Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 277181 Details for
Bug 388471
REGRESSION: NM doesn't connect to WPAE/TTLS/PAP network
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
The wpa_supplicant log generated by using NetworkManager
wpa_supplicant.log (text/plain), 7.60 KB, created by
Roland Wolters
on 2007-12-04 17:36:55 UTC
(
hide
)
Description:
The wpa_supplicant log generated by using NetworkManager
Filename:
MIME Type:
Creator:
Roland Wolters
Created:
2007-12-04 17:36:55 UTC
Size:
7.60 KB
patch
obsolete
>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1400 bytes of scan results (5 BSSes) >Scan results: 5 >No suitable AP found. >Setting scan request: 5 sec 0 usec >pairwise: 0x18 >ssid - hexdump_ascii(len=6): > 38 30 32 2e 31 58 802.1X >group: 0x1e >fragment_size=1300 (0x514) >eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00 >proto: 0x3 >key_mgmt: 0x1 >anonymous_identity - hexdump_ascii(len=21): > 61 6e 6f 6e 79 6d 6f 75 73 40 75 6e 69 2d 6a 65 anonymous@uni-je > 6e 61 2e 64 65 na.de >password - hexdump_ascii(len=8): [REMOVED] >identity - hexdump_ascii(len=18): > 70 31 77 6f 72 6f 40 75 6e 69 2d 6a 65 6e 61 2e p1woro@uni-jena. > 64 65 de >ca_cert - hexdump_ascii(len=56): > 62 6c 6f 62 3a 2f 2f 2d 6f 72 67 2d 66 72 65 65 blob://-org-free > 64 65 73 6b 74 6f 70 2d 4e 65 74 77 6f 72 6b 4d desktop-NetworkM > 61 6e 61 67 65 72 53 65 74 74 69 6e 67 73 2d 31 anagerSettings-1 > 2d 63 61 5f 63 65 72 74 -ca_cert >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1399 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Trying to associate with 00:14:1b:60:6a:40 (SSID='802.1X' freq=0 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 1 proto 2 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 >00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 >01 00 00 0f ac 01 28 00 >WPA: using GTK TKIP >WPA: using PTK CCMP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 >0f ac 04 01 00 00 0f ac 01 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=14 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1399 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1396 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1401 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >Authentication with 00:00:00:00:00:00 timed out. >Added BSSID 00:14:1b:60:6a:40 into blacklist >State: ASSOCIATING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1398 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Trying to associate with 00:14:1b:60:6a:40 (SSID='802.1X' freq=0 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 1 proto 2 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 >00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 >01 00 00 0f ac 01 28 00 >WPA: using GTK TKIP >WPA: using PTK CCMP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 >0f ac 04 01 00 00 0f ac 01 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=14 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1399 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1399 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >0: 00:14:1b:60:6a:40 ssid='802.1X' wpa_ie_len=26 rsn_ie_len=22 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >State: ASSOCIATING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 388471
:
262341
|
265991
| 277181