0

如果在开放模式下使用 WEP 安全,那么运行 Linux 内核的客户端如何能够检查由于错误的密钥而导致身份验证失败,但因为它是 WEP 开放模式,所以关联成功。

4

1 回答 1

0

您将在 wpa_supplican 的日志中看到这一点。它看起来像这样(对不起,只是我在互联网上找到的随机示例):

[  778.327092] wlan0: associated
[  778.332503] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 
[  788.334222] wlan0: disassociating from 00:1c:f0:b1:80:6a by local choice (reason=3) 
[  788.341433] cfg80211: Calling CRDA for country: US 
[  788.342348] wlan0: deauthenticating from 00:1c:f0:b1:80:6a by local choice (reason=3) 
[  789.122029] wlan0: no IPv6 routers present 
[  789.263341] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 1) 
[  789.463049] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 2) 
[  789.663048] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 3) 
[  789.863057] wlan0: authentication with 00:1c:f0:b1:80:6a timed out 

从上面的日志可以看出,客户端已经成功关联(778.327092),但在认证阶段失败(789.863057)。

您还可以使用 *wpa_cli* 及其“状态”命令:

> status 
bssid=00:1c:f0:b1:80:6a 
ssid=KLUK2 
id=1 
mode=station 
pairwise_cipher=NONE 
group_cipher=NONE 
key_mgmt=IEEE 802.1X (no WPA) 
wpa_state=ASSOCIATED 
Supplicant PAE state=CONNECTING 
suppPortStatus=Unauthorized 
EAP state=IDLE 
<2>Authentication with 00:1c:f0:b1:80:6a timed out. 
> <2>CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3 
> <2>CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3 
> <2>CTRL-EVENT-SCAN-RESULTS 
> <2>Trying to authenticate with 00:1c:f0:b1:80:6a (SSID='KLUK2' freq=2437 MHz) 
<2>CTRL-EVENT-SCAN-RESULTS 
<2>CTRL-EVENT-BSS-REMOVED 0 00:1d:19:cd:43:a1 
> <2>CTRL-EVENT-BSS-REMOVED 1 00:24:fe:82:ea:d9 
> <2>CTRL-EVENT-BSS-REMOVED 2 00:04:0e:8e:a7:fe 
> <2>CTRL-EVENT-SCAN-RESULTS 
于 2012-11-22T12:46:04.193 回答