hostapd(cvs) & madwifi(cvs)

st3v3 at btinternet.com st3v3 at btinternet.com
Fri Nov 26 04:16:47 EST 2004


Hey Gunter
Just to continue with this problem.
I have now tried loading the modules wlan_tkip,
wlan_ccmp. Im still having the same behaviour.
I have some provided some additonal info in this
email.

hostap_pci hostap_pci: cvs251104 - 2004-11-25 (Jouni
Malinen <jkmaline at cc.hut.fi>)
hostap_pci: Registered netdevice wifi0
wifi0: NIC: id=0x8022 v1.0.0
wifi0: PRI: id=0x15 v1.1.1
wifi0: STA: id=0x1f v1.5.6
wifi0: Intersil Prism2.5 PCI: mem=0xa0000000, irq=9
 
ath_pci Warning: loading
/lib/modules/2.4.28-sc1100/net/ath_hal.o will taint
the kernel:ath_hal: 0.9.12.14 ( non-GPL licenseAR5210
- Proprietary
, AR5211, AR5212)
wlan: 0.8.4.4 (EXPERIMENTAL)
ath_rate_onoe: 1.0
ath_pci: 0.9.4.11 (EXPERIMENTAL)
ath0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
ath0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps
9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
ath0: mac 5.6 phy 4.1 radio 1.7
ath0: 802.11 address: 00:02:6f:53:11:74
ath0: Use hw queue 0 for WME_AC_BE traffic
ath0: Use hw queue 1 for WME_AC_BK traffic
ath0: Use hw queue 2 for WME_AC_VI traffic
ath0: Use hw queue 3 for WME_AC_VO traffic
ath0: Atheros 5212: mem=0x80000000, irq=12
wrap1C-000DB9000A7C:~# lsmod
Module                  Size  Used by    Tainted: P
wlan_xauth               560   0  (unused)
wlan_ccmp               3904   0  (unused)
wlan_tkip               8144   0  (unused)
wlan_wep                3584   3  (autoclean)
hostap_crypt_wep        3552   3  (autoclean)
bridge                 21992   1  (autoclean)
ath_pci                35884   0
ath_rate_onoe           3872   0  [ath_pci]
wlan                   77348   1  [wlan_xauth
wlan_ccmp wlan_tkip wlan_wep ath_pci ath_rate_onoe]
ath_hal               118896   1  [ath_pci]
hostap_pci             39972   3
hostap                 88712   0  [hostap_crypt_wep
hostap_pci]
 
wrap1C-000DB9000A7C:~# hostapd -dddd
/rw/etc/hostapd.ath0.conf
Configuration file: /rw/etc/hostapd.ath0.conf
mbr0: port 3(ath0) entering learning state
adwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:02:6f:53:1setmlme
#01:mlme->im_op=3
1:74 and ssid 'awap_ap_madwifi'
ath0: RADIUS Authentication server 10.0.0.242:1812
madwifi_set_ieee8021x: enabled=1
madwifi_set_iface_flags: dev_up=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
IEEE 802.1X: New default WEP key index 2
IEEE 802.1X: New default WEP key - hexdump(len=13): 89
52 67 45 d5 c0 6f d0 9d 74 1e 6f ca
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00
key_idx=2
Flushing old station entries
Deauthenticate all stations
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff
reason_code=2
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
l2_packet_receive - recv: Network is down
br0: port 3(ath0) entering forwarding state
br0: topology change detected, propagating
Wireless event: cmd=0x8c00 len=20
Wireless event: wpaie=0xc37f1dc2
cmd=0x8c03 len=20
ath0: STA 00:02:81:0c:03:98 IEEE 802.11: associated
  New STA
No WPA/RSN information element for station!?
Wireless event: cmd=0x8c00 len=20
Wireless event: cmd=0x8c00 len=20
Wireless event: cmd=0x8c00 len=20
Wireless event: cmd=0x8c00 len=20
Wireless evenath0: STA 00:0f:20:e1:36:22 IEEE 802.11:
deassociated
Wireless event: cmd=0x8c00 len=20
 
Signal 2 received - terminating
Removing station 00:02:81:0c:03:98
Flushing old station entries
Deauthenticate all stations
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff
reason_code=2
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
madwifi_set_iface_flags: dev_up=0
t: cmd=0x8c04 len=20
wrap1C-000DB9000A7C:~# iwconfig --version
iwconfig  Wireless-Tools version 27
          Compatible with Wireless Extension v11 to
v17.
 
Kernel    Currently compiled with Wireless Extension
v16.
 
wifi0     Recommend Wireless Extension v18 or later,
          Currently compiled with Wireless Extension
v16.
 
wlan0     Recommend Wireless Extension v18 or later,
          Currently compiled with Wireless Extension
v16.
 
ath0      Recommend Wireless Extension v13 or later,
          Currently compiled with Wireless Extension
v16.
 
wlan0ap   Recommend Wireless Extension v18 or later,
          Currently compiled with Wireless Extension
v16.
 
wrap1C-000DB9000A7C:~# uname -a
Linux wrap1C-000DB9000A7C 2.4.28-sc1100 #3 Fri Nov 26
08:21:01 GMT 2004 i586 unknown


hostapd.ath0.conf
 
# AP info
interface=ath0
driver=madwifi
daemonize=1
ssid=awap_ap_madwifi
                                                      
                              
#Authentication and WEP key methods
macaddr_acl=0
auth_algs=1
ieee8021x=1
eap_message=hello
wep_key_len_broadcast=13
wep_key_len_unicast=13
wep_rekey_period=300
eapol_key_index_workaround=1
own_ip_addr=10.0.0.58
nas_identifier=wrap1C-000DB9000A7C
#Radius Server Config
auth_server_addr=10.0.0.242
auth_server_port=1812
auth_server_shared_secret=********
                                                      
                              
#Debug level
debug=3

The client succeeds in assoicating, and gets to
sending the EAPOL - start. Apart from a few more
EAPOL-start  after retrying. The 802.1x authentication
does not proceed.
Do you have a comment on the failing IOCTL SETMLME
call?
In my original email I mentioned WE18. With iwconfig
--version, all apps recomend WE18, Hence my intial
query on WE18. 

Another problem that I have seen is the setting of the
keys from hostapd. I mentioned it another post I made
but had no response. Hostapd sets a key with idx 2.
The key does get set in madwifi. But the current tx
key in madwifi always remains at 1 (iwlist ath0 key).

Im working on this full time, to get this up and
running.

Kind regards
Steve





More information about the HostAP mailing list