Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 311656 Details for
Bug 455150
Not able to login to WPA networks anymore
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Manual wpa_supplicant attempt.
WPA-wpa_supplicant-attempt.txt (text/plain), 7.18 KB, created by
Roland Wolters
on 2008-07-12 22:35:05 UTC
(
hide
)
Description:
Manual wpa_supplicant attempt.
Filename:
MIME Type:
Creator:
Roland Wolters
Created:
2008-07-12 22:35:05 UTC
Size:
7.18 KB
patch
obsolete
>wpa_supplicant -c/etc/wpa_supplicant/wpa_supplicant.house.conf -iwlan0 -dd >Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.house.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' >Configuration file '/etc/wpa_supplicant/wpa_supplicant.house.conf' -> '/etc/wpa_supplicant/wpa_supplicant.house.conf' >Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.house.conf' >ctrl_interface='/var/run/wpa_supplicant' >ctrl_interface_group='wheel' (DEPRECATED) >Line: 3 - start of a new network block >ssid - hexdump_ascii(len=15): > 43 6f 6e 6e 65 63 74 69 6f 6e 50 6f 69 6e 74 ConnectionPoint >proto: 0x1 >scan_ssid=1 (0x1) >key_mgmt: 0x2 >pairwise: 0x10 >group: 0x1e >PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED] >PSK (from passphrase) - hexdump(len=32): [REMOVED] >Priority group 0 > id=0 ssid='ConnectionPoint' >Initializing interface (2) 'wlan0' >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1f:3b:4c:59:bd >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted >Setting scan request: 0 sec 100000 usec >ctrl_interface_group=10 (from group name 'wheel') >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=15): > 43 6f 6e 6e 65 63 74 69 6f 6e 50 6f 69 6e 74 ConnectionPoint >Trying to get current scan results first without requesting a new scan to speed up initial association >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 5 seconds >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=15): > 43 6f 6e 6e 65 63 74 69 6f 6e 50 6f 69 6e 74 ConnectionPoint >Scan requested (ret=0) - scan timeout 5 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=15): > 43 6f 6e 6e 65 63 74 69 6f 6e 50 6f 69 6e 74 ConnectionPoint >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=15): > 43 6f 6e 6e 65 63 74 69 6f 6e 50 6f 69 6e 74 ConnectionPoint >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 259 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip WPA IE - PTK cipher mismatch >Try to find non-WPA AP >0: 00:01:e3:50:18:60 ssid='ConnectionPoint' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - non-WPA network not allowed >No suitable AP found. >Setting scan request: 5 sec 0 usec >^CCTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: SCANNING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 455150
:
311655
| 311656