WPA and Madwifi

Alberto González Balaguer anamsuero at mi.madritel.es
Sat Oct 2 17:37:35 EDT 2004


Hello,

I have the following configuration:

	FC1 with kernel 2.4.22
	madwifi driver with Senao 3054 PCI (Atheros 5212)
	wpa_supplicant v0.3.0
	AP Linksys WRT54G with Satori 4.0 firmware


Using WEP keys i can connect successfully to my AP, but not with WPA-PSK.
After "Sending EAPOL-Key 2/4", the AP respond with "RX message 1 of 4-Way" again.

Anybody can help me?


This is my "wpa_supplicant.conf" file:

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
network={
        ssid="aya_prueba1"
	bssid=00:0F:66:57:3C:14
	scan_ssid=1
        proto=WPA
        key_mgmt=WPA-PSK
        pairwise=TKIP
        group=TKIP
        psk=ba22db8afcca4c552814cf87b125d70e8f0b3b5600e05b1b3968928e4e61cee5
}


The output of "wpa_supplicant -dd -Dmadwifi -c/etc/wpa_supplicant.conf -iath0" is:

Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
Line: 368 - start of a new network block
ssid - hexdump_ascii(len=11):
     61 79 61 5f 70 72 75 65 62 61 31                  aya_prueba1     
BSSID - hexdump(len=6): 00 0f 66 57 3c 14
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
PSK - hexdump(len=32): ba 22 db 8a fc ca 4c 55 28 14 cf 87 b1 25 d7 0e 8f 0b 3b 56 00 e0 5b 1b 39 68 92 8e 4e 61 ce e5
Priority group 0
   id=0 ssid='aya_prueba1'
Own MAC address: 00:02:6f:20:cf:a6
wpa_driver_madwifi_set_wpa: enabled=1
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     61 79 61 5f 70 72 75 65 62 61 31                  aya_prueba1     
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b1a len=24
Wireless event: cmd=0x8b19 len=12
Received 273 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:66:57:3c:14 ssid='aya_prueba1' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:0f:66:57:3c:14 (SSID='aya_prueba1' freq=2442 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8b1a len=24
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:57:3c:14
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0f:66:57:3c:14
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0f:66:57:3c:14
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:57:3c:14 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): af e5 a9 54 b6 db 1b c1 59 a6 3b b7 75 e8 58 5d 4a 54 1d 59 8f 19 c9 23 f3 8d e7 fd f3 d1 e0 29
WPA: PMK - hexdump(len=32): ba 22 db 8a fc ca 4c 55 28 14 cf 87 b1 25 d7 0e 8f 0b 3b 56 00 e0 5b 1b 39 68 92 8e 4e 61 ce e5
WPA: PTK - hexdump(len=64): a9 94 ed 7d 34 37 56 fe 19 66 0f 07 97 73 79 98 d2 95 b9 c2 f3 d9 1d 10 df e9 0b 92 2b 37 c9 56 38 67 2c b3 2e 91 f5 8a 01 f1 e2 1f a7 80 8d 62 78 ac 04 db f0 cb 95 f2 cc 77 39 ad 00 56 8f f8
WPA: EAPOL-Key MIC - hexdump(len=16): 9f e0 aa 5e 06 1f 2d b3 0e e4 10 90 43 4e 80 71
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0f 66 57 3c 14 00 02 6f 20 cf a6 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 af e5 a9 54 b6 db 1b c1 59 a6 3b b7 75 e8 58 5d 4a 54 1d 59 8f 19 c9 23 f3 8d e7 fd f3 d1 e0 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f e0 aa 5e 06 1f 2d b3 0e e4 10 90 43 4e 80 71 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:57:3c:14
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:57:3c:14 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): ba 22 db 8a fc ca 4c 55 28 14 cf 87 b1 25 d7 0e 8f 0b 3b 56 00 e0 5b 1b 39 68 92 8e 4e 61 ce e5
WPA: PTK - hexdump(len=64): a9 94 ed 7d 34 37 56 fe 19 66 0f 07 97 73 79 98 d2 95 b9 c2 f3 d9 1d 10 df e9 0b 92 2b 37 c9 56 38 67 2c b3 2e 91 f5 8a 01 f1 e2 1f a7 80 8d 62 78 ac 04 db f0 cb 95 f2 cc 77 39 ad 00 56 8f f8
WPA: EAPOL-Key MIC - hexdump(len=16): 33 78 47 3d 9c 09 3b 09 7e be ec 7b 53 ec 45 dd
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0f 66 57 3c 14 00 02 6f 20 cf a6 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 af e5 a9 54 b6 db 1b c1 59 a6 3b b7 75 e8 58 5d 4a 54 1d 59 8f 19 c9 23 f3 8d e7 fd f3 d1 e0 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 78 47 3d 9c 09 3b 09 7e be ec 7b 53 ec 45 dd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:57:3c:14
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:57:3c:14 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): ba 22 db 8a fc ca 4c 55 28 14 cf 87 b1 25 d7 0e 8f 0b 3b 56 00 e0 5b 1b 39 68 92 8e 4e 61 ce e5
WPA: PTK - hexdump(len=64): a9 94 ed 7d 34 37 56 fe 19 66 0f 07 97 73 79 98 d2 95 b9 c2 f3 d9 1d 10 df e9 0b 92 2b 37 c9 56 38 67 2c b3 2e 91 f5 8a 01 f1 e2 1f a7 80 8d 62 78 ac 04 db f0 cb 95 f2 cc 77 39 ad 00 56 8f f8
WPA: EAPOL-Key MIC - hexdump(len=16): da 36 06 46 59 66 77 70 c1 5c ab d3 1c e4 9b 8e
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0f 66 57 3c 14 00 02 6f 20 cf a6 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 af e5 a9 54 b6 db 1b c1 59 a6 3b b7 75 e8 58 5d 4a 54 1d 59 8f 19 c9 23 f3 8d e7 fd f3 d1 e0 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 da 36 06 46 59 66 77 70 c1 5c ab d3 1c e4 9b 8e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:57:3c:14
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 d1 58 91 00 82 5d 8f 75 6b 42 7e da 2c 10 ea e9 26 01 1a 20 9f 05 3b 80 eb 11 cf 21 44 1d 9f 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:57:3c:14 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): ba 22 db 8a fc ca 4c 55 28 14 cf 87 b1 25 d7 0e 8f 0b 3b 56 00 e0 5b 1b 39 68 92 8e 4e 61 ce e5
WPA: PTK - hexdump(len=64): a9 94 ed 7d 34 37 56 fe 19 66 0f 07 97 73 79 98 d2 95 b9 c2 f3 d9 1d 10 df e9 0b 92 2b 37 c9 56 38 67 2c b3 2e 91 f5 8a 01 f1 e2 1f a7 80 8d 62 78 ac 04 db f0 cb 95 f2 cc 77 39 ad 00 56 8f f8
WPA: EAPOL-Key MIC - hexdump(len=16): ff d0 20 2b 9f cb fe 3b 54 31 df 4f 35 62 26 67
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0f 66 57 3c 14 00 02 6f 20 cf a6 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 af e5 a9 54 b6 db 1b c1 59 a6 3b b7 75 e8 58 5d 4a 54 1d 59 8f 19 c9 23 f3 8d e7 fd f3 d1 e0 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff d0 20 2b 9f cb fe 3b 54 31 df 4f 35 62 26 67 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 273 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:66:57:3c:14 ssid='' wpa_ie_len=24 rsn_ie_len=0
   skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
Authentication with 00:00:00:00:00:00 timed out.
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
Setting scan request: 0 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     61 79 61 5f 70 72 75 65 62 61 31                  aya_prueba1     
Wireless event: cmd=0x8b1a len=24
Wireless event: cmd=0x8b19 len=12
Received 273 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:66:57:3c:14 ssid='aya_prueba1' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:0f:66:57:3c:14 (SSID='aya_prueba1' freq=2442 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8b1a len=24
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:57:3c:14
Association event - clear replay counter




More information about the HostAP mailing list