认证用radius架设的,
`/usr/bin/wpa_supplicant -c/etc/wpa_supplicant/wpa_supplicant-wlan0.conf -iwlan0`
用这个配置连的时候
/etc/wpa_supplicant/wpa_supplicant-wlan0.conf
ctrl_interface=/run/wpa_supplicant
ctrl_interface_group=wheel
network={
ssid="LYDD-5G"
proto=RSN WPA
key_mgmt=WPA-EAP
auth_alg=OPEN
eap=PEAP
ca_cert="/etc/wpa_supplicant/ca.crt"
identity="atmouse"
password="mypassword"
phase1="peaplabel=0"
phase2="auth=MSCHAPV2"
}
2.3没问题,不会 reason=15 断开
用2.4版本的时候
每当连接上去,过8秒就又断开了,然后又重连
log
Apr 25 17:48:38 ArchCC kernel: cfg80211: Calling CRDA to update world regulatory domain
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: SME: Trying to authenticate with 78:24:af:e6:41:14 (SSID='LYDD-5G' freq=5745 MHz)
Apr 25 17:48:39 ArchCC kernel: wlan0: authenticate with 78:24:af:e6:41:14
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: Trying to associate with 78:24:af:e6:41:14 (SSID='LYDD-5G' freq=5745 MHz)
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: Associated with 78:24:af:e6:41:14
Apr 25 17:48:39 ArchCC kernel: wlan0: send auth to 78:24:af:e6:41:14 (try 1/3)
Apr 25 17:48:39 ArchCC kernel: wlan0: authenticated
Apr 25 17:48:39 ArchCC kernel: wlan0: associate with 78:24:af:e6:41:14 (try 1/3)
Apr 25 17:48:39 ArchCC kernel: wlan0: RX AssocResp from 78:24:af:e6:41:14 (capab=0x1011 status=0 aid=1)
Apr 25 17:48:39 ArchCC kernel: wlan0: associated
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.com/CN=Example Certificate
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=FR/ST=Radius/O=Example Inc./CN=Example Server Certificate/emailAddress=admin@example.com' has
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: EAP-MSCHAPV2: Authentication succeeded
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
Apr 25 17:48:39 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
Apr 25 17:48:47 ArchCC kernel: wlan0: deauthenticated from 78:24:af:e6:41:14 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Apr 25 17:48:47 ArchCC wpa_supplicant[8028]: wlan0: CTRL-EVENT-DISCONNECTED bssid=78:24:af:e6:41:14 reason=15
Apr 25 17:48:47 ArchCC kernel: cfg80211: Calling CRDA to update world regulatory domain
最近编辑记录 atmouse (2015-04-25 20:28:48)
离线
网上搜了下,没人说清楚4WAY_HANDSHAKE_TIMEOUT怎么解决
去搜了下changelog http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog
发现更新较大,都不知道需要改哪里,暂时只能用回2.3
最近编辑记录 atmouse (2015-04-25 20:03:59)
离线
瞄了一眼 changelog,看到
* allow TLS v1.1 and v1.2 to be negotiated by default; previous behavior
of disabling these can be configured to work around issues with broken
servers with phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1"
解决了
最近编辑记录 atmouse (2015-04-25 20:30:09)
离线
离线