구하는데 시간이 오래 걸렸다무선 연결, 이제 매우 대략적인 결과를 얻을 수 있습니다(예: 몇 분마다 몇 초씩 실제 인터넷에 액세스함). wpa_supplicant -d -i wlp0s29f7u5 -c wifi.conf -Dwext
하나의 VT와 다른 VT에서 실행 중인데 while ! yes | pacman -Syu; do :; done
몇 분 후에도 여전히 완료되지 않지만 가끔 일부 파일이 다운로드됩니다.
iw dev wlp0s29f7u5 link
Arch 시스템에서 보고된 신호 강도는 약 -40dB였으며 이는 인근 Ubuntu 노트북의 -70dB보다 훨씬 나쁩니다.
연결 출력:
# wpa_supplicant -d -i wlp0s29f7u5 -c wifi.conf -Dwext
wpa_supplicant v2.0
Successfully initialized wpa_supplicant
Initializing interface 'wlp0s29f7u5' conf 'wifi.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wifi.conf' -> '/root/wifi.conf'
Reading configuration file '/root/wifi.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
id=0 ssid='BTHub4-GRK6'
WEXT: cfg80211-based driver detected
wext: interface wlp0s29f7u5 phy: phy0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0x1f flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlp0s29f7u5: Own MAC address: e8:4e:06:14:7a:77
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wlp0s29f7u5: RSN: flushing PMKID list in the driver
wlp0s29f7u5: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlp0s29f7u5
WPS: UUID based on MAC address - hexdump(len=16): 7c c4 e6 42 89 cb 59 26 95 2a b6 fd f8 85 e6 3a
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlp0s29f7u5: Added interface wlp0s29f7u5
wlp0s29f7u5: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
wlp0s29f7u5: State: DISCONNECTED -> SCANNING
wlp0s29f7u5: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 10 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=16
wlp0s29f7u5: Event SCAN_RESULTS (3) received
Received 838 bytes of scan results (2 BSSes)
wlp0s29f7u5: BSS: Start scan result update 1
wlp0s29f7u5: BSS: Add new id 0 BSSID cc:33:bb:13:8a:f4 SSID 'BTHub4-GRK6'
wlp0s29f7u5: BSS: Add new id 1 BSSID 00:22:b0:60:09:69 SSID 'leandro'
BSS: last_scan_res_used=2/32 last_scan_full=0
wlp0s29f7u5: New scan results available
wlp0s29f7u5: Selecting BSS from priority group 0
wlp0s29f7u5: 0: cc:33:bb:13:8a:f4 ssid='BTHub4-GRK6' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=10
wlp0s29f7u5: selected based on RSN IE
wlp0s29f7u5: selected BSS cc:33:bb:13:8a:f4 ssid='BTHub4-GRK6'
wlp0s29f7u5: Request association: reassociate: 0 selected: cc:33:bb:13:8a:f4 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
wlp0s29f7u5: Trying to associate with cc:33:bb:13:8a:f4 (SSID='BTHub4-GRK6' freq=2457 MHz)
wlp0s29f7u5: Cancelling scan request
wlp0s29f7u5: WPA: clearing own WPA/RSN IE
wlp0s29f7u5: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID cc:33:bb:13:8a:f4
RSN: No PMKSA cache entry found
wlp0s29f7u5: RSN: using IEEE 802.11i/D9.0
wlp0s29f7u5: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
wlp0s29f7u5: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
wlp0s29f7u5: WPA: using GTK TKIP
wlp0s29f7u5: WPA: using PTK CCMP
wlp0s29f7u5: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPAioctl[SIOCSIWFREQ]: Device or resource busy
IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp0s29f7u5: No keys have been configured - skip key clearing
wlp0s29f7u5: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Limit connection to BSSID cc:33:bb:13:8a:f4 freq=2457 MHz based on scan results (bssid_set=0)
wlp0s29f7u5: set_disable_max_amsdu: -1
wlp0s29f7u5: set_ampdu_factor: -1
wlp0s29f7u5: set_ampdu_density: -1
wlp0s29f7u5: set_disable_ht40: 0
wlp0s29f7u5: set_disable_sgi: 0
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlp0s29f7u5: Association request to the driver failed
wlp0s29f7u5: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=27
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=65
AssocResp IE wireless event - hexdump(len=49): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 08 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 05 00 09 86 01 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: cc:33:bb:13:8a:f4
wlp0s29f7u5: Event ASSOCINFO (4) received
wlp0s29f7u5: Association info event
resp_ies - hexdump(len=49): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 08 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 05 00 09 86 01 00
wlp0s29f7u5: Event ASSOC (0) received
wlp0s29f7u5: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlp0s29f7u5: Associated to a new BSS: BSSID=cc:33:bb:13:8a:f4
wlp0s29f7u5: No keys have been configured - skip key clearing
wlp0s29f7u5: Associated with cc:33:bb:13:8a:f4
wlp0s29f7u5: WPA: Association event - clear replay counter
wlp0s29f7u5: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
wlp0s29f7u5: Setting authentication timeout: 10 sec 0 usec
wlp0s29f7u5: Cancelling scan request
wlp0s29f7u5: RX EAPOL from cc:33:bb:13:8a:f4
wlp0s29f7u5: Setting authentication timeout: 10 sec 0 usec
wlp0s29f7u5: IEEE 802.1X RX: version=1 type=3 length=95
wlp0s29f7u5: EAPOL-Key type=2
wlp0s29f7u5: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp0s29f7u5: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp0s29f7u5: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp0s29f7u5: WPA: RX message 1 of 4-Way Handshake from cc:33:bb:13:8a:f4 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): ab ec fb 19 6f 98 4a 00 75 78 4a 0d e0 37 fd d2 c3 44 29 66 2b 7e 93 57 06 0a f5 68 1b 02 aa fa
WPA: PTK derivation - A1=e8:4e:06:14:7a:77 A2=cc:33:bb:13:8a:f4
WPA: Nonce1 - hexdump(len=32): ab ec fb 19 6f 98 4a 00 75 78 4a 0d e0 37 fd d2 c3 44 29 66 2b 7e 93 57 06 0a f5 68 1b 02 aa fa
WPA: Nonce2 - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlp0s29f7u5: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): c1 ea 02 f5 f1 e3 47 51 44 b9 05 4b 04 37 bc 2a
wlp0s29f7u5: RX EAPOL from cc:33:bb:13:8a:f4
wlp0s29f7u5: IEEE 802.1X RX: version=1 type=3 length=175
wlp0s29f7u5: EAPOL-Key type=2
wlp0s29f7u5: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp0s29f7u5: key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): da 02 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4c 67 eb c0 a0 be 0f ac 28 36 7d da e5 f2 b9 08
RSN: encrypted key data - hexdump(len=80): a5 39 e0 01 c0 2b 4b 12 f5 2d de e5 5f 1e 41 a3 f7 27 13 a6 cc 9a 94 a7 cb a5 7c 69 1c 3e 0f 4c 93 a5 93 7b cc c3 2b fc 20 47 ba d5 f3 60 5f c9 70 cb 71 b1 01 81 31 95 b0 a3 15 ef b6 fe f4 87 02 6d 7d f7 11 02 db b4 c3 92 ea ce 6e f3 a9 13
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp0s29f7u5: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp0s29f7u5: WPA: RX message 3 of 4-Way Handshake from cc:33:bb:13:8a:f4 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 9c 1c 9f 0b f1 8d 96 63 e1 a9 8e e6 f8 74 95 71 ee 71 65 d5 e5 3e df 4c 42 ae 80 a1 e3 b1 a7 5f dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp0s29f7u5: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): f9 ab 08 31 3c b6 d4 55 6b 2f 39 9d bb 9a 99 a8
wlp0s29f7u5: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlp0s29f7u5: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp0s29f7u5: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): da 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
wlp0s29f7u5: WPA: Key negotiation completed with cc:33:bb:13:8a:f4 [PTK=CCMP GTK=TKIP]
wlp0s29f7u5: Cancelling authentication timeout
wlp0s29f7u5: State: GROUP_HANDSHAKE -> COMPLETED
wlp0s29f7u5: CTRL-EVENT-CONNECTED - Connection to cc:33:bb:13:8a:f4 completed [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
장치 정보:
# lsusb | grep WLAN
Bus 004 Device 004: ID 0bda:8178 Realtek Semiconductor Corp. RTL8192CU 802.11n WLAN Adapter
펌웨어:rtlwifi/rtl8192cufw.bin
인터페이스 드라이버:rtl8192cu
운영 체제:
# uname -a
Linux archiso 3.10.10-1-ARCH #1 SMP PREEMPT Fri Aug 30 11:30:06 CEST 2013 x86_64 GNU/Linux
진행은 일반적으로 EAPOL: disable timer tick
계속되기 전에 몇 초 동안 대기열에서 일시 중지됩니다.
어떤 아이디어가 잘못되었을 수 있습니까? 나에게 출력은 대부분 그리스어입니다.
최대한 빨리 사용하기 위해 연결이 설정된 경우 DHCP 임대 갱신과 같은 다른 작업을 백그라운드에서 수행해야 합니까?
마지막으로 -40dB는 "허용 가능한" 링크 품질로 간주됩니까?
고쳐 쓰다: dmesg
지금은 다음과 같은 것들이 많이 있습니다.
wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost
cfg80211: Calling CRDA to update world regulatory domain
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 2/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 3/3)
wlp0s29f7u5: authentication with cc:33:bb:13:8a:f4 timed out
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: authenticated
wlp0s29f7u5: associating with AP with corrupt beacon and probe response
wlp0s29f7u5: associate with cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: RX AssocResp from cc:33:bb:13:8a:f4 (capab=0x431 status=0 aid=24)
wlp0s29f7u5: associated
wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost
cfg80211: Calling CRDA for country: PL
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 2/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 3/3)
wlp0s29f7u5: authentication with cc:33:bb:13:8a:f4 timed out
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: authenticated
wlp0s29f7u5: associating with AP with corrupt beacon and probe response
wlp0s29f7u5: associate with cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: RX AssocResp from cc:33:bb:13:8a:f4 (capab=0x431 status=0 aid=24)
wlp0s29f7u5: associated
wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost
여기서는 이상한 일이 많이 발생합니다.
- "손상된 비컨 및 프로브 응답"이란 무엇이며 어떻게 해결합니까?
- 영국에 있는데 왜 폴란드에 있는 것 같나요?
- 처음 세 번의 연결 시도는 항상 시간 초과되지만 네 번째 연결 시도는 성공하는 이유는 무엇입니까?
답변1
문제는 먼저 wpa_supplicant 설정입니다.-Dwext오래된. 사용-DNL80211 둘째, 아무것도 추가하지 않습니다.올가미그리고네트워크.wlp0s29f7u5초기화 스크립트에 추가하여 시작 시 로드하세요. 셋째, 넷째, NetworkManager 또는 Wicd와 같은 항목을 삭제하고 네트워크 파일을 정리하고 config_wlp0s29f7u5="dhcp"를 삭제합니다. WIFI 연결에서 DHCP를 사용하는 경우 도움이 될 것입니다. 또한 터미널에서 수퍼유저 액세스 유형을 사용하십시오.DHCPCD. 단지 재미로 많은 고통을 해결할 수 있습니다.