[gelöst] wiedermal ipw2200 und wpa_supplicant

Einrichten des lokalen Netzes, Verbindung zu anderen Computern und Diensten.
Antworten
DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

[gelöst] wiedermal ipw2200 und wpa_supplicant

Beitrag von DarkEvil » 05.02.2006 18:05:44

moin,

ich sitze seit 11 Uhr wieder mal am wpa & ipw problem. vielleicht kann einer helfen...

wpa_supplicant.conf

Code: Alles auswählen

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1

network={
     ssid="linux"
     scan_ssid=1
     #mode=0
     proto=WPA
     #proto=WPA
     key_mgmt=WPA-PSK
     pairwise=TKIP
     group=TKIP
     psk="bla"
}
iwconfig -v

Code: Alles auswählen

iwconfig  Wireless-Tools version 28
          Compatible with Wireless Extension v11 to v19.

Kernel    Currently compiled with Wireless Extension v19.

eth1      Recommend Wireless Extension v16 or later,
          Currently compiled with Wireless Extension v19.

iwlist scan

Code: Alles auswählen

lo        Interface doesn't support scanning.

eth0      Interface doesn't support scanning.

eth1      Scan completed :
          Cell 01 - Address: 00:90:96:CF:49:4B
                    ESSID:"linux"
                    Protocol:IEEE 802.11bg
                    Mode:Master
                    Channel:5
                    Encryption key:on
                    Bit Rates:54 Mb/s
                    Extra: Rates (Mb/s): 1 2 5.5 6 9 11 12 18 24 36 48 54
                    Quality=84/100  Signal level=-46 dBm
                    Extra:wpa_ie=dd160050f20101000050f20201000050f20201000050f202
                    Extra: Last beacon: 319ms ago

eth2      Interface doesn't support scanning.

sit0      Interface doesn't support scanning.


uname -r

Code: Alles auswählen

2.6.15-1-686
wpa_supplicant -i eth1 -c /etc/wpa -D wext -dd

Code: Alles auswählen

Initializing interface 'eth1' conf '/etc/wpa' driver 'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa' -> '/etc/wpa'
Reading configuration file '/etc/wpa'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
Line: 6 - start of a new network block
ssid - hexdump_ascii(len=5):
     6c 69 6e 75 78                                    linux
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='linux'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=19 WE(source)=16 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: 00:12:f0:00:29:a5
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=5):
     6c 69 6e 75 78                                    linux
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:90:96:cf:49:4b
State: SCANNING -> ASSOCIATED
Associated to a new BSS: BSSID=00:90:96:cf:49:4b
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:90:96:cf:49:4b
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0e:50:27:78:5a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:27:78:5a (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): d8 50 78 9d 4b c8 2b f4 50 d2 6b 68 41 1c 32 3c 7a 34 15 21 1a 0d f9 af a8 fa 16 59 75 b7 46 38
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 d8 50 78 9d 4b c8 2b f4 50 d2 6b 68 41 1c 32 3c 7a 34 15 21 1a 0d f9 af a8 fa 16 59 75 b7 46 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa c2 3c 6a 85 e0 20 e7 37 7c 80 dd f6 54 66 8c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:27:78:5a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:27:78:5a (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 d8 50 78 9d 4b c8 2b f4 50 d2 6b 68 41 1c 32 3c 7a 34 15 21 1a 0d f9 af a8 fa 16 59 75 b7 46 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 21 c4 26 7e 91 3b b7 e1 64 95 ad ff c4 1a be 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:27:78:5a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:27:78:5a (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 d8 50 78 9d 4b c8 2b f4 50 d2 6b 68 41 1c 32 3c 7a 34 15 21 1a 0d f9 af a8 fa 16 59 75 b7 46 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 e4 7d 4a 6e d6 84 ea 2c cd 85 f0 31 51 1d af 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:27:78:5a
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 47 6a 1a 1e ae 7d 0e fd af a5 e3 6d df bf 54 51 bb 4d aa d7 36 2b dd 2f b2 d5 10 b8 af 0f 37 b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:27:78:5a (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 d8 50 78 9d 4b c8 2b f4 50 d2 6b 68 41 1c 32 3c 7a 34 15 21 1a 0d f9 af a8 fa 16 59 75 b7 46 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 23 07 4b 4b 28 e1 02 0d 73 31 d1 f2 2d 24 3e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
Scan timeout - try to get results
Received 442 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:90:96:cf:49:4b ssid='linux' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Already associated with the selected AP.
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:90:96:cf:49:4b into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: SCANNING -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 00:90:96:cf:49:4b from blacklist (clear)
Cancelling scan request
dmesg | grep ipw

Code: Alles auswählen

ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, git-1.0.8
ipw2200: Copyright(c) 2003-2005 Intel Corporation
ipw2200: Detected Intel PRO/Wireless 2200BG Network Connection
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
dmesg wenn der wpa_suppsen läuft

Code: Alles auswählen

ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
lsmod | grep ieee

Code: Alles auswählen

ieee80211_crypt_wep     4576  0
ieee80211_crypt_ccmp     6560  0
ieee80211_crypt_tkip     9920  0
ieee80211              29064  1 ipw2200
ieee80211_crypt         5344  4 ieee80211_crypt_wep,ieee80211_crypt_ccmp,ieee80211_crypt_tkip,ieee80211
ieee1394               88152  2 eth1394,ohci1394
lsmod | grep ipw

Code: Alles auswählen

ipw2200                96236  0
ieee80211              29064  1 ipw2200
firmware_class          9696  2 pcmcia,ipw2200
Ich hoffe die infos reichen 8)

irgentwie weiss ich nicht mehr weiter, es müsste doch laufen....GGGGRRRRRR

Danke ...
Zuletzt geändert von DarkEvil am 06.02.2006 17:14:09, insgesamt 1-mal geändert.

Benutzeravatar
H4kk3r
Beiträge: 724
Registriert: 02.01.2006 16:50:51
Wohnort: in der Nähe von Heidelberg

Beitrag von H4kk3r » 05.02.2006 18:10:07

Hier findest du meine configs:
http://www.debianforum.de/forum/viewtop ... highlight=
In der wpa_supplicant.conf habe ich alles für wpa2 eingestellt, die Zeilen für wpa sind auskommentiert.
Gruß, Marcus

„Well done! We did it!“

Debian testing
kernel 2.6.18.3
IBM R50e UR0S5GE

DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

Beitrag von DarkEvil » 05.02.2006 18:27:39

danke, aber bringt nichts.

dmesg bringt folgende ausgabe:

Code: Alles auswählen

ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ADDRCONF(NETDEV_UP): eth1: link is not ready
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40
eth1: no IPv6 routers present
ipw2200: Unknown notification: subtype=40,flags=0xa0,size=40

Interessant ist iwconfig

Code: Alles auswählen

lo        no wireless extensions.

eth0      no wireless extensions.

eth1      IEEE 802.11g  ESSID:"linux"
          Mode:Managed  Frequency:2.432 GHz  Access Point: 00:90:96:CF:49:4B
          Bit Rate=54 Mb/s   Tx-Power=20 dBm
          Retry limit:7   RTS thr:off   Fragment thr:off
          Encryption key:off
          Power Management:off
          Link Quality=98/100  Signal level=-39 dBm  Noise level=-89 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:5   Missed beacon:0

eth2      no wireless extensions.

sit0      no wireless extensions.


Benutzeravatar
H4kk3r
Beiträge: 724
Registriert: 02.01.2006 16:50:51
Wohnort: in der Nähe von Heidelberg

Beitrag von H4kk3r » 05.02.2006 18:36:26

Starte mal nur den wpasupplicant. Kommen dann Fehlermeldungen?
Gruß, Marcus

„Well done! We did it!“

Debian testing
kernel 2.6.18.3
IBM R50e UR0S5GE

DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

Beitrag von DarkEvil » 05.02.2006 18:41:01

Code: Alles auswählen

 
wpa_supplicant -ieth1 -Dwext -c/etc/wpa_supplicant.conf

Associated with 00:90:96:cf:49:4b
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:90:96:cf:49:4b (SSID='linux' freq=0 MHz)
Associated with 00:90:96:cf:49:4b
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-TERMINATING - signal 2 received

Benutzeravatar
H4kk3r
Beiträge: 724
Registriert: 02.01.2006 16:50:51
Wohnort: in der Nähe von Heidelberg

Beitrag von H4kk3r » 05.02.2006 19:17:33

Übersetze mal den preshared key mit wpa_passphrase und trage das so ein wie ich.
Gruß, Marcus

„Well done! We did it!“

Debian testing
kernel 2.6.18.3
IBM R50e UR0S5GE

DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

Beitrag von DarkEvil » 05.02.2006 22:52:29

ich weiss das die vermutung nahe liegt das der key falsch ist...aber ich habe bereits alle möglichkeiten durchprobiert. daran scheint es nicht zu liegen...

vielleicht noch eine idee!!!

gruss

Benutzeravatar
H4kk3r
Beiträge: 724
Registriert: 02.01.2006 16:50:51
Wohnort: in der Nähe von Heidelberg

Beitrag von H4kk3r » 05.02.2006 23:52:28

Mir ist egal, ob der key, den du beim Router angegeben hast der selbe ist. Wenn der wpasupplicant schon nicht richtig startet, stimmt irgendwas in der config nicht. Startest du ihn von Hand (/etc/init.d/wpasupplicant start) ohne das Netzwerk, muss das dabei das Folgende herauskommen, wenn man für's debugging nur "-d" verwendet, du benutzt "-dd".

Code: Alles auswählen

Starting wpa_supplicant: Daemonize..
done.
Danach kann man sich um das richtige Passwort kümmern. Er spuckt auf jeden Fall was über den Schlüssel aus. Ich tippe mal darauf, dass 3 Zeichen zu wenig sind. Verschlüsselt sind alle keys gleich lang.
Gruß, Marcus

„Well done! We did it!“

Debian testing
kernel 2.6.18.3
IBM R50e UR0S5GE

DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

Beitrag von DarkEvil » 06.02.2006 13:01:20

ich habe exact alle einstellungen von dir übernommen. nun läuft er als daemon über init.d.

wenn ich mich nun mit wpa_cli verbinde sehe ich immer noch das die keys falsch sind.
ich weiss nicht, aber vielleicht liegst am router...oder ich bin zu doof.

Ich habe mal eben versucht das ganze mit WEP und wpa_supplicant zu machen, das geht ohne Probleme.

wie kommst Du darauf, das bei mit 3 Stellen falsch sind.

DarkEvil
Beiträge: 58
Registriert: 26.01.2004 10:56:55
Wohnort: Hamburg

Beitrag von DarkEvil » 06.02.2006 17:14:58

Es lag am Wireless-Lan Router. Nach tausch auf ein anderes Gerät ... alles i.O.

Antworten