Public bug reported: Binary package hint: network-manager
My name is Luke Hoersten and I'm the Purdue Linux Users Group president. Last year, Purdue University released a new wireless system for students to connect called PAL2.0 (Purdue Air Link). It uses WPA-Enterprise and unfortunately doesn't work with NetworkManager. It's keeping many students from switching to Ubuntu (Purdue has 40,000 students so the amount of perspective Linux users is high). The way PAL2.0 works is as such: 1. Students first connect to an ESSID called PAL2.0-Instructions which serves one web page to tell Windows users how to connect to PAL2.0. It's essentially a hidden ESSID. 2. NetworkManager connects to PAL2.0-Instructions fine. Then with NM, one must use the "Connect to Other Wireless Network..." feature and type PAL2.0 as the ESSID to connect to. 3. Maybe every 1 in 500 times NM is able to find PAL2.0, prompt for the WPA-Enterprise info, and connect. Most of the time it never connects and even sometimes crashes nm-applet. I've got in contact with the head wireless IT guy at Purdue and asked him for any and all info he can give. I'd appreciate if you could go through his email and see if you can find why PAL2.0 and NM don't play nice. Here's what he said: ---------- Forwarded message ---------- From: Case, Brandon J Date: Sep 3, 2007 9:49 AM Subject: RE: FW: PAL2.0 and Ubuntu To: Luke Hoersten Luke, The authentication method for PAL2.0 is formally known as WPA-Enterprise. It's configured like any other WPA-Enterprise network would be. WPA technically specifies some kind of encryption and some kind of authentication mechanism with EAP (be it TLS, TTLS, PEAP, etc.). We use TKIP encryption for two reasons: it's guaranteed to work with any WPA-compliant wireless card and most of our access points don't support WPA2 since they are older (you'll notice we only have 11b service most everywhere on campus). We also are using PEAP for authentication since it's the only password-based method available: all others require a client certificate. To understand the PAL2.0 connection process you'll need to know some basics about wi-fi, mainly that associated and authenticated are two different states and that one can't happen without the other happening first. It's always associate, then authenticate. In the case of PAL2.0-Instructions there is no secure authentication method specified ("open" in the SSID configuration) so there is no formal authentication process. With PAL2.0 you can associate but before any kind of even Layer 2 connectivity is allowed you must be authenticated by the access point. In our case this is done with a standard RADIUS authentication process (using I2A2 as the actual username/password database) and this is where your credentials are verified and the necessary encryption keys are negotiated. After you've been authenticated the access point allows Layer 2 traffic which lets you obtain a DHCP address and off you go. Our access points have VLAN support so yes there is only one set of access points on campus that run PAL2.0-Instructions, PAL2.0, PAL and the other SSIDs we use from time to time. From each AP, the BSSID is the same for every SSID: the MAC address of its radio interface. The AP keeps track of clients by SSID even though technically they're all on the same BSSID. There is another method of handling multiple SSIDS called mbssid which essentially successively adds to the radio MAC address every time there is a new SSID, resulting in a unique BSSID for each SSID. This also allows each SSID to be broadcast instead of just one. Again, most of our access points do not support this but a handful, comparatively, do so for consistency's sake (necessary when you manage ~1400 access points) we leave mbssid off. The only spot of troubleshooting details I can give that would be helpful are from my attempts to get NetworkManager working. I noticed in /var/log/syslog that wpa_supplicant is trying to connect, repeatedly, to an all 0's BSSID. Eventually it blacklists it but it seems as if sometimes it connects and sometimes it does not without any real rhyme or reason why. I had the same results with ndiswrapper and the madwifi driver (Dell 1450 abg USB adapter and Intel 3945ABG respectively). This could be the result of PAL2.0 not being broadcast but if the driver properly sends and receives probe requests and responses it should be able to determine the proper BSSID for PAL2.0 before it tries to associate. Let me know if you need any more details, I know that was a lot. Brandon ** Affects: network-manager (Ubuntu) Importance: Medium Assignee: Alexander Sack (asac) Status: Incomplete -- Purdue Wireless + NetworkManager does not provide wireless connectivity https://bugs.launchpad.net/bugs/144140 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs