problems with ipw2200 or where the problem lies...
Anton Kupriyanov
dr.warrior
Wed Feb 16 22:06:56 PST 2005
On Wed, 16 Feb 2005 18:48:46 +0000, Pedro Ramalhais
<ramalhais at serrado.net> wrote:
> On Wed, 2005-02-16 at 13:59, Anton Kupriyanov wrote:
> > please look my post about wpa_supplicant here...
> > http://forums.gentoo.org/viewtopic-t-296050.html
>
> Supply wpa_supplicant's log with -dddd
> --
> Pedro Ramalhais <ramalhais at serrado.net>
here it is....
Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'ipw2100'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=6):
4b 49 54 54 45 4e KITTEN
scan_ssid=1 (0x1)
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='KITTEN'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0e:35:44:4f:7a
wpa_driver_ipw2100_set_wpa: enabled=1
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_countermeasures: enabled=0
wpa_driver_ipw2100_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=6):
4b 49 54 54 45 4e KITTEN
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
Received 256 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:88:9d:6f:68 ssid='KITTEN' wpa_ie_len=26 rsn_ie_len=0
selected
Trying to associate with 00:0d:88:9d:6f:68 (SSID='KITTEN' freq=0 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw2100_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw2100_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=19
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:88:9d:6f:68
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:88:9d:6f:68
No keys have been configured - skip key clearing
Associated with 00:0d:88:9d:6f:68
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
RX EAPOL from 00:0d:88:9d:6f:68
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 ae 99 e4 7e 9b 66 9d c9 0e 3b 28 78 88 75 a3 69 63 12 8b 2e
6f c5 a8 f4 8e a3 3c ba 2e 22 1c fb 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 ae 99 e4 7e 9b 66 9d c9 0e 3b 28 78 88 75 a3 69 63
12 8b 2e 6f c5 a8 f4 8e a3 3c ba 2e 22 1c fb 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0d:88:9d:6f:68 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 14 b6 24 91 9d 58 a6 32 99 b5
a7 62 5a 98 81 6b aa 30 81 d8 31 c5 41 3a 6d 3e 09 32 96 27 76 c1
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 82 bf 46 2e 88 39 be 13 49 83 4c
72 e0 f4 8b d0
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 88 9d 6f 68 00 0e 35
44 4f 7a 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 14
b6 24 91 9d 58 a6 32 99 b5 a7 62 5a 98 81 6b aa 30 81 d8 31 c5 41 3a
6d 3e 09 32 96 27 76 c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 82 bf 46 2e 88 39
be 13 49 83 4c 72 e0 f4 8b d0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0d:88:9d:6f:68
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00
00 00 02 ae 99 e4 7e 9b 66 9d c9 0e 3b 28 78 88 75 a3 69 63 12 8b 2e
6f c5 a8 f4 8e a3 3c ba 2e 22 1c fb 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 c9
a9 72 c9 c1 84 85 8a 76 5f 94 ef 8b 6f a4 00 1a dd 18 00 50 f2 01 01
00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00
00 00 00 00 00 02 ae 99 e4 7e 9b 66 9d c9 0e 3b 28 78 88 75 a3 69 63
12 8b 2e 6f c5 a8 f4 8e a3 3c ba 2e 22 1c fb 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 40 c9 a9 72 c9 c1 84 85 8a 76 5f 94 ef 8b 6f a4 00 1a dd 18 00 50
f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: RX message 3 of 4-Way Handshake from 00:0d:88:9d:6f:68 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0d 88 9d 6f 68 00 0e 35
44 4f 7a 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 14
b6 24 91 9d 58 a6 32 99 b5 a7 62 5a 98 81 6b aa 30 81 d8 31 c5 41 3a
6d 3e 09 32 96 27 76 c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 53 2c 3b 60 4e
2c 3a 66 69 ae b5 5f dc ee 9d 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw2100_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23 idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22 idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21 idleWhile=51
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20 idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19 idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18 idleWhile=48
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=17 idleWhile=47
Authentication with 00:0d:88:9d:6f:68 timed out.
Added BSSID 00:0d:88:9d:6f:68 into blacklist
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=16 idleWhile=46
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15 idleWhile=45
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=14 idleWhile=44
Scan timeout - try to get results
Received 256 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:88:9d:6f:68 ssid='KITTEN' wpa_ie_len=26 rsn_ie_len=0
skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 00:0d:88:9d:6f:68 from blacklist (clear)
Selecting BSS from priority group 0
0: 00:0d:88:9d:6f:68 ssid='KITTEN' wpa_ie_len=26 rsn_ie_len=0
selected
Trying to associate with 00:0d:88:9d:6f:68 (SSID='KITTEN' freq=0 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw2100_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw2100_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=19
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13 idleWhile=43
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:88:9d:6f:68
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:88:9d:6f:68
No keys have been configured - skip key clearing
Associated with 00:0d:88:9d:6f:68
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
RX EAPOL from 00:0d:88:9d:6f:68
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 ef 67 17 1c 0b 08 67 ef 15 7c d9 c6 9d 5d e8 9b a0 12 2b 13
a5 b5 65 75 5b db 62 62 11 99 58 50 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 ef 67 17 1c 0b 08 67 ef 15 7c d9 c6 9d 5d e8 9b a0
12 2b 13 a5 b5 65 75 5b db 62 62 11 99 58 50 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0d:88:9d:6f:68 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 98 ec 95 06 e6 3d 5a 54 a8 9f
5f f6 38 7b 3d 39 79 0b 49 90 76 54 2a 51 5e cc a4 84 9f 03 5b 35
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 56 cd 24 22 87 3f bd 6b 17 d8 f0
69 d6 dd 58 42
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 88 9d 6f 68 00 0e 35
44 4f 7a 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 98
ec 95 06 e6 3d 5a 54 a8 9f 5f f6 38 7b 3d 39 79 0b 49 90 76 54 2a 51
5e cc a4 84 9f 03 5b 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 cd 24 22 87 3f
bd 6b 17 d8 f0 69 d6 dd 58 42 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0d:88:9d:6f:68
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00
00 00 02 ef 67 17 1c 0b 08 67 ef 15 7c d9 c6 9d 5d e8 9b a0 12 2b 13
a5 b5 65 75 5b db 62 62 11 99 58 50 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 d9
99 69 37 ab 4c f0 de 5b bf b0 16 66 65 ab 00 1a dd 18 00 50 f2 01 01
00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00
00 00 00 00 00 02 ef 67 17 1c 0b 08 67 ef 15 7c d9 c6 9d 5d e8 9b a0
12 2b 13 a5 b5 65 75 5b db 62 62 11 99 58 50 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 97 d9 99 69 37 ab 4c f0 de 5b bf b0 16 66 65 ab 00 1a dd 18 00 50
f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: RX message 3 of 4-Way Handshake from 00:0d:88:9d:6f:68 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0d 88 9d 6f 68 00 0e 35
44 4f 7a 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 98
ec 95 06 e6 3d 5a 54 a8 9f 5f f6 38 7b 3d 39 79 0b 49 90 76 54 2a 51
5e cc a4 84 9f 03 5b 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 74 0b 10 b4 00
b1 4e bc 0c 80 21 1d 34 71 ea 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw2100_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23 idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22 idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21 idleWhile=51
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20 idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19 idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18 idleWhile=48
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=17 idleWhile=47
Authentication with 00:0d:88:9d:6f:68 timed out.
Added BSSID 00:0d:88:9d:6f:68 into blacklist
wpa_driver_ipw2100_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
--
warrior
More information about the Hostap
mailing list