Still can't connect

Tom throw_away_2002 at yahoo.com
Wed Nov 16 20:56:13 EST 2005


Upgraded to ndiswrapper 1.5, but now I see the AP
on a "blacklist." :(

# dog /etc/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
ap_scan=2

network={
        group=TKIP
        key_mgmt=WPA-PSK
        pairwise=TKIP
        proto=WPA
        psk="mypassword"
        ssid="myssid"
        }

# wpa_supplicant -Dndiswrapper -c/etc/wpa_supplicant.conf -iwlan0 -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver
'ndiswrapper'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
ap_scan=2
Line: 5 - start of a new network block
group: 0x8
key_mgmt: 0x2
pairwise: 0x8
proto: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
ssid - hexdump_ascii(len=11): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid=[REMOVED]
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: [REMOVED]
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Trying to associate with SSID [REMOVED]
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c07 len=95
Wireless event: cmd=0x8c08 len=40
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: [REMOVED]
Association event - clear replay counter
Associated to a new BSS: BSSID=[REMOVED]
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with [REMOVED]
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from [REMOVED]
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 1b 1d 76 85 0e c2 90 80 58 9b 9f e7 1f d7 88 c7 44 75 88 8e 05
1f 20 ca 99 f4 5d 65 f2 a5 c2 65 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 1b 1d 76 85 0e c2 90 80 58 9b 9f e7 1f d7 88 c7 44 75
88 8e 05 1f 20 ca 99 f4 5d 65 f2 a5 c2 65 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): f9 31 fd a3 2d 45 59 cf 09 bc 80
9d 55 b7 1a ba 05 3c 8b 75 e2 aa 79 21 c5 3d 75 20 ec e9 21 72
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 08 25 e3 5a 38 38 e6 93 16 3c ed
be 61 3f af 66
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b ea 31 82 00 14 a5 15
f4 8c 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 f9 31 fd
a3 2d 45 59 cf 09 bc 80 9d 55 b7 1a ba 05 3c 8b 75 e2 aa 79 21 c5 3d 75
20 ec e9 21 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 08 25 e3 5a 38 38 e6 93 16 3c ed
be 61 3f af 66 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29
idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28
idleWhile=58
RX EAPOL from [REMOVED]
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 78 6b 75 e8 a5 9f 1e b7 56 3d fd d6 2b e6 0e 10 28 0b 79 db 33
10 8b d8 49 37 fa 89 d8 38 be 5b 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 78 6b 75 e8 a5 9f 1e b7 56 3d fd d6 2b e6 0e 10 28 0b
79 db 33 10 8b d8 49 37 fa 89 d8 38 be 5b 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from [REMOVED]
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 11 bd 72 cb 75 24 f6 26 1e 9d 84
ab ba b1 f2 14
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b ea 31 82 00 14 a5 15
f4 8c 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 f9 31 fd
a3 2d 45 59 cf 09 bc 80 9d 55 b7 1a ba 05 3c 8b 75 e2 aa 79 21 c5 3d 75
20 ec e9 21 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 11 bd 72 cb 75 24 f6 26 1e 9d 84
ab ba b1 f2 14 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27
idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26
idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25
idleWhile=55
RX EAPOL from [REMOVED]
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 dc 5a d4 b2 3e 53 75 87 97 a8 b3 e9 a6 2a e8 b1 2f bc 8a e5 8e
90 50 47 1f a8 94 f8 fc e8 ed ea 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 dc 5a d4 b2 3e 53 75 87 97 a8 b3 e9 a6 2a e8 b1 2f bc
8a e5 8e 90 50 47 1f a8 94 f8 fc e8 ed ea 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from [REMOVEI]
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): cc 38 88 fe 95 e8 82 6a af 45 6e
8f 27 32 18 6c
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b ea 31 82 00 14 a5 15
f4 8c 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 f9 31 fd
a3 2d 45 59 cf 09 bc 80 9d 55 b7 1a ba 05 3c 8b 75 e2 aa 79 21 c5 3d 75
20 ec e9 21 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 cc 38 88 fe 95 e8 82 6a af 45 6e
8f 27 32 18 6c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24
idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23
idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22
idleWhile=52
RX EAPOL from [REMOVED]
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 b0 ed ab 07 28 c5 d6 b8 63 eb 01 04 af 61 0a 54 7d cb 00 04 b5
d7 99 71 e5 5e 24 50 31 04 63 db 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 b0 ed ab 07 28 c5 d6 b8 63 eb 01 04 af 61 0a 54 7d cb
00 04 b5 d7 99 71 e5 5e 24 50 31 04 63 db 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from [REMOVED]
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 34 fb 42 52 f4 84 06 8d 47 91 0b
b9 5d e1 f7 b4
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b ea 31 82 00 14 a5 15
f4 8c 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 f9 31 fd
a3 2d 45 59 cf 09 bc 80 9d 55 b7 1a ba 05 3c 8b 75 e2 aa 79 21 c5 3d 75
20 ec e9 21 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 34 fb 42 52 f4 84 06 8d 47 91 0b
b9 5d e1 f7 b4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21
idleWhile=51
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20
idleWhile=50
Authentication with [REMOVED] timed out.
Added BSSID [REMOVED] into blacklist
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Trying to associate with SSID [REMOVED]
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
BSSID [REMOVED] blacklist count incremented to 2
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19
idleWhile=49
Wireless event: cmd=0x8c07 len=95
Wireless event: cmd=0x8c08 len=40
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: [REMOVED]
Association event - clear replay counter
Associated to a new BSS: BSSID=[REMOVED]

And so on until I kill it, then I finally get:

Removed BSSID [REMOVED] from blacklist (clear)

I don't know where the "AP 00:00:00:00:00:00" comes
from. Any ideas? Thanks.


		
__________________________________ 
Yahoo! FareChase: Search multiple travel sites in one click.
http://farechase.yahoo.com



More information about the HostAP mailing list