sudo ....

Opening raw packet socket for ifindex 11677684
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=18 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=17 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=17 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=16 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=16 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=15 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=15 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=15 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=15 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=16 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=16 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=18 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=17 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=17 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=16 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=16 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=15 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=15 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=15 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=15 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=16 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=16 dBm
RATE[0] rate=10 flags=0x2
RATE[1] rate=20 flags=0x6
RATE[2] rate=55 flags=0x6
RATE[3] rate=110 flags=0x6
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Passive scanning not supported
Flushing old station entries
Deauthenticate all stations
Mode: IEEE 802.11g Channel: 10 Frequency: 2457 MHz
Using interface wlan0 with hwaddr 00:17:9a:c9:54:b2 and ssid 'BogiHOME'
SSID - hexdump_ascii(len=8):
42 6f 67 69 48 4f 4d 45 HOME
PSK (ASCII passphrase) - hexdump_ascii(len=20):
blablabla
PSK (from passphrase) - hexdump(len=32): 62 95 e3 a1 b2 28 29 e7 29 42 81 c2 09 fd dc 24 7d 44 e8 1e 79 df d9 40 bc 7b ad 2d 18 a9 47 1a
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wlan0: Setup of interface done.
MGMT (TX callback) ACK
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Probe Request from c4:46:19:1b:7e:51 for broadcast SSID ignored
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Probe Request from c4:46:19:1b:7e:51 for broadcast SSID ignored
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA c4:46:19:1b:7e:51 sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA c4:46:19:1b:7e:51 sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=c4:46:19:1b:7e:51 auth_alg=0 auth_transaction=1 status_code=0 wep=0
New STA
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.11: authentication OK (open system)
wlan0: STA c4:46:19:1b:7e:51 MLME: MLME-AUTHENTICATE.indication(c4:46:19:1b:7e:51, OPEN_SYSTEM)
wlan0: STA c4:46:19:1b:7e:51 MLME: MLME-DELETEKEYS.request(c4:46:19:1b:7e:51)
authentication reply: STA=c4:46:19:1b:7e:51 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=c4:46:19:1b:7e:51 capab_info=0x431 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
new AID 1
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.11: associated (aid 1)
wlan0: STA c4:46:19:1b:7e:51 MLME: MLME-ASSOCIATE.indication(c4:46:19:1b:7e:51)
wlan0: STA c4:46:19:1b:7e:51 MLME: MLME-DELETEKEYS.request(c4:46:19:1b:7e:51)
wlan0: STA c4:46:19:1b:7e:51 WPA: event 1 notification
wlan0: STA c4:46:19:1b:7e:51 WPA: start authentication
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state INITIALIZE
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.1X: unauthorizing port
WPA: c4:46:19:1b:7e:51 WPA_PTK_GROUP entering state IDLE
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state AUTHENTICATION
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state AUTHENTICATION2
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state INITPSK
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state PTKSTART
wlan0: STA c4:46:19:1b:7e:51 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: c4:46:19:1b:7e:51 TX status - version=2 type=3 length=95 - ack=1
IEEE 802.1X: 121 bytes from c4:46:19:1b:7e:51
IEEE 802.1X: version=1 type=3 length=117
wlan0: STA c4:46:19:1b:7e:51 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:17:9a:c9:54:b2 A2=c4:46:19:1b:7e:51
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA c4:46:19:1b:7e:51 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=94 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=94): [REMOVED]
IEEE 802.1X: c4:46:19:1b:7e:51 TX status - version=2 type=3 length=189 - ack=1
IEEE 802.1X: 99 bytes from c4:46:19:1b:7e:51
IEEE 802.1X: version=1 type=3 length=95
wlan0: STA c4:46:19:1b:7e:51 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: c4:46:19:1b:7e:51 WPA_PTK entering state PTKINITDONE
wlan0: STA c4:46:19:1b:7e:51 IEEE 802.1X: authorizing port
wlan0: STA c4:46:19:1b:7e:51 RADIUS: starting accounting session 4DB44E9A-00000000
wlan0: STA c4:46:19:1b:7e:51 WPA: pairwise key handshake completed (RSN)
Пользователь решил продолжить мысль 25 Апреля 2011, 00:25:58:
после выполнеия этой команды вроде как заработало.
как тебе это дело автоматизировать?
Пользователь решил продолжить мысль 25 Апреля 2011, 00:38:23:
Могу только посоветовать откатить на ту версию ядра из репозитория с которой проблем таких не было.
PS: для старта dhcp server можно записать строку:
sh -c "sleep 20; sudo /etc/init.d/dhcp3-server start"
в rc.local , выше строки exit 0.
откат это крайняя мера
у меня получается что просто не запускаются автоматом ни хостапд ни дхсп3
команды
ps -A | grep dhcpd3
ps -A | grep hostapd
выдают пустоту.
после запуска вручную все работает. добавление строчки в рк.локал результата не дали.
вот что в логе приавтозапуске дхцп3
Apr 25 00:30:17 ubuntu dhcpd:
Apr 25 00:30:17 ubuntu dhcpd: No subnet declaration for br0 (0.0.0.0).
Apr 25 00:30:17 ubuntu dhcpd: ** Ignoring requests on br0. If this is not what
Apr 25 00:30:17 ubuntu dhcpd: you want, please write a subnet declaration
Apr 25 00:30:17 ubuntu dhcpd: in your dhcpd.conf file for the network segment
Apr 25 00:30:17 ubuntu dhcpd: to which interface br0 is attached. **
Apr 25 00:30:17 ubuntu dhcpd:
Apr 25 00:30:17 ubuntu dhcpd:
Apr 25 00:30:17 ubuntu dhcpd: Not configured to listen on any interfaces!
после окнчательной загрузки ручной старт проходит успешно.
может дело в том что нетворкменеджер не удален из системы а просто отключен в автозагрузке?
Пользователь решил продолжить мысль 25 Апреля 2011, 10:38:29:
все решилось отключением и удаление нетворк менеджера
http://www.it-simple.ru/?p=1483 за автозапуск дхсп спасибо все заработало. проблема как я понял в том что демон поднимается раньше чем интерфейсы.