• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

Frage zum HowTo:WEP und WPA

A

Anonymous

Gast
Hallo,

ich habe ein T-Sinus 111 Router der die WPA Verschlüsselung benutzt. Unter Suse 9.2 läuft auch alles, mit ndiswrapper und wpa_supplicant, wie es im HowTo beschrieben ist. Leider läuft das ganze jetzt nicht mehr unter Suse 9.3. Ich habe einmal Suse 9.3 neu installiert --> es geht nicht. Ein Suse 9.2 bei der das WLAN vorher lief, geht nach einen Update auch nicht mehr. Was ich feststellen konnte ist das nach dem Start der Router immer abgestürzt ist. Ich habe mal die Ausgaben der einzelnen Befehle angehangen. Ich hoffe es kann jemand von euch helfen.

Danke


iwconfig:

wlan0 IEEE 802.11b ESSID:"FRIEDA" Nickname:"linux"
Mode:Managed Frequency:2.462 GHz Access Point: 00:00:00:00:00:00
Bit Rate=11 Mb/s
RTS thr=-95 B Fragment thr=-95 B
Encryption key:eek:ff
Power Management min timeout:0us mode:All packets received
Link Quality:100/100 Signal level:-100 dBm Noise level:-256 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0


ifconfig:

wlan0 Link encap:Ethernet HWaddr 00:30:F1:A2:54:4F
inet addr:192.168.2.35 Bcast:192.168.2.255 Mask:255.255.255.0
inet6 addr: fe80::230:f1ff:fea2:544f/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5 errors:0 dropped:0 overruns:0 frame:0
TX packets:34 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:623 (623.0 b) TX bytes:3130 (3.0 Kb)

linux:~ # wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'ndiswrapper'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=6):
46 52 49 45 44 41 FRIEDA
PSK - hexdump(len=32): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x18
Priority group 0
id=0 ssid='FRIEDA'
Initializing interface (2) 'wlan0'
ioctl[SIOCSIWPMKSA]: No such device
Own MAC address: 00:30:f1:a2:54:4f
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 5 sec 0 usec
CTRL-EVENT-TERMINATING - signal 2 received
State: SCANNING -> DISCONNECTED
No keys have been configured - skip key clearing
 
OP
A

Anonymous

Gast
Hallo,

ich habe leider immer noch das oben beschriebene Problem.
Beim ersten Start von wpa_supplicant verbindet sich der Rechner kurz und danach ist der Router abgestürzt. Kann keiner von Euch sagen was bei Suse 9.3 anders ist als bei Suse 9.2? Ich hänge nochmal den code der Ausgabe, von wpa_supplicant, bis zum Absturz an.

Teil 1:

Code:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'ndiswrapp
er'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=6):
     46 52 49 45 44 41                                 FRIEDA
PSK - hexdump(len=32): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x18
Priority group 0
   id=0 ssid='FRIEDA'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:30:f1:a2:54:4f
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:30:f1:a0:78:a2 ssid='FRIEDA' wpa_ie_len=26 rsn_ie_len=0
   selected
Trying to associate with 00:30:f1:a0:78:a2 (SSID='FRIEDA' freq=2447 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c02 len=115
Custom wireless event: 'ASSOCINFO(ReqIEs=0006465249454441dd160050f20101000050f20
201000050f20201000050f202 RespIEs=010482848b96)'
Association info event
req_ies - hexdump(len=32): 00 06 46 52 49 45 44 41 dd 16 00 50 f2 01 01 00 00 50
 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=6): 01 04 82 84 8b 96
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50
f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:30:f1:a0:78:a2
Association event - clear replay counter
Associated to a new BSS: BSSID=00:30:f1:a0:78:a2
No keys have been configured - skip key clearing
Associated with 00:30:f1:a0:78:a2
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:30:f1:a0:78:a2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 5
3 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a 5c 49 7f
55 77 f7 07 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0
0 00 01 53 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a
5c 49 7f 55 77 f7 07 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:30:f1:a0:78:a2 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 6d 52 52 17 18 a4 4c d1 04 6a 56 95 69 fe
 07 ae f6 14 c3 78 15 c8 ed 39 29 4a ce 62 96 6f 2e 06
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): c3 7b ae aa 2e c4 c0 98 0e ed 0e 5d 62 8b
ee 0b
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 30 f1 a0 78 a2 00 30 f1 a2 54 4f 88
 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 6d 52 52 17 18 a4 4c d1 0
4 6a 56 95 69 fe 07 ae f6 14 c3 78 15 c8 ed 39 29 4a ce 62 96 6f 2e 06 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 c3 7b ae aa 2e c4 c0 98 0e ed 0e 5d 62 8b ee 0b 00 18 dd 16 00 50 f2 01 0
1 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:30:f1:a0:78:a2
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02
53 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a 5c 49 7f
 55 77 f7 07 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 1f f0 39 75 56 21 a1 7b eb 20 3c 6a 13 95 7d 4c
00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00
 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00
00 00 02 53 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a
 5c 49 7f 55 77 f7 07 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 1f f0 39 75 56 21 a1 7b eb 20 3c 6a 13
95 7d 4c 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50
 f2 02 00 00
WPA: RX message 3 of 4-Way Handshake from 00:30:f1:a0:78:a2 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 02 00 00
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 30 f1 a0 78 a2 00 30 f1 a2 54 4f 88
 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 6d 52 52 17 18 a4 4c d1 0
4 6a 56 95 69 fe 07 ae f6 14 c3 78 15 c8 ed 39 29 4a ce 62 96 6f 2e 06 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 19 1c ba a0 e7 38 31 07 cb 5a cf 73 14 84 fc 82 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:30:f1:a0:78:a2
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03
53 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a 5c 49 7f
 55 77 f7 07 eb f6 de 04 5c 70 03 07 65 9a 5c 49 7f 55 77 f7 07 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 5f c4 ad 0a 7a d2 d0 db fb d6 c0 4a 2f ce 31 a9
00 20 98 73 97 2c bb e8 b2 4e 53 65 90 a3 4a f8 87 71 c9 95 25 aa 4b 9c 3f 27 ea
 48 52 11 84 37 66 95
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00
00 00 03 53 c2 67 58 d3 e5 48 d1 05 a0 8d fe 45 21 c8 f6 de 04 5c 70 03 07 65 9a
 5c 49 7f 55 77 f7 07 eb f6 de 04 5c 70 03 07 65 9a 5c 49 7f 55 77 f7 07 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 5f c4 ad 0a 7a d2 d0 db fb d6 c0 4a 2f
ce 31 a9 00 20 98 73 97 2c bb e8 b2 4e 53 65 90 a3 4a f8 87 71 c9 95 25 aa 4b 9c
 3f 27 ea 48 52 11 84 37 66 95
WPA: RX message 1 of Group Key Handshake from 00:30:f1:a0:78:a2 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 30 f1 a0 78 a2 00 30 f1 a2 54 4f 88
 8e 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                               00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00                               00 00 bd 2a f1 b1 cf df d2 d7 ab ea f6 aa ea 20 50 ca 00 00
WPA: Key negotiation completed with 00:30:f1:a0:78:a2 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
 
OP
A

Anonymous

Gast
Teil 2:

Code:
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
Signal 2 received - terminating
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
 

TeXpert

Guru
für WEP braucht Ihr keinen wpa_supplicant, da reicht es aus die wireless-tools zu nutzen und die wep-Daten über YAST einzustellen.
 
OP
A

Anonymous

Gast
Ich benutze aber wpa und dafür brauche ich wpa_supplicant.
Die Verbindung funktioniert auch mit dem ndiswrapper. Aber sobald ich wpa Verschlüsselung benutze und somit auch wpa_supplicant benutzen muß geht nichts mehr. Beim ersten Versuch wird auch für ein paar Sekunden eine Verbindung hergstellt die dann aber wieder zusammenbricht und der Router gleich mit. Nach dem aus und wieder einschalten des Router geht das ganz von vorne los.
Wie geschrieben, bei Suse 9.2 ging noch alles.
 
Oben