DaemonForums  

Go Back   DaemonForums > OpenBSD > OpenBSD General

OpenBSD General Other questions regarding OpenBSD which do not fit in any of the categories below.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 8th June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default Cannot connect to wifi with OpenBSD 7.1 + RaLink RT3070

Hi,

I have an ASUS X751L PC with a RaLink RT3070 Wifi dongle connected by USB (as the internal RealTek RTL8723BE does not seem to be supported: I get it as ugen0).

I've been trying to connect to various access points, but to no success. The connection gets into the "active state", but I cannot manage to get any IP/route/DNS config.

Particularities :
- the access point is configured to use chan13, which is not supposed to be used in my country (France). However the connection perfectly works under Linux Mint, and works under Win10 after some configuration to allow for such a channel to be used.
- the access point is using WEP
- the access point is not under my control (I cannot change its config)

- Card is recognized:
Code:
$ ifconfig
...
run0: MAC/BBP RT3070 (rev 0x0201), RF RT3020 (MIMO 1T1R), address
00:0f:00:32:e9:c8
...
What I tried:
  • manual configuration
    Code:
    $ ifconfig run0 nwid <accesspoint_id> nwkey <key> chan13 inet autoconf
  • I've tried with join instead of nwid. In this case, I've noticed that ifconfig run0 then shows that nwid is not set
  • I've tried with "<accesspoint_id>" instead of <accesspoint_id>
  • I've tried with "<key>" instead of <key>
  • I've tried with 0x<key> instead of <key>
  • I've tried dhclient run0 and dhcpleasectl run0. But did niot get better results.
    Code:
    dhclient
    , even with -vvvvvv or -d returns immediately without any message. ifconfig inet autoconf takes a little more time but does not get ip/route/dns. dhcpleasectl run0 shows something like .... run0 [Init]
  • I've tried with /etc/hostname.run0 + sh /etc/netstart run0 with all the combinations above. It does not work either. Doing so, I noticed 2 strange things: sh /etc/netstart run0 does not seems to do anything while sh /etc/netstart seems to correctly configure the interface. Also, When I play too much with the interface (up-s/down-s, netstart-s/ifconfig-s),
  • I've tried setting IP/route/DNS manually to last known lease, but packets seem to go nowhere...
  • I checked syspatch. I've 5 patches installed, so I do not seems to be victim of the first "wifi" patch bug. Also, I can ifconfig run0 scan without any problem.

I've also tried to change the access point (tethering on my with phone, using WPA + simple key like "xxx00000", where x is a digit) and repeated almost all the above steps. Does not work either...

The problem seems to be with dhcp, not the wifi card, nor the accesss point. I'm running out of ideas. So, if anyone has any idea I would be glad to try it...
Reply With Quote
  #2   (View Single Post)  
Old 9th June 2022
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 3,975
Default

What is the output of # ifconfig run0 scan? Does it show WEP? When I do a scan with my urtwn0 it only shows wpa2 as no accesspoints offer it anymore:
Code:
nwid VRV9517592245 chan 1 bssid bc:30:d9:59:22:45 -76dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,radio_measurement,wpa2 
nwid 0x00000000000000000000000000 chan 1 bssid 62:30:d9:59:22:47 -80dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,wpa2 
nwid TP-LINK_32E2 chan 4 bssid c0:25:e9:01:32:e2 -80dBm HT-MCS23 privacy,short_preamble,short_slottime,wpa2 
nwid "Danny en kim" chan 7 bssid c0:06:c3:50:31:6a -84dBm HT-MCS15 privacy,short_preamble,short_slottime,radio_measurement,wpa2 
nwid Ziggo chan 1 bssid ae:22:15:e8:b7:cb -84dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2,802.1x 
nwid TP-LINK_32E2 chan 1 bssid 48:8d:36:39:3b:a8 -84dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2 
nwid VRV9517208734 chan 11 bssid 64:cc:22:20:87:34 -84dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,radio_measurement,wpa2 
nwid 0x00000000000000000000000000 chan 11 bssid 6a:cc:22:20:87:36 -84dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,wpa2 
nwid Ziggo85993E9 chan 1 bssid ac:22:05:e8:b7:cb -84dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2 
nwid "" chan 7 bssid c6:06:c3:50:31:6a -84dBm HT-MCS15 privacy,short_preamble,short_slottime,radio_measurement,wpa2 
nwid "" chan 7 bssid c6:06:c3:50:30:fa -92dBm HT-MCS15 privacy,short_preamble,short_slottime,radio_measurement,wpa2
You can check the ifconfig(8) man page and search for the WEP keyword : /WEP. It should be possible to manually connect with ifconfig run0 .......... You will get immediate feedback about any problems.
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
  #3   (View Single Post)  
Old 22nd June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default

Quote:
Originally Posted by J65nko View Post
What is the output of # ifconfig run0 scan? Does it show WEP?
Yes it does:
Quote:
run0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
lladdr 00:0f:00:32:e9:c8
index 5 priority 4 llprio 3
groups: wlan
media: IEEE802.11 autoselect (DS1)
status: no network
ieee80211: nwid ""
nwid FreeWifi_secure chan 1 bssid 34:27:92:f1:29:16 -47dBm HT-MCS23 privacy,radio_measurement,wpa2,802.1x
nwid Freebox-5DA326 chan 1 bssid 34:27:92:f1:29:14 -47dBm HT-MCS23 privacy,radio_measurement,wpa2
nwid FreeWifi_secure chan 1 bssid 68:a3:78:ce:c9:82 -47dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Freebox-4FAB92 chan 1 bssid 68:a3:78:ce:c9:80 -49dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid XXXX-7678 chan 1 bssid 54:64:d9:fe:76:7e -53dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,wpa1
----->nwid NUMERICABLE-64FC chan 13 bssid c0:3f:0e:d8:74:b1 -53dBm 54M privacy,short_slottime,wep <-----
nwid FREEBOX_CASTRO_RN chan 4 bssid e4:9e:12:a8:48:6c -53dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid "" chan 13 bssid c8:f5:d6:94:fe:f6 -53dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2
nwid Freebox-3FFE6D chan 6 bssid 70:fc:8f:3f:fe:6e -55dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid FreeWifi_secure chan 4 bssid 14:0c:76:b3:a6:13 -55dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid woueb chan 1 bssid cc:f4:11:80:5e:2f -55dBm HT-MCS15 privacy,short_preamble,short_slottime,radio_measur ement,wpa2
nwid FreeWifi_secure chan 4 bssid e4:9e:12:a8:48:6e -57dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid NUMERICABLE-2000 chan 2 bssid e0:ce:c3:3c:5f:fe -57dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid Tenda_0FC810 chan 4 bssid 04:95:e6:0f:c8:11 -57dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid Livebox-3390 chan 11 bssid ec:be:dd:83:33:90 -57dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid Livebox-DBE0 chan 6 bssid 7c:c1:77:02:db:e0 -57dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid woueb chan 6 bssid cc:f4:11:64:6a:15 -57dBm HT-MCS15 privacy,short_preamble,short_slottime,radio_measur ement,wpa2
nwid 0x00000000000000000000000000 chan 6 bssid f8:08:4f:31:a4:60 -59dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid FreeWifi_secure chan 1 bssid e4:9e:12:05:be:bc -59dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid MCZ-01A6E57CB1FE30 chan 2 bssid a6:e5:7c:b1:fe:30 -59dBm 54M privacy,wpa2
nwid FreeWifi_secure chan 6 bssid 70:fc:8f:38:f5:3c -59dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid FreeWifi_secure chan 6 bssid 70:fc:8f:3f:fe:70 -59dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Freeboxmaryse chan 4 bssid 14:0c:76:b3:a6:11 -61dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid Bbox-1E33B419 chan 6 bssid 6c:ba:b8:78:2d:36 -61dBm HT-MCS31 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid FreeWifi_secure chan 1 bssid 02:ca:1f:15:15:eb -61dBm HT-MCS15 privacy,short_slottime,wpa1,802.1x
nwid Freebox-05BEB9 chan 1 bssid e4:9e:12:05:be:ba -61dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid 0x00000000000000000000000000 chan 1 bssid d0:57:94:09:9c:70 -61dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid NUMERICABLE-0CC1 chan 6 bssid 00:1c:7b:cd:66:7f -61dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid freebox chan 1 bssid 02:ca:1f:15:15:e8 -61dBm HT-MCS15 privacy,short_slottime,wep
nwid woueb chan 11 bssid cc:f4:11:77:2f:d6 -61dBm HT-MCS15 privacy,short_preamble,radio_measurement,wpa2
nwid Livebox-8D00 chan 1 bssid 7c:c1:77:1f:8d:00 -61dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid Livebox-5966 chan 6 bssid 7c:c1:77:fc:59:66 -61dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid Crazywus-EXT chan 5 bssid 90:8d:78:db:bc:74 -61dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid 4G-Gateway-743F chan 8 bssid 90:94:97:9d:74:3f -61dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2
nwid Crazywus chan 5 bssid a0:d8:07:60:ed:44 -61dBm HT-MCS15 privacy,wpa2
nwid 0x000000000000000000000000000000000000000000000000 chan 5 bssid a0:d8:07:60:ed:47 -61dBm HT-MCS15 privacy,wpa2
nwid "" chan 1 bssid 02:ca:1f:15:15:ea -61dBm HT-MCS15 privacy,short_slottime,wpa2
nwid SFR_40B8 chan 1 bssid cc:2d:1b:74:40:be -63dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid Bbox-29374C3B chan 1 bssid b8:66:85:48:67:30 -63dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid Livebox-A5AC chan 6 bssid 8c:f8:13:4b:a5:ac -63dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid NETGEAR_Maryse chan 4 bssid bc:a5:11:b1:9c:52 -63dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2
nwid Freebox-85F7CA chan 6 bssid e4:9e:12:85:f7:cb -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid freeNAZ chan 11 bssid e4:9e:12:cf:72:94 -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid 0x000000000000000000000000000000000000000000000000 chan 8 bssid e2:f4:42:21:f4:a2 -63dBm HT-MCS15 privacy,short_slottime,wpa2
nwid Livebox-C800 chan 1 bssid 34:49:5b:b0:c8:00 -63dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid Livebox-4F87 chan 6 bssid a4:3e:51:4e:4f:87 -63dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid Freebox-38F539 chan 6 bssid 70:fc:8f:38:f5:3a -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid Livebox-A821 chan 1 bssid 30:7c:b2:f7:a8:21 -63dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid FreeWifi_secure chan 6 bssid e4:9e:12:85:f7:cd -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Bbox-DD2C0A2B chan 6 bssid 20:9a:7d:85:31:b0 -63dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid freeNisou chan 10 bssid 70:fc:8f:58:d7:d7 -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,wpa1
nwid Bbox-67AD9DD7 chan 1 bssid ac:3b:77:83:81:20 -63dBm HT-MCS15 privacy,short_slottime,wpa2,wpa1
nwid "" chan 1 bssid 02:ca:1f:15:15:e9 -63dBm HT-MCS15 privacy,short_slottime,wpa2
nwid FreeWifi_secure chan 11 bssid e4:9e:12:cf:72:96 -63dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Bbox-63E81FC2 chan 11 bssid b8:66:85:47:80:40 -63dBm HT-MCS15 privacy,short_slottime,wpa2
nwid Livebox-58D0 chan 6 bssid 68:3f:7d:ed:58:d0 -65dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid "View4 Ndje Epee Francoise Audray" chan 10 bssid 12:1f:90:9a:0d:db -65dBm HT-MCS7 privacy,short_slottime,wpa2
nwid Livebox-473B chan 6 bssid 30:7c:b2:57:47:3b -65dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid NETGEAR0AC5C1 chan 13 bssid 34:98:b5:0a:c5:c3 -65dBm HT-MCS31 privacy,short_preamble,short_slottime,apsd,wpa2
nwid SFR_7510 chan 11 bssid 44:ce:7d:28:75:14 -65dBm HT-MCS15 privacy,short_slottime,wpa1
nwid Livebox-FD60 chan 6 bssid 68:3f:7d:46:fd:60 -65dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid Freebox-59DBE7 chan 11 bssid 68:a3:78:d3:05:10 -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid FreeWifi_secure chan 11 bssid 68:a3:78:d3:05:12 -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Freebox-4FDF27 chan 1 bssid 70:fc:8f:4f:df:28 -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid FreeWifi_secure chan 1 bssid 70:fc:8f:4f:df:2a -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Freebox-4D02AD chan 11 bssid 70:fc:8f:e2:d3:a0 -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid HH40V_A26B chan 7 bssid e0:e6:2e:8b:a2:6b -65dBm HT-MCS15 privacy,short_preamble,short_slottime,wpa2,wpa1
nwid 0x0000000000 chan 8 bssid e0:f4:42:21:f4:af -65dBm HT-MCS15 privacy,short_slottime,wpa2
nwid Freebox-884FF2 chan 6 bssid e4:9e:12:88:4f:f3 -65dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2
nwid SFR-7220 chan 6 bssid f4:6b:ef:4e:72:26 -65dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2,wpa1
nwid Chromecast2771chambre.b chan 6 bssid fa:8f:ca:60:32:75 -67dBm HT-MCS7 short_preamble,short_slottime
nwid SFR-12f8 chan 11 bssid f4:6b:ef:61:12:fe -67dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2,wpa1
nwid woueb chan 11 bssid cc:f4:11:76:ac:b2 -67dBm HT-MCS15 privacy,short_preamble,radio_measurement,wpa2
nwid Freefox chan 11 bssid dc:00:b0:ea:c3:a0 -67dBm HT-MCS15 privacy,short_slottime,radio_measurement,wpa2
nwid SFR-b400 chan 11 bssid d0:57:94:90:b4:06 -67dBm HT-MCS23 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2,wpa1
nwid FreeWifi_secure chan 6 bssid 70:fc:8f:9b:16:9e -67dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid Livebox-1A92 chan 11 bssid 30:b1:b5:67:1a:92 -69dBm HT-MCS15 privacy,spectrum_mgmt,short_slottime,radio_measure ment,wpa2
nwid FreeWifi_secure chan 11 bssid 70:fc:8f:e2:d3:a2 -69dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid FreeWifi_secure chan 6 bssid e4:9e:12:88:4f:f5 -69dBm HT-MCS23 privacy,short_slottime,radio_measurement,wpa2,802. 1x
nwid NETGEAR_EXT chan 10 bssid 9c:c9:eb:e3:70:2c -71dBm HT-MCS15 short_preamble,short_slottime
Quote:
Originally Posted by J65nko View Post
You can check the ifconfig(8) man page and search for the WEP keyword : /WEP. It should be possible to manually connect with ifconfig run0 .......... You will get immediate feedback about any problems.
As stated in the initial message, I've tried to connect manually in many ways... And there is absolutely no warning/error.
Reply With Quote
  #4   (View Single Post)  
Old 9th June 2022
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,716
Default

Hello, and welcome!


Please note that there is a patch for the latest release -- OpenBSD 7.1 -- that fixes a channel scanning issue with some WiFi NICs, including run(4). You haven't posted your dmesg(8) so it is unclear what you're running; if you are running OpenBSD 7.1 without the patch, this could explain the issue. It's errata patch #001 for 7.1, installable with syspatch(8) on popular architectures.

From the commit log for sys/dev/usb/if_run.c:
Quote:
Use memset() to initialize struct ieee80211_rxinfo properly. Sven Wolf noticed that scans on ral(4) are buggy ever since I added a new field to this struct. Turns out a lot of drivers were initializing fields one-by-one, leaving any newly added fields uninitialized by default. Affected drivers may report wrong channel numbers for received beacons. The net80211 stack will discard such beacons, assuming they were received on the wrong channel due to signal leakage. Scanning is broken as result. from stsp@; ok miod@ this is errata/7.1/001_wifi.patch.sig
Reply With Quote
  #5   (View Single Post)  
Old 22nd June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default

Thanks for the info.

As stated in the initial message, I have 5 patches installed, which would be impossible if I had the buggy patch n°1, so this should not be the problem.
Reply With Quote
  #6   (View Single Post)  
Old 22nd June 2022
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,716
Default

Thanks for clarifying. I'd missed that in your initial post.
Reply With Quote
  #7   (View Single Post)  
Old 22nd June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default

Additional info:

- I have this error message when I run /etc/netstart with a parameter (interface)
Quote:
. ./netstart run0
ksh: /etc/rc.d/rc.subr[19]: _rc_actions: is read only
- Here is the output of tcpdump when I do many manual attempts (with vs. without 0x in key, with inet autoconf vs with dhclient vs. with dhcpreleasectl, etc.)
Quote:
# tcpdump -irun0
tcpdump: listening on run0, link-type EN10MB
00:46:49.424172 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xfa82e5e6 [|bootp] [tos 0x10]
00:46:57.954105 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xfa82e5e6 [|bootp] [tos 0x10]
00:47:14.484010 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xfa82e5e6 [|bootp] [tos 0x10]
00:47:49.830852 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x94932860 [|bootp] [tos 0x10]
00:47:49.830869 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x1d0701a1 [|bootp] [tos 0x10]
00:47:49.831185 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xd4cf3067 [|bootp] [tos 0x10]
00:47:50.643803 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:47:51.353863 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xd4cf3067 [|bootp] [tos 0x10]
00:47:53.883980 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:47:55.153762 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:47:55.413824 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:47:57.943769 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:48:00.093736 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:48:02.473731 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:48:11.003726 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:48:16.494057 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:48:29.532343 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x674680bd [|bootp] [tos 0x10]
00:48:46.421771 f4:cf:a2:28:5c:e6 sap 9c > Broadcast sap cb I (s=0,r=48,C) len=236
00:48:46.996024 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x2affb0d9 [|bootp] [tos 0x10]
00:48:46.996028 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x96a74791 [|bootp] [tos 0x10]
00:48:46.996328 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x634cc476 [|bootp] [tos 0x10]
00:48:47.053470 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:48:48.523490 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x634cc476 [|bootp] [tos 0x10]
00:48:51.053525 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x8156032d [|bootp] [tos 0x10]
00:48:51.193447 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:48:52.583479 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x8156032d [|bootp] [tos 0x10]
00:48:55.113451 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x8156032d [|bootp] [tos 0x10]
00:48:56.103428 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:48:59.643428 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x8156032d [|bootp] [tos 0x10]
00:49:06.487769 f4:cf:a2:28:5c:e6 sap 9c > Broadcast sap 13 I (s=0,r=48,R) len=236
00:49:07.040441 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x5dee7144 [|bootp] [tos 0x10]
00:49:07.040459 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x292a03c7 [|bootp] [tos 0x10]
00:49:07.040784 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x46e51562 [|bootp] [tos 0x10]
00:49:07.963376 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:08.563443 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x46e51562 [|bootp] [tos 0x10]
00:49:11.093448 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x2008c542 [|bootp] [tos 0x10]
00:49:12.363325 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:12.623354 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x2008c542 [|bootp] [tos 0x10]
00:49:15.153343 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x2008c542 [|bootp] [tos 0x10]
00:49:17.163340 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:19.683352 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x2008c542 [|bootp] [tos 0x10]
00:49:29.456855 7c:c1:77:fc:59:66 sap da > 01:80:c2:00:00:13 sap 17 I (s=0,r=48,C) len=49
00:49:29.618522 00:26:86:00:00:00 sap 14 > 01:80:c2:00:00:00 sap e3 I (s=0,r=48,C) len=58
00:49:30.652952 4a:94:e0:89:c3:14 sap 12 > 33:33:00:00:00:fb sap 7b I (s=0,r=48,R) len=117
00:49:31.150328 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x15c02d57 [|bootp] [tos 0x10]
00:49:31.150345 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x268f6555 [|bootp] [tos 0x10]
00:49:31.150581 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x9f038c3c [|bootp] [tos 0x10]
00:49:31.533215 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:34.127274 00:26:86:00:00:00 sap 32 > 01:80:c2:00:00:00 sap 4b I (s=0,r=48,C) len=58
00:49:34.293805 00:0a:44:80:0d:a1 sap 7a > Broadcast sap da I (s=24,r=48,C) len=240
00:49:39.026426 02:0f:b5:e3:70:2c sap 20 > 01:00:5e:7f:ff:fa null I (s=124,r=80,C) len=443
00:49:39.030488 02:0f:b5:e3:70:2c sap 20 > 01:00:5e:7f:ff:fa null I (s=124,r=80,C) len=443
00:49:39.839887 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb1a10353 [|bootp] [tos 0x10]
00:49:39.839892 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x606a2112 [|bootp] [tos 0x10]
00:49:39.840268 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xa246d72e [|bootp] [tos 0x10]
00:49:40.553207 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:41.363213 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xa246d72e [|bootp] [tos 0x10]
00:49:43.893250 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:49:45.023178 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:45.423193 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:49:47.953164 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:49:49.383189 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:49:52.483136 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:49:53.596644 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:50:10.123039 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xc069acbf [|bootp] [tos 0x10]
00:50:49.885773 08:c5:e1:ee:a5:76 sap fa > Broadcast sap 3a I (s=0,r=80,C) len=48
00:50:49.941500 00:26:86:00:00:00 sap 32 > Broadcast sap fc I (s=0,r=48,C) len=127
00:50:51.956768 cc:f4:11:76:ac:ac sap 9e > 33:33:00:00:00:01 sap 7a I (s=0,r=48,C) len=92
00:50:52.591849 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x7801bf28 [|bootp] [tos 0x10]
00:50:52.591854 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 4/0/0 PTR[|domain]
00:50:52.591855 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:50:52.591856 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:50:52.591857 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:50:52.591859 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:50:52.591860 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 4/0/0 PTR[|domain]
00:50:52.591861 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:50:52.591968 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x5a554a81 [|bootp] [tos 0x10]
00:50:52.592186 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x4b32f04d [|bootp] [tos 0x10]
00:50:52.782768 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:50:52.812814 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 9/0/0 PTR[|domain]
00:50:53.562963 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:50:54.112806 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x4b32f04d [|bootp] [tos 0x10]
00:50:56.642869 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:50:57.232756 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:50:58.172834 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:00.702787 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:01.562791 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:51:05.232736 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:13.762674 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:30.292584 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:52:02.822453 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:52:23.629446 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629463 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 4/0/0 PTR[|domain]
00:52:23.629465 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629466 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629467 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:23.629469 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 9/0/0 PTR[|domain]
00:52:23.629470 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:23.629471 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x13ea7cc8 [|bootp] [tos 0x10]
00:52:23.629783 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x1c1bba8b [|bootp] [tos 0x10]
00:52:24.352277 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:24.502335 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 9/0/0 PTR[|domain]
00:52:24.942293 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x1c1bba8b [|bootp] [tos 0x10]
00:52:25.162454 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:27.262356 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:28.492254 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:28.582268 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:30.902289 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:33.312227 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:35.222264 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:43.542187 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:45.138949 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:53:17.452000 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:53:24.338827 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]



36 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:13.762674 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:51:30.292584 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:52:02.822453 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0xb7c32e61 [|bootp] [tos 0x10]
00:52:23.629446 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629463 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 4/0/0 PTR[|domain]
00:52:23.629465 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629466 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0 [4q] [6n] ANY? BAL-L157X._sftp-ssh._tcp.local.[|domain]
00:52:23.629467 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:23.629469 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 9/0/0 PTR[|domain]
00:52:23.629470 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:23.629471 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x13ea7cc8 [|bootp] [tos 0x10]
00:52:23.629783 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x1c1bba8b [|bootp] [tos 0x10]
00:52:24.352277 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:24.502335 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 9/0/0 PTR[|domain]
00:52:24.942293 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x1c1bba8b [|bootp] [tos 0x10]
00:52:25.162454 fe80::20f:ff:fe32:e9c8.mdns > ff02::fb.mdns: 0*- [0q] 6/0/0 (Cache flush) TXT[|domain]
00:52:27.262356 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:28.492254 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:28.582268 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:30.902289 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:33.312227 fe80::20f:ff:fe32:e9c8 > ff02::2: icmp6: router solicitation
00:52:35.222264 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:43.542187 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:52:45.138949 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:53:17.452000 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:53:24.338827 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
00:54:28.661671 0.0.0.0.bootpc > 255.255.255.255.bootps: xid:0x979fde9f [|bootp] [tos 0x10]
Reply With Quote
  #8   (View Single Post)  
Old 23rd June 2022
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 3,975
Default

Yes, it shows 'wep' indeed .....
Code:
----->nwid NUMERICABLE-64FC chan 13 bssid c0:3f:0e:d8:74:b1 -53dBm 54M privacy,short_slottime,wep <-----
Just to make sure for the password/key. Assuming the key is 'Puffy' the hexadecimal code is 0x5075666679

Does the key contain French special characters that are not defined in the ASCII range? See ascii(7).
Then the question whether an encoding in UTF-8 hexadecimal will be accepted? See locale(1)
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
  #9   (View Single Post)  
Old 23rd June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default

Quote:
Originally Posted by J65nko View Post
Just to make sure for the password/key. Assuming the key is 'Puffy' the hexadecimal code is 0x5075666679
In my case, the key consists only of '[0-9A-F]+' thus I assume it is already in Hex format, there should not be any problem of locale. I'm trying with/without '0x' "just in case".

As a side note, this same key works perfectly in Linux Mint and Windows 10. So this should not be the problem either.
Reply With Quote
Old 23rd June 2022
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 3,975
Default

I think just a string of hexadecimal character should be accepted:
Code:
$ cat Fr_password.txt
limité à

$ cat Fr_password.txt  | hexdump -C
00000000  6c 69 6d 69 74 c3 a9 20  c3 a0 0a                 |limit.. ...|
Code:
6c - l
69 - i
6d - m
69 - i
74 - t
c3 a9 - é
20 - space
c3 a0 - à
0a - newline
So in this case, ignoring the newline, the following should be accepted as password: 0x6c696d6974c3a920c3a0
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump

Last edited by J65nko; 26th June 2022 at 12:57 AM. Reason: It should be 0x6c..... and not %x6c............
Reply With Quote
Old 23rd June 2022
liar666 liar666 is offline
New User
 
Join Date: Jun 2022
Posts: 8
Default

Quote:
Originally Posted by J65nko View Post
So in this case, ignoring the newline, the following should be accepted as password: %x6c696d6974c3a920c3a0
Just to clarify, the key would be 0x6c696d6974c3a920c3a0, not %x6c696d6974c3a920c3a0. Am I right?
Reply With Quote
Old 26th June 2022
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 3,975
Default

Yes, you are right. It should start with 0x and not %x Silly me
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
Reply

Tags
dhcp, openbsd 7.1, wifi

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Unable to connect to wifi stanl OpenBSD General 3 11th July 2021 12:06 AM
[Solved] OpenBSD cannot connect to the WiFi LeFrettchen OpenBSD General 0 17th May 2018 01:41 PM
Can I connect to unprotected Wifi ? e1-531g OpenBSD General 17 15th August 2017 07:44 PM
connect to wifi networks without GUI spermwhale_warrior NetBSD Installation and Upgrading 6 24th November 2015 07:27 PM
Ralink RT2860 ccc FreeBSD General 9 5th March 2009 01:56 PM


All times are GMT. The time now is 10:12 AM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick