Wpa_supplicant problem solved

daniel escartin EXCHANGE03_VirtYH04 escartid at arcada.fi
Fri Feb 13 10:26:16 EST 2004


Hello,

I have solved the problem executing wpa_supplicant like you have said me
in the last message, I have seen that my supplicant didnt access to the
Access point because of the MAC address was not the correct one, and I
have typed:

iwconfig wlan0 ap "nn:nn:nn:nn:nn:nn" , then the supplicant detect now the
Access point and the log file show me:

#####################################################################
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Line: 89 - start of a new network block
SSID - hexdump(len=10): 63 69 73 63 6f 2d 77 6c 61 6e
key_mgmt: 0x2
pairwise: 0x8
PSK (from passphrase) - hexdump(len=32): 14 ad b2 ac 0d 3b a6 e9 ea 5f d3
bd 2e
b5 8c b0 c4 ec 2d 50 f3 be 86 ae 8d ea 8f 26 2e 2f 0b 69
wpa_driver_hostap_set_wpa: enabled=1
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_countermeasures: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=1
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Disconnect event - remove keys
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Disconnect event - remove keys
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=12
Received 391 bytes of scan results (2 BSSes)
Scan results: 2
0: 00:0d:28:88:d6:02 ssid='cisco-wlan' wpa_ie_len=24
Trying to associate with 00:0d:28:88:d6:02 (SSID='cisco-wlan' freq=2437
MHz)
Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 02
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_associate
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Disconnect event - remove keys
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
Wireless event: cmd=0x8b04 len=12
RX EAPOL from 00:0d:28:88:d6:02
EAPOL frame in disassociated state - dropped
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Disconnect event - remove keys
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:28:88:d6:02
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:28:88:d6:02
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
RX EAPOL from 00:0d:28:88:d6:02
IEEE 802.1X: version=1 type=3 length=95
  EAPOL-Key type=254
RX WPA EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 02 d7 1e 3c 80 b0 4d 0c 4d 98 30 5b 74 bc a9 79 45 a5 b9 b3 4e bf
5f 3d 6f 67 85 e1 8b b9 d7 b2 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00
RX message 1 of 4-Way Handshake from 00:0d:28:88:d6:02 (ver=1)
PMK - hexdump(len=32): 14 ad b2 ac 0d 3b a6 e9 ea 5f d3 bd 2e b5 8c b0 c4
ec 2d
50 f3 be 86 ae 8d ea 8f 26 2e 2f 0b 69
PTK - hexdump(len=64): 8b b3 2e 58 7b 2e d7 a9 26 42 3a d2 0a 11 d1 ed 37
26 3d
e3 b7 30 2c 0a 3d 80 56 ab 3e a0 e8 30 c6 20 52 67 14 e3 e8 5f ac 3e 42 b0
2f 3b 4d c1 ab 97 82 7e f8 43 9c 6e 26 f3 c7 0d da 7f 5a a8
EAPOL-Key MIC - hexdump(len=16): 57 57 dd 3b ad b6 05 a4 d3 a5 45 1e 9b db
36 f4Sending EAPOL-Key 2/4
TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 28 88 d6 02 00 06 25 30 73 74
88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 0f 05 cd 87 22 f6
09 cd 9c a5
bb 41 52 0a 14 bc 23 c2 e4 df f8 73 c2 4a 0a 28 4e 94 73 f1 1e ba 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 57 57 dd 3b ad b6 05 a4 d3 a5 45 1e 9b db 36 f4 00 18 dd 16 00
50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0d:28:88:d6:02
IEEE 802.1X: version=1 type=3 length=119
  EAPOL-Key type=254
RX WPA EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00
00 00 00 00 03 d7 1e 3c 80 b0 4d 0c 4d 98 30 5b 74 bc a9 79 45 a5 b9 b3 4e
bf 5f 3d 6f
67 85 e1 8b b9 d7 b2 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb ee c8 6b 74 04 86 54 60 40
53 e1 d6 8f 97 bd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50
f2 02
RX message 3 of 4-Way Handshake from 00:0d:28:88:d6:02 (ver=1)
Sending EAPOL-Key 4/4
EAPOL-Key - hexdump(len=113): 00 0d 28 88 d6 02 00 06 25 30 73 74 88 8e 01
03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 03 0f 05 cd 87 22 f6 09 cd 9c
a5 bb 41 52 0a 14 bc 23 c2 e4 df f8 73 c2 4a 0a 28 4e 94 73 f1 1e ba 00 00
00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
6b aa a8 5b ad ab 74 48 ba 1f 73 6e 20 a3 6c bc 00 00
Installing PTK to the driver.
RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6
key_len=32
RX EAPOL from 00:0d:28:88:d6:02
IEEE 802.1X: version=1 type=3 length=127
  EAPOL-Key type=254
RX WPA EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00
00 00 00 00 05 d7 1e 3c 80 b0 4d 0c 4d 98 30 5b 74 bc a9 79 45 a5 b9 b3 4e
bf 5f 3d 6f
67 85 e1 8b b9 d7 b2 76 88 b6 2d 6c 05 62 ed d8 b9 b8 df eb 8c 07 f9 78 89
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 44 48 06 ef 11 50 1d fe 30
4c 73 17 e2 39 2c 00 20 96 e4 35 c4 d8 3c 09 d6 cc 0c 61 6a f5 b3 83 25 3a
ce aa b6 1b 11
7c 1d be 37 de de 22 ed 06 4f
RX message 1 of Group Key Handshake from 00:0d:28:88:d6:02 (ver=1)
Group Key - hexdump(len=32): b8 51 6a b6 fb 8c a4 e2 fd f1 46 63 a0 a0 7d
64 5e
eb 32 28 d9 a1 9c eb 39 a2 89 d7 6a 74 e7 b4
Installing GTK to the driver (keyidx=1).
RSC - hexdump(len=6): 89 01 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6
key_len=32
Sending EAPOL-Key 2/2
EAPOL-Key - hexdump(len=113): 00 0d 28 88 d6 02 00 06 25 30 73 74 88 8e 01
03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
28 e4 ea 02 a0 0c 96 a6 bf 59 6b 5d d7 ed 2b 0d 00 00
WPA key negotiation completed with 00:0d:28:88:d6:02

##########################################################################

Now I can ping the access point and surfing in Internet with this client
using pre-shared key.

Thank you so much for your help.



More information about the HostAP mailing list