Bug 2124955
| Summary: | Failing to connect to network, no error message | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | thestroyer <thestroyer> |
| Component: | wpa_supplicant | Assignee: | Lubomir Rintel <lkundrak> |
| Status: | NEW --- | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 39 | CC: | acabral, bgalvani, blueowl, dcaratti, dcbw, francesco.giudici, gnome-sig, liangwen12year, lkundrak, mclasen, rstrode, sandmann, thaller, vbubela |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | Bug | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
thestroyer@cock.li
2022-09-07 14:39:51 UTC
> device (wlp0s20f3): disconnecting for new activation request. seems like another activation was done? Check the complete level=TRACE logs. Read https://networkmanager.dev/docs/api/latest/NetworkManager.conf.html#id-1.2.3.10 for how to enable logging. anyway, yes, the logging should be better. For that it would be interesting to see what NetworkManager knows. It does log things at trace level, if it notices the cause for the problem, it is easier to just increase the logging level. If it doesn't understand the underlying reason why association fails, then it's harder... I changed the crypto policy back to DEFAULT and restarted Networkmanager, but it still connects. Only upon restarting wpa_supplicant, the connection doesn't work anymore. I'll send a log of both networkmanager and wpa_supplicant. The Networkmanager trace logs contain lots of private information (eg the names of all my stored access points), so I'd prefer to give that in a private way. The wpa_supplicant logs can be found below. I did the following procedure. Restarted the system, while LEGACY mode is on. It connects to the access point. Then I changed the cyrpto mode to DEFAULT and restarted NetworkManager and wpa_supplicant. It then fails to connect to the access point. The logs since boot are provided. sep 13 16:03:51 student-laptop systemd[1]: Starting wpa_supplicant.service - WPA supplicant... sep 13 16:03:51 student-laptop wpa_supplicant[1381]: Successfully initialized wpa_supplicant sep 13 16:03:51 student-laptop systemd[1]: Started wpa_supplicant.service - WPA supplicant. sep 13 16:03:53 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=COUNTRY alpha2=EU sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: SME: Trying to authenticate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: Trying to associate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: Associated with 44:d9:e7:04:5c:03 sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-STARTED EAP authentication started sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=NL/ST=Zuid-Holland/L=Delft/O=De Bolk/CN=Bolknet/emailAddress=beheer' hash=d8abad2c9c4c38fd84933ce705c5012998284aca0b4fb04c8a7534b0ecb58ccd sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=NL/ST=Zuid-Holland/L=Delft/O=De Bolk/CN=Bolknet/emailAddress=beheer' hash=d8abad2c9c4c38fd84933ce705c5012998284aca0b4fb04c8a7534b0ecb58ccd sep 13 16:04:05 student-laptop wpa_supplicant[1381]: EAP-MSCHAPV2: Authentication succeeded sep 13 16:04:05 student-laptop wpa_supplicant[1381]: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: PMKSA-CACHE-ADDED 44:d9:e7:04:5c:03 0 sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: WPA: Key negotiation completed with 44:d9:e7:04:5c:03 [PTK=CCMP GTK=CCMP] sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-CONNECTED - Connection to 44:d9:e7:04:5c:03 completed [id=0 id_str=] sep 13 16:04:05 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-58 noise=9999 txrate=6000 sep 13 16:04:07 student-laptop wpa_supplicant[1381]: wlp0s20f3: PMKSA-CACHE-ADDED 44:d9:e7:03:5c:03 0 sep 13 16:04:40 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-57 noise=9999 txrate=400000 sep 13 16:04:42 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-SIGNAL-CHANGE above=1 signal=-57 noise=9999 txrate=270000 sep 13 16:04:56 student-laptop systemd[1]: Stopping wpa_supplicant.service - WPA supplicant... sep 13 16:04:56 student-laptop wpa_supplicant[1381]: p2p-dev-wlp0s20: CTRL-EVENT-DSCP-POLICY clear_all sep 13 16:04:56 student-laptop wpa_supplicant[1381]: p2p-dev-wlp0s20: CTRL-EVENT-DSCP-POLICY clear_all sep 13 16:04:56 student-laptop wpa_supplicant[1381]: nl80211: deinit ifname=p2p-dev-wlp0s20 disabled_11b_rates=0 sep 13 16:04:56 student-laptop wpa_supplicant[1381]: p2p-dev-wlp0s20: CTRL-EVENT-TERMINATING sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-DISCONNECTED bssid=44:d9:e7:04:5c:03 reason=3 locally_generated=1 sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-DSCP-POLICY clear_all sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: PMKSA-CACHE-REMOVED 44:d9:e7:04:5c:03 0 sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: PMKSA-CACHE-REMOVED 44:d9:e7:03:5c:03 0 sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-DSCP-POLICY clear_all sep 13 16:04:56 student-laptop wpa_supplicant[1381]: nl80211: deinit ifname=wlp0s20f3 disabled_11b_rates=0 sep 13 16:04:56 student-laptop wpa_supplicant[1381]: wlp0s20f3: CTRL-EVENT-TERMINATING sep 13 16:04:56 student-laptop systemd[1]: wpa_supplicant.service: Deactivated successfully. sep 13 16:04:56 student-laptop systemd[1]: Stopped wpa_supplicant.service - WPA supplicant. sep 13 16:04:56 student-laptop systemd[1]: Starting wpa_supplicant.service - WPA supplicant... sep 13 16:04:56 student-laptop wpa_supplicant[3223]: Successfully initialized wpa_supplicant sep 13 16:04:56 student-laptop systemd[1]: Started wpa_supplicant.service - WPA supplicant. sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=COUNTRY alpha2=NL sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: SME: Trying to authenticate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: Trying to associate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: Associated with 44:d9:e7:04:5c:03 sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-STARTED EAP authentication started sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 sep 13 16:05:00 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected sep 13 16:05:00 student-laptop wpa_supplicant[3223]: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:protocol version sep 13 16:05:00 student-laptop wpa_supplicant[3223]: OpenSSL: openssl_handshake - SSL_connect error:0A000102:SSL routines::unsupported protocol sep 13 16:05:01 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-FAILURE EAP authentication failed sep 13 16:05:01 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-DISCONNECTED bssid=44:d9:e7:04:5c:03 reason=23 sep 13 16:05:01 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="BolkNet" auth_failures=1 duration=10 reason=AUTH_FAILED sep 13 16:05:01 student-laptop wpa_supplicant[3223]: BSSID 44:d9:e7:04:5c:03 ignore list count incremented to 2, ignoring for 10 seconds sep 13 16:05:12 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-SSID-REENABLED id=0 ssid="BolkNet" sep 13 16:05:12 student-laptop wpa_supplicant[3223]: wlp0s20f3: SME: Trying to authenticate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: Trying to associate with 44:d9:e7:04:5c:03 (SSID='BolkNet' freq=5240 MHz) sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: Associated with 44:d9:e7:04:5c:03 sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-STARTED EAP authentication started sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 sep 13 16:05:13 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected sep 13 16:05:13 student-laptop wpa_supplicant[3223]: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:protocol version sep 13 16:05:13 student-laptop wpa_supplicant[3223]: OpenSSL: openssl_handshake - SSL_connect error:0A000102:SSL routines::unsupported protocol sep 13 16:05:14 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-EAP-FAILURE EAP authentication failed sep 13 16:05:14 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-DISCONNECTED bssid=44:d9:e7:04:5c:03 reason=23 sep 13 16:05:14 student-laptop wpa_supplicant[3223]: wlp0s20f3: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="BolkNet" auth_failures=2 duration=32 reason=AUTH_FAILED sep 13 16:05:14 student-laptop wpa_supplicant[3223]: BSSID 44:d9:e7:04:5c:03 ignore list count incremented to 3, ignoring for 60 seconds This message is a reminder that Fedora Linux 36 is nearing its end of life. Fedora will stop maintaining and issuing updates for Fedora Linux 36 on 2023-05-16. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a 'version' of '36'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, change the 'version' to a later Fedora Linux version. Note that the version field may be hidden. Click the "Show advanced fields" button if you do not see it. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora Linux 36 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora Linux, you are encouraged to change the 'version' to a later version prior to this bug being closed. This bug appears to have been reported against 'rawhide' during the Fedora Linux 39 development cycle. Changing version to 39. |