DHCP kills connection

Gerrit Erpenstein gerrit-e at gmx.de
Mon Aug 8 15:57:15 EDT 2005


Hello!

I own an IBM Thinkpad T43p with an Atheros Chipset.
I compiled the latest madwifi driver from cvs and the card works so far 
for WEP networks.
For security reasons I enabled WPA on my Linksys Router 'WRT54GS'. So I 
downloaded wpa_supplicant and compiled it.

Making a WPA encrypted connection to my AP worked directly. But when I 
try to get an IP from the router's DHCP server the ath0 interface goes 
down, wpa_supplicant disconnects and the DCHP client gets no offer. A 
few seconds later wpa_supplicant reconnects again.
Interstingly the connection works when I enter ath0's IP and other 
network settings manual through ifconfig. ('ifconfig ath0 netmask 
255.255.255.0 broadcast 192.168.0.255 add 192.168.0.150' and so on). But 
I think you agree that this isn't really satisfying as I use my laptop 
on different APs.
By the way, I have tested wpa_supplicant version 0.4.3 and 0.3.9 using 
dhclient and pump with the same annoying results.

This is the output I get from wpa supplicant when I enter 'dhclient ath0':

----------------------------------------------------------------------
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0f:66:d3:8f:cf into blacklist
State: COMPLETED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
l2_packet_receive - recv: Network is down
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 274 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:66:d3:8f:cf ssid='AP_FROM_HELL' wpa_ie_len=24 rsn_ie_len=0 
caps=0x11
   selected
Trying to associate with 00:0f:66:d3:8f:cf (SSID='AP_FROM_HELL' 
freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 
00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=25
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:d3:8f:cf
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0f:66:d3:8f:cf
No keys have been configured - skip key clearing
Associated with 00:0f:66:d3:8f:cf
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0f:66:d3:8f:cf
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:d3:8f:cf (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): b2 c7 46 fb 85 8a 33 78 d7 47 19 
49 24 1c 42 2f e6 d4 c4 c3 ad 10 aa 53 0b 17 ed e9 79 d1 4b 40
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0f:66:d3:8f:cf
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:d3:8f:cf (ver=2)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 
01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:0f:66:d3:8f:cf
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:0f:66:d3:8f:cf (ver=2)
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): db a5 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=2 set_tx=0 seq_len=6 key_len=16
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:0f:66:d3:8f:cf [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
Removed BSSID 00:0f:66:d3:8f:cf from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0f:66:d3:8f:cf completed (reauth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
----------------------------------------------------------------------

Best Regards
Gerrit Erpenstein




More information about the HostAP mailing list