lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 6 Jun 2008 16:59:29 +0300
From:	"Tomas Winkler" <tomasw@...il.com>
To:	"Thomas Backlund" <tmb@...driva.org>
Cc:	"Ian Schram" <ischram@...enet.be>,
	"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>,
	"linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>
Subject: Re: iwl4965 oops in 2.6.26-rc5 x86_64

On Fri, Jun 6, 2008 at 3:33 PM, Thomas Backlund <tmb@...driva.org> wrote:
> Thomas Backlund skrev:
>>
>> Tomas Winkler skrev:
>>>
>>> On Fri, Jun 6, 2008 at 3:44 AM, Ian Schram <ischram@...enet.be> wrote:
>>>>
>>>> Isn't this the Oops Joonwoo Park wanted to patch with
>>>>
>>>> "[PATCH] iwlwifi: fix oops on wep key insertion" 27/5/2008
>>>>
>>>> invalid length of webkey that would/should be handled in mac80211?
>>>>
>>>> ian
>>>
>>> Yes, it looks like.
>>
>> Ummm, what has a wep key to do with me trying to access a WPA2-Personal
>> encrypted net ?

Not sure yet, but mac is trying to assign default/static wep key.

:iwlcore:iwl_send_static_wepkey_cmd+0xcb/0xd5
:iwlcore:iwl_set_default_wep_key+0xa2/0xbc

Try to set the encryption explicitly
network={
    psk="*************************"
    scan_ssid=1
    ssid="dlink"
    pairwise=CCMP
   group=CCMP
 }


>>
>>> Thomas can you send out your wpa_supplicant config fiele
>>>
>>
>> I could, but since I would have to remove any sensitive info such as the
>> psk key, would it be of any use ?
>
> Anyway, here configs are:
>
> wpa_supplicant.conf
> (I stripped all the comments from the file)
> --- cut ---
> ctrl_interface=/var/run/wpa_supplicant
>
> eapol_version=1
>
> ap_scan=1
>
> fast_reauth=1
>
> blob-base64-exampleblob={
> SGVsbG8gV29ybGQhCg==
> }
>
> network={
>    psk="*************************"
>    scan_ssid=1
>    ssid="dlink"
> }
> --- cut ---
>
> ifcfg-wlan0
> --- cut ---
> DEVICE=wlan0
> BOOTPROTO=dhcp
> ONBOOT=yes
> METRIC=35
> MII_NOT_SUPPORTED=no
> USERCTL=no
> RESOLV_MODS=no
> WIRELESS_MODE=Managed
> WIRELESS_ESSID=dlink
> WIRELESS_ENC_KEY='s:*************************'
> WIRELESS_WPA_DRIVER=wext
> IPV6INIT=no
> IPV6TO4INIT=no
> DHCP_CLIENT=dhclient
> NEEDHOSTNAME=no
> PEERDNS=yes
> PEERYP=yes
> PEERNTPD=no
> --- cut ---
>
>>
>>> I will provide a patch that disable hw encryption on long wep keys. It
>>> get lost in my todo list.
>>> Tomas
>>>
>>
>
> --
> Thomas
>
>
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ