LINUX.ORG.RU

wifi aдаптер D-link DWA-125 rev a3


0

1

имею комп с ubuntu 12.04. пытаюсь заставить заработать на нем Wi-fi брелок от D-link DWA-125 rev a3. из коробки не работал, скачал драйвер, собрал , установил. адаптер радостно замигал, появился в списке устройств

ifconfig ra0 up
root@starkh:/var/log# ifconfig
eth0      Link encap:Ethernet  HWaddr 00:13:d4:d2:c5:9d  
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
          Interrupt:19 

lo        Link encap:Локальная петля (Loopback)  
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:450 errors:0 dropped:0 overruns:0 frame:0
          TX packets:450 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:36260 (36.2 KB)  TX bytes:36260 (36.2 KB)

ra0       Link encap:Ethernet  HWaddr 28:10:7b:4a:86:35  
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1344 errors:0 dropped:0 overruns:0 frame:0
          TX packets:511 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:167615 (167.6 KB)  TX bytes:54212 (54.2 KB)

и даже видит список сетей.

root@starkh:/var/log# iwlist scanning
lo        Interface doesn't support scanning.

ra0       Scan completed :
          Cell 01 - Address: E0:CB:4E:7A:B6:C5
                    Protocol:802.11b/g
                    ESSID:"stark_wire"
                    Mode:Managed
                    Frequency:2.412 GHz (Channel 1)
                    Quality=26/100  Signal level=-79 dBm  Noise level=-74 dBm
                    Encryption key:on
                    Bit Rates:54 Mb/s
                    IE: IEEE 802.11i/WPA2 Version 1
                        Group Cipher : WEP-40
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : PSK

eth0      Interface doesn't support scanning.

stark_wire - моя домашняя сеть(ноутбук к ней цепляется без проблем). network manager отказывается видеть устройство. пытаюсь настроить сеть вручную.. не получается..подробности будут позже..



Последнее исправление: ubunter (всего исправлений: 1)

1) в /etc/network/interfaces добавил

iface ra0 inet dhcp
wpa-driver wext
wpa-ssid stark_wire
wpa-ap-scan 1
wpa-proto RSN
wpa-pairwise TKIP
wpa-group TKIP
wpa-key-mgmt WPA-PSK
wpa-psk 0a123b759ce141ee37c470de0c6dd3aea91a8b2884189d6a8db59d617e5d4de6
auto ra0

при попытке поднять интерфейс

ifup ra0
висит вечно. в /var/log/syslog пишет
Jan  9 20:44:46 starkh kernel: [ 2973.579292] /home/stark/temp/wifi_driver/DPO_RT5572_LinuxSTA_2.6.1.3_20121022/os/linux/../../common/cmm_asic.c:2630 assert KeyIdx < 4failed
Jan  9 20:44:46 starkh kernel: [ 2973.579917] /home/stark/temp/wifi_driver/DPO_RT5572_LinuxSTA_2.6.1.3_20121022/os/linux/../../common/cmm_asic.c:2630 assert KeyIdx < 4failed
Jan  9 20:44:47 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 3
Jan  9 20:44:50 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 3
Jan  9 20:44:52 starkh kernel: [ 2979.632945] ===>rt_ioctl_giwscan. 1(1) BSS returned, data->length = 136
Jan  9 20:44:53 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 4
Jan  9 20:44:57 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 11
Jan  9 20:45:02 starkh kernel: [ 2989.639184] ===>rt_ioctl_giwscan. 1(1) BSS returned, data->length = 136
Jan  9 20:45:08 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 21
Jan  9 20:45:12 starkh kernel: [ 2999.644087] ===>rt_ioctl_giwscan. 2(2) BSS returned, data->length = 271
Jan  9 20:45:22 starkh kernel: [ 3009.650324] ===>rt_ioctl_giwscan. 2(2) BSS returned, data->length = 271
Jan  9 20:45:29 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 8
Jan  9 20:45:32 starkh kernel: [ 3019.656078] ===>rt_ioctl_giwscan. 2(2) BSS returned, data->length = 271
Jan  9 20:45:37 starkh dhclient: DHCPDISCOVER on ra0 to 255.255.255.255 port 67 interval 15
Jan  9 20:45:42 starkh kernel: [ 3029.662289] ===>rt_ioctl_giwscan. 2(2) BSS returned, data->length = 271

ubunter
() автор топика
Ответ на: комментарий от ubunter

попробовал запустить через wpa_supplicant

wpa_supplicant -Dwext -ira0 -c wpa_supplicant.conf -d
Initializing interface 'ra0' conf 'wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa_supplicant.conf' -> '/etc/network/wpa_supplicant.conf'
Reading configuration file '/etc/network/wpa_supplicant.conf'
Priority group 0
   id=0 ssid='stark_wire'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 28:10:7b:4a:86:35
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): af 7a 70 2c 6b 39 53 f9 92 1c 45 bb be 85 1d 05
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
Added interface ra0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 5 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
Scan timeout - try to get results
Received 136 bytes of scan results (1 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID e0:cb:4e:7a:b6:c5 SSID 'stark_wire'
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: e0:cb:4e:7a:b6:c5 ssid='stark_wire' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP e0:cb:4e:7a:b6:c5 ssid='stark_wire'
Trying to associate with e0:cb:4e:7a:b6:c5 (SSID='stark_wire' freq=2412 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 2 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 01 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK WEP40
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 01 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWGENIE]: Operation not supported
wpa_driver_wext_set_psk
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b1a len=18
Authentication with e0:cb:4e:7a:b6:c5 timed out.
Added BSSID e0:cb:4e:7a:b6:c5 into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 0 bytes of scan results (0 BSSes)
BSS: Start scan result update 2
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No APs found - clear blacklist and try again
Removed BSSID e0:cb:4e:7a:b6:c5 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable network found
Setting scan request: 5 sec 0 usec
Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 5 seconds
Scan timeout - try to get results
Received 271 bytes of scan results (2 BSSes)
BSS: Start scan result update 3
BSS: Add new id 1 BSSID cc:b2:55:19:b3:04 SSID 'ufanet118'
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: e0:cb:4e:7a:b6:c5 ssid='stark_wire' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP e0:cb:4e:7a:b6:c5 ssid='stark_wire'
Trying to associate with e0:cb:4e:7a:b6:c5 (SSID='stark_wire' freq=2412 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 2 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 01 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK WEP40
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 01 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWGENIE]: Operation not supported
wpa_driver_wext_set_psk
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
Wireless event: cmd=0x8b1a len=18
Authentication with e0:cb:4e:7a:b6:c5 timed out.
Added BSSID e0:cb:4e:7a:b6:c5 into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
Setting scan request: 0 sec 0 usec
ubunter
() автор топика

О! У меня такой же был...так и не смог заставить его работать под линуксом.

Batters
()
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.