Bug 755180 - NetworkManager failed authenticate WPA2 with brcmsmac driver
Summary: NetworkManager failed authenticate WPA2 with brcmsmac driver
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: NetworkManager
Version: 16
Hardware: Unspecified
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Dan Williams
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-11-19 11:11 UTC by Pavel Alexeev
Modified: 2013-02-13 13:48 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-02-13 13:48:22 UTC
Type: ---


Attachments (Terms of Use)

Description Pavel Alexeev 2011-11-19 11:11:07 UTC
Description of problem:
On my notebook I have Broadcom BCM4313 WiFi chip which in the near past was be able work only with proprietary wl driver. From some update it was utomatically replaced by brcmsmac driver, i suppose it became ready.

But what was strange - it works with manually configuration wit wpa_supplicant and does not with NetworkManager. NetworkManager together with wl driver - work like a sharm.
User site NM logs seams useless, but I have Soft AP by hostapd, and may provide its.
First failed attempt NM:

1321698598.286117: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321698598.288751: mgmt::proberesp cb
1321698598.289157: STA b4:74:9f:7c:88:f8 sent probe request for broadcast SSID
1321698598.293497: mgmt::proberesp cb
1321698598.931554: mgmt::auth
1321698598.931606: authentication: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=1 status_code=0 wep=0
1321698598.931624:   New STA
1321698598.931657: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authentication OK (open system)
1321698598.931678: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-AUTHENTICATE.indication(b4:74:9f:7c:88:f8, OPEN_SYSTEM)
1321698598.931693: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698598.931702: authentication reply: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
1321698598.934453: mgmt::auth cb
1321698598.934513: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authenticated
1321698598.941437: mgmt::assoc_req
1321698598.941480: association request: STA=b4:74:9f:7c:88:f8 capab_info=0x431 listen_interval=5
1321698598.941513:   new AID 1
1321698598.941536: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: association OK (aid 1)
1321698598.943096: mgmt::assoc_resp cb
1321698598.943131: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: associated (aid 1)
1321698598.943236: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-ASSOCIATE.indication(b4:74:9f:7c:88:f8)
1321698598.943254: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698598.943330: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.943395:    addr=b4:74:9f:7c:88:f8
1321698598.944287: wlan0: STA b4:74:9f:7c:88:f8 WPA: event 1 notification
1321698598.944315: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.944332:    addr=b4:74:9f:7c:88:f8
1321698598.944392: wlan0: STA b4:74:9f:7c:88:f8 WPA: start authentication
1321698598.944404: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITIALIZE
1321698598.944432: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.944450:    addr=b4:74:9f:7c:88:f8
1321698598.944525: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: unauthorizing port
1321698598.944537: WPA: b4:74:9f:7c:88:f8 WPA_PTK_GROUP entering state IDLE
1321698598.944549: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION
1321698598.944560: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION2
1321698598.944571: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITPSK
1321698598.944582: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKSTART
1321698598.944596: wlan0: STA b4:74:9f:7c:88:f8 WPA: sending 1/4 msg of 4-Way Handshake
1321698598.944606: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
1321698598.947149: nl80211: Event message available
1321698598.947628: nl80211: Ignored unknown event (cmd=19)
1321698598.948058: IEEE 802.1X: b4:74:9f:7c:88:f8 TX status - version=2 type=3 length=95 - ack=1
1321698598.952593: mgmt::deauth
1321698598.952804: deauthentication: STA=b4:74:9f:7c:88:f8 reason_code=3
1321698598.952897: AP-STA-DISCONNECTED b4:74:9f:7c:88:f8
1321698598.953124: wlan0: STA b4:74:9f:7c:88:f8 WPA: event 3 notification
1321698598.953273: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.953517:    addr=b4:74:9f:7c:88:f8
1321698598.953680: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state DISCONNECTED
1321698598.953857: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITIALIZE
1321698598.953962: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.954160:    addr=b4:74:9f:7c:88:f8
1321698598.954454: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: unauthorizing port
1321698598.954923: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: deauthenticated
1321698598.955095: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DEAUTHENTICATE.indication(b4:74:9f:7c:88:f8, 3)
1321698598.955177: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698598.955461: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698598.955675:    addr=b4:74:9f:7c:88:f8
1321698598.956210: nl80211: Event message available
1321698598.958104: nl80211: Ignored unknown event (cmd=20)
1321698599.299779: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321698599.301442: mgmt::proberesp cb
1321698599.307071: STA b4:74:9f:7c:88:f8 sent probe request for broadcast SSID
1321698599.313461: mgmt::proberesp cb
1321698600.013424: mgmt::auth
1321698600.013475: authentication: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=1 status_code=0 wep=0
1321698600.013493:   New STA
1321698600.013525: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authentication OK (open system)
1321698600.013545: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-AUTHENTICATE.indication(b4:74:9f:7c:88:f8, OPEN_SYSTEM)
1321698600.013560: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698600.013570: authentication reply: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
1321698600.016450: mgmt::auth cb
1321698600.016856: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authenticated
1321698600.019258: mgmt::reassoc_req
1321698600.019568: reassociation request: STA=b4:74:9f:7c:88:f8 capab_info=0x431 listen_interval=5 current_ap=00:11:95:16:60:31
1321698600.019805:   new AID 1
1321698600.020005: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: association OK (aid 1)
1321698600.021496: mgmt::reassoc_resp cb
1321698600.021849: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: associated (aid 1)
1321698600.022996: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-REASSOCIATE.indication(b4:74:9f:7c:88:f8)
1321698600.023296: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698600.023617: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.024043:    addr=b4:74:9f:7c:88:f8
1321698600.027646: wlan0: STA b4:74:9f:7c:88:f8 WPA: event 1 notification
1321698600.028152: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.028595:    addr=b4:74:9f:7c:88:f8
1321698600.029079: wlan0: STA b4:74:9f:7c:88:f8 WPA: start authentication
1321698600.030714: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITIALIZE
1321698600.031008: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.031397:    addr=b4:74:9f:7c:88:f8
1321698600.032166: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: unauthorizing port
1321698600.032654: WPA: b4:74:9f:7c:88:f8 WPA_PTK_GROUP entering state IDLE
1321698600.032864: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION
1321698600.033069: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION2
1321698600.033321: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITPSK
1321698600.033460: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKSTART
1321698600.033836: wlan0: STA b4:74:9f:7c:88:f8 WPA: sending 1/4 msg of 4-Way Handshake
1321698600.033918: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
1321698600.034226: nl80211: Event message available
1321698600.034501: nl80211: Ignored unknown event (cmd=19)
1321698600.034709: mgmt::deauth
1321698600.034858: deauthentication: STA=b4:74:9f:7c:88:f8 reason_code=3
1321698600.034942: AP-STA-DISCONNECTED b4:74:9f:7c:88:f8
1321698600.035203: wlan0: STA b4:74:9f:7c:88:f8 WPA: event 3 notification
1321698600.035595: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.035866:    addr=b4:74:9f:7c:88:f8
1321698600.036960: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state DISCONNECTED
1321698600.038511: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITIALIZE
1321698600.038685: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.039153:    addr=b4:74:9f:7c:88:f8
1321698600.039448: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: unauthorizing port
1321698600.039972: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: deauthenticated
1321698600.040185: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DEAUTHENTICATE.indication(b4:74:9f:7c:88:f8, 3)
1321698600.040571: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321698600.040711: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x83ecce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321698600.040964:    addr=b4:74:9f:7c:88:f8
1321698600.041337: nl80211: Event message available
1321698600.043832: nl80211: Ignored unknown event (cmd=20)
1321698600.369626: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321698600.371443: mgmt::proberesp cb
1321698600.373403: STA b4:74:9f:7c:88:f8 sent probe request for broadcast SSID
1321698600.377424: mgmt::proberesp cb
1321698603.214497: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321698603.216452: mgmt::proberesp cb
1321698603.411034: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321698603.413444: mgmt::proberesp cb
--------------------------------------------------
Second is successful connect made manually:
1321699828.781163: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699828.781617: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699828.791469: mgmt::proberesp cb
1321699828.792020: mgmt::proberesp cb
1321699830.534485: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699830.540472: mgmt::proberesp cb
1321699832.534505: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699832.541017: mgmt::proberesp cb
1321699835.795773: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699835.795866: STA 1c:4b:d6:42:17:78 sent probe request for broadcast SSID
1321699835.831488: mgmt::proberesp cb
1321699835.841482: mgmt::proberesp cb
1321699862.498173: STA b4:74:9f:7c:88:f8 sent probe request for our SSID
1321699862.508460: mgmt::proberesp cb
1321699863.218063: mgmt::auth
1321699863.218114: authentication: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=1 status_code=0 wep=0
1321699863.218132:   New STA
1321699863.218166: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authentication OK (open system)
1321699863.218187: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-AUTHENTICATE.indication(b4:74:9f:7c:88:f8, OPEN_SYSTEM)
1321699863.218201: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321699863.218212: authentication reply: STA=b4:74:9f:7c:88:f8 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
1321699863.221431: mgmt::auth cb
1321699863.221470: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: authenticated
1321699863.223829: mgmt::assoc_req
1321699863.223864: association request: STA=b4:74:9f:7c:88:f8 capab_info=0x431 listen_interval=5
1321699863.223894:   new AID 1
1321699863.223915: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: association OK (aid 1)
1321699863.225423: mgmt::assoc_resp cb
1321699863.225457: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.11: associated (aid 1)
1321699863.225569: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-ASSOCIATE.indication(b4:74:9f:7c:88:f8)
1321699863.225587: wlan0: STA b4:74:9f:7c:88:f8 MLME: MLME-DELETEKEYS.request(b4:74:9f:7c:88:f8)
1321699863.225659: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x8d52ce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321699863.225691:    addr=b4:74:9f:7c:88:f8
1321699863.228024: wlan0: STA b4:74:9f:7c:88:f8 WPA: event 1 notification
1321699863.229832: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x8d52ce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321699863.230176:    addr=b4:74:9f:7c:88:f8
1321699863.230665: wlan0: STA b4:74:9f:7c:88:f8 WPA: start authentication
1321699863.230946: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITIALIZE
1321699863.231319: wpa_driver_nl80211_set_key: ifindex=47 alg=0 addr=0x8d52ce8 key_idx=0 set_tx=1 seq_len=0 key_len=0
1321699863.231741:    addr=b4:74:9f:7c:88:f8
1321699863.232093: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: unauthorizing port
1321699863.232640: WPA: b4:74:9f:7c:88:f8 WPA_PTK_GROUP entering state IDLE
1321699863.232900: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION
1321699863.233186: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state AUTHENTICATION2
1321699863.233419: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state INITPSK
1321699863.233706: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKSTART
1321699863.233973: wlan0: STA b4:74:9f:7c:88:f8 WPA: sending 1/4 msg of 4-Way Handshake
1321699863.234327: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
1321699863.235864: nl80211: Event message available
1321699863.236275: nl80211: Ignored unknown event (cmd=19)
1321699863.236648: IEEE 802.1X: b4:74:9f:7c:88:f8 TX status - version=2 type=3 length=95 - ack=1
1321699863.239184: IEEE 802.1X: 121 bytes from b4:74:9f:7c:88:f8
1321699863.239345:    IEEE 802.1X: version=1 type=3 length=117
1321699863.239472: wlan0: STA b4:74:9f:7c:88:f8 WPA: received EAPOL-Key frame (2/4 Pairwise)
1321699863.239557: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKCALCNEGOTIATING
1321699863.239676: WPA: PTK derivation - A1=00:11:95:16:60:31 A2=b4:74:9f:7c:88:f8
1321699863.239757: WPA: PMK - hexdump(len=32): e4 1c bf 48 69 4c eb f1 a3 81 20 e2 fc 2f fc c8 f4 31 f5 e1 08 55 39 f0 ad b2 c9 42 84 c2 bd 45
1321699863.239851: WPA: PTK - hexdump(len=48): 58 99 60 3c a0 f5 5f 41 bf b7 95 d9 26 70 ea d3 1c 71 b0 4f f4 c0 c4 87 dd cb a6 31 e3 84 66 df 12 ad 36 7d 67 09 ee 1c c3 f6 05 80 8e e6 d9 0f
1321699863.240312: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKCALCNEGOTIATING2
1321699863.240411: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKINITNEGOTIATING
1321699863.240667: wlan0: STA b4:74:9f:7c:88:f8 WPA: sending 3/4 msg of 4-Way Handshake
1321699863.240947: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=86 keyidx=2 encr=1)
1321699863.241030: Plaintext EAPOL-Key Key Data - hexdump(len=96): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 81 75 a0 8e 89 e3 a7 27 69 08 23 a4 fd b0 a1 0e 7d 10 6b ab 05 8f 6f e1 ac b3 e6 b3 5c f9 7e 51 dd 00 00 00 00 00 00 00 00 00
1321699863.244273: IEEE 802.1X: b4:74:9f:7c:88:f8 TX status - version=2 type=3 length=191 - ack=1
1321699863.244498: IEEE 802.1X: 99 bytes from b4:74:9f:7c:88:f8
1321699863.244579:    IEEE 802.1X: version=1 type=3 length=95
1321699863.244675: wlan0: STA b4:74:9f:7c:88:f8 WPA: received EAPOL-Key frame (4/4 Pairwise)
1321699863.244786: WPA: b4:74:9f:7c:88:f8 WPA_PTK entering state PTKINITDONE
1321699863.244928: wpa_driver_nl80211_set_key: ifindex=47 alg=3 addr=0x8d52ce8 key_idx=0 set_tx=1 seq_len=0 key_len=16
1321699863.245323:    addr=b4:74:9f:7c:88:f8
1321699863.245615: AP-STA-CONNECTED b4:74:9f:7c:88:f8
1321699863.246059: wlan0: STA b4:74:9f:7c:88:f8 IEEE 802.1X: authorizing port
1321699863.246916: wlan0: STA b4:74:9f:7c:88:f8 RADIUS: starting accounting session 4EC78674-00000009
1321699863.247814: wlan0: STA b4:74:9f:7c:88:f8 WPA: pairwise key handshake completed (RSN)


Version-Release number of selected component (if applicable):
$rpm -q NetworkManager
NetworkManager-0.9.1.90-5.git20110927.fc16.x86_64

How reproducible:
Always

Comment 1 Jirka Klimes 2011-12-14 08:56:25 UTC
Any chance you could post your working configuration file for wpa_supplicant and its logs with '-dddt' option?
Also, please follow instructions to obtain debug logs for the NetworkManager case:
http://live.gnome.org/NetworkManager/Debugging/#wifi
http://live.gnome.org/NetworkManager/Debugging/#wpa_supplicant07

Comment 2 Pavel Alexeev 2011-12-31 19:11:44 UTC
What is very interesting - it is working now!! So, I can't reproduce it.

By some reason it connected only on 11 mb/s speed, but connected easy and fast, without any other manipulation what was required in the past.
But speed, as I think is completely different issue. I'm right?

Comment 3 Fedora End Of Life 2013-01-16 13:08:02 UTC
This message is a reminder that Fedora 16 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 16. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as WONTFIX if it remains open with a Fedora 
'version' of '16'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version prior to Fedora 16's end of life.

Bug Reporter: Thank you for reporting this issue and we are sorry that 
we may not be able to fix it before Fedora 16 is end of life. If you 
would still like to see this bug fixed and are able to reproduce it 
against a later version of Fedora, you are encouraged to click on 
"Clone This Bug" and open it against that version of Fedora.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

The process we are following is described here: 
http://fedoraproject.org/wiki/BugZappers/HouseKeeping

Comment 4 Fedora End Of Life 2013-02-13 13:48:25 UTC
Fedora 16 changed to end-of-life (EOL) status on 2013-02-12. Fedora 16 is 
no longer maintained, which means that it will not receive any further 
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
Fedora please feel free to reopen this bug against that version.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.