Du må være registrert og logget inn for å kunne legge ut innlegg på freak.no
X
LOGG INN
... eller du kan registrere deg nå
Dette nettstedet er avhengig av annonseinntekter for å holde driften og videre utvikling igang. Vi liker ikke reklame heller, men alternativene er ikke mange. Vær snill å vurder å slå av annonseblokkering, eller å abonnere på en reklamefri utgave av nettstedet.
  7 1211
Hei

Jeg går på en videregående skole som tilbyr internett til de elevene som har egen maskin.

Jeg bruker linux på min maskin, men jeg liker og prøve diverse distrubusjoner. problemet er at de eneste to jeg får til og gå med nette er Fedora og Ubuntu... Jeg har prøvd openSUSE, men den vil ikke.

Jeg har kikket litt rundt på nette og funnet ut at jeg kan lage en wpa_supplicant.conf fil...

Jeg har laget en og den ser slik ut:

Kode

# wpa_supplicant -d -c/etc/wpa_supplicant.conf -ieth1 -Dwext 
# IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2

ctrl_interface=/var/run/wpa_supplicant

network={
	ssid="SvgsRadius"
	key_mgmt=IEEE8021X
	eap=PEAP
	phase2="auth=MSCHAPV2"
	phase1="peapver=0"
	identity="brukernavn"
	password="passord"
#	ca_cert="/etc/cert/ca.pem"
}
Jeg prøvde denne wpa_supplicant -d -c/etc/wpa_supplicant.conf -ieth1 -Dwext
Som jeg fant på nette, men jeg kommer ingen vei...

Jeg er ikke sikker på om at config filen er riktig, så jeg legger til hva jeg velger på ubuntu/fedora når jeg kommer på gjennom gui...

Wireless Security: Dynamic WEP
Authentication: Protected EAP (PEAP)
Anonymous identety:
CA certificate: none
PEAP version: Verison 0
Inner Authentication: MSCHAPv2
User name: Brukernavn
Password: Passord

Jeg lurer på om det er noe jeg mangler i commanden, eller filen så jeg kommer på, eventuelt hvor jeg skal legge filen så den connecter med en gang...

Jeg har prøvd og legge den i /etc/wpa_supplicant/wpa_supplicant.conf og /etc/wpa_supplicant.conf...

Jeg er takknemlig for alle innspill...

mvh
Kristoffer
Har du prøvd å starte wpa_cli, og sett om du får opp noen feilmeldinger der?
Vet ihvertfall at i HFK benyttet de seg før av (vet ikke om de gjør det lengre, dette var 1 år siden), Microsoft servere som kjørte ActiveDirectory for pålogging.
Dette gjorde at uansett om du logget deg på det trådløse nettet, fikk du ikke logge på fra annet en WinXP Pro.

Dette løste vi ved å konstant mase på den elendige kunnskapsløse IT ansvarlige til han satt opp en trådløs løsning som fungerte uten noe slikt tull.
Altså selve internett og det trådløse fungerer... og det fungerer på linux, men jeg vet ikke hvordan jeg får det til og virke uten gnome sin gui for wpa_supplicant...

Jeg kan boote opp i suse og hente feilmeldlingen når jeg bruker command line wpa_supplicant...

Her er et "lite" utdrag fra hva som skjer når jeg bruker command, Det nederste er avslutningsprossesen etter at jeg har ctrl+c det...

Litt mer info btw... Jeg bruker et intel 2200bg nettverkskort som fungerer i begge osene, noe jeghar testet hjemme...

Den holder bare på og looper, at den connecter...

Kode

Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
   id=0 ssid='SvgsRadius'
Initializing interface (2) 'eth1'
Interface eth1 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:16:6f:1e:26:1f
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=8
Received 3550 bytes of scan results (15 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:18:6e:97:2a:40 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:18:6e:9d:48:00 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 00:18:6e:9d:43:c0 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
3: 00:18:6e:9d:6a:00 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
4: 00:18:6e:9d:31:c0 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
5: 00:18:6e:97:2a:44 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
6: 00:18:6e:9d:48:04 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
7: 00:18:6e:9d:43:c4 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
8: 00:18:6e:9d:6a:04 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
9: 00:18:6e:9d:31:c4 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   skip - no WPA/RSN IE
10: 00:18:6e:97:2a:42 ssid='SvgsGjest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
11: 00:18:6e:9d:48:02 ssid='SvgsGjest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
12: 00:18:6e:9d:43:c2 ssid='SvgsGjest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
13: 00:18:6e:9d:6a:02 ssid='SvgsGjest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
14: 00:18:6e:9d:31:c2 ssid='SvgsGjest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:18:6e:97:2a:40 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:18:6e:9d:48:00 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 00:18:6e:9d:43:c0 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
3: 00:18:6e:9d:6a:00 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
4: 00:18:6e:9d:31:c0 ssid='kariere' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
5: 00:18:6e:97:2a:44 ssid='SvgsRadius' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
   selected non-WPA AP 00:18:6e:97:2a:44 ssid='SvgsRadius'
Trying to associate with 00:18:6e:97:2a:44 (SSID='SvgsRadius' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:6e:97:2a:44
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:6e:97:2a:44
No keys have been configured - skip key clearing
Associated with 00:18:6e:97:2a:44
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:18:6e:97:2a:44
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=43):
     00 6e 65 74 77 6f 72 6b 69 64 3d 53 76 67 73 52   _networkid=SvgsR
     61 64 69 75 73 2c 6e 61 73 69 64 3d 36 2e 30 2c   adius,nasid=6.0,
     70 6f 72 74 69 64 3d 32 33 35 39                  portid=2359     
EAP: using real identity - hexdump_ascii(len=4):
     34 33 32 34                                       4324            
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:18:6e:97:2a:44
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:18:6e:97:2a:44
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 99 bytes pending from ssl_out
SSL: 99 bytes left to be sent out (of total 99 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:18:6e:97:2a:44
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:18:6e:97:2a:44
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=531) - Flags 0x80
SSL: TLS Message Length: 521
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 122 bytes pending from ssl_out
SSL: 122 bytes left to be sent out (of total 122 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:18:6e:97:2a:44
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:18:6e:97:2a:44
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=57) - Flags 0x80
SSL: TLS Message Length: 47
SSL: (where=0x4008 ret=0x214)
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:bad record mac
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
OpenSSL: tls_connection_handshake - SSL_connect error:1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad record mac
SSL: 27 bytes pending from ssl_out
SSL: Failed - tls_out available to report error
SSL: 27 bytes left to be sent out (of total 27 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:18:6e:97:2a:44
EAPOL: SUPP_BE entering state RECEIVE
^CCTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Control interface directory not empty - leaving it behind
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Sist endret av KristofferA; 25. februar 2009 kl. 12:30. Grunn: Automatisk sammenslåing med etterfølgende innlegg.
hmm... fikk ikke så mye ut av den guiden i med at skolen ikke bruker certificater utsendt av servern...

Finnes det en måte og få en outputfil av den grafisk wpa_supplicanten på fedora/ubuntu?
Kjør 'ps x | grep wpa_supplicant' som root og se etter hva som står etter -c, det er konfigurasjonsfilen den grafiske bruker. Antakeligvis /etc/wpa_supplicant/wpa_supplicant.conf.
Sist endret av ql1rz; 25. februar 2009 kl. 16:38.
[kristoffer@zalo9 ~]$ ps x | grep wpa_supplicant
3964 pts/0 S+ 0:00 grep wpa_supplicant

Mer kommer det ikke, og jeg sitter på fedora som jeg har internett...