如果在开放模式下使用 WEP 安全,那么运行 Linux 内核的客户端如何能够检查由于错误的密钥而导致身份验证失败,但因为它是 WEP 开放模式,所以关联成功。
问问题
338 次
1 回答
0
您将在 wpa_supplican 的日志中看到这一点。它看起来像这样(对不起,只是我在互联网上找到的随机示例):
[ 778.327092] wlan0: associated
[ 778.332503] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 788.334222] wlan0: disassociating from 00:1c:f0:b1:80:6a by local choice (reason=3)
[ 788.341433] cfg80211: Calling CRDA for country: US
[ 788.342348] wlan0: deauthenticating from 00:1c:f0:b1:80:6a by local choice (reason=3)
[ 789.122029] wlan0: no IPv6 routers present
[ 789.263341] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 1)
[ 789.463049] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 2)
[ 789.663048] wlan0: authenticate with 00:1c:f0:b1:80:6a (try 3)
[ 789.863057] wlan0: authentication with 00:1c:f0:b1:80:6a timed out
从上面的日志可以看出,客户端已经成功关联(778.327092),但在认证阶段失败(789.863057)。
您还可以使用 *wpa_cli* 及其“状态”命令:
> status
bssid=00:1c:f0:b1:80:6a
ssid=KLUK2
id=1
mode=station
pairwise_cipher=NONE
group_cipher=NONE
key_mgmt=IEEE 802.1X (no WPA)
wpa_state=ASSOCIATED
Supplicant PAE state=CONNECTING
suppPortStatus=Unauthorized
EAP state=IDLE
<2>Authentication with 00:1c:f0:b1:80:6a timed out.
> <2>CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
> <2>CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
> <2>CTRL-EVENT-SCAN-RESULTS
> <2>Trying to authenticate with 00:1c:f0:b1:80:6a (SSID='KLUK2' freq=2437 MHz)
<2>CTRL-EVENT-SCAN-RESULTS
<2>CTRL-EVENT-BSS-REMOVED 0 00:1d:19:cd:43:a1
> <2>CTRL-EVENT-BSS-REMOVED 1 00:24:fe:82:ea:d9
> <2>CTRL-EVENT-BSS-REMOVED 2 00:04:0e:8e:a7:fe
> <2>CTRL-EVENT-SCAN-RESULTS
于 2012-11-22T12:46:04.193 回答