Package: wireless-tools Version: 29~pre20-1 Severity: normal
The driver is ipw3945 built from the current ipw3945-source: [EMAIL PROTECTED]:~$ dpkg -l |grep 3945 ii firmware-ipw3945 0.4 Binary firmware for IPW3945 ii ipw3945-modules-2.6.20 1.2.0-5+detritus1 ipw3945 modules for Linux (kernel 2.6.20) ii ipw3945-modules-2.6.20-1-amd64 1.2.0-5+2.6.20-2 ipw3945 modules for Linux (kernel 2.6.20-1-a ii ipw3945-source 1.2.0-5 Source for the Intel PRO/Wireless 3945ABG (i ii ipw3945d 1.7.22-4 Binary userspace regulatory daemon for Intel [EMAIL PROTECTED]:~$ dmesg |grep 3945 ipw3945: Intel(R) PRO/Wireless 3945 Network Connection driver for Linux, 1.2.0dmpr ipw3945: Copyright(c) 2003-2006 Intel Corporation ipw3945: Detected Intel PRO/Wireless 3945ABG Network Connection ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels) ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels) ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels) The access point that I'm connected to and through which traffic is flowing (including reporting this bug) is configured for WPA1, group TKIP, pairwise CCMP(AES) or TKIP. My wpa_supplicant.conf is configured for WPA-PSK, with CCMP for pairwise keys: network={ ssid="whirlpool" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP psk=<key> priority=1 } Other devices also connect to it using WPA. However iwlist scan reports the access point as using WEP-40: [EMAIL PROTECTED]:~$ sudo iwlist eth1 scan eth1 Scan completed : Cell 01 - Address: 00:16:01:2E:CF:D7 ESSID:"whirlpool" Protocol:IEEE 802.11bg Mode:Master Channel:1 Encryption key:on Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s 11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s 48 Mb/s; 54 Mb/s Quality=99/100 Signal level=-22 dBm Noise level=-22 dBm IE: WPA Version 1 Group Cipher : WEP-40 Pairwise Ciphers (2) : TKIP WEP-40 Authentication Suites (1) : PSK Extra: Last beacon: 16ms ago instead of CCMP/AES and TKIP for pairwise and TKIP for group. No configuration or firmware changes have been made to the AP, and I'm fairly certain that an older version of wireless-tools correctly identified the AP's "available" algorithms as TKIP/CCMP for pairwise and TKIP for group. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.20 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en US, LC_CTYPE=en US (charmap=UTF-8) (ignored: LC_ALL set to en_US.utf8) Shell: /bin/sh linked to /bin/bash Versions of packages wireless-tools depends on: ii libc6 2.5-4 GNU C Library: Shared libraries ii libiw29 29~pre20-1 Wireless tools - library wireless-tools recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]