Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - rolfp

1
Raspberry PI / WLAN statt LAN
« on: August 23, 2014, 13:16:34 »
Uups, hatte ich übersehen

Auszug (auffällig):
Driver did not support SIOCSIWENCODEEXT
wlan0: WPA: Failed to set PTK to the driver (alg=3 keylen=16 bssid=64:70:02:32:b9:b9)

Code: [Select]
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=7):
     54 65 73 74 5f 41 50                              Test_AP         
scan_ssid=1 (0x1)
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='Test_AP'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy0
rfkill: Cannot open RFKILL control device
WEXT: RFKILL status not available
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: 7c:dd:90:5b:79:6a
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 11 d1 6e b3 74 0d 5b cd 85 77 42 5e 7d b0 7c 18
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     54 65 73 74 5f 41 50                              Test_AP         
wlan0: Starting AP scan for specific SSID(s)
Scan requested (ret=0) - scan timeout 10 seconds
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
wlan0: Failed to get scan results
wlan0: Failed to get scan results - try scanning again
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 30 seconds
wlan0: Failed to initiate AP scan
wlan0: Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5620 bytes of scan results (13 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 64:70:02:32:b9:b9 SSID 'Test_AP'
wlan0: BSS: Add new id 1 BSSID 30:85:a9:6d:c9:f8 SSID 'vdr24'
wlan0: BSS: Add new id 2 BSSID 74:31:70:e6:98:ef SSID 'WLAN-E69805'
wlan0: BSS: Add new id 3 BSSID 00:1a:4f:92:ea:46 SSID 'x-route'
wlan0: BSS: Add new id 4 BSSID 00:1c:28:6a:e9:e7 SSID 'NETCONNECT-7732'
wlan0: BSS: Add new id 5 BSSID 00:1f:33:b6:11:0c SSID 'Mallorca'
wlan0: BSS: Add new id 6 BSSID 9c:c7:a6:e0:17:ff SSID 'FRITZ!Box Fon WLAN 7360'
wlan0: BSS: Add new id 7 BSSID 5c:a3:9d:6a:b5:b8 SSID 'UPC248465271'
wlan0: BSS: Add new id 8 BSSID 00:01:e3:46:7f:75 SSID 'Netzwerktotal1'
wlan0: BSS: Add new id 9 BSSID c4:27:95:bb:79:dd SSID 'UPC2294812'
wlan0: BSS: Add new id 10 BSSID c8:d3:a3:50:10:b6 SSID 'DALOVE'
wlan0: BSS: Add new id 11 BSSID 04:0b:6b:2f:95:88 SSID 'Telekom'
wlan0: BSS: Add new id 12 BSSID 00:1c:f0:00:fa:5d SSID 'dlink'
Add randomness: count=1 entropy=0
Add randomness: count=2 entropy=1
Add randomness: count=3 entropy=2
Add randomness: count=4 entropy=3
Add randomness: count=5 entropy=4
Add randomness: count=6 entropy=5
Add randomness: count=7 entropy=6
Add randomness: count=8 entropy=7
Add randomness: count=9 entropy=8
Add randomness: count=10 entropy=9
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 64:70:02:32:b9:b9 ssid='Test_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-25
wlan0:    selected based on RSN IE
wlan0:    selected BSS 64:70:02:32:b9:b9 ssid='Test_AP'
wlan0: Request association: reassociate: 0  selected: 64:70:02:32:b9:b9  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlan0: Trying to associate with 64:70:02:32:b9:b9 (SSID='Test_AP' freq=2462 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK CCMP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Association request to the driver failed
wlan0: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=154
AssocResp IE wireless event - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 33 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 0f 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 34 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00

27 a4 00 00 42 43 5e 00 62 32 2f 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 64:70:02:32:b9:b9
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 33 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 34 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43

5e 00 62 32 2f 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=64:70:02:32:b9:b9
Add randomness: count=11 entropy=10
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 64:70:02:32:b9:b9
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: RX EAPOL from 64:70:02:32:b9:b9
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1

12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11

77 55 a1 12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 64:70:02:32:b9:b9 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=11
WPA: Renewed SNonce - hexdump(len=32): 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8 e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9
WPA: PTK derivation - A1=7c:dd:90:5b:79:6a A2=64:70:02:32:b9:b9
WPA: Nonce1 - hexdump(len=32): 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8 e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9
WPA: Nonce2 - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 22 d9 15 25 aa 1e 97 05 cd e8 a8 0e dc 8e ea 59
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8

e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 d9 15 25 aa 1e

97 05 cd e8 a8 0e dc 8e ea 59 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: RX EAPOL from 64:70:02:32:b9:b9
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1

12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 74 71 83 c6 05 46 7a 91

38 61 36 f9 7d e2 aa 00 38 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd 22 01 8f 03 59 96

33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
wlan0: IEEE 802.1X RX: version=2 type=3 length=151
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): ac 74 71 83 c6 05 46 7a 91 38 61 36 f9 7d e2 aa
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11

77 55 a1 12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 74 71 83 c6 05

46 7a 91 38 61 36 f9 7d e2 aa 00 38 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd 22 01 8f

03 59 96 33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
RSN: encrypted key data - hexdump(len=56): 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd

22 01 8f 03 59 96 33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 64:70:02:32:b9:b9 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 a9 58 df 63 66 45 02 9c

1b 2b 63 35 f0 bf d2 8b dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 35 a4 78 76 18 16 eb b0 c4 28 b8 2d 32 a5 b4 94
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 a4 78 76 18 16

eb b0 c4 28 b8 2d 32 a5 b4 94 00 00
wlan0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
Driver did not support SIOCSIWENCODEEXT
wlan0: WPA: Failed to set PTK to the driver (alg=3 keylen=16 bssid=64:70:02:32:b9:b9)
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: Setting scan request: 5 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification


2
Raspberry PI / WLAN statt LAN
« on: August 23, 2014, 09:25:05 »
Die wlan-Einstellungen sind ok. Leider auch mit der neuesten Version von MLD das gleiche Fehlerbild. TKIP funktioniert, AES -> Fehler.

Nur zur Info: habe mit openelec und raspbian den Stick getestet. Der Stick läuft hier auch mit AES einwandfrei.
 

3
Raspberry PI / Unterstützung IRF Media W-01RN Remote Controller
« on: August 23, 2014, 07:56:46 »
Große Klasse!

mit der neuesten MLD-Client Version (dem neuesten hid-Paket) funktioniert der IR-Empfänger mit der Fernbedienung auf Anhieb! Out of the box .......

Bin begeistert, vielen Dank!

Ergänzung:
Sehe gerade die Fernbedienung+Empfänger gibt es hier http://www.ebay.de/itm/USB-Media-MCE-Desktop-Computer-PC-Fernbedienung-remote-Controller-fuer-XP-Vista-7-/261172865042?ssPageName=ADME:L:OC:DE:3160 immer noch zu kaufen. Klare Empfehlung von mir wenn man zum Testen von openelec/xbmc oder MLD mal eben eine Fernbedienung braucht. Alle Tasten funktionieren out of the box. Mir ist nicht ganz klar wieso eigentlich, aber manchmal bin ich auch froh wenn etwas auf Anhieb funktioniert.
 

4
Raspberry PI / Unterstützung IRF Media W-01RN Remote Controller
« on: August 22, 2014, 10:48:47 »
Kann es leider nicht testen, da beim Upgrade bzw. Neuinstallation des Paketes die bekannten Fehler auftreten.

.....it would break existing dependencies
 

5
Raspberry PI / WLAN statt LAN
« on: August 21, 2014, 13:40:13 »
Hier das Scanergebnis für den AP (ich wohne mitten in Köln: der Scan findet ~ 15 APs :) )

Quote
          Cell 04 - Address: 64:70:02:32:B9:B9
                    Channel:11
                    Frequency:2.462 GHz (Channel 11)
                    Quality=70/70  Signal level=-19 dBm 
                    Encryption key:on
                    ESSID:"Test_AP"
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
                              9 Mb/s; 12 Mb/s; 18 Mb/s
                    Bit Rates:24 Mb/s; 36 Mb/s; 48 Mb/s; 54 Mb/s
                    Mode:Master
                    Extra:tsf=00000000319cc50f
                    Extra: Last beacon: 0ms ago
                    IE: Unknown: 0007546573745F4150
                    IE: Unknown: 010882848B960C121824
                    IE: Unknown: 03010B
                    IE: Unknown: 2A0100
                    IE: IEEE 802.11i/WPA2 Version 1
                        Group Cipher : CCMP
                        Pairwise Ciphers (1) : CCMP
                        Authentication Suites (1) : PSK
                    IE: Unknown: 32043048606C
                    IE: Unknown: 2D1A6E1003FF00000000000000000000000000000000000000000000
                    IE: Unknown: 331A6E1003FF00000000000000000000000000000000000000000000
                    IE: Unknown: 3D160B0F0000000000000000000000000000000000000000
                    IE: Unknown: 34160B0F0000000000000000000000000000000000000000
                    IE: Unknown: DD0900037F01010000FF7F

wpa_supplicant.conf:
Quote
network={
    ssid="Test_AP"
    scan_ssid=1
    key_mgmt=WPA-PSK
    proto=RSN
    pairwise=CCMP
    group=CCMP
    psk="0232B9B9xy"
}

6
Raspberry PI / WLAN statt LAN
« on: August 21, 2014, 12:33:35 »
Rückmeldung: Passwort in der wpa_supplicant.conf im Klartext brachte leider keinen Erfolg.  Immer noch kein dauerhafter Connect, immer noch die gleiche Fehlermeldung. Habe das System noch einmal komplett neu aufgesetzt. Fehler bleibt. Offenes System oder WPA/TKIP oder WPA2/TKIP funktionieren einwandfrei, nur mit AES-Verschlüsselung Fehler!
 

7
Raspberry PI / WLAN statt LAN
« on: August 19, 2014, 15:08:03 »
Hier ein log des Netzwerkscans und die daraus abgeleitete wpa_supplicant.conf. Sieht für mich ok aus.

Der Netzwerk Scan ergibt für den AP:
Quote
          Cell 04 - Address: 30:85:A9:6D:C9:F8
                    Channel:6
                    Frequency:2.437 GHz (Channel 6)
                    Quality=70/70  Signal level=-21 dBm 
                    Encryption key:on
                           .
                           .
                   IE: IEEE 802.11i/WPA2 Version 1
                        Group Cipher : CCMP
                        Pairwise Ciphers (1) : CCMP
                        Authentication Suites (1) : PSK
                    IE: Unknown: 32040C121860
                    IE: Unknown: 2D1ABD1917FFFFFF0000000000000000000000000000000000000000
                    IE: Unknown: 3D1606081500000000000000000000000000000000000000
                    IE: Unknown: 7F080000000000000040
                    IE: Unknown: DD090010180201001C0000
                    IE: Unknown: DD180050F2020101840003A4000027A4000042435E0062322F00D

Die automatisch erstellte wpa_supplicant.conf:
Quote
network={
    ssid="vdr24"
    scan_ssid=1
    key_mgmt=WPA-PSK
    proto=RSN
    pairwise=CCMP
    group=CCMP
    psk=573f1c889a4a6fdb5df731b56df0ec78e11ccf4cd8cbad5b2a79e8cfa9c901e0
}

Daraus folgt in /var/log/messages:
Quote
Aug 19 15:04:34 (none) user.info kernel: [ 1551.814712] wlan0: authenticate with 30:85:a9:6d:c9:f8
Aug 19 15:04:34 (none) user.info kernel: [ 1551.878150] wlan0: send auth to 30:85:a9:6d:c9:f8 (try 1/3)
Aug 19 15:04:34 (none) user.info kernel: [ 1551.880240] wlan0: authenticated
Aug 19 15:04:34 (none) user.info kernel: [ 1551.889879] wlan0: associate with 30:85:a9:6d:c9:f8 (try 1/3)
Aug 19 15:04:34 (none) user.info kernel: [ 1551.893052] wlan0: RX AssocResp from 30:85:a9:6d:c9:f8 (capab=0x411 status=0 aid=2)
Aug 19 15:04:34 (none) user.info kernel: [ 1551.906680] wlan0: associated
Aug 19 15:04:34 (none) user.info kernel: [ 1552.134535] wlan0: deauthenticating from 30:85:a9:6d:c9:f8 by local choice (Reason: 1=UNSPECIFIED)
Aug 19 15:04:34 (none) user.info kernel: [ 1552.197244] cfg80211: Calling CRDA to update world regulatory domain

Upps, jetzt beim Schreiben der Antwort bemerke ich, dass das Problem wahrscheinlich hiermit zu tun hat: "deauthenticating from 30:85:a9:6d:c9:f8 by local choice (Reason: 1=UNSPECIFIED)"  !!!!
 

8
Raspberry PI / Unterstützung IRF Media W-01RN Remote Controller
« on: August 19, 2014, 09:46:25 »
Diese IRF Media W-01RN Fernbedienung funktioniert in XBMC, Openelec out of the box. Anscheinend nicht mit der MLD-Distribution.

Beschreibung: http://wiki.xbmc.org/index.php?title=IRF_Media_W-01RN

Den Kerneltreiber gibt es hier http://gitorious.org/hid-aureal-kernel-module

Gibt es unter MLD vielleicht doch eine direkte Möglichkeit den Controller zu betreiben?

9
Raspberry PI / WLAN statt LAN
« on: August 19, 2014, 08:14:13 »
Bei mir funktioniert WLAN-Betrieb mit einem USB-Stick (Ralink Chipsatz RT5372) folgendermassen:

- DHCP bei WLAN ein (mit statischer Adresse wird bei meiner Installation nach einem Reboot wlan0 keine IP-Adresse zugeordnet!?)
- IP-Adresse LAN gelöscht  (NETWORK_IP="")

aber ... es gibt leider noch ein Problem: die AES Verschlüsselung funktioniert nicht. Mit einer Kombination WPA/AES und WPA2/AES gibt es immer einen Authorisierungsfehler beim Verbindungsaufbau. WPA/TKIP und WPA2/TKIP funktionieren einwandfrei. Habe ich an 3 verschiedenen APs testen können. Fehlt hier ein Paket oder fehlt dem Kernel die AES-Unterstützung?


10
Raspberry PI / Webinterface Fehlerhafte Anzeige
« on: August 17, 2014, 08:28:57 »
Lese leider erst heute deine letzten Kommentar in diesem Thread. Hatte ich übersehen.

Genau gestern ab Mittag hatte ich zum ersten mal versucht die MLD-Distrubution zu installieren und gekämpft, gekämpft und geflucht. Wollte schon einen bösen Kommentar schreiben. Hatte mich extra dazu registriert. Na ja, jetzt läuft alles. Bin trotzdem aufgrund stundenlanger Fehlersuche immer noch etwas frustriert.