IPW2100 will not connect to Linksys router
Joshua J. Kugler
jkugler
Tue May 31 22:09:48 PDT 2005
I am having trouble with wpa_supplicant (or why else would I be posting,
right)? :)
NIC: Intel PRO/Wireless LAN 2100 (And latest firmware from
ipw2100.sf.net)
AP: Linksys BEFW11S4 (802.11b)
Kernel: 2.6.11-6mdk-i586-up-1GB
I have set up WPA on the AP, and it will connect fine from a Windows XP
box. When I try to connect from this Linux laptop, I get this:
[root at cdesysadminlaptop joshua]# wpa_supplicant -ieth1
-c/etc/wpa_supplicant.conf -Dipw
Trying to associate with 00:12:17:3c:9c:73 (SSID='hillwireless' freq=0
MHz)
Associated with 00:12:17:3c:9c:73
WPA: Key negotiation completed with 00:12:17:3c:9c:73 [PTK=TKIP
GTK=TKIP]
WPA: Group rekeying completed with 00:12:17:3c:9c:73 [GTK=TKIP]
Disconnect event - remove keys
Trying to associate with 00:12:17:3c:9c:73 (SSID='hillwireless' freq=0
MHz)
Associated with 00:12:17:3c:9c:73
WPA: Key negotiation completed with 00:12:17:3c:9c:73 [PTK=TKIP
GTK=TKIP]
WPA: Group rekeying completed with 00:12:17:3c:9c:73 [GTK=TKIP]
Disconnect event - remove keys
Over and over and over.
Here's my config, based on the Mandrake initial, and the wap_supplicant
example:
network={
ssid="hillwireless"
psk="blahblahblahblah"
proto=WPA
key_mgmt=WPA-PSK
pairwise=TKIP NONE
group=TKIP WEP104 WEP40
scan_ssid=0
priority=2
}
Using debug gives (not sure where it starts repeating, so you'll get
quite a
dump).
Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver
'ipw'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=12):
68 69 6c 6c 77 69 72 65 6c 65 73 73 hillwireless
PSK - hexdump(len=32): [REMOVED]
proto: 0x1
key_mgmt: 0x2
pairwise: 0x9
group: 0xe
scan_ssid=0 (0x0)
priority=2 (0x2)
Priority group 2
id=0 ssid='hillwireless'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_ipw_init is called
Own MAC address: 00:04:23:53:49:e9
wpa_driver_ipw_set_wpa: enabled=1
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_countermeasures: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
Scan timeout - try to get results
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 2
No suitable AP found.
Setting scan request: 5 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
Scan timeout - try to get results
Received 255 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 2
0: 00:12:17:3c:9c:73 ssid='hillwireless' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:12:17:3c:9c:73 (SSID='hillwireless' freq=0
MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=25
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:17:3c:9c:73
Association event - clear replay counter
Associated to a new BSS: BSSID=00:12:17:3c:9c:73
No keys have been configured - skip key clearing
Associated with 00:12:17:3c:9c:73
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29
idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28
idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27
idleWhile=57
RX EAPOL from 00:12:17:3c:9c:73
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 7b 3b 0e 52 87 5d
6c 2c a0 d4 6d c9 62 e3 8f 5b 9c 92 55 be d6 63 ab 0d ed ff 2e 1c 8e 8f
7d ec f3 fa 47 58 5e 2c 5e 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 7b 3b 0e
52 87 5d 6c 2c a0 d4 6d c9 62 e3 8f 5b 9c 92 55 be d6 63 ab 0d ed ff 2e
1c 8e 8f 7d ec f3 fa 47 58 5e 2c 5e 38 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:12:17:3c:9c:73 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 84 03 d3 0b e7 d9 55 2e 11 8e 54
a2 2a ce d7 c6 59 0e 71 91 b1 9a 96 fc ed 3d af 0b f9 87 dd 98
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 4d 17 8a 69 68 d0 55 1a c3 da 62
5e b0 b6 e0 79
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 12 17 3c 9c 73 00 04 23 53
49 e9 88 8e 01 03 00 77 fe 01 09 00 20 7b 3b 0e 52 87 5d 6c 2c 84 03 d3
0b e7 d9 55 2e 11 8e 54 a2 2a ce d7 c6 59 0e 71 91 b1 9a 96 fc ed 3d af
0b f9 87 dd 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 4d 17 8a 69 68 d0 55 1a c3 da 62
5e b0 b6 e0 79 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
RX EAPOL from 00:12:17:3c:9c:73
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 7b 3b 0e 52 87
5d 6c 2d a0 d4 6d c9 62 e3 8f 5b 9c 92 55 be d6 63 ab 0d ed ff 2e 1c 8e
8f 7d ec f3 fa 47 58 5e 2c 5e 38 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f a3 69 66 54
28 35 8f 7f fb c3 58 2b 12 78 af 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 7b 3b
0e 52 87 5d 6c 2d a0 d4 6d c9 62 e3 8f 5b 9c 92 55 be d6 63 ab 0d ed ff
2e 1c 8e 8f 7d ec f3 fa 47 58 5e 2c 5e 38 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f a3
69 66 54 28 35 8f 7f fb c3 58 2b 12 78 af 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:12:17:3c:9c:73 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 12 17 3c 9c 73 00 04 23 53
49 e9 88 8e 01 03 00 5f fe 01 09 00 20 7b 3b 0e 52 87 5d 6c 2d 84 03 d3
0b e7 d9 55 2e 11 8e 54 a2 2a ce d7 c6 59 0e 71 91 b1 9a 96 fc ed 3d af
0b f9 87 dd 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 38 cc d8 e9 ac 23 93 93 0b ba 29
c7 51 6e ff 38 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
RX EAPOL from 00:12:17:3c:9c:73
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 7b 3b 0e 52 87
5d 6c 2e f1 3c a1 8a a5 bd ea 01 81 04 15 72 02 bf 6d 46 16 42 c6 08 61
d2 b9 7c e4 fb 7f 7d 1e 0a 96 56 0d e7 04 89 3b 0b 54 34 7d 88 4b 11 4b
e6 6b ac 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 71 64 42 db
87 49 d4 a4 b8 60 68 63 6e e1 2a 00 20 31 bd 5e 96 2a 4d 77 60 49 4a 45
c7 23 c8 e1 54 88 95 74 4b cf f2 94 4b 31 05 2b e5 68 ef 71 60
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 7b 3b
0e 52 87 5d 6c 2e f1 3c a1 8a a5 bd ea 01 81 04 15 72 02 bf 6d 46 16 42
c6 08 61 d2 b9 7c e4 fb 7f 7d 1e 0a 96 56 0d e7 04 89 3b 0b 54 34 7d 88
4b 11 4b e6 6b ac 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 71
64 42 db 87 49 d4 a4 b8 60 68 63 6e e1 2a 00 20 31 bd 5e 96 2a 4d 77 60
49 4a 45 c7 23 c8 e1 54 88 95 74 4b cf f2 94 4b 31 05 2b e5 68 ef 71 60
WPA: RX message 1 of Group Key Handshake from 00:12:17:3c:9c:73 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 4a 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 12 17 3c 9c 73 00 04 23 53
49 e9 88 8e 01 03 00 5f fe 03 11 00 20 7b 3b 0e 52 87 5d 6c 2e 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 87 54 01 27 e3 5a 19 71 c4 a7 63
be 98 9f 2c 0e 00 00
WPA: Key negotiation completed with 00:12:17:3c:9c:73 [PTK=TKIP
GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26
idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25
idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24
idleWhile=54
RX EAPOL from 00:12:17:3c:9c:73
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 7b 3b 0e 52 87
5d 6c 2f f1 3c a1 8a a5 bd ea 01 81 04 15 72 02 bf 6d 46 16 42 c6 08 61
d2 b9 7c e4 fb 7f 7d 1e 0a 96 56 4d 1b 53 bf 8e 30 83 7e 99 bc 70 1e be
4d db 79 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe 92 56 0b 47
63 fd bd 05 48 67 0d 1a 89 00 a0 00 20 8d 02 dd e7 09 97 47 39 e2 f8 e8
f5 c6 2e 47 8a f1 98 d4 d5 b6 d1 7f 70 d4 a0 78 94 65 eb 20 ab
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 7b 3b
0e 52 87 5d 6c 2f f1 3c a1 8a a5 bd ea 01 81 04 15 72 02 bf 6d 46 16 42
c6 08 61 d2 b9 7c e4 fb 7f 7d 1e 0a 96 56 4d 1b 53 bf 8e 30 83 7e 99 bc
70 1e be 4d db 79 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe 92
56 0b 47 63 fd bd 05 48 67 0d 1a 89 00 a0 00 20 8d 02 dd e7 09 97 47 39
e2 f8 e8 f5 c6 2e 47 8a f1 98 d4 d5 b6 d1 7f 70 d4 a0 78 94 65 eb 20 ab
WPA: RX message 1 of Group Key Handshake from 00:12:17:3c:9c:73 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 4b 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 12 17 3c 9c 73 00 04 23 53
49 e9 88 8e 01 03 00 5f fe 03 11 00 20 7b 3b 0e 52 87 5d 6c 2f 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 a7 25 c9 f0 bb 96 9b be 0a 68 81
e2 d8 60 13 da 00 00
WPA: Group rekeying completed with 00:12:17:3c:9c:73 [GTK=TKIP]
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23
idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22
idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21
idleWhile=51
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:12:17:3c:9c:73 into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20
idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19
idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18
idleWhile=48
Scan timeout - try to get results
Received 255 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 2
0: 00:12:17:3c:9c:73 ssid='hillwireless' wpa_ie_len=24 rsn_ie_len=0
skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 00:12:17:3c:9c:73 from blacklist (clear)
Selecting BSS from priority group 2
0: 00:12:17:3c:9c:73 ssid='hillwireless' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:12:17:3c:9c:73 (SSID='hillwireless' freq=0
MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=25
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=17
idleWhile=47
Signal 2 received - terminating
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_ipw_set_wpa: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=0
wpa_driver_ipw_set_countermeasures: enabled=0
So, there you go...if you need more logs, let me know. What I don't
understand is why my AP get's "blacklisted." What is it doing wrong?
I'm on vacation, and this is the first time I've tried to hook up to a
WPA AP, so any help is appreciated!
Thanks so much!!
j----- k-----
--
Joshua J. Kugler -- Fairbanks, Alaska -- ICQ#:13706295
Every knee shall bow, and every tongue confess, in heaven, on earth, and
under the earth, that Jesus Christ is LORD -- Count on it!
More information about the Hostap
mailing list