Package: wireless-tools
Version: 29~pre20-1
Severity: normal

The driver is ipw3945 built from the current ipw3945-source:

[EMAIL PROTECTED]:~$ dpkg -l |grep 3945
ii  firmware-ipw3945                  0.4                                Binary 
firmware for IPW3945
ii  ipw3945-modules-2.6.20            1.2.0-5+detritus1                  
ipw3945 modules for Linux (kernel 2.6.20)
ii  ipw3945-modules-2.6.20-1-amd64    1.2.0-5+2.6.20-2                   
ipw3945 modules for Linux (kernel 
2.6.20-1-a
ii  ipw3945-source                    1.2.0-5                            Source 
for the Intel PRO/Wireless 3945ABG 
(i
ii  ipw3945d                          1.7.22-4                           Binary 
userspace regulatory daemon for 
Intel

[EMAIL PROTECTED]:~$ dmesg |grep 3945
ipw3945: Intel(R) PRO/Wireless 3945 Network Connection driver for Linux, 
1.2.0dmpr
ipw3945: Copyright(c) 2003-2006 Intel Corporation
ipw3945: Detected Intel PRO/Wireless 3945ABG Network Connection
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)
ipw3945: Detected geography ABG (11 802.11bg channels, 13 802.11a channels)

The access point that I'm connected to and through which traffic is flowing 
(including reporting this bug) is 
configured for WPA1, group TKIP, pairwise CCMP(AES) or TKIP.  My 
wpa_supplicant.conf is configured for WPA-PSK, with 
CCMP for pairwise keys:

network={
        ssid="whirlpool"
        proto=WPA
        key_mgmt=WPA-PSK
        pairwise=CCMP
        psk=<key>
        priority=1
}

Other devices also connect to it using WPA.

However iwlist scan reports the access point as using WEP-40:

[EMAIL PROTECTED]:~$ sudo iwlist eth1 scan
eth1      Scan completed :
          Cell 01 - Address: 00:16:01:2E:CF:D7
                    ESSID:"whirlpool"
                    Protocol:IEEE 802.11bg
                    Mode:Master
                    Channel:1
                    Encryption key:on
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
                              11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                              48 Mb/s; 54 Mb/s
                    Quality=99/100  Signal level=-22 dBm  Noise level=-22 dBm
                    IE: WPA Version 1
                        Group Cipher : WEP-40
                        Pairwise Ciphers (2) : TKIP WEP-40
                        Authentication Suites (1) : PSK
                    Extra: Last beacon: 16ms ago

instead of CCMP/AES and TKIP for pairwise and TKIP for group.  No configuration 
or firmware changes have been made 
to the AP, and I'm fairly certain that an older version of wireless-tools 
correctly identified the AP's "available" 
algorithms as TKIP/CCMP for pairwise and TKIP for group.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.20 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en US, LC_CTYPE=en US (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.utf8)
Shell: /bin/sh linked to /bin/bash

Versions of packages wireless-tools depends on:
ii  libc6                         2.5-4      GNU C Library: Shared libraries
ii  libiw29                       29~pre20-1 Wireless tools - library

wireless-tools recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to