From: "Frank Vos" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.16) with ESMTP id 2312319 for os2-wireless_users@2rosenthals.com; Sun, 15 Feb 2009 12:40:33 -0500 Received-SPF: none (secmgr-ny.randr: 194.109.24.31 is neither permitted nor denied by domain of xs4all.nl) client-ip=194.109.24.31; envelope-from=frankvos@xs4all.nl; helo=smtp-vbr11.xs4all.nl; Received: from smtp-vbr11.xs4all.nl ([194.109.24.31]) by secmgr-ny.randr with esmtp (Exim 4.43) id 1LYkyk-0001k7-Tb for os2-wireless_users@2rosenthals.com; Sun, 15 Feb 2009 12:40:33 -0500 Received: from R60FV ([80.101.90.55]) (authenticated bits=0) by smtp-vbr11.xs4all.nl (8.13.8/8.13.8) with ESMTP id n1FHeRj2049427 for ; Sun, 15 Feb 2009 18:40:27 +0100 (CET) (envelope-from frankvos@xs4all.nl) Message-Id: <200902151740.n1FHeRj2049427@smtp-vbr11.xs4all.nl> To: "OS/2 Wireless Users Mailing List" Date: Sun, 15 Feb 2009 18:37:15 +0100 (CET) Reply-To: "Frank Vos" Priority: Normal X-Mailer: PMMail/2 2.20.2382 voor eComStation 2.0 beta RC6 In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Subject: Re: [OS2Wireless] [OS2Wireless]TPad T60 Connect to Linksys BEFW11S4 - Security Settings X-Virus-Scanned: by XS4ALL Virus Scanner X-Spam-Score: 0.0 (/) X-Spam-Report: _SUMMARY_ Hello Carl, On Sun, 15 Feb 2009 12:04:31 -0500 (EST), Carl Gehr wrote: >BUT, I'd still like to get WPA-TKIP to work... > >Bad News: >1) No matter what I do, I've not been able to get this to > work. >2) The WPA Supplicant displays and just keeps looping through > the same bunch of [to me] gibberish. I did change the > 'Debug Level' to 'verbose' and I captured what appears > to be a repeating bunch of lines. But, not knowing what > all of the stuff means, I'm a bit hesitant to just post > it here in a rather public forum. > >If there is someone out there who can interpret the stuff [It's only >about 22 lines.], I can send it off-list as a text file. > >I guess I'm curious: Is there no standard 'generate' tool that will >create compatible keys? I also find it interesting that xWLAN >generates four keys, while the router only has one. I assume other >routers have more keys? For WPA(2)-TKIP you only need one key, the four keys in xWLAN are for WEP only. I guess those key generaters all have their own way for generating keys. I get my keys from here: https://www.grc.com/passwords.htm I copy one key (63 random printable ASCII characters) and paste it in the router setup and in the laptop. A key with 63 random characters is impossible to crack, unless they manage to break WPA like they did with WEP. Frank