wpa_supplicant + hidden essid + ipw2200 problem

Samuel Díaz García samueldg at arcoscom.com
Tue Jul 26 10:05:06 EDT 2005


kernel 2.6.12.3
wpa_supplicant 0.4.3 and 0.3.9
ipw2200 1.0.6
ieee80211 1.0.3

kernel has many patches on it (IMQ, patch_o_matic, software suspend 2, orinoco 
rfmon patch, wireless extensions 18).

The problem is that the 4WAY HANDSHAKE protocol appears to be finished, but the 
iface disconnects.

-- WPA_SUPPLICANT DEBUG OUTPUT --
sdg01:~# wpa_supplicant -dd -i eth1 -c /etc/redes_wifi/ArcosComToledo -D wext
Initializing interface 'eth1' conf '/etc/redes_wifi/ArcosComToledo' driver 'wext'
Configuration file '/etc/redes_wifi/ArcosComToledo' -> 
'/etc/redes_wifi/ArcosComToledo'
Reading configuration file '/etc/redes_wifi/ArcosComToledo'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=0
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=8):
      41 72 63 6f 73 43 6f 6d                           ArcosCom
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=45): [REMOVED]
mode=0 (0x0)
auth_alg: 0x1
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
    id=0 ssid='ArcosCom'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
Own MAC address: 00:0e:35:cd:61:c9
wpa_driver_wext_set_wpa
SIOCGIWRANGE: WE(compiled)=18 WE(source)=16 enc_capa=0x0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=8):
      41 72 63 6f 73 43 6f 6d                           ArcosCom
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:c8:99:9c
State: SCANNING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0f:66:c8:99:9c
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Failed to parse WPA IE from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
04 01 00 00 50 f2 04 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:0f:66:c8:99:9c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0f:66:c8:99:9c
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 
f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 98 6d 60 
21 68 71 f3 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 
00 00 00 f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 
98 6d 60 21 68 71 f3 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:c8:99:9c (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 
01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): d5 19 f9 8a 50 95 15 e6 6f df 90 5a d3 73 
1e f7 d1 27 19 cb b8 93 a6 41 77 f1 b6 11 3b a1 38 12
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): 00 0f 66 c8 99 9c 00 0e 35 cd 61 c9 88 8e 
01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 d5 19 f9 8a 50 95 15 e6 6f df 
90 5a d3 73 1e f7 d1 27 19 cb b8 93 a6 41 77 f1 b6 11 3b a1 38 12 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
14 1a 44 f4 b9 1e 4f 91 57 57 ac 73 b6 0a e0 e0 00 18 dd 16 00 50 f2 01 01 00 00 
50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0f:66:c8:99:9c into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Scan timeout - try to get results
Received 776 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:0f:66:c8:99:9c ssid='ArcosCom' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
    selected
Trying to associate with 00:0f:66:c8:99:9c (SSID='ArcosCom' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 
00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=21
Scan timeout - try to get results
Received 776 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:0f:66:c8:99:9c ssid='ArcosCom' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
    selected
Trying to associate with 00:0f:66:c8:99:9c (SSID='ArcosCom' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 
00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: ASSOCIATING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=21
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:66:c8:99:9c
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0f:66:c8:99:9c
No keys have been configured - skip key clearing
Associated with 00:0f:66:c8:99:9c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0f:66:c8:99:9c
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 
f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 98 6d 60 
21 68 71 f3 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 
00 00 00 f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 
98 6d 60 21 68 71 f3 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0f:66:c8:99:9c (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): ae 28 85 9f 4a 98 a5 dc b1 09 55 42 55 b2 
22 72 90 14 c8 d5 1c 95 c8 18 36 d9 54 fe 53 85 dd 88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): 00 0f 66 c8 99 9c 00 0e 35 cd 61 c9 88 8e 
01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 ae 28 85 9f 4a 98 a5 dc b1 09 
55 42 55 b2 22 72 90 14 c8 d5 1c 95 c8 18 36 d9 54 fe 53 85 dd 88 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
37 61 21 07 37 4a 20 70 ce 70 5d 62 95 95 45 f0 00 18 dd 16 00 50 f2 01 01 00 00 
50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from 00:0f:66:c8:99:9c
RX EAPOL - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 01 
f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 98 6d 60 
21 68 71 f3 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 4c f0 6b 02 e7 e0 6b 5f a4 ba 0c 03 34 4a 5c bd 00 
1c dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 
f2 02
IEEE 802.1X RX: version=1 type=3 length=123
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 
00 00 01 f4 5d f3 14 56 2f a1 2a 50 41 e5 2b c0 64 13 a9 c9 6c e4 39 9f b1 98 db 
98 6d 60 21 68 71 f3 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 4c f0 6b 02 e7 e0 6b 5f a4 ba 0c 03 34 4a 
5c bd 00 1c dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 
00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0f:66:c8:99:9c (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 
50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=113): 00 0f 66 c8 99 9c 00 0e 35 cd 61 c9 88 8e 
01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
f3 f1 c3 5a 8a ef 50 59 48 42 fb b1 a3 c0 d7 8f 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
BSSID 00:0f:66:c8:99:9c blacklist count incremented to 2
State: GROUP_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=8):
      41 72 63 6f 73 43 6f 6d                           ArcosCom
Scan timeout - try to get results
Received 775 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:0f:66:c8:99:9c ssid='<hidden>' wpa_ie_len=28 rsn_ie_len=0 caps=0x11
...
etc...
-- WPA_SUPPLICANT END DEBUG INFO --

-- 
    Samuel Díaz García
     Director Gerente
ArcosCom Wireless, S.L.L.

CIF: B11828068
c/ Romero Gago, 19
Arcos de la Frontera
11630 - Cadiz

http://www.arcoscom.com

mailto:samueldg at arcoscom.com
msn: samueldg at arcoscom.com

Móvil: 651 93 72 48
Tlfn.: 956 70 13 15
Fax:   956 70 34 83



More information about the HostAP mailing list