I am trying to connect to a university wireless using wpa_supplicant and opensuse. I’ve tried using a NetGear WG311v2 using ndiswrapper and TrendNet TEW424UB using ndiswrapper
This is the wpa_supplicant file:
ctrl_interface=/var/run/wpa_supplicant
network={
key_mgmt=IEEE8021X
proto=RSN
eap=PEAP
scan_ssid=1
mode=0
ca_cert="/etc/cert/verisign.pem"
pairwise=CCMP TKIP
password=“PasswordHere”
group=CCMP TKIP
identity=“UserIDHere”
phase2=“auth=MSCHAPV2”
ssid=“WATERVIEW”
}
results of wpa_supplicant -Dwext -iwlan1 -c/etc/wpa_supplicant.conf -dd
Initializing interface ‘wlan1’ conf ‘/etc/wpa_supplicant.conf’ driver ‘wext’ ctrl_interface ‘N/A’ bridge ‘N/A’
Configuration file ‘/etc/wpa_supplicant.conf’ -> ‘/etc/wpa_supplicant.conf’
Reading configuration file ‘/etc/wpa_supplicant.conf’
ctrl_interface=’/var/run/wpa_supplicant’
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=9):
57 41 54 45 52 56 49 45 57 WATERVIEW
key_mgmt: 0x8
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
identity - hexdump_ascii(len=9):
61 78 73 30 38 32 30 30 30 axs082000
password - hexdump_ascii(len=32): [REMOVED]
ca_cert - hexdump_ascii(len=22):
2f 65 74 63 2f 63 65 72 74 2f 76 65 72 69 73 69 /etc/cert/verisi
67 6e 2e 70 65 6d gn.pem
Priority group 0
id=0 ssid=‘WATERVIEW’
Initializing interface (2) ‘wlan1’
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:14:d1:53:f6:85
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
Added interface wlan1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface ‘wlan1’ added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 1027 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:14:d1:40:45:e1 ssid=‘busybees’ wpa_ie_len=24 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
1: 00:19:e4:09:f2:e1 ssid=‘2WIRE269’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
2: 00:1a:70:d8:91:a1 ssid=‘1222’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
3: 00:02:2d:9d:dc:9c ssid=‘WATERVIEW’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
4: 00:02:2d:2e:05:22 ssid=‘WATERVIEW’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:14:d1:40:45:e1 ssid=‘busybees’ wpa_ie_len=24 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
1: 00:19:e4:09:f2:e1 ssid=‘2WIRE269’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
2: 00:1a:70:d8:91:a1 ssid=‘1222’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
3: 00:02:2d:9d:dc:9c ssid=‘WATERVIEW’ wpa_ie_len=0 rsn_ie_len=0 caps=0x11
selected non-WPA AP 00:02:2d:9d:dc:9c ssid=‘WATERVIEW’
Trying to associate with 00:02:2d:9d:dc:9c (SSID=‘WATERVIEW’ freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=17
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=25
AssocReq IE wireless event - hexdump(len=17): 00 09 57 41 54 45 52 56 49 45 57 01 04 82 84 8b 96
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface ‘wlan1’ added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:02:2d:9d:dc:9c
Association info event
req_ies - hexdump(len=17): 00 09 57 41 54 45 52 56 49 45 57 01 04 82 84 8b 96
WPA: clearing own WPA/RSN IE
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:02:2d:9d:dc:9c
No keys have been configured - skip key clearing
Associated with 00:02:2d:9d:dc:9c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:02:2d:9d:dc:9c
RX EAPOL - hexdump(len=56): 01 00 00 34 01 01 00 34 01 6e 65 74 77 6f 72 6b 69 64 3d 57 41 54 45 52 56 49 45 57 2c 6e 61 73 69 64 3d 61 70 77 76 2d 31 2d 31 32 2d 31 61 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=47):
6e 65 74 77 6f 72 6b 69 64 3d 57 41 54 45 52 56 networkid=WATERV
49 45 57 2c 6e 61 73 69 64 3d 61 70 77 76 2d 31 IEW,nasid=apwv-1
2d 31 32 2d 31 61 2c 70 6f 72 74 69 64 3d 30 -12-1a,portid=0
EAP: using real identity - hexdump_ascii(len=9):
61 78 73 30 38 32 30 30 30 axs082000
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=18): 01 00 00 0e 02 01 00 0e 01 61 78 73 30 38 32 30 30 30
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:02:2d:9d:dc:9c
RX EAPOL - hexdump(len=10): 01 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: Trusted root certificate(s) loaded
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 99 bytes pending from ssl_out
SSL: 99 bytes left to be sent out (of total 99 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=109): 01 00 00 69 02 02 00 69 19 00 16 03 01 00 5e 01 00 00 5a 03 01 48 b6 af bd 33 ea af 9c ab 3f 76 95 dd 2b 85 e5 76 e7 ee cc ed 8b 89 ea 7e 46 0d 1c ae 8f 5a 5c 00 00 32 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:02:2d:9d:dc:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed