wpa_supplicant dies at WPA: Sending EAPOL-Key 2/4

Kasprzyk, Nico NKasprzyk at ime-actia.de
Wed Aug 31 08:06:59 EDT 2005


Hello,

I try to connect to our ACCESS POINT (ARTEM ComPoint Enterprise) to my
D-Link DWL-G650 card bus card with WPA-PSK but the 
HANDSHAKE with the help of wpa_supplicant get an timeout at 

  WPA: Sending EAPOL-Key 2/4  and the hexdump of the Key

I already increased the time out in wpa_supplicant and 
compiled with the latest madwifi, madwifi-bsd, and 
wpa_supplicant (0.4.4) snapshots. But nothing changed. Because I do 
not know something about the implementation of madwifi and 
wpa_supplicant I think there could be one of the following reasons:

1. My Access Point does not handle the requests right.
2. A bug in madwifi (Perhaps similar to 
http://lists.shmoo.com/pipermail/hostap/2004-October/008313.html).
3. A bug in wpa_supplicant.

May anyone of you help me with that issue? Is more information needed?
What does it mean that wpa_supplicant gets an timeout after sending
EAPOL-Key 2/4? 

Regards,

Nico
 
DUMP OF wpa_supplicant

wpa_supplicant -iath0 -c/var/run/wpa_supplicant-ath0.conf -Dmadwifi -dd
Initializing interface 'ath0' conf '/var/run/wpa_supplicant-ath0.conf'
driver 'madwifi'
Configuration file '/var/run/wpa_supplicant-ath0.conf' ->
'/var/run/wpa_supplicant-ath0.conf'
Reading configuration file '/var/run/wpa_supplicant-ath0.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=5):
     41 52 74 65 6d                                    ARtem
PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
key_mgmt: 0x2
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='ARtem'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
Own MAC address: 00:0f:3d:ac:0d:e9
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 271 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:01:36:0c:91:d8 ssid='ARtem' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected
Trying to associate with 00:01:36:0c:91:d8 (SSID='ARtem' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 120 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=18
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:01:36:0c:91:d8
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:01:36:0c:91:d8
No keys have been configured - skip key clearing
Associated with 00:01:36:0c:91:d8
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
TX EAPOL - hexdump(len=18): 00 01 36 0c 91 d8 00 0f 3d ac 0d e9 88 8e 01
01 00 00
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 120 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:01:cd:0b:54:0c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 01 00 05 01
Setting authentication timeout: 120 sec 0 usec
WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 9, expecting at
least 99)
RX EAPOL from 00:01:cd:0b:54:0c
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 00 6e a4 82 28 0f 46 83 aa ba 4a 8b 52 75 76 1d 30 11 64 b2 b8 52 66
86 0d e8 2f d2 43 a1 81 94 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 00 00 00 6e a4 82 28 0f 46 83 aa ba 4a 8b 52 75 76 1d 30 11 64 b2
b8 52 66 86 0d e8 2f d2 43 a1 81 94 c0 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:01:cd:0b:54:0c (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): b7 46 a6 34 a4 84 b0 2d 78 99 13
3b ea 34 10 25 3c 7c a2 80 ab 8f c7 6e 75 34 f9 65 9d cd 4a c6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): 00 01 cd 0b 54 0c 00 0f 3d ac 0d
e9 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 b7 46 a6 34
a4 84 b0 2d 78 99 13 3b ea 34 10 25 3c 7c a2 80 ab 8f c7 6e 75 34 f9 65
9d cd 4a c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 75 b6 d9 87 db e7 4d 98 a4 04 82 55
7c c3 18 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
TX EAPOL - hexdump(len=18): 00 01 36 0c 91 d8 00 0f 3d ac 0d e9 88 8e 01
01 00 00
State: 4WAY_HANDSHAKE -> DISCONNECTED



More information about the HostAP mailing list