Belkin wireless card F5D7010 WPA-PSK TKIP Works!!!!!!
OS: Fedora Core 2
Wireless Card: Belkin 54M Router : Belkin Wrapper: ndiswrapper WPA: wpa Supplicant BTW : Correction it aint PSA it is PSK(Pre Shared Key) ;) What I did.................... STEP 1: Install ndiswrapper 0.9 Follow instructions ..... /***** Did you read the INSTALL files? Install file follows: * Quickstart guide * ==================== Prerequisites ------------- * You need a recent kernel (at least 2.6.0 or 2.4.20) with source. * Make sure there is a link to the source from the modules directory: '/lib/modules/<VERSION>/build' should be a link to the kernel source, where <VERSION> is the version of the kernel you are running. * Some vendors ship ndiswrapper in their distributions. Either use it or make sure you remove it before installing ndiswrapper by yourself. Upgrading ========= If you are upgrading from version 0.4 or earlier make sure you delete any old version of loadndisdriver and any configuration in modules.conf and modprobe.conf since the new commands are not compatible with this release. Installation ============ 1. Compile and install ---------------------- As root run > make install This should compile both the kernel module and the userspace utilities. 2. Install your windows driver ------------------------------ Download the Windows XP drivers, unpack it and locate the .inf for your card. Run ndiswrapper -i to install the driver > ndiswrapper -i </path/to/inffile.inf> This copies all necessary files to /etc/ndiswrapper and creates the config files for your card. After installing you can run > ndiswrapper -l to see the status of your installed drivers. If you have installed the correct driver you should see something like this: Installed ndis drivers: bcmwl5 present Where "present" means that you have a PCI-device present that can be used with the driver bcmwl5. 3. Load module -------------- To load the module type > modprobe ndiswrapper. If you get no error the driver should now be loaded and active. You can verify this by checking system log (produced by 'dmesg'). If the driver is loaded successfully, you should see a message: wlan0: ndiswrapper ethernet device xx:xx:xx:xx:xx:xx 4. Configure interface ---------------------- Use iwconfig to configure wireless network interface. First, locate the wireless interface: > iwconfig This will print the wireless interface (e.g., wlan0). In the examples below wlan0 is used; replace wlan0 with the interface reported by iwconfig above. Set the operating mode of the interface according to your setup. In most cases, it is Managed: > iwconfig wlan0 mode Managed If you use encryption (WEP), set the key: > iwconfig wlan0 key restricted XXXXXXXX You can use 6 hex digits for 40-bit encryption or 10 hex digits for 128-bit encryption. You may need to use 'open' security mode instead of 'restricted' depending on the setup of your AP (access point). Set the network name: > iwconfig wlan0 essid ESSID Replace ESSID with the network name used by your AP. Now, setup the network parameters for the interface wlan0. This varies from distribution to distribution. Refer to your distribution's documents on how to do this. Once this is done, you can use network tools to bring up the network; e.g., > ifconfig wlan0 up 5. Automate ----------- Once everything works fine you can write the correct modeprobe settings to load ndiswrapper automatically by running > ndiswrapper -m ******************/ STEP2 : Install WPA supplicant.........(if you are using WPA-PSK TKIP or other) /**************** Follow simle instructions in the readme file of wpa_supplicant file ***/ STEP 3: Network configuration I left everythin on "Auto" check out print screens--Gotta find a way to post/upload them :( STEP 4: Edited the /etc/pcmcia/wireless.opts options Was that necessary, dunno??? Will find out if I have to restart the machine Idea is to make pcmcia do the scanning by spawning the process/wpa_supplicant. STEP 5: wpa_supplicant file in my /etc/wpa_supplicant.conf looks like this as I have a WPA-PSK TKIP encryption. Voila, all this I am writing on my fedora core 2 box and posting on the website.... Contents of my /etc/pcmcia/wireless.opts file..that I added. MODE="Managed" WPA="y" case "$ADDRESS" in # NOTE : Remove the following four lines to activate the samples below ... if [ "$WPA" = "y" -a -x /usr/local/bin/wpa_supplicant ]; then /usr/local/bin/wpa_supplicant -Bw -c/etc/wpa_supplicant.conf \ -i$DEVICE fi if [ "$WPA" = "y" -a -x /usr/local/bin/wpa_supplicant ]; then killall wpa_supplicant fi Contents of my wpa_suplicant.conf /***************************************************** ##### Example wpa_supplicant configuration file ############################### # Empty lines and lines starting with # are ignored # NOTE! This file may contain password information and should probably be made # readable only by root user on multiuser systems. # global configuration (shared by all network blocks) # # Interface for separate control program. If this is specified, wpa_supplicant # will create this directory and a UNIX domain socket for listening to requests # from external programs (CLI/GUI, etc.) for status information and # configuration. The socket file will be named based on the interface name, so # multiple wpa_supplicant processes can be run at the same time if more than # one interface is used. # /var/run/wpa_supplicant is the recommended directory for sockets and by # default, wpa_cli will use it when trying to connect with wpa_supplicant. ctrl_interface=/var/run/wpa_supplicant # Access control for the control interface can be configured by setting the # directory to allow only members of a group to use sockets. This way, it is # possible to run wpa_supplicant as root (since it needs to change network # configuration and open raw sockets) and still allow GUI/CLI components to be # run as non-root users. However, since the control interface can be used to # change the network configuration, this access needs to be protected in many # cases. By default, wpa_supplicant is configured to use gid 0 (root). If you # want to allow non-root users to use the contron interface, add a new group # and change this value to match with that group. Add users that should have # control interface access to this group. # # This variable can be a group name or gid. #ctrl_interface_group=wheel #ctrl_interface_group=0 # IEEE 802.1X/EAPOL version # wpa_supplicant was implemented based on IEEE 802-1X-REV-d8 which defines # EAPOL version 2. However, there are many APs that do not handle the new # version number correctly (they seem to drop the frames completely). In order # to make wpa_supplicant interoperate with these APs, the version number is set # to 1 by default. This configuration value can be used to set it to the new # version (2). #eapol_version=1 # AP scanning/selection # By default, wpa_supplicant requests driver to perform AP scanning and then # uses the scan results to select a suitable AP. Another alternative is to # allow the driver to take care of AP scanning and selection and use # wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association # information from the driver. # 1: wpa_supplicant initiates scanning and AP selection # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association # parameters (e.g., WPA IE generation); this mode can also be used with # non-WPA drivers when using IEEE 802.1X mode ap_scan=1 network={ ssid="belkin54g" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 psk="my secure phrase" priority=2 } *************************************************************************************/ Commands on the console......... First this..... /********************** [root@localhost root]# wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplican t.conf -dd Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' ap_scan=1 Line: 55 - start of a new network block SSID - hexdump_ascii(len=9): 62 65 6c 6b 69 6e 35 34 67 belkin54g proto: 0x1 key_mgmt: 0x2 pairwise: 0x18 group: 0x1e PSK (ASCII passphrase) - hexdump_ascii(len=16): 24 6f 72 61 5f 68 6f 6d 65 5f 75 33 76 56 56 priority=2 PSK (from passphrase) - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 02 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e Priority group 2 id=0 ssid='belkin54g' Using existing control interface directory. Setting scan request: 0 sec 100000 usec Starting AP scan (broadcast SSID) Scan timeout - try to get results Received 618 bytes of scan results (2 BSSes) Scan results: 2 Selecting BSS from priority group 2 0: 00:30:bd:fe:c7:9a ssid='belkin54g' wpa_ie_len=24 rsn_ie_len=0 selected Trying to associate with 00:30:bd:fe:c7:9a (SSID='belkin54g' freq=2462 MHz) Cancelling scan request WPA: using IEEE 802.11i/D3.0 WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Setting authentication timeout: 5 sec 0 usec Wireless event: cmd=0x8c02 len=201 Custom wireless event: 'ASSOCINFO(ReqIE9624304 86c32040c121860dd050010180100dd160050f20101000050f20201000050f20201000050f202 Re spIEdd050010180100)' Association info event req_ies - hexdump(len=58): 00 09 62 65 6c 6b 69 6e 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f 2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:30:bd:fe:c7:9a Association event - clear replay counter Associated to a new BSS: BSSID=00:30:bd:fe:c7:9a Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 7 3 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0 0 00 00 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 WPA: RX message 1 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1) WPA: Renewed SNonce - hexdump(len=32): 72 66 96 ad 3a 19 9a 82 55 31 10 42 8c 39 2a 4d 77 96 93 c7 87 64 b7 d4 f5 44 e8 bb d0 9b 15 d1 WPA: PMK - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 0 2 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e WPA: PTK - hexdump(len=64): c6 a0 49 da f3 a6 4d 8d 1f 24 c4 92 e0 74 63 f4 94 4 3 1b 16 77 35 0f f2 d8 e0 2f 4a 8b dd c0 23 10 be d2 0b df f7 d9 ac 90 91 ed 4f 63 e4 e0 62 64 15 07 d3 c9 1c c6 a5 a9 8b dd de 20 61 df bc WPA: EAPOL-Key MIC - hexdump(len=16): 11 67 ef e7 eb 77 48 23 7d 8f e9 d2 af 09 44 a4 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 72 66 96 ad 3a 19 9a 82 5 5 31 10 42 8c 39 2a 4d 77 96 93 c7 87 64 b7 d4 f5 44 e8 bb d0 9b 15 d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 67 ef e7 eb 77 48 23 7d 8f e9 d2 af 09 44 a4 00 18 dd 16 00 50 f2 01 0 1 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 bb 15 e4 f8 0e 62 e9 77 e3 bd a7 97 34 5b 0e 72 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 15 e4 f8 0e 62 e9 77 e3 bd a7 97 34 5b 0e 72 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK WPA: Could not verify EAPOL-Key MIC - dropping packet Authentication with 00:30:bd:fe:c7:9a timed out. Setting scan request: 0 sec 0 usec Starting AP scan (broadcast SSID) Scan timeout - try to get results Received 618 bytes of scan results (2 BSSes) Scan results: 2 Selecting BSS from priority group 2 0: 00:30:bd:fe:c7:9a ssid='belkin54g' wpa_ie_len=24 rsn_ie_len=0 selected Trying to associate with 00:30:bd:fe:c7:9a (SSID='belkin54g' freq=2462 MHz) Cancelling scan request WPA: using IEEE 802.11i/D3.0 WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Setting authentication timeout: 5 sec 0 usec Wireless event: cmd=0x8c02 len=201 Custom wireless event: 'ASSOCINFO(ReqIE9624304 86c32040c121860dd050010180100dd160050f20101000050f20201000050f20201000050f202 Re spIEdd050010180100)' Association info event req_ies - hexdump(len=58): 00 09 62 65 6c 6b 69 6e 35 34 67 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f 2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:30:bd:fe:c7:9a Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 7 3 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0 0 00 00 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 WPA: RX message 1 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1) WPA: Renewed SNonce - hexdump(len=32): 04 83 cb eb b5 37 5a b7 88 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c WPA: PMK - hexdump(len=32): 12 53 29 54 cf d3 6a a4 67 bd f6 a4 9c 11 11 e0 15 0 2 38 a0 cf 52 f7 97 f6 b7 52 a6 0f 16 aa 7e WPA: PTK - hexdump(len=64): c6 5e 9d 3e da 38 fe d5 f6 95 d9 7d 05 73 05 15 40 8 e 5f 72 f0 a9 42 2a 5f ee 30 47 64 30 ca 55 11 5f 15 6b 61 4b f0 b2 a4 49 b3 11 80 9e c4 dc 49 16 3b b5 8a 2a e9 5f 60 c5 0d dc db 2e 32 a3 WPA: EAPOL-Key MIC - hexdump(len=16): 78 55 bc 63 3a c7 03 9f 60 a8 a0 8f 2a bf 86 53 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 04 83 cb eb b5 37 5a b7 8 8 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 55 bc 63 3a c7 03 9f 60 a8 a0 8f 2a bf 86 53 00 18 dd 16 00 50 f2 01 0 1 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 bf ab bc 18 ff 14 46 cc 69 aa 63 c3 48 3c 51 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 bf ab bc 18 ff 14 46 cc 69 aa 63 c3 48 3c 51 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: RX message 3 of 4-Way Handshake from 00:30:bd:fe:c7:9a (ver=1) WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 04 83 cb eb b5 37 5a b7 8 8 81 c5 86 4e 52 7e 96 1d 62 f0 12 d1 dc b9 3f e2 69 98 d4 be f7 41 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 ec 34 74 9f b1 c3 20 1a 11 81 4a 88 85 ee 63 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 02 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ec 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 60 74 23 15 89 3d cd 85 23 c4 44 ad 07 d2 b8 dd 00 20 64 7f ca 2e 39 c7 b9 56 b3 df 23 d7 d5 39 13 73 f1 e4 dc ea 72 59 43 25 66 bb 2e b9 d3 f3 6b 8a IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 02 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 ec 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 60 74 23 15 89 3d cd 85 23 c4 44 ad 07 d2 b8 dd 00 20 64 7f ca 2e 39 c7 b9 56 b3 df 23 d7 d5 39 13 73 f1 e4 dc ea 72 59 43 25 66 bb 2e b9 d3 f3 6b 8a WPA: RX message 1 of Group Key Handshake from 00:30:bd:fe:c7:9a (ver=1) WPA: Group Key - hexdump(len=32): b6 eb 7f e0 9c 53 3b a0 e0 24 2d 91 32 c3 e7 4 f 04 72 74 98 83 f0 00 30 9c 75 48 a9 ad c4 b2 57 WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 fb 75 a2 d2 68 b6 e9 d9 68 ff 20 98 3f 37 99 00 00 WPA: Key negotiation completed with 00:30:bd:fe:c7:9a Cancelling authentication timeout RX EAPOL from 00:30:bd:fe:c7:9a RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f2 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 0d 49 4c 63 b4 cb eb 5d b7 48 5e 81 64 dc da 53 00 20 bf da ab 13 dd 46 70 87 2e 8f 7a 07 45 c8 46 c2 00 24 ae 6a 88 5a 47 8c 52 f0 e8 3b f0 13 fc a6 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 73 ae ad 6e 41 67 5c 2e 88 d7 80 22 99 53 fc 10 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f1 10 37 3d f0 7f 4e bc 77 6d 9a 17 ab 72 0f c2 f2 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 49 4c 63 b4 cb eb 5d b7 48 5e 81 64 dc da 53 00 20 bf da ab 13 dd 46 70 87 2e 8f 7a 07 45 c8 46 c2 00 24 ae 6a 88 5a 47 8c 52 f0 e8 3b f0 13 fc a6 WPA: RX message 1 of Group Key Handshake from 00:30:bd:fe:c7:9a (ver=1) WPA: Group Key - hexdump(len=32): 15 14 2f 10 31 ce 84 20 16 fe 40 73 2a a7 74 d 4 9a 92 ad d6 13 d0 ac 9b da 0d 6f 56 37 03 d3 bf WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 30 bd fe c7 9a 00 30 bd f4 c1 13 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 48 c6 91 5a da 9b 84 97 30 65 4f a5 9d d9 c7 00 00 WPA: Key negotiation completed with 00:30:bd:fe:c7:9a Cancelling authentication timeout ******************************************/ rem Note since this long debugged mungo is not what you'll be interested, start next time(hopefully the rem pcmcia will spawn everything up on machine startup(I'll report back anyways if it does) rem then do a simple " wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplican t.conf -B" without rem these duoble quotes ofcourse :-) Second this..........actually simultaneously......... /********************************************* [root@localhost root]# dhclient wlan0 Internet Systems Consortium DHCP Client V3.0.1rc14 Copyright 2004 Internet Systems Consortium. All rights reserved. For info, please visit http://www.isc.org/products/DHCP sit0: unknown hardware address type 776 sit0: unknown hardware address type 776 Listening on LPF/wlan0/00:30:bd:f4:c1:13 Sending on LPF/wlan0/00:30:bd:f4:c1:13 Sending on Socket/fallback DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 8 DHCPOFFER from 172.22.202.1 DHCPREQUEST on wlan0 to 255.255.255.255 port 67 DHCPACK from 172.22.202.1 bound to 172.22.202.2 -- renewal in 493108294 seconds. [root@localhost root]# ******************************************/ rem Voila I could talk to my router/dhcp server as well and I am browsing on internet from my fedora core 2 OS. Yoohooooooooooooooooooo............. Cheers Tarry :Pengy: :D |
Does this installation also work for AES encryption ?
Sincerely, Kikker |
I can't get this to work with ndiswrapper 0.10.
Ndiswrapper works but I can't get it to work with the wpa_supplicant 2.4 (hardware is Belkin card F5D7010) Any ideas ? Failed to enable wpa in the driver. Sincerely, Kikker |
Well I used ndiswrapper 0.9(was latest then) and supplicant 2.4.
You've got the same card , it has got to work..I gave a very detailed expl. up there. Where does it go wrong? starting supplicant? doing dhcp discovery? questions? questions? And yes supplicant has AES support as well....But what's wrong with TKIP? |
All times are GMT -5. The time now is 07:11 PM. |