[Bug 1057592] New: Cannot connect to EAP secured wireless network with wicked
http://bugzilla.suse.com/show_bug.cgi?id=1057592 Bug ID: 1057592 Summary: Cannot connect to EAP secured wireless network with wicked Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Network Assignee: bnc-team-screening@forge.provo.novell.com Reporter: lmb@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- I have trouble connecting my laptop to a PEAP secured wireless network, embarrassingly the AttachemateGroup one at SUSE HQ. The network settings seem to be right and match: BOOTPROTO='dhcp' BROADCAST='' DHCLIENT_SET_DEFAULT_ROUTE='yes' ETHTOOL_OPTIONS='' IPADDR='' MTU='' NAME='Wireless 7260' NETMASK='' NETWORK='' REMOTE_IPADDR='' STARTMODE='manual' WIRELESS_AP='' WIRELESS_AP_SCANMODE='1' WIRELESS_AUTH_MODE='eap' WIRELESS_BITRATE='auto' WIRELESS_CA_CERT='' WIRELESS_CHANNEL='' WIRELESS_CLIENT_CERT='' WIRELESS_CLIENT_KEY='' WIRELESS_CLIENT_KEY_PASSWORD='' WIRELESS_DEFAULT_KEY='0' WIRELESS_EAP_AUTH='MSCHAPV2' WIRELESS_EAP_MODE='PEAP' WIRELESS_ESSID='AttachmateGroup' WIRELESS_FREQUENCY='' WIRELESS_KEY='' WIRELESS_KEY_0='' WIRELESS_KEY_1='' WIRELESS_KEY_2='' WIRELESS_KEY_3='' WIRELESS_KEY_LENGTH='128' WIRELESS_MODE='Managed' WIRELESS_NICK='' WIRELESS_NWID='' WIRELESS_PEAP_VERSION='' WIRELESS_POWER='no' WIRELESS_WPA_ANONID='' WIRELESS_WPA_IDENTITY='lmb' WIRELESS_WPA_PASSWORD='xxxxxxxx' WIRELESS_WPA_PSK='' Sep 07 13:44:40 hermes kernel: iwlwifi 0000:03:00.0: L1 Enabled - LTR Enabled Sep 07 13:44:43 hermes kernel: wlp3s0: authenticate with f0:5c:19:1f:93:f0 Sep 07 13:44:43 hermes kernel: wlp3s0: send auth to f0:5c:19:1f:93:f0 (try 1/3) Sep 07 13:44:43 hermes kernel: wlp3s0: authenticated Sep 07 13:44:43 hermes kernel: wlp3s0: associate with f0:5c:19:1f:93:f0 (try 1/3) Sep 07 13:44:43 hermes kernel: wlp3s0: RX AssocResp from f0:5c:19:1f:93:f0 (capab=0x1411 status=0 aid=9) Sep 07 13:44:43 hermes kernel: wlp3s0: associated Sep 07 13:44:43 hermes wickedd-dhcp4[1521]: wlp3s0: Request to acquire DHCPv4 lease with UUID 4957ae59-c728-0b00-f205-000033000000 Sep 07 13:44:43 hermes kernel: wlp3s0: Limiting TX power to 23 (23 - 0) dBm as advertised by f0:5c:19:1f:93:f0 Sep 07 13:44:46 hermes kernel: wlp3s0: deauthenticating from f0:5c:19:1f:93:f0 by local choice (Reason: 3=DEAUTH_LEAVING) Sep 07 13:44:53 hermes wickedd-dhcp4[1521]: unable to confirm lease Sep 07 13:44:58 hermes wickedd-dhcp4[1521]: wlp3s0: defer timeout 15 reached (state INIT) Sep 07 13:45:00 hermes kernel: wlp3s0: authenticate with f0:5c:19:1f:97:f0 Sep 07 13:45:00 hermes kernel: wlp3s0: send auth to f0:5c:19:1f:97:f0 (try 1/3) Sep 07 13:45:00 hermes kernel: wlp3s0: authenticated Sep 07 13:45:00 hermes kernel: wlp3s0: associate with f0:5c:19:1f:97:f0 (try 1/3) Sep 07 13:45:00 hermes kernel: wlp3s0: RX AssocResp from f0:5c:19:1f:97:f0 (capab=0x1411 status=0 aid=13) Sep 07 13:45:00 hermes kernel: wlp3s0: associated Sep 07 13:45:00 hermes wickedd-dhcp4[1521]: wlp3s0: Request to acquire DHCPv4 lease with UUID 4957ae59-c728-0b00-f205-000033000000 Sep 07 13:45:00 hermes kernel: wlp3s0: Limiting TX power to 30 (30 - 0) dBm as advertised by f0:5c:19:1f:97:f0 Sep 07 13:45:03 hermes kernel: wlp3s0: deauthenticating from f0:5c:19:1f:97:f0 by local choice (Reason: 3=DEAUTH_LEAVING) Sep 07 13:45:10 hermes wickedd-dhcp4[1521]: unable to confirm lease Sep 07 13:45:15 hermes wickedd-dhcp4[1521]: wlp3s0: defer timeout 15 reached (state INIT) Sep 07 13:45:41 hermes kernel: wlp3s0: authenticate with f0:5c:19:1f:93:e0 Sep 07 13:45:41 hermes kernel: wlp3s0: send auth to f0:5c:19:1f:93:e0 (try 1/3) Sep 07 13:45:41 hermes kernel: wlp3s0: f0:5c:19:1f:93:e0 denied authentication (status 17) Sep 07 13:45:43 hermes wickedd-nanny[1523]: device wlp3s0: got signal linkDown Sep 07 13:45:43 hermes kernel: wlp3s0: authenticate with f0:5c:19:1f:93:e0 Sep 07 13:45:43 hermes kernel: wlp3s0: send auth to f0:5c:19:1f:93:e0 (try 1/3) Sep 07 13:45:43 hermes kernel: wlp3s0: aborting authentication with f0:5c:19:1f:93:e0 by local choice (Reason: 3=DEAUTH_LEAVING) So there are a bunch of successful authentication attempts, but then DHCP doesn't work. Eventually the server throws me out again though. And no, the password is not incorrect. ;-) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1057592 Chenzi Cao <chcao@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|bnc-team-screening@forge.pr |wicked-maintainers@suse.de |ovo.novell.com | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 Marius Tomaschewski <mt@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |mt@suse.com Resolution|--- |FIXED -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c6 --- Comment #6 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0317-1: An update that has 15 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1057592,1156920,1160654,1178357,1181163,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392 CVE References: JIRA References: SLE-9750 Sources used: SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): wicked-0.6.68-150300.4.5.1 SUSE Linux Enterprise Micro 5.1 (src): wicked-0.6.68-150300.4.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c7 --- Comment #7 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0318-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): wicked-0.6.68-38.45.1 SUSE OpenStack Cloud 8 (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): wicked-0.6.68-38.45.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): wicked-0.6.68-38.45.1 HPE Helion Openstack 8 (src): wicked-0.6.68-38.45.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c8 --- Comment #8 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2022:0317-1: An update that has 15 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1057592,1156920,1160654,1178357,1181163,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392 CVE References: JIRA References: SLE-9750 Sources used: openSUSE Leap 15.3 (src): wicked-0.6.68-150300.4.5.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c9 --- Comment #9 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0315-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Linux Enterprise Server 12-SP5 (src): wicked-0.6.68-3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c10 --- Comment #10 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0345-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): wicked-0.6.68-3.24.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): wicked-0.6.68-3.24.1 SUSE Enterprise Storage 6 (src): wicked-0.6.68-3.24.1 SUSE CaaS Platform 4.0 (src): wicked-0.6.68-3.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1057592 https://bugzilla.suse.com/show_bug.cgi?id=1057592#c11 --- Comment #11 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2022:0346-1: An update that has 19 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1029961,1057592,1156920,1160654,1177215,1178357,1181163,1181186,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392,954329 CVE References: JIRA References: SLE-9750 Sources used: SUSE Manager Server 4.1 (src): wicked-0.6.68-3.8.1 SUSE Manager Retail Branch Server 4.1 (src): wicked-0.6.68-3.8.1 SUSE Manager Proxy 4.1 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise Micro 5.0 (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): wicked-0.6.68-3.8.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): wicked-0.6.68-3.8.1 SUSE Enterprise Storage 7 (src): wicked-0.6.68-3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com