iwlist scan output incorrect?
scott
redhowlingwolves at nc.rr.com
Tue Mar 18 05:22:05 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Vitorio Okio wrote:
> On Mon, 17 Mar 2008 17:51:44 -0600, jim barnes wrote:
>
>> On Monday 17 March 2008 15:10:40 Vitorio Okio wrote:
>>> Yes the settings are in nvram. Here is the output:
>>>
>>> ~#nvram show | grep aes
>>> wl_crypto=aes
>>> wl0_wds0=*,auto,aes,psk2,MyESSID,This_Is_My_Passphrase wl0_crypto=aes
>> Gosh, at this point I think a second opinion from a third party is in
>> order... Preferably one with a different wireless card, who can verify
>> the output of iwlist ethx scanning (or equivalent?).
>>
>> I'm siding with the router config!
>
> Well, considering the following I think the problem is either in 'iwlist'
> or in my card reporting to 'iwlist' incorrectly.
>
> Again, here is my DD-WRT router nvram:
>
> ~ # nvram show | grep aes
> wl_crypto=aes
> wl0_wds0=*,auto,aes,psk2,MySSID,xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx
> wl0_crypto=ae
>
> Here is output of 'sudo iwlist eth1 wpakeys':
>
> user at hostname:~$ sudo iwlist eth1 wpakeys
> eth1 2 key sizes : 40, 104bits
> 4 keys available :
> [1]: xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx (128 bits)
> Address: 00:00:00:00:00:00
> Algorithm: CCMP Flags: 0x00000001
> tx-seq-valid
> [2]: xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx (128 bits)
> Address: 00:00:00:00:00:00
> Algorithm: CCMP Flags: 0x00000001
> tx-seq-valid
> [3]: xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx (128 bits)
> Address: 00:00:00:00:00:00
> Algorithm: CCMP Flags: 0x00000001
> tx-seq-valid
> Error reading wpa keys (SIOCGIWENCODEEXT): Invalid argument
> Current Transmit Key: [1]
>
> And here is output of 'sudo iwlist eth1 genie':
>
> user at hostname:~$ sudo iwlist eth1 genie
> eth1
> IE: IEEE 802.11i/WPA2 Version 1
> Group Cipher : TKIP
> Pairwise Ciphers (1) : TKIP
> Authentication Suites (1) : PSK
>
> You can clearly see that the last 2 iwlist outputs are in complete
> contradiction each with other (note CCMP vs TKIP reported).
>
> In addition I had this rendig:
>
> user at hostname:~$ sudo lsmod | grep aes
> aes 28608 3
>
> While both these rending nothing:
>
> user at hostname:~$ sudo lsmod | grep ieee80211_crypt_tkip.ko
> user at hostname:~$ sudo lsmod | grep ieee80211_crypt_tkip
>
> That is, the only encryption related module loaded while I'm connected is
> 'aes' module.
>
> Thus I'm quite positive now that I'm connecting using WPA2-PSK/AES. And
> the problem is as stated above: either in iwlist or in bcm43xx reporting
> incorrectly. Actually this line in the iwlist output above probably
> supports the last suggested:
>
> "Error reading wpa keys (SIOCGIWENCODEEXT): Invalid argument"
>
>
>
Sounds like a compatibility issue between the card's chipset in your box
and the chipset in the router.
Handshakes through the registers may be at different offsets.
B**ch, isn't it?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFH31F9s+9h2X0fCGcRAlkHAKCUNMD1+3hPDx26n3bYO6s41n2oHwCfZhH6
eVst3FfyW2aFc8TbvIJ+t6s=
=WVhv
-----END PGP SIGNATURE-----
More information about the ubuntu-users
mailing list