PEAP or WPA-Enterprise not accessible

2021-10-04 Thread c.buhtz--- via networkmanager-list

Hello togehter,

I would like to know that a network-manager (especially the nm-tray) 
need to offer Enterprise connections with PEAP (e.g. for "eduroam" 
WLAN)?


The background of my question:
In a usual Debian bullsey (stable, 11) the nm is able to connect to 
"eduroam" with PEAP etc. No problem there.


But I also have a minimal Debian bullsey (image for raspberry pi 4 from 
raspi.debian.net) with no X and no default user. I added a user myself 
and installed xfce and network-manager. I can connect to usual home 
network WLANs (WPA2). Then I tried to create a new connection via the 
nm-tray symbol to a PEAP (WPA-Enterprise?). The problem is that "PEAP" 
is not offered to my. It is missing in the "security" drop down menu. 
Also WPA-Enterprise is missing.


I assume that some components are missing. But searching the Debian 
repository I got no hint what could it be. Do you have any idea?


Kind
Christian
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: how to disable WiFi / wpa-supplicant so hostapd can be used ?

2021-07-21 Thread Jason Vas Dias via networkmanager-list
Thank You so much, Thomas, for the most useful info !

RE: > Patch welcome to properly handle the release of a device
  > by setting it unmanaged.

I will investigate this and see what I can do to improve
management of wpa_supplicant (W_S) & wireless interfaces.

I'd also like to develop a patch to make NM fully hostapd aware ,
so that the code realizes that use of W_S and hostapd are
mutually exclusive for an interface , and which add settings
for fully setting up & managing hostapd as well as W_S .
And to allow switching between hostpd & W_S modes.

hostapd probably needs its own module to manage things
like providing dhcp service to connecting usits - I've been
using static IP because I only have a few connecting
devices - happily Android phones do allow connections to
WEP APs with a static IP . But full Address Pool & DHCP
server mgmt is needed for arbitrarily large numbers of
 connecting  units.  And the NM GUIs / applets would need
changes to support the new hostapd settings .



On 21/07/2021, Thomas Haller  wrote:
> On Tue, 2021-07-20 at 22:04 +0100, Jason Vas Dias via networkmanager-
> list wrote:
>> If I do :
>>   # nmcli radio wifi off
>> , it disassociates the PHY for the device and I have to
>>   'rfkill $id unblock' .
>>   If I reenable wireless, and  do
>>   # systemctl stop wpa_supplicant
>>   # mv /usr/sbin/wpa_supplicant /usr/sbin/wpa_supplicant.bin
>>  after starting NM, then I can run hostapd .
>> I have to remember to move wpa_supplicant back after I stop
>> using hostapd .
>> Please add support for enabling either hostapd or wpa_supplicant,
>> not both, to NM = or is there some way of disabling running the
>> wpa_supplicant service only, without rfkill ?
>
> Hi,
>
>
> configure the device as unmanaged.
>
> Temporarily, with `nmcli device set wlan0 managed no`
>
>
> Permanently, there are several means (udev rules, config files). the
> best seems to be a file
>
>   /etc/NetworkManager/conf.d/90-wlan-unmanaged.conf
>
> with
>
>   [device-90-wlan-unmanaged]
>   match-device=interface-name:wlan0
>   managed=0
>
> see `man NetworkManager.conf`.
>
>
> If you do it that way, you can still override it at runtime with `nmcli
> device set wlan0 managed yes`.
>
>
>
> I think `nmcli device set wlan0 managed yes` may not sufficiently
> instruct wpa_supplicant to let go of the device. That means, you still
> might need `systemctl stop wpa_supplicant.service`. Patch welcome to
> properly handle the release of a device by setting it unmanaged.
>
>
>
> best,
> Thomas
>
>
>>
>>
>> On 20/07/2021, Jason Vas Dias  wrote:
>> >
>> > Good day -
>> >
>> >  Whenever I try to run hostapd, NM still runs wpa-supplicant,
>> >  which periodically tries to put the WiFi interface into scanning
>> >  mode, which messes up the hostapd session .
>> >
>> >  Please is there a config file setting or applet interaction
>> >  to disable wpa-supplicant (and maybe configure & run hostapd) ?
>> >
>> >  I'd like NM to start dhclient on my Wired interface, and
>> >  be able to bring up my L2TP VPN, but leave the Wireless
>> >  interface entirely alone.
>> >
>> >  Any way to do this in NetworkManager.conf or GUI ?
>> >
>> > Thanks in advance for any replies,
>> > Best Regards,
>> > Jason
>> >
>> ___
>> networkmanager-list mailing list
>> networkmanager-list@gnome.org
>> https://mail.gnome.org/mailman/listinfo/networkmanager-list
>>
>
>
>
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: how to disable WiFi / wpa-supplicant so hostapd can be used ?

2021-07-21 Thread Thomas Haller via networkmanager-list
On Tue, 2021-07-20 at 22:04 +0100, Jason Vas Dias via networkmanager-
list wrote:
> If I do :
>   # nmcli radio wifi off
> , it disassociates the PHY for the device and I have to
>   'rfkill $id unblock' .
>   If I reenable wireless, and  do
>   # systemctl stop wpa_supplicant
>   # mv /usr/sbin/wpa_supplicant /usr/sbin/wpa_supplicant.bin
>  after starting NM, then I can run hostapd .
> I have to remember to move wpa_supplicant back after I stop
> using hostapd .
> Please add support for enabling either hostapd or wpa_supplicant,
> not both, to NM = or is there some way of disabling running the
> wpa_supplicant service only, without rfkill ?

Hi,


configure the device as unmanaged.

Temporarily, with `nmcli device set wlan0 managed no`


Permanently, there are several means (udev rules, config files). the
best seems to be a file

  /etc/NetworkManager/conf.d/90-wlan-unmanaged.conf

with

  [device-90-wlan-unmanaged]
  match-device=interface-name:wlan0
  managed=0

see `man NetworkManager.conf`.


If you do it that way, you can still override it at runtime with `nmcli
device set wlan0 managed yes`.



I think `nmcli device set wlan0 managed yes` may not sufficiently
instruct wpa_supplicant to let go of the device. That means, you still
might need `systemctl stop wpa_supplicant.service`. Patch welcome to
properly handle the release of a device by setting it unmanaged.



best,
Thomas


> 
> 
> On 20/07/2021, Jason Vas Dias  wrote:
> > 
> > Good day -
> > 
> >  Whenever I try to run hostapd, NM still runs wpa-supplicant,
> >  which periodically tries to put the WiFi interface into scanning
> >  mode, which messes up the hostapd session .
> > 
> >  Please is there a config file setting or applet interaction
> >  to disable wpa-supplicant (and maybe configure & run hostapd) ?
> > 
> >  I'd like NM to start dhclient on my Wired interface, and
> >  be able to bring up my L2TP VPN, but leave the Wireless
> >  interface entirely alone.
> > 
> >  Any way to do this in NetworkManager.conf or GUI ?
> > 
> > Thanks in advance for any replies,
> > Best Regards,
> > Jason
> > 
> ___
> networkmanager-list mailing list
> networkmanager-list@gnome.org
> https://mail.gnome.org/mailman/listinfo/networkmanager-list
> 


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: how to disable WiFi / wpa-supplicant so hostapd can be used ?

2021-07-20 Thread Jason Vas Dias via networkmanager-list
If I do :
  # nmcli radio wifi off
, it disassociates the PHY for the device and I have to
  'rfkill $id unblock' .
  If I reenable wireless, and  do
  # systemctl stop wpa_supplicant
  # mv /usr/sbin/wpa_supplicant /usr/sbin/wpa_supplicant.bin
 after starting NM, then I can run hostapd .
I have to remember to move wpa_supplicant back after I stop
using hostapd .
Please add support for enabling either hostapd or wpa_supplicant,
not both, to NM = or is there some way of disabling running the
wpa_supplicant service only, without rfkill ?


On 20/07/2021, Jason Vas Dias  wrote:
>
> Good day -
>
>  Whenever I try to run hostapd, NM still runs wpa-supplicant,
>  which periodically tries to put the WiFi interface into scanning
>  mode, which messes up the hostapd session .
>
>  Please is there a config file setting or applet interaction
>  to disable wpa-supplicant (and maybe configure & run hostapd) ?
>
>  I'd like NM to start dhclient on my Wired interface, and
>  be able to bring up my L2TP VPN, but leave the Wireless
>  interface entirely alone.
>
>  Any way to do this in NetworkManager.conf or GUI ?
>
> Thanks in advance for any replies,
> Best Regards,
> Jason
>
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


how to disable WiFi / wpa-supplicant so hostapd can be used ?

2021-07-20 Thread Jason Vas Dias via networkmanager-list


Good day -

 Whenever I try to run hostapd, NM still runs wpa-supplicant,
 which periodically tries to put the WiFi interface into scanning
 mode, which messes up the hostapd session .

 Please is there a config file setting or applet interaction
 to disable wpa-supplicant (and maybe configure & run hostapd) ?

 I'd like NM to start dhclient on my Wired interface, and
 be able to bring up my L2TP VPN, but leave the Wireless
 interface entirely alone.

 Any way to do this in NetworkManager.conf or GUI ?

Thanks in advance for any replies,
Best Regards,
Jason
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nmcli can't astablish connection to radius server with wpa eap tls

2018-03-07 Thread Beniamino Galvani
On Wed, Mar 07, 2018 at 10:28:18AM +0100, Iris Fiedler wrote:
> Hi,
> 
> I found my errror. My radius server had a wrong configuration and didn't send 
> the accepted response. So the network manager didn't received it and printed 
> an error.

Hi,

good to know!

> Thank you for your help.

You're welcome.

Beniamino
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nmcli can't astablish connection to radius server with wpa eap tls

2018-03-07 Thread Iris Fiedler
Hi,

I found my errror. My radius server had a wrong configuration and didn't send 
the accepted response. So the network manager didn't received it and printed an 
error.

Thank you for your help.
Iris
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nmcli can't astablish connection to radius server with wpa eap tls

2018-02-22 Thread Iris Fiedler
Hi,That EAP-TLS isn't supporting passwords maybe the case.I configure my freeradius server without passwords and set in nmcli the password-flag to 4 (no password required).I got the same error as if I had before.nmcli device connect wlan0 Passwords or encryption keys are required to access the wireless network 'Linksys02355'. Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli cannot ask without '--ask' option. Error: Connection activation failed: (7) Secrets were required, but not providedAlthough my radius server tells me that it accepts the authentication send from nmcli.Is there something else that I'm missing?IrisAm 21.02.2018 09:24 schrieb Beniamino Galvani <bgalv...@redhat.com>:On Mon, Feb 19, 2018 at 12:59:04PM +0100, Iris Fiedler wrote:

Hi,



> freeRADIUS: 3.0.15 (on a different PC with OpenSuse 42.3)

> Konfigured as wpa-eap tls with identity and password.



EAP-TLS doesn't support passwords AFAIK. Perhaps you mean EAP-TTLS?



> radius-tls.log 

> (35)   Invalid user: [testUser1/] (from client 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)

> (35)   Rejected in post-auth: [testUser1/] (from client 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)

> (35)   Login incorrect: [testUser1/] (from client 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)

> 

> As you can see the User-Password attribute is missing. Although the password in nmcli was set.

> 

> This is what nmcli is responding with:

> nmcli device connect wlan0 

> Passwords or encryption keys are required to access the wireless network 'Linksys02355'.

> Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli cannot ask without '--ask' option.

> Error: Connection activation failed: (7) Secrets were required, but not provided.

> 

> nmcli -a  device connect wlan0 

> Passwords or encryption keys are required to access the wireless network 'Linksys02355'.

> Identity (802-1x.identity): testUser1

> Passwords or encryption keys are required to access the wireless network 'Linksys02355'.

> Private key password (802-1x.private-key-password): 

> Passwords or encryption keys are required to access the wireless network 'Linksys02355'.

> Identity (802-1x.identity): testUser1

> 

> Even here no user password is asked!!!

> 

> I created a new user without password. Although the radius server accepted the authentication no connection was established!!!

> 

> It confused me so I checkt if a wpa eap ttls-pap would work. 

> After reconfiguration of nmcli and radius server it worked without problems.

> So I think this is only a tls problem.



Yes, EAP-TLS only uses certificates and not passwords.



Beniamino


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nmcli can't astablish connection to radius server with wpa eap tls

2018-02-21 Thread Beniamino Galvani
On Mon, Feb 19, 2018 at 12:59:04PM +0100, Iris Fiedler wrote:
Hi,

> freeRADIUS: 3.0.15 (on a different PC with OpenSuse 42.3)
> Konfigured as wpa-eap tls with identity and password.

EAP-TLS doesn't support passwords AFAIK. Perhaps you mean EAP-TTLS?

> radius-tls.log 
> (35)   Invalid user: [testUser1/] (from client 
> 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)
> (35)   Rejected in post-auth: [testUser1/] (from 
> client 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)
> (35)   Login incorrect: [testUser1/] (from client 
> 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)
> 
> As you can see the User-Password attribute is missing. Although the password 
> in nmcli was set.
> 
> This is what nmcli is responding with:
> nmcli device connect wlan0 
> Passwords or encryption keys are required to access the wireless network 
> 'Linksys02355'.
> Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli 
> cannot ask without '--ask' option.
> Error: Connection activation failed: (7) Secrets were required, but not 
> provided.
> 
> nmcli -a  device connect wlan0 
> Passwords or encryption keys are required to access the wireless network 
> 'Linksys02355'.
> Identity (802-1x.identity): testUser1
> Passwords or encryption keys are required to access the wireless network 
> 'Linksys02355'.
> Private key password (802-1x.private-key-password): 
> Passwords or encryption keys are required to access the wireless network 
> 'Linksys02355'.
> Identity (802-1x.identity): testUser1
> 
> Even here no user password is asked!!!
> 
> I created a new user without password. Although the radius server accepted 
> the authentication no connection was established!!!
> 
> It confused me so I checkt if a wpa eap ttls-pap would work. 
> After reconfiguration of nmcli and radius server it worked without problems.
> So I think this is only a tls problem.

Yes, EAP-TLS only uses certificates and not passwords.

Beniamino


signature.asc
Description: PGP signature
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


nmcli can't astablish connection to radius server with wpa eap tls

2018-02-19 Thread Iris Fiedler
Debian: 9.3 
network-manager: 1.6.2-3

cat /etc/NetworkManager/system-connections/wlan0
[connection]
id=wlan0x0
uuid=ec4bcd13-d3e1-4707-b844-9b8c3821b7ac
type=wifi
interface-name=wlan0
permissions=

[wifi]
mac-address=80:1F:02:F2:2B:53
mac-address-blacklist=
mode=infrastructure
ssid=Linksys02355

[wifi-security]
auth-alg=open
key-mgmt=wpa-eap

[802-1x]
ca-cert=/var/opt/telemotive/etc/cert/ca.pem
client-cert=/var/opt/telemotive/etc/cert/client.p12
eap=tls;
identity=testUser1
password=testUser11
private-key=/var/opt/telemotive/etc/cert/client.p12
private-key-password=testCert1

[ipv4]
dns-search=
method=auto
never-default=true

[ipv6]
addr-gen-mode=stable-privacy
dns-search=
method=auto
never-default=true


freeRADIUS: 3.0.15 (on a different PC with OpenSuse 42.3)
Konfigured as wpa-eap tls with identity and password.

radius-tls.log 
(35)   Invalid user: [testUser1/] (from client 
192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)
(35)   Rejected in post-auth: [testUser1/] (from 
client 192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)
(35)   Login incorrect: [testUser1/] (from client 
192.168.2.254/16 port 10 cli 801f02f22b53 via TLS tunnel)

As you can see the User-Password attribute is missing. Although the password in 
nmcli was set.

This is what nmcli is responding with:
nmcli device connect wlan0 
Passwords or encryption keys are required to access the wireless network 
'Linksys02355'.
Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli 
cannot ask without '--ask' option.
Error: Connection activation failed: (7) Secrets were required, but not 
provided.

nmcli -a  device connect wlan0 
Passwords or encryption keys are required to access the wireless network 
'Linksys02355'.
Identity (802-1x.identity): testUser1
Passwords or encryption keys are required to access the wireless network 
'Linksys02355'.
Private key password (802-1x.private-key-password): 
Passwords or encryption keys are required to access the wireless network 
'Linksys02355'.
Identity (802-1x.identity): testUser1

Even here no user password is asked!!!

I created a new user without password. Although the radius server accepted the 
authentication no connection was established!!!

It confused me so I checkt if a wpa eap ttls-pap would work. 
After reconfiguration of nmcli and radius server it worked without problems.
So I think this is only a tls problem.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: [PATCH] wifi: enable WPA-*-SHA256 AKMs only when the supplicant supports them

2018-01-21 Thread Thomas Haller
On Wed, 2018-01-17 at 18:06 +0100, Beniamino Galvani wrote:
> Commit 87ec5e90fe79 ("supplicant: set key_mgmt independent of pmf
> value") enabled WPA-PSK-SHA256 or WPA-EAP-SHA256 even when the
> supplicant didn't support them, potentially causing connection
> failures.  Instead, use the 'pmf' capability to detect when they can
> be enabled.
> 
> Fixes: 87ec5e90fe79fcb2ac315cf1604e757dcab60bb9
> ---

Hi,

After ACK from Masashi Honma, merged to master:

https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=a0cf4664822142a4c2767256e28be59e643add7d


Thanks!
Thomas

signature.asc
Description: This is a digitally signed message part
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: [PATCH] wifi: enable WPA-*-SHA256 AKMs only when the supplicant supports them

2018-01-20 Thread Masashi Honma
On 2018/01/18 05:52, Masashi Honma wrote:
> On 2018/01/18 02:06, Beniamino Galvani wrote:
>> Commit 87ec5e90fe79 ("supplicant: set key_mgmt independent of pmf
>> value") enabled WPA-PSK-SHA256 or WPA-EAP-SHA256 even when the
>> supplicant didn't support them, potentially causing connection
>> failures.  Instead, use the 'pmf' capability to detect when they can
>> be enabled.
>>
>> Fixes: 87ec5e90fe79fcb2ac315cf1604e757dcab60bb9
>> ---
>>
>> Hi,
>>
>> this patch fixes regressions discovered after the merge of FILS
>> patches by our nightly CI that runs on CentOS where wpa_supplicant is
>> compiled without 802.11w support.
>>
>> This patch fixes those regression. Comments welcome.
> Hi,
> 
> I am sorry for regression...
> 
> Though indeed using pmf capability works, I think using key_mgmt
> capability is better. I will try this at this week end.

By watching wpa_supplicant code, the pmf capability exists if and
only if WPA-PSK-SHA256 and WPA-EAP-SHA256 exists. So your patch
looks nice to me. Thanks !

Masashi Honma.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: [PATCH] wifi: enable WPA-*-SHA256 AKMs only when the supplicant supports them

2018-01-17 Thread Masashi Honma
On 2018/01/18 02:06, Beniamino Galvani wrote:
> Commit 87ec5e90fe79 ("supplicant: set key_mgmt independent of pmf
> value") enabled WPA-PSK-SHA256 or WPA-EAP-SHA256 even when the
> supplicant didn't support them, potentially causing connection
> failures.  Instead, use the 'pmf' capability to detect when they can
> be enabled.
> 
> Fixes: 87ec5e90fe79fcb2ac315cf1604e757dcab60bb9
> ---
> 
> Hi,
> 
> this patch fixes regressions discovered after the merge of FILS
> patches by our nightly CI that runs on CentOS where wpa_supplicant is
> compiled without 802.11w support.
> 
> This patch fixes those regression. Comments welcome.
Hi,

I am sorry for regression...

Though indeed using pmf capability works, I think using key_mgmt
capability is better. I will try this at this week end.

Masashi Honma.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: [PATCH] wifi: enable WPA-*-SHA256 AKMs only when the supplicant supports them

2018-01-17 Thread Thomas Haller
On Wed, 2018-01-17 at 18:06 +0100, Beniamino Galvani wrote:
> Commit 87ec5e90fe79 ("supplicant: set key_mgmt independent of pmf
> value") enabled WPA-PSK-SHA256 or WPA-EAP-SHA256 even when the
> supplicant didn't support them, potentially causing connection
> failures.  Instead, use the 'pmf' capability to detect when they can
> be enabled.
> 
> Fixes: 87ec5e90fe79fcb2ac315cf1604e757dcab60bb9
> ---
> 
> Hi,
> 
> this patch fixes regressions discovered after the merge of FILS
> patches by our nightly CI that runs on CentOS where wpa_supplicant is
> compiled without 802.11w support.
> 
> This patch fixes those regression. Comments welcome.
> 
> Thanks,
> Beniamino
> 
> 
>  src/devices/nm-device-ethernet.c  |  2 +-
>  src/devices/nm-device-macsec.c|  2 +-
>  src/devices/wifi/nm-device-wifi.c | 42 ++---
> ---
>  src/supplicant/nm-supplicant-config.c | 55
> +++
> 

> diff --git a/src/supplicant/nm-supplicant-config.c
> b/src/supplicant/nm-supplicant-config.c
> index a2502bd7b..14f5cac82 100644
> --- a/src/supplicant/nm-supplicant-config.c
> +++ b/src/supplicant/nm-supplicant-config.c
> @@ -47,6 +47,8 @@ typedef struct {
>   guint32ap_scan;
>   gboolean   fast_required;
>   gboolean   dispose_has_run;
> + gboolean   support_pmf;
> + gboolean   support_fils;

inside structs, could we use bool:1 bitfields?




>  NMSupplicantConfig *
> -nm_supplicant_config_new (void)
> +nm_supplicant_config_new (gboolean support_pmf, gboolean
> support_fils)
>  {
> - return g_object_new (NM_TYPE_SUPPLICANT_CONFIG, NULL);
> + NMSupplicantConfigPrivate *priv;
> + NMSupplicantConfig *self;
> +
> + self = g_object_new (NM_TYPE_SUPPLICANT_CONFIG, NULL);
> + priv = NM_SUPPLICANT_CONFIG_GET_PRIVATE (self);
> +
> + priv->support_pmf = support_pmf;
> + priv->support_fils = support_fils;

I always find it nice if nm_*_new() only calls g_object_new() and
nothing else. But that would requie to introduce G_PARAM_CONSTRUCT_ONLY
properties, to pass in the parameters. Clearly that is more hazzle then
it's worth, so ok.



Rest lgtm.
Thomas

signature.asc
Description: This is a digitally signed message part
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


[PATCH] wifi: enable WPA-*-SHA256 AKMs only when the supplicant supports them

2018-01-17 Thread Beniamino Galvani
Commit 87ec5e90fe79 ("supplicant: set key_mgmt independent of pmf
value") enabled WPA-PSK-SHA256 or WPA-EAP-SHA256 even when the
supplicant didn't support them, potentially causing connection
failures.  Instead, use the 'pmf' capability to detect when they can
be enabled.

Fixes: 87ec5e90fe79fcb2ac315cf1604e757dcab60bb9
---

Hi,

this patch fixes regressions discovered after the merge of FILS
patches by our nightly CI that runs on CentOS where wpa_supplicant is
compiled without 802.11w support.

This patch fixes those regression. Comments welcome.

Thanks,
Beniamino


 src/devices/nm-device-ethernet.c  |  2 +-
 src/devices/nm-device-macsec.c|  2 +-
 src/devices/wifi/nm-device-wifi.c | 42 ++--
 src/supplicant/nm-supplicant-config.c | 55 +++
 src/supplicant/nm-supplicant-config.h |  2 +-
 src/supplicant/tests/test-supplicant-config.c | 24 +++-
 6 files changed, 68 insertions(+), 59 deletions(-)

diff --git a/src/devices/nm-device-ethernet.c b/src/devices/nm-device-ethernet.c
index 54c8176f6..0e1ebcc6a 100644
--- a/src/devices/nm-device-ethernet.c
+++ b/src/devices/nm-device-ethernet.c
@@ -550,7 +550,7 @@ build_supplicant_config (NMDeviceEthernet *self,
mtu = nm_platform_link_get_mtu (nm_device_get_platform (NM_DEVICE 
(self)),
nm_device_get_ifindex (NM_DEVICE 
(self)));
 
-   config = nm_supplicant_config_new ();
+   config = nm_supplicant_config_new (FALSE, FALSE);
 
security = nm_connection_get_setting_802_1x (connection);
if (!nm_supplicant_config_add_setting_8021x (config, security, 
con_uuid, mtu, TRUE, error)) {
diff --git a/src/devices/nm-device-macsec.c b/src/devices/nm-device-macsec.c
index 4f2cbcca0..8b51f8ce6 100644
--- a/src/devices/nm-device-macsec.c
+++ b/src/devices/nm-device-macsec.c
@@ -222,7 +222,7 @@ build_supplicant_config (NMDeviceMacsec *self, GError 
**error)
mtu = nm_platform_link_get_mtu (nm_device_get_platform (NM_DEVICE 
(self)),
nm_device_get_ifindex (NM_DEVICE 
(self)));
 
-   config = nm_supplicant_config_new ();
+   config = nm_supplicant_config_new (FALSE, FALSE);
 
s_macsec = (NMSettingMacsec *)
nm_device_get_applied_setting (NM_DEVICE (self), 
NM_TYPE_SETTING_MACSEC);
diff --git a/src/devices/wifi/nm-device-wifi.c 
b/src/devices/wifi/nm-device-wifi.c
index 979f309dd..a7283b63a 100644
--- a/src/devices/wifi/nm-device-wifi.c
+++ b/src/devices/wifi/nm-device-wifi.c
@@ -2389,7 +2389,9 @@ build_supplicant_config (NMDeviceWifi *self,
s_wireless = nm_connection_get_setting_wireless (connection);
g_return_val_if_fail (s_wireless != NULL, NULL);
 
-   config = nm_supplicant_config_new ();
+   config = nm_supplicant_config_new (
+   nm_supplicant_interface_get_pmf_support (priv->sup_iface) == 
NM_SUPPLICANT_FEATURE_YES,
+   nm_supplicant_interface_get_fils_support (priv->sup_iface) == 
NM_SUPPLICANT_FEATURE_YES);
 
/* Warn if AP mode may not be supported */
if (   g_strcmp0 (nm_setting_wireless_get_mode (s_wireless), 
NM_SETTING_WIRELESS_MODE_AP) == 0
@@ -2431,26 +2433,6 @@ build_supplicant_config (NMDeviceWifi *self,

NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL);
}
 
-   /* Don't try to enable PMF on non-WPA networks */
-   if (!NM_IN_STRSET (nm_setting_wireless_security_get_key_mgmt 
(s_wireless_sec),
-      "wpa-eap",
-      "wpa-psk"))
-   pmf = NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE;
-
-   /* Check if we actually support PMF */
-   if (nm_supplicant_interface_get_pmf_support (priv->sup_iface) 
!= NM_SUPPLICANT_FEATURE_YES) {
-   if (pmf == NM_SETTING_WIRELESS_SECURITY_PMF_REQUIRED) {
-   g_set_error_literal (error, 
NM_SUPPLICANT_ERROR, NM_SUPPLICANT_ERROR_CONFIG,
-"Supplicant does not 
support PMF");
-   goto error;
-   } else if (pmf == 
NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL) {
-   /* To be on the safe side, assume no support if 
we can't determine
-* capabilities.
-*/
-   pmf = NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE;
-   }
-   }
-
/* Configure FILS (802.11ai) */
fils = nm_setting_wireless_security_get_fils (s_wireless_sec);
if (fils == NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT) {
@@ -2463,24 +2445

Re: [PATCH 1/1] device/wifi: drop messing with wpa-supplicant's support for MAC address randomization

2017-02-07 Thread Thomas Haller
On Tue, 2017-02-07 at 11:29 +0100, Beniamino Galvani wrote:
> On Sun, Feb 05, 2017 at 11:18:08PM +0100, Thomas Haller wrote:
> > We no longer use wpa_supplicant for MAC address randomization.
> > Instead, NetworkManager
> > handle it on it's own. It is actually important that supplicant
> > does not interfere
> > when setting the MAC address of the device.
> > 
> > The code was only in effect when a PreassocMacAddr property exists,
> > which is a recent feature so this wasn't unnoticed until now.
> > 
> > Fixes: 767abfa69040c62ae1dc0989a77df8c5e0e489c1
> 
> Looks good to me.
> 
> Beniamino

Thanks.

merged: 
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=0cb85f161ea332dc400d7e33071ca1f3dfafd730

Thomas

signature.asc
Description: This is a digitally signed message part
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: [PATCH 1/1] device/wifi: drop messing with wpa-supplicant's support for MAC address randomization

2017-02-07 Thread Beniamino Galvani
On Sun, Feb 05, 2017 at 11:18:08PM +0100, Thomas Haller wrote:
> We no longer use wpa_supplicant for MAC address randomization. Instead, 
> NetworkManager
> handle it on it's own. It is actually important that supplicant does not 
> interfere
> when setting the MAC address of the device.
> 
> The code was only in effect when a PreassocMacAddr property exists,
> which is a recent feature so this wasn't unnoticed until now.
> 
> Fixes: 767abfa69040c62ae1dc0989a77df8c5e0e489c1

Looks good to me.

Beniamino


signature.asc
Description: PGP signature
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


[PATCH 1/1] device/wifi: drop messing with wpa-supplicant's support for MAC address randomization

2017-02-05 Thread Thomas Haller
We no longer use wpa_supplicant for MAC address randomization. Instead, 
NetworkManager
handle it on it's own. It is actually important that supplicant does not 
interfere
when setting the MAC address of the device.

The code was only in effect when a PreassocMacAddr property exists,
which is a recent feature so this wasn't unnoticed until now.

Fixes: 767abfa69040c62ae1dc0989a77df8c5e0e489c1
---
 src/supplicant/nm-supplicant-interface.c | 84 +---
 1 file changed, 2 insertions(+), 82 deletions(-)

diff --git a/src/supplicant/nm-supplicant-interface.c 
b/src/supplicant/nm-supplicant-interface.c
index deaac77..c913a69 100644
--- a/src/supplicant/nm-supplicant-interface.c
+++ b/src/supplicant/nm-supplicant-interface.c
@@ -67,7 +67,6 @@ typedef struct {
gboolean   has_credreq;  /* Whether querying 802.1x credentials is 
supported */
NMSupplicantFeature fast_support;
NMSupplicantFeature ap_support;   /* Lightweight AP mode support */
-   NMSupplicantFeature mac_randomization_support;
guint32max_scan_ssids;
guint32ready_count;
 
@@ -520,25 +519,6 @@ nm_supplicant_interface_set_fast_support 
(NMSupplicantInterface *self,
 }
 
 static void
-set_preassoc_scan_mac_cb (GDBusProxy *proxy, GAsyncResult *result, gpointer 
user_data)
-{
-   NMSupplicantInterface *self;
-   gs_unref_variant GVariant *variant = NULL;
-   gs_free_error GError *error = NULL;
-
-   variant = _nm_dbus_proxy_call_finish (proxy, result,
- G_VARIANT_TYPE ("()"),
- );
-   if (g_error_matches (error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
-   return;
-
-   self = NM_SUPPLICANT_INTERFACE (user_data);
-   if (error)
-   _LOGW ("failed to enable scan MAC address randomization (%s)", 
error->message);
-   iface_check_ready (self);
-}
-
-static void
 iface_introspect_cb (GDBusProxy *proxy, GAsyncResult *result, gpointer 
user_data)
 {
NMSupplicantInterface *self;
@@ -562,24 +542,6 @@ iface_introspect_cb (GDBusProxy *proxy, GAsyncResult 
*result, gpointer user_data
/* The ProbeRequest method only exists if AP mode has been 
enabled */
if (strstr (data, "ProbeRequest"))
priv->ap_support = NM_SUPPLICANT_FEATURE_YES;
-
-   if (strstr (data, "PreassocMacAddr")) {
-   priv->mac_randomization_support = 
NM_SUPPLICANT_FEATURE_YES;
-
-   /* Turn on MAC randomization during scans by default */
-   priv->ready_count++;
-   g_dbus_proxy_call (priv->iface_proxy,
-  DBUS_INTERFACE_PROPERTIES ".Set",
-  g_variant_new ("(ssv)",
- 
WPAS_DBUS_IFACE_INTERFACE,
- "PreassocMacAddr",
- g_variant_new_string 
("0")),
-  G_DBUS_CALL_FLAGS_NONE,
-  -1,
-  priv->init_cancellable,
-  (GAsyncReadyCallback) 
set_preassoc_scan_mac_cb,
-  self);
-   }
}
 
iface_check_ready (self);
@@ -790,8 +752,7 @@ on_iface_proxy_acquired (GDBusProxy *proxy, GAsyncResult 
*result, gpointer user_
   (GAsyncReadyCallback) iface_check_netreply_cb,
   self);
 
-   if (priv->ap_support == NM_SUPPLICANT_FEATURE_UNKNOWN ||
-   priv->mac_randomization_support == NM_SUPPLICANT_FEATURE_UNKNOWN) {
+   if (priv->ap_support == NM_SUPPLICANT_FEATURE_UNKNOWN) {
/* If the global supplicant capabilities property is not 
present, we can
 * fall back to checking whether the ProbeRequest method is 
supported.  If
 * neither of these works we have no way of determining if AP 
mode is
@@ -1226,33 +1187,6 @@ add_network (NMSupplicantInterface *self)
 }
 
 static void
-set_mac_randomization_cb (GDBusProxy *proxy, GAsyncResult *result, gpointer 
user_data)
-{
-   NMSupplicantInterface *self;
-   NMSupplicantInterfacePrivate *priv;
-   gs_unref_variant GVariant *reply = NULL;
-   gs_free_error GError *error = NULL;
-
-   reply = g_dbus_proxy_call_finish (proxy, result, );
-   if (g_error_matches (error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
-   return;
-
-   self = NM_SUPPLICANT_INTERFACE (user_data);
-   priv = NM_SUPPLICANT_INTERFACE_GET_PRIVATE (self);
-
-   if (!reply) {
-   g_dbus_error_strip_remote_error (error);
-   _LOGW ("couldn't send MAC randomization mode to the supplicant 
interface: 

Re: nm-connection-editor forgets WPA password

2016-06-09 Thread Bastien Nocera
On Tue, 2016-06-07 at 19:29 +0200, Thomas Haller wrote:
> On Tue, 2016-06-07 at 19:10 +0200, Bastien Nocera wrote:
> > Hey,
> > 
> > I get problems when trying this with both nm-connection-editor and
> > gnome-control-center, so it's probably a problem in the common
> > code.
> > 
> > 1. Connect to a known wireless network with WPA/WPA2 Personal
> > authentication
> > 2. Once connected, edit the connection
> > 3. In "Wi-Fi Security" select "Dynamic WEP", then "Tunneled TLS" as
> > the
> > authentication, enter bogus values in "anonymous identity",
> > "username"
> > and password". Tick the "No CA certificate is required" checkbox.
> > 4. "nmcli connection down "
> > 5. "nmcli connection up " (you can press Ctrl+C when
> > you're bored)
> > 6. Re-edit the connection
> > 7. Select WPA/WPA Personal in "Wi-Fi Security", and put in the
> > actual
> > Wi-Fi password
> > 8. Run "nmcli connection up " again
> > 
> > "
> > Passwords or encryption keys are required to access the wireless
> > network 'test'.
> > Warning: password for '802-11-wireless-security.psk' not given in
> > 'passwd-file' and nmcli cannot ask without '--ask' option.
> > "
> > 
> > It will then ask for the password in a loop, and never allow
> > connection.
> > 
> > Ideas? Do you prefer this being filed in bugzilla?
> > 
> 
> 
> could this be
> https://git.gnome.org/browse/network-manager-applet/commit/?id=c21d56
> dd22057103c8125a49307b4ff47b5b644d

I've moved the bug to:
https://bugzilla.gnome.org/show_bug.cgi?id=767449

Cheers
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nm-connection-editor forgets WPA password

2016-06-07 Thread Bastien Nocera
On Tue, 2016-06-07 at 19:29 +0200, Thomas Haller wrote:
> On Tue, 2016-06-07 at 19:10 +0200, Bastien Nocera wrote:
> > Hey,
> > 
> > I get problems when trying this with both nm-connection-editor and
> > gnome-control-center, so it's probably a problem in the common
> > code.
> > 
> > 1. Connect to a known wireless network with WPA/WPA2 Personal
> > authentication
> > 2. Once connected, edit the connection
> > 3. In "Wi-Fi Security" select "Dynamic WEP", then "Tunneled TLS" as
> > the
> > authentication, enter bogus values in "anonymous identity",
> > "username"
> > and password". Tick the "No CA certificate is required" checkbox.
> > 4. "nmcli connection down "
> > 5. "nmcli connection up " (you can press Ctrl+C when
> > you're bored)
> > 6. Re-edit the connection
> > 7. Select WPA/WPA Personal in "Wi-Fi Security", and put in the
> > actual
> > Wi-Fi password
> > 8. Run "nmcli connection up " again
> > 
> > "
> > Passwords or encryption keys are required to access the wireless
> > network 'test'.
> > Warning: password for '802-11-wireless-security.psk' not given in
> > 'passwd-file' and nmcli cannot ask without '--ask' option.
> > "
> > 
> > It will then ask for the password in a loop, and never allow
> > connection.
> > 
> > Ideas? Do you prefer this being filed in bugzilla?
> > 
> 
> 
> could this be
> https://git.gnome.org/browse/network-manager-applet/commit/?id=c21d56
> dd22057103c8125a49307b4ff47b5b644d

No, that's already in my tree. It asks for a password repeatedly, even
when it is correct. I think that NetworkManager might think it's a
different kind of connection compared to what nm-connection-editor
thinks.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nm-connection-editor forgets WPA password

2016-06-07 Thread Thomas Haller
On Tue, 2016-06-07 at 19:10 +0200, Bastien Nocera wrote:
> Hey,
> 
> I get problems when trying this with both nm-connection-editor and
> gnome-control-center, so it's probably a problem in the common code.
> 
> 1. Connect to a known wireless network with WPA/WPA2 Personal
> authentication
> 2. Once connected, edit the connection
> 3. In "Wi-Fi Security" select "Dynamic WEP", then "Tunneled TLS" as
> the
> authentication, enter bogus values in "anonymous identity",
> "username"
> and password". Tick the "No CA certificate is required" checkbox.
> 4. "nmcli connection down "
> 5. "nmcli connection up " (you can press Ctrl+C when
> you're bored)
> 6. Re-edit the connection
> 7. Select WPA/WPA Personal in "Wi-Fi Security", and put in the actual
> Wi-Fi password
> 8. Run "nmcli connection up " again
> 
> "
> Passwords or encryption keys are required to access the wireless
> network 'test'.
> Warning: password for '802-11-wireless-security.psk' not given in
> 'passwd-file' and nmcli cannot ask without '--ask' option.
> "
> 
> It will then ask for the password in a loop, and never allow
> connection.
> 
> Ideas? Do you prefer this being filed in bugzilla?
> 


could this be
https://git.gnome.org/browse/network-manager-applet/commit/?id=c21d56dd22057103c8125a49307b4ff47b5b644d


Thomas

signature.asc
Description: This is a digitally signed message part
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


nm-connection-editor forgets WPA password

2016-06-07 Thread Bastien Nocera
Hey,

I get problems when trying this with both nm-connection-editor and
gnome-control-center, so it's probably a problem in the common code.

1. Connect to a known wireless network with WPA/WPA2 Personal
authentication
2. Once connected, edit the connection
3. In "Wi-Fi Security" select "Dynamic WEP", then "Tunneled TLS" as the
authentication, enter bogus values in "anonymous identity", "username"
and password". Tick the "No CA certificate is required" checkbox.
4. "nmcli connection down "
5. "nmcli connection up " (you can press Ctrl+C when
you're bored)
6. Re-edit the connection
7. Select WPA/WPA Personal in "Wi-Fi Security", and put in the actual
Wi-Fi password
8. Run "nmcli connection up " again

"
Passwords or encryption keys are required to access the wireless
network 'test'.
Warning: password for '802-11-wireless-security.psk' not given in
'passwd-file' and nmcli cannot ask without '--ask' option.
"

It will then ask for the password in a loop, and never allow
connection.

Ideas? Do you prefer this being filed in bugzilla?

Cheers
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


WPA Enterprise WiFi testing with freeradius

2016-04-19 Thread Dan Williams
Hi,

The following is a brain-dump of what I've been using to test all the
WPA Enterprise stuff using freeradius.

1) install freeradius 3.0 or higher

2) in /etc/raddb/certs there is a 'bootstrap' script.  You can use this
to generate testing certificates for the CA and the RADIUS server.  It
gives you ca.pem and server.pem.  The default files it writes out
should be automatically selected by the default configuration in
 /etc/raddb/mods-enabled/eap.

3) in /etc/raddb/certs you can 'make client.pem' to get a client
certificate for TLS configuration on your test machine.  Copy it to
your test machine (along with ca.pem) and use it for TLS
authentication.

4) add an entry for your AP to the end of clients.conf, which will look
like this:

client 192.168.0.5 {
secret = testing123
shortname = my-ap
}

5) on your AP set the authentication to WPA Enterprise or whatever, and
then in the RADIUS configuration enter the "secret" from step #4 and
the RADIUS server's IP.  You shouldn't need to touch port settings,
they are almost always correct with the default of 1812.

6) add a user to users.conf, looking something like this:

"Bill Smith" Cleartext-Password := ""

The password is the same thing you'll enter in NetworkManager for any
of the PAP, CHAP, MSCHAP, PWD, GTC, etc inner eap methods that TTLS,
PEAP, and FAST use.

(side-note: if you happen to have a 3Com WXR-series you'll want to add
right below the user/password line:
Egress-VLAN-Name:0 = "default",
3Com-VLAN-Name:0 = "default"
or the client can't talk to anything else)

7) you might want to edit radiusd.conf to "auth", "auth_badpass", and
"auth_goodpass" in the "log" section for debugging.

8) make sure that 'default' and 'inner-tunnel' are symlinked from
/etc/raddb/sites-available into /etc/raddb/sites-enabled.  Make sure
'eap' is symlinked from mods-available/ into mods-enabled/

9) copy /etc/raddb/certs/client.pem and /etc/raddb/certs/ca.pem to your
test client.  ca.pem will be used whenever a CA certificate is
required, and client.pem should be used with TLS or TTLS/TLS
authentication.

10) you may need to change /etc/raddb/mods-enabled/eap and set
"default_eap_type" to force a specific type of EAP while testing.

==

When things go wrong...

* add "-x" to the freeradius command-line in the systemd or initd
service files for more logging

* look at /var/log/radius*

* run the client's wpa_supplicant in full debug mode (-dddt) so you can see the 
output; all the radius stuff happens after the ASSOCIATING state and before the 
4-way handshake

* make sure you have built wpa_supplicant with all the authentication options!! 
 eg, its going to fail if you try EAP-PWD but haven't built the supplicant with 
CONFIG_EAP_PWD

* double-check all your passwords

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA/WPA2 Enterprise details

2015-09-14 Thread Jan Grulich
On Monday 14 of September 2015 12:51:01 Jirka Klimes wrote:
> On Mon, 14 Sep 2015 10:36:59 +0200
> 
> Jan Grulich <jgrul...@redhat.com> wrote:
> > Hi,
> > 
> > I'm trying to improve our WPA/WPA2 Enterprise support in KDE and I
> > have few questions regarding 802-11x security setting.
> > 
> > 1) When phase2-foo properties should be used instead of just foo
> > properties (e.g phase2-private-key/private-key) ? In implementation
> > of gnome-applet I see they are used when phase2 property is set to
> > true, but it's always set to false as I can see.
> 
> phase2-foo properties are used for EAP methods that have 2 phases. In
> the first phase a tunnel is established, and then, in phase 2, the
> authentication is done inside the tunnel using the inner method that
> uses the phase2 properties.
> NM uses that for PEAP, TTLS and FAST EAP methods for which you can
> specify inner methods.
> 
> I am not aware of gnome-shell applet implementation. You can look at
> nm-applet/nm-connection-editor code here:
> https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-securi
> ty/eap-method.c
> https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-secur
> ity/eap-method-peap.c

I actually meant nm-applet and not gnome-applet.

I see only phase2_auth property used in PEAP, FAST PEAP and TTLS, but in TLS 
there 
are other phase2-foo properties used only when parent->phase2 is true. I just 
don't 
understand why this property is always set to false in 
https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c[1]
by passing false as third parameter to eap_method_tls_new (line 428).

Is there any place where this property gets changed?

> > 2) Are subjectMatch/altSubjectMatch properties still valid and used?
> > I don't see this implemented in gnome-applet, but we had this
> > implemented in the old KDE networkmanagement applet. I'm asking
> > because we got a bug report about missing implementation of these
> > properties for the new applet and I would like to be sure how this
> > should be implemented.
> 
> https://developer.gnome.org/NetworkManager/1.0/ref-settings.html
> 
> Yes, the properties are valid and used for matching the certificates.
> They are passed to wpa_supplicant that performs the certificates
> matching.
> http://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/src/supplican
> t-manager/nm-supplicant-config.c#n971
> 
> It seems that nm-connection-editor/nn-applet did not handle the
> properties. But they can be set via nmcli.
> 
> Jirka
> 

Regards,
Jan



[1] 
https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA/WPA2 Enterprise details

2015-09-14 Thread Jirka Klimes
On Mon, 14 Sep 2015 10:36:59 +0200
Jan Grulich <jgrul...@redhat.com> wrote:

> Hi,
> 
> I'm trying to improve our WPA/WPA2 Enterprise support in KDE and I
> have few questions regarding 802-11x security setting.
> 
> 1) When phase2-foo properties should be used instead of just foo
> properties (e.g phase2-private-key/private-key) ? In implementation
> of gnome-applet I see they are used when phase2 property is set to
> true, but it's always set to false as I can see.
> 
phase2-foo properties are used for EAP methods that have 2 phases. In
the first phase a tunnel is established, and then, in phase 2, the
authentication is done inside the tunnel using the inner method that
uses the phase2 properties.
NM uses that for PEAP, TTLS and FAST EAP methods for which you can
specify inner methods.

I am not aware of gnome-shell applet implementation. You can look at 
nm-applet/nm-connection-editor code here:
https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/eap-method.c
https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/eap-method-peap.c

> 2) Are subjectMatch/altSubjectMatch properties still valid and used?
> I don't see this implemented in gnome-applet, but we had this
> implemented in the old KDE networkmanagement applet. I'm asking
> because we got a bug report about missing implementation of these
> properties for the new applet and I would like to be sure how this
> should be implemented. 
> 

https://developer.gnome.org/NetworkManager/1.0/ref-settings.html

Yes, the properties are valid and used for matching the certificates.
They are passed to wpa_supplicant that performs the certificates
matching.
http://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/src/supplicant-manager/nm-supplicant-config.c#n971

It seems that nm-connection-editor/nn-applet did not handle the
properties. But they can be set via nmcli.

Jirka

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA/WPA2 Enterprise details

2015-09-14 Thread Jirka Klimes
On Mon, 14 Sep 2015 13:23:14 +0200
Jan Grulich <jgrul...@redhat.com> wrote:

> On Monday 14 of September 2015 12:51:01 Jirka Klimes wrote:
> > On Mon, 14 Sep 2015 10:36:59 +0200
> > 
> > Jan Grulich <jgrul...@redhat.com> wrote:
> > > Hi,
> > > 
> > > I'm trying to improve our WPA/WPA2 Enterprise support in KDE and I
> > > have few questions regarding 802-11x security setting.
> > > 
> > > 1) When phase2-foo properties should be used instead of just foo
> > > properties (e.g phase2-private-key/private-key) ? In
> > > implementation of gnome-applet I see they are used when phase2
> > > property is set to true, but it's always set to false as I can
> > > see.
> > 
> > phase2-foo properties are used for EAP methods that have 2 phases.
> > In the first phase a tunnel is established, and then, in phase 2,
> > the authentication is done inside the tunnel using the inner method
> > that uses the phase2 properties.
> > NM uses that for PEAP, TTLS and FAST EAP methods for which you can
> > specify inner methods.
> > 
> > I am not aware of gnome-shell applet implementation. You can look at
> > nm-applet/nm-connection-editor code here:
> > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-securi
> > ty/eap-method.c
> > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-secur
> > ity/eap-method-peap.c
> 
> I actually meant nm-applet and not gnome-applet.
> 
> I see only phase2_auth property used in PEAP, FAST PEAP and TTLS, but
> in TLS there are other phase2-foo properties used only when
> parent->phase2 is true. I just don't understand why this property is
> always set to false in
> https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c[1]
> by passing false as third parameter to eap_method_tls_new (line 428).
> 
> Is there any place where this property gets changed?
> 
As I said, phase 2 is only used for some of the methods, that have
an inner authentication. Those are PEAP, TTLS and FAST.
TLS if used by itself does not have phase 2, so the phase2 properties
are not used.
I think that the phase2 parameter in the eap_method_tls_new() is there
just for the case EAP-TLS is used as an inner authentication method.
However, nm-connection-editor does not support this configuration. And
I am not sure if it is a common setup.

http://www.opus1.com/www/whitepapers/8021xinnerauthmethods.pdf

Jirka

> > > 2) Are subjectMatch/altSubjectMatch properties still valid and
> > > used? I don't see this implemented in gnome-applet, but we had
> > > this implemented in the old KDE networkmanagement applet. I'm
> > > asking because we got a bug report about missing implementation
> > > of these properties for the new applet and I would like to be
> > > sure how this should be implemented.
> > 
> > https://developer.gnome.org/NetworkManager/1.0/ref-settings.html
> > 
> > Yes, the properties are valid and used for matching the
> > certificates. They are passed to wpa_supplicant that performs the
> > certificates matching.
> > http://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/src/supplican
> > t-manager/nm-supplicant-config.c#n971
> > 
> > It seems that nm-connection-editor/nn-applet did not handle the
> > properties. But they can be set via nmcli.
> > 
> > Jirka
> > 
> 
> Regards,
> Jan
> 
> 
> 
> [1]
> https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA/WPA2 Enterprise details

2015-09-14 Thread Dan Williams
On Mon, 2015-09-14 at 15:02 +0200, Jirka Klimes wrote:
> On Mon, 14 Sep 2015 13:23:14 +0200
> Jan Grulich <jgrul...@redhat.com> wrote:
> 
> > On Monday 14 of September 2015 12:51:01 Jirka Klimes wrote:
> > > On Mon, 14 Sep 2015 10:36:59 +0200
> > > 
> > > Jan Grulich <jgrul...@redhat.com> wrote:
> > > > Hi,
> > > > 
> > > > I'm trying to improve our WPA/WPA2 Enterprise support in KDE and I
> > > > have few questions regarding 802-11x security setting.
> > > > 
> > > > 1) When phase2-foo properties should be used instead of just foo
> > > > properties (e.g phase2-private-key/private-key) ? In
> > > > implementation of gnome-applet I see they are used when phase2
> > > > property is set to true, but it's always set to false as I can
> > > > see.
> > > 
> > > phase2-foo properties are used for EAP methods that have 2 phases.
> > > In the first phase a tunnel is established, and then, in phase 2,
> > > the authentication is done inside the tunnel using the inner method
> > > that uses the phase2 properties.
> > > NM uses that for PEAP, TTLS and FAST EAP methods for which you can
> > > specify inner methods.
> > > 
> > > I am not aware of gnome-shell applet implementation. You can look at
> > > nm-applet/nm-connection-editor code here:
> > > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-securi
> > > ty/eap-method.c
> > > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-secur
> > > ity/eap-method-peap.c
> > 
> > I actually meant nm-applet and not gnome-applet.
> > 
> > I see only phase2_auth property used in PEAP, FAST PEAP and TTLS, but
> > in TLS there are other phase2-foo properties used only when
> > parent->phase2 is true. I just don't understand why this property is
> > always set to false in
> > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c[1]
> > by passing false as third parameter to eap_method_tls_new (line 428).
> > 
> > Is there any place where this property gets changed?
> > 
> As I said, phase 2 is only used for some of the methods, that have
> an inner authentication. Those are PEAP, TTLS and FAST.
> TLS if used by itself does not have phase 2, so the phase2 properties
> are not used.
> I think that the phase2 parameter in the eap_method_tls_new() is there
> just for the case EAP-TLS is used as an inner authentication method.
> However, nm-connection-editor does not support this configuration. And
> I am not sure if it is a common setup.

Yeah, I don't think we had an actual case of TTLS+TLS before.  There is
a valid reason for doing this (in plain one-phase EAP-TLS the identity
is transmitted in the clear, using TTLS+TLS fixes that) but most
locations seem to use PEAP or TTLS+(something else) since certificates
are fairly difficult to administer at scale.  Could be added though.

Dan

> http://www.opus1.com/www/whitepapers/8021xinnerauthmethods.pdf
> 
> Jirka
> 
> > > > 2) Are subjectMatch/altSubjectMatch properties still valid and
> > > > used? I don't see this implemented in gnome-applet, but we had
> > > > this implemented in the old KDE networkmanagement applet. I'm
> > > > asking because we got a bug report about missing implementation
> > > > of these properties for the new applet and I would like to be
> > > > sure how this should be implemented.
> > > 
> > > https://developer.gnome.org/NetworkManager/1.0/ref-settings.html
> > > 
> > > Yes, the properties are valid and used for matching the
> > > certificates. They are passed to wpa_supplicant that performs the
> > > certificates matching.
> > > http://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/src/supplican
> > > t-manager/nm-supplicant-config.c#n971
> > > 
> > > It seems that nm-connection-editor/nn-applet did not handle the
> > > properties. But they can be set via nmcli.
> > > 
> > > Jirka
> > > 
> > 
> > Regards,
> > Jan
> > 
> > 
> > 
> > [1]
> > https://git.gnome.org/browse/network-manager-applet/tree/src/wireless-security/wireless-security.c
> ___
> networkmanager-list mailing list
> networkmanager-list@gnome.org
> https://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


WPA/WPA2 Enterprise details

2015-09-14 Thread Jan Grulich
Hi,

I'm trying to improve our WPA/WPA2 Enterprise support in KDE and I have few 
questions regarding 802-11x security setting.

1) When phase2-foo properties should be used instead of just foo properties 
(e.g 
phase2-private-key/private-key) ? In implementation of gnome-applet I see they 
are 
used when phase2 property is set to true, but it's always set to false as I can 
see.

2) Are subjectMatch/altSubjectMatch properties still valid and used? I don't 
see this 
implemented in gnome-applet, but we had this implemented in the old KDE 
networkmanagement applet. I'm asking because we got a bug report about missing 
implementation of these properties for the new applet and I would like to be 
sure how 
this should be implemented. 

Bug report: https://bugs.kde.org/show_bug.cgi?id=342728[1] 

Thanks for your help.

Regards,
Jan
-- 
Jan Grulich <jgrul...@redhat.com>
Software Engineer, Desktop team
Red Hat Czech


[1] https://bugs.kde.org/show_bug.cgi?id=342728
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NetworkManager WPA supplicant

2015-06-03 Thread Dan Williams
On Tue, 2015-06-02 at 21:04 +0200, Pieter Cardoen wrote:
 Dear
 
 I want to use the option scan_ssid=0 for the wpa_supplicant configuration. 
 However when I add this line to the Wifi configuration keyfile of 
 NetworkManager, it is ignored by the NM daemon. How could I configure the 
 scan_ssid option using NetworkManager?

NM doesn't offer scan_ssid as a configuration option on a per-connection
basis.  scan_ssid=0 doesn't offer any security benefits because by the
time NM sends scan_ssid=1, NM has either (a) already found the network
in the scan list and is already connecting to it, and thus any listener
will soon hear your association/authentication anyway, or (b) the
network is hiding its SSID, and sending scan_ssid=1 enables quicker
connection to the network, and any listener will soon hear your
association too.

NM will *never* probe-request specific SSIDs during general scans unless
you have set the wifi.hidden=true property in the connection details.
NM only probe-requests (eg, scan_ssid=1) a network immediately before
connecting to it, or when wifi.hidden=true.

Dan

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


NetworkManager WPA supplicant

2015-06-02 Thread Pieter Cardoen
Dear

I want to use the option scan_ssid=0 for the wpa_supplicant configuration. 
However when I add this line to the Wifi configuration keyfile of 
NetworkManager, it is ignored by the NM daemon. How could I configure the 
scan_ssid option using NetworkManager?

Thanks in advance!
  ___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Save... button deactivated, can't create WPA WPA2 Enterprise connection

2014-05-02 Thread Chuck Anderson
I've had this problem for awhile now (maybe the last year or 2,
certainly Fedora 20 and Fedora 19, and probably Fedora 18 as well).

When creating a new Wi-Fi connection:

Security: WPA  WPA2 Enterprise
Authentication: TLS
User certificate: file in .der format
CA certifcate: file in .der format
Private key: file in .pem format
Private key password: provided

The Save... button remains greyed out/deactivated, so there is no
way to save the connection.  This happens both when selecting a new
Wi-Fi network from the Gnome shell, as well as running
nm-connection-editor manually.

Is there a workaround so I can create the connection?

Thanks.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Save... button deactivated, can't create WPA WPA2 Enterprise connection

2014-05-02 Thread Dan Williams
On Fri, 2014-05-02 at 14:49 -0400, Chuck Anderson wrote:
 I've had this problem for awhile now (maybe the last year or 2,
 certainly Fedora 20 and Fedora 19, and probably Fedora 18 as well).
 
 When creating a new Wi-Fi connection:
 
 Security: WPA  WPA2 Enterprise
 Authentication: TLS
 User certificate: file in .der format
 CA certifcate: file in .der format
 Private key: file in .pem format
 Private key password: provided

Could you run nm-connection-editor from a terminal and see what output
it dumps when you type the private key password?

Next, could you provide the top few lines of the private key .pem file?
They should look something like this:

-BEGIN RSA PRIVATE KEY-
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,5FA2D6D6242C26D0

Feel free to obscure the salt at the end ofthe DEK-Info line, if that
line exists for you.

Dan

 The Save... button remains greyed out/deactivated, so there is no
 way to save the connection.  This happens both when selecting a new
 Wi-Fi network from the Gnome shell, as well as running
 nm-connection-editor manually.
 
 Is there a workaround so I can create the connection?
 
 Thanks.
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 https://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Save... button deactivated, can't create WPA WPA2 Enterprise connection

2014-05-02 Thread Chuck Anderson
On Fri, May 02, 2014 at 02:32:01PM -0500, Dan Williams wrote:
 On Fri, 2014-05-02 at 14:49 -0400, Chuck Anderson wrote:
  I've had this problem for awhile now (maybe the last year or 2,
  certainly Fedora 20 and Fedora 19, and probably Fedora 18 as well).
  
  When creating a new Wi-Fi connection:
  
  Security: WPA  WPA2 Enterprise
  Authentication: TLS
  User certificate: file in .der format
  CA certifcate: file in .der format
  Private key: file in .pem format
  Private key password: provided
 
 Could you run nm-connection-editor from a terminal and see what output
 it dumps when you type the private key password?

$ nm-connection-editor

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
802-11-wireless.ssid: property is missing

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
802-11-wireless.ssid: property is missing

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
802-11-wireless.ssid: property is missing

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
802-11-wireless.ssid: property is missing

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): CRITICAL **: crypto_md5_hash: assertion 
'password_len  0' failed

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private key: 
1 private-key

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private key: 
1 private-key

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private key: 
1 private-key

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private key: 
1 private-key

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private key: 
1 private-key

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security

** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
Invalid Wi-Fi security


 Next, could you provide the top few lines of the private key .pem file?
 They should look something like this:
 
 -BEGIN RSA PRIVATE KEY-
 Proc-Type: 4,ENCRYPTED
 DEK-Info: DES-EDE3-CBC,5FA2D6D6242C26D0
 
 Feel free to obscure the salt at the end ofthe DEK-Info line, if that
 line exists for you.

-BEGIN RSA PRIVATE KEY-
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,

 Dan
 
  The Save... button remains greyed out/deactivated, so there is no
  way to save the connection.  This happens both when selecting a new
  Wi-Fi network from the Gnome shell, as well as running
  nm-connection-editor manually.
  
  Is there a workaround so I can create the connection?

So I now know what the problem was this time around.  The passphrase I
was using was incorrect.  Is there any way to provide user feedback
when this happens?

Thanks.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Save... button deactivated, can't create WPA WPA2 Enterprise connection

2014-05-02 Thread Dan Williams
On Fri, 2014-05-02 at 16:37 -0400, Chuck Anderson wrote:
 On Fri, May 02, 2014 at 02:32:01PM -0500, Dan Williams wrote:
  On Fri, 2014-05-02 at 14:49 -0400, Chuck Anderson wrote:
   I've had this problem for awhile now (maybe the last year or 2,
   certainly Fedora 20 and Fedora 19, and probably Fedora 18 as well).
   
   When creating a new Wi-Fi connection:
   
   Security: WPA  WPA2 Enterprise
   Authentication: TLS
   User certificate: file in .der format
   CA certifcate: file in .der format
   Private key: file in .pem format
   Private key password: provided
  
  Could you run nm-connection-editor from a terminal and see what output
  it dumps when you type the private key password?
 
 $ nm-connection-editor
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
 802-11-wireless.ssid: property is missing
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
 802-11-wireless.ssid: property is missing
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
 802-11-wireless.ssid: property is missing
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi: 
 802-11-wireless.ssid: property is missing
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): CRITICAL **: crypto_md5_hash: assertion 
 'password_len  0' failed
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private 
 key: 1 private-key
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private 
 key: 1 private-key
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private 
 key: 1 private-key
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private 
 key: 1 private-key
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Error: couldn't verify private 
 key: 1 private-key
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 ** (nm-connection-editor:4150): WARNING **: Invalid setting Wi-Fi Security: 
 Invalid Wi-Fi security
 
 
  Next, could you provide the top few lines of the private key .pem file?
  They should look something like this:
  
  -BEGIN RSA PRIVATE KEY-
  Proc-Type: 4,ENCRYPTED
  DEK-Info: DES-EDE3-CBC,5FA2D6D6242C26D0
  
  Feel free to obscure the salt at the end ofthe DEK-Info line, if that
  line exists for you.
 
 -BEGIN RSA PRIVATE KEY-
 Proc-Type: 4,ENCRYPTED
 DEK-Info: DES-EDE3-CBC,
 
  Dan
  
   The Save... button remains greyed out/deactivated, so there is no
   way to save the connection.  This happens both when selecting a new
   Wi-Fi network from the Gnome shell, as well as running
   nm-connection-editor manually.
   
   Is there a workaround so I can create the connection?
 
 So I now know what the problem was this time around.  The passphrase I
 was using was incorrect.  Is there any way to provide user feedback
 when this happens?

Yeah, we've toyed with outlining fields

Re: nm-applet crashes when connecting to new wpa AP

2013-06-26 Thread Dan Williams
On Sun, 2013-06-23 at 15:40 +0200, Kevin Brandstatter wrote:
 Settings schema 'org.gnome.nm-applet.eap' is not installed
 
 version 0.9.4.0-5 from debian wheezy (0.9.4.0 for network-manager as well)
 
 any thoughts? Ive tried recompiling the schemas, but the file simply
 doesnt exist.
 I've also tried reinstalling the network-manager-gnome package that
 provides the applet
 
 further note: im using e17 wm (0.17.3) on debian jessie, but using the
 network manager from wheezy becuase of some issues with wpa supplicant

That schema should be defined in org.gnome.nm-applet.gschema.xml, which
gets generated from org.gnome.nm-applet.gschema.xml.in and then
installed in the GSettings schema directory, so it should end up here:

/usr/share/glib-2.0/schemas/org.gnome.nm-applet.gschema.xml

and then glib-compile-schemas /usr/share/glib-2.0/schemas should get
called in the post-install scripts for the package to ensure that the
schema is recognized.  Any idea if that file is in the right place and
if the .deb is rebuilding the schemas?

Dan

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: nm-applet crashes when connecting to new wpa AP

2013-06-26 Thread Kevin Brandstatter
Ah i shouldve mentioned to the list that i solved this problem.
the issue was that since i had to regress network manager to 9.4 because
wpa1.1 isnt in the debian repository yet, i had libnm-gtk 9.8 still
which meant package incompatibility. reverting libnm-gtk0 and
libnm-gtk-common to 9.4 to match network manager and that solved the
issue. I guess can only hope that wpa 1.1 will get to testing soon so i
can finally update network manager to 9.8

-Kevin

On 06/26/2013 04:32 PM, Dan Williams wrote:
 On Sun, 2013-06-23 at 15:40 +0200, Kevin Brandstatter wrote:
 Settings schema 'org.gnome.nm-applet.eap' is not installed

 version 0.9.4.0-5 from debian wheezy (0.9.4.0 for network-manager as well)

 any thoughts? Ive tried recompiling the schemas, but the file simply
 doesnt exist.
 I've also tried reinstalling the network-manager-gnome package that
 provides the applet

 further note: im using e17 wm (0.17.3) on debian jessie, but using the
 network manager from wheezy becuase of some issues with wpa supplicant
 That schema should be defined in org.gnome.nm-applet.gschema.xml, which
 gets generated from org.gnome.nm-applet.gschema.xml.in and then
 installed in the GSettings schema directory, so it should end up here:

 /usr/share/glib-2.0/schemas/org.gnome.nm-applet.gschema.xml

 and then glib-compile-schemas /usr/share/glib-2.0/schemas should get
 called in the post-install scripts for the package to ensure that the
 schema is recognized.  Any idea if that file is in the right place and
 if the .deb is rebuilding the schemas?

 Dan

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


nm-applet crashes when connecting to new wpa AP

2013-06-23 Thread Kevin Brandstatter
Settings schema 'org.gnome.nm-applet.eap' is not installed

version 0.9.4.0-5 from debian wheezy (0.9.4.0 for network-manager as well)

any thoughts? Ive tried recompiling the schemas, but the file simply
doesnt exist.
I've also tried reinstalling the network-manager-gnome package that
provides the applet

further note: im using e17 wm (0.17.3) on debian jessie, but using the
network manager from wheezy becuase of some issues with wpa supplicant

-Kevin
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


How to find out if my WLAN uses WPA or WPA2 security?

2013-06-19 Thread Paul Menzel
Dear NetworkManager folks,


following a discussion on the linux-wireless list [1], I want to find
out if my WLAN uses WPA(1) or WPA2 security. In his reply Larry Finger
suggests to use `iwlist scan` but I do want to avoid installing the
package containing this and wonder if NetworkManager exposes the same
information.

In the connection properties (Verbindungsinformationen) in `nm-applet`,
the security line tells me WPA/WPA2.

I also was not able to find this in the output of nmcli.

$ LANG=C nmcli dev wifi list
SSID  BSSID   MODE 
FREQ   RATE   SIGNAL   SECURITY   ACTIVE  
[…]   
'MYWLAN'  XX:XX:XX:XX:XX:XX   Infrastructure   
2457 MHz   54 MB/s46   WPA WPA2   yes
[…]

Does NetworkManager not know about this information because
wpa_supplicant is responsible for this?


Thanks,

Paul


[1] http://marc.info/?l=linux-wirelessm=137156919728549w=2
[2] http://en.wikipedia.org/wiki/IEEE_802.11


signature.asc
Description: This is a digitally signed message part
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: How to find out if my WLAN uses WPA or WPA2 security?

2013-06-19 Thread Dan Williams
On Wed, 2013-06-19 at 09:37 +0200, Paul Menzel wrote:
 Dear NetworkManager folks,
 
 
 following a discussion on the linux-wireless list [1], I want to find
 out if my WLAN uses WPA(1) or WPA2 security. In his reply Larry Finger
 suggests to use `iwlist scan` but I do want to avoid installing the
 package containing this and wonder if NetworkManager exposes the same
 information.
 
 In the connection properties (Verbindungsinformationen) in `nm-applet`,
 the security line tells me WPA/WPA2.
 
 I also was not able to find this in the output of nmcli.
 
 $ LANG=C nmcli dev wifi list
 SSID  BSSID   MODE
  FREQ   RATE   SIGNAL   SECURITY   ACTIVE  
 […]   
 'MYWLAN'  XX:XX:XX:XX:XX:XX   Infrastructure  
  2457 MHz   54 MB/s46   WPA WPA2   yes
 […]
 
 Does NetworkManager not know about this information because
 wpa_supplicant is responsible for this?

If nmcli says WPA WPA2 then your AP supports both versions of WPA and
can accept clients that are not capable of WPA2.  You'll get this same
information from 'iwlist scan' or anywhere else.

What you're probably wondering is whether your actual connection is
using WPA2 *right now*, and the answer is that yes, it is.
NetworkManager tells the supplicant to use the best available protocol,
so if the AP is capable of WPA2 then that's what the connection is
using.

Dan

(of course, if your card doesn't support WPA2 then it won't be using it,
but everything supports WPA2 now, so this is quite unlikely)

___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


[PATCH 1/3] Revert wifi: disable Ad-Hoc WPA connections (lp:905748)

2013-01-30 Thread Stanislaw Gruszka
From: Nicolas Cavallari caval...@lri.fr

From: Nicolas Cavallari caval...@lri.fr

This reverts commit 69247a00eacd00617acbf1dfcee8497437b8ad39,
which disabled all security in Ad-Hoc networks, due to a bug
of wpa_supplicant that only affected WPA-None.
---
 libnm-util/nm-utils.c  |  4 
 src/nm-device-wifi.c   | 60 --
 src/settings/nm-settings.c | 45 --
 3 files changed, 109 deletions(-)

diff --git a/libnm-util/nm-utils.c b/libnm-util/nm-utils.c
index 51ddfeb..40bd67a 100644
--- a/libnm-util/nm-utils.c
+++ b/libnm-util/nm-utils.c
@@ -1323,8 +1323,6 @@ nm_utils_security_valid (NMUtilsSecurityType type,
}
break;
case NMU_SEC_WPA_PSK:
-   if (adhoc)
-   return FALSE;  /* FIXME: Kernel WPA Ad-Hoc support is 
buggy */
if (!(wifi_caps  NM_WIFI_DEVICE_CAP_WPA))
return FALSE;
if (have_ap) {
@@ -1351,8 +1349,6 @@ nm_utils_security_valid (NMUtilsSecurityType type,
}
break;
case NMU_SEC_WPA2_PSK:
-   if (adhoc)
-   return FALSE;  /* FIXME: Kernel WPA Ad-Hoc support is 
buggy */
if (!(wifi_caps  NM_WIFI_DEVICE_CAP_RSN))
return FALSE;
if (have_ap) {
diff --git a/src/nm-device-wifi.c b/src/nm-device-wifi.c
index 9101f4d..8a23e1b 100644
--- a/src/nm-device-wifi.c
+++ b/src/nm-device-wifi.c
@@ -999,36 +999,6 @@ deactivate (NMDevice *dev)
 }
 
 static gboolean
-is_adhoc_wpa (NMConnection *connection)
-{
-   NMSettingWireless *s_wifi;
-   NMSettingWirelessSecurity *s_wsec;
-   const char *mode, *key_mgmt;
-
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-
-   s_wifi = nm_connection_get_setting_wireless (connection);
-   g_return_val_if_fail (s_wifi != NULL, FALSE);
-
-   mode = nm_setting_wireless_get_mode (s_wifi);
-   if (g_strcmp0 (mode, NM_SETTING_WIRELESS_MODE_ADHOC) != 0)
-   return FALSE;
-
-   s_wsec = nm_connection_get_setting_wireless_security (connection);
-   if (!s_wsec)
-   return FALSE;
-
-   key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
-   if (g_strcmp0 (key_mgmt, wpa-none) != 0)
-   return FALSE;
-
-   return TRUE;
-}
-
-static gboolean
 check_connection_compatible (NMDevice *device,
  NMConnection *connection,
  GError **error)
@@ -1086,14 +1056,6 @@ check_connection_compatible (NMDevice *device,
}
}
 
-   if (is_adhoc_wpa (connection)) {
-   g_set_error_literal (error,
-NM_WIFI_ERROR,
-NM_WIFI_ERROR_CONNECTION_INCOMPATIBLE,
-WPA Ad-Hoc disabled due to kernel bugs);
-   return FALSE;
-   }
-
/* Early exit if supplicant or device don't support AP mode */
if (g_strcmp0 (nm_setting_wireless_get_mode (s_wireless), 
NM_SETTING_WIRELESS_MODE_AP) == 0) {
if (!(priv-capabilities  NM_WIFI_DEVICE_CAP_AP)) {
@@ -1312,18 +1274,6 @@ complete_connection (NMDevice *device,
return FALSE;
}
 
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-   if (is_adhoc_wpa (connection)) {
-   g_set_error_literal (error,
-NM_SETTING_WIRELESS_ERROR,
-NM_SETTING_WIRELESS_ERROR_INVALID_PROPERTY,
-WPA Ad-Hoc disabled due to kernel bugs);
-   return FALSE;
-   }
-
g_assert (ssid);
str_ssid = nm_utils_ssid_to_utf8 (ssid);
format = g_strdup_printf (%s %%d, str_ssid);
@@ -3003,16 +2953,6 @@ act_stage1_prepare (NMDevice *dev, NMDeviceStateReason 
*reason)
}
g_object_notify (G_OBJECT (self), NM_DEVICE_WIFI_MODE);
 
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-   if (is_adhoc_wpa (connection)) {
-   nm_log_warn (LOGD_WIFI, Ad-Hoc WPA disabled due to kernel 
bugs);
-   *reason = NM_DEVICE_STATE_REASON_SUPPLICANT_CONFIG_FAILED;
-   return NM_ACT_STAGE_RETURN_FAILURE;
-   }
-
/* Set

[PATCH 2/3] Replace Ad-Hoc WPA-None support with IBSS RSN-PSK.

2013-01-30 Thread Stanislaw Gruszka
From: Nicolas Cavallari caval...@lri.fr

From: Nicolas Cavallari caval...@lri.fr

This completely removes Ad-Hoc WPA-None support, as it is
not supported by the linux kernel since a long time,
have never been standardized and other vendors already
removed support for it since a long time.  The security
of the protocol is also comparable to WEP, especially
when used with TKIP.

Instead, the standard-compliant WPA2/RSN protocol
is used for IBSS/Ad-Hoc mode.  Compared to WPA-None,
this protocol uses the classical Four Way Handshake
for security association and features replay protection.

IBSS RSN-PSK requires wpa_supplicant 1.0 and a recent enough
kernel (best with = 3.2, 3.0 is still fine)
wpa_supplicant only supports the CCMP cipher when
operating in Ad-Hoc mode; if another cipher is requested,
wpa_supplicant will use CCMP anyway).

IBSS RSN will only be used when mode=adhoc and key_mgmt=wpa-psk
and only if the device claims support for it via nl80211.
---
 include/NetworkManager.h   |  4 +-
 libnm-glib/nm-device-wifi.c|  3 +-
 libnm-util/nm-setting-wireless-security.c  | 49 +-
 libnm-util/nm-setting-wireless.c   |  8 
 libnm-util/nm-utils.c  | 29 +
 src/nm-wifi-ap-utils.c | 47 -
 src/nm-wifi-ap.c   | 43 ---
 src/settings/plugins/ifcfg-rh/reader.c | 13 +++---
 src/settings/plugins/ifcfg-rh/writer.c |  2 +-
 src/settings/plugins/ifnet/connection_parser.c | 48 +
 src/supplicant-manager/nm-supplicant-config.c  |  3 +-
 .../nm-supplicant-settings-verify.c|  2 +-
 src/wifi/wifi-utils-nl80211.c  |  3 ++
 13 files changed, 89 insertions(+), 165 deletions(-)

diff --git a/include/NetworkManager.h b/include/NetworkManager.h
index 4c3e656..a6b9b96 100644
--- a/include/NetworkManager.h
+++ b/include/NetworkManager.h
@@ -157,6 +157,7 @@ typedef enum {
  * @NM_WIFI_DEVICE_CAP_WPA: device supports WPA1 authentication
  * @NM_WIFI_DEVICE_CAP_RSN: device supports WPA2/RSN authentication
  * @NM_WIFI_DEVICE_CAP_AP: device supports Access Point mode
+ * @NM_WIFI_DEVICE_CAP_IBSS_RSN: device supports WPA2/RSN in an IBSS network.
  *
  * 802.11 specific device encryption and authentication capabilities.
  **/
@@ -168,7 +169,8 @@ typedef enum {
NM_WIFI_DEVICE_CAP_CIPHER_CCMP   = 0x0008,
NM_WIFI_DEVICE_CAP_WPA   = 0x0010,
NM_WIFI_DEVICE_CAP_RSN   = 0x0020,
-   NM_WIFI_DEVICE_CAP_AP= 0x0040
+   NM_WIFI_DEVICE_CAP_AP= 0x0040,
+   NM_WIFI_DEVICE_CAP_IBSS_RSN  = 0x0080
 } NMDeviceWifiCapabilities;
 
 
diff --git a/libnm-glib/nm-device-wifi.c b/libnm-glib/nm-device-wifi.c
index aab659f..dba7ebf 100644
--- a/libnm-glib/nm-device-wifi.c
+++ b/libnm-glib/nm-device-wifi.c
@@ -463,8 +463,7 @@ connection_compatible (NMDevice *device, NMConnection 
*connection, GError **erro
if (s_wsec) {
/* Connection has security, verify it against the device's 
capabilities */
key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
-   if (   !g_strcmp0 (key_mgmt, wpa-none)
-   || !g_strcmp0 (key_mgmt, wpa-psk)
+   if (   !g_strcmp0 (key_mgmt, wpa-psk)
|| !g_strcmp0 (key_mgmt, wpa-eap)) {
 
/* Is device only WEP capable? */
diff --git a/libnm-util/nm-setting-wireless-security.c 
b/libnm-util/nm-setting-wireless-security.c
index 404a38a..f0fa226 100644
--- a/libnm-util/nm-setting-wireless-security.c
+++ b/libnm-util/nm-setting-wireless-security.c
@@ -789,8 +789,7 @@ need_secrets (NMSetting *setting)
}
 
/* WPA-PSK infrastructure and adhoc */
-   if (   (strcmp (priv-key_mgmt, wpa-none) == 0)
-   || (strcmp (priv-key_mgmt, wpa-psk) == 0)) {
+   if (strcmp (priv-key_mgmt, wpa-psk) == 0) {
if (!verify_wpa_psk (priv-psk)) {
g_ptr_array_add (secrets, 
NM_SETTING_WIRELESS_SECURITY_PSK);
return secrets;
@@ -838,7 +837,7 @@ verify (NMSetting *setting, GSList *all_settings, GError 
**error)
 {
NMSettingWirelessSecurity *self = NM_SETTING_WIRELESS_SECURITY 
(setting);
NMSettingWirelessSecurityPrivate *priv = 
NM_SETTING_WIRELESS_SECURITY_GET_PRIVATE (self);
-   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-none, 
wpa-psk, wpa-eap, NULL };
+   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-psk, 
wpa-eap, NULL };
const char *valid_auth_algs[] = { open, shared, leap, NULL };
const char *valid_protos[] = { wpa, rsn, NULL };
const char *valid_pairwise[] = { wep40, wep104, tkip, ccmp, 
NULL };
@@ -974,38 +973,12 @@ verify (NMSetting *setting, GSList *all_settings

WPA-PSK password length requirement

2012-12-11 Thread Robert Moskowitz

The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.

First I was a major contributor to 802.11i and wrote the first paper on 
the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your 
typical end user having a complaint on client behaviour.


Yesterday, I was at a major corporation for a meeting and the quest SSID 
had a 6 digit all numeric passcode.  NM would not let me connect; it 
seem to insist that a passcode for WPA2-PSK be at least 8 characters 
long.  The meeting participants using Windows had no difficulty with 
this 6 digit passcode and were able to get on the guest wireless network.


On any SSID I set up, I will use a reasonably strong passcode (though I 
would REALLY like to start using SAE in place of PSK!), but sometimes 
you have NO control over what others do.  I REALLY need an override on 
the passcode length requirement; I will again be at that location for a 
meeting Dec 19.


I doubt I will find a way to complain to this company's senior 
management on their IT department's 'bad' policy.  This setup is 
probably only intended to keep rifraf from trying to get to the NEXT 
level of access control (you then need an 8 hour user account for 
hotspot login).  Oh, I did not mention that they hide this SSID. Sheesh.



___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Dan Williams
On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:
 The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.
 
 First I was a major contributor to 802.11i and wrote the first paper on 
 the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your 
 typical end user having a complaint on client behaviour.
 
 Yesterday, I was at a major corporation for a meeting and the quest SSID 
 had a 6 digit all numeric passcode.  NM would not let me connect; it 
 seem to insist that a passcode for WPA2-PSK be at least 8 characters 
 long.  The meeting participants using Windows had no difficulty with 
 this 6 digit passcode and were able to get on the guest wireless network.

If it's a 6 digit passcode, then it's not a valid WPA passphrase.  If
you're able to get a scan of that network, I'd be very curious to see
what it's output is.

It *may* be a WPS network, which is a method to set up a wifi connection
somewhat like pairing a Bluetooth device.  That allows all numeric PIN
codes, and automatically determines the *actual* passphrase from a
handshake that uses the PIN.  

 On any SSID I set up, I will use a reasonably strong passcode (though I 
 would REALLY like to start using SAE in place of PSK!), but sometimes 
 you have NO control over what others do.  I REALLY need an override on 
 the passcode length requirement; I will again be at that location for a 
 meeting Dec 19.

Excellent, can you run:

iw dev wlan0 scan trigger
iw dev wlan0 scan dump

and grab the output for any AP of that network.  Feel free to  out
the MAC address and the SSID, since they aren't the interesting part.
What we want to know is a block like this:

WPS: * Version: 1.0
 * Wi-Fi Protected Setup State: 2 (Configured)
 * Response Type: 3 (AP)
 * UUID: 3a05b2ad-a879-917c-cc3f-5717fb38815f
 * Manufacturer: NETGEAR, Inc.
 * Model: WNDR3400v2
 * Model Number: WNDR3400v2
 * Serial Number: 01
 * Primary Device Type: 6-0050f204-1
 * Device name: WNDR3400v2
 * Config methods: Label
 * RF Bands: 0x3

Dan

 I doubt I will find a way to complain to this company's senior 
 management on their IT department's 'bad' policy.  This setup is 
 probably only intended to keep rifraf from trying to get to the NEXT 
 level of access control (you then need an 8 hour user account for 
 hotspot login).  Oh, I did not mention that they hide this SSID. Sheesh.
 
 
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 https://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Robert Moskowitz


On 12/11/2012 10:02 AM, Dan Williams wrote:

On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:

The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.

First I was a major contributor to 802.11i and wrote the first paper on
the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your
typical end user having a complaint on client behaviour.

Yesterday, I was at a major corporation for a meeting and the quest SSID
had a 6 digit all numeric passcode.  NM would not let me connect; it
seem to insist that a passcode for WPA2-PSK be at least 8 characters
long.  The meeting participants using Windows had no difficulty with
this 6 digit passcode and were able to get on the guest wireless network.

If it's a 6 digit passcode, then it's not a valid WPA passphrase.


Um, I helped write that section of 802.11i. Of course now it is just 
part of 802.11-2012:


M.4 Suggested pass-phrase-to-PSK mapping

The pass-phrase mapping defined in this subclause uses the PBKDF2 method 
from PKCS #5 v2.0 [B53].


PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)

Here, the following assumptions apply:
— A pass-phrase is a sequence of between 8 and 63 ASCII-encoded 
characters. The limit of 63 comes
from the desire to distinguish between a pass-phrase and a PSK displayed 
as 64 hexadecimal

characters.
— Each character in the pass-phrase must have an encoding in the range 
of 32 to 126 (decimal),

inclusive.

So, yes, we wrote the standard for 8-63 characters. But there are 
product out there that allow for smaller. Just bad implementations, but 
the real world.



If you're able to get a scan of that network, I'd be very curious to see
what it's output is.

It *may* be a WPS network, which is a method to set up a wifi connection
somewhat like pairing a Bluetooth device.  That allows all numeric PIN
codes, and automatically determines the *actual* passphrase from a
handshake that uses the PIN.


Nope, as there is more involved to use WPS. That does not work well at 
all in a big office building in the meeting rooms in same. But for the 
'fun' of it, I will try it with WPS.





On any SSID I set up, I will use a reasonably strong passcode (though I
would REALLY like to start using SAE in place of PSK!), but sometimes
you have NO control over what others do.  I REALLY need an override on
the passcode length requirement; I will again be at that location for a
meeting Dec 19.

Excellent, can you run:

iw dev wlan0 scan trigger
iw dev wlan0 scan dump

and grab the output for any AP of that network.  Feel free to  out
the MAC address and the SSID, since they aren't the interesting part.
What we want to know is a block like this:

WPS: * Version: 1.0
 * Wi-Fi Protected Setup State: 2 (Configured)
 * Response Type: 3 (AP)
 * UUID: 3a05b2ad-a879-917c-cc3f-5717fb38815f
 * Manufacturer: NETGEAR, Inc.
 * Model: WNDR3400v2
 * Model Number: WNDR3400v2
 * Serial Number: 01
 * Primary Device Type: 6-0050f204-1
 * Device name: WNDR3400v2
 * Config methods: Label
 * RF Bands: 0x3


Will do this. For connectivity at the next meeting, I am working on 
getting Hotspot working on my new Galaxy phone...




Dan


I doubt I will find a way to complain to this company's senior
management on their IT department's 'bad' policy.  This setup is
probably only intended to keep rifraf from trying to get to the NEXT
level of access control (you then need an 8 hour user account for
hotspot login).  Oh, I did not mention that they hide this SSID. Sheesh.



___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Dan Williams
On Tue, 2012-12-11 at 13:17 -0500, Robert Moskowitz wrote:
 On 12/11/2012 10:02 AM, Dan Williams wrote:
  On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:
  The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.
 
  First I was a major contributor to 802.11i and wrote the first paper on
  the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your
  typical end user having a complaint on client behaviour.
 
  Yesterday, I was at a major corporation for a meeting and the quest SSID
  had a 6 digit all numeric passcode.  NM would not let me connect; it
  seem to insist that a passcode for WPA2-PSK be at least 8 characters
  long.  The meeting participants using Windows had no difficulty with
  this 6 digit passcode and were able to get on the guest wireless network.
  If it's a 6 digit passcode, then it's not a valid WPA passphrase.
 
 Um, I helped write that section of 802.11i. Of course now it is just 
 part of 802.11-2012:
 
 M.4 Suggested pass-phrase-to-PSK mapping
 
 The pass-phrase mapping defined in this subclause uses the PBKDF2 method 
 from PKCS #5 v2.0 [B53].
 
 PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)
 
 Here, the following assumptions apply:
 — A pass-phrase is a sequence of between 8 and 63 ASCII-encoded 
 characters. The limit of 63 comes
 from the desire to distinguish between a pass-phrase and a PSK displayed 
 as 64 hexadecimal
 characters.
 — Each character in the pass-phrase must have an encoding in the range 
 of 32 to 126 (decimal),
 inclusive.
 
 So, yes, we wrote the standard for 8-63 characters. But there are 
 product out there that allow for smaller. Just bad implementations, but 
 the real world.

And these devices pass WiFi Alliance certification?

Dan

  If you're able to get a scan of that network, I'd be very curious to see
  what it's output is.
 
  It *may* be a WPS network, which is a method to set up a wifi connection
  somewhat like pairing a Bluetooth device.  That allows all numeric PIN
  codes, and automatically determines the *actual* passphrase from a
  handshake that uses the PIN.
 
 Nope, as there is more involved to use WPS. That does not work well at 
 all in a big office building in the meeting rooms in same. But for the 
 'fun' of it, I will try it with WPS.
 
 
  On any SSID I set up, I will use a reasonably strong passcode (though I
  would REALLY like to start using SAE in place of PSK!), but sometimes
  you have NO control over what others do.  I REALLY need an override on
  the passcode length requirement; I will again be at that location for a
  meeting Dec 19.
  Excellent, can you run:
 
  iw dev wlan0 scan trigger
  iw dev wlan0 scan dump
 
  and grab the output for any AP of that network.  Feel free to  out
  the MAC address and the SSID, since they aren't the interesting part.
  What we want to know is a block like this:
 
  WPS: * Version: 1.0
   * Wi-Fi Protected Setup State: 2 (Configured)
   * Response Type: 3 (AP)
   * UUID: 3a05b2ad-a879-917c-cc3f-5717fb38815f
   * Manufacturer: NETGEAR, Inc.
   * Model: WNDR3400v2
   * Model Number: WNDR3400v2
   * Serial Number: 01
   * Primary Device Type: 6-0050f204-1
   * Device name: WNDR3400v2
   * Config methods: Label
   * RF Bands: 0x3
 
 Will do this. For connectivity at the next meeting, I am working on 
 getting Hotspot working on my new Galaxy phone...
 
 
  Dan
 
  I doubt I will find a way to complain to this company's senior
  management on their IT department's 'bad' policy.  This setup is
  probably only intended to keep rifraf from trying to get to the NEXT
  level of access control (you then need an 8 hour user account for
  hotspot login).  Oh, I did not mention that they hide this SSID. Sheesh.
 
 


___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Robert Moskowitz


On 12/11/2012 01:53 PM, Dan Williams wrote:

On Tue, 2012-12-11 at 13:17 -0500, Robert Moskowitz wrote:

On 12/11/2012 10:02 AM, Dan Williams wrote:

On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:

The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.

First I was a major contributor to 802.11i and wrote the first paper on
the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your
typical end user having a complaint on client behaviour.

Yesterday, I was at a major corporation for a meeting and the quest SSID
had a 6 digit all numeric passcode.  NM would not let me connect; it
seem to insist that a passcode for WPA2-PSK be at least 8 characters
long.  The meeting participants using Windows had no difficulty with
this 6 digit passcode and were able to get on the guest wireless network.

If it's a 6 digit passcode, then it's not a valid WPA passphrase.

Um, I helped write that section of 802.11i. Of course now it is just
part of 802.11-2012:

M.4 Suggested pass-phrase-to-PSK mapping

The pass-phrase mapping defined in this subclause uses the PBKDF2 method
from PKCS #5 v2.0 [B53].

PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)

Here, the following assumptions apply:
— A pass-phrase is a sequence of between 8 and 63 ASCII-encoded
characters. The limit of 63 comes
from the desire to distinguish between a pass-phrase and a PSK displayed
as 64 hexadecimal
characters.
— Each character in the pass-phrase must have an encoding in the range
of 32 to 126 (decimal),
inclusive.

So, yes, we wrote the standard for 8-63 characters. But there are
product out there that allow for smaller. Just bad implementations, but
the real world.

And these devices pass WiFi Alliance certification?



Given who this company is, I suspect yes. I was just thinking; I can get 
the BSSID and that will give us the MAC manufacture which is probably 
the device manufacture :)


But their security certification has always been weak to compliance. 
ICSAlabs put in a bit back in the days, but we lost out as all we were 
'good' at was the security and did not have experience in RF certification.


Dan


If you're able to get a scan of that network, I'd be very curious to see
what it's output is.

It *may* be a WPS network, which is a method to set up a wifi connection
somewhat like pairing a Bluetooth device.  That allows all numeric PIN
codes, and automatically determines the *actual* passphrase from a
handshake that uses the PIN.

Nope, as there is more involved to use WPS. That does not work well at
all in a big office building in the meeting rooms in same. But for the
'fun' of it, I will try it with WPS.


On any SSID I set up, I will use a reasonably strong passcode (though I
would REALLY like to start using SAE in place of PSK!), but sometimes
you have NO control over what others do.  I REALLY need an override on
the passcode length requirement; I will again be at that location for a
meeting Dec 19.

Excellent, can you run:

iw dev wlan0 scan trigger
iw dev wlan0 scan dump

and grab the output for any AP of that network.  Feel free to  out
the MAC address and the SSID, since they aren't the interesting part.
What we want to know is a block like this:

WPS: * Version: 1.0
 * Wi-Fi Protected Setup State: 2 (Configured)
 * Response Type: 3 (AP)
 * UUID: 3a05b2ad-a879-917c-cc3f-5717fb38815f
 * Manufacturer: NETGEAR, Inc.
 * Model: WNDR3400v2
 * Model Number: WNDR3400v2
 * Serial Number: 01
 * Primary Device Type: 6-0050f204-1
 * Device name: WNDR3400v2
 * Config methods: Label
 * RF Bands: 0x3

Will do this. For connectivity at the next meeting, I am working on
getting Hotspot working on my new Galaxy phone...



Dan


I doubt I will find a way to complain to this company's senior
management on their IT department's 'bad' policy.  This setup is
probably only intended to keep rifraf from trying to get to the NEXT
level of access control (you then need an 8 hour user account for
hotspot login).  Oh, I did not mention that they hide this SSID. Sheesh.







___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Brian Morrison
On Tue, 11 Dec 2012 12:53:58 -0600
Dan Williams wrote:

 And these devices pass WiFi Alliance certification?

Since this is against golden devices instead of against a rigorous
spec it doesn't actually guarantee that compliance means does what the
spec says it should.

-- 

Brian Morrison
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA-PSK password length requirement

2012-12-11 Thread Dan Williams
On Tue, 2012-12-11 at 14:01 -0500, Robert Moskowitz wrote:
 On 12/11/2012 01:53 PM, Dan Williams wrote:
  On Tue, 2012-12-11 at 13:17 -0500, Robert Moskowitz wrote:
  On 12/11/2012 10:02 AM, Dan Williams wrote:
  On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:
  The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.
 
  First I was a major contributor to 802.11i and wrote the first paper on
  the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your
  typical end user having a complaint on client behaviour.
 
  Yesterday, I was at a major corporation for a meeting and the quest SSID
  had a 6 digit all numeric passcode.  NM would not let me connect; it
  seem to insist that a passcode for WPA2-PSK be at least 8 characters
  long.  The meeting participants using Windows had no difficulty with
  this 6 digit passcode and were able to get on the guest wireless network.
  If it's a 6 digit passcode, then it's not a valid WPA passphrase.
  Um, I helped write that section of 802.11i. Of course now it is just
  part of 802.11-2012:
 
  M.4 Suggested pass-phrase-to-PSK mapping
 
  The pass-phrase mapping defined in this subclause uses the PBKDF2 method
  from PKCS #5 v2.0 [B53].
 
  PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)
 
  Here, the following assumptions apply:
  — A pass-phrase is a sequence of between 8 and 63 ASCII-encoded
  characters. The limit of 63 comes
  from the desire to distinguish between a pass-phrase and a PSK displayed
  as 64 hexadecimal
  characters.
  — Each character in the pass-phrase must have an encoding in the range
  of 32 to 126 (decimal),
  inclusive.
 
  So, yes, we wrote the standard for 8-63 characters. But there are
  product out there that allow for smaller. Just bad implementations, but
  the real world.
  And these devices pass WiFi Alliance certification?
 
 
 Given who this company is, I suspect yes. I was just thinking; I can get 
 the BSSID and that will give us the MAC manufacture which is probably 
 the device manufacture :)
 
 But their security certification has always been weak to compliance. 
 ICSAlabs put in a bit back in the days, but we lost out as all we were 
 'good' at was the security and did not have experience in RF certification.

Note that wpa_supplicant does not allow passphrases with a shorter
length than 8 characters:

if (len  8 || len  63) {
wpa_printf(MSG_ERROR, Line %d: Invalid passphrase 
   length %lu (expected: 8..63) '%s'.,
   line, (unsigned long) len, value);
return -1;
}

If you plead your case to Jouni (the hostap/wpa_supplicant maintainer
who also helps draft 802.11 standards), and he agrees to allow
shorter-than-8-char passphrases, then I'll entertain lowering the limit
in NetworkManager.

Random aside: another problem we periodically have is the character
encoding for hashing passphrases to the actual PSK.  When entering the
initial setup passphrase in a browser, and if the browser allows
non-ASCII characters, it's entirely unknown (a) what encoding the
browser is set to, and (b) how the software on the AP hashes the
passphrase to the PSK.  We've had problems with passphrases that contain
umlauts, for example.

When you're next at that location, if there's any chance you get get the
actual hashed passphrase (ie 64 hex chars) from somebody, I'd love to
see see how the shorter-than-8-char passphrase got hashed to a PSK; did
it get padded with zeros or something?  Or just hashed straight-up?

Dan

 
  Dan
 
  If you're able to get a scan of that network, I'd be very curious to see
  what it's output is.
 
  It *may* be a WPS network, which is a method to set up a wifi connection
  somewhat like pairing a Bluetooth device.  That allows all numeric PIN
  codes, and automatically determines the *actual* passphrase from a
  handshake that uses the PIN.
  Nope, as there is more involved to use WPS. That does not work well at
  all in a big office building in the meeting rooms in same. But for the
  'fun' of it, I will try it with WPS.
 
  On any SSID I set up, I will use a reasonably strong passcode (though I
  would REALLY like to start using SAE in place of PSK!), but sometimes
  you have NO control over what others do.  I REALLY need an override on
  the passcode length requirement; I will again be at that location for a
  meeting Dec 19.
  Excellent, can you run:
 
  iw dev wlan0 scan trigger
  iw dev wlan0 scan dump
 
  and grab the output for any AP of that network.  Feel free to  out
  the MAC address and the SSID, since they aren't the interesting part.
  What we want to know is a block like this:
 
WPS: * Version: 1.0
 * Wi-Fi Protected Setup State: 2 (Configured)
 * Response Type: 3 (AP)
 * UUID: 3a05b2ad-a879-917c-cc3f-5717fb38815f
 * Manufacturer: NETGEAR, Inc.
 * Model: WNDR3400v2
 * Model Number: WNDR3400v2
 * Serial Number: 01
 * Primary

Re: WPA-PSK password length requirement

2012-12-11 Thread Robert Moskowitz


On 12/11/2012 06:27 PM, Dan Williams wrote:

On Tue, 2012-12-11 at 14:01 -0500, Robert Moskowitz wrote:

On 12/11/2012 01:53 PM, Dan Williams wrote:

On Tue, 2012-12-11 at 13:17 -0500, Robert Moskowitz wrote:

On 12/11/2012 10:02 AM, Dan Williams wrote:

On Tue, 2012-12-11 at 06:24 -0500, Robert Moskowitz wrote:

The is on Fedora 17, x86_64 (NM 0.9.6.4-3.fc17?), Gnome 3.

First I was a major contributor to 802.11i and wrote the first paper on
the attack on WPA-PSK (and the myth on hiding SSIDs); I am not your
typical end user having a complaint on client behaviour.

Yesterday, I was at a major corporation for a meeting and the quest SSID
had a 6 digit all numeric passcode.  NM would not let me connect; it
seem to insist that a passcode for WPA2-PSK be at least 8 characters
long.  The meeting participants using Windows had no difficulty with
this 6 digit passcode and were able to get on the guest wireless network.

If it's a 6 digit passcode, then it's not a valid WPA passphrase.

Um, I helped write that section of 802.11i. Of course now it is just
part of 802.11-2012:

M.4 Suggested pass-phrase-to-PSK mapping

The pass-phrase mapping defined in this subclause uses the PBKDF2 method
from PKCS #5 v2.0 [B53].

PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)

Here, the following assumptions apply:
— A pass-phrase is a sequence of between 8 and 63 ASCII-encoded
characters. The limit of 63 comes
from the desire to distinguish between a pass-phrase and a PSK displayed
as 64 hexadecimal
characters.
— Each character in the pass-phrase must have an encoding in the range
of 32 to 126 (decimal),
inclusive.

So, yes, we wrote the standard for 8-63 characters. But there are
product out there that allow for smaller. Just bad implementations, but
the real world.

And these devices pass WiFi Alliance certification?


Given who this company is, I suspect yes. I was just thinking; I can get
the BSSID and that will give us the MAC manufacture which is probably
the device manufacture :)

But their security certification has always been weak to compliance.
ICSAlabs put in a bit back in the days, but we lost out as all we were
'good' at was the security and did not have experience in RF certification.

Note that wpa_supplicant does not allow passphrases with a shorter
length than 8 characters:

if (len  8 || len  63) {
wpa_printf(MSG_ERROR, Line %d: Invalid passphrase 
   length %lu (expected: 8..63) '%s'.,
   line, (unsigned long) len, value);
return -1;
}

If you plead your case to Jouni (the hostap/wpa_supplicant maintainer
who also helps draft 802.11 standards), and he agrees to allow
shorter-than-8-char passphrases, then I'll entertain lowering the limit
in NetworkManager.


I will probably see Jouni at the January meeting in Vancouver.



Random aside: another problem we periodically have is the character
encoding for hashing passphrases to the actual PSK.  When entering the
initial setup passphrase in a browser, and if the browser allows
non-ASCII characters, it's entirely unknown (a) what encoding the
browser is set to, and (b) how the software on the AP hashes the
passphrase to the PSK.  We've had problems with passphrases that contain
umlauts, for example.


Oh, we have discussed this endlessly at the IETF, going way back. It can 
get very messy. Even Unicode will not help you out here; in fact it can 
make it worst! And this is causing major chanellenges for ISN.




When you're next at that location, if there's any chance you get get the
actual hashed passphrase (ie 64 hex chars) from somebody, I'd love to
see see how the shorter-than-8-char passphrase got hashed to a PSK; did
it get padded with zeros or something?  Or just hashed straight-up?


I am so rusty with running Wireshark over wireless. I was probably 
running F10 when I would be doing this sort of thing. I will try and 
brush up early next week (I am off the next 2 days to visit my son in NJ).


I recall now that on the white board where they wrote down the wireless 
access, they definitely said WPA2-PSK and that 6 digit code. And windoze 
people were getting on the wireless network.



If you're able to get a scan of that network, I'd be very curious to see
what it's output is.

It *may* be a WPS network, which is a method to set up a wifi connection
somewhat like pairing a Bluetooth device.  That allows all numeric PIN
codes, and automatically determines the *actual* passphrase from a
handshake that uses the PIN.

Nope, as there is more involved to use WPS. That does not work well at
all in a big office building in the meeting rooms in same. But for the
'fun' of it, I will try it with WPS.


On any SSID I set up, I will use a reasonably strong passcode (though I
would REALLY like to start using SAE in place of PSK!), but sometimes
you have NO control over what others do.  I REALLY need an override on
the passcode length requirement; I will again be at that location for a
meeting Dec 19.

Excellent

Re: cnetworkmanager: Will --wpa-pass expose my password?

2012-12-03 Thread Pantelis Koukousoulas
On Mon, Dec 3, 2012 at 3:32 AM,  brom...@lavabit.com wrote:
 Hello!

 I'd like to try cnetworkmanager. The only thing that stops me is the
 following options:

   --wep-hex=KEY use this WEP key of 26 hex digits
   --wep-pass=KEYuse this WEP passphrase
   --wpa-psk-hex=KEY use this WPA key of 64 hex digits
   --wpa-pass=KEYuse this WPA passphrase

 Will the above put a password in .bash_history?

 I don't want to store my password in a file (even with strict
 permissions.)

ΙΜΗΟ .bash_history is not such a big problem since you can
just do unset HISTFILE before calling the command.

/proc/*/cmdline on the other hand is probably more dangerous
and less easy to deal with.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


cnetworkmanager: Will --wpa-pass expose my password?

2012-12-02 Thread bromley
Hello!

I'd like to try cnetworkmanager. The only thing that stops me is the
following options:

  --wep-hex=KEY use this WEP key of 26 hex digits
  --wep-pass=KEYuse this WEP passphrase
  --wpa-psk-hex=KEY use this WPA key of 64 hex digits
  --wpa-pass=KEYuse this WPA passphrase

Will the above put a password in .bash_history?

I don't want to store my password in a file (even with strict
permissions.)



___
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list


[PATCH 2/3 v3] Replace Ad-Hoc WPA-None support with IBSS RSN-PSK.

2012-08-10 Thread Nicolas . Cavallari
From: Nicolas Cavallari caval...@lri.fr

This completely removes Ad-Hoc WPA-None support, as it is
not supported by the linux kernel since a long time,
have never been standardized and other vendors already
removed support for it since a long time.  The security
of the protocol is also comparable to WEP, especially
when used with TKIP.

Instead, the standard-compliant WPA2/RSN protocol
is used for IBSS/Ad-Hoc mode.  Compared to WPA-None,
this protocol uses the classical Four Way Handshake
for security association and features replay protection.

IBSS RSN-PSK requires wpa_supplicant 1.0 and a recent enough
kernel (best with = 3.2, 3.0 is still fine)
wpa_supplicant only supports the CCMP cipher when
operating in Ad-Hoc mode; if another cipher is requested,
wpa_supplicant will use CCMP anyway).

IBSS RSN will only be used when mode=adhoc and key_mgmt=wpa-psk
and only if the device claims support for it via nl80211.

--
Please drop the previous patch, as it didn't compile with the
default -Werror=unused-variable flag.

please drop v2, as it was identical to v1, sorry for the noise.
---
 include/NetworkManager.h   |4 +-
 libnm-glib/nm-device-wifi.c|3 +-
 libnm-util/nm-setting-wireless-security.c  |   49 +---
 libnm-util/nm-setting-wireless.c   |   13 +++---
 libnm-util/nm-utils.c  |   29 
 src/nm-wifi-ap-utils.c |   47 +++
 src/nm-wifi-ap.c   |   43 +++--
 src/settings/plugins/ifcfg-rh/reader.c |   13 ++
 src/settings/plugins/ifcfg-rh/writer.c |2 +-
 src/settings/plugins/ifnet/connection_parser.c |   48 ---
 .../plugins/ifnet/tests/wpa_supplicant.conf|   10 ++--
 src/supplicant-manager/nm-supplicant-config.c  |3 +-
 .../nm-supplicant-settings-verify.c|2 +-
 src/wifi/wifi-utils-nl80211.c  |3 ++
 14 files changed, 101 insertions(+), 168 deletions(-)

diff --git a/include/NetworkManager.h b/include/NetworkManager.h
index bb67b8f..b35c097 100644
--- a/include/NetworkManager.h
+++ b/include/NetworkManager.h
@@ -155,6 +155,7 @@ typedef enum {
  * @NM_WIFI_DEVICE_CAP_WPA: device supports WPA1 authentication
  * @NM_WIFI_DEVICE_CAP_RSN: device supports WPA2/RSN authentication
  * @NM_WIFI_DEVICE_CAP_AP: device supports Access Point mode
+ * @NM_WIFI_DEVICE_CAP_IBSS_RSN: device supports WPA2/RSN in an IBSS network.
  *
  * 802.11 specific device encryption and authentication capabilities.
  **/
@@ -166,7 +167,8 @@ typedef enum {
NM_WIFI_DEVICE_CAP_CIPHER_CCMP   = 0x0008,
NM_WIFI_DEVICE_CAP_WPA   = 0x0010,
NM_WIFI_DEVICE_CAP_RSN   = 0x0020,
-   NM_WIFI_DEVICE_CAP_AP= 0x0040
+   NM_WIFI_DEVICE_CAP_AP= 0x0040,
+   NM_WIFI_DEVICE_CAP_IBSS_RSN  = 0x0080
 } NMDeviceWifiCapabilities;
 
 
diff --git a/libnm-glib/nm-device-wifi.c b/libnm-glib/nm-device-wifi.c
index 0058fd1..3e0fac2 100644
--- a/libnm-glib/nm-device-wifi.c
+++ b/libnm-glib/nm-device-wifi.c
@@ -463,8 +463,7 @@ connection_compatible (NMDevice *device, NMConnection 
*connection, GError **erro
if (s_wsec) {
/* Connection has security, verify it against the device's 
capabilities */
key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
-   if (   !g_strcmp0 (key_mgmt, wpa-none)
-   || !g_strcmp0 (key_mgmt, wpa-psk)
+   if (   !g_strcmp0 (key_mgmt, wpa-psk)
|| !g_strcmp0 (key_mgmt, wpa-eap)) {
 
/* Is device only WEP capable? */
diff --git a/libnm-util/nm-setting-wireless-security.c 
b/libnm-util/nm-setting-wireless-security.c
index 336773c..3372394 100644
--- a/libnm-util/nm-setting-wireless-security.c
+++ b/libnm-util/nm-setting-wireless-security.c
@@ -785,8 +785,7 @@ need_secrets (NMSetting *setting)
}
 
/* WPA-PSK infrastructure and adhoc */
-   if (   (strcmp (priv-key_mgmt, wpa-none) == 0)
-   || (strcmp (priv-key_mgmt, wpa-psk) == 0)) {
+   if (strcmp (priv-key_mgmt, wpa-psk) == 0) {
if (!verify_wpa_psk (priv-psk)) {
g_ptr_array_add (secrets, 
NM_SETTING_WIRELESS_SECURITY_PSK);
return secrets;
@@ -834,7 +833,7 @@ verify (NMSetting *setting, GSList *all_settings, GError 
**error)
 {
NMSettingWirelessSecurity *self = NM_SETTING_WIRELESS_SECURITY 
(setting);
NMSettingWirelessSecurityPrivate *priv = 
NM_SETTING_WIRELESS_SECURITY_GET_PRIVATE (self);
-   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-none, 
wpa-psk, wpa-eap, NULL };
+   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-psk, 
wpa-eap, NULL };
const char *valid_auth_algs[] = { open, shared, leap, NULL

[PATCH 1/3] Revert wifi: disable Ad-Hoc WPA connections (lp:905748)

2012-08-09 Thread Nicolas . Cavallari
From: Nicolas Cavallari caval...@lri.fr

This reverts commit 69247a00eacd00617acbf1dfcee8497437b8ad39,
which disabled all security in Ad-Hoc networks, due to a bug
of wpa_supplicant that only affected WPA-None.
---
 libnm-util/nm-utils.c  |4 ---
 src/nm-device-wifi.c   |   60 
 src/settings/nm-settings.c |   45 -
 3 files changed, 109 deletions(-)

diff --git a/libnm-util/nm-utils.c b/libnm-util/nm-utils.c
index 65bbd25..607c0e6 100644
--- a/libnm-util/nm-utils.c
+++ b/libnm-util/nm-utils.c
@@ -1285,8 +1285,6 @@ nm_utils_security_valid (NMUtilsSecurityType type,
}
break;
case NMU_SEC_WPA_PSK:
-   if (adhoc)
-   return FALSE;  /* FIXME: Kernel WPA Ad-Hoc support is 
buggy */
if (!(wifi_caps  NM_WIFI_DEVICE_CAP_WPA))
return FALSE;
if (have_ap) {
@@ -1313,8 +1311,6 @@ nm_utils_security_valid (NMUtilsSecurityType type,
}
break;
case NMU_SEC_WPA2_PSK:
-   if (adhoc)
-   return FALSE;  /* FIXME: Kernel WPA Ad-Hoc support is 
buggy */
if (!(wifi_caps  NM_WIFI_DEVICE_CAP_RSN))
return FALSE;
if (have_ap) {
diff --git a/src/nm-device-wifi.c b/src/nm-device-wifi.c
index e2ff77e..0809ce0 100644
--- a/src/nm-device-wifi.c
+++ b/src/nm-device-wifi.c
@@ -967,36 +967,6 @@ real_deactivate (NMDevice *dev)
 }
 
 static gboolean
-is_adhoc_wpa (NMConnection *connection)
-{
-   NMSettingWireless *s_wifi;
-   NMSettingWirelessSecurity *s_wsec;
-   const char *mode, *key_mgmt;
-
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-
-   s_wifi = nm_connection_get_setting_wireless (connection);
-   g_return_val_if_fail (s_wifi != NULL, FALSE);
-
-   mode = nm_setting_wireless_get_mode (s_wifi);
-   if (g_strcmp0 (mode, NM_SETTING_WIRELESS_MODE_ADHOC) != 0)
-   return FALSE;
-
-   s_wsec = nm_connection_get_setting_wireless_security (connection);
-   if (!s_wsec)
-   return FALSE;
-
-   key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
-   if (g_strcmp0 (key_mgmt, wpa-none) != 0)
-   return FALSE;
-
-   return TRUE;
-}
-
-static gboolean
 real_check_connection_compatible (NMDevice *device,
   NMConnection *connection,
   GError **error)
@@ -1054,14 +1024,6 @@ real_check_connection_compatible (NMDevice *device,
}
}
 
-   if (is_adhoc_wpa (connection)) {
-   g_set_error_literal (error,
-NM_WIFI_ERROR,
-NM_WIFI_ERROR_CONNECTION_INCOMPATIBLE,
-WPA Ad-Hoc disabled due to kernel bugs);
-   return FALSE;
-   }
-
// FIXME: check channel/freq/band against bands the hardware supports
// FIXME: check encryption against device capabilities
// FIXME: check bitrate against device capabilities
@@ -1222,18 +1184,6 @@ real_complete_connection (NMDevice *device,
return FALSE;
}
 
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-   if (is_adhoc_wpa (connection)) {
-   g_set_error_literal (error,
-NM_SETTING_WIRELESS_ERROR,
-NM_SETTING_WIRELESS_ERROR_INVALID_PROPERTY,
-WPA Ad-Hoc disabled due to kernel bugs);
-   return FALSE;
-   }
-
g_assert (ssid);
str_ssid = nm_utils_ssid_to_utf8 (ssid);
format = g_strdup_printf (%s %%d, str_ssid);
@@ -2789,16 +2739,6 @@ real_act_stage1_prepare (NMDevice *dev, 
NMDeviceStateReason *reason)
connection = nm_act_request_get_connection (req);
g_return_val_if_fail (connection != NULL, NM_ACT_STAGE_RETURN_FAILURE);
 
-   /* The kernel doesn't support Ad-Hoc WPA connections well at this time,
-* and turns them into open networks.  It's been this way since at least
-* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc 
networks.
-*/
-   if (is_adhoc_wpa (connection)) {
-   nm_log_warn (LOGD_WIFI, Ad-Hoc WPA disabled due to kernel 
bugs);
-   *reason = NM_DEVICE_STATE_REASON_SUPPLICANT_CONFIG_FAILED;
-   return NM_ACT_STAGE_RETURN_FAILURE

[PATCH 2/3] Replace Ad-Hoc WPA-None support with IBSS RSN-PSK.

2012-08-09 Thread Nicolas . Cavallari
From: Nicolas Cavallari caval...@lri.fr

This completely removes Ad-Hoc WPA-None support, as it is
not supported by the linux kernel since a long time,
have never been standardized and other vendors already
removed support for it since a long time.  The security
of the protocol is also comparable to WEP, especially
when used with TKIP.

Instead, the standard-compliant WPA2/RSN protocol
is used for IBSS/Ad-Hoc mode.  Compared to WPA-None,
this protocol uses the classical Four Way Handshake
for security association and features replay protection.

IBSS RSN-PSK requires wpa_supplicant 1.0 and a recent enough
kernel (best with = 3.2, 3.0 is still fine)
wpa_supplicant only supports the CCMP cipher when
operating in Ad-Hoc mode; if another cipher is requested,
wpa_supplicant will use CCMP anyway).

IBSS RSN will only be used when mode=adhoc and key_mgmt=wpa-psk
and only if the device claims support for it via nl80211.

---
I tested most of it, but haven't tested everything,
especially the various settings plugins.

 include/NetworkManager.h   |4 +-
 libnm-glib/nm-device-wifi.c|3 +-
 libnm-util/nm-setting-wireless-security.c  |   49 +---
 libnm-util/nm-setting-wireless.c   |   13 +++---
 libnm-util/nm-utils.c  |   29 
 src/nm-wifi-ap-utils.c |   47 +++
 src/nm-wifi-ap.c   |   41 +++-
 src/settings/plugins/ifcfg-rh/reader.c |   13 ++
 src/settings/plugins/ifcfg-rh/writer.c |2 +-
 src/settings/plugins/ifnet/connection_parser.c |   48 ---
 .../plugins/ifnet/tests/wpa_supplicant.conf|   10 ++--
 src/supplicant-manager/nm-supplicant-config.c  |3 +-
 .../nm-supplicant-settings-verify.c|2 +-
 src/wifi/wifi-utils-nl80211.c  |3 ++
 14 files changed, 101 insertions(+), 166 deletions(-)

diff --git a/include/NetworkManager.h b/include/NetworkManager.h
index bb67b8f..b35c097 100644
--- a/include/NetworkManager.h
+++ b/include/NetworkManager.h
@@ -155,6 +155,7 @@ typedef enum {
  * @NM_WIFI_DEVICE_CAP_WPA: device supports WPA1 authentication
  * @NM_WIFI_DEVICE_CAP_RSN: device supports WPA2/RSN authentication
  * @NM_WIFI_DEVICE_CAP_AP: device supports Access Point mode
+ * @NM_WIFI_DEVICE_CAP_IBSS_RSN: device supports WPA2/RSN in an IBSS network.
  *
  * 802.11 specific device encryption and authentication capabilities.
  **/
@@ -166,7 +167,8 @@ typedef enum {
NM_WIFI_DEVICE_CAP_CIPHER_CCMP   = 0x0008,
NM_WIFI_DEVICE_CAP_WPA   = 0x0010,
NM_WIFI_DEVICE_CAP_RSN   = 0x0020,
-   NM_WIFI_DEVICE_CAP_AP= 0x0040
+   NM_WIFI_DEVICE_CAP_AP= 0x0040,
+   NM_WIFI_DEVICE_CAP_IBSS_RSN  = 0x0080
 } NMDeviceWifiCapabilities;
 
 
diff --git a/libnm-glib/nm-device-wifi.c b/libnm-glib/nm-device-wifi.c
index 0058fd1..3e0fac2 100644
--- a/libnm-glib/nm-device-wifi.c
+++ b/libnm-glib/nm-device-wifi.c
@@ -463,8 +463,7 @@ connection_compatible (NMDevice *device, NMConnection 
*connection, GError **erro
if (s_wsec) {
/* Connection has security, verify it against the device's 
capabilities */
key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
-   if (   !g_strcmp0 (key_mgmt, wpa-none)
-   || !g_strcmp0 (key_mgmt, wpa-psk)
+   if (   !g_strcmp0 (key_mgmt, wpa-psk)
|| !g_strcmp0 (key_mgmt, wpa-eap)) {
 
/* Is device only WEP capable? */
diff --git a/libnm-util/nm-setting-wireless-security.c 
b/libnm-util/nm-setting-wireless-security.c
index 336773c..3372394 100644
--- a/libnm-util/nm-setting-wireless-security.c
+++ b/libnm-util/nm-setting-wireless-security.c
@@ -785,8 +785,7 @@ need_secrets (NMSetting *setting)
}
 
/* WPA-PSK infrastructure and adhoc */
-   if (   (strcmp (priv-key_mgmt, wpa-none) == 0)
-   || (strcmp (priv-key_mgmt, wpa-psk) == 0)) {
+   if (strcmp (priv-key_mgmt, wpa-psk) == 0) {
if (!verify_wpa_psk (priv-psk)) {
g_ptr_array_add (secrets, 
NM_SETTING_WIRELESS_SECURITY_PSK);
return secrets;
@@ -834,7 +833,7 @@ verify (NMSetting *setting, GSList *all_settings, GError 
**error)
 {
NMSettingWirelessSecurity *self = NM_SETTING_WIRELESS_SECURITY 
(setting);
NMSettingWirelessSecurityPrivate *priv = 
NM_SETTING_WIRELESS_SECURITY_GET_PRIVATE (self);
-   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-none, 
wpa-psk, wpa-eap, NULL };
+   const char *valid_key_mgmt[] = { none, ieee8021x, wpa-psk, 
wpa-eap, NULL };
const char *valid_auth_algs[] = { open, shared, leap, NULL };
const char *valid_protos[] = { wpa, rsn, NULL };
const

Re: Wpa Supplicant

2012-02-24 Thread Jirka Klimes
On Sunday 19 of February 2012 17:58:09 Almo Nito wrote:
 Hey Guys, im Trying to get Networkmanager to work together with wpa
 supplicant.
 
 
 
 They are both started fine with the dbus option but networkmanager doesn't
 seem to interact with wpa supplicant (it neither tells that is running in
 the logs nor sees access points)
 
 
 
 What exactly do I want to look for to make sure wpa_supplicant and
 networkmanager see each other and can communicate?
 
 
 
 regards

NM normally starts wpa_supplicant and talks to it via D-Bus. If something goes
wrong, you should be able to reaveal in logs.

You see NM logs in syslog (etc. /var/log/messages on Fedora)
and wpa_supplicant logs in something like /var/log/wpa_supplicant.log

To get more detailed logging look at:
http://live.gnome.org/action/edit/NetworkManager/Debugging#wifi

Also, for increasing NM logs, you could use 
--log-level=level
--log-domains=domain1,domain2,...
options.
See 'man NetworkManager' and man Networkmanager.conf'

Jirka

___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Wpa Supplicant

2012-02-24 Thread Dan Williams
On Fri, 2012-02-24 at 12:34 +0100, Jirka Klimes wrote:
 On Sunday 19 of February 2012 17:58:09 Almo Nito wrote:
  Hey Guys, im Trying to get Networkmanager to work together with wpa
  supplicant.
  
  
  
  They are both started fine with the dbus option but networkmanager doesn't
  seem to interact with wpa supplicant (it neither tells that is running in
  the logs nor sees access points)
  
  
  
  What exactly do I want to look for to make sure wpa_supplicant and
  networkmanager see each other and can communicate?
  
  
  
  regards
 
 NM normally starts wpa_supplicant and talks to it via D-Bus. If something goes
 wrong, you should be able to reaveal in logs.

Also, if you're building your own supplicant you need to make sure the
D-Bus interface is enabled in the build config file you're using, so
that'll be something like:

CONFIG_CTRL_IFACE_DBUS=y
CONFIG_CTRL_IFACE_DBUS_NEW=y
CONFIG_CTRL_IFACE_DBUS_INTRO=y

Dan

 You see NM logs in syslog (etc. /var/log/messages on Fedora)
 and wpa_supplicant logs in something like /var/log/wpa_supplicant.log
 
 To get more detailed logging look at:
 http://live.gnome.org/action/edit/NetworkManager/Debugging#wifi
 
 Also, for increasing NM logs, you could use 
 --log-level=level
 --log-domains=domain1,domain2,...
 options.
 See 'man NetworkManager' and man Networkmanager.conf'
 
 Jirka
 
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Wpa Supplicant

2012-02-20 Thread Bin Li
On Mon, Feb 20, 2012 at 1:09 AM, Almo Nito almon...@gmx.de wrote:
 Im actually getting this error:



 NetworkManager[1295]: error [1329674643.782386]
 [nm-supplicant-interface.c:570] interface_add_cb(): (wlan0): error adding
 interface: Did not receive a reply. Possible causes include: the remote
 application did not send a reply, the message bus security policy blocked
 the reply, the reply timeout expired, or the network connection was broken.

 NetworkManager[1295]: dbus_g_proxy_cancel_call: assertion `pending != NULL'
 failed
Looks the DBus call is failed, could you view your
/var/log/wpa_supplicant? Maybe it'll be helpful.

 What do I look for?



 rehards


 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list

___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Wpa Supplicant

2012-02-19 Thread Almo Nito
Hey Guys, im Trying to get Networkmanager to work together with wpa
supplicant.

 

They are both started fine with the dbus option but networkmanager doesn't
seem to interact with wpa supplicant (it neither tells that is running in
the logs nor sees access points)

 

What exactly do I want to look for to make sure wpa_supplicant and
networkmanager see each other and can communicate?

 

regards

___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Wpa Supplicant

2012-02-19 Thread Almo Nito
Im actually getting this error:

 

NetworkManager[1295]: error [1329674643.782386]
[nm-supplicant-interface.c:570] interface_add_cb(): (wlan0): error adding
interface: Did not receive a reply. Possible causes include: the remote
application did not send a reply, the message bus security policy blocked
the reply, the reply timeout expired, or the network connection was broken.

NetworkManager[1295]: dbus_g_proxy_cancel_call: assertion `pending != NULL'
failed

 

What do I look for?

 

rehards

___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA + cloned mac doesn't work

2011-11-14 Thread Jirka Klimes
On Friday 21 of October 2011 17:01:41 Maxim Levitsky wrote:
 Hi NM folks!
 
 I haven't updated/looked at NM and rest of wifi stack for so long.
 I stopped using Gnome too in meanwhile.
 
 I noticed that recent NM versions allow to setup custom MAC per
 interface, and it does work even in KDE, however setting custom MAC on
 WPA2 enabled network connection fails.
 
 Reason is same as what I have seen many years ago, when I played a lot
 with wifi.
 
 Reason is that supplicant is not informed of new MAC and thus rejects
 WPA handshake, or even worse its told old MAC by NM (I suspect later as
 I tried restarting the supplicant and that didn't help).
 
 When I set MAC prior to starting NM, the custom MAC works.
 
 I am using wifi stack from kubuntu 11.10, but have no problem compiling
 all programs (maybe except plasma applet yet) from git.
 
 So what you know about that?
 Is there a bugzilla for this you can share a link with me?
 
 Mostly I don't really need that feature, but on basis of 'why not?' I
 won't mind sharing with the world less private information this way.

Exactly, MAC spoofing fails for WPA because wpa_supplicant doesn't update the 
MAC address.
The spoofing feature in NM was implemented according to 
https://bugzilla.redhat.com/show_bug.cgi?id=447827.
For that I also prepared a patch for wpa_supplicant that updates its MAC 
address and thus makes the spoofing work with WPA.
We sent the wpa_supplicant patch to hostap list (and Jouni). Sadly, it didn't 
get applied.
I guess we should bring the patch and the issue to Jouni again.

http://lists.shmoo.com/pipermail/hostap/2010-November/022039.html

Jirka
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


WPA + cloned mac doesn't work

2011-10-21 Thread Maxim Levitsky
Hi NM folks!

I haven't updated/looked at NM and rest of wifi stack for so long.
I stopped using Gnome too in meanwhile.

I noticed that recent NM versions allow to setup custom MAC per
interface, and it does work even in KDE, however setting custom MAC on
WPA2 enabled network connection fails.

Reason is same as what I have seen many years ago, when I played a lot
with wifi.

Reason is that supplicant is not informed of new MAC and thus rejects
WPA handshake, or even worse its told old MAC by NM (I suspect later as
I tried restarting the supplicant and that didn't help).

When I set MAC prior to starting NM, the custom MAC works.

I am using wifi stack from kubuntu 11.10, but have no problem compiling
all programs (maybe except plasma applet yet) from git.

So what you know about that?
Is there a bugzilla for this you can share a link with me?

Mostly I don't really need that feature, but on basis of 'why not?' I
won't mind sharing with the world less private information this way.


-- 
Best regards,
Maxim Levitsky

Visit my blog: http://maximlevitsky.wordpress.com
Warning: Above blog contains rants.

___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-13 Thread iain

On 09/12/2011 10:19 PM, Dan Williams wrote:

On Mon, 2011-09-12 at 19:18 +0100, iain wrote:

Hi again,

In case anyone else is wondering about this, I've found a patch from
Android for an older version of wpa-supplicant, that with a bit of
tweaking for 0.7.3 appears to fix the problem

This would appear to indicate a buggy kernel driver.  Which driver are
you using?



A closed source TI one. I wouldn't be surprised if it was buggy.

iain
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-12 Thread iain
Some further information, when wpa-supplicant carries out a scan there 
are a lot of IWEVGENIE overflow errors. What might this indicate (if 
anything)?


thanks,
iain

On 09/09/2011 04:42 PM, Lamarque Vieira Souza wrote:


Em Friday 09 September 2011, iain escreveu:

 Hi,



 I'm running NetworkManager 0.9.1 from git and wpa_supplicant 0.7.3 on a

 custom distro (based from poky). When I run nmcli dev wifi, the access

 points appear but everything seems to be screwed up.

Hi, have you patched wpa_supplicant-0.7.3 to work with NM-0.9? If not 
then this is your problem: 
https://bugzilla.gnome.org/show_bug.cgi?id=644634 . The patch is also 
there.


 SSID BSSID MODE

 FREQ RATE SIGNAL SECURITY ACTIVE

 8C03000100 02:FE:F4:50:A9:50 Infrastructure 2

 MHz 63 MB/s 75 WPA2 no

 8C06000100 00:FE:F4:50:A9:50 Infrastructure 2

 MHz 1 MB/s 75 -- no

 8C06000100 00:FE:F4:59:01:A0 Infrastructure 2

 MHz 0 MB/s 20 -- no

 8C03000100 02:FE:F4:50:A9:50 Infrastructure 2

 MHz 0 MB/s 72 -- no



 The driver appears to be working, iwlist gives all the details I expect

 and comparing the output below with the NM output shows what is wrong.



 iwlist tiwlan0 scanning

 tiwlan0 Scan completed :

 Cell 01 - Address: 12:FE:F4:50:A9:50

 ESSID:BTFON

 Protocol:IEEE 802.11 BG

 Mode:Managed

 Frequency:2.462 MHz

 Signal level=-56 dBm

 Encryption key:off

 Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s

 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s

 48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5

 Mb/s

 26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65

 Mb/s

 Extra:Bcn int = 100 ms

 IE: Unknown: 00054254464F4E

 IE: Unknown: 010882848B960C121824

 IE: Unknown: 03010B

 IE: Unknown: 2A0100

 IE: Unknown: 32043048606C

 IE: Unknown:

 2D1AAC011B0

 0

 IE: Unknown:

 3D160B08000

 0

 IE: Unknown: 4A0E14000A002C01C800140005001900

 IE: Unknown: 7F0101

 IE: Unknown:

 DD180050F2020101890003A427A442435E00623

 22F00

 IE: Unknown:

 DD1E00904C33AC011B0

 0

 IE: Unknown:

 DD1A00904C340B08000

 0

 IE: Unknown: DD0900037F0101FF7F

 Cell 02 - Address: 02:FE:F4:50:A9:50

 ESSID:BTOpenzone

 Protocol:IEEE 802.11 BG

 Mode:Managed

 Frequency:2.462 MHz

 Signal level=-56 dBm

 Encryption key:off

 Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s

 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s

 48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5

 Mb/s

 26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65

 Mb/s

 Extra:Bcn int = 100 ms

 IE: Unknown: 000A42544F70656E7A6F6E65

 IE: Unknown: 010882848B960C121824

 IE: Unknown: 03010B

 IE: Unknown: 2A0100

 IE: Unknown: 32043048606C

 IE: Unknown:

 2D1AAC011B0

 0

 IE: Unknown:

 3D160B08000

 0

 IE: Unknown: 4A0E14000A002C01C800140005001900

 IE: Unknown: 7F0101

 IE: Unknown:

 DD180050F2020101890003A427A442435E00623

 22F00

 IE: Unknown:

 DD1E00904C33AC011B0

 0

 IE: Unknown:

 DD1A00904C340B08000

 0

 IE: Unknown: DD0900037F0101FF7F

 Cell 03 - Address: 00:FE:F4:59:01:A0

 ESSID:BTHub3-JJCH

 Protocol:IEEE 802.11 BG

 Mode:Managed

 Frequency:2.437 MHz

 Signal level=-88 dBm

 Encryption key:on

 Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s

 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s

 48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5

 Mb/s

 26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65

 Mb/s

 Extra:Bcn int = 100 ms

 IE: Unknown: 000B4254487562332D4A4A4348

 IE: Unknown: 010882848B960C121824

 IE: Unknown: 030106

 IE: Unknown: 05040203

 IE: Unknown: 2A0100

 IE: IEEE 802.11i/WPA2 Version 1

 Group Cipher : TKIP

 Pairwise Ciphers (2) : CCMP TKIP

 Authentication Suites (1) : PSK

 IE: WPA Version 1

 Group Cipher : TKIP

 Pairwise Ciphers (2) : CCMP TKIP

 Authentication Suites (1) : PSK

 IE: Unknown: 32043048606C

 IE: Unknown:

 2D1AAC011B0

 0

 IE: Unknown:

 3D160608000

 0

 IE: Unknown: 4A0E14000A002C01C800140005001900

 IE: Unknown: 7F0101

 IE: Unknown:

 DD180050F2020101870003A427A442435E00623

 22F00

 IE: Unknown:

 DD1E00904C33AC011B0

 0

 IE: Unknown:

 DD1A00904C340608000

 0

 IE: Unknown:

 DD2C0050F204104A0001101044000102105700010010470

 010565AA94967C14C0EAA8FF349E6F59311103C000101

 Cell 04 - Address: 00:FE:F4:50:A9:50

 ESSID:BTHub3-3M94

 Protocol:IEEE 802.11 BG

 Mode:Managed

 Frequency:2.462 MHz

 Signal level=-55 dBm

 Encryption key:on

 Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s

 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s

 48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5

 Mb/s

 26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65

 Mb/s

 Extra:Bcn int = 100 ms

 IE

Re: NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-12 Thread Dan Williams
On Mon, 2011-09-12 at 19:18 +0100, iain wrote:
 Hi again,
 
 In case anyone else is wondering about this, I've found a patch from
 Android for an older version of wpa-supplicant, that with a bit of
 tweaking for 0.7.3 appears to fix the problem

This would appear to indicate a buggy kernel driver.  Which driver are
you using?

Dan

 http://codesearch.google.com/#dR3YEbitojA/driver_wext.cq=IWEVGENIE%
 20overflowtype=csl=1254
 
 /* To make sure correctly parse scan results which is impacted
 by wext
  * version, first check range-we_version, if it is default
 value (0),
  * update again here */
 if (drv-we_version_compiled == 0)
 wpa_driver_wext_get_range(drv);
 
 Not entirely sure why it fixes things but it seems to.
 
 iain
 
 On 09/09/2011 04:42 PM, Lamarque Vieira Souza wrote: 
  Em Friday 09 September 2011, iain escreveu:
  
   Hi,
  
   
  
   I'm running NetworkManager 0.9.1 from git and wpa_supplicant 0.7.3
  on a
  
   custom distro (based from poky). When I run nmcli dev wifi, the
  access
  
   points appear but everything seems to be screwed up.
  
   
  
  Hi, have you patched wpa_supplicant-0.7.3 to work with NM-0.9? If
  not then this is your problem:
  https://bugzilla.gnome.org/show_bug.cgi?id=644634 . The patch is
  also there.
  
   SSID BSSID MODE
  
   FREQ RATE SIGNAL SECURITY ACTIVE
  
   8C03000100 02:FE:F4:50:A9:50 Infrastructure 2
  
   MHz 63 MB/s 75 WPA2 no
  
   8C06000100 00:FE:F4:50:A9:50 Infrastructure 2
  
   MHz 1 MB/s 75 -- no
  
   8C06000100 00:FE:F4:59:01:A0 Infrastructure 2
  
   MHz 0 MB/s 20 -- no
  
   8C03000100 02:FE:F4:50:A9:50 Infrastructure 2
  
   MHz 0 MB/s 72 -- no
  
   
  
   The driver appears to be working, iwlist gives all the details I
  expect
  
   and comparing the output below with the NM output shows what is
  wrong.
  
   
  
   iwlist tiwlan0 scanning
  
   tiwlan0 Scan completed :
  
   Cell 01 - Address: 12:FE:F4:50:A9:50
  
   ESSID:BTFON
  
   Protocol:IEEE 802.11 BG
  
   Mode:Managed
  
   Frequency:2.462 MHz
  
   Signal level=-56 dBm
  
   Encryption key:off
  
   Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  
   9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  
   48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
  
   Mb/s
  
   26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
  
   Mb/s
  
   Extra:Bcn int = 100 ms
  
   IE: Unknown: 00054254464F4E
  
   IE: Unknown: 010882848B960C121824
  
   IE: Unknown: 03010B
  
   IE: Unknown: 2A0100
  
   IE: Unknown: 32043048606C
  
   IE: Unknown:
  
   2D1AAC011B0
  
   0
  
   IE: Unknown:
  
   3D160B08000
  
   0
  
   IE: Unknown: 4A0E14000A002C01C800140005001900
  
   IE: Unknown: 7F0101
  
   IE: Unknown:
  
   DD180050F2020101890003A427A442435E00623
  
   22F00
  
   IE: Unknown:
  
   DD1E00904C33AC011B0
  
   0
  
   IE: Unknown:
  
   DD1A00904C340B08000
  
   0
  
   IE: Unknown: DD0900037F0101FF7F
  
   Cell 02 - Address: 02:FE:F4:50:A9:50
  
   ESSID:BTOpenzone
  
   Protocol:IEEE 802.11 BG
  
   Mode:Managed
  
   Frequency:2.462 MHz
  
   Signal level=-56 dBm
  
   Encryption key:off
  
   Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  
   9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  
   48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
  
   Mb/s
  
   26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
  
   Mb/s
  
   Extra:Bcn int = 100 ms
  
   IE: Unknown: 000A42544F70656E7A6F6E65
  
   IE: Unknown: 010882848B960C121824
  
   IE: Unknown: 03010B
  
   IE: Unknown: 2A0100
  
   IE: Unknown: 32043048606C
  
   IE: Unknown:
  
   2D1AAC011B0
  
   0
  
   IE: Unknown:
  
   3D160B08000
  
   0
  
   IE: Unknown: 4A0E14000A002C01C800140005001900
  
   IE: Unknown: 7F0101
  
   IE: Unknown:
  
   DD180050F2020101890003A427A442435E00623
  
   22F00
  
   IE: Unknown:
  
   DD1E00904C33AC011B0
  
   0
  
   IE: Unknown:
  
   DD1A00904C340B08000
  
   0
  
   IE: Unknown: DD0900037F0101FF7F
  
   Cell 03 - Address: 00:FE:F4:59:01:A0
  
   ESSID:BTHub3-JJCH
  
   Protocol:IEEE 802.11 BG
  
   Mode:Managed
  
   Frequency:2.437 MHz
  
   Signal level=-88 dBm
  
   Encryption key:on
  
   Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  
   9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  
   48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
  
   Mb/s
  
   26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
  
   Mb/s
  
   Extra:Bcn int = 100 ms
  
   IE: Unknown: 000B4254487562332D4A4A4348
  
   IE: Unknown: 010882848B960C121824
  
   IE: Unknown: 030106
  
   IE: Unknown: 05040203
  
   IE: Unknown: 2A0100
  
   IE: IEEE 802.11i/WPA2 Version 1
  
   Group Cipher : TKIP
  
   Pairwise Ciphers (2) : CCMP TKIP
  
   Authentication

NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-12 Thread iain
 (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: Unknown: 32043048606C
IE: Unknown: 
2D1AAC011B0

0
IE: Unknown: 
3D160608000

0
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F0101
IE: Unknown: 
DD180050F2020101870003A427A442435E00623

22F00
IE: Unknown: 
DD1E00904C33AC011B0

0
IE: Unknown: 
DD1A00904C340608000

0
IE: Unknown: 
DD2C0050F204104A0001101044000102105700010010470

010565AA94967C14C0EAA8FF349E6F59311103C000101
  Cell 04 - Address: 00:FE:F4:50:A9:50
ESSID:BTHub3-3M94
Protocol:IEEE 802.11 BG
Mode:Managed
Frequency:2.462 MHz
Signal level=-55 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5 
Mb/s
  26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65 
Mb/s

Extra:Bcn int = 100 ms
IE: Unknown: 000B4254487562332D334D3934
IE: Unknown: 010882848B960C121824
IE: Unknown: 03010B
IE: Unknown: 05040203
IE: Unknown: 2A0100
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: Unknown: 32043048606C
IE: Unknown: 
2D1AAC011B0

0
IE: Unknown: 
3D160B08000

0
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F0101
IE: Unknown: 
DD180050F2020101890003A427A442435E00623

22F00
IE: Unknown: 
DD1E00904C33AC011B0

0
IE: Unknown: 
DD1A00904C340B08000

0
IE: Unknown: 
DD2C0050F204104A0001101044000102105700010010470

010565AA94967C14C0EAA8FF349E6F59311103C000101

Does anyone have any ideas on how to debug this further? I've added some 
debugging to wpa_supplicant to print out the SSIDs that it knows about 
as they appear in the scans and it appears that its getting them wrong 
as well, either they just contain garbage or they are empty, but as for 
what to look further at, I'm somewhat at a loss.


iain
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-09 Thread iain


Hi,

I'm running NetworkManager 0.9.1 from git and wpa_supplicant 0.7.3 on a
custom distro (based from poky). When I run nmcli dev wifi, the access
points appear but everything seems to be screwed up.

SSID  BSSID   MODE
FREQ RATE   SIGNAL   SECURITY   ACTIVE
8C0300010002:FE:F4:50:A9:50   Infrastructure   2
MHz63 MB/s75   WPA2   no
8C0600010000:FE:F4:50:A9:50   Infrastructure   2
MHz  1 MB/s 75   -- no
8C0600010000:FE:F4:59:01:A0   Infrastructure   2
MHz  0 MB/s 20   -- no
8C0300010002:FE:F4:50:A9:50   Infrastructure   2
MHz  0 MB/s 72   -- no

The driver appears to be working, iwlist gives all the details I expect
and comparing the output below with the NM output shows what is wrong.

iwlist tiwlan0 scanning
tiwlan0   Scan completed :
  Cell 01 - Address: 12:FE:F4:50:A9:50
ESSID:BTFON
Protocol:IEEE 802.11 BG
Mode:Managed
Frequency:2.462 MHz
Signal level=-56 dBm
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
Mb/s
  26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
Mb/s
Extra:Bcn int = 100 ms
IE: Unknown: 00054254464F4E
IE: Unknown: 010882848B960C121824
IE: Unknown: 03010B
IE: Unknown: 2A0100
IE: Unknown: 32043048606C
IE: Unknown:
2D1AAC011B0
0
IE: Unknown:
3D160B08000
0
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F0101
IE: Unknown:
DD180050F2020101890003A427A442435E00623
22F00
IE: Unknown:
DD1E00904C33AC011B0
0
IE: Unknown:
DD1A00904C340B08000
0
IE: Unknown: DD0900037F0101FF7F
  Cell 02 - Address: 02:FE:F4:50:A9:50
ESSID:BTOpenzone
Protocol:IEEE 802.11 BG
Mode:Managed
Frequency:2.462 MHz
Signal level=-56 dBm
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
Mb/s
  26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
Mb/s
Extra:Bcn int = 100 ms
IE: Unknown: 000A42544F70656E7A6F6E65
IE: Unknown: 010882848B960C121824
IE: Unknown: 03010B
IE: Unknown: 2A0100
IE: Unknown: 32043048606C
IE: Unknown:
2D1AAC011B0
0
IE: Unknown:
3D160B08000
0
IE: Unknown: 4A0E14000A002C01C800140005001900
IE: Unknown: 7F0101
IE: Unknown:
DD180050F2020101890003A427A442435E00623
22F00
IE: Unknown:
DD1E00904C33AC011B0
0
IE: Unknown:
DD1A00904C340B08000
0
IE: Unknown: DD0900037F0101FF7F
  Cell 03 - Address: 00:FE:F4:59:01:A0
ESSID:BTHub3-JJCH
Protocol:IEEE 802.11 BG
Mode:Managed
Frequency:2.437 MHz
Signal level=-88 dBm
Encryption key:on
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
  9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
  48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
Mb/s
  26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
Mb/s
Extra:Bcn int = 100 ms
IE: Unknown: 000B4254487562332D4A4A4348
IE: Unknown: 010882848B960C121824
IE: Unknown: 030106
IE: Unknown: 05040203
IE: Unknown: 2A0100
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1

Re: NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-09 Thread Lamarque Vieira Souza
: Unknown: 010882848B960C121824
  IE: Unknown: 030106
  IE: Unknown: 05040203
  IE: Unknown: 2A0100
  IE: IEEE 802.11i/WPA2 Version 1
  Group Cipher : TKIP
  Pairwise Ciphers (2) : CCMP TKIP
  Authentication Suites (1) : PSK
  IE: WPA Version 1
  Group Cipher : TKIP
  Pairwise Ciphers (2) : CCMP TKIP
  Authentication Suites (1) : PSK
  IE: Unknown: 32043048606C
  IE: Unknown:
 2D1AAC011B0
 0
  IE: Unknown:
 3D160608000
 0
  IE: Unknown: 4A0E14000A002C01C800140005001900
  IE: Unknown: 7F0101
  IE: Unknown:
 DD180050F2020101870003A427A442435E00623
 22F00
  IE: Unknown:
 DD1E00904C33AC011B0
 0
  IE: Unknown:
 DD1A00904C340608000
 0
  IE: Unknown:
 DD2C0050F204104A0001101044000102105700010010470
 010565AA94967C14C0EAA8FF349E6F59311103C000101
Cell 04 - Address: 00:FE:F4:50:A9:50
  ESSID:BTHub3-3M94
  Protocol:IEEE 802.11 BG
  Mode:Managed
  Frequency:2.462 MHz
  Signal level=-55 dBm
  Encryption key:on
  Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s; 6.5 Mb/s; 13 Mb/s; 19.5
 Mb/s
26 Mb/s; 39 Mb/s; 52 Mb/s; 58.5 Mb/s; 65
 Mb/s
  Extra:Bcn int = 100 ms
  IE: Unknown: 000B4254487562332D334D3934
  IE: Unknown: 010882848B960C121824
  IE: Unknown: 03010B
  IE: Unknown: 05040203
  IE: Unknown: 2A0100
  IE: IEEE 802.11i/WPA2 Version 1
  Group Cipher : TKIP
  Pairwise Ciphers (2) : CCMP TKIP
  Authentication Suites (1) : PSK
  IE: WPA Version 1
  Group Cipher : TKIP
  Pairwise Ciphers (2) : CCMP TKIP
  Authentication Suites (1) : PSK
  IE: Unknown: 32043048606C
  IE: Unknown:
 2D1AAC011B0
 0
  IE: Unknown:
 3D160B08000
 0
  IE: Unknown: 4A0E14000A002C01C800140005001900
  IE: Unknown: 7F0101
  IE: Unknown:
 DD180050F2020101890003A427A442435E00623
 22F00
  IE: Unknown:
 DD1E00904C33AC011B0
 0
  IE: Unknown:
 DD1A00904C340B08000
 0
  IE: Unknown:
 DD2C0050F204104A0001101044000102105700010010470
 010565AA94967C14C0EAA8FF349E6F59311103C000101
 
 Does anyone have any ideas on how to debug this further? I've added some
 debugging to wpa_supplicant to print out the SSIDs that it knows about
 as they appear in the scans and it appears that its getting them wrong
 as well, either they just contain garbage or they are empty, but as for
 what to look further at, I'm somewhat at a loss.
 
 iain
 
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list


-- 
Lamarque V. Souza
http://www.geographicguide.com/brazil.htm
Linux User #57137 - http://counter.li.org/
http://planetkde.org/pt-br
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM 0.9.1 failing to get SSIDs with WPA supplicant 0.7.3

2011-09-09 Thread iain

On 09/09/2011 04:42 PM, Lamarque Vieira Souza wrote:


Em Friday 09 September 2011, iain escreveu:

 Hi,



 I'm running NetworkManager 0.9.1 from git and wpa_supplicant 0.7.3 on a

 custom distro (based from poky). When I run nmcli dev wifi, the access

 points appear but everything seems to be screwed up.

Hi, have you patched wpa_supplicant-0.7.3 to work with NM-0.9? If not 
then this is your problem: 
https://bugzilla.gnome.org/show_bug.cgi?id=644634 . The patch is also 
there.





Yes, that patch has been applied.

thanks,
iain
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM keeps asking for WPA-PSK password.

2011-05-09 Thread Dan Williams
On Fri, 2011-05-06 at 20:30 +0200, Antoni Mont wrote:
 New on that list, sorry if that question was already discussed.
 
 Problem arises at setting up a netbook Samsung NF310 (network controller 
 BCM 4313 802.11b/g/n) with Ubuntu 11.04 (Natty).
 
 NM detects my access point (and many others of the neighbourhood) but 
 ask time and again for password, without establishing connection.

That usually means that either the password you gave is invalid, or that
the driver was for some reason unable to connect to the access point.
NM treats inability to connect to the AP as wrong password because in
many cases we simply don't know if the failure was password-related or
not.

And the kernel logs say:

May  6 14:03:52 sm1 wpa_supplicant[530]: WPA: 4-Way Handshake failed - 
pre-shared key may be incorrect

which indicate that is the case.  How many characters long is the PSK,
and what characters does it contain?  According to the standards, the
PSK must be 8 - 63 characters long, and can contain only ASCII
characters (ie, no special characters like Ü or whatever).  If your
passprhase does contain those (some APs are buggy and allow it) then you
may need to use a hexadecimal PSK (64 hex characters) that the AP shows
in it's management interface.

(the problem is that the exact conversion from PSK to hex depends on the
language encoding (iso8859-1, iso8859-15, utf8, etc) that your browser
has set when you enter the PSK if you're allowed to type in non-ascii
characters by the AP's management web page.  After the fact we have no
idea what encoding was used when the PSK was entered, thus we have no
way of knowing how to hash the PSK to hex key if non-ascii characters
were actually used)

Dan

 Have tried with Wicd, with similar results: bad passowrd (so, 
 probably, not directly related with NM)
 
 Also tried substituting STA driver by b43-fwcutter + firmware: no way.
 
 At command line I get:
 
 montserrat@sm1:~$ iwconfig wlan0
 wlan0 IEEE 802.11bgn  ESSID:FTE-5C8A
Mode:Managed  Frequency:2.412 GHz  Access Point: 
 94:FE:F4:F9:63:18
Bit Rate=1 Mb/s   Tx-Power=19 dBm
Retry  long limit:7   RTS thr:off   Fragment thr:off
Power Management:off
Link Quality=70/70  Signal level=-17 dBm
Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
Tx excessive retries:0  Invalid misc:0   Missed beacon:0
 
 As for the file /var/log/syslog, I copy some lines that seems to me 
 significant:
 
 May  6 14:03:43 sm1 NetworkManager[463]: info (wlan0): supplicant 
 connection state:  disconnected - scanning
 May  6 14:03:44 sm1 wpa_supplicant[530]: Trying to associate with 
 94:fe:f4:f9:63:18 (SSID='FTE-5C8A' freq=2412 MHz)
 May  6 14:03:44 sm1 kernel: [ 1579.722485] wlan0: authenticate with 
 94:fe:f4:f9:63:18 (try 1)
 May  6 14:03:44 sm1 kernel: [ 1579.724784] wlan0: authenticated
 May  6 14:03:44 sm1 kernel: [ 1579.724907] wlan0: associate with 
 94:fe:f4:f9:63:18 (try 1)
 May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
 connection state:  scanning - associating
 May  6 14:03:44 sm1 kernel: [ 1579.729567] wlan0: RX AssocResp from 
 94:fe:f4:f9:63:18 (capab=0x411 status=0 aid=3)
 May  6 14:03:44 sm1 kernel: [ 1579.729579] wlan0: associated
 May  6 14:03:44 sm1 kernel: [ 1579.731487] Associated:True
 May  6 14:03:44 sm1 wpa_supplicant[530]: Associated with 94:fe:f4:f9:63:18
 May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
 connection state:  associating - associated
 May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
 connection state:  associated - 4-way handshake
 May  6 14:03:52 sm1 kernel: [ 1587.793433] wlan0: deauthenticated from 
 94:fe:f4:f9:63:18 (Reason: 15)
 May  6 14:03:52 sm1 kernel: [ 1587.794312] Associated:False
 May  6 14:03:52 sm1 wpa_supplicant[530]: WPA: 4-Way Handshake failed - 
 pre-shared key may be incorrect
 May  6 14:03:52 sm1 wpa_supplicant[530]: CTRL-EVENT-DISCONNECTED 
 bssid=94:fe:f4:f9:63:18 reason=0
 May  6 14:03:52 sm1 kernel: [ 1587.798570] cfg80211: All devices are 
 disconnected, going to restore regulatory settings
 May  6 14:03:52 sm1 kernel: [ 1587.798591] cfg80211: Restoring 
 regulatory settings
 May  6 14:03:52 sm1 kernel: [ 1587.798608] cfg80211: Calling CRDA to 
 update world regulatory domain
 May  6 14:03:52 sm1 NetworkManager[463]: info (wlan0): supplicant 
 connection state:  4-way handshake - disconnected
 
 Thanks in advance for any help
 Toni
 
 
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


NM keeps asking for WPA-PSK password.

2011-05-06 Thread Antoni Mont

New on that list, sorry if that question was already discussed.

Problem arises at setting up a netbook Samsung NF310 (network controller 
BCM 4313 802.11b/g/n) with Ubuntu 11.04 (Natty).


NM detects my access point (and many others of the neighbourhood) but 
ask time and again for password, without establishing connection.


Have tried with Wicd, with similar results: bad passowrd (so, 
probably, not directly related with NM)


Also tried substituting STA driver by b43-fwcutter + firmware: no way.

At command line I get:

montserrat@sm1:~$ iwconfig wlan0
wlan0 IEEE 802.11bgn  ESSID:FTE-5C8A
  Mode:Managed  Frequency:2.412 GHz  Access Point: 
94:FE:F4:F9:63:18

  Bit Rate=1 Mb/s   Tx-Power=19 dBm
  Retry  long limit:7   RTS thr:off   Fragment thr:off
  Power Management:off
  Link Quality=70/70  Signal level=-17 dBm
  Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
  Tx excessive retries:0  Invalid misc:0   Missed beacon:0

As for the file /var/log/syslog, I copy some lines that seems to me 
significant:


May  6 14:03:43 sm1 NetworkManager[463]: info (wlan0): supplicant 
connection state:  disconnected - scanning
May  6 14:03:44 sm1 wpa_supplicant[530]: Trying to associate with 
94:fe:f4:f9:63:18 (SSID='FTE-5C8A' freq=2412 MHz)
May  6 14:03:44 sm1 kernel: [ 1579.722485] wlan0: authenticate with 
94:fe:f4:f9:63:18 (try 1)

May  6 14:03:44 sm1 kernel: [ 1579.724784] wlan0: authenticated
May  6 14:03:44 sm1 kernel: [ 1579.724907] wlan0: associate with 
94:fe:f4:f9:63:18 (try 1)
May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
connection state:  scanning - associating
May  6 14:03:44 sm1 kernel: [ 1579.729567] wlan0: RX AssocResp from 
94:fe:f4:f9:63:18 (capab=0x411 status=0 aid=3)

May  6 14:03:44 sm1 kernel: [ 1579.729579] wlan0: associated
May  6 14:03:44 sm1 kernel: [ 1579.731487] Associated:  True
May  6 14:03:44 sm1 wpa_supplicant[530]: Associated with 94:fe:f4:f9:63:18
May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
connection state:  associating - associated
May  6 14:03:44 sm1 NetworkManager[463]: info (wlan0): supplicant 
connection state:  associated - 4-way handshake
May  6 14:03:52 sm1 kernel: [ 1587.793433] wlan0: deauthenticated from 
94:fe:f4:f9:63:18 (Reason: 15)

May  6 14:03:52 sm1 kernel: [ 1587.794312] Associated:  False
May  6 14:03:52 sm1 wpa_supplicant[530]: WPA: 4-Way Handshake failed - 
pre-shared key may be incorrect
May  6 14:03:52 sm1 wpa_supplicant[530]: CTRL-EVENT-DISCONNECTED 
bssid=94:fe:f4:f9:63:18 reason=0
May  6 14:03:52 sm1 kernel: [ 1587.798570] cfg80211: All devices are 
disconnected, going to restore regulatory settings
May  6 14:03:52 sm1 kernel: [ 1587.798591] cfg80211: Restoring 
regulatory settings
May  6 14:03:52 sm1 kernel: [ 1587.798608] cfg80211: Calling CRDA to 
update world regulatory domain
May  6 14:03:52 sm1 NetworkManager[463]: info (wlan0): supplicant 
connection state:  4-way handshake - disconnected


Thanks in advance for any help
Toni


___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


WPA Enterprise doesn't like PEM certs

2010-11-02 Thread Chuck Anderson
We've received many reports that NetworkManager in Ubuntu 10.04 and 
Fedora 13 (0.8.1) doesn't like PEM-formatted cert files when 
configuring new wireless networks for WPA Enterprise, whereas earlier 
versions work fine.  Also, 0.8.1 works for existing wireless network 
configurations that were created with older NM versions using PEM 
files.  Using .p12 (.pfx) formatted files seems to work.  Did 
something change in this area of either nm-applet or NetworkManger 
that might explain this?  I can provide further troubleshooting 
details if needed.

Thanks.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA_SUPPLICANT (Fedora 13) - NetworkManager can not connect WPA-PSK -TKIP on IBM T30

2010-08-04 Thread Dan Williams
On Fri, 2010-07-30 at 10:00 -0400, RumseyCW wrote:
 Mr. Williams et al,
  
 NetworkManager on Fedora 13 (IBM T30) installation can not connect to
 a 3CRWE554G72TU wireless router using  WPA-PSK -TKIP. The laptop has
 the latest updates and all the NetworkManager packages installed
 including GNOME GUI.
 
 When I use NetworkManager it will accept the WPA  WPA2 proto and the
 Key,  applies and closes however when the network is selected a dialog
 requesting a WEP 40/128 Bit key pops up every time.  A Connection can
 not be made. 
 
 The messages I see are the WAP_SUPPLICANT can not initialize the AP.
 Also I see hostap driver is not supported although it is reported by
 man page as a supported driver. I believe that this driver is needed
 for T30 wireless and WPA-PSK.
 
 Can you or someone assist  me in installing or making appropriate
 changes to my T30 installation?  I have tried the IRC #fedora route
 and no one knows much about this problem. Is the T30 too ancient?  It
 has been a faithful consulting tool. It needs to move to a working
 mobile LINUX platform for both wireless 802.11x  and a 3G Modem.
 (PANTECH UM175 1xEVDO REV A)

Do you mean that the wifi card in your machine is an Orinoco or PRISM
2/3 card?  If so, then yes, there are problems with wpa_supplicant's
interaction with the orinoco driver that's probably driving your card,
but that's a problem with the orinoco driver and wpa_supplicant, not
NetworkManager itself.

Also if you are using the orinoco driver, make sure you have the
TKIP-capable firmware.  The fact that you're getting a dialog about WEP
may mean the card isn't seeing the AP as WPA-capable.

If on the other hand you're using the hostap driver (since orinoco and
hostap can both drive some of the same hardware) there's likely a
different set of driver issues.  I'd suggest taking this up on the
wpa_supplicant mailing list which you can find at www.w1.fi.

Dan



___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


WPA_SUPPLICANT (Fedora 13) - NetworkManager can not connect WPA-PSK -TKIP on IBM T30

2010-08-04 Thread RumseyCW
Mr. Williams et al,

NetworkManager on Fedora 13 (IBM T30) installation can not connect to a 
3CRWE554G72TU wireless router using  WPA-PSK -TKIP. The laptop has the latest 
updates and all the NetworkManager packages installed including GNOME GUI.

When I use NetworkManager it will accept the WPA  WPA2 proto and the Key,  
applies and closes however when the network is selected a dialog requesting a 
WEP 40/128 Bit key pops up every time.  A Connection can not be made. 

The messages I see are the WAP_SUPPLICANT can not initialize the AP.  Also I 
see hostap driver is not supported although it is reported by man page as a 
supported driver. I believe that this driver is needed for T30 wireless and 
WPA-PSK.

Can you or someone assist  me in installing or making appropriate changes to my 
T30 installation?  I have tried the IRC #fedora route and no one knows much 
about this problem. Is the T30 too ancient?  It has been a faithful consulting 
tool. It needs to move to a working mobile LINUX platform for both wireless 
802.11x  and a 3G Modem.  (PANTECH UM175 1xEVDO REV A)

Colin Rumsey
810-327-1553
rumse...@aol.com



___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: can't enter wpa password

2010-07-14 Thread Dan Williams
On Thu, 2010-07-01 at 12:54 -0400, carpetnailz wrote:
 I'm using my Linux box (OpenSuse 11.2) with a Sprint MiFi box. In the
 past it has worked fine but yesterday afternoon for some reason is cut
 me off and I haven't been able to get back on. All the other boxes
 work (using that other OS from Washington).
  
 When I try to log on it will only give me the option to enter a WEP
 code, not a WPA. With some jiggling--turning radio off and on,
 disabling wireless and reenabling it, deleting the connection and
 trying to recreate it, even rebooting, I sometimes will get a dialog
 box that calls for the WPA password. But then the Apply button is
 greyed out, so NetworkManager seems to be refusing to do anything with
 my WPA password even when it offers to let me enter it.

That seems to indicate that the driver thinks the device is a WEP AP.
When this happens, get the output of:

nm-tool
iwlist wlan0 scan(assuming your wifi card is wlan0)

and we can figure out whether NM is the problem, or whether the drivers
are the problem.

Dan

 Help!  I need to be able to work.
  
 Thanks.
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: can't enter wpa password

2010-07-04 Thread Bin Li
On Sat, Jul 3, 2010 at 12:42 AM, Eric Beversluis
ebe...@researchintegration.org wrote:
 On Fri, 2010-07-02 at 14:42 +0800, Bin Li wrote:
 On Fri, Jul 2, 2010 at 12:54 AM, carpetnailz
 carpetna...@researchintegration.org wrote:
  I'm using my Linux box (OpenSuse 11.2) with a Sprint MiFi box. In the past
  it has worked fine but yesterday afternoon for some reason is cut me off 
  and
  I haven't been able to get back on. All the other boxes work (using that
  other OS from Washington).
 
  When I try to log on it will only give me the option to enter a WEP code,
  not a WPA. With some jiggling--turning radio off and on, disabling wireless
  and reenabling it, deleting the connection and trying to recreate it, even
  rebooting, I sometimes will get a dialog box that calls for the WPA
  password. But then the Apply button is greyed out, so NetworkManager 
  seems
  to be refusing to do anything with my WPA password even when it offers to
  let me enter it.
 So how about delete the connection in 'wireless' tab of 'Network
 Connections' Dialog, then try to connect the wireless again.

 Tried that. One of the situations in which I seemed to be offered
 opportunity to enter WPA passcode but the Apply button was greyed out.
Make sure, you've select correct Security mode, 'WPA Personal' or 'WPA
Enterprise',
then make sure the correct password, I tried 'WPA Personal' in my
laptop, when input more than
8 characters, the 'Apply' button was enabled.

 
  networkmanager-list mailing list
  networkmanager-list@gnome.org
  http://mail.gnome.org/mailman/listinfo/networkmanager-list
 
 
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list



___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: can't enter wpa password

2010-07-02 Thread Bin Li
On Fri, Jul 2, 2010 at 12:54 AM, carpetnailz
carpetna...@researchintegration.org wrote:
 I'm using my Linux box (OpenSuse 11.2) with a Sprint MiFi box. In the past
 it has worked fine but yesterday afternoon for some reason is cut me off and
 I haven't been able to get back on. All the other boxes work (using that
 other OS from Washington).

 When I try to log on it will only give me the option to enter a WEP code,
 not a WPA. With some jiggling--turning radio off and on, disabling wireless
 and reenabling it, deleting the connection and trying to recreate it, even
 rebooting, I sometimes will get a dialog box that calls for the WPA
 password. But then the Apply button is greyed out, so NetworkManager seems
 to be refusing to do anything with my WPA password even when it offers to
 let me enter it.
So how about delete the connection in 'wireless' tab of 'Network
Connections' Dialog, then try to connect the wireless again.

 Help!  I need to be able to work.

 Thanks.
 ___
 networkmanager-list mailing list
 networkmanager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list


___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


can't enter wpa password

2010-07-01 Thread carpetnailz
I'm using my Linux box (OpenSuse 11.2) with a Sprint MiFi box. In the past it 
has worked fine but yesterday afternoon for some reason is cut me off and I 
haven't been able to get back on. All the other boxes work (using that other OS 
from Washington).

When I try to log on it will only give me the option to enter a WEP code, not a 
WPA. With some jiggling--turning radio off and on, disabling wireless and 
reenabling it, deleting the connection and trying to recreate it, even 
rebooting, I sometimes will get a dialog box that calls for the WPA password. 
But then the Apply button is greyed out, so NetworkManager seems to be 
refusing to do anything with my WPA password even when it offers to let me 
enter it.

Help!  I need to be able to work.

Thanks.___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


NetworkMananger failing to connect to WPA/WPA2 networks with rnd_wlan

2010-04-17 Thread Alex Buell
Hi folks,

I have a very old iMac G3 which I have equipped with a Linksys WUSB54GS
v2.1 USB wireless adapter. This iMac runs 2.6.32 with rndis_wlan module
for the USB wireless adapter. 

Working with just wpa_supplicant and wpa_supplicant.conf, I can always
get a successful connection to my wireless router (again, a DD-WRT
equipped Linksys WRT54GS v5.2 router). 

When I use NetworkManager and specify WPA/WPA2 and supply the
passphrase, I simply cannot get a successful connection at all. 

Here's the versions I'm using on the iMac G3:

NetworkManager 0.8
nm-applet 0.8
wpa_supplicant 0.6.9

As far as I can determine using only CCMP results in failed connections
to the wireless net, but using both TKIP CCMP (same order) results in
successful connections via wpa_supplicant. 

Any ideas that I can try?
-- 
http://www.munted.org.uk

One very high maintenance cat living here.
___
networkmanager-list mailing list
networkmanager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


realtek 8172 does not work with networkmanager and wpa on ubuntu 9.10

2010-02-12 Thread vincent guffens
Dear list,

I have recently bought a thinkpad edge 64 bits with a realtek 8192.

lspci reports
Network controller: Realtek Semiconductor Co., Ltd. Device 8172 (rev 10)

I have installed ubuntu 9.10 amd64 but Linux does not come with the
driver for this card. The driver is available from

http://www.realtek.com.tw/downloads/downloadsView.aspx?Langid=1PNid=21PFid=48Level=5Conn=4ProdID=226DownTypeID=3GetDown=falseDownloads=true#2281

The driver compiles without problem but I can not connect to my access
point when network manager is running. If I disable it, I can manually
connect to the access point using the  following wpa.conf


network={
ssid=doubidou-net
proto=WPA WPA2
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
psk= my_secret
priority=2
 }

The following command is used to run wpa_supplicant

wpa_supplicant -D wext -c wpa.conf -i $interface

I have followed the instructions in http://darrenalbers.com/networkmanager/

 sudo ./nm-supplicant-test wlan0 path_to/wpa.conf  nm-supplicant-test.txt

The output is attached to this mail. The command ends with the error

ioctl[SIOCSIWMLME]: Link has been severed

Could you tell me if I can use this card with network manager?

thanks,
Key: ssid, Value: doubidou-net
Key: proto, Value: WPA WPA2
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP
Key: psk, Value: my_secret
Key: priority, Value: 2
SUP: sending command 'INTERFACE_ADD wlan0   wext
/var/run/wpa_supplicant '
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 2'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid doubidou-net'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA WPA2'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk my_secret'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 priority 2'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(6330): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(6330): RX global ctrl_iface - hexdump_ascii(len=50):
wpa_supplicant(6330):  49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 77 6c   
INTERFACE_ADD wl
wpa_supplicant(6330):  61 6e 30 09 09 77 65 78 74 09 2f 76 61 72 2f 72   
an0__wext_/var/r
wpa_supplicant(6330):  75 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e   
un/wpa_supplican
wpa_supplicant(6330):  74 09 t_ 
 
wpa_supplicant(6330): CTRL_IFACE GLOBAL INTERFACE_ADD 'wlan0wext
/var/run/wpa_supplicant '
wpa_supplicant(6330): Initializing interface 'wlan0' conf 'N/A' driver 'wext' 
ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(6330): Interface wlan0 set UP - waiting a second for the driver 
to complete initialization
wpa_supplicant(6330): SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
wpa_supplicant(6330):   capabilities: key_mgmt 0xf enc 0xf flags 0x0
wpa_supplicant(6330): WEXT: Operstate: linkmode=1, operstate=5
wpa_supplicant(6330): Own MAC address: 70:1a:04:8e:23:86
wpa_supplicant(6330): wpa_driver_wext_set_wpa
wpa_supplicant(6330): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 
seq_len=0 key_len=0
wpa_supplicant(6330): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 
seq_len=0 key_len=0
wpa_supplicant(6330): y: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(6330): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 
seq_len=0 key_len=0
wpa_supplicant(6330): wpa_driver_wext_set_countermeasures
wpa_supplicant(6330): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(6330): RSN: flushing PMKID list in the driver
wpa_supplicant(6330): Setting scan request: 0 sec 10 usec
wpa_supplicant(6330): WPS: UUID based on MAC address - hexdump(len=16): 5e ab 
3f 6b b7 44 5a cf 9f da cc 81 eb 14 52 31
wpa_supplicant(6330): WPS: Build Beacon and Probe Response IEs
wpa_supplicant(6330): WPS:  * Version
wpa_supplicant(6330): WPS:  * Wi-Fi Protected Setup State (0)
wpa_supplicant(6330): WPS:  * Version
wpa_supplicant(6330): WPS:  * Wi-Fi Protected Setup State (0)
wpa_supplicant(6330): WPS:  * Response Type (2)
wpa_supplicant(6330): WPS:  * UUID-E
wpa_supplicant(6330): WPS:  * Manufacturer
wpa_supplicant(6330): WPS:  * Model Name
wpa_supplicant(6330): WPS:  * Model Number
wpa_supplicant(6330): WPS:  * Serial Number
wpa_supplicant(6330): WPS:  * Primary Device Type
wpa_supplicant(6330): WPS:  * Device Name
wpa_supplicant(6330): WPS:  * Config Methods (0)
wpa_supplicant(6330): WPS:  * RF

Re: realtek 8172 does not work with networkmanager and wpa on ubuntu 9.10

2010-02-12 Thread Larry Finger
On 02/11/2010 04:02 PM, vincent guffens wrote:
 Dear list,
 
 I have recently bought a thinkpad edge 64 bits with a realtek 8192.
 
 lspci reports
 Network controller: Realtek Semiconductor Co., Ltd. Device 8172 (rev 10)
 
 I have installed ubuntu 9.10 amd64 but Linux does not come with the
 driver for this card. The driver is available from
 
 http://www.realtek.com.tw/downloads/downloadsView.aspx?Langid=1PNid=21PFid=48Level=5Conn=4ProdID=226DownTypeID=3GetDown=falseDownloads=true#2281
 
 The driver compiles without problem but I can not connect to my access
 point when network manager is running. If I disable it, I can manually
 connect to the access point using the  following wpa.conf

The Realtek vendor drivers can be a major problem. From what I see in your
wpa_supplicant log, it never got any scan data, which is why NM also failed.
What do you see when you run (as root)

iwlist scan

You should also post the dmesg output that pertains to this device.

Larry

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: realtek 8172 does not work with networkmanager and wpa on ubuntu 9.10

2010-02-12 Thread Dan Williams
On Fri, 2010-02-12 at 14:47 -0600, Larry Finger wrote:
 On 02/11/2010 04:02 PM, vincent guffens wrote:
  Dear list,
  
  I have recently bought a thinkpad edge 64 bits with a realtek 8192.
  
  lspci reports
  Network controller: Realtek Semiconductor Co., Ltd. Device 8172 (rev 10)
  
  I have installed ubuntu 9.10 amd64 but Linux does not come with the
  driver for this card. The driver is available from
  
  http://www.realtek.com.tw/downloads/downloadsView.aspx?Langid=1PNid=21PFid=48Level=5Conn=4ProdID=226DownTypeID=3GetDown=falseDownloads=true#2281
  
  The driver compiles without problem but I can not connect to my access
  point when network manager is running. If I disable it, I can manually
  connect to the access point using the  following wpa.conf
 
 The Realtek vendor drivers can be a major problem. From what I see in your
 wpa_supplicant log, it never got any scan data, which is why NM also failed.

Also the supplicant test used AP_SCAN=2 though, which could affect this.
The nm-supplicant-test is pretty old and probably shouldn't really be
used anymore.

But Vincent, can you get some supplicant debug logs when running NM, as
described here?

http://live.gnome.org/NetworkManager/Debugging

under the Debugging WiFi Connections section.  Specifically, we're
looking for /var/log/wpa_supplicant.log when you see failures using
NetworkManager.

Note though that this driver is not part of the upstream kernel, and its
quality is highly suspect.  Just because it works manually with
wpa_supplicant doesn't always mean the driver is OK.

Dan

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-20 Thread Gonsolo



What type of wifi card?  It may be that driver issues prevent the wifi
card from completing the WPA Ad-Hoc network.  WPA Ad-Hoc is more complex
than WEP ad-hoc and there have been kernel driver issues with that
configuration in the past.  What kernel version are you using, what wifi
hardware, and what wifi driver?
   


Ubuntu Karmic, 2.6.31, Netgear WG511T, ath5k.

g

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-19 Thread Dan Williams
On Sun, 2010-01-17 at 18:58 +0200, Quintin Beukes wrote:
 The type of encryption shouldn't make a difference to sharing ability.
 It's 2 completely differently networking layers.

Actually it does; you can't connect to a WPA2-only Ad-Hoc network with
the current wpa_supplicant and Linux kernel drivers.  So that means NM
can't use those networks.  But they are quite rare.

Dan

 Though, how are you sharing it? Are you building custom firewall
 rules, or using some automated sharing via a configuration option?
 
 Quintin Beukes
 
 
 
 On Sun, Jan 17, 2010 at 6:37 PM, Gonsolo gons...@gmail.com wrote:
  Hi!
 
  I wanted to inform you that I was able to share my connection with WEP64 but
  not WPA/WPA2.
 
  I am connecting my Ipod Touch 2nd generation to my notebook (ath5k based
  WLAN card, Ubuntu Karmic) which is connected to the internet via UMTS
  (Huawei E220, option kernel module).
  It works with WEP64 encryption but not with WPA/WPA2 encryption.
 
  Is that problem known?
  I would be happy to provide more information (lsmod, log messages, etc).
  Should I file a bug?
  If so, where (Launchpad, Gnome, Fedora)?
 
  g
  ___
  NetworkManager-list mailing list
  NetworkManager-list@gnome.org
  http://mail.gnome.org/mailman/listinfo/networkmanager-list
 
 ___
 NetworkManager-list mailing list
 NetworkManager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-19 Thread Dan Williams
On Sun, 2010-01-17 at 18:04 +0100, Gonsolo wrote:
  I wanted to inform you that I was able to share my connection with 
 WEP64 but
   not WPA/WPA2.
  
   I am connecting my Ipod Touch 2nd generation to my notebook (ath5k based
   WLAN card, Ubuntu Karmic) which is connected to the internet via UMTS
   (Huawei E220, option kernel module).
   It works with WEP64 encryption but not with WPA/WPA2 encryption.
  
   Is that problem known?
   I would be happy to provide more information (lsmod, log messages, etc).
   Should I file a bug?
   If so, where (Launchpad, Gnome, Fedora)?
 
 Am 17.01.2010 17:58, schrieb Quintin Beukes:
  The type of encryption shouldn't make a difference to sharing ability.
  It's 2 completely differently networking layers.
 
  Though, how are you sharing it? Are you building custom firewall
  rules, or using some automated sharing via a configuration option?
 
 No, very simple: Plug in UMTS Stick and WLAN Pcmcia card, connect mobile 
 broadband via NetworkManager and then create a new WLAN network also via 
 NetworkManager like it is explained in 
 http://magazine.redhat.com/2008/10/16/video-fedora-10-connection-sharing/ .
 It automatically adds DNS forwarding via dnsmasq (,I guess).
 
 And, how I said, it works with WEP64 but not with with WPA.

What type of wifi card?  It may be that driver issues prevent the wifi
card from completing the WPA Ad-Hoc network.  WPA Ad-Hoc is more complex
than WEP ad-hoc and there have been kernel driver issues with that
configuration in the past.  What kernel version are you using, what wifi
hardware, and what wifi driver?

Dan


___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-18 Thread Quintin Beukes
 It should not have to be ad-hoc.  The wifi card is acting in ap(Access
 Point) mode.

How does this work?

Q
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-18 Thread Marc Herbert
Gonsolo a écrit :
 I think my WG511 card would allow  WPA

Note that it is not because a card works as a WPA station that it works
as an WPA Access Point.

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-18 Thread José Queiroz
2010/1/18 Marc Herbert marc.herb...@gmail.com:
 Gonsolo a écrit :
 I think my WG511 card would allow  WPA

 Note that it is not because a card works as a WPA station that it works
 as an WPA Access Point.


I agree.

I remember that when I was testing a rt61-based card, I had problems
when tried to use WPA with ad-hoc mode. I had to switch to the
ndiswrapper driver to do that.
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-18 Thread John Mahoney
On Mon, Jan 18, 2010 at 6:02 AM, Quintin Beukes quin...@last.za.net wrote:

  It should not have to be ad-hoc.  The wifi card is acting in ap(Access
  Point) mode.

 How does this work?


Internally or how to configure?

To configure:
1. Create a new wireless connection with the add button
2. enter ssid
3. Keep mode as Infrastructure instead of Ad-hoc
4. In ipv4 settings tab select method: Shared to other computers.


--
John
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Connection sharing with WPA/WPA2

2010-01-17 Thread Gonsolo

Hi!

I wanted to inform you that I was able to share my connection with WEP64 
but not WPA/WPA2.


I am connecting my Ipod Touch 2nd generation to my notebook (ath5k based 
WLAN card, Ubuntu Karmic) which is connected to the internet via UMTS 
(Huawei E220, option kernel module).

It works with WEP64 encryption but not with WPA/WPA2 encryption.

Is that problem known?
I would be happy to provide more information (lsmod, log messages, etc).
Should I file a bug?
If so, where (Launchpad, Gnome, Fedora)?

g
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread Quintin Beukes
The type of encryption shouldn't make a difference to sharing ability.
It's 2 completely differently networking layers.

Though, how are you sharing it? Are you building custom firewall
rules, or using some automated sharing via a configuration option?

Quintin Beukes



On Sun, Jan 17, 2010 at 6:37 PM, Gonsolo gons...@gmail.com wrote:
 Hi!

 I wanted to inform you that I was able to share my connection with WEP64 but
 not WPA/WPA2.

 I am connecting my Ipod Touch 2nd generation to my notebook (ath5k based
 WLAN card, Ubuntu Karmic) which is connected to the internet via UMTS
 (Huawei E220, option kernel module).
 It works with WEP64 encryption but not with WPA/WPA2 encryption.

 Is that problem known?
 I would be happy to provide more information (lsmod, log messages, etc).
 Should I file a bug?
 If so, where (Launchpad, Gnome, Fedora)?

 g
 ___
 NetworkManager-list mailing list
 NetworkManager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread Gonsolo
 I wanted to inform you that I was able to share my connection with 
WEP64 but

 not WPA/WPA2.

 I am connecting my Ipod Touch 2nd generation to my notebook (ath5k based
 WLAN card, Ubuntu Karmic) which is connected to the internet via UMTS
 (Huawei E220, option kernel module).
 It works with WEP64 encryption but not with WPA/WPA2 encryption.

 Is that problem known?
 I would be happy to provide more information (lsmod, log messages, etc).
 Should I file a bug?
 If so, where (Launchpad, Gnome, Fedora)?

Am 17.01.2010 17:58, schrieb Quintin Beukes:

The type of encryption shouldn't make a difference to sharing ability.
It's 2 completely differently networking layers.

Though, how are you sharing it? Are you building custom firewall
rules, or using some automated sharing via a configuration option?


No, very simple: Plug in UMTS Stick and WLAN Pcmcia card, connect mobile 
broadband via NetworkManager and then create a new WLAN network also via 
NetworkManager like it is explained in 
http://magazine.redhat.com/2008/10/16/video-fedora-10-connection-sharing/ .

It automatically adds DNS forwarding via dnsmasq (,I guess).

And, how I said, it works with WEP64 but not with with WPA.

g
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread Gonsolo

Am 17.01.2010 18:04, schrieb Marc Luethi:

On Sun, 2010-01-17 at 17:37 +0100, Gonsolo wrote:


It works with WEP64 encryption but not with WPA/WPA2 encryption.


If your notebook sets up an ad hoc WiFi network, you can't use WPA or
WPA2.

AFAIK, the ad hoc WiFi mode is still limited to WEP encryption.

With certain hardware/driver combinations it is possible to run your
hardware in Access Point mode - then this restriction does not apply,
of course.


Ok, thanks. It seems to be ad hoc. I think my WG511 card would allow 
WPA but I will continue to use WEP for now (since it is the easiest to 
do :) ).


g
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread Quintin Beukes
Are you sure the network is even established? Can you ping the other host?

You mentioned ad-hoc. I've noticed NetworkManager has problems
establishing AdHoc networks using WPA. For the network doesn't
establish in the first place, so sharing won't work.

Maybe this is your problem as well?

try pinging the other host.

Quintin Beukes



On Sun, Jan 17, 2010 at 7:07 PM, Gonsolo gons...@gmail.com wrote:
 Am 17.01.2010 18:04, schrieb Marc Luethi:

 On Sun, 2010-01-17 at 17:37 +0100, Gonsolo wrote:

 It works with WEP64 encryption but not with WPA/WPA2 encryption.

 If your notebook sets up an ad hoc WiFi network, you can't use WPA or
 WPA2.

 AFAIK, the ad hoc WiFi mode is still limited to WEP encryption.

 With certain hardware/driver combinations it is possible to run your
 hardware in Access Point mode - then this restriction does not apply,
 of course.

 Ok, thanks. It seems to be ad hoc. I think my WG511 card would allow WPA
 but I will continue to use WEP for now (since it is the easiest to do :) ).

 g
 ___
 NetworkManager-list mailing list
 NetworkManager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread John Mahoney
On Sun, Jan 17, 2010 at 1:28 PM, Quintin Beukes quin...@last.za.net wrote:

 Are you sure the network is even established? Can you ping the other host?

 You mentioned ad-hoc. I've noticed NetworkManager has problems
 establishing AdHoc networks using WPA. For the network doesn't
 establish in the first place, so sharing won't work.


It should not have to be ad-hoc.  The wifi card is acting in ap(Access
Point) mode.

 Maybe this is your problem as well?

 try pinging the other host.

 Quintin Beukes



 On Sun, Jan 17, 2010 at 7:07 PM, Gonsolo gons...@gmail.com wrote:
  Am 17.01.2010 18:04, schrieb Marc Luethi:
 
  On Sun, 2010-01-17 at 17:37 +0100, Gonsolo wrote:
 
  It works with WEP64 encryption but not with WPA/WPA2 encryption.
 
  If your notebook sets up an ad hoc WiFi network, you can't use WPA or
  WPA2.
 
  AFAIK, the ad hoc WiFi mode is still limited to WEP encryption.
 
  With certain hardware/driver combinations it is possible to run your
  hardware in Access Point mode - then this restriction does not apply,
  of course.
 
  Ok, thanks. It seems to be ad hoc. I think my WG511 card would allow
 WPA
  but I will continue to use WEP for now (since it is the easiest to do :)
 ).
 
  g
  ___
  NetworkManager-list mailing list
  NetworkManager-list@gnome.org
  http://mail.gnome.org/mailman/listinfo/networkmanager-list
 
 ___
 NetworkManager-list mailing list
 NetworkManager-list@gnome.org
 http://mail.gnome.org/mailman/listinfo/networkmanager-list

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: Connection sharing with WPA/WPA2

2010-01-17 Thread Gonsolo

Am 17.01.2010 22:09, schrieb John Mahoney:

On Sun, Jan 17, 2010 at 1:28 PM, Quintin Beukesquin...@last.za.net  wrote:


Are you sure the network is even established? Can you ping the other host?

You mentioned ad-hoc. I've noticed NetworkManager has problems
establishing AdHoc networks using WPA. For the network doesn't
establish in the first place, so sharing won't work.



It should not have to be ad-hoc.  The wifi card is acting in ap(Access
Point) mode.


Yes, but the simplest solution for me is to just use Create New 
Wireless Network in NetworkManager, use WEP64, and everything works.


Looking in NetworkManager it tells me that it is an Adhoc network.

I received an answer that WPA(2) mode in Adhoc mode is not in the 
specification.


AP mode may work, I'm just too lazy. :)

Thank you all for your answers,

g (lying on the couch with his Ipod :) )
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM deleting WPA key secret in Fedora 12?

2009-12-05 Thread Brian Morrison
On Fri, 04 Dec 2009 12:25:26 -0800
Dan Williams d...@redhat.com wrote:

 On Thu, 2009-12-03 at 15:03 +, Brian Morrison wrote:
  Brian Morrison wrote:
  
   The fix was to paste my WPA key into the entry field after using
   the edit menu for my home SSID and then going to the advanced tab
   (at least I think that's it, don't have it in front of me just
   now). There is only an SSID stored, no BSSID.
  
  I should have added that clicking on the network SSID in the NM
  applet's left click menu does nothing, it doesn't bring up a dialog
  asking for the connection's secrets and in fact it does precisely
  nothing.
  
  If this ever happened in F11 then I would be prompted for the WPA
  PSK which no longer happens.
 
 This is odd, but before we do anything else, can you try the NM in
 updates-testing?  I haven't seen this at all but it could point to
 keyring issues since the WPA passphrase is stored in the keyring.

Right. I have now seen a second case of this, the symptoms were sudden
loss of network throughput but NM and the Netspeed applet both showed
the connection still working.

Reselecting my home SSID from the list in NM's left click menu resulted
in an attempt to reconnect that never succeeded. On opening the WPA
settings via NM's right-click edit menu the passphrase was blank.
Re-entering it sorted the problem out.

I see there is a new wpa-supplicant in updates-testing, do I need that
too? I will restart with the updated NM and see if anything has changed.

-- 

Brian

___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM deleting WPA key secret in Fedora 12?

2009-12-04 Thread Dan Williams
On Thu, 2009-12-03 at 15:03 +, Brian Morrison wrote:
 Brian Morrison wrote:
 
  The fix was to paste my WPA key into the entry field after using the
  edit menu for my home SSID and then going to the advanced tab (at least
  I think that's it, don't have it in front of me just now). There is only
  an SSID stored, no BSSID.
 
 I should have added that clicking on the network SSID in the NM applet's
 left click menu does nothing, it doesn't bring up a dialog asking for
 the connection's secrets and in fact it does precisely nothing.
 
 If this ever happened in F11 then I would be prompted for the WPA PSK
 which no longer happens.

This is odd, but before we do anything else, can you try the NM in
updates-testing?  I haven't seen this at all but it could point to
keyring issues since the WPA passphrase is stored in the keyring.

Dan


___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


NM deleting WPA key secret in Fedora 12?

2009-12-03 Thread Brian Morrison
Has anyone else suffered from a problem where on occasion F12 will boot
and then be unable to connect to a previously usable AP because the WPA
key is no longer stored? My home network has two APs with the same SSID
but different BSSIDs on each channel.

I have now had this happen twice, the first time I thought it was
because it was I had just upgraded from F11 to F12 on my laptop, but it
did it again this morning.

The fix was to paste my WPA key into the entry field after using the
edit menu for my home SSID and then going to the advanced tab (at least
I think that's it, don't have it in front of me just now). There is only
an SSID stored, no BSSID.

Is this a common problem? I didn't see anything in the Fedora Common
Bugs page.

I have all the latest patches applied to F12 as of a day or two ago, I
see there are a load more in updates though so will apply those.

This is not very deterministic, it's hit me twice in a dozen boots I think.

-- 

Brian
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: NM deleting WPA key secret in Fedora 12?

2009-12-03 Thread Brian Morrison
Brian Morrison wrote:

 The fix was to paste my WPA key into the entry field after using the
 edit menu for my home SSID and then going to the advanced tab (at least
 I think that's it, don't have it in front of me just now). There is only
 an SSID stored, no BSSID.

I should have added that clicking on the network SSID in the NM applet's
left click menu does nothing, it doesn't bring up a dialog asking for
the connection's secrets and in fact it does precisely nothing.

If this ever happened in F11 then I would be prompted for the WPA PSK
which no longer happens.

-- 

Brian
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


Re: WPA troubles in F12

2009-11-29 Thread Jud Craft
I have not forgotten about this and will gather the needed data.  Just
happen to be life-busy for the current time.

On Tue, Nov 17, 2009 at 5:15 PM, Dan Williams wrote:
 Can you grab /var/log/messages from a successful run (cert+peap0) and a
 failed run so I can look at what NM is sending to the supplicant?

Please note that my initial successful run is only with NoCert+Peap0.
Once I connect in this manner, subsequent Cert+Peap0(or Automatic)
connections work just fine (for the duration of the session).
___
NetworkManager-list mailing list
NetworkManager-list@gnome.org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


  1   2   3   4   5   >