madwifi(cvs), wpa_supp v0.2.5 and linksys router problem

Andreas Schuldei andreas at schuldei.org
Sun Nov 21 19:30:48 EST 2004


Again i experience problems with wpa from my notebook with the
newest madwifi driver from cvs (atheos hardware), my wrt54g
linksys router (new broadcom binary drivers) with sveasoft
alchemy-6.0-rc1.w42 firmware

please look at the attached debug output from wpa_supplicant and
tell me where the problem might be.


root at timotheus:~# wpa_supplicant -i ath0 -D madwifi -d
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
Priority group 5
   id=0 ssid='Access_Point'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_wpa: enabled=1
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
l2_packet_receive - recv: Network is down
Starting AP scan (broadcast SSID)
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 274 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 5
0: 00:0f:66:45:e2:ad ssid='Access_Point' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:0f:66:45:e2:ad (SSID='Access_Point' freq=2462 MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=25
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:45:e2:ad
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0f:66:45:e2:ad
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0f:66:45:e2:ad
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 6b 6f af 8f fe 17 4c 0c 24 ae 47 cc 4c 1e ba 47 05 45 d8 0a 86 27 59 f6 ee c3 a1 38 14 84 83 66
WPA: PMK - hexdump(len=32): 80 19 e1 b6 71 25 1c 44 8a 46 d1 84 e7 cf 68 7b 91 b9 c1 c6 a2 09 05 68 e0 3b d6 1f c1 f7 ce f5
WPA: PTK - hexdump(len=64): 3f 43 6c 79 3c 6e 95 f4 6c b8 86 f7 95 e4 31 15 5a 9f 37 6a 2c f2 8b 87 c3 92 fc 43 a0 93 d6 44 96 8b fd 0e fe d8 69 6f d9 44 f4 e6 9a ca d5 d6 95 a1 dc 68 34 58 b3 9d 32 a1 9d 68 a6 fc d8 d6
WPA: EAPOL-Key MIC - hexdump(len=16): 36 3f b5 35 54 86 12 4a ec dd 47 64 f0 6a d7 f9
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0f:66:45:e2:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
RX EAPOL from 00:0f:66:45:e2:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX message 1 of Group Key Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: Group Key - hexdump(len=16): 6b 22 bd f8 7c ec ff 29 bd 7b 7c 71 53 1f 78 14
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:0f:66:45:e2:ad
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:45:e2:ad
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0f:66:45:e2:ad
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0f:66:45:e2:ad
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): ef fa 4e 71 23 9e 85 ca e6 79 91 b2 a0 24 f9 9b 2c 76 23 ed dd f5 9c 5f 12 fb f5 ee 05 f6 08 b1
WPA: PMK - hexdump(len=32): 80 19 e1 b6 71 25 1c 44 8a 46 d1 84 e7 cf 68 7b 91 b9 c1 c6 a2 09 05 68 e0 3b d6 1f c1 f7 ce f5
WPA: PTK - hexdump(len=64): 20 f5 d9 32 a8 e8 b6 3e 5e 55 aa 17 12 c3 5e 4e 2c 54 10 63 9f e3 25 80 e2 83 81 0e 59 14 ca a2 5d a5 88 da 36 1b cd a3 10 5b 95 f6 9d f1 d8 a5 43 31 e9 2d 09 67 6d ef ed 92 1f 91 b3 51 c9 3e
WPA: EAPOL-Key MIC - hexdump(len=16): 77 d7 10 b4 ab 2b dc 1c 37 4a da 39 22 50 d3 56
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0f:66:45:e2:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
RX EAPOL from 00:0f:66:45:e2:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX message 1 of Group Key Handshake from 00:0f:66:45:e2:ad (ver=2)
WPA: Group Key - hexdump(len=16): 6b 22 bd f8 7c ec ff 29 bd 7b 7c 71 53 1f 78 14
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 03 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:0f:66:45:e2:ad
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 5
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12





configuration:

root at timotheus:~# cat /etc/wpa_supplicant.conf | egrep -v '^[[:space:]]*#.*|^[[:space:]]*$'
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
network={
        ssid="Access_Point"
        proto=WPA
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP WEP104 WEP40
        psk="XXXXXXXXXXXXXX"
        priority=5
}




More information about the HostAP mailing list