nachdem ich vergeblich versucht habe mit meiner eingebauten WLAN-Karte (Intel® PRO/Wireless 2200BG) ins Netz zu kommen und da ja auch einiges an Problemen in Foren dokumentiert ist, dachte ich, ich versuchs mal anders und habe mir einen WLAN-USB-Stick mit Realtek RTL8188SU besorgt. Mit diesem bin ich zwar weiter gekommen als mit dem Intel-Teil (habe sogar eine IP bekommen) aber ins WWW komme ich dennoch nicht. Unten eine hoffentlich aussagekräftige Liste mit Output meines Rechners (übrigens ein älterer Samsung R50 mit Debian "Squeeze"). Ist das "Encryption key:on" bei WPA2 eigentlich normal?
Vielen Dank schon mal im Voraus!!
Code: Alles auswählen
# lsusb | grep RTL
Bus 001 Device 002: ID 0bda:8171 Realtek Semiconductor Corp. RTL8188SU 802.11n WLAN Adapter
Code: Alles auswählen
# lsmod | grep 8192
r8192s_usb 267436 0
usbcore 98541 4 r8192s_usb,uhci_hcd,ehci_hcd
Code: Alles auswählen
# iwlist scanning
Cell 05 - Address: 5C:D9:98:E1:F0:28
ESSID:"myssid"
Protocol:IEEE802.11N-24G
Mode:Master
Channel:6
Encryption key:on
Bit Rates:300 Mb/s
Extra: Rates (Mb/s): 1 2 5.5 6 11 9 12 18 24 36 48 54
Quality=86/100 Signal level=-59 dBm Noise level=-113 dBm
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
Extra: Last beacon: 66ms ago
Code: Alles auswählen
# cat /etc/network/interfaces
auto lo
iface lo inet loopback
iface eth0 inet dhcp
iface wlan0 inet dhcp
pre-up wpa_supplicant -B -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf
post-down killall -q wpa_supplicant
Code: Alles auswählen
cat /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
network={
ssid="myssid"
scan_ssid=1
proto=WPA
pairwise=CCMP TKIP
key_mgmt=WPA-PSK
auth_alg=OPEN
group=TKIP CCMP
#psk="xxxx"
psk=64-stelliger Hex-Code per "wpa passphrase myssid xxxx"
}
Code: Alles auswählen
# wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf -d
## --> interessanter Teil unten markiert!! ##
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf'
driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0'
eapol_version=1
ap_scan=1
fast_reauth=1
Priority group 0
id=0 ssid='myssid'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete
initialization
ioctl[SIOCSIWPMKSA]: Invalid argument
SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:13:33:9c:10:08
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
ioctl[SIOCSIWPMKSA]: Invalid argument
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 60 be ae 72 c1 46 5f f8 9e
2b db 88 84 08 5a 07
WPS: Build Beacon and Probe Response IEs
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Response Type (2)
WPS: * UUID-E
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * Config Methods (0)
WPS: * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=8):
6d 69 6c 63 68 62 61 72 myssid
Trying to get current scan results first without requesting a new scan to speed
up initial association
Received 1254 bytes of scan results (5 BSSes)
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1f:3f:e3:30:43 ssid='FRITZ!Box Fon WLAN 7113' wpa_ie_len=24
rsn_ie_len=20 caps=0x11
skip - SSID mismatch
1: 00:12:bf:c3:9b:64 ssid='<hidden>' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
2: 7e:59:48:59:86:be ssid='iPhone' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:04:0e:d8:c9:8d ssid='Leonie Wlan' wpa_ie_len=24 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 5c:d9:98:e1:f0:28 ssid='myssid' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
selected based on WPA IE
selected WPA AP 5c:d9:98:e1:f0:28 ssid='myssid'
Trying to associate with 5c:d9:98:e1:f0:28 (SSID='myssid' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02
00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac
04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
##############################################
### Hier fängt er an zu associaten ########################
##############################################
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 5c:d9:98:e1:f0:28 into blacklist # NEIIIIIIIIIIIIN !!!!!!
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: ASSOCIATING -> DISCONNECTED
##############################################
### und hier ist es anscheinend gescheitert #################
##############################################
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RX EAPOL from 5c:d9:98:e1:f0:28
Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 5c:d9:98:e1:f0:28
State: DISCONNECTED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=5c:d9:98:e1:f0:28
No keys have been configured - skip key clearing
Associated with 5c:d9:98:e1:f0:28
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Process pending EAPOL frame that was received just before association
notification
RX EAPOL from 5c:d9:98:e1:f0:28
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 5c:d9:98:e1:f0:28 (ver=2)
WPA: Renewed SNonce - hexdump(len=32): 17 10 76 14 ee 6c 2a cc 5f c9 ee 45 70
20 2e 03 6a 25 9b e2 46 98 89 80 00 4d 5c 6e 43 fe 2d 53
WPA: PTK derivation - A1=00:13:33:9c:10:08 A2=5c:d9:98:e1:f0:28
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=123
EAPOL-Key type=254
key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=16 key_data_length=28
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 8d 20 42 d3 ad fb 83 83 e6 af dd d7 06 df 60 67
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 5c:d9:98:e1:f0:28 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00
00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
EAPOL-Key type=254
key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=40
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 7a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e0 43 85 89 be 49 0b a8 30 0f f6 d5 6b 57 82 8d
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 5c:d9:98:e1:f0:28 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 5c:d9:98:e1:f0:28 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 5c:d9:98:e1:f0:28 completed (auth) [id=0
id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
EAPOL-Key type=254
key_info 0x3a2 (ver=2 keyidx=2 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=40
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 80
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0b 11 70 f9 0f 42 8e 3d c7 fa 33 67 54 52 e9 e3
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 5c:d9:98:e1:f0:28 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
WEXT: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 5c:d9:98:e1:f0:28
IEEE 802.1X RX: version=1 type=3 length=135
EAPOL-Key type=254
key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=40
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
key_nonce - hexdump(len=32): 09 c2 8a 80 73 ba 46 f8 ba d4 0a 8f 3d 5c 31 30
b3 cd 93 23 f1 00 c0 8f 4c 72 b8 9f 8c 57 a2 81
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 55 43 02 70 00 27 0c c4 bb 09 b5 59 80 e8 ed ad
WPA: RX message 1 of Group Key Handshake from 5c:d9:98:e1:f0:28 (ver=2)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 5c:d9:98:e1:f0:28 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
Code: Alles auswählen
# iwconfig
wlan0 802.11b/g/n li ESSID:"myssid"
Mode:Managed Frequency=2.437 GHz Access Point: 5C:D9:98:E1:F0:28
Bit Rate=300 Mb/s
Retry min limit:7 RTS thr:off Fragment thr:off
Encryption key:8A47-4D0C-2A61-6264-1E9F-0852-B086-5123 Security mode:open
Power Management:off
Link Quality=87/100 Signal level=-57 dBm Noise level=-113 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
Code: Alles auswählen
# ifconfig
wlan0 Link encap:Ethernet Hardware Adresse 00:13:33:9c:10:08
inet Adresse:192.168.1.103 Bcast:192.168.1.255 Maske:255.255.255.0
inet6-Adresse: fe80::213:33ff:fe9c:1008/64 Gültigkeitsbereich:Verbindung
UP BROADCAST RUNNING MULTICAST MTU:1500 Metrik:1
RX packets:148 errors:0 dropped:27 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
Kollisionen:0 Sendewarteschlangenlänge:1000
RX bytes:15296 (14.9 KiB) TX bytes:0 (0.0 B)