Web Access Vagrant - vagrant

I can SSH into my vagrant box fine, and also do this from another computer on the network which is great, but I cant seem to access the URL.
Even on the host computer when I try visiting 192.168.1.127 I get
This web page is not available
Currently my ifconfig on SSH :
vagrant#vagrant:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:91:14:ca
inet addr:10.0.2.15 Bcast:10.0.2.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fe91:14ca/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:490 errors:0 dropped:0 overruns:0 frame:0
TX packets:314 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:52297 (52.2 KB) TX bytes:43532 (43.5 KB)
eth1 Link encap:Ethernet HWaddr 08:00:27:5b:38:98
inet addr:192.168.1.127 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:762 errors:0 dropped:0 overruns:0 frame:0
TX packets:69 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:72423 (72.4 KB) TX bytes:8567 (8.5 KB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
My vagrant file :
# -*- mode: ruby -*-
# vi: set ft=ruby :
VAGRANTFILE_API_VERSION = "2"
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
config.vm.box = "chef/ubuntu-14.04"
config.vm.network :public_network, ip: '192.168.1.127', :netmask => '255.255.255.0', :bridge => 'eth0'
config.vm.synced_folder "../pqs4", "/var/www/pqs4/", :nfs => false, :mount_options => ["dmode=777","fmode=666"]
config.vm.define :pqs4 do |t|
end
config.vm.provider "virtualbox" do |v|
v.name = "pqs4"
v.memory = 4096
v.cpus = 4
end
config.vm.provision :shell, :path => "provision.sh"
config.vm.provision "ansible" do |provisioner|
provisioner.inventory_path = "hosts"
provisioner.playbook = "playbook.yml"
provisioner.verbose = 'v'
provisioner.limit = 'all'
end
end

Related

Ping specific IP range is not working in Mac

I have edit my /etc/hosts file as below. I am new to mac Os and try to run some codes and test. for that i have to edit /etc/hosts file. But ping for IPs not working as expected. please help me to understand the issue.
# Host Database
#
# localhost is used to configure the loopback interface
# when the system is booting. Do not change this entry.
##
127.0.0.1 localhost
255.255.255.255 broadcasthost
::1 localhost
127.0.0.1 198.18.0.98
127.0.0.1 70.70.70.70
127.0.0.1 nipuna.lk
# Added by Docker Desktop
# To allow the same kube context to work on the host and the container:
127.0.0.1 kubernetes.docker.internal
# End of section
ping nipuna.lk works fine. ping 70.70.70.70 takes 300-400ms but ping works. but ping 198.18.0.98 is not working. I do not know why this is happening.
My firewall is turned off.
macOs Big Sur
version 11.2.3 (20D91)
ifconfig
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether ac:de:48:00:11:22
inet6 fe80::aede:48ff:fe00:1122%en5 prefixlen 64 scopeid 0x4
nd6 options=201<PERFORMNUD,DAD>
media: autoselect (100baseTX <full-duplex>)
status: active
ap1: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether aa:e9:fe:87:df:7a
media: autoselect
status: inactive
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 88:e9:fe:87:df:7a
inet6 fe80::808:35e:834f:b528%en0 prefixlen 64 secured scopeid 0x6
inet 192.168.1.4 netmask 0xffffff00 broadcast 192.168.1.255
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 9e:68:c9:36:de:63
inet6 fe80::9c68:c9ff:fe36:de63%awdl0 prefixlen 64 scopeid 0x7
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 9e:68:c9:36:de:63
inet6 fe80::9c68:c9ff:fe36:de63%llw0 prefixlen 64 scopeid 0x8
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:01
media: autoselect <full-duplex>
status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:00
media: autoselect <full-duplex>
status: inactive
en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:05
media: autoselect <full-duplex>
status: inactive
en4: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:04
media: autoselect <full-duplex>
status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether 82:23:8d:28:44:01
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x0
member: en1 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 9 priority 0 path cost 0
member: en2 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 10 priority 0 path cost 0
member: en3 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 11 priority 0 path cost 0
member: en4 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 12 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::22d9:6676:ea11:6a32%utun0 prefixlen 64 scopeid 0xe
nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::fbf9:4cfd:3512:fa43%utun1 prefixlen 64 scopeid 0xf
nd6 options=201<PERFORMNUD,DAD>

Hi3516D : Kernel Panic while booting from NFS with uboot

I'm trying to boot my kernel from NFS... i have some problem with env. variables on Uboot.
Actually this is work well with ubuntu v14.04.5 LTS NFS kernel server but v18.04.1 is not.
this is my printenv list :
bootdelay=1
baudrate=115200
bootfile="uImage"
mdio_intf=mii
ram_cmd=setenv bootcmd nand read \$(kernel_addr) 0x200000 0x400000\; nand read \$(rootfs_addr) 0x600000 0x700000\; bootm \$(kernel_addr) \$(rootfs_addr)
ram_args=setenv bootargs root=/dev/ram rw rootfstype=ext4 $(fixed_args) $(mtdparts)
nfs_cmd=setenv bootcmd tftp \$(kernel_addr) \$(kernel_tftp_path)\; bootm \$(kernel_addr)
nfs_args=setenv bootargs root=/dev/nfs noinitrd $(fixed_args) $(mtdparts) ip=$(ipaddr):$(serverip):$(gatewayip):$(netmask):$(hostname)::off nfsroot=$(serverip):$(nfsroot) ethaddr=$(ethaddr)
fixed_args=mem=256M console=ttyAMA0,115200
mtdparts=mtdparts=hinand:1M(boot),1M(env),4M(kernel),7M(rootfs),16M(work),24M(www),6M(fw),3M(log),2M(config),64M(data)
kernel_addr=0x82000000
rootfs_addr=0x82400000
hostname=hi3516d_hi
filesize=515E61
fileaddr=82000000
ethaddr=4A:A4:14:6E:F8:F7
boot_mode=nfs
gatewayip=10.20.0.20
serverip=10.20.9.77
ipaddr=10.20.9.110
netmask=255.255.0.0
nfsroot=/home/thkim/build_h3516d_ptz_rel/target
kernel_tftp_path=thkim_H3516D/kernel/curr.kernel
stdin=serial
stdout=serial
stderr=serial
verify=n
factory=0
bootcmd=tftp $(kernel_addr) $(kernel_tftp_path); bootm $(kernel_addr)
bootargs=root=/dev/nfs noinitrd mem=256M console=ttyAMA0,115200 mtdparts=hinand:1M(boot),1M(env),4M(kernel),7M(rootfs),16M(work),24M(www),6M(fw),3M(log),2M(config),64M(data) ip=10.20.9.110:10.20.9.77:10.20.0.20:255.255.0.0:hi3516d_hi::off nfsroot=10.20.9.77:/home/thkim/build_h3516d_ptz_rel/target ethaddr=4A:A4:14:6E:F8:F7
ver=U-Boot 2010.06 (Feb 06 2018 - 11:07:28)
this is the error while booting(last rows) :
IP-Config: Complete:
device=eth0, addr=10.20.9.110, mask=255.255.0.0, gw=10.20.0.20
host=hi3516d_hi, domain=, nis-domain=(none)
bootserver=10.20.9.77, rootserver=10.20.9.77, rootpath=
VFS: Unable to mount root fs via NFS, trying floppy.
VFS: Cannot open root device "nfs" or unknown-block(2,0): error -6
Please append a correct "root=" boot option; here are the available partitions:
f000 1024 romblock0 (driver?)
1f00 1024 mtdblock0 (driver?)
f001 1024 romblock1 (driver?)
1f01 1024 mtdblock1 (driver?)
f002 4096 romblock2 (driver?)
1f02 4096 mtdblock2 (driver?)
f003 7168 romblock3 (driver?)
1f03 7168 mtdblock3 (driver?)
f004 16384 romblock4 (driver?)
1f04 16384 mtdblock4 (driver?)
f005 24576 romblock5 (driver?)
1f05 24576 mtdblock5 (driver?)
f006 6144 romblock6 (driver?)
1f06 6144 mtdblock6 (driver?)
f007 3072 romblock7 (driver?)
1f07 3072 mtdblock7 (driver?)
f008 2048 romblock8 (driver?)
1f08 2048 mtdblock8 (driver?)
f009 65536 romblock9 (driver?)
1f09 65536 mtdblock9 (driver?)
Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(2,0)
I can't know what is the problem...
Can anyone help me ??
Thanks a lot !
This problem is solved.
It was simply a problem because NFS Protocol v2 was disabled.
After activating Protocol v2 of NFS Kernel Server, I confirmed that it is mounted normally.
And I heard this site is for code and programming so I will ask another site(unix.stackexchange.com) when I have a problem like this.
Thanks a lot!

Ruby Net::HTTP not sending TCP Keep-Alive packets, resulting in "Errno::ECONNRESET - Connection reset by peer" exceptions

I'm interacting with an API that accepts POST requests over HTTPS and responds with XML. The data take a long time for the remote server to generate, which means that my local client waits for several minutes between sending its POST request and receiving a response. Sometimes the response comes back as expected, but other times Ruby (2.3.1p112) raises the following exception after a long pause:
Exception occurred: Errno::ECONNRESET - Connection reset by peer
/usr/share/ruby/openssl/buffering.rb:178:in `sysread_nonblock'
/usr/share/ruby/openssl/buffering.rb:178:in `read_nonblock'
/usr/share/ruby/net/protocol.rb:154:in `rbuf_fill'
/usr/share/ruby/net/protocol.rb:136:in `readuntil'
/usr/share/ruby/net/protocol.rb:146:in `readline'
/usr/share/ruby/net/http/response.rb:40:in `read_status_line'
/usr/share/ruby/net/http/response.rb:29:in `read_new'
/usr/share/ruby/net/http.rb:1437:in `block in transport_request'
/usr/share/ruby/net/http.rb:1434:in `catch'
/usr/share/ruby/net/http.rb:1434:in `transport_request'
/usr/share/ruby/net/http.rb:1407:in `request'
Out of curiosity, I tried making the same requests using cURL, and found that I got a response back every single time, never encountering a connection reset initiated by the remote host. The cURL and Ruby requests were being run on the same machine, so I figured it wasn't a low-level system or networking issue. Trying to find some difference, I ran Wireshark and looked at the packets being sent back and forth during the requests.
First with Ruby:
1302978 3988.123708 [local-ip] → [remote-ip] SSL 286 Client Hello
1302981 3988.189299 [remote-ip] → [local-ip] TLSv1.2 463 Server Hello, Certificate
1302982 3988.189388 [local-ip] → [remote-ip] TCP 54 55265 → 443 [ACK] Seq=233 Ack=1361 Win=65535 Len=0
1302983 3988.189389 [local-ip] → [remote-ip] TCP 54 55265 → 443 [ACK] Seq=233 Ack=2721 Win=65535 Len=0
1302984 3988.189389 [local-ip] → [remote-ip] TCP 54 55265 → 443 [ACK] Seq=233 Ack=3130 Win=65535 Len=0
1302985 3988.194978 [remote-ip] → [local-ip] TLSv1.2 396 Server Key Exchange, Server Hello Done
1302986 3988.195047 [local-ip] → [remote-ip] TCP 54 55265 → 443 [ACK] Seq=233 Ack=3472 Win=65535 Len=0
1302987 3988.195812 [local-ip] → [remote-ip] TLSv1.2 180 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
1302988 3988.257643 [remote-ip] → [local-ip] TCP 60 443 → 55265 [ACK] Seq=3472 Ack=359 Win=35098 Len=0
1302989 3988.272131 [remote-ip] → [local-ip] TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
1302990 3988.272200 [local-ip] → [remote-ip] TCP 54 55265 → 443 [ACK] Seq=359 Ack=3523 Win=65535 Len=0
1302994 3988.339450 [remote-ip] → [local-ip] TCP 60 443 → 55265 [ACK] Seq=3523 Ack=945 Win=34512 Len=0
1302995 3988.339455 [remote-ip] → [local-ip] TCP 60 443 → 55265 [ACK] Seq=3523 Ack=1206 Win=34251 Len=0
1406186 4376.828078 [remote-ip] → [local-ip] TCP 54 443 → 55265 [RST, ACK] Seq=3523 Ack=1206 Win=9300 Len=0
Then with cURL:
51468 268.062527 [local-ip] → [remote-ip] SSL 292 Client Hello
51472 268.125416 [remote-ip] → [local-ip] TLSv1.2 463 Server Hello, Certificate
51473 268.125530 [local-ip] → [remote-ip] TCP 54 53819 → 443 [ACK] Seq=239 Ack=1361 Win=65535 Len=0
51474 268.125531 [local-ip] → [remote-ip] TCP 54 53819 → 443 [ACK] Seq=239 Ack=2721 Win=65535 Len=0
51475 268.125531 [local-ip] → [remote-ip] TCP 54 53819 → 443 [ACK] Seq=239 Ack=3130 Win=65535 Len=0
51476 268.132509 [remote-ip] → [local-ip] TLSv1.2 396 Server Key Exchange, Server Hello Done
51477 268.132604 [local-ip] → [remote-ip] TCP 54 53819 → 443 [ACK] Seq=239 Ack=3472 Win=65535 Len=0
51479 268.158620 [local-ip] → [remote-ip] TLSv1.2 129 Client Key Exchange
51481 268.220146 [remote-ip] → [local-ip] TCP 60 443 → 53819 [ACK] Seq=3472 Ack=314 Win=35137 Len=0
51482 268.220216 [local-ip] → [remote-ip] TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
51483 268.281636 [remote-ip] → [local-ip] TCP 60 443 → 53819 [ACK] Seq=3472 Ack=365 Win=35086 Len=0
51484 268.281642 [remote-ip] → [local-ip] TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
51485 268.281718 [local-ip] → [remote-ip] TCP 54 53819 → 443 [ACK] Seq=365 Ack=3523 Win=65535 Len=0
51487 268.344020 [remote-ip] → [local-ip] TCP 60 443 → 53819 [ACK] Seq=3523 Ack=770 Win=34681 Len=0
62427 328.950531 [local-ip] → [remote-ip] TCP 54 [TCP Keep-Alive] 53819 → 443 [ACK] Seq=769 Ack=3523 Win=65535 Len=0
62435 329.012004 [remote-ip] → [local-ip] TCP 60 [TCP Window Update] 443 → 53819 [ACK] Seq=3523 Ack=770 Win=65535 Len=0
72644 389.584563 [local-ip] → [remote-ip] TCP 54 [TCP Keep-Alive] 53819 → 443 [ACK] Seq=769 Ack=3523 Win=65535 Len=0
72647 389.647037 [remote-ip] → [local-ip] TCP 60 [TCP Keep-Alive ACK] 443 → 53819 [ACK] Seq=3523 Ack=770 Win=65535 Len=0
The pertinent difference I found is that cURL is sending a TCP Keep-Alive packet every minute while it waits for a response, letting the server know that it is still active and wishes to keep its connection open. Ruby Net::HTTP is not sending these packets and eventually gets a TCP RST (reset) from the remote host, which triggers the Errno::ECONNRESET exception.
So my question is: is there some way to configure Net::HTTP to send those TCP Keep-Alive packets and keep my connection open? Thanks!
Edit: I was able to work around this by switching to Typhoeus (which wraps cURL) and passing the option tcp_keepalive: true to my requests, which is the flag that tells cURL to send keepalive probes.
I'll leave this question open in case someone has insight on whether it's possible to get this same behavior from Net::HTTP.
You can specify keep alive in the header of the request, this isn't specific to nethttp though! https://tools.ietf.org/id/draft-thomson-hybi-http-timeout-01.html

How to get the audio and video from a WebRTC stream using ffmpeg on server

I am trying to get the audio and video from a WebRTC stream and handle it (transcode or dump) with ffmpeg on ubuntu server. I have naively expected it to simply interpret the sdp offered by WebRTC, but was mistaken. I suspect ffmpeg is not capable of signaling back the answer sdp and it is must be done manually. Here is an offer sdp:
v=0
o=Mozilla-SIPUA-33.1 3662 0 IN IP4 0.0.0.0
s=SIP Call
t=0 0
a=ice-ufrag:5e0a74d1
a=ice-pwd:7446c0eb445117d0018ca2afc5f3ca54
a=fingerprint:sha-256 76:1B:19:CE:3F:41:C5:4D:64:E6:FD:72:D2:FC:42:E1:98:D4:0F:2B:73:AE:C7:F4:2C:73:2C:E7:9E:DC:6A:EB
m=audio 23063 RTP/SAVPF 109 0 8 101
c=IN IP4 188.253.146.208
a=rtpmap:109 opus/48000/2
a=ptime:20
a=rtpmap:0 PCMU/8000
a=rtpmap:8 PCMA/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=sendrecv
a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level
a=setup:actpass
a=candidate:0 1 UDP 2128609535 192.168.1.100 4130 typ host
a=candidate:1 1 UDP 1692467199 188.253.146.208 23063 typ srflx raddr 192.168.1.100 rport 4130
a=candidate:0 2 UDP 2128609534 192.168.1.100 4131 typ host
a=candidate:1 2 UDP 1692467198 188.253.146.208 23064 typ srflx raddr 192.168.1.100 rport 4131
a=rtcp-mux
m=video 23065 RTP/SAVPF 120 126 97
c=IN IP4 188.253.146.208
a=rtpmap:120 VP8/90000
a=rtpmap:126 H264/90000
a=fmtp:126 profile-level-id=42e01f;packetization-mode=1
a=rtpmap:97 H264/90000
a=fmtp:97 profile-level-id=42e01f
a=sendrecv
a=rtcp-fb:120 nack
a=rtcp-fb:120 nack pli
a=rtcp-fb:120 ccm fir
a=rtcp-fb:126 nack
a=rtcp-fb:126 nack pli
a=rtcp-fb:126 ccm fir
a=rtcp-fb:97 nack
a=rtcp-fb:97 nack pli
a=rtcp-fb:97 ccm fir
a=setup:actpass
a=candidate:0 1 UDP 2128609535 192.168.1.100 4132 typ host
a=candidate:1 1 UDP 1692467199 188.253.146.208 23065 typ srflx raddr 192.168.1.100 rport 4132
a=candidate:0 2 UDP 2128609534 192.168.1.100 4133 typ host
a=candidate:1 2 UDP 1692467198 188.253.146.208 23066 typ srflx raddr 192.168.1.100 rport 4133
a=rtcp-mux
Is anybody have succeeded in it? Thanks.
Not possible without "something" in between the stream source (peer) and ffmpeg; until and unless ffmpeg starts working with DTLS and you know the hash information for the peer (obviously this could be in the SDP). So in summary, ffmpeg would need DTLS and ICE support. An alternative would be to use GStreamer with plugins.

WPA supplicant ERROR WPA: 4-Way Handshake failed in WiFi Direct setup

I am trying to set up WiFi Direct between two linux machines. I am using Atheros 9k cards to set up the connections. We have a problem in the process which I hope you guys can help me.
When I run WPA Supplicant in both of the parts, I get this:
wpa_supplicant -B -D nl80211 -i wlan0 -cp2p.conf -d
wpa_supplicant v2.2-devel
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'wlan0' conf 'p2p.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'p2p.conf' -> '/root/p2p.conf'
Reading configuration file '/root/p2p.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=2
update_config=1
device_name='giulia118'
p2p_go_ht40=1
Priority group 0
id=0 ssid='Direct_Network'
nl80211: Could not add multicast membership for vendor events: -2 (No such file or directory)
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x9fa4380
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040a
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040b
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040c
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040d
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090a
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090b
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090c
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090d
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0409506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=7f506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=06
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0a07
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0a11
netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlan0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 # 40 MHz 20 mBm
nl80211: 2457-2482 # 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 # 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 # 40 MHz 20 mBm (no IR)
nl80211: 5735-5835 # 40 MHz 20 mBm (no IR)
nl80211: Added 802.11b mode based on 802.11g information
wlan0: Own MAC address: 04:f0:21:06:1d:14
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wlan0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlan0: Setting scan request: 0.100000 sec
wlan0: WPS: UUID based on MAC address: 94f8bf7f-bad8-5fc8-87c2-05c3afbed265
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
P2P: Own listen channel: 6
P2P: Random operating channel: 81:6
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Add operating class 115
P2P: Channels - hexdump(len=4): 24 28 2c 30
P2P: Add operating class 124
P2P: Channels - hexdump(len=4): 95 99 9d a1
P2P: Add operating class 116
P2P: Channels - hexdump(len=2): 24 2c
P2P: Add operating class 117
P2P: Channels - hexdump(len=2): 28 30
P2P: Add operating class 126
P2P: Channels - hexdump(len=2): 95 9d
P2P: Add operating class 127
P2P: Channels - hexdump(len=2): 99 a1
P2P: initialized
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 124:149,153,157,161 116:36,44 117:40,48 126:149,157 127:153,161
P2P: cli_channels:
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Daemonize..
Then I run wpa_cli and I use the commands for create a p2p group in pbc (Pusg button Control), and the final messages of the failed connection are:
1st Device:
<3>WPS-AP-AVAILABLE-PBC
<3>SME: Trying to authenticate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Trying to associate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Associated with 04:f0:21:06:1d:1f
<3>CTRL-EVENT-EAP-STARTED EAP authentication started
<3>CTRL-EVENT-EAP-STATUS status='started' parameter=''
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=1
<3>CTRL-EVENT-EAP-STATUS status='accept proposed method' parameter='WSC'
<3>CTRL-EVENT-EAP-METHOD EAP vendor 14122 method 1 (WSC) selected
<3>WPS-CRED-RECEIVED
<3>WPS-SUCCESS
<3>P2P-GROUP-FORMATION-SUCCESS
<3>CTRL-EVENT-EAP-STATUS status='completion' parameter='failure'
<3>CTRL-EVENT-EAP-FAILURE EAP authentication failed
<3>CTRL-EVENT-DISCONNECTED bssid=04:f0:21:06:1d:1f reason=3 locally_generated=1
<3>SME: Trying to authenticate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Trying to associate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
<3>Associated with 04:f0:21:06:1d:1f
<3>CTRL-EVENT-DISCONNECTED bssid=04:f0:21:06:1d:1f reason=2
<3>WPA: 4-Way Handshake failed - pre-shared key may be incorrect
<3>CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
<3>CTRL-EVENT-SCAN-STARTED
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>P2P-GROUP-FORMATION-FAILURE
<3>P2P-GROUP-REMOVED wlan0 client reason=FORMATION_FAILED
2nd Device:
<3>AP-ENABLED
<3>CTRL-EVENT-CONNECTED - Connection to 04:f0:21:06:1d:1f completed [id=1 id_str=]
<3>P2P-GROUP-STARTED wlan0 GO ssid="DIRECT-Mj" freq=2412 passphrase="ZPHbkRAf" go_dev_addr=04:f0:21:06:1d:1f
wps_pbc
> OK
<3>WPS-PBC-ACTIVE
<3>P2P-PROV-DISC-PBC-REQ 04:f0:21:06:1d:14 p2p_dev_addr=04:f0:21:06:1d:14 pri_dev_type=1-0050F204-1 name='giulia118' config_methods=0x108 dev_capab=0x21 group_capab=0x0 group=wlan0
<3>WPS-ENROLLEE-SEEN 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265 1-0050F204-1 0x2108 4 1 [giulia118]
<3>CTRL-EVENT-EAP-STARTED 04:f0:21:06:1d:14
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
<3>WPS-REG-SUCCESS 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265
<3>WPS-PBC-DISABLE
<3>WPS-SUCCESS
<3>CTRL-EVENT-EAP-FAILURE 04:f0:21:06:1d:14
<3>WPS-ENROLLEE-SEEN 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265 1-0050F204-1 0x2108 0 0 [giulia118]
The content of my configuration (p2p.conf) file is:
1st Device:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
fast_reauth=1
update_config=1
device_name=giulia116
device_type=1-0050F204-1
p2p_go_ht40=1
network={
ssid="Direct_Network"
psk="12345678"
proto=RSN WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
}
2nd Device:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
update_config=1
device_name=giulia118
device_type=1-0050F204-1
p2p_go_ht40=1
network={
ssid="Direct_Network"
psk="12345678"
key_mgmt=WPA-PSK
group=CCMP TKIP
}
ifconfig:
eth0 Link encap:Ethernet HWaddr 00:0d:b9:2e:1b:88
inet addr:192.168.97.116 Bcast:192.168.97.255 Mask:255.255.255.0
inet6 addr: fe80::20d:b9ff:fe2e:1b88/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2949 errors:0 dropped:0 overruns:0 frame:0
TX packets:1840 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:321032 (321.0 KB) TX bytes:268766 (268.7 KB)
Interrupt:10 Base address:0xe000
eth1 Link encap:Ethernet HWaddr 00:0d:b9:2e:1b:89
inet addr:172.16.0.235 Bcast:172.16.0.255 Mask:255.255.255.0
inet6 addr: fe80::20d:b9ff:fe2e:1b89/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:163951 errors:0 dropped:0 overruns:0 frame:0
TX packets:35 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:17016272 (17.0 MB) TX bytes:4093 (4.0 KB)
Interrupt:15
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
mon.wlan0 Link encap:UNSPEC HWaddr 04-F0-21-06-1D-1F-30-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:716 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:104534 (104.5 KB) TX bytes:0 (0.0 B)
wlan0 Link encap:Ethernet HWaddr 04:f0:21:06:1d:1f
inet6 addr: fe80::6f0:21ff:fe06:1d1f/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:13 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2154 (2.1 KB) TX bytes:576 (576.0 B)
.config :
CONFIG_DRIVER_NL80211=y
CONFIG_READLINE=y
CONFIG_CTRL_IFACE=y
CONFIG_WPS=y
CONFIG_WPS2=y
CONFIG_P2P=y
CONFIG_AP=y
#CONFIG_DRIVER_WEXT=y
#CONFIG_DRIVER_BSD=y
#CONFIG_DRIVER_NDIS=y
CONFIG_IEEE8021X_EAPOL=y
#CONFIG_EAP_MD5=y
#CONFIG_EAP_MSCHAPV2=y
CONFIG_EAP_TLS=y
CONFIG_EAP_PEAP=y
#CONFIG_EAP_TTLS=y
#CONFIG_EAP_GTC=y
#CONFIG_EAP_OTP=y
#CONFIG_EAP_SIM=y
#CONFIG_EAP_AKA=y
CONFIG_EAP_PSK=y
#CONFIG_EAP_SAKE=y
#CONFIG_EAP_GPSK=y
#CONFIG_EAP_PAX=y
CONFIG_EAP_LEAP=y
#CONFIG_EAP_IKEV2=y
#CONFIG_PCSC=y
The error seems to be related to the “4-Way Handshake” failure. Could it be that the pre-shared key is incorrect? Why I have a “GROUP REMOVED” ?
I would appreciate any suggestion regarding the matter.
Thank you all in advance!

Resources