Unix & Linux Stack Exchange
Q&A for users of Linux, FreeBSD and other Unix-like operating systems
Latest Questions
4
votes
1
answers
3758
views
Wifi with WPA2-EAP MS-CHAPv2 authentication (username and password) during Debian installation
I am currently attempting to install Debian on my laptop computer. During the network configuration stage, I am prompted to "enter a passphrase for WPA/WPA2 PSK authentication". Unfortunately, I am on my school's network which requires both a username and a password, with the [MS-CHAPv2](https://en....
I am currently attempting to install Debian on my laptop computer. During the network configuration stage, I am prompted to "enter a passphrase for WPA/WPA2 PSK authentication". Unfortunately, I am on my school's network which requires both a username and a password, with the [MS-CHAPv2](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#MS-CHAPv2) authentication protocol. What should I enter at the prompt?
I have an Ubuntu computer which can connect to this network. Here are the contents of
/etc/NetworkManager/system-connections/NetworkName
:
[ipv6]
method=auto
[connection]
id=NetworkName
uuid=3e728a68-a877-4681-bc0e-1e64b2ff6434
type=802-11-wireless
[802-11-wireless-security]
key-mgmt=wpa-eap
auth-alg=open
[802-11-wireless]
ssid=NetworkName
mode=infrastructure
mac-address=84:A6:C8:A9:67:DA
security=802-11-wireless-security
[802-1x]
eap=ttls;
identity=username
phase2-auth=mschapv2
password-flags=1
[ipv4]
method=auto
Curiously enough, the password I enter to connect to NetworkName doesn't appear anywhere.
EDIT 2: Screenshot of network connection process (in a live-boot Ubuntu)

Alessandro Power
(305 rep)
May 25, 2015, 06:34 PM
• Last activity: Aug 3, 2025, 11:03 AM
1
votes
1
answers
12984
views
Ubuntu 18.04 netplan configuration for WPA-EAP
##Background I'm using `Ubuntu 18.04 server` (on a laptop, for development) and am trying to get my wifi configured to work with an `WPA-EAP` network. - To enable Wifi I followed the guide [Wifi on Ubuntu 18 server](https://gist.github.com/austinjp/9b968c75c3e54004be7cd7a134881d85) - I looked at the...
##Background
I'm using
Ubuntu 18.04 server
(on a laptop, for development) and am trying to get my wifi configured to work with an WPA-EAP
network.
- To enable Wifi I followed the guide [Wifi on Ubuntu 18 server](https://gist.github.com/austinjp/9b968c75c3e54004be7cd7a134881d85)
- I looked at the [Netplan Examples](https://netplan.io/examples) (none with WPA-EAP )
- I've read the [Netplan Full Documentation](https://github.com/CanonicalLtd/netplan/blob/master/doc/netplan.md) .
I've got netplan to work with an an open network, even with a password protected network, but haven't been able to get it to work with WPA-EAP
where both an identity and password are required.
##Attempted Configuration
I've tried this in my /etc/netplan/config.yaml
file:
network:
wifis:
wlp1s0:
dhcp4: yes
access-points:
"My-Enterprise-Network":
auth:
key-management: eap
identity: johndoe1
password: pass1234
But when I run netplan apply
I get:
Error in network definition /etc/netplan/config.yaml: unknown key auth
##From the Documentation
From the [online netplan documentation](https://github.com/CanonicalLtd/netplan/blob/master/doc/netplan.md) :
The `auth
` block supports the following properties:
`key-management
` (scalar)
: The supported key management modes are `none
` (no key management);
`psk
(WPA with pre-shared key, common for home wifi);
eap
` (WPA
with EAP, common for enterprise wifi); and `802.1x
` (used primarily
for wired Ethernet connections).
`password
` (scalar)
: The password string for EAP, or the pre-shared key for WPA-PSK.
The following properties can be used if `key-management
is
eap
`
or `802.1x
`:
`method
` (scalar)
: The EAP method to use. The supported EAP methods are `tls
` (TLS),
`peap
(Protected EAP), and
ttls
` (Tunneled TLS).
`identity
` (scalar)
: The identity to use for EAP.
## From man netplan
access-points (mapping)
This provides pre-configured connections to NetworkManager.
Note that users can of course select other access points/SSIDs.
The keys of the mapping are the SSIDs, and the values are mappings
with the following supported properties:
password (scalar)
Enable WPA2 authentication and set the passphrase for it.
If not given, the network is assumed to be open.
**Other authentication modes are not currently supported.**
Note the last line: Other authentication modes are not currently supported.
###Questions
1. What's the right way to use netplan with WPA-EAP?
1. Does Ubuntu 18.04 ship with an outdated version of netplan? ( netplan --version
is not supported ) Hence perhaps why the online documentation has options that the man
version does not?
1. If so, can I upgrade netplan to a more cutting edge release?
1. Or does netplan need to be used with something like a wpa_supplicant.conf
to specify additional parameters?
cwd
(46887 rep)
Dec 18, 2018, 07:23 PM
• Last activity: Jul 15, 2025, 11:03 AM
4
votes
1
answers
3013
views
Troubleshooting "DEAUTH_LEAVING" error when connecting to WPA2-Enterprise network after Linux upgrade
I'm not able to solve this error ```text [ 666.695694] wlan0: deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason: 3=DEAUTH_LEAVING) ``` I obtain the error only when I'm trying to connect to a WPA2-Enterprise network (`EAP-MSCHAP2`). Other connections work well without any error. This er...
I'm not able to solve this error
[ 666.695694] wlan0: deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason: 3=DEAUTH_LEAVING)
I obtain the error only when I'm trying to connect to a WPA2-Enterprise network (EAP-MSCHAP2
). Other connections work well without any error.
This error has been obtained after a Linux upgrade, currently I'm using
Linux root 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/Linux
Lurking I've seen a possible cause to this problem: the TLSv1.2 support has been disabled. I've seen several solutions with wpa_supplicant
, but I'm using NetworkManager
. I've also tried to configure wpa_supplicant
without any result.
What can I do?
Rtmd
(41 rep)
Dec 5, 2018, 09:35 AM
• Last activity: Jun 13, 2025, 06:03 PM
0
votes
1
answers
3433
views
how to connect to wpa2/peap/mschapv2 w/no ca certificate without wpa_supplicant
i have followed posts on Network Manager looping to connect to enterprise networks and coming back again and again asking for logon/password. the answer seems to be to use wpa_supplicant. i did a log file extract to confirm the process and got ...supplicant interface state: disconnected -> interface...
i have followed posts on Network Manager looping to connect to enterprise networks and coming back again and again asking for logon/password. the answer seems to be to use wpa_supplicant.
i did a log file extract to confirm the process and got ...supplicant interface state: disconnected -> interface_disabled...
there is a directory at /etc/wpa_supplicant, but there is no wpa_supplicant config file. the only files listed are action_wpa.sh functions.sh ifupdown.sh i guess that there are a few things i need to do?
some perspective here: i am just trying to learn python, using an excellent on-line course from 'degreed' at work and doing the exercises on an old 32bit laptop running mx-linux and a compatible 32bit version of PyCharm Community Edition. my knowledge of network stuff can't fill the bottom of a thimble. so feel free to assume i haven't found the beginning of the string on this issue with logging in.
any suggestions at starting points would be appreciated.
thanks, ron
ron@9-LPTOP:~
$ sudo journalctl -fu NetworkManager
[sudo] password for ron:
-- Journal begins at Tue 2023-01-24 14:43:06 EST. --
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.0956] device (wlan0): supplicant interface state: disconnected -> interface_disabled
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.0957] modem-manager: ModemManager no longer available
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.1027] device (wlan0): supplicant interface state: interface_disabled -> disconnected
Jan 24 14:55:54 9-LPTOP systemd: Stopping Network Manager...
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.5312] caught SIGTERM, shutting down normally.
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.5338] device (wlan0): state change: disconnected -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed')
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.5468] device (wlan0): set-hw-addr: reset MAC address to 00:19:D2:05:A7:9D (unmanage)
Jan 24 14:55:54 9-LPTOP NetworkManager: [1674590154.6549] exiting (success)
Jan 24 14:55:54 9-LPTOP systemd: NetworkManager.service: Succeeded.
Jan 24 14:55:54 9-LPTOP systemd: Stopped Network Manager.
rny1so
(1 rep)
Aug 18, 2023, 07:29 PM
• Last activity: May 28, 2025, 10:09 AM
2
votes
1
answers
110
views
wpa_supplicant fails to connect to a eduroam-like network due to OpenSSL invalid digest
After a reinstall of Fedora Linux Asahi Remix 41, I am unable to connect to my school network (essentially EDUROAM but with different a username format, and it only supports TLS v1.0). wpa_supplicant says: ``` OpenSSL: Certificate Policy 2.16.840.1.114413.1.7.23.1 OpenSSL: Certificate Policy 2.23.14...
After a reinstall of Fedora Linux Asahi Remix 41, I am unable to connect to my school network (essentially EDUROAM but with different a username format, and it only supports TLS v1.0).
wpa_supplicant says:
OpenSSL: Certificate Policy 2.16.840.1.114413.1.7.23.1
OpenSSL: Certificate Policy 2.23.140.1.2.1
wlp1s0f0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=*.ykpaoschool.cn' hash=50cf9ba1cb6ecb72b702a01c4a4cb44118d552c12c50fd973214e75404eec0ec
wlp1s0f0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:*.ykpaoschool.cn
wlp1s0f0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ykpaoschool.cn
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/CN=*.ykpaoschool.cn'
EAP: Status notification: remote certificate verification (param=success)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read server certificate
OpenSSL: RX ver=0x301 content_type=22 (handshake/server key exchange)
OpenSSL: TX ver=0x301 content_type=256 (TLS header info/)
OpenSSL: TX ver=0x301 content_type=21 (alert/)
SSL: (where=0x4008 ret=0x250)
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:internal error
EAP: Status notification: local TLS alert (param=internal error)
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in error
OpenSSL: openssl_handshake - SSL_connect error:03000098:digital envelope routines::invalid digest
OpenSSL: pending error: error:0A080006:SSL routines::EVP lib
SSL: 7 bytes pending from ssl_out
SSL: Using TLS version TLSv1
SSL: Failed - tls_out available to report error (len=7)
SSL: 7 bytes left to be sent out (of total 7 bytes)
EAP-PEAP: TLS processing failed
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL eapRespData=0xaaab3fef3eb0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=94:9b:2c:f1:34:b1
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=94:9b:2c:f1:34:b1 len=8
wlp1s0f0: RX EAPOL from 94:9b:2c:f1:34:b1 (encrypted=-1)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0f0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 94:9b:2c:f1:34:b1
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0f0: Setting authentication timeout: 2 sec 0 usec
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0f0
nl80211: Disconnect event
wlp1s0f0: Event DEAUTH (11) received
wlp1s0f0: Deauthentication notification
wlp1s0f0: * reason 23 (IEEE_802_1X_AUTH_FAILED)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0f0: CTRL-EVENT-DISCONNECTED bssid=94:9b:2c:f1:34:b1 reason=23
wlp1s0f0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="STUWIRELESS" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0f0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
dmesg:
[ 1533.442699] net_ratelimit: 125 callbacks suppressed
[ 1533.442708] ieee80211 phy0: brcmf_p2p_set_firmware: failed to update device address ret -52
[ 1533.443311] ieee80211 phy0: brcmf_p2p_create_p2pdev: set p2p_disc error
[ 1533.443316] ieee80211 phy0: brcmf_cfg80211_add_iface: add iface p2p-dev-wlp1s0f type 10 failed: err=-52
[ 1533.538847] brcmfmac: brcmf_msgbuf_delete_flowring: timed out waiting for txstatus
[ 1534.525047] ieee80211 phy0: brcmf_set_key_mgmt: get okc_enable failed (-52)
[ 1543.347249] brcmfmac: brcmf_msgbuf_delete_flowring: timed out waiting for txstatus
[ 1543.445268] brcmfmac: brcmf_msgbuf_delete_flowring: timed out waiting for txstatus
[ 1547.071226] ieee80211 phy0: brcmf_fweh_call_event_handler: no interface object
[ 1547.074547] ieee80211 phy0: brcmf_p2p_set_firmware: failed to update device address ret -52
[ 1547.074832] ieee80211 phy0: brcmf_p2p_create_p2pdev: set p2p_disc error
[ 1547.074835] ieee80211 phy0: brcmf_cfg80211_add_iface: add iface p2p-dev-wlp1s0f type 10 failed: err=-52
[ 1548.111938] ieee80211 phy0: brcmf_set_key_mgmt: get okc_enable failed (-52)
[ 1548.411429] brcmfmac: brcmf_msgbuf_delete_flowring: timed out waiting for txstatus
[ 1559.760149] ieee80211 phy0: brcmf_set_key_mgmt: get okc_enable failed (-52)
[ 1596.969459] ieee80211 phy0: brcmf_set_key_mgmt: get okc_enable failed (-52)
wpa_supplicant config:
ap_scan=1
mac_addr=0
# means use permanent mac address, as my school requires us to not use random mac addresses
network={
ssid="STUWIRELESS"
scan_ssid=1
key_mgmt=WPA-EAP
eap=PEAP
anonymous_identity="s22537"
identity="s22537"
password="redacted"
phase1="tls_disable_tlsv1_0=0 tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=1"
# because they only support tls v1.0
phase2="auth=MSCHAPV2"
priority=10
}
Runxi Yu
(143 rep)
Feb 25, 2025, 12:58 PM
• Last activity: Feb 25, 2025, 01:17 PM
0
votes
1
answers
155
views
Network Manager requires a bunch of manual configuration to connect to WPA Enterprise wifi networks. Why?
Connecting to WPA enterprise networks on Windows is straightforward: 1. Select the network 2. Enter your username and password 3. Confirm that, yes, the network is expected to be available at this location ...and you're good to go. Network Manager, on the other hand, requires a ton of manual configu...
Connecting to WPA enterprise networks on Windows is straightforward:
1. Select the network
2. Enter your username and password
3. Confirm that, yes, the network is expected to be available at this location
...and you're good to go.
Network Manager, on the other hand, requires a ton of manual configuration steps whose defaults often don't work, at least on Ubuntu flavors. It doesn't even default to using the system CA certificates and forces you to select one.
Eduroam is a good example - it's so complex that Eduroam has to provide an app to connect to the network on new devices. Why is this the case? Is Windows just trying a bunch of things until they work, or is it privvy to some additional autoconfiguration protocol that Linux doesn't/can't use?
Ethan T
(161 rep)
Nov 14, 2024, 05:44 PM
• Last activity: Nov 14, 2024, 06:58 PM
12
votes
2
answers
7879
views
How to view the WPA2 PEAP certificate offered by an AP?
I have to connect to a WPA2 Enterprise network which only works if I don't verify the certificate. I would prefer not to do this, because this way anyone can see the MSCHAPv2 messages. The first step to fixing this would be looking at the certificate offered by the AP, then configuring wpa_supplican...
I have to connect to a WPA2 Enterprise network which only works if I don't verify the certificate. I would prefer not to do this, because this way anyone can see the MSCHAPv2 messages.
The first step to fixing this would be looking at the certificate offered by the AP, then configuring wpa_supplicant to only trust that one. But I don't know how to get the certificate. The wpa_cli "status" command doesn't show it and it's not in any logs.
I'm also curious about which SSL/TLS cipher suites are used. Is it possible to connect manually, maybe with openssl s_client?
stribika
(5564 rep)
Dec 30, 2016, 02:14 AM
• Last activity: Feb 21, 2024, 12:29 AM
0
votes
0
answers
933
views
Unable to connect to university WPA2 enterprise wifi
I am using NetworkManager on arch to connect to my university WiFi. I used nm-connection-editor to create the connection. Here is the config: ```[connection] id=ESSID uuid=b18a2b1c-02f6-48cd-a49d-a91e95cb80ed type=wifi interface-name=wlan0 timestamp=1694114242 [wifi] bssid=80:8D:B7:57:E4:81 cloned-m...
I am using NetworkManager on arch to connect to my university WiFi. I used nm-connection-editor to create the connection. Here is the config:
[connection]
id=ESSID
uuid=b18a2b1c-02f6-48cd-a49d-a91e95cb80ed
type=wifi
interface-name=wlan0
timestamp=1694114242
[wifi]
bssid=80:8D:B7:57:E4:81
cloned-mac-address=random
mac-address=MAC_ADDRESS
mode=infrastructure
ssid=SSID
[wifi-security]
key-mgmt=wpa-eap
[802-1x]
anonymous-identity=anon@SCHOOL.edu
domain-suffix-match=SCHOOL.edu
eap=peap;
identity=SCHOOL_EMAIL
password=PASSWORD
phase2-auth=mschapv2
[ipv4]
method=auto
[ipv6]
addr-gen-mode=stable-privacy
method=auto
When I use iwctl to connect to the network, I get Error: Failed to add/activate new connection: Failed to determine AP security information
.
I selected no CA certificate required, and I know I don't because my phone worked without one either. What am I doing wrong? Let me know what other information to put here if needed.
Jacob
(1 rep)
Sep 7, 2023, 08:24 PM
• Last activity: Sep 12, 2023, 03:29 PM
5
votes
2
answers
3108
views
Can't connect to eduroam via `wpa_supplicant`:
I'm on my new Debian Stretch system and I'd like to connect to my university eduroam network. I'm not using GNOME or any DM, so I manage my connections via `nmcli`. However, from what I gather, it seems that [`nmcli` doesn't support][1] this kind of connections. Too bad. Then I decided to try with j...
I'm on my new Debian Stretch system and I'd like to connect to my university eduroam network. I'm not using GNOME or any DM, so I manage my connections via
nmcli
.
However, from what I gather, it seems that nmcli
doesn't support this kind of connections. Too bad. Then I decided to try with just wpa_supplicant
and I found this configuration file which supposedly should work out of the box in most cases. But not for me.
After editing the relevant parts, I tried with
sudo wpa_supplicant -i wlp5s0 -c eduroam.conf
And the output is something along these lines:
Successfully initialized wpa_supplicant
wlp5s0: SME: Trying to authenticate with 64:f6:9d:6a:bd:00 (SSID='eduroam' freq=2412 MHz)
wlp5s0: Trying to associate with 64:f6:9d:6a:bd:00 (SSID='eduroam' freq=2412 MHz)
wlp5s0: Associated with 64:f6:9d:6a:bd:00
wlp5s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=ES
wlp5s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK
wlp5s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
wlp5s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
wlp5s0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA' hash=3e9099b5015e8f486c00bcea9d111ee721faba355a
89bcf1df69561e3dc6325c
wlp5s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' hash=beb8efe9b1a73c841b375a90e5fff8048848e3a2af66f6c4dd7
b938d6fe8c5d8
wlp5s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=ES/ST=Granada/L=Granada/O=Universidad de Granada/OU=CSIRC/CN=radius.ugr.es' hash=828fbec918c62256ea67a9737ac44b578a6b
fb39ff2ef1d6f7cdb3eeea4db8b5
wlp5s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.ugr.es
EAP-TLV: TLV Result - Failure
wlp5s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
wlp5s0: Authentication with 64:f6:9d:6a:bd:00 timed out.
wlp5s0: CTRL-EVENT-DISCONNECTED bssid=64:f6:9d:6a:bd:00 reason=3 locally_generated=1
wlp5s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
and then it goes all over again. I don't really know what the EAP-TLV: TLV Result - Failure
message means. I've tried to Google for some troubleshooting to no avail.
As per the common advices:
* I'm disabling NetworkManager before testing the connection
* I'm making sure there is only one wpa_supplicant
instance running
cronos2
(203 rep)
Nov 22, 2017, 07:49 PM
• Last activity: Feb 8, 2023, 09:22 PM
2
votes
1
answers
3485
views
Extracting a CA Certificate from an Enterprise WiFi (EAP) Network
I have a work network which is an EAP enterprise WiFi network using `PEAP` and `MSCHAPv2`. I unfortunately don't have the CA certificate for the network, which presumably makes it trivial to harvest my credentials by spoofing the network. Is there a way for me to fetch the CA presented by the WiFi n...
I have a work network which is an EAP enterprise WiFi network using
PEAP
and MSCHAPv2
. I unfortunately don't have the CA certificate for the network, which presumably makes it trivial to harvest my credentials by spoofing the network.
Is there a way for me to fetch the CA presented by the WiFi network so I can set it as the CA certificate to prevent spoofing?
---
**EDIT**: According to [Wikipedia on PEAP](https://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocol) , the WiFi server uses a CA for signing its server-side certificate for trust:
> A CA certificate must be used at each client to authenticate the server to each client before the client submits authentication credentials. If the CA certificate is not validated, in general it is trivial to introduce a fake Wireless Access Point which then allows gathering of MS-CHAPv2 handshakes.
I need to get this CA certificate somehow from the server, as I'm sure it issues a certificate chain with the server public key certificate and the CA public key certificate. Presently it is configured without a CA certificate, allowing arbitrary spoofing:

Naftuli Kay
(41346 rep)
Feb 8, 2019, 06:44 PM
• Last activity: Oct 12, 2022, 06:59 PM
0
votes
2
answers
4226
views
Manually set wpa_supplicant driver?
I'm using a RaspberryPi 4 (4GB) and I was able to set up `/etc/wpa_supplicant/wpa_supplicant.conf` with all needed certificates properly, to authenticate at our companys wifi: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 country=US fast_reauth=1 network={ ssid="WIFI-Com" s...
I'm using a RaspberryPi 4 (4GB) and I was able to set up
Using
If I reboot the Pi and run
/etc/wpa_supplicant/wpa_supplicant.conf
with all needed certificates properly, to authenticate at our companys wifi:
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev
update_config=1
country=US
fast_reauth=1
network={
ssid="WIFI-Com"
scan_ssid=1
key_mgmt=WPA-EAP IEEE8021X
pairwise=CCMP
group=CCMP
eap=TLS
identity="user@domain.com"
ca_cert="/etc/cert/ca.pem"
client_cert="/etc/cert/client.pem"
private_key="/etc/cert/clientkey.pem"
}
Using
wpa_supplicant -i wlan0 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf
for testing, it's authenticating perfectly and obtaining a vaild IP:
Successfully initialized wpa_supplicant
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
wlan0: Trying to associate with 00:5d:71:c9:4d:ef (SSID='WIFI-Com' freq=5320 MHz)
FT: Invalid group cipher (0)
Failed to add supported operating classes IE
wlan0: Associated with 00:5d:71:c9:4d:ef
wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
tls_connection_set_params: Clearing pending SSL error: error:14187180:SSL routines:ssl_do_config:bad value
tls_connection_set_params: Clearing pending SSL error: error:14187180:SSL routines:ssl_do_config:bad value
wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/DC=com/DC=company/CN=Company Certification Authority' hash=53e1f7164f972fccfa24dc5dee64e362bed56ea014995fd990c760dd873760a7
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=COM/L=NewYork/O=Company/CN=eap.comp.com' hash=d586970276d8076bd01cdbd4258452ea291d72af282fefa80fd8f8ef55e0c471
wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
wlan0: PMKSA-CACHE-ADDED 00:5d:71:c9:4d:ef 0
wlan0: WPA: Key negotiation completed with 00:5d:71:c9:4d:ef [PTK=CCMP GTK=CCMP]
wlan0: CTRL-EVENT-CONNECTED - Connection to 00:5d:71:c9:4d:ef completed [id=0 id_str=]
$ ifconfig
wlan0: flags=4163 mtu 1500
inet 10.128.131.109 netmask 255.255.255.0 broadcast 10.188.139.255
inet6 fe80::4665:3320:1509:a176 prefixlen 64 scopeid 0x20
ether dc:a6:32:2d:3e:e2 txqueuelen 1000 (Ethernet)
RX packets 4329 bytes 1559945 (1.4 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 5734 bytes 2019622 (1.9 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
If I reboot the Pi and run
ps auxwww | grep wpa
its supposed to connect to my wifi, as it is using the command given above. But it's not, instead it used driver nl80211
. From what I experienced, it's only authenticating properly using exclusively -D wext
. Where can I edit the -D
parameters, that are used while booting?
root 334 .. 0:00 /sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
root 440 .. 0:00 wpa_supplicant -B -c/etc/wpa_supplicant/wpa_supplicant.conf -iwlan0 -Dnl80211,wext
pi 721 .. 0:00 grep --color=auto wpa
Tomblarom
(2237 rep)
Dec 19, 2019, 04:18 PM
• Last activity: May 20, 2021, 01:59 PM
0
votes
0
answers
2489
views
How to connect kali linux to a wifi using WPA2 Enterprise, using PEAP method?
I am using Kali Linux 2019.4, kernel version 5.3.0-kali2-amd64 and I have trouble connecting to my school wifi, which uses WPA2 Enterprise and uses PEAP (Protected Extensible Authentication Protocol). I tried to connect with correct credentials but it showed that Linux can't scan the access point an...
I am using Kali Linux 2019.4, kernel version 5.3.0-kali2-amd64 and I have trouble connecting to my school wifi, which uses WPA2 Enterprise and uses PEAP (Protected Extensible Authentication Protocol).
I tried to connect with correct credentials but it showed that Linux can't scan the access point and I cannot connect to the wifi. The IT department in my school told me to use Ubuntu instead but I do not want to do that unless it is the only way.
Anonymous_user
(1 rep)
Jan 6, 2020, 04:27 PM
• Last activity: Jan 6, 2020, 05:04 PM
3
votes
1
answers
15383
views
network manager can't connect to WPA2 Enterprise EAP
I am trying to connect to this WPA2 Enterprise network but it is not working. I am able to connect with my android (on my mobile I put certificate as Do not validate) phone but not with the computer, using same credentials. I am using Debian 9 with Network Manager 1.4.2. My Android phone recognize t...
I am trying to connect to this WPA2 Enterprise network but it is not working. I am able to connect with my android (on my mobile I put certificate as Do not validate) phone but not with the computer, using same credentials. I am using Debian 9 with Network Manager 1.4.2.
My Android phone recognize the network as [WPA-EAP-CCMP][WPA2-EAP-CCMP+TKIP][ESS]. This is the configuration I am using on my debian laptop:
[connection]
id=myid
uuid=uid generated by the system
type=wifi
permissions=
secondaries=
[wifi]
mac-address-blacklist=
mac-address-randomization=0
mode=infrastructure
seen-bssids=
ssid=network-ssd
[wifi-security]
group=
key-mgmt=wpa-eap
pairwise=
proto=
[802-1x]
altsubject-matches=
anonymous-identity=username (same that is working on android)
eap=peap;
identity=username
password=password (same that is working on android)
phase2-altsubject-matches=
phase2-auth=mschapv2
[ipv4]
dns-search=
method=auto
[ipv6]
addr-gen-mode=stable-privacy
dns-search=
ip6-privacy=0
method=auto
This is the error I gen in syslog:
Nov 2 17:51:56 debian wpa_supplicant: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
Nov 2 17:51:56 debian NetworkManager: [1478105516.3576] device (wlan0): supplicant interface state: associating -> associated
Nov 2 17:51:56 debian wpa_supplicant: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
Nov 2 17:51:56 debian wpa_supplicant: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Nov 2 17:51:56 debian wpa_supplicant: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
cat /usr/share/dbus-1/system-service/fi.epitest.hostap.WPASupplicant.service output:
[D-BUS Service]
Name=fi.epitest.hostap.WPASupplicant
Exec=/sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
User=root
SystemdService=wpa_supplicant.service
UPDATE: I have tried also TTLS instead of PEAP but nothing, in this case the only meaningful log I get is
Nov 3 11:04:47 debian wpa_supplicant: wlan0: SME: Trying to authenticate with 6c:XX:XX:XX:XX:XX (SSID='my-ssid' freq=2437 MHz)
Nov 3 11:04:47 debian kernel: [ 5587.074393] wlan0: authenticate with 6c:XX:XX:XX:XX:XX
Nov 3 11:04:47 debian kernel: [ 5587.090537] wlan0: send auth to 6c:XX:XX:XX:XX:XX (try 1/3)
Nov 3 11:04:47 debian kernel: [ 5587.093252] wlan0: authenticated
Nov 3 11:04:47 debian NetworkManager: [1478167487.1252] device (wlan0): supplicant interface state: scanning -> authenticating
Nov 3 11:04:52 debian kernel: [ 5592.093412] wlan0: aborting authentication with 6c:XX:XX:XX:XX:XX by local choice (Reason: 3=DEAUTH_LEAVING)
Nov 3 11:04:52 debian NetworkManager: [1478167492.1457] device (wlan0): supplicant interface state: authenticating -> disconnected
UPDATE 2: since Network Manager is installed, there is no wpa_supplicant.conf file configuration.
Any ideas?
Giorgio
(31 rep)
Nov 2, 2016, 04:58 PM
• Last activity: Oct 6, 2019, 09:18 PM
5
votes
1
answers
4557
views
How to connect to ieee8021x Network using connman
Connect to my private WPA2 Wifi with connman works like a charm (followed [this][1] instructions). But when I try to connect to ieee8021x Network, i always get this error: >Error /net/connman/service/wifi_801f024ae577_556e6974796d65646961205769666953706f74_managed_ieee8021x: Invalid arguments I supp...
Connect to my private WPA2 Wifi with connman works like a charm (followed this instructions).
But when I try to connect to ieee8021x Network, i always get this error:
>Error /net/connman/service/wifi_801f024ae577_556e6974796d65646961205769666953706f74_managed_ieee8021x: Invalid arguments
I suppose something is wrong with my config file placed in /var/lib/connman :
[global]
Name = UnityMedia
[service_umWifiSpot]
Type = wifi
SSID = 556e6974796d65646961205769666953706f74
EAP = peap
Phase2 = MSCHAPV2
Iddentit=unitymedia/myUsername
#AnonymousIdentity=anonymous@foo.edu
Passphrase=myPassword
This is how i try to connect:
connmanctl> agent on
Agent registered
connmanctl> scan wifi
connmanctl> services
*AO Wired ethernet_b827eb8920a9_cable
*AR ¯\_(ツ)_/¯ wifi_801f024ae577_c2af5c5f28e38384295f2fc2af_managed_psk
furb wifi_801f024ae577_66757262_managed_psk
Unitymedia WifiSpot wifi_801f024ae577_556e6974796d65646961205769666953706f74_managed_ieee8021x
:o) wifi_801f024ae577_3a6f29_managed_psk
ʕ•ᴥ•ʔ wifi_801f024ae577_ca95e280a2e1b4a5e280a2ca94_managed_psk
DIRECT-eE-Sonja's Fire TV wifi_801f024ae577_4449524543542d65452d536f6e6a6127732046697265205456_managed_psk
DIRECT-B9-HP ENVY 4520 series wifi_801f024ae577_4449524543542d42392d485020454e5659203435323020736572696573_managed_psk
SoHigh-WG wifi_801f024ae577_536f486967682d5747_managed_psk
o2-WLAN42 wifi_801f024ae577_6f322d574c414e3432_managed_psk
wifi_801f024ae577_hidden_managed_psk
UPC1989729 wifi_801f024ae577_55504331393839373239_managed_psk
wildline wifi_801f024ae577_77696c646c696e65_managed_psk
Internet wifi_801f024ae577_496e7465726e6574_managed_psk
UPC317EB59 wifi_801f024ae577_55504333313745423539_managed_psk
HP-Print-BE-Officejet Pro 8610 wifi_801f024ae577_48502d5072696e742d42452d4f66666963656a65742050726f2038363130_managed_none
UPC1BD68AB wifi_801f024ae577_55504331424436384142_managed_psk
Scan completed for wifi
connmanctl> connect wifi_801f024ae577_556e6974796d65646961205769666953706f74_managed_ieee8021x
Error /net/connman/service/wifi_801f024ae577_556e6974796d65646961205769666953706f74_managed_ieee8021x: Invalid arguments
Connections via this wpa_supplicant.conf works:
network={ ssid=”Unitymedia WifiSpot” key_mgmt=WPA-EAP eap=PEAP identity=”unitymedia/myUsername” password=”myPassword” }
Hope someone have an idea what i´m doing wrong?
mty
(53 rep)
Mar 27, 2019, 02:17 PM
• Last activity: May 17, 2019, 04:13 AM
6
votes
1
answers
24559
views
Setting up connection to WPA2 Enterprise (PEAP/MSCHAPv2) with two-level certificate
For a long time, I have been able to use NetworkManager + wpa_supplicant as configured in Debian 7 to connect to a secure wireless at work (which is WPA2 Enterprise, with PEAP + MSCHAPv2 authentication). Recently I want to increase the security of the connection by incorporating the server's certifi...
For a long time, I have been able to use NetworkManager + wpa_supplicant as configured in Debian 7 to connect to a secure wireless at work (which is WPA2 Enterprise, with PEAP + MSCHAPv2 authentication).
Recently I want to increase the security of the connection by incorporating the server's certificate into my Network Manager connection setting. I received two PEM keys from the network administrator:
- radius1.pem -- the RADIUS certificate
- globalsign_intermediary.pem -- the intermediary certificate
The RADIUS cert depends on the intermediary cert for its authenticity; and the intermediary cert depends on the ultimate root CA from GlobalSign.
**Here's my goal**: I want to have my laptop check the authenticity of the wifi access point whenever I connect to the wifi network. How do I put these certs in the connection setting (
/etc/NetworkManager/system-connections/THE-AP-NAME
file) so that I can accomplish this goal? To be specific: which file should be listed where (e.g., what config file), and what additional steps are needed to get the server certificate(s) verified? I am asking this here since all that I found elsewhere are 1-step certificate check, in which the certificate probably depends on a well-established root CA rather than an intermediary CA like in my case.
Currently this is the content of my connection setting file (XXXX and YYYY denoted obscured info):
[ipv6]
method=ignore
[connection]
id=XXXXXXXXX
uuid=XXXXXXXXX
type=802-11-wireless
timestamp=1436377448
[802-11-wireless-security]
key-mgmt=wpa-eap
[802-11-wireless]
ssid=XXXXXXXXX
mode=infrastructure
seen-bssids=XXXXXXXXX
security=802-11-wireless-security
[802-1x]
eap=peap;
identity=XXXXXXXXX
password=YYYYYYYYY
ca-cert=/etc/NetworkManager/certs/work/globalsign_intermediary.pem
phase2-auth=mschapv2
[ipv4]
method=auto
As you see, I was using the intermediary cert file. But this was not right. Neither was it right to use only the RADIUS cert file. In either case, I got the following error in syslog
:
Jul 8 12:02:37 wirawan1 wpa_supplicant: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
Jul 8 12:02:37 wirawan1 kernel: [3880972.051159] wlan0: Limiting TX power to 20 (20 - 0) dBm as advertised by xx:xx:xx:xx:xx
Jul 8 12:02:37 wirawan1 wpa_supplicant: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
Jul 8 12:02:37 wirawan1 wpa_supplicant: OpenSSL: tls_connection_ca_cert - Failed to load root certificates error:00000000:lib(0):func(0):reason(0)
Jul 8 12:02:37 wirawan1 wpa_supplicant: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Jul 8 12:02:37 wirawan1 wpa_supplicant: TLS: Certificate verification failed, error 20 (unable to get local issuer certificate) depth 1 for '/C=BE/O=GlobalSign nv-sa/CN=GlobalSign Organization Validation CA - G2'
Jul 8 12:02:37 wirawan1 wpa_supplicant: wlan0: CTRL-EVENT-EAP-TLS-CERT-ERROR reason=1 depth=1 subject='/C=BE/O=GlobalSign nv-sa/CN=GlobalSign Organization Validation CA - G2' err='unable to get local issuer certificate'
Jul 8 12:02:37 wirawan1 wpa_supplicant: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
Jul 8 12:02:37 wirawan1 wpa_supplicant: OpenSSL: openssl_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 8 12:02:38 wirawan1 wpa_supplicant: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
Jul 8 12:02:40 wirawan1 wpa_supplicant: wlan0: Authentication with xx:xx:xx:xx:xx timed out.
Apparently the trust chain cannot be established.
The hardware is (lspci):
03:00.0 Network controller: Intel Corporation PRO/Wireless 5100 AGN [Shiloh] Network Connection
It uses iwlwifi+iwldvm driver. Kernel version 3.12.9-1~bpo70+1 (2014-02-07)
, from debian backport package linux-image-3.12-0.bpo.1-amd64
.
I am not new to Linux, but really don't know how to deal with x509 and/or SSL/TLS security in Linux, so please answer with step-by-step instruction. Googling around to find the answer to this problem has left me frustrated. The WPA supplicant documentation is very terse in discussing the use certificates in the conjunction with WPA2 Enterprise. And the NetworkManager has even poorer documentation.
Wirawan Purwanto
(293 rep)
Jul 8, 2015, 07:10 PM
• Last activity: Apr 6, 2019, 01:22 AM
1
votes
1
answers
1426
views
Change default EAP type in hostapd
I'm trying to change the default EAP type in hostapd but I am not able to understand how to do that. Here's what I've found reading the `hostapd.conf` file: # NAI Realm information # One or more realm can be advertised. Each nai_realm line adds a new realm to # the set. These parameters provide info...
I'm trying to change the default EAP type in hostapd but I am not able to understand how to do that.
Here's what I've found reading the
hostapd.conf
file:
# NAI Realm information
# One or more realm can be advertised. Each nai_realm line adds a new realm to
# the set. These parameters provide information for stations using Interworking
# network selection to allow automatic connection to a network based on
# credentials.
# format: ,[,][,][,...]
# encoding:
# 0 = Realm formatted in accordance with IETF RFC 4282
# 1 = UTF-8 formatted character string that is not formatted in
# accordance with IETF RFC 4282
# NAI Realm(s): Semi-colon delimited NAI Realm(s)
# EAP Method: [:][][...]
# EAP Method types, see:
# http://www.iana.org/assignments/eap-numbers/eap-numbers.xhtml#eap-numbers-4
# AuthParam (Table 8-188 in IEEE Std 802.11-2012):
# ID 2 = Non-EAP Inner Authentication Type
# 1 = PAP, 2 = CHAP, 3 = MSCHAP, 4 = MSCHAPV2
# ID 3 = Inner authentication EAP Method Type
# ID 5 = Credential Type
# 1 = SIM, 2 = USIM, 3 = NFC Secure Element, 4 = Hardware Token,
# 5 = Softoken, 6 = Certificate, 7 = username/password, 9 = Anonymous,
# 10 = Vendor Specific
#nai_realm=0,example.com;example.net
# EAP methods EAP-TLS with certificate and EAP-TTLS/MSCHAPv2 with
# username/password
#nai_realm=0,example.org,13[5:6],21[2:4][5:7]
JohnLocke
(33 rep)
Apr 7, 2017, 05:10 PM
• Last activity: Jan 22, 2019, 02:27 PM
1
votes
0
answers
1441
views
PEAP authentication failure using wpa_supplicant
I have an embedded Linux system, kernel 4.1.18, running wpa_supplicant v2.5, trying to connect to a PEAP network. My PC can connect fine but the Linux system cannot and I'm stuck figuring out what I'm missing. My wpa_supplicant.conf file network={ ssid="prod" scan_ssid=1 mode=0 key_mgmt=WPA-EAP eap=...
I have an embedded Linux system, kernel 4.1.18, running wpa_supplicant v2.5, trying to connect to a PEAP network. My PC can connect fine but the Linux system cannot and I'm stuck figuring out what I'm missing.
My wpa_supplicant.conf file
network={
ssid="prod"
scan_ssid=1
mode=0
key_mgmt=WPA-EAP
eap=PEAP
password="blah"
identity="blah"
}
Some log output:
> scan
OK
CTRL-EVENT-SCAN-STARTED
CTRL-EVENT-SCAN-RESULTS
SME: Trying to authenticate with 64:a0:e7:da:f1:a5 (SSID='prod' freq=2412 MHz)
Trying to associate with 64:a0:e7:da:f1:a5 (SSID='prod' freq=2412 MHz)
Associated with 64:a0:e7:da:f1:a5
CTRL-EVENT-EAP-STARTED EAP authentication started
CTRL-EVENT-EAP-STATUS status='started' parameter=''
CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
CTRL-EVENT-EAP-STATUS status='accept proposed method' parameter='PEAP'
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
CTRL-EVENT-EAP-STATUS status='completion' parameter='failure'
CTRL-EVENT-EAP-FAILURE EAP authentication failed
Authentication with 64:a0:e7:da:f1:a5 timed out.
CTRL-EVENT-DISCONNECTED bssid=64:a0:e7:da:f1:a5 reason=3 locally_generated=1
CTRL-EVENT-SSID-TEMP-DISABLED id=7 ssid="prod" auth_failures=1 duration=10 reason=AUTH_FAILED
scan_results output:
64:a0:e7:da:f1:a5 2412 -55 [WPA2-EAP-CCMP][ESS] prod
Looking at a verbose output from wpa_supplicant it looks like I'm timing out during authentication. Any way to increase the timeout?
21973.688487: nl80211: Association request send successfully
21974.032784: nl80211: Event message available
21974.033152: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
21974.033240: nl80211: Delete station 64:a0:e7:da:f1:a5
21974.062289: nl80211: Event message available
21974.062594: nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0
21974.062683: nl80211: MLME event 38; timeout with 64:a0:e7:da:f1:a5
21974.062776: wlan0: Event ASSOC_TIMED_OUT (15) received
21974.062845: wlan0: SME: Association timed out
21974.062927: wlan0: Radio work 'sme-connect'@0xb8960 done in 0.438536 seconds
21974.062984: Added BSSID 64:a0:e7:da:f1:a5 into blacklist
21974.063102: wlan0: Another BSS in this ESS has been seen; try it next
21974.063159: BSSID 64:a0:e7:da:f1:a5 blacklist count incremented to 2
21974.063223: wlan0: Blacklist count 1 --> request scan in 100 ms
21974.063284: wlan0: Setting scan request: 0.100000 sec
21974.063353: wlan0: State: ASSOCIATING -> DISCONNECTED
21974.063404: nl80211: Set wlan0 operstate 0->0 (DORMANT)
dangeroushobo
(707 rep)
Dec 12, 2018, 02:33 PM
• Last activity: Dec 12, 2018, 03:21 PM
1
votes
1
answers
2272
views
Can't connect to WiFi with WPA-EAP
I'm trying to connect to a WiFi with WPA-EAP, but it always fails with error: failure to add network: invalid message format Full log from journalctl: NetworkManager[668]: device (wlp5s0): Activation: starting connection 'eduroam' (1ed02f15-9f55-452c-9b1c-4b2670bb2eac) NetworkManager[668]: audit: op...
I'm trying to connect to a WiFi with WPA-EAP, but it always fails with error:
failure to add network: invalid message format
Full log from journalctl:
NetworkManager: device (wlp5s0): Activation: starting connection 'eduroam' (1ed02f15-9f55-452c-9b1c-4b2670bb2eac)
NetworkManager: audit: op="connection-activate" uuid="1ed02f15-9f55-452c-9b1c-4b2670bb2eac" name="eduroam" pid=3216 uid=1000 result="success"
NetworkManager: device (wlp5s0): state change: disconnected -> prepare (reason 'none') [30 40 0]
NetworkManager: manager: NetworkManager state is now CONNECTING
NetworkManager: device (wlp5s0): set-hw-addr: reset MAC address to 80:86:F2:1D:79:41 (preserve)
NetworkManager: device (wlp5s0): state change: prepare -> config (reason 'none') [40 50 0]
NetworkManager: device (wlp5s0): Activation: (wifi) access point 'eduroam' has security, but secrets are required.
NetworkManager: device (wlp5s0): state change: config -> need-auth (reason 'none') [50 60 0]
kernel: IPv6: ADDRCONF(NETDEV_UP): wlp5s0: link is not ready
NetworkManager: device (wlp5s0): state change: need-auth -> prepare (reason 'none') [60 40 0]
NetworkManager: device (wlp5s0): state change: prepare -> config (reason 'none') [40 50 0]
NetworkManager: device (wlp5s0): Activation: (wifi) connection 'eduroam' has security, and secrets exist. No new secrets needed.
NetworkManager: Config: added 'ssid' value 'eduroam'
NetworkManager: Config: added 'scan_ssid' value '1'
NetworkManager: Config: added 'key_mgmt' value 'WPA-EAP'
NetworkManager: Config: added 'proto' value 'RSN'
NetworkManager: Config: added 'pairwise' value 'CCMP'
NetworkManager: Config: added 'group' value 'CCMP TKIP'
NetworkManager: Config: added 'password' value ''
NetworkManager: Config: added 'eap' value 'PEAP'
NetworkManager: Config: added 'fragment_size' value '1266'
NetworkManager: Config: added 'phase2' value 'auth=MSCHAPV2'
NetworkManager: Config: added 'ca_cert' value '/ca.pem'
NetworkManager: Config: added 'altsubject_match' value 'DNS:'
NetworkManager: Config: added 'identity' value ''
NetworkManager: Config: added 'anonymous_identity' value ''
NetworkManager: Config: added 'bgscan' value 'simple:30:-65:300'
NetworkManager: Config: added 'proactive_key_caching' value '1'
NetworkManager: sup-iface[0x5609a63bf980,wlp5s0]: assoc[0x5609a63c8f40]: failure to add network: invalid message format
NetworkManager: device (wlp5s0): state change: config -> failed (reason 'supplicant-failed') [50 120 10]
NetworkManager: manager: NetworkManager state is now DISCONNECTED
NetworkManager: device (wlp5s0): Activation: failed for connection 'eduroam'
NetworkManager: device (wlp5s0): state change: failed -> disconnected (reason 'none') [120 30 0]
kernel: IPv6: ADDRCONF(NETDEV_UP): wlp5s0: link is not ready
NetworkManager: device (wlp5s0): set-hw-addr: set MAC address to 16:09:73:46:D9:3E (scanning)
kernel: IPv6: ADDRCONF(NETDEV_UP): wlp5s0: link is not ready
What I am doing wrong?
Martin Heralecký
(850 rep)
Oct 12, 2018, 02:29 PM
• Last activity: Nov 27, 2018, 10:19 PM
4
votes
1
answers
5126
views
wpa_supplicant says network is disabled
When trying to connect to a network (specifically a WPA2 enterprise network for a university) with `wpa_supplicant` on Gentoo Linux, the network is shown as disabled when the flag is not set. My `wpa_supplicant.conf` : ctrl_interface=/var/run/wpa_supplicant network={ ssid="TheNetwork" eap=PEAP ident...
When trying to connect to a network (specifically a WPA2 enterprise network for a university) with
wpa_supplicant
on Gentoo Linux, the network is shown as disabled when the flag is not set.
My wpa_supplicant.conf
:
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="TheNetwork"
eap=PEAP
identity="redacted"
password="redacted"
ca_cert="/etc/ssl/certs/AddTrust_External_Root.pem"
ca_path="/etc/ssl/certs/"
phase1="peapver=0"
phase2="auth=MSCHAPV2"
}
network={
ssid="Another network that works"
key_mgmt=NONE
disabled=1 # This is obviously not normally disabled
}
network={
ssid="Yet another working network"
psk="redacted"
disabled=1 # Likewise
}
Output of sudo wpa_supplicant -iwlp3s0 -c/etc/wpa_supplicant/wpa_supplicant.conf -d
, with repetitive lines removed:
wpa_supplicant v2.6
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'wlp3s0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
id=0 ssid='TheNetwork'
id=1 ssid='Another network that works'
id=2 ssid='Yet another working network'
nl80211: Supported cipher 00-0f-ac:1
...
nl80211: Supported cipher 00-0f-ac:9
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
nl80211: interface wlp3s0 in phy phy0
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x55701974e5f0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55701974e5f0 match=0104
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55701974e5f0 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55701974e5f0 match=040b
...
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Add interface wlp3s0 to a new radio phy0
nl80211: Regulatory information - country=US (DFS-FCC)
nl80211: 2402-2472 @ 40 MHz 30 mBm
nl80211: 5170-5250 @ 80 MHz 23 mBm
nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
nl80211: 5735-5835 @ 80 MHz 30 mBm
nl80211: 57240-63720 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
wlp3s0: Own MAC address: [redacted]
wpa_driver_nl80211_set_key: ifindex=4 (wlp3s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
...
wpa_driver_nl80211_set_key: ifindex=4 (wlp3s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp3s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlp3s0: No enabled networks (3 disabled networks)
wlp3s0: State: DISCONNECTED -> INACTIVE
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlp3s0'
wlp3s0: Added interface wlp3s0
wlp3s0: State: INACTIVE -> DISCONNECTED
nl80211: Set wlp3s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
random: Got 20/20 bytes from /dev/random
EAPOL: disable timer tick
What sticks out to me is the line wlp3s0: No enabled networks (3 disabled networks)
. This appears despite the fact that there are clearly only two disabled networks. Further evidence that the first network is being disabled despite the lack of a disabled=1
flag is that when running the wpa_supplement command with the other two networks *enabled*, a scan is performed and output, but all relevant APs are skipped as "disabled", "SSID mismatch", and "SSID mismatch", even though the SSIDs clearly do match. When running wpa_supplicant with the other two networks removed, the line wlp3s0: No enabled networks (1 disabled networks)
appears.
What in the configuration is causing this to occur?
igneous_flock
(143 rep)
Aug 21, 2018, 12:05 AM
• Last activity: Aug 22, 2018, 09:10 PM
1
votes
0
answers
1946
views
Cannot connect to my work's WPA2 Enterprise on Linux but Android works fine
I'm looking for help trying to connect to my work's wifi. I'm currently on Kubuntu 18.04 and cannot connect to my work's WPA2 enterprise wifi on my laptop but my android phone works just fine. The android settings are EAP method PEAP, Phase 2 authentication none, no CA certificate. I don't think the...
I'm looking for help trying to connect to my work's wifi. I'm currently on Kubuntu 18.04 and cannot connect to my work's WPA2 enterprise wifi on my laptop but my android phone works just fine. The android settings are EAP method PEAP, Phase 2 authentication none, no CA certificate. I don't think the issue is specific to Kubuntu though.
Here's what I've done so far. I've disabled network-manager and have been using
wpa_supplicant
as root for testing various configurations in the /etc/wpa_supplicant.conf
file. I can connect to my home wifi just fine using this method so the card and driver work.
When I scan my work's wifi using:
ip link set wlp3s0 up
iw wlp3s0 scan
I get the following output:
ERP:
RSN: *Version: 1
*Group cipher: TKIP
*Pairwise ciphers: CCMP
*Authentication suites: IEEE 802.1X
*Capabilities: 1-PTKSA-RC 1-GTKSA-RC (0x0000)
WPA: *Version 1
*Group cipher: TKIP
*Pairwise ciphers: TKIP
*Authentication suites: IEEE 802.1X
So I've tried a number of different configuration parameters to try to get it to work. Here is my /etc/wpa_supplicant.conf
file
ctrl_interface=/run/wpa_supplicant
ctrl_interface_group=root
update_config=1
network={
ssid="MYWORK"
scan_ssid=1
proto=RSN #Have also tried WPA here, as well as leaving blank
key_mgmt=WPA-EAP #Have also tried IEEE8021X here as well as leaving blank
pairwise=CCMP #when trying proto=WPA, changed this to TKIP, have also left blank before
group=TKIP #have tried leaving blank
eap=PEAP #have tried leaving blank
phase1="peaplabel=auto tls_disable_tlsv1_2=1" #tried this after reading another article on this site where some people's work's wifis were not tls 1.2. Neither blank nor disabled works.
phase2="autheap=MSCHAPV2" #have tried leaving this out
identity="MYID"
password="MYPASSWORD"
}
I've tried a number of combinations of the above to no avail. Here is the output from wpa_supplicant -Dnl80211 -i wlp3s0 -c /etc/wpa_supplicant.conf
when I tried first with key_mgmt=WPA-EAP
:
Successfully initialized wpa_supplicant
wlp3s0: SME: Trying to authenticate with XX:XX:XX:XX:XX:XX (SSID='MYWORK' freq=2462 MHz)
wlp3s0: Trying to associate with XX:XX:XX:XX:XX:XX (SSID='MYWORK' freq=2462 MHz)
wlp3s0: Associated with XX:XX:XX:XX:XX:XX
wlp3s0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlp3s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
wlp3s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
wlp3s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
wlp3s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
wlp3s0: CTRL-EVENT-DISCONNECTED bssid=00:0b:86:0a:b8:c1 reason=3
wlp3s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MWORK" auth_failures=1 duration=10 reason=AUTH_FAILED
nl80211: deinit ifname=p2p-dev-wlp3s0 disabled_11b_rates=0
p2p-dev-wlp3s0: CTRL-EVENT-TERMINATING
nl80211: deinit ifname=wlp3s0 disabled_11b_rates=0
wlp3s0: CTRL-EVENT-TERMINATING
When trying with key-mgmt=IEEE8021X
the output is a little different:
Successfully initialized wpa_supplicant
wlp3s0: SME: Trying to authenticate with XX:XX:XX:XX:XX:XX (SSID='MYWORK' freq=2462 MHz)
wlp3s0: Trying to associate with XX:XX:XX:XX:XX:XX (SSID='MWORK' freq=2462 MHz)
wlp3s0: CTRL-EVENT-ASSOC-REJECT bssid=XX:XX:XX:XX:XX:XX status_code=10
wlp3s0: SME: Deauth request to the driver failed
I have also tried using the -Dwext
driver but didn't work either.
Any ideas what I'm missing or things I should try? Is there a compatibility mode that both windows and android are using that linux isn't by default? I was not given any certificates nor do i need to specify them on either windows or android for it to connect. I appreciate any help!
FrostedCookies
(111 rep)
Jul 11, 2018, 05:22 PM
Showing page 1 of 20 total questions