Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 294236 Details for
Bug 431894
iwl4965 unreliable connecting to LEAP
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Laptop C : IPW2200 - Connecting to LEAP
ipw2200-2.6.18-77.el5.txt (text/plain), 12.12 KB, created by
Traxtopel
on 2008-02-07 17:58:41 UTC
(
hide
)
Description:
Laptop C : IPW2200 - Connecting to LEAP
Filename:
MIME Type:
Creator:
Traxtopel
Created:
2008-02-07 17:58:41 UTC
Size:
12.12 KB
patch
obsolete
>ctrl_interface=/var/run/wpa_supplicant >ap_scan=2 >network={ > scan_ssid=1 > ssid="IBM" > key_mgmt=IEEE8021X > eap=LEAP > identity="grant_williamson@nl.ibm.com" > password="" >} > >Initializing interface 'eth1' conf 'leap.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file 'leap.conf' -> '/tmp/leap.conf' >Reading configuration file '/tmp/leap.conf' >ctrl_interface='/var/run/wpa_supplicant' >ap_scan=2 >Line: 3 - start of a new network block >scan_ssid=1 (0x1) >ssid - hexdump_ascii(len=3): > 49 42 4d IBM >key_mgmt: 0x8 >eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 >identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >password - hexdump_ascii(len=14): [REMOVED] >Priority group 0 > id=0 ssid='IBM' >Initializing interface (2) 'eth1' >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:16:6f:1c:b4:4b >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >wpa_driver_wext_set_drop_unencrypted >Setting scan request: 0 sec 100000 usec >Added interface eth1 >RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added >State: DISCONNECTED -> SCANNING >Trying to associate with SSID 'IBM' >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x4 >WPA: clearing AP WPA IE >WPA: clearing AP RSN IE >WPA: clearing own WPA/RSN IE >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 60 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1469 bytes of scan results (6 BSSes) >Scan results: 6 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1467 bytes of scan results (6 BSSes) >Scan results: 6 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 2313 bytes of scan results (9 BSSes) >Scan results: 9 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:19:a9:a6:27:c0 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:19:a9:a6:27:c0 >No keys have been configured - skip key clearing >Network configuration found for the current AP >WPA: clearing AP WPA IE >WPA: clearing AP RSN IE >WPA: clearing own WPA/RSN IE >EAPOL: External notification - portControl=Auto >Associated with 00:19:a9:a6:27:c0 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=56): 01 00 00 34 01 01 00 34 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 70 6c 6c 2d 61 70 2d 32 30 32 71 61 73 2d 77 64 63 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=47): > 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e _networkid=IBM,n > 61 73 69 64 3d 70 6c 6c 2d 61 70 2d 32 30 32 71 asid=pll-ap-202q > 61 73 2d 77 64 63 2c 70 6f 72 74 69 64 3d 30 as-wdc,portid=0 >EAP: using real identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL - hexdump(len=36): 01 00 00 20 02 01 00 20 01 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 4f 00 2b 11 01 00 08 0e c7 bf 9b c7 9b 77 a7 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=79 method=17 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Request >EAP-LEAP: Challenge from AP - hexdump(len=8): 0e c7 bf 9b c7 9b 77 a7 >EAP-LEAP: Generating Challenge Response >EAP-LEAP: Response - hexdump(len=24): c3 01 08 e3 a0 39 43 03 38 47 a0 d7 5c 85 71 47 45 83 45 20 ee 23 d3 c4 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL - hexdump(len=63): 01 00 00 3b 02 4f 00 3b 11 01 00 18 c3 01 08 e3 a0 39 43 03 38 47 a0 d7 5c 85 71 47 45 83 45 20 ee 23 d3 c4 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=46): 01 00 00 04 03 4f 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Success >EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 0b 79 7f 86 a8 37 d3 f8 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL - hexdump(len=47): 01 00 00 2b 01 4f 00 2b 11 01 00 08 0b 79 7f 86 a8 37 d3 f8 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=63): 01 00 00 3b 02 4f 00 3b 11 01 00 18 08 a2 7b cf fc 5e 9e 43 77 d5 3c a2 7b c1 d9 45 79 1c 1a dd 87 46 9e c0 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Response for LEAP method=17 id=79 >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Response >EAP-LEAP: Response from AP - hexdump(len=24): 08 a2 7b cf fc 5e 9e 43 77 d5 3c a2 7b c1 d9 45 79 1c 1a dd 87 46 9e c0 >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED] >EAP-LEAP: peer_challenge - hexdump(len=8): 0e c7 bf 9b c7 9b 77 a7 >EAP-LEAP: peer_response - hexdump(len=24): c3 01 08 e3 a0 39 43 03 38 47 a0 d7 5c 85 71 47 45 83 45 20 ee 23 d3 c4 >EAP-LEAP: ap_challenge - hexdump(len=8): 0b 79 7f 86 a8 37 d3 f8 >EAP-LEAP: ap_response - hexdump(len=24): 08 a2 7b cf fc 5e 9e 43 77 d5 3c a2 7b c1 d9 45 79 1c 1a dd 87 46 9e c0 >EAP-LEAP: master key - hexdump(len=16): [REMOVED] >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00 00 47 ab 43 fe 01 07 e7 09 3c 7b df a6 9c f7 c4 20 ed 1d 73 c2 26 15 01 55 5b d8 ce 92 7e 10 65 32 b8 6f 73 07 4e 21 97 88 b5 36 d7 c8 ec b7 ee d1 a0 bd 34 b1 >EAPOL: Received EAPOL-Key frame >EAPOL: KEY_RX entering state KEY_RECEIVE >EAPOL: processKey >EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key: type=1 key_length=13 key_index=0x1 >EAPOL: EAPOL-Key key signature verified >EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED] >EAPOL: Setting dynamic WEP key: broadcast keyidx 1 len 13 >wpa_driver_wext_set_key: alg=1 key_idx=1 set_tx=0 seq_len=0 key_len=13 >RX EAPOL from 00:19:a9:a6:27:c0 >RX EAPOL - hexdump(len=48): 01 03 00 2c 01 00 0d 00 00 47 ab 43 fe 01 08 0b 87 77 bd e2 23 67 80 85 d7 f2 1b c9 11 da d5 83 e9 6c 94 2c 52 2f ba 5b 63 80 bb 95 4a 15 d5 50 >EAPOL: Received EAPOL-Key frame >EAPOL: KEY_RX entering state KEY_RECEIVE >EAPOL: processKey >EAPOL: RX IEEE 802.1X ver=1 type=3 len=44 EAPOL-Key: type=1 key_length=13 key_index=0x83 >EAPOL: EAPOL-Key key signature verified >EAPOL: using part of EAP keying material data encryption key - hexdump(len=13): [REMOVED] >EAPOL: Setting dynamic WEP key: unicast keyidx 3 len 13 >wpa_driver_wext_set_key: alg=1 key_idx=3 set_tx=128 seq_len=0 key_len=13 >EAPOL: all required EAPOL-Key frames received >WPA: EAPOL processing complete >Cancelling authentication timeout >State: ASSOCIATED -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:19:a9:a6:27:c0 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: SUPP_PAE entering state AUTHENTICATED >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added >EAPOL: startWhen --> 0 >EAPOL: authWhile --> 0 >RX ctrl_iface - hexdump_ascii(len=6): > 53 54 41 54 55 53 STATUS >ioctl[SIOCGIFADDR]: Cannot assign requested address >CTRL-EVENT-TERMINATING - signal 2 received >Removing interface eth1 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (17, LEAP) at EAP deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 431894
: 294236 |
294237
|
294238
|
294356
|
306772
|
308289