1 [2] Archiv / MLD 4.x / Raspberry PI / WLAN statt LAN
 

Offline rolfp

  • Newbie
  • *
  • Posts: 10
    • View Profile
WLAN statt LAN
« Reply #15 on: August 23, 2014, 13:16:34 »
Uups, hatte ich übersehen

Auszug (auffällig):
Driver did not support SIOCSIWENCODEEXT
wlan0: WPA: Failed to set PTK to the driver (alg=3 keylen=16 bssid=64:70:02:32:b9:b9)

Code: [Select]
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=7):
     54 65 73 74 5f 41 50                              Test_AP         
scan_ssid=1 (0x1)
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='Test_AP'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy0
rfkill: Cannot open RFKILL control device
WEXT: RFKILL status not available
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: 7c:dd:90:5b:79:6a
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 11 d1 6e b3 74 0d 5b cd 85 77 42 5e 7d b0 7c 18
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     54 65 73 74 5f 41 50                              Test_AP         
wlan0: Starting AP scan for specific SSID(s)
Scan requested (ret=0) - scan timeout 10 seconds
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
wlan0: Failed to get scan results
wlan0: Failed to get scan results - try scanning again
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 30 seconds
wlan0: Failed to initiate AP scan
wlan0: Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5620 bytes of scan results (13 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 64:70:02:32:b9:b9 SSID 'Test_AP'
wlan0: BSS: Add new id 1 BSSID 30:85:a9:6d:c9:f8 SSID 'vdr24'
wlan0: BSS: Add new id 2 BSSID 74:31:70:e6:98:ef SSID 'WLAN-E69805'
wlan0: BSS: Add new id 3 BSSID 00:1a:4f:92:ea:46 SSID 'x-route'
wlan0: BSS: Add new id 4 BSSID 00:1c:28:6a:e9:e7 SSID 'NETCONNECT-7732'
wlan0: BSS: Add new id 5 BSSID 00:1f:33:b6:11:0c SSID 'Mallorca'
wlan0: BSS: Add new id 6 BSSID 9c:c7:a6:e0:17:ff SSID 'FRITZ!Box Fon WLAN 7360'
wlan0: BSS: Add new id 7 BSSID 5c:a3:9d:6a:b5:b8 SSID 'UPC248465271'
wlan0: BSS: Add new id 8 BSSID 00:01:e3:46:7f:75 SSID 'Netzwerktotal1'
wlan0: BSS: Add new id 9 BSSID c4:27:95:bb:79:dd SSID 'UPC2294812'
wlan0: BSS: Add new id 10 BSSID c8:d3:a3:50:10:b6 SSID 'DALOVE'
wlan0: BSS: Add new id 11 BSSID 04:0b:6b:2f:95:88 SSID 'Telekom'
wlan0: BSS: Add new id 12 BSSID 00:1c:f0:00:fa:5d SSID 'dlink'
Add randomness: count=1 entropy=0
Add randomness: count=2 entropy=1
Add randomness: count=3 entropy=2
Add randomness: count=4 entropy=3
Add randomness: count=5 entropy=4
Add randomness: count=6 entropy=5
Add randomness: count=7 entropy=6
Add randomness: count=8 entropy=7
Add randomness: count=9 entropy=8
Add randomness: count=10 entropy=9
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 64:70:02:32:b9:b9 ssid='Test_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-25
wlan0:    selected based on RSN IE
wlan0:    selected BSS 64:70:02:32:b9:b9 ssid='Test_AP'
wlan0: Request association: reassociate: 0  selected: 64:70:02:32:b9:b9  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlan0: Trying to associate with 64:70:02:32:b9:b9 (SSID='Test_AP' freq=2462 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK CCMP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Association request to the driver failed
wlan0: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=154
AssocResp IE wireless event - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 33 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 0f 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 34 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00

27 a4 00 00 42 43 5e 00 62 32 2f 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 64:70:02:32:b9:b9
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 33 1a 6e 10 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 34 16 0b 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43

5e 00 62 32 2f 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=64:70:02:32:b9:b9
Add randomness: count=11 entropy=10
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 64:70:02:32:b9:b9
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: RX EAPOL from 64:70:02:32:b9:b9
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1

12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11

77 55 a1 12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 64:70:02:32:b9:b9 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=11
WPA: Renewed SNonce - hexdump(len=32): 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8 e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9
WPA: PTK derivation - A1=7c:dd:90:5b:79:6a A2=64:70:02:32:b9:b9
WPA: Nonce1 - hexdump(len=32): 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8 e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9
WPA: Nonce2 - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 22 d9 15 25 aa 1e 97 05 cd e8 a8 0e dc 8e ea 59
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 50 d7 e3 cf dc 61 1e 13 72 bf 13 9b 77 59 6f 16 ad cc 4c e8

e7 d2 63 e9 6a ea c4 6a e7 f8 2d c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 d9 15 25 aa 1e

97 05 cd e8 a8 0e dc 8e ea 59 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: RX EAPOL from 64:70:02:32:b9:b9
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1

12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 74 71 83 c6 05 46 7a 91

38 61 36 f9 7d e2 aa 00 38 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd 22 01 8f 03 59 96

33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
wlan0: IEEE 802.1X RX: version=2 type=3 length=151
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11 77 55 a1 12 a3 33 91 5a 20 a0 87 a4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): ac 74 71 83 c6 05 46 7a 91 38 61 36 f9 7d e2 aa
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 d3 43 d4 7f 21 2f 98 97 78 dc d5 b8 6b cb cd 26 32 87 a7 11

77 55 a1 12 a3 33 91 5a 20 a0 87 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 74 71 83 c6 05

46 7a 91 38 61 36 f9 7d e2 aa 00 38 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd 22 01 8f

03 59 96 33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
RSN: encrypted key data - hexdump(len=56): 4d bc 00 f6 5d fc 90 61 57 14 cf d6 c8 ac 3d ca 99 f9 e5 81 5b 80 58 aa cf f2 55 d3 f6 8d 51 7b b3 56 fd

22 01 8f 03 59 96 33 06 a1 27 e7 2a 81 10 3b 43 cf f0 3d 08 0f
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 64:70:02:32:b9:b9 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 a9 58 df 63 66 45 02 9c

1b 2b 63 35 f0 bf d2 8b dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 35 a4 78 76 18 16 eb b0 c4 28 b8 2d 32 a5 b4 94
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 a4 78 76 18 16

eb b0 c4 28 b8 2d 32 a5 b4 94 00 00
wlan0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
Driver did not support SIOCSIWENCODEEXT
wlan0: WPA: Failed to set PTK to the driver (alg=3 keylen=16 bssid=64:70:02:32:b9:b9)
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: Setting scan request: 5 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification


Online clausmuus

  • Administrator
  • Expert Member
  • ********
  • Posts: 20456
    • View Profile
    • ClausMuus.de
WLAN statt LAN
« Reply #16 on: August 23, 2014, 13:58:18 »
Hi,

mir sagt das auch erst einmal nichts.

Welcher wlan treiber wurde denn unter raspbian (oder openelac) geladen und welcher wird unter MLD genommen. Werden unter raspbian noch weitere wlan Module geladen? Poste mal das lsmod von raspbian und mld.

Claus
MLD 5.5 - Raspberry PI - 7" Touch TFT - Squeeze Play
MLD 5.5 - lirc yaUsbIR - OctopusNet - XFX GeForce 9300 mit Intel E3200 - 2GB RAM - 12TB HDD - Lian Li PC-C37B - Samsung LE40A559

Online clausmuus

  • Administrator
  • Expert Member
  • ********
  • Posts: 20456
    • View Profile
    • ClausMuus.de
WLAN statt LAN
« Reply #17 on: August 23, 2014, 14:44:27 »
Teste mal bitte das neue wlan Paket. Falls damit das Kernel Modul lib80211_crypt_ccmp.ko nicht automatisch geladen wird, lade das mal von Hand.

Claus
MLD 5.5 - Raspberry PI - 7" Touch TFT - Squeeze Play
MLD 5.5 - lirc yaUsbIR - OctopusNet - XFX GeForce 9300 mit Intel E3200 - 2GB RAM - 12TB HDD - Lian Li PC-C37B - Samsung LE40A559

Offline peter_mld

  • Newbie
  • *
  • Posts: 24
    • View Profile
WLAN statt LAN
« Reply #18 on: August 23, 2014, 17:29:43 »
Hallo,
Ich kann mich ebenfalls nicht via WLAN an meinem AP (WPA2 AES) anmelden:
Code: [Select]
MLD> wpa_supplicant -i wlan0 -c /etc/wpa_supplicant.conf -ddd
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=3):
     41 4b 35                                          AK5
scan_ssid=1 (0x1)
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='AK5'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy0
rfkill: Cannot open RFKILL control device
WEXT: RFKILL status not available
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: c8:d3:a3:09:cb:d9
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 55 75 d4 2f 93 77 55 b7 9e a4 fe a4 06 fb 2b 4a
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
wlan0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=3):
     41 4b 35                                          AK5
wlan0: Starting AP scan for specific SSID(s)
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 1073 bytes of scan results (2 BSSes)
Sorted scan results
08:96:d7:6f:75:19 freq=2432 qual=37 noise=0 level=-73 flags=0xa
00:24:fe:ab:87:fd freq=2452 qual=33 noise=0 level=-77 flags=0xa
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 08:96:d7:6f:75:19 SSID 'AK5'
wlan0: BSS: Add new id 1 BSSID 00:24:fe:ab:87:fd SSID 'Multibox 7270 NGN'
Add randomness: count=1 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=2 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=4
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=4
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=4
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=3
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=4
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
wlan0: Selecting BSS from priority group 0
wlan0: 0: 08:96:d7:6f:75:19 ssid='AK5' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps
wlan0:    selected based on RSN IE
wlan0:    selected BSS 08:96:d7:6f:75:19 ssid='AK5'
wlan0: Request association: reassociate: 0  selected: 08:96:d7:6f:75:19  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlan0: Trying to associate with 08:96:d7:6f:75:19 (SSID='AK5' freq=2432 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK CCMP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
ioctl[SIOCSIWFREQ]: Device or resource busy
wlan0: Association request to the driver failed
wlan0: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=11
wlan0: Authentication with 08:96:d7:6f:75:19 timed out.
Added BSSID 08:96:d7:6f:75:19 into blacklist
wlan0: No keys have been configured - skip key clearing
wlan0: State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: Setting scan request: 1 sec 0 usec
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
....

Code: [Select]
MLD> lsmod
Module                  Size  Used by    Not tainted
lib80211_crypt_ccmp     4311  0
lib80211                5525  1 lib80211_crypt_ccmp
rt2800usb              16940  0
rt2800lib              79432  1 rt2800usb
crc_ccitt               1525  1 rt2800lib
rt2x00usb              11725  1 rt2800usb
rt2x00lib              44473  3 rt2800usb,rt2800lib,rt2x00usb
mac80211              352149  3 rt2800lib,rt2x00usb,rt2x00lib
cfg80211              227394  2 rt2x00lib,mac80211
snd_bcm2835            19438  0
snd_pcm                85354  1 snd_bcm2835
snd_timer              20369  1 snd_pcm
snd                    58736  3 snd_bcm2835,snd_pcm,snd_timer

'lib80211_crypt_ccmp' habe ich manuell geladen.

Gruß,
Peter

Offline gelium

  • Newbie
  • *
  • Posts: 7
    • View Profile
WLAN statt LAN
« Reply #19 on: January 30, 2015, 20:21:13 »
Hi,

wurde das "deauthenticating"-Problem gelöst? Wenn ja, wie?

Romam

1 [2] Archiv / MLD 4.x / Raspberry PI / WLAN statt LAN
 



Users Online Users Online

0 Members and 1 Guest are viewing this topic.