Hallo liebe Gemeinde!
Ich bin noch Linux-Newbie. Das Thema Fritz!USB wird ja schon (zu) oft diskutiert.
Daher habe ich mich in den letzten Tagen intensiv durch die Foren gewurschtelt und es auch ziemlich weit geschafft.
Nun waehnte ich mich eigentlich schon auf der Zielgeraden...
Leider bekomme ich nun vom wpa_supplicant eine Meldung, zu der ich keine Lösung finden kann. (Ich poste die Ausgabe weiter unten, denn sie ist doch recht umfangreich)
Ich wuerde mich sehr freuen, wenn mir jemand von Euch helfen könnte!
Ich habe folgende Konfiguration:
- SuSE 10.2 (Kernel 2.6.18.2-34-default) / KDE 3.5
- KNetworkManager
- Fritz!USB - Stick
- dazu den RC1 des AVM-Treibers (fwlanusb-suse102-1.00.00-rc1.tar.tar) von www.avm.de
- (zusätzlich ist eine WLAN-Karte fest eingebaut; orinoco-chip / die kann aber kein WPA)
- Kernel ist neu compiliert
- iwlist wlan1 scan ließ mich hoffen:
wlan1 Scan completed :
Cell 01 - Address: 00:1A:4F:21:C1:86
ESSID:"KLIPPSNET"
IE: WPA Version 1
Group Cipher : WEP-40
Pairwise Ciphers (1) : WEP-40
Authentication Suites (1) : PSK
- ich befinde mich in dem pfad, wo das config-script steht und jetzt starte ich
/home/rh/Temp/fritz # wpa_supplicant -Dwext -i wlan1 -c config-wpa -dd
Initializing interface 'wlan1' conf 'config-wpa' driver 'wext' ctrl_interface 'N/A'
Configuration file 'config-wpa' -> '/home/rh/Temp/fritz/config-wpa'
Reading configuration file '/home/rh/Temp/fritz/config-wpa'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=9):
4b 4c 49 50 50 53 4e 45 54 KLIPPSNET
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='KLIPPSNET'
Initializing interface (2) 'wlan1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=9 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:1a:4f:9e:ec:a6
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 71 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:1a:4f:21:c1:86 ssid='KLIPPSNET' wpa_ie_len=26 rsn_ie_len=0 caps=0x0
selected based on WPA IE
Trying to associate with 00:1a:4f:21:c1:86 (SSID='KLIPPSNET' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=18
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1a:4f:21:c1:86
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:1a:4f:21:c1:86
No keys have been configured - skip key clearing
Associated with 00:1a:4f:21:c1:86
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:1a:4f:21:c1:86
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1a:4f:21:c1:86 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 15 83 95 e2 7a 59 4f 3c 79 ed fc 36 f2 c3 59 5b 06 85 d7 6f 73 79 54 e7 9b 2f 9a ba 20 77 43 0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 15 83 95 e2 7a 59 4f 3c 79 ed fc 36 f2 c3 59 5b 06 85 d7 6f 73 79 54 e7 9b 2f 9a ba 20 77 43 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 60 64 2c bd 1a da bf 26 86 b9 33 fe a2 e5 dc 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:1a:4f:21:c1:86
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 56 a4 76 f6 ed 9d bd d2 35 97 83 09 3d 85 fe 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=26
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 61 56 a4 76 f6 ed 9d bd d2 35 97 83 09 3d 85 fe
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 56 a4 76 f6 ed 9d bd d2 35 97 83 09 3d 85 fe 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:1a:4f:21:c1:86 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 48 d6 a3 ee e1 d6 7c 0f d4 99 0e 41 b0 f2 4c 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:1a:4f:21:c1:86
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2b c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 2a 3a 2a 63 fd fa 9d bb 45 83 bf d5 97 95 17 00 20 68 78 33 f4 55 f6 47 59 64 f9 14 06 a1 b9 e3 47 c2 6d c4 15 c1 7f e1 b0 86 21 6b da 77 20 1e 91
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2b
key_iv - hexdump(len=16): c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2d
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): b0 2a 3a 2a 63 fd fa 9d bb 45 83 bf d5 97 95 17
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 e1 80 88 1e 5d e6 a9 61 b8 51 b3 8b 90 b1 cd 38 c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2b c6 45 f6 4b ec 33 f0 f5 1e 3b 89 31 a4 ca 9b 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 2a 3a 2a 63 fd fa 9d bb 45 83 bf d5 97 95 17 00 20 68 78 33 f4 55 f6 47 59 64 f9 14 06 a1 b9 e3 47 c2 6d c4 15 c1 7f e1 b0 86 21 6b da 77 20 1e 91
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:1a:4f:21:c1:86 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 5f f1 1f 2c a8 e6 4b 84 58 b1 e7 2a 6d 87 7c 00 00
WPA: Key negotiation completed with 00:1a:4f:21:c1:86 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:1a:4f:21:c1:86 completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
Ignore event for foreign ifindex 3
// Ende der Ausgabe //
- Wo liegt mein Fehler?
- Was kann ich tun?
Waere schoen, wenn Ihr mir bitte irgendwie helfen koenntet!
Gruss & Dank!
heliolith.
p.s.: ich hoffe, ich in dem kauderwelsch ist nicht irgendwo der schluessel zu meiner box "offengelegt" - sonst nutzt mir ja die ganze WPA-verschluesselung nixx ;-))
Lesezeichen