[erledigt] WLAN mit Linux... (RTL8188SU)

Einrichten des lokalen Netzes, Verbindung zu anderen Computern und Diensten.
Antworten
mynona
Beiträge: 3
Registriert: 18.06.2011 12:44:31

[erledigt] WLAN mit Linux... (RTL8188SU)

Beitrag von mynona » 18.06.2011 13:36:01

Hallo,

nachdem ich vergeblich versucht habe mit meiner eingebauten WLAN-Karte (Intel® PRO/Wireless 2200BG) ins Netz zu kommen und da ja auch einiges an Problemen in Foren dokumentiert ist, dachte ich, ich versuchs mal anders und habe mir einen WLAN-USB-Stick mit Realtek RTL8188SU besorgt. Mit diesem bin ich zwar weiter gekommen als mit dem Intel-Teil (habe sogar eine IP bekommen) aber ins WWW komme ich dennoch nicht. Unten eine hoffentlich aussagekräftige Liste mit Output meines Rechners (übrigens ein älterer Samsung R50 mit Debian "Squeeze"). Ist das "Encryption key:on" bei WPA2 eigentlich normal?

Vielen Dank schon mal im Voraus!!

Code: Alles auswählen

# lsusb | grep RTL
Bus 001 Device 002: ID 0bda:8171 Realtek Semiconductor Corp. RTL8188SU 802.11n WLAN Adapter

Code: Alles auswählen

# lsmod | grep 8192
r8192s_usb            267436  0 
usbcore                98541  4 r8192s_usb,uhci_hcd,ehci_hcd

Code: Alles auswählen

# iwlist scanning
Cell 05 - Address: 5C:D9:98:E1:F0:28
                    ESSID:"myssid"
                    Protocol:IEEE802.11N-24G
                    Mode:Master
                    Channel:6
                    Encryption key:on
                    Bit Rates:300 Mb/s
                    Extra: Rates (Mb/s): 1 2 5.5 6 11 9 12 18 24 36 48 54 
                    Quality=86/100  Signal level=-59 dBm  Noise level=-113 dBm
                    IE: WPA Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (2) : CCMP TKIP
                        Authentication Suites (1) : PSK
                    IE: IEEE 802.11i/WPA2 Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (2) : CCMP TKIP
                        Authentication Suites (1) : PSK
                    Extra: Last beacon: 66ms ago

Code: Alles auswählen

# cat /etc/network/interfaces
auto lo
iface lo inet loopback

iface eth0 inet dhcp

iface wlan0 inet dhcp
pre-up wpa_supplicant -B -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf
post-down killall -q wpa_supplicant

Code: Alles auswählen

cat /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

network={
        ssid="myssid"
        scan_ssid=1
        proto=WPA
        pairwise=CCMP TKIP
        key_mgmt=WPA-PSK
        auth_alg=OPEN
        group=TKIP CCMP
        #psk="xxxx"
        psk=64-stelliger Hex-Code per "wpa passphrase myssid xxxx"
}

Code: Alles auswählen

# wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf -d

## --> interessanter Teil unten markiert!! ##

Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' 
driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> 
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0'
eapol_version=1
ap_scan=1
fast_reauth=1
Priority group 0
   id=0 ssid='myssid'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete 
initialization
ioctl[SIOCSIWPMKSA]: Invalid argument
SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:13:33:9c:10:08
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
ioctl[SIOCSIWPMKSA]: Invalid argument
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 60 be ae 72 c1 46 5f f8 9e 
2b db 88 84 08 5a 07
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=8):
     6d 69 6c 63 68 62 61 72                           myssid        
Trying to get current scan results first without requesting a new scan to speed 
up initial association
Received 1254 bytes of scan results (5 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:3f:e3:30:43 ssid='FRITZ!Box Fon WLAN 7113' wpa_ie_len=24 
rsn_ie_len=20 caps=0x11
   skip - SSID mismatch
1: 00:12:bf:c3:9b:64 ssid='<hidden>' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   skip - SSID mismatch
2: 7e:59:48:59:86:be ssid='iPhone' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   skip - SSID mismatch
3: 00:04:0e:d8:c9:8d ssid='Leonie Wlan' wpa_ie_len=24 rsn_ie_len=20 caps=0x11
   skip - SSID mismatch
4: 5c:d9:98:e1:f0:28 ssid='myssid' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on WPA IE
   selected WPA AP 5c:d9:98:e1:f0:28 ssid='myssid'
Trying to associate with 5c:d9:98:e1:f0:28 (SSID='myssid' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 
00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 
04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted


##############################################
### Hier fängt er an zu associaten ########################
##############################################


State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed      
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 5c:d9:98:e1:f0:28 into blacklist            # NEIIIIIIIIIIIIN !!!!!!
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: ASSOCIATING -> DISCONNECTED


##############################################
### und hier ist es anscheinend gescheitert #################
##############################################


wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RX EAPOL from 5c:d9:98:e1:f0:28
Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 5c:d9:98:e1:f0:28
State: DISCONNECTED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=5c:d9:98:e1:f0:28
No keys have been configured - skip key clearing
Associated with 5c:d9:98:e1:f0:28
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Process pending EAPOL frame that was received just before association 
notification
RX EAPOL from 5c:d9:98:e1:f0:28
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
  key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30 
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 5c:d9:98:e1:f0:28 (ver=2)
WPA: Renewed SNonce - hexdump(len=32): 17 10 76 14 ee 6c 2a cc 5f c9 ee 45 70 
20 2e 03 6a 25 9b e2 46 98 89 80 00 4d 5c 6e 43 fe 2d 53
WPA: PTK derivation - A1=00:13:33:9c:10:08 A2=5c:d9:98:e1:f0:28
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=123
  EAPOL-Key type=254
  key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=16 key_data_length=28
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
  key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30 
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 8d 20 42 d3 ad fb 83 83 e6 af dd d7 06 df 60 67
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 5c:d9:98:e1:f0:28 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 
00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
  key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=40
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
  key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30 
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e0 43 85 89 be 49 0b a8 30 0f f6 d5 6b 57 82 8d
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 5c:d9:98:e1:f0:28 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 5c:d9:98:e1:f0:28 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 5c:d9:98:e1:f0:28 completed (auth) [id=0 
id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
  key_info 0x3a2 (ver=2 keyidx=2 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=40
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
  key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30 
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 80
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 0b 11 70 f9 0f 42 8e 3d c7 fa 33 67 54 52 e9 e3
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 5c:d9:98:e1:f0:28 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
WEXT: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
  key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=40
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
  key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30 
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 81
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 55 43 02 70 00 27 0c c4 bb 09 b5 59 80 e8 ed ad
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 5c:d9:98:e1:f0:28 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED

Code: Alles auswählen

# iwconfig
wlan0     802.11b/g/n  li  ESSID:"myssid"  
          Mode:Managed  Frequency=2.437 GHz  Access Point: 5C:D9:98:E1:F0:28   
          Bit Rate=300 Mb/s   
          Retry min limit:7   RTS thr:off   Fragment thr:off
          Encryption key:8A47-4D0C-2A61-6264-1E9F-0852-B086-5123   Security mode:open
          Power Management:off
          Link Quality=87/100  Signal level=-57 dBm  Noise level=-113 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:0   Missed beacon:0

Code: Alles auswählen

# ifconfig
wlan0     Link encap:Ethernet  Hardware Adresse 00:13:33:9c:10:08  
          inet Adresse:192.168.1.103  Bcast:192.168.1.255  Maske:255.255.255.0
          inet6-Adresse: fe80::213:33ff:fe9c:1008/64 Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
          RX packets:148 errors:0 dropped:27 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:1000 
          RX bytes:15296 (14.9 KiB)  TX bytes:0 (0.0 B)
Zuletzt geändert von mynona am 18.06.2011 14:51:23, insgesamt 1-mal geändert.

Benutzeravatar
TRex
Moderator
Beiträge: 8373
Registriert: 23.11.2006 12:23:54
Wohnort: KA

Re: WLAN mit Linux... (RTL8188SU)

Beitrag von TRex » 18.06.2011 13:53:20

Also ich würde eher auf die IPW2200 setzen, hatte selbst so eine zu etch-Zeiten und die funktionierte. Soll heißen, wo war da das Problem? Noch kannst du die andere ja wieder zurückgeben, denke ich mal.
Jesus saves. Buddha does incremental backups.
Windows ist doof, Linux funktioniert nichtDon't break debian!Wie man widerspricht

mynona
Beiträge: 3
Registriert: 18.06.2011 12:44:31

Re: WLAN mit Linux... (RTL8188SU)

Beitrag von mynona » 18.06.2011 14:41:54

Habs grad nochmal probiert und lustigerweise scheint das Problem mit der IPW2200 jetzt das gleiche wie mit der RTL8188SU zu sein, d.h. ich bekomme eine IP, komme aber nicht ins WWW. Vorher habe ich mit der IPW2200 nie eine IP bekommen und mir ist nicht ganz klar was ich in der Zwischenzeit geändert habe...

Hier nochmal der Ausdruck von ifup für die IPW2200.

Code: Alles auswählen

# ifup eth1
run-parts: failed to stat component /etc/network/if-pre-up.d/wpasupplicant: No such file or directory
Internet Systems Consortium DHCP Client 4.1.1-P1
Copyright 2004-2010 Internet Systems Consortium.
All rights reserved.
For info, please visit https://www.isc.org/software/dhcp/

Listening on LPF/eth1/00:13:ce:d3:cb:4c
Sending on   LPF/eth1/00:13:ce:d3:cb:4c
Sending on   Socket/fallback
DHCPDISCOVER on eth1 to 255.255.255.255 port 67 interval 3
DHCPOFFER from 192.168.1.1
DHCPREQUEST on eth1 to 255.255.255.255 port 67
DHCPACK from 192.168.1.1
bound to 192.168.1.100 -- renewal in 286851 seconds.
run-parts: failed to stat component /etc/network/if-up.d/wpasupplicant: No such file or directory
Ansonsten rufe ich wpa_supplicant auch mit dem wext-Treiber auf und die firmware-ipw2x00 ist installiert samt ipw2200-Treiber im Kernel.

Code: Alles auswählen

# lsmod | grep ipw
ipw2200               108264  0 
libipw                 18403  1 ipw2200
lib80211                2834  4 lib80211_crypt_tkip,lib80211_crypt_ccmp,ipw2200,libipw

mynona
Beiträge: 3
Registriert: 18.06.2011 12:44:31

Re: WLAN mit Linux... (RTL8188SU)

Beitrag von mynona » 18.06.2011 14:47:23

Oh Mann, ich Volldepp, es war die Firewall....

Sorry euch genervt zu haben.

Antworten