Hide Forgot
Description of problem: After installing a new version of Fedora 16 i notice a problem with wireless, I'm unable to view all wireless network in range. After doing some search on google i see that peoples have same problem ( with broadcom wireless network card ), can view others wireless AP but can't see their own. If i use airodump (a tool utility from aircrack ) I'm able to view all wireless AP including that one's that are not listed in network-manager utility. Same result with Wicd . Version-Release number of selected component (if applicable): 0.9.2-1.fc16 --> NetworkManager 3.1.9-1.fc16.i686.PAE --> Kernel 10:00.0 Network controller: Broadcom Corporation BCM4311 802.11a/b/g (rev 02) --> wireless network How reproducible: Trying to connect to a wireless network from GNOME 3 using NetworkManager utility. Steps to Reproduce: 1.Always 2.Click on NetworkManager button up right in corner that's shows all wired,wireless,broadband,vpn networks available to connect on it. Actual results: Can't view all wireless. Expected results: View and connect to all wireless. Additional info: On Fedora 14 I'm able to view all wireless AP network and connect.
I also changed the wireless network adapter in my notebook with an Intel Wireless WiFi Link 4965AGN and same result..
iwlist scanning have the same issue
As several tools appear to be affected, then it's probably a kernel issue. Also, the networks could have hidden ESSID and thus they don't appear in NM list. Would you post scan results of different tools so that we can compare them? # iwlist wlan0 scan # iw wlan0 scan $ nmcli dev wifi list airodump scan results
[root@hpcompaq wireless]# iwlist wlan0 scan wlan0 Scan completed : Cell 01 - Address: xx:xx:xx:xx:xx:xx Channel:1 Frequency:2.412 GHz (Channel 1) Quality=35/70 Signal level=-75 dBm Encryption key:on ESSID:"startrek" Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 9 Mb/s 18 Mb/s; 36 Mb/s; 54 Mb/s Bit Rates:6 Mb/s; 12 Mb/s; 24 Mb/s; 48 Mb/s Mode:Master Extra:tsf=00000742a19f4948 Extra: Last beacon: 807ms ago IE: Unknown: 0008737461727472656B IE: Unknown: 010882848B961224486C IE: Unknown: 030101 IE: Unknown: 2A0104 IE: Unknown: 32040C183060 IE: Unknown: 2D1AEE1117FF000000010000000000000000000000000C0000000000 IE: Unknown: 3D1601050000000000000000000000000000000000000000 IE: Unknown: 3E0100 IE: WPA Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : TKIP CCMP Authentication Suites (1) : PSK IE: IEEE 802.11i/WPA2 Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : TKIP CCMP Authentication Suites (1) : PSK IE: Unknown: DD180050F2020101000003A4000027A4000042435E0062322F00 IE: Unknown: 7F0101 IE: Unknown: DD07000C4307000000 IE: Unknown: 07064B5220010D10 IE: Unknown: DD1E00904C33EE1117FF000000010000000000000000000000000C0000000000 IE: Unknown: DD1A00904C3401050000000000000000000000000000000000000000 [root@hpcompaq wireless]# [root@hpcompaq wireless]# iw wlan0 scan BSS xx:xx:xx:xx:xx:xx (on wlan0) TSF: 7982813696358 usec (92d, 09:26:53) freq: 2412 beacon interval: 100 capability: ESS Privacy ShortSlotTime (0x0411) signal: -74.00 dBm last seen: 632 ms ago Information elements from Probe Response frame: SSID: startrek Supported rates: 1.0* 2.0* 5.5* 11.0* 9.0 18.0 36.0 54.0 DS Parameter set: channel 1 ERP: Barker_Preamble_Mode Extended supported rates: 6.0 12.0 24.0 48.0 HT capabilities: Capabilities: 0x11ee HT20/HT40 SM Power Save disabled RX HT20 SGI RX HT40 SGI TX STBC RX STBC 1-stream Max AMSDU length: 3839 bytes DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 4 usec (0x05) HT RX MCS rate indexes supported: 0-7, 32 HT TX MCS rate indexes are undefined HT operation: * primary channel: 1 * secondary channel offset: above * STA channel width: any * RIFS: 0 * HT protection: no * non-GF present: 0 * OBSS non-GF present: 0 * dual beacon: 0 * dual CTS protection: 0 * STBC beacon: 0 * L-SIG TXOP Prot: 0 * PCO active: 0 * PCO phase: 0 WPA: * Version: 1 * Group cipher: TKIP * Pairwise ciphers: TKIP CCMP * Authentication suites: PSK RSN: * Version: 1 * Group cipher: TKIP * Pairwise ciphers: TKIP CCMP * Authentication suites: PSK * Capabilities: (0x0000) WMM: * Parameter version 1 * BE: CW 15-1023, AIFSN 3 * BK: CW 15-1023, AIFSN 7 * VI: CW 7-15, AIFSN 2, TXOP 3008 usec * VO: acm CW 3-7, AIFSN 2, TXOP 1504 usec Extended capabilities: HT Information Exchange Supported Country: KR Environment: Indoor/Outdoor Channels [1 - 13] @ 16 dBm [root@hpcompaq wireless]# [root@hpcompaq wireless]# nmcli dev wifi list SSID BSSID MODE FREQ RATE SIGNAL SECURITY ACTIVE 'mortonete' xx:xx:xx:xx:xx:xx Infrastructure 2462 MHz 54 MB/s 32 WPA no 'dlink-acasa' xx:xx:xx:xx:xx:xx Infrastructure 2437 MHz 54 MB/s 35 WEP no 'marian' xx:xx:xx:xx:xx:xx Infrastructure 2457 MHz 54 MB/s 32 WPA WPA2 no 'startrek' xx:xx:xx:xx:xx:xx Infrastructure 2412 MHz 54 MB/s 42 WPA WPA2 no [root@hpcompaq wireless]# airodump log BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID xx:xx:xx:xx:xx:xx -60 172 0 0 13 54 . WEP WEP ixtrem xx:xx:xx:xx:xx:xx -72 241 0 0 1 54e WPA2 CCMP PSK startrek xx:xx:xx:xx:xx:xx -79 4 0 0 6 54 . WEP WEP dlink-acasa The problem is with ESSID: ixtrem. I can see this AP only with airodump. Kernel update : 3.2.3-2.fc16.i686.PAE Same problem
This message is a reminder that Fedora 16 is nearing its end of life. Approximately 4 (four) weeks from now Fedora will stop maintaining and issuing updates for Fedora 16. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as WONTFIX if it remains open with a Fedora 'version' of '16'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version prior to Fedora 16's end of life. Bug Reporter: Thank you for reporting this issue and we are sorry that we may not be able to fix it before Fedora 16 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged to click on "Clone This Bug" and open it against that version of Fedora. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. The process we are following is described here: http://fedoraproject.org/wiki/BugZappers/HouseKeeping
Fedora 16 changed to end-of-life (EOL) status on 2013-02-12. Fedora 16 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. Thank you for reporting this bug and we are sorry it could not be fixed.