wicd

Problemi e suggerimenti legati all'installazione di Arch Linux
Rispondi
maitarco
Newbie
Messaggi: 13
Iscritto il: 6 novembre 2007, 11:07

Messaggio da maitarco » 14 novembre 2007, 12:59

salve a tutti
dopo aver provato e riprovato, cercando su tutti i forum di questo mondo, non posso far altro che postare il mio problema.
ho una scheda pcmcia installata con driver mandwifi,
la scheda sembra funzionare, ma quando avvio wicd, comincia a lampeggiare...
posto di seguito i miei file di configurazione.

rc.conf (ho provato anche a togliere ath0, ma non è cambiato niente)

Codice: Seleziona tutto

lo="lo 127.0.0.1"
ath0="dhcp"
eth0="dhcp"
INTERFACES=(lo eth0 ath0)
...
DAEMONS=(syslog-ng dbus wicd network netfs crond portmap fam hal gdm)
wpa_supplicant.conf (le prime 5 righe erano abilitate di default)

Codice: Seleziona tutto

update_config=1
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=1
...
CONFIG_DRIVER_MADWIFI=y
network={
        ssid="yyyyyyyy"
        scan_ssid=1
        proto=WPA
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP WEP104 WEP40
        psk="xxxxxxxx"
        priority=9
}
/etc/conf.d/wireless:

Codice: Seleziona tutto

wlan_ath0="ath0 mode managed essid yyyyyyyy"
WLAN_INTERFACES=(ath0)
le dipendenze sono state installate.
la scheda comincia a lampeggiare all'avvio de demone "network" (o forse con quello precedente cioè wicd)

Avatar utente
Giovanni
Developer
Messaggi: 2464
Iscritto il: 26 agosto 2007, 16:33
Località: Livorno
Contatta:

Messaggio da Giovanni » 14 novembre 2007, 15:18

maitarco ha scritto:ho una scheda pcmcia installata con driver mandwifi
Marca e modello della scheda pcmcia?
Arch Linux Developer

maitarco
Newbie
Messaggi: 13
Iscritto il: 6 novembre 2007, 11:07

Messaggio da maitarco » 14 novembre 2007, 16:48

tp-link TL-WN510G

Avatar utente
Giovanni
Developer
Messaggi: 2464
Iscritto il: 26 agosto 2007, 16:33
Località: Livorno
Contatta:

Messaggio da Giovanni » 14 novembre 2007, 17:02

Hai dato uno sguardo sul sito di madwifi?
Il problema si presenta solo con wicd?
Ho dato uno sguardo veloce in giro... sembra che ci sia qualche soluzione (vedi a fine pagina):

http://madwifi.org/ticket/1030
Arch Linux Developer

maitarco
Newbie
Messaggi: 13
Iscritto il: 6 novembre 2007, 11:07

Messaggio da maitarco » 15 novembre 2007, 14:19

voidnull ha scritto:Hai dato uno sguardo sul sito di madwifi?
Il problema si presenta solo con wicd?
Ho dato uno sguardo veloce in giro... sembra che ci sia qualche soluzione (vedi a fine pagina):

http://madwifi.org/ticket/1030
No, il problema non si presenta solo con wicd, dal link non ci ho capito molto...:(

ho dato il comando

Codice: Seleziona tutto

 wpa_supplicant -ddd -iath0 -cwpa_supplicant.conf  -Dwext
e questo è il risultato

Codice: Seleziona tutto

Initializing interface 'ath0' conf 'wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
update_config=1
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 449 - start of a new network block
ssid - hexdump_ascii(len=10):
     61 6d 69 63 6f 66 72 69 74 7a                     amicofritz      
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
priority=9 (0x9)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 9
   id=0 ssid='amicofritz'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=13 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:14:78:75:bb:7d
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface ath0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=10):
     61 6d 69 63 6f 66 72 69 74 7a                     amicofritz      
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 235 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 9
Try to find WPA-enabled AP
0: 00:04:0e:f3:d5:29 ssid='amicofritz' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:04:0e:f3:d5:29 ssid='amicofritz'
Try to find non-WPA AP
Trying to associate with 00:04:0e:f3:d5:29 (SSID='amicofritz' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b1a len=18
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 235 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 9
Try to find WPA-enabled AP
0: 00:04:0e:f3:d5:29 ssid='amicofritz' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:04:0e:f3:d5:29 ssid='amicofritz'
Try to find non-WPA AP
Already associated with the selected AP.
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:04:0e:f3:d5:29
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:04:0e:f3:d5:29
No keys have been configured - skip key clearing
Associated with 00:04:0e:f3:d5:29
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:04:0e:f3:d5:29
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:04:0e:f3:d5:29 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a6 37 d8 30 23 97 30 6c 2a ee 96 3d 80 d2 f0 e4 b4 3f e5 82 97 40 98 7a 81 88 96 b2 53 07 2a 60
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 a6 37 d8 30 23 97 30 6c 2a ee 96 3d 80 d2 f0 e4 b4 3f e5 82 97 40 98 7a 81 88 96 b2 53 07 2a 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd c9 56 f7 a2 bf e2 76 38 38 47 80 c5 09 f1 3b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:04:0e:f3:d5:29
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d1 00 94 60 13 7b db a5 82 9a 86 27 c5 2e c2 c1 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): d1 00 94 60 13 7b db a5 82 9a 86 27 c5 2e c2 c1
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d1 00 94 60 13 7b db a5 82 9a 86 27 c5 2e c2 c1 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:04:0e:f3:d5:29 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 da ce 29 f0 bb 4b ca 26 31 a4 f8 bb 51 a0 39 9d 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:04:0e:f3:d5:29
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 bf 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 7c e3 6e 03 62 8a 98 71 aa 13 56 e5 90 f5 83 00 20 7c aa cf d6 ec 74 08 10 a0 88 53 c9 eb af 49 bb fd a9 c5 cd a9 67 ff 12 1e 8f 66 8f 77 01 c1 d0
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 bf
  key_iv - hexdump(len=16): 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c1
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 1e 7c e3 6e 03 62 8a 98 71 aa 13 56 e5 90 f5 83
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 03 cd 8f 4a a7 9a e2 93 37 75 73 97 07 c8 cd 04 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 bf 7e 53 3b 2d 93 01 d3 ae 49 3e 0f bc 57 36 80 c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 7c e3 6e 03 62 8a 98 71 aa 13 56 e5 90 f5 83 00 20 7c aa cf d6 ec 74 08 10 a0 88 53 c9 eb af 49 bb fd a9 c5 cd a9 67 ff 12 1e 8f 66 8f 77 01 c1 d0
WPA: RX message 1 of Group Key Handshake from 00:04:0e:f3:d5:29 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 1e 12 5a 55 d8 84 c2 d1 6e 48 4d cc 30 43 66 00 00
WPA: Key negotiation completed with 00:04:0e:f3:d5:29 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:04:0e:f3:d5:29 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
EAPOL: startWhen --> 0
^[[ACTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

Avatar utente
Giovanni
Developer
Messaggi: 2464
Iscritto il: 26 agosto 2007, 16:33
Località: Livorno
Contatta:

Messaggio da Giovanni » 15 novembre 2007, 17:49

maitarco ha scritto:...dal link non ci ho capito molto...
Praticamente devi provare a dare il comando:
iwpriv ath0 mode 3
Quale versione di madwifi stai usando?
Arch Linux Developer

maitarco
Newbie
Messaggi: 13
Iscritto il: 6 novembre 2007, 11:07

Messaggio da maitarco » 15 novembre 2007, 23:36

no, non funziona
la versione madwifi usata è quella da repository aggiornata

maitarco
Newbie
Messaggi: 13
Iscritto il: 6 novembre 2007, 11:07

Messaggio da maitarco » 18 novembre 2007, 11:35

piccolo passo in avanti.
sono riuscito ad accedere alla rete protetta con wpa, semplicemente installando kde (sarebbe interessante capire il perchè)
quello che ancora non riesco a fare è far partire wicd in automatico.
infatti avviando tra.py mi da

Codice: Seleziona tutto

attempting to connect daemon...
success
networkID returned -1, waiting...
networkID returned -1, waiting...
Traceback (most recent call last):
  File "/opt/wicd/edgy.py", line 142, in set_signal_image
    time.sleep(5)
KeyboardInterrupt
^[[A^[[ATraceback (most recent call last):
  File "/opt/wicd/tray.py", line 7, in <module>
    import edgy
  File "/opt/wicd/edgy.py", line 214, in <module>
    gtk.main()
KeyboardInterrupt
risolvo il tutto avviando gui.py (come root però) dove devo manualmente inserire l'essi della rete (che gli risulta "hidden")
vi viene in mente qualche soluzione?
grazie

Rispondi