Search Linux Wireless

Distinguishing wrong password from other failure to connect?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi.  Curious if there is a way to distinguish between the various
failure modes when failing to make an association to an AP.

In particular, I'd love to distinguish between these two states:

* User entered incorrect password

* User entered correct password, but the AP rejected them for some other
reason (perhaps signal was too weak, or the AP is using MAC address
filtering, or they couldn't negotiate a common encryption/authentication
protocol, or whatever).

Does the Linux wireless stack support a way for applications to gather
this information?  Are the "reason=0x00" bytes, sometimes displayed by
wpa_supplicant in the logs, standardized across all AP's?

This seems to be a common problem, because on many distributions, I see
NetworkManager constantly popping up the password entry box whenever an
association fails, when the user already knows the password is correct
(and in fact has entered it into the box already, as it's pre-filled in
the box, albeit starred out).

Thanks!

Josh
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux