Can't configure wired network connection at University

Configuration wizards, scanners, remote desktop, etc.
Post Reply
Message
Author
yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

Can't configure wired network connection at University

#1 Post by yosi666 »

Hi,
I have recently moved to China and work in a University. My apartment has a dsl cable from the University network. They have configured the connection in Windows using a program called Inode Intelligent Client that creates a connection (in which I have to enter my username and password, it has 802.1X protocol and I enable the Upload Ipv4 adress).
Later I have to modify the Ipv4 config of my ethernet card with my Ip, gateway, mask and DNS servers.
Nobody here knows how to make this connection in Linux. I have managed to make it work under my other Linux distro, Linuxmint 13. It was very easy following these manuals:
http://www.tc.mtu.edu/resnet/configurat ... Config.pdf
http://ubuntuforums.org/showthread.php?t=2059808
The only difference is that I didn't need to enable the Protected EAP (PEAP)
option. With MD5 Authentication works great

I would love to make it work in my puppy (slacko 5.5) which is my everyday use distro but I have not succeeded so far. I found this post from the forum, talks about the wpa_supplicant.conf file, but it is too technical for me and have no idea how to modify it or even if that would help:
http://www.murga-linux.com/puppy/viewto ... 59c1de75a2

I guess that it is quite easy to configure the connection in both Windows and Ubuntu it will be also possible in Puppy. Can anyone give a hand with this? I would love to keep using my Puppy as usual! :D

Thanks!

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#2 Post by tempestuous »

Yes, you need to follow a similar process that was discussed in that other thread. And yes, all setup is manual, but if you can work your way through it, once tested and working, the commands can be all be run from a single script, and even launched from a desktop icon if you wish.

First you need to run the Network Wizard, and configure your eth0 interface for "Static IP", then reboot.
Your connection will still fail ... but at least you have now disabled the DHCP daemon (dhcpcd) from running at startup - which would ultimately interfere with your final configuration.

Now open /etc/wpa_supplicant in Geany. Delete its entire contents, and replace with these lines, which I obtained just with a Google search -

Code: Select all

ctrl_interface=/var/run/wpa_supplicant
ap_scan=0
eapol_version=2

network={
	key_mgmt=IEEE8021X
	eap=TTLS MD5
	identity=MYLOGINNAME
	anonymous_identity=MYLOGINNAME
	password=MYPASSWORD
	phase1="auth=MD5"
	phase2="auth=PAP password=MYPASSWORD"
	eapol_flags=0 
}
You can just copy and paste. Replace MYLOGINNAME and MYPASSWORD with your correct values. Save.

Next open /etc/resolv.conf in Geany, to configure your nameservers.
There should be one or more lines which start with "nameserver"
and possibly also a line which starts with "domain". Your network administrator can give you the correct values. Save.

Now you're ready to connect. First open a console and run this command, to clear any stale WPA run files -

Code: Select all

rm /var/run/wpa_supplicant/*
Now the big test; run this command to connect -

Code: Select all

wpa_supplicant -i eth0 -D wired -c /etc/wpa_supplicant.conf -dd
Hopefully you will see a connection reported. If so, you can open a second console and set up your static IP address -
don't trust the static IP setup that automatically runs at boot up, because the process needs to be done after the wpa_supplicant command has run.

Code: Select all

ifconfig eth0 192.168.0.1 broadcast 192.168.0.255 netmask 255.255.255.0
route add default gw 192.168.0.254 eth0
Replace IP addresses with your correct values.

Let us know the outcome.

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#3 Post by tempestuous »

And your network doesn't require a client certificate/private key file, does it?

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#4 Post by yosi666 »

Hi tempestuous!
Thank you very much for your answer. I am not home right now, so I will try this tonight or tomorrow. I don't think it requires a private key file. The data that they have given me are: User, Password, IP, gateway, mask and DNS servers. They have nothing else, but with this data I can configure the connection in both Ubuntu and Windows so I think that with your instructions (and maybe some more help... :D ) I will be able to establish this connection. I will let you know when I try to configure.

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#5 Post by tempestuous »

yosi666 wrote:The data that they have given me are: User, Password, IP, gateway, mask and DNS servers.
OK, the only thing missing is the "broadcast" IP address, which is required in the command that starts with "ifconfig ..."
But you can (pre)determine this value from your IP and mask values, with this command -

Code: Select all

ipcalc -b <IP_ADDRESS> <NETMASK> | cut -d= -f2
It's usually similar to your IP address, except with the final number in the string replaced with "255".

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#6 Post by yosi666 »

I got it too. That is what I called the IP gateway. Cool... Feel I will have it soon :D

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#7 Post by tempestuous »

yosi666 wrote:That is what I called the IP gateway.
Generally, that's not correct, the broadcast address and gateway address should be different.
The values I provided in the example commands are typical for a local LAN; notice that Broadcast is 192.168.0.255 and Gateway is 192.168.0.254

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#8 Post by yosi666 »

Well. Don't have it yet.
This is what I have done:
1.-Established my Static Ip and DNS manually trough network manager. Rebooted.
2.-Edited my etc/wpa_supplicant.conf file as follows (xxxx is my user id and yyyy my password):

Code: Select all

ctrl_interface=/var/run/wpa_supplicant 
ap_scan=0 
eapol_version=2 

network={ 
   key_mgmt=IEEE8021X 
   eap=TTLS MD5 
   identity=xxxx 
   anonymous_identity=xxxx
   password=yyyy
   phase1="auth=MD5" 
   phase2="auth=PAP password=yyyy"  
   eapol_flags=0 
}
3.-Edited /etc/resolv.conf and it shows my correct DNS:

Code: Select all

nameserver 61.139.2.69
nameserver 210.41.160.2
4.-Ran # rm /var/run/wpa_supplicant/*:

Code: Select all

rm: cannot remove ‘/var/run/wpa_supplicant/*’: No such file or directory
5.-Configured manually my eth0 with:

Code: Select all

ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0 
route add default gw 192.172.18.254 eth0
6.-Finally ran # # wpa_supplicant -i eth0 -D wired -c /etc/wpa_supplicant.conf -dd:

Code: Select all

wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
Line 8: failed to parse identity 'xxxx'.
Line 8: failed to parse identity 'xxxx'.
Line 9: failed to parse anonymous_identity 'xxxx'.
Line 9: failed to parse anonymous_identity 'xxxx'.
Line 10: failed to parse password.
Line 10: failed to parse password 'yyyy'.
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5        
phase2 - hexdump_ascii(len=25):
     61 75 74 68 3d 50 41 50 20 70 61 73 73 77 6f 72   auth=PAP passwor
     64 3d 6c 73 74 63 77 62 38                        d=yyyy       
eapol_flags=0 (0x0)
Line 14: failed to parse network block.
Failed to read or parse configuration '/etc/wpa_supplicant.conf'.
Failed to add interface eth0
: Cancelling scan request
: Cancelling authentication timeout
Still not working. Tried rebooting but nothing happens. Don't know if it is good or not but the two little monitors in the right-bottom part of my screen show some kind of exchange and go green from time to time. :D

If I run
ifconfig eth0
I get

Code: Select all

# ifconfig eth0
eth0      Link encap:Ethernet  HWaddr 54:04:A6:1C:88:A7  
          inet addr:172.18.70.35  Bcast:172.18.70.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:108 errors:0 dropped:0 overruns:0 frame:0
          TX packets:596 errors:0 dropped:0 overruns:0 carrier:1
          collisions:0 txqueuelen:1000 
          RX bytes:11068 (10.8 KiB)  TX bytes:41874 (40.8 KiB)
          Interrupt:45 

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#9 Post by tempestuous »

Your wpa_supplicant output reports positive responses to:
key_mgmt (line 6)
eap methods (line 7)
phase 1 (line 11)
phase 2 (line 12)
eapol_flags (line 13)

But it gives "failed to parse" responses to:
identity line 8
anonymous_identity (line 9)
password (line 10)

Does your username (identity) and password contain non-standard characters? Or spaces?
Try enclosing these values in quotation marks.

And another little error - the ifconfig/route commands must be run after wpa_supplicant, not before.

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#10 Post by tempestuous »

yosi666 wrote:

Code: Select all

ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0 
route add default gw 192.172.18.254 eth0
Those values look good.

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#11 Post by yosi666 »

Ok, writing password and user between quotes seems to have made wpa_supplicant read these values but internet still doesn't work.
This is my wpa_supplicant.conf:

Code: Select all

ctrl_interface=/var/run/wpa_supplicant 
ap_scan=0 
eapol_version=2 

network={ 
   key_mgmt=IEEE8021X 
   eap=TTLS MD5 
   identity="xxxx" 
   anonymous_identity="xxxx" 
   password="yyyy" 
   phase1="auth=MD5" 
   phase2="auth=PAP password=yyyy"  
   eapol_flags=0 
}
I got this after running wpa_supplicant:

Code: Select all

wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
anonymous_identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
password - hexdump_ascii(len=7): [REMOVED]
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5        
phase2 - hexdump_ascii(len=25):
     61 75 74 68 3d 50 41 50 20 70 61 73 73 77 6f 72   auth=PAP passwor
     64 3d 6c 73 74 63 77 62 38                        d=yyyy      
eapol_flags=0 (0x0)
Priority group 0
   id=0 ssid=''
wpa_driver_wired_init: Added multicast membership with packet socket
eth0: Own MAC address: 54:04:a6:1c:88:a7
eth0: RSN: flushing PMKID list in the driver
eth0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface eth0
WPS: UUID based on MAC address - hexdump(len=16): cf ff 64 10 ee ae 57 fd 8f 2f 96 80 a0 08 2a c7
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
eth0: Added interface eth0
random: Got 17/20 bytes from /dev/random
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Already associated with a configured network - generating associated event
eth0: Event ASSOC (0) received
eth0: Association info event
eth0: State: DISCONNECTED -> ASSOCIATED
eth0: Associated to a new BSS: BSSID=01:80:c2:00:00:03
Add randomness: count=1 entropy=0
eth0: No keys have been configured - skip key clearing
eth0: Select network based on association information
eth0: Network configuration found for the current AP
eth0: WPA: clearing AP WPA IE
eth0: WPA: clearing AP RSN IE
eth0: WPA: clearing own WPA/RSN IE
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Associated with 01:80:c2:00:00:03
eth0: WPA: Association event - clear replay counter
eth0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
eth0: Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=4): 02 01 00 00
random: Got 3/3 bytes from /dev/random
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 6f 66 66
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx   
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 65 20 56
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 35 69 63
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
After that I ran:

Code: Select all

ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0 
route add default gw 192.172.18.254 eth0
But no changes. :?
But it seems we are getting somewhere! :)

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#12 Post by tempestuous »

OK, now it's just a question of getting the wpa_supplicant.conf contents correct. I had another look at the wpa_supplicant README, and I see one potential change which looks promising:
change

Code: Select all

phase2="auth=PAP password=MYPASSWORD"
to

Code: Select all

phase2="autheap=MSCHAPV2 autheap=MD5"
This appears to be the correct corresponding value for "phase2" when using "eap=TTLS MD5"

But if still no success, I think you should show your wpa_supplicant.conf to one of your network administrators - even though they may not be familiar with Linux (and wpa_supplicant) they will probably recognise the different terms contained within the wpa_supplicant.conf file.

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#13 Post by yosi666 »

Hi again!
Not success yet. Although I think it was a good try as my Ubuntu connection only uses MD5.
I got this output (some differences with the previous one, but don't understand them. I don't see my password anywhere):

Code: Select all

wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
password - hexdump_ascii(len=7): [REMOVED]
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5        
phase2 - hexdump_ascii(len=28):
     61 75 74 68 65 61 70 3d 4d 53 43 48 41 50 56 32   autheap=MSCHAPV2
     20 61 75 74 68 65 61 70 3d 4d 44 35                autheap=MD5    
eapol_flags=0 (0x0)
Priority group 0
   id=0 ssid=''
wpa_driver_wired_init: Added multicast membership with packet socket
eth0: Own MAC address: 54:04:a6:1c:88:a7
eth0: RSN: flushing PMKID list in the driver
eth0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface eth0
WPS: UUID based on MAC address - hexdump(len=16): cf ff 64 10 ee ae 57 fd 8f 2f 96 80 a0 08 2a c7
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
eth0: Added interface eth0
random: Got 20/20 bytes from /dev/random
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Already associated with a configured network - generating associated event
eth0: Event ASSOC (0) received
eth0: Association info event
eth0: State: DISCONNECTED -> ASSOCIATED
eth0: Associated to a new BSS: BSSID=01:80:c2:00:00:03
Add randomness: count=1 entropy=0
eth0: No keys have been configured - skip key clearing
eth0: Select network based on association information
eth0: Network configuration found for the current AP
eth0: WPA: clearing AP WPA IE
eth0: WPA: clearing AP RSN IE
eth0: WPA: clearing own WPA/RSN IE
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Associated with 01:80:c2:00:00:03
eth0: WPA: Association event - clear replay counter
eth0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
eth0: Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=4): 02 01 00 00
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0

tempestuous
Posts: 5464
Joined: Fri 10 Jun 2005, 05:12
Location: Australia

#14 Post by tempestuous »

yosi666 wrote:

Code: Select all

...
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
Ah, that final line of output looks good! Despite its vagueness, I think it means success!
Your terminal is now tied up with the wpa_supplicant process, which continues to run as a daemon.
Open a second terminal, and run the ifconfig/route commands, and you may have a successful connection!

yosi666
Posts: 111
Joined: Tue 13 May 2008, 14:41

#15 Post by yosi666 »

Did it, but no success... :(
I do it when the wpa_supplicant process is running in the other terminal. Then, I open another one and run the other commands. I open Chrome and nothing...
No help from the network managers...

Post Reply