Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Fri 24 Oct 2014, 06:34
All times are UTC - 4
 Forum index » Advanced Topics » Additional Software (PETs, n' stuff) » Network
Can't configure wired network connection at University
Post new topic   Reply to topic View previous topic :: View next topic
Page 1 of 1 [15 Posts]  
Author Message
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Mon 17 Feb 2014, 17:53    Post subject:  Can't configure wired network connection at University  

Hi,
I have recently moved to China and work in a University. My apartment has a dsl cable from the University network. They have configured the connection in Windows using a program called Inode Intelligent Client that creates a connection (in which I have to enter my username and password, it has 802.1X protocol and I enable the Upload Ipv4 adress).
Later I have to modify the Ipv4 config of my ethernet card with my Ip, gateway, mask and DNS servers.
Nobody here knows how to make this connection in Linux. I have managed to make it work under my other Linux distro, Linuxmint 13. It was very easy following these manuals:
http://www.tc.mtu.edu/resnet/configuration/Ubunto11_Wired_dot1xConfig.pdf
http://ubuntuforums.org/showthread.php?t=2059808
The only difference is that I didn't need to enable the Protected EAP (PEAP)
option. With MD5 Authentication works great

I would love to make it work in my puppy (slacko 5.5) which is my everyday use distro but I have not succeeded so far. I found this post from the forum, talks about the wpa_supplicant.conf file, but it is too technical for me and have no idea how to modify it or even if that would help:
http://www.murga-linux.com/puppy/viewtopic.php?t=65813&sid=2ad3c9e2ec4ddcddd407c559c1de75a2

I guess that it is quite easy to configure the connection in both Windows and Ubuntu it will be also possible in Puppy. Can anyone give a hand with this? I would love to keep using my Puppy as usual! Very Happy

Thanks!
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Mon 24 Feb 2014, 07:53    Post subject:  

Yes, you need to follow a similar process that was discussed in that other thread. And yes, all setup is manual, but if you can work your way through it, once tested and working, the commands can be all be run from a single script, and even launched from a desktop icon if you wish.

First you need to run the Network Wizard, and configure your eth0 interface for "Static IP", then reboot.
Your connection will still fail ... but at least you have now disabled the DHCP daemon (dhcpcd) from running at startup - which would ultimately interfere with your final configuration.

Now open /etc/wpa_supplicant in Geany. Delete its entire contents, and replace with these lines, which I obtained just with a Google search -
Code:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=0
eapol_version=2

network={
   key_mgmt=IEEE8021X
   eap=TTLS MD5
   identity=MYLOGINNAME
   anonymous_identity=MYLOGINNAME
   password=MYPASSWORD
   phase1="auth=MD5"
   phase2="auth=PAP password=MYPASSWORD"
   eapol_flags=0
}

You can just copy and paste. Replace MYLOGINNAME and MYPASSWORD with your correct values. Save.

Next open /etc/resolv.conf in Geany, to configure your nameservers.
There should be one or more lines which start with "nameserver"
and possibly also a line which starts with "domain". Your network administrator can give you the correct values. Save.

Now you're ready to connect. First open a console and run this command, to clear any stale WPA run files -
Code:
rm /var/run/wpa_supplicant/*

Now the big test; run this command to connect -
Code:
wpa_supplicant -i eth0 -D wired -c /etc/wpa_supplicant.conf -dd

Hopefully you will see a connection reported. If so, you can open a second console and set up your static IP address -
don't trust the static IP setup that automatically runs at boot up, because the process needs to be done after the wpa_supplicant command has run.
Code:
ifconfig eth0 192.168.0.1 broadcast 192.168.0.255 netmask 255.255.255.0
route add default gw 192.168.0.254 eth0

Replace IP addresses with your correct values.

Let us know the outcome.
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Mon 24 Feb 2014, 20:49    Post subject:  

And your network doesn't require a client certificate/private key file, does it?
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Mon 24 Feb 2014, 21:18    Post subject:  

Hi tempestuous!
Thank you very much for your answer. I am not home right now, so I will try this tonight or tomorrow. I don't think it requires a private key file. The data that they have given me are: User, Password, IP, gateway, mask and DNS servers. They have nothing else, but with this data I can configure the connection in both Ubuntu and Windows so I think that with your instructions (and maybe some more help... Very Happy ) I will be able to establish this connection. I will let you know when I try to configure.
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Mon 24 Feb 2014, 22:16    Post subject:  

yosi666 wrote:
The data that they have given me are: User, Password, IP, gateway, mask and DNS servers.

OK, the only thing missing is the "broadcast" IP address, which is required in the command that starts with "ifconfig ..."
But you can (pre)determine this value from your IP and mask values, with this command -
Code:
ipcalc -b <IP_ADDRESS> <NETMASK> | cut -d= -f2

It's usually similar to your IP address, except with the final number in the string replaced with "255".
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Mon 24 Feb 2014, 22:23    Post subject:  

I got it too. That is what I called the IP gateway. Cool... Feel I will have it soon Very Happy
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Tue 25 Feb 2014, 00:20    Post subject:  

yosi666 wrote:
That is what I called the IP gateway.

Generally, that's not correct, the broadcast address and gateway address should be different.
The values I provided in the example commands are typical for a local LAN; notice that Broadcast is 192.168.0.255 and Gateway is 192.168.0.254
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Tue 25 Feb 2014, 02:38    Post subject:  

Well. Don't have it yet.
This is what I have done:
1.-Established my Static Ip and DNS manually trough network manager. Rebooted.
2.-Edited my etc/wpa_supplicant.conf file as follows (xxxx is my user id and yyyy my password):
Code:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=0
eapol_version=2

network={
   key_mgmt=IEEE8021X
   eap=TTLS MD5
   identity=xxxx
   anonymous_identity=xxxx
   password=yyyy
   phase1="auth=MD5"
   phase2="auth=PAP password=yyyy" 
   eapol_flags=0
}


3.-Edited /etc/resolv.conf and it shows my correct DNS:
Code:
nameserver 61.139.2.69
nameserver 210.41.160.2


4.-Ran # rm /var/run/wpa_supplicant/*:
Code:
rm: cannot remove ‘/var/run/wpa_supplicant/*’: No such file or directory


5.-Configured manually my eth0 with:
Code:
ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0
route add default gw 192.172.18.254 eth0


6.-Finally ran # # wpa_supplicant -i eth0 -D wired -c /etc/wpa_supplicant.conf -dd:
Code:

wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
Line 8: failed to parse identity 'xxxx'.
Line 8: failed to parse identity 'xxxx'.
Line 9: failed to parse anonymous_identity 'xxxx'.
Line 9: failed to parse anonymous_identity 'xxxx'.
Line 10: failed to parse password.
Line 10: failed to parse password 'yyyy'.
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5       
phase2 - hexdump_ascii(len=25):
     61 75 74 68 3d 50 41 50 20 70 61 73 73 77 6f 72   auth=PAP passwor
     64 3d 6c 73 74 63 77 62 38                        d=yyyy       
eapol_flags=0 (0x0)
Line 14: failed to parse network block.
Failed to read or parse configuration '/etc/wpa_supplicant.conf'.
Failed to add interface eth0
: Cancelling scan request
: Cancelling authentication timeout


Still not working. Tried rebooting but nothing happens. Don't know if it is good or not but the two little monitors in the right-bottom part of my screen show some kind of exchange and go green from time to time. Very Happy

If I run
ifconfig eth0
I get
Code:
# ifconfig eth0
eth0      Link encap:Ethernet  HWaddr 54:04:A6:1C:88:A7 
          inet addr:172.18.70.35  Bcast:172.18.70.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:108 errors:0 dropped:0 overruns:0 frame:0
          TX packets:596 errors:0 dropped:0 overruns:0 carrier:1
          collisions:0 txqueuelen:1000
          RX bytes:11068 (10.8 KiB)  TX bytes:41874 (40.8 KiB)
          Interrupt:45
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Tue 25 Feb 2014, 10:10    Post subject:  

Your wpa_supplicant output reports positive responses to:
key_mgmt (line 6)
eap methods (line 7)
phase 1 (line 11)
phase 2 (line 12)
eapol_flags (line 13)

But it gives "failed to parse" responses to:
identity line 8
anonymous_identity (line 9)
password (line 10)

Does your username (identity) and password contain non-standard characters? Or spaces?
Try enclosing these values in quotation marks.

And another little error - the ifconfig/route commands must be run after wpa_supplicant, not before.
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Tue 25 Feb 2014, 20:10    Post subject:  

yosi666 wrote:
Code:
ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0
route add default gw 192.172.18.254 eth0

Those values look good.
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Wed 26 Feb 2014, 02:43    Post subject:  

Ok, writing password and user between quotes seems to have made wpa_supplicant read these values but internet still doesn't work.
This is my wpa_supplicant.conf:
Code:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=0
eapol_version=2

network={
   key_mgmt=IEEE8021X
   eap=TTLS MD5
   identity="xxxx"
   anonymous_identity="xxxx"
   password="yyyy"
   phase1="auth=MD5"
   phase2="auth=PAP password=yyyy" 
   eapol_flags=0
}


I got this after running wpa_supplicant:
Code:
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
anonymous_identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
password - hexdump_ascii(len=7): [REMOVED]
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5       
phase2 - hexdump_ascii(len=25):
     61 75 74 68 3d 50 41 50 20 70 61 73 73 77 6f 72   auth=PAP passwor
     64 3d 6c 73 74 63 77 62 38                        d=yyyy     
eapol_flags=0 (0x0)
Priority group 0
   id=0 ssid=''
wpa_driver_wired_init: Added multicast membership with packet socket
eth0: Own MAC address: 54:04:a6:1c:88:a7
eth0: RSN: flushing PMKID list in the driver
eth0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface eth0
WPS: UUID based on MAC address - hexdump(len=16): cf ff 64 10 ee ae 57 fd 8f 2f 96 80 a0 08 2a c7
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
eth0: Added interface eth0
random: Got 17/20 bytes from /dev/random
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Already associated with a configured network - generating associated event
eth0: Event ASSOC (0) received
eth0: Association info event
eth0: State: DISCONNECTED -> ASSOCIATED
eth0: Associated to a new BSS: BSSID=01:80:c2:00:00:03
Add randomness: count=1 entropy=0
eth0: No keys have been configured - skip key clearing
eth0: Select network based on association information
eth0: Network configuration found for the current AP
eth0: WPA: clearing AP WPA IE
eth0: WPA: clearing AP RSN IE
eth0: WPA: clearing own WPA/RSN IE
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Associated with 01:80:c2:00:00:03
eth0: WPA: Association event - clear replay counter
eth0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
eth0: Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=4): 02 01 00 00
random: Got 3/3 bytes from /dev/random
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 6f 66 66
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx   
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 65 20 56
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                 xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 35 69 63
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0


After that I ran:
Code:
ifconfig eth0 192.172.18.35 broadcast 192.172.18.255 netmask 255.255.255.0
route add default gw 192.172.18.254 eth0


But no changes. Confused
But it seems we are getting somewhere! Smile
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Wed 26 Feb 2014, 19:21    Post subject:  

OK, now it's just a question of getting the wpa_supplicant.conf contents correct. I had another look at the wpa_supplicant README, and I see one potential change which looks promising:
change
Code:
phase2="auth=PAP password=MYPASSWORD"

to
Code:
phase2="autheap=MSCHAPV2 autheap=MD5"

This appears to be the correct corresponding value for "phase2" when using "eap=TTLS MD5"

But if still no success, I think you should show your wpa_supplicant.conf to one of your network administrators - even though they may not be familiar with Linux (and wpa_supplicant) they will probably recognise the different terms contained within the wpa_supplicant.conf file.
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Wed 26 Feb 2014, 21:38    Post subject:  

Hi again!
Not success yet. Although I think it was a good try as my Ubuntu connection only uses MD5.
I got this output (some differences with the previous one, but don't understand them. I don't see my password anywhere):
Code:
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=0
eapol_version=2
Line: 5 - start of a new network block
key_mgmt: 0x8
eap methods - hexdump(len=24): 00 00 00 00 15 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
password - hexdump_ascii(len=7): [REMOVED]
phase1 - hexdump_ascii(len=8):
     61 75 74 68 3d 4d 44 35                           auth=MD5       
phase2 - hexdump_ascii(len=28):
     61 75 74 68 65 61 70 3d 4d 53 43 48 41 50 56 32   autheap=MSCHAPV2
     20 61 75 74 68 65 61 70 3d 4d 44 35                autheap=MD5   
eapol_flags=0 (0x0)
Priority group 0
   id=0 ssid=''
wpa_driver_wired_init: Added multicast membership with packet socket
eth0: Own MAC address: 54:04:a6:1c:88:a7
eth0: RSN: flushing PMKID list in the driver
eth0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface eth0
WPS: UUID based on MAC address - hexdump(len=16): cf ff 64 10 ee ae 57 fd 8f 2f 96 80 a0 08 2a c7
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
eth0: Added interface eth0
random: Got 20/20 bytes from /dev/random
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Already associated with a configured network - generating associated event
eth0: Event ASSOC (0) received
eth0: Association info event
eth0: State: DISCONNECTED -> ASSOCIATED
eth0: Associated to a new BSS: BSSID=01:80:c2:00:00:03
Add randomness: count=1 entropy=0
eth0: No keys have been configured - skip key clearing
eth0: Select network based on association information
eth0: Network configuration found for the current AP
eth0: WPA: clearing AP WPA IE
eth0: WPA: clearing AP RSN IE
eth0: WPA: clearing own WPA/RSN IE
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
eth0: Associated with 01:80:c2:00:00:03
eth0: WPA: Association event - clear replay counter
eth0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
eth0: Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=4): 02 01 00 00
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
eth0: RX EAPOL from 00:0f:e2:73:74:14
RX EAPOL - hexdump(len=50): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
eth0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=11):
     6c 73 74 63 6f 66 66 69 63 65 38                  xxxx     
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
TX EAPOL - hexdump(len=20): 02 00 00 10 02 01 00 10 01 6c 73 74 63 6f 66 66 69 63 65 38
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
Back to top
View user's profile Send private message 
tempestuous

Joined: 10 Jun 2005
Posts: 5271
Location: Australia

PostPosted: Wed 26 Feb 2014, 22:43    Post subject:  

yosi666 wrote:
Code:
...
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0

Ah, that final line of output looks good! Despite its vagueness, I think it means success!
Your terminal is now tied up with the wpa_supplicant process, which continues to run as a daemon.
Open a second terminal, and run the ifconfig/route commands, and you may have a successful connection!
Back to top
View user's profile Send private message 
yosi666

Joined: 13 May 2008
Posts: 111

PostPosted: Wed 26 Feb 2014, 22:52    Post subject:  

Did it, but no success... Sad
I do it when the wpa_supplicant process is running in the other terminal. Then, I open another one and run the other commands. I open Chrome and nothing...
No help from the network managers...
Back to top
View user's profile Send private message 
Display posts from previous:   Sort by:   
Page 1 of 1 [15 Posts]  
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Advanced Topics » Additional Software (PETs, n' stuff) » Network
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.1835s ][ Queries: 11 (0.0063s) ][ GZIP on ]