madwifi(cvs), wpa_supp v0.2.5 and linksys router problem

Michael Reilly michaelr at cisco.com
Sun Nov 21 23:05:32 EST 2004


For me it fails with my Cisco 1100 AP (802.11b) and the latest madwifi from 
CVS.  I am using wpa_supplicant 0.2.5.  It also fails with ndiswrapper 
0.12rc3 for me.  I have two Atheros cards and both fail the same way.

It works with my wrt54gs using satori from sveasoft.  I've not tried alchemy 
yet.

michael
Andreas Schuldei wrote:
> Again i experience problems with wpa from my notebook with the
> newest madwifi driver from cvs (atheos hardware), my wrt54g
> linksys router (new broadcom binary drivers) with sveasoft
> alchemy-6.0-rc1.w42 firmware
> 
> please look at the attached debug output from wpa_supplicant and
> tell me where the problem might be.
> 
> 
> root at timotheus:~# wpa_supplicant -i ath0 -D madwifi -d
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> Priority group 5
>    id=0 ssid='Access_Point'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> wpa_driver_madwifi_set_wpa: enabled=1
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_set_countermeasures: enabled=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> Setting scan request: 0 sec 100000 usec
> l2_packet_receive - recv: Network is down
> Starting AP scan (broadcast SSID)
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 274 bytes of scan results (1 BSSes)
> Scan results: 1
> Selecting BSS from priority group 5
> 0: 00:0f:66:45:e2:ad ssid='Access_Point' wpa_ie_len=24 rsn_ie_len=0
>    selected
> Trying to associate with 00:0f:66:45:e2:ad (SSID='Access_Point' freq=2462 MHz)
> Cancelling scan request
> WPA: using IEEE 802.11i/D3.0
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> wpa_driver_madwifi_associate
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> Wireless event: cmd=0x8b1a len=25
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:0f:66:45:e2:ad
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:0f:66:45:e2:ad
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:0f:66:45:e2:ad
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> WPA: Renewed SNonce - hexdump(len=32): 6b 6f af 8f fe 17 4c 0c 24 ae 47 cc 4c 1e ba 47 05 45 d8 0a 86 27 59 f6 ee c3 a1 38 14 84 83 66
> WPA: PMK - hexdump(len=32): 80 19 e1 b6 71 25 1c 44 8a 46 d1 84 e7 cf 68 7b 91 b9 c1 c6 a2 09 05 68 e0 3b d6 1f c1 f7 ce f5
> WPA: PTK - hexdump(len=64): 3f 43 6c 79 3c 6e 95 f4 6c b8 86 f7 95 e4 31 15 5a 9f 37 6a 2c f2 8b 87 c3 92 fc 43 a0 93 d6 44 96 8b fd 0e fe d8 69 6f d9 44 f4 e6 9a ca d5 d6 95 a1 dc 68 34 58 b3 9d 32 a1 9d 68 a6 fc d8 d6
> WPA: EAPOL-Key MIC - hexdump(len=16): 36 3f b5 35 54 86 12 4a ec dd 47 64 f0 6a d7 f9
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:0f:66:45:e2:ad
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX message 3 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: Sending EAPOL-Key 4/4
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
> RX EAPOL from 00:0f:66:45:e2:ad
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX message 1 of Group Key Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: Group Key - hexdump(len=16): 6b 22 bd f8 7c ec ff 29 bd 7b 7c 71 53 1f 78 14
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=1 set_tx=0 seq_len=6 key_len=16
> WPA: Sending EAPOL-Key 2/2
> WPA: Key negotiation completed with 00:0f:66:45:e2:ad
> Cancelling authentication timeout
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state SUCCESS
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> Setting scan request: 0 sec 100000 usec
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> Disconnect event - remove keys
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:0f:66:45:e2:ad
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:0f:66:45:e2:ad
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:0f:66:45:e2:ad
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
> WPA: Renewed SNonce - hexdump(len=32): ef fa 4e 71 23 9e 85 ca e6 79 91 b2 a0 24 f9 9b 2c 76 23 ed dd f5 9c 5f 12 fb f5 ee 05 f6 08 b1
> WPA: PMK - hexdump(len=32): 80 19 e1 b6 71 25 1c 44 8a 46 d1 84 e7 cf 68 7b 91 b9 c1 c6 a2 09 05 68 e0 3b d6 1f c1 f7 ce f5
> WPA: PTK - hexdump(len=64): 20 f5 d9 32 a8 e8 b6 3e 5e 55 aa 17 12 c3 5e 4e 2c 54 10 63 9f e3 25 80 e2 83 81 0e 59 14 ca a2 5d a5 88 da 36 1b cd a3 10 5b 95 f6 9d f1 d8 a5 43 31 e9 2d 09 67 6d ef ed 92 1f 91 b3 51 c9 3e
> WPA: EAPOL-Key MIC - hexdump(len=16): 77 d7 10 b4 ab 2b dc 1c 37 4a da 39 22 50 d3 56
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:0f:66:45:e2:ad
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX message 3 of 4-Way Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: Sending EAPOL-Key 4/4
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
> RX EAPOL from 00:0f:66:45:e2:ad
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX message 1 of Group Key Handshake from 00:0f:66:45:e2:ad (ver=2)
> WPA: Group Key - hexdump(len=16): 6b 22 bd f8 7c ec ff 29 bd 7b 7c 71 53 1f 78 14
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 03 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=1 set_tx=0 seq_len=6 key_len=16
> WPA: Sending EAPOL-Key 2/2
> WPA: Key negotiation completed with 00:0f:66:45:e2:ad
> Cancelling authentication timeout
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state SUCCESS
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> Setting scan request: 0 sec 100000 usec
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> Disconnect event - remove keys
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 0 bytes of scan results (0 BSSes)
> Scan results: 0
> Selecting BSS from priority group 5
> No suitable AP found.
> Setting scan request: 5 sec 0 usec
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> 
> 
> 
> 
> 
> configuration:
> 
> root at timotheus:~# cat /etc/wpa_supplicant.conf | egrep -v '^[[:space:]]*#.*|^[[:space:]]*$'
> ctrl_interface=/var/run/wpa_supplicant
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> network={
>         ssid="Access_Point"
>         proto=WPA
>         key_mgmt=WPA-PSK
>         pairwise=CCMP TKIP
>         group=CCMP TKIP WEP104 WEP40
>         psk="XXXXXXXXXXXXXX"
>         priority=5
> }
> 
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap

-- 
---- ---- ----
Michael Reilly    michaelr at cisco.com
     Cisco Systems,  California



More information about the HostAP mailing list