WPS: attr type=0x104a len=1
1339109543.307792: WPS: attr type=0x1044 len=1
1339109543.307795: WPS: attr type=0x104a len=1
1339109543.307797: WPS: attr type=0x1044 len=1
1339109543.307802: Selecting BSS from priority group 0
1339109543.307804: Try to find WPA-enabled AP
1339109543.307807: 0: 20:f3:a3:6d:f1:84 ssid='camila' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1339109543.307823:    selected based on WPA IE
1339109543.307826:    selected WPA AP 20:f3:a3:6d:f1:84 ssid='camila'
1339109543.307841: Trying to associate with 20:f3:a3:6d:f1:84 (SSID='camila' freq=2462 MHz)
1339109543.307845: Cancelling scan request
1339109543.308041: WPA: clearing own WPA/RSN IE
1339109543.308046: Automatic auth_alg selection: 0x1
1339109543.308056: WPA: using IEEE 802.11i/D3.0
1339109543.308061: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
1339109543.308065: WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339109543.308075: WPA: clearing AP RSN IE
1339109543.308077: WPA: using GTK TKIP
1339109543.308080: WPA: using PTK TKIP
1339109543.308083: WPA: using KEY_MGMT WPA-PSK
1339109543.308085: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339109543.308095: No keys have been configured - skip key clearing
1339109543.308098: State: SCANNING -> ASSOCIATING
1339109543.308101: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339109543.308104: netlink: Operstate: linkmode=-1, operstate=5
1339109543.308117: wpa_driver_wext_associate
1339109543.308129: wpa_driver_wext_set_drop_unencrypted
1339109543.308144: wpa_driver_wext_set_psk
1339109543.316942: Setting authentication timeout: 10 sec 0 usec
1339109543.316953: EAPOL: External notification - EAP success=0
1339109543.316957: EAPOL: Supplicant port status: Unauthorized
1339109543.316960: EAPOL: External notification - EAP fail=0
1339109543.316965: EAPOL: Supplicant port status: Unauthorized
1339109543.316968: EAPOL: External notification - portControl=Auto
1339109543.316972: EAPOL: Supplicant port status: Unauthorized
1339109543.317079: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109543.317084: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109543.317088: Wireless event: cmd=0x8b1a len=16
1339109543.317093: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109543.317097: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109543.317100: Wireless event: cmd=0x8b06 len=12
1339109543.317104: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109543.317107: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109543.317110: Wireless event: cmd=0x8b04 len=16
1339109543.317114: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109543.317117: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109543.317120: Wireless event: cmd=0x8b1a len=22
1339109544.167626: EAPOL: Supplicant port status: Unauthorized
1339109545.168697: EAPOL: Supplicant port status: Unauthorized
1339109546.169195: EAPOL: Supplicant port status: Unauthorized
1339109547.170269: EAPOL: Supplicant port status: Unauthorized
1339109548.171359: EAPOL: Supplicant port status: Unauthorized
1339109549.172442: EAPOL: Supplicant port status: Unauthorized
1339109550.173525: EAPOL: Supplicant port status: Unauthorized
1339109551.174605: EAPOL: Supplicant port status: Unauthorized
1339109552.175674: EAPOL: Supplicant port status: Unauthorized
1339109553.176746: EAPOL: Supplicant port status: Unauthorized
1339109553.317153: Authentication with 20:f3:a3:6d:f1:84 timed out.
1339109553.317157: BSSID 20:f3:a3:6d:f1:84 blacklist count incremented to 2
1339109553.317161: No keys have been configured - skip key clearing
1339109553.317163: State: ASSOCIATING -> DISCONNECTED
1339109553.317166: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339109553.317169: netlink: Operstate: linkmode=-1, operstate=5
1339109553.317181: EAPOL: External notification - portEnabled=0
1339109553.317183: EAPOL: Supplicant port status: Unauthorized
1339109553.317186: EAPOL: External notification - portValid=0
1339109553.317188: EAPOL: Supplicant port status: Unauthorized
1339109553.317190: EAPOL: External notification - EAP success=0
1339109553.317191: EAPOL: Supplicant port status: Unauthorized
1339109553.317195: Setting scan request: 0 sec 0 usec
1339109553.317202: State: DISCONNECTED -> SCANNING
1339109553.317217: Starting AP scan for wildcard SSID
1339109553.317615: Scan requested (ret=0) - scan timeout 30 seconds
1339109554.177677: EAPOL: Supplicant port status: Unauthorized
1339109554.608645: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109554.608657: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109554.608663: Wireless event: cmd=0x8b19 len=16
1339109554.608686: Received 0 bytes of scan results (0 BSSes)
1339109554.608691: BSS: Start scan result update 3
1339109554.608695: New scan results available
1339109554.608703: WPS: attr type=0x104a len=1
1339109554.608706: WPS: attr type=0x1044 len=1
1339109554.608709: WPS: attr type=0x104a len=1
1339109554.608711: WPS: attr type=0x1044 len=1
1339109554.608714: Selecting BSS from priority group 0
1339109554.608716: Try to find WPA-enabled AP
1339109554.608718: Try to find non-WPA AP
1339109554.608721: No APs found - clear blacklist and try again
1339109554.608723: Removed BSSID 20:f3:a3:6d:f1:84 from blacklist (clear)
1339109554.608726: Selecting BSS from priority group 0
1339109554.608728: Try to find WPA-enabled AP
1339109554.608730: Try to find non-WPA AP
1339109554.608733: No suitable network found
1339109554.608739: Setting scan request: 5 sec 0 usec
1339109555.178323: EAPOL: Supplicant port status: Unauthorized
1339109556.178818: EAPOL: Supplicant port status: Unauthorized
1339109557.179887: EAPOL: Supplicant port status: Unauthorized
1339109558.180959: EAPOL: Supplicant port status: Unauthorized
1339109559.182026: EAPOL: Supplicant port status: Unauthorized
1339109559.609251: Starting AP scan for wildcard SSID
1339109559.609651: Scan requested (ret=0) - scan timeout 30 seconds
1339109560.182679: EAPOL: Supplicant port status: Unauthorized
1339109560.900671: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339109560.900684: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339109560.900689: Wireless event: cmd=0x8b19 len=16
1339109560.900707: Received 0 bytes of scan results (0 BSSes)
1339109560.900711: BSS: Start scan result update 4
1339109560.900714: BSS: Expire BSS 0 due to no match in scan
1339109560.900717: BSS: Remove id 0 BSSID 20:f3:a3:6d:f1:84 SSID 'camila'
1339109560.900721: BSS: Expire BSS 1 due to no match in scan
1339109560.900724: BSS: Remove id 1 BSSID 00:1e:4c:3e:ab:ef SSID 'NEZAHUALCOYOTL'
1339109560.900728: BSS: Expire BSS 2 due to no match in scan
1339109560.900730: BSS: Remove id 2 BSSID 20:2b:c1:b3:f8:48 SSID 'RODRIGUEZ'
1339109560.900734: BSS: Expire BSS 3 due to no match in scan
1339109560.900736: BSS: Remove id 3 BSSID 00:14:6c:25:34:da SSID 'dmvs'
1339109560.900740: BSS: Expire BSS 4 due to no match in scan
1339109560.900742: BSS: Remove id 4 BSSID 54:e6:fc:99:ff:d8 SSID 'AUDITORIO2'
1339109560.900746: BSS: Expire BSS 5 due to no match in scan
1339109560.900748: BSS: Remove id 5 BSSID 00:26:44:5d:9f:51 SSID 'Arenas'
1339109560.900752: BSS: Expire BSS 6 due to no match in scan
1339109560.900754: BSS: Remove id 6 BSSID 00:1e:4c:3c:e6:76 SSID 'AMALIA'
1339109560.900758: BSS: Expire BSS 7 due to no match in scan
1339109560.900760: BSS: Remove id 7 BSSID e0:cb:4e:6e:b8:1c SSID 'DANI'
1339109560.900766: BSS: Expire BSS 8 due to no match in scan
1339109560.900768: BSS: Remove id 8 BSSID 00:1f:c6:7a:a4:91 SSID 'Luisa Fernanda'
1339109560.900772: BSS: Expire BSS 9 due to no match in scan
1339109560.900774: BSS: Remove id 9 BSSID 00:1d:d9:64:a0:35 SSID 'SaraCadavidUne'
1339109560.900778: New scan results available
1339109560.900781: Selecting BSS from priority group 0
1339109560.900783: Try to find WPA-enabled AP
1339109560.900785: Try to find non-WPA AP
1339109560.900788: No suitable network found
1339109560.900793: Setting scan request: 5 sec 0 usec
1339109561.183026: EAPOL: Supplicant port status: Unauthorized
1339109562.184119: EAPOL: Supplicant port status: Unauthorized
1339109563.185224: EAPOL: Supplicant port status: Unauthorized
1339109564.186292: EAPOL: Supplicant port status: Unauthorized
1339109565.187392: EAPOL: Supplicant port status: Unauthorized
1339109565.901015: Starting AP scan for wildcard
I don't know where to stop but I think that this is enough if some one could help me I appreciate.

Last edited by Munra; 06-10-2012 at 11:14 PM.
 
Old 06-07-2012, 07:53 PM   #2
allend
LQ 5k Club
 
Registered: Oct 2003
Location: Melbourne
Distribution: Slackware64-15.0
Posts: 6,371

Rep: Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748Reputation: 2748
The next time you post a long listing, please put it in a CODE block rather than a QUOTE block. It is much easier to scroll through.

This is the result of 'grep -v "^#" /etc/wpa_supplicant.conf' on my system where I use wpa_supplicant to connect to my home WPA2 only wireless router.
Code:
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

network={
  scan_ssid=0
  ssid="<My_ESSID>"
  proto=RSN
  key_mgmt=WPA-PSK
  pairwise=CCMP TKIP
  group=CCMP TKIP WEP104 WEP40
  psk=<My_64digit_psk_string>
  priority=10
}

network={
  key_mgmt=NONE
  priority=0
}
 
Old 06-10-2012, 11:20 PM   #3
Munra
LQ Newbie
 
Registered: Mar 2008
Location: Colombia
Distribution: slackware64 14
Posts: 27

Original Poster
Rep: Reputation: 1
done, changed [QUOTE] for [CODE],
Thank you for your help, but the problem was the driver of my Chip but I am going to put the one that works.

Code:
1339386627.131274: Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
1339386627.131319: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
1339386627.131323: Reading configuration file '/etc/wpa_supplicant.conf'
1339386627.146035: Line: 15 - start of a new network block
1339386627.146057: ssid - hexdump_ascii(len=6):
     63 61 6d 69 6c 61                                 camila          
1339386627.146070: PSK - hexdump(len=32): [REMOVED]
1339386627.146128: Priority group 0
1339386627.146132:    id=0 ssid='camila'
1339386627.146195: WEXT: cfg80211-based driver detected
1339386628.795957: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
1339386628.795970:   capabilities: key_mgmt 0xf enc 0xf flags 0x0
1339386628.800039: netlink: Operstate: linkmode=1, operstate=5
1339386628.803174: Own MAC address: 00:24:2c:21:0d:3b
1339386628.803187: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1339386628.803199: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1339386628.803204: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1339386628.803209: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1339386628.803214: wpa_driver_wext_set_countermeasures
1339386628.803218: RSN: flushing PMKID list in the driver
1339386628.803235: Setting scan request: 0 sec 100000 usec
1339386628.803313: WPS: UUID based on MAC address - hexdump(len=16): 34 d9 2a 49 a2 74 56 9b a3 3a f0 fd 02 f4 09 20
1339386628.804763: EAPOL: SUPP_PAE entering state DISCONNECTED
1339386628.804772: EAPOL: Supplicant port status: Unauthorized
1339386628.804776: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1339386628.804778: EAPOL: SUPP_BE entering state INITIALIZE
1339386628.804783: EAP: EAP entering state DISABLED
1339386628.804787: EAPOL: Supplicant port status: Unauthorized
1339386628.804790: EAPOL: Supplicant port status: Unauthorized
1339386628.804804: Added interface wlan0
1339386628.804851: RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
1339386628.804859: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386628.804868: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386628.804871: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386628.804877: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386628.804880: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386628.804882: Wireless event: cmd=0x8b06 len=12
1339386628.804887: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386628.804890: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386628.804893: Wireless event: cmd=0x8b1a len=16
1339386628.903425: State: DISCONNECTED -> SCANNING
1339386628.903431: Starting AP scan for wildcard SSID
1339386628.903839: Scan requested (ret=0) - scan timeout 5 seconds
1339386629.805785: EAPOL: disable timer tick
1339386629.805793: EAPOL: Supplicant port status: Unauthorized
1339386630.185495: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386630.185508: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.185512: Wireless event: cmd=0x8b19 len=16
1339386630.185582: Received 3311 bytes of scan results (7 BSSes)
1339386630.185603: BSS: Start scan result update 1
1339386630.185612: BSS: Add new id 0 BSSID 20:f3:a3:6d:f1:84 SSID 'camila'
1339386630.185619: BSS: Add new id 1 BSSID 54:e6:fc:99:ff:d8 SSID 'AUDITORIO2'
1339386630.185624: BSS: Add new id 2 BSSID 00:14:6c:25:34:da SSID 'dmvs'
1339386630.185629: BSS: Add new id 3 BSSID 00:1e:4c:3c:e6:76 SSID 'AMALIA'
1339386630.185635: BSS: Add new id 4 BSSID 00:1f:c6:7a:a4:91 SSID 'Luisa Fernanda'
1339386630.185640: BSS: Add new id 5 BSSID 00:26:44:5d:9f:51 SSID 'Arenas'
1339386630.185645: BSS: Add new id 6 BSSID 90:00:4e:8b:36:12 SSID '66671165'
1339386630.185650: New scan results available
1339386630.185654: WPS: attr type=0x104a len=1
1339386630.185665: WPS: attr type=0x1044 len=1
1339386630.185667: WPS: attr type=0x103b len=1
1339386630.185865: WPS: attr type=0x1047 len=16
1339386630.185871: WPS: attr type=0x1021 len=7
1339386630.185889: WPS: attr type=0x1023 len=9
1339386630.185891: WPS: attr type=0x1024 len=3
1339386630.185894: WPS: attr type=0x1042 len=3
1339386630.185896: WPS: attr type=0x1054 len=8
1339386630.185898: WPS: attr type=0x1011 len=25
1339386630.185901: WPS: attr type=0x1008 len=2
1339386630.185903: WPS: attr type=0x103c len=1
1339386630.185906: WPS: attr type=0x104a len=1
1339386630.185908: WPS: attr type=0x1044 len=1
1339386630.185910: WPS: attr type=0x103b len=1
1339386630.185912: WPS: attr type=0x1047 len=16
1339386630.185915: WPS: attr type=0x1021 len=7
1339386630.185917: WPS: attr type=0x1023 len=9
1339386630.185919: WPS: attr type=0x1024 len=3
1339386630.185921: WPS: attr type=0x1042 len=3
1339386630.185924: WPS: attr type=0x1054 len=8
1339386630.185926: WPS: attr type=0x1011 len=25
1339386630.185928: WPS: attr type=0x1008 len=2
1339386630.185934: WPS: attr type=0x103c len=1
1339386630.185943: Selecting BSS from priority group 0
1339386630.185945: Try to find WPA-enabled AP
1339386630.185948: 0: 20:f3:a3:6d:f1:84 ssid='camila' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1339386630.185956:    selected based on WPA IE
1339386630.185958:    selected WPA AP 20:f3:a3:6d:f1:84 ssid='camila'
1339386630.185972: Trying to associate with 20:f3:a3:6d:f1:84 (SSID='camila' freq=2462 MHz)
1339386630.185975: Cancelling scan request
1339386630.185978: WPA: clearing own WPA/RSN IE
1339386630.185981: Automatic auth_alg selection: 0x1
1339386630.185985: WPA: using IEEE 802.11i/D3.0
1339386630.185987: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
1339386630.185991: WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.186001: WPA: clearing AP RSN IE
1339386630.186003: WPA: using GTK TKIP
1339386630.186006: WPA: using PTK TKIP
1339386630.186009: WPA: using KEY_MGMT WPA-PSK
1339386630.186012: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.186022: No keys have been configured - skip key clearing
1339386630.186025: State: SCANNING -> ASSOCIATING
1339386630.186028: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339386630.186031: netlink: Operstate: linkmode=-1, operstate=5
1339386630.186050: wpa_driver_wext_associate
1339386630.186063: wpa_driver_wext_set_drop_unencrypted
1339386630.186080: wpa_driver_wext_set_psk
1339386630.203469: Setting authentication timeout: 10 sec 0 usec
1339386630.203475: EAPOL: External notification - EAP success=0
1339386630.203478: EAPOL: Supplicant port status: Unauthorized
1339386630.203481: EAPOL: External notification - EAP fail=0
1339386630.203483: EAPOL: Supplicant port status: Unauthorized
1339386630.203485: EAPOL: External notification - portControl=Auto
1339386630.203487: EAPOL: Supplicant port status: Unauthorized
1339386630.203526: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386630.203530: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.203533: Wireless event: cmd=0x8b1a len=16
1339386630.203536: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386630.203538: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.203540: Wireless event: cmd=0x8b06 len=12
1339386630.203543: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386630.203545: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.203547: Wireless event: cmd=0x8b04 len=16
1339386630.203550: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1339386630.203552: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.203554: Wireless event: cmd=0x8b1a len=22
1339386630.214474: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339386630.214490: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.214518: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339386630.214522: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.214524: Wireless event: cmd=0x8c08 len=67
1339386630.214527: AssocResp IE wireless event - hexdump(len=51): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 0c 43 04 00 00 00
1339386630.214565: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1339386630.214569: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1339386630.214571: Wireless event: cmd=0x8b15 len=24
1339386630.214573: Wireless event: new AP: 20:f3:a3:6d:f1:84
1339386630.214576: Association info event
1339386630.214577: resp_ies - hexdump(len=51): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 0c 43 04 00 00 00
1339386630.214589: State: ASSOCIATING -> ASSOCIATED
1339386630.214591: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1339386630.214594: netlink: Operstate: linkmode=-1, operstate=5
1339386630.214617: Associated to a new BSS: BSSID=20:f3:a3:6d:f1:84
1339386630.214620: No keys have been configured - skip key clearing
1339386630.214624: Associated with 20:f3:a3:6d:f1:84
1339386630.214626: WPA: Association event - clear replay counter
1339386630.214636: WPA: Clear old PTK
1339386630.214638: EAPOL: External notification - portEnabled=0
1339386630.214641: EAPOL: Supplicant port status: Unauthorized
1339386630.214645: EAPOL: External notification - portValid=0
1339386630.214647: EAPOL: Supplicant port status: Unauthorized
1339386630.214649: EAPOL: External notification - EAP success=0
1339386630.214651: EAPOL: Supplicant port status: Unauthorized
1339386630.214653: EAPOL: External notification - portEnabled=1
1339386630.214655: EAPOL: SUPP_PAE entering state CONNECTING
1339386630.214657: EAPOL: enable timer tick
1339386630.214661: EAPOL: SUPP_BE entering state IDLE
1339386630.214664: Setting authentication timeout: 10 sec 0 usec
1339386630.214668: Cancelling scan request
1339386630.490749: RX EAPOL from 20:f3:a3:6d:f1:84
1339386630.490758: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1339386630.490780: Setting authentication timeout: 10 sec 0 usec
1339386630.490788: IEEE 802.1X RX: version=1 type=3 length=95
1339386630.490790:   EAPOL-Key type=254
1339386630.490792:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1339386630.490796:   key_length=32 key_data_length=0
1339386630.490798:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1339386630.490801:   key_nonce - hexdump(len=32): 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e
1339386630.490808:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1339386630.490812:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1339386630.490815:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1339386630.490818:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1339386630.490826: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1339386630.490863: State: ASSOCIATED -> 4WAY_HANDSHAKE
1339386630.490866: WPA: RX message 1 of 4-Way Handshake from 20:f3:a3:6d:f1:84 (ver=1)
1339386630.491647: WPA: Renewed SNonce - hexdump(len=32): ea d7 bf 74 85 7f 12 63 b7 70 66 ea fe 78 1f f4 13 65 0e 66 28 4d ea 7f d5 b4 d8 b1 cb 6e 4b 41
1339386630.491675: WPA: PTK derivation - A1=00:24:2c:21:0d:3b A2=20:f3:a3:6d:f1:84
1339386630.491679: WPA: PMK - hexdump(len=32): [REMOVED]
1339386630.491681: WPA: PTK - hexdump(len=64): [REMOVED]
1339386630.491685: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.491699: WPA: Sending EAPOL-Key 2/4
1339386630.491712: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 ea d7 bf 74 85 7f 12 63 b7 70 66 ea fe 78 1f f4 13 65 0e 66 28 4d ea 7f d5 b4 d8 b1 cb 6e 4b 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 3e 3f d7 9e 29 5e 0b 07 d3 31 1b 6c 78 69 67 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.499384: RX EAPOL from 20:f3:a3:6d:f1:84
1339386630.499389: RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 5b 5e d7 d7 b9 bb bc 93 43 a6 99 dc 1f 60 8d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.499411: IEEE 802.1X RX: version=1 type=3 length=119
1339386630.499414:   EAPOL-Key type=254
1339386630.499415:   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
1339386630.499418:   key_length=32 key_data_length=24
1339386630.499420:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1339386630.499424:   key_nonce - hexdump(len=32): 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e
1339386630.499430:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1339386630.499434:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1339386630.499438:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1339386630.499441:   key_mic - hexdump(len=16): de 5b 5e d7 d7 b9 bb bc 93 43 a6 99 dc 1f 60 8d
1339386630.499446: WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 57 38 b3 f1 e6 be 43 bf a1 7c ae 7e 46 8d da d9 cf 2d 5b 47 b2 4a df 4e ea e2 ac 24 b7 7a 40 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 5b 5e d7 d7 b9 bb bc 93 43 a6 99 dc 1f 60 8d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.499480: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1339386630.499482: WPA: RX message 3 of 4-Way Handshake from 20:f3:a3:6d:f1:84 (ver=1)
1339386630.499484: WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.499490: WPA: WPA IE in EAPOL-Key - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1339386630.499497: WPA: Sending EAPOL-Key 4/4
1339386630.499501: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 9e 6c b3 03 3f fa 78 ec 2d de be f7 9f 1d e7 00 00
1339386630.499528: WPA: Installing PTK to the driver.
1339386630.499531: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
1339386630.499535: wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
1339386630.499548: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1339386630.503624: RX EAPOL from 20:f3:a3:6d:f1:84
1339386630.503628: RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 7e a1 fd c6 66 a9 ab 57 e2 30 3a 01 71 80 25 34 a5 8f 6a d1 0e e5 72 9a 45 41 5a 72 4d b0 15 9e a5 8f 6a d1 0e e5 72 9a 45 41 5a 72 4d b0 15 a0 0a 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 21 75 f7 ea ea 6b 88 40 d7 3b 8b 19 dd bf 79 00 20 65 bd 19 57 93 69 96 13 cd 96 da 78 df 09 a3 39 d9 a3 4c 1b 90 72 b9 95 90 e6 bb 27 98 83 1d 7d
1339386630.503650: IEEE 802.1X RX: version=1 type=3 length=127
1339386630.503653:   EAPOL-Key type=254
1339386630.503654:   key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
1339386630.503661:   key_length=32 key_data_length=32
1339386630.503663:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1339386630.503667:   key_nonce - hexdump(len=32): 7e a1 fd c6 66 a9 ab 57 e2 30 3a 01 71 80 25 34 a5 8f 6a d1
I am not sure if this is secure but I think that could help someone in the future.

Last edited by Munra; 06-10-2012 at 11:21 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Pre-X screen resolution gone worng gonesouthwest Linux - General 4 05-02-2011 01:37 PM
sorry worng forum, please delete jg167 Fedora 1 07-10-2010 07:32 PM
Worng configuration in /etc/fstab after installing Mandrake 10 Community scasagra Mandriva 4 08-04-2004 05:13 PM
Posted this in the worng forum before maybe you guys could help.... sph90457 Linux - Games 1 10-22-2003 04:59 PM
what is worng with my vhosts config? b_usa Linux - Networking 9 04-06-2003 03:12 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 07:48 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration