找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 156|回复: 1

求助:openwrt连接EAP认证的wifi失败

[复制链接]
本帖最后由 ParkerC 于 2024-2-4 10:07 编辑

最近想在公司自己的办公室做个个人的中继,于是给我闲置多年的小米路由器MINI刷了官网的OPRNWRT openwrt-23.05.2-ramips-mt7620-xiaomi_miwifi-mini-squashfs-sysupgrade。
刷完了之后也安装了wapd完整版,连接时看日志看起来EAP鉴权都已经完成了,但却跳出一条内核提示Reason: 23=IEEE8021X_FAILED,然后就失去链接了,很是奇怪。
人工指定wpa_supplicant配置文件的方法也用了,但是也无法连接。
我隐约记得在查找资料时是说驱动可能不支持 企业EAP中继认证的方法,有人遇到过类似的问题嘛?或者有没有什么适合的固件推荐下呗。
  1. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-SSID-REENABLED id=1 ssid="GONGSI"
  2. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: BSSID 28:e4:24:35:00:a1 ignore list count incremented to 5, ignoring for 600 seconds
  3. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: SME: Trying to authenticate with 28:e4:24:34:fd:41 (SSID='GONGSI' freq=5300 MHz)
  4. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.639245] phy0-sta0: authenticate with 28:e4:24:34:fd:41
  5. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.766066] phy0-sta0: send auth to 28:e4:24:34:fd:41 (try 1/3)
  6. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.774274] phy0-sta0: authenticated
  7. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Trying to associate with 28:e4:24:34:fd:41 (SSID='GONGSI' freq=5300 MHz)
  8. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.782104] phy0-sta0: associate with 28:e4:24:34:fd:41 (try 1/3)
  9. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.793139] phy0-sta0: RX AssocResp from 28:e4:24:34:fd:41 (capab=0x8011 status=0 aid=9)
  10. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 225.801722] phy0-sta0: associated
  11. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Associated with 28:e4:24:34:fd:41
  12. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  13. Fri Feb 2 16:39:12 2024 daemon.notice netifd: Network device 'phy0-sta0' link is up
  14. Fri Feb 2 16:39:12 2024 daemon.notice netifd: Interface 'GONGSI' has link connectivity
  15. Fri Feb 2 16:39:12 2024 daemon.notice netifd: Interface 'GONGSI' is setting up now
  16. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-STARTED EAP authentication started
  17. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  18. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  19. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  20. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  21. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  22. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  23. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  24. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='C=CN, ST=浙江省, L=杭州市, O=新华三技术有限公司, CN=byod.h3c.com' hash=1b21decf08cf7246466e1b4fd6aec22d852f2909713e0b296cb40f2fb3a95656
  25. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='C=US, O=DigiCert Inc, CN=GeoTrust RSA CN CA G2' hash=e3c24279dd6a337f881b1bc692e878f4a31afe95851f208f94800b0c24d88c38
  26. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA' hash=45e058d5e8944b4d84f9662bd26db257f8934a443c70161348a0e9444c78cb26
  27. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  28. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  29. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  30. Fri Feb 2 16:39:12 2024 daemon.notice netifd: GONGSI (3427): udhcpc: started, v1.36.1
  31. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  32. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  33. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: EAP-MSCHAPV2: Authentication succeeded
  34. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  35. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  36. Fri Feb 2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: Unknown event 37
  37. Fri Feb 2 16:39:12 2024 kern.info kernel: [ 226.088195] phy0-sta0: deauthenticated from 28:fd:41:e4:24:34 (Reason: 23=IEEE8021X_FAILED)
复制代码


我的恩山、我的无线 The best wifi forum is right here.
 楼主| | 显示全部楼层
后续日志
  1. Fri Feb  2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-DISCONNECTED bssid=28:e4:24:34:fd:41 reason=23
  2. Fri Feb  2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="GONGSI" auth_failures=6 duration=90 reason=AUTH_FAILED
  3. Fri Feb  2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: BSSID 28:e4:24:34:fd:41 ignore list count incremented to 4, ignoring for 120 seconds
  4. Fri Feb  2 16:39:12 2024 daemon.notice wpa_supplicant[1179]: phy0-sta0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="GONGSI" auth_failures=7 duration=129 reason=CONN_FAILED
  5. Fri Feb  2 16:39:12 2024 daemon.notice netifd: GONGSI (3427): udhcpc: broadcasting discover
  6. Fri Feb  2 16:39:13 2024 daemon.notice netifd: Network device 'phy0-sta0' link is down
  7. Fri Feb  2 16:39:13 2024 daemon.notice netifd: Interface 'GONGSI' has link connectivity loss
  8. Fri Feb  2 16:39:13 2024 daemon.notice netifd: GONGSI (3427): udhcpc: received SIGTERM
  9. Fri Feb  2 16:39:13 2024 daemon.notice netifd: GONGSI (3427): udhcpc: entering released state
  10. Fri Feb  2 16:39:13 2024 daemon.notice netifd: GONGSI (3427): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "GONGSI" } (Permission denied)
  11. Fri Feb  2 16:39:13 2024 daemon.notice netifd: Interface 'GONGSI' is now down
  12. Fri Feb  2 16:39:14 2024 daemon.warn odhcpd[1406]: No default route present, overriding ra_lifetime!
复制代码
我的恩山、我的无线 The best wifi forum is right here.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-4-27 23:55

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表