LINUX.ORG.RU

b43 + WPA-TKIP = fial


0

1

Есть:

Linux debian-mac-mini 2.6.32-5-powerpc #1 Mon Mar 7 22:49:07 UTC 2011 ppc GNU/Linux

dmesg|grep -E "b43|wlan0|phy0|80211" -
[    6.055527] b43-pci-bridge 0001:10:12.0: enabling device (0004 -> 0006)
[    9.496196] cfg80211: Using static regulatory domain info
[    9.507343] cfg80211: Regulatory domain: US
[    9.630535] cfg80211: Calling CRDA for country: US
[    9.773726] b43-phy0: Broadcom 4318 WLAN found (core revision 9)
[   10.187011] phy0: Selected rate control algorithm 'minstrel'
[   10.188061] Registered led device: b43-phy0::tx
[   10.217151] Registered led device: b43-phy0::rx
[   10.246192] Registered led device: b43-phy0::radio
[   15.300433] b43 ssb0:0: firmware: requesting b43/ucode5.fw
[   15.363150] b43 ssb0:0: firmware: requesting b43/pcm5.fw
[   15.380859] b43 ssb0:0: firmware: requesting b43/b0g0initvals5.fw
[   15.405261] b43 ssb0:0: firmware: requesting b43/b0g0bsinitvals5.fw
[   15.536418] b43-phy0: Loading firmware version 410.2160 (2007-05-26 15:32:10)
[   15.585511] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[  136.436413] b43-phy0: Loading firmware version 410.2160 (2007-05-26 15:32:10)
[  136.477575] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[  137.592547] wlan0: direct probe to AP 00:24:b2:28:e8:a2 (try 1)
[  137.792412] wlan0: direct probe to AP 00:24:b2:28:e8:a2 (try 2)
[  137.992408] wlan0: direct probe to AP 00:24:b2:28:e8:a2 (try 3)
[  138.192403] wlan0: direct probe to AP 00:24:b2:28:e8:a2 timed out
Script started on Sat 21 May 2011 10:55:23 AM PDTme.
root@debian-mac-mini:~# wpa_supplicant -dd -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
eapol_version=1
Line: 6 - start of a new network block
ssid - hexdump_ascii(len=10):
     52 69 73 69 6e 67 73 75 6e 32                     Risingsun2      
PSK - hexdump(len=32): [REMOVED]
Priority group 0                                      [ Read 10 lines ]
   id=0 ssid='Risingsun2'-mini:~# 
Initializing interface (2) 'wlan0'
WEXT: cfg80211-based driver detectedipt 
Interface wlan0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:14:51:7e:bf:51
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 2e 08 4e 38 b1 4d 5c b1 ad ae ad bf 67 8c ed fe
WPS: Build Beacon and Probe Response IEs
...
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Cached scan results are empty - not posting
Selecting BSS from priority group 0
...
Try to find WPA-enabled AP
0: 00:24:b2:28:e8:a2 ssid='Risingsun2' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:24:b2:28:e8:a2 ssid='Risingsun2'
Trying to associate with 00:24:b2:28:e8:a2 (SSID='Risingsun2' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
EAPOL: disable timer tick
Authentication with 00:24:b2:28:e8:a2 timed out.
Added BSSID 00:24:b2:28:e8:a2 into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
cat /etc/wpa_supplicant.conf 
# WPA-PSK/TKIP

ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
eapol_version=1
network={
	ssid="Risingsun2"
	scan_ssid=1
	proto=WPA
	key_mgmt=WPA-PSK
	pairwise=TKIP
	group=TKIP
	psk="xxx"
	#psk=xxx
}

Кто виноват? И как исправить?

TKIP не нужен.

А если серьезно, то у меня он под b43 завелся. Пожалуйста, поподробнее: на чем сеть держится, включен ли QoS?

segfault ★★★★★ ()
Ответ на: комментарий от andoriyu

С AЕS работает? Еще одна причина багов - иногда попадаются устройства/прошивки, берущие хеш пассфразы нестандартным способом. Лечится заданием ключа в 64-символьном хексе.

segfault ★★★★★ ()
Ответ на: комментарий от segfault

С AES не пробовал еще, надо роутер перенастраивать. 64-символьный хекс пробовал.

andoriyu ()
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.