Can't authenticate: WPA, RaLink 2500 (NdisWrapper), SpeedTouch 580 router

Neil Smith neil.gd at njae.me.uk
Thu Apr 13 09:30:59 EDT 2006


Yet another plea for help... I can't get my wireless link to authenticate when
 using wpa_supplicant.  

My machine's running FC 3 (2.6.10-1.770_FC3smp kernel, in case you're
 interested).

I've got a Belkin Wireless G Desktop card (RaLink 2500 chipset, PCI bus)
 working under NdisWrapper 1.13.  The wireless hub is a Thomson SpeedTouch 580
 wireless router.  The wireless link works perfectly when the router is
 configured with "No security".

I've downloaded wpa_supplicant 0.4.8 and compiled from source (the .config
 file is below) then copied the executables to /usr/local/bin.  I use
 wpa_passphrase to generate the WPA key:

[root at temujin ~]# wpa_passphrase IDNET <keyphrase here>
network={
        ssid="IDNET"
        #psk="<keyphrase"
        psk=0c34f..long key ...758497bdce1d2f
}

and use that as the basis of /etc/wpa_supplicant.conf (again, below).

I then give the commands...

[root at temujin ~]# ifdown wlan0
[[ Set router to use WPA encryption ]]
[root at temujin ~]# ifconfig wlan0 up
[root at temujin ~]# wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd

...and it all goes horribly wrong.  wpa_supplicant gets to the 4-way handshake
 stage and then gives up.  If I omit the -Dndiswrapper option (or use -Dwext),
 things don't even get to the 4-way handshake stage.  

Yes, the passphrases are identical on both the router and the Linux box 
(I've tried a few alternatives).  The router is using TKIP encryption.


Can anyone give any suggestions as to what I should do to get this working?

(There was something in this list's archives about problems with this router 
having different MAC addresses for the wireless connection and the WPA
authentication, e.g. the debug lines...

Associated to a new BSS: BSSID=00:11:f5:89:f7:57
...
RX EAPOL from 00:0e:50:b2:b9:f2

...but I couldn't find if that was either resolved or relevant.)


Thanks,

Neil.

--------------
.config for compiling: 

CONFIG_DRIVER_NDISWRAPPER=y
CONFIG_DRIVER_WEXT=y
CONFIG_IEEE8021X_EAPOL=y
CONFIG_EAP_MD5=y
CONFIG_EAP_MSCHAPV2=y
CONFIG_EAP_TLS=y
CONFIG_EAP_PEAP=y
CONFIG_EAP_TTLS=y
CONFIG_EAP_GTC=y
CONFIG_EAP_OTP=y
CONFIG_EAP_LEAP=y
CONFIG_PKCS12=y
CONFIG_CTRL_IFACE=y
CONFIG_BACKEND=file

--------------
/etc/wpa_supplicant.conf: 

ctrl_interface=/var/run/wpa_supplicant

network={
        ssid="IDNET"
        key_mgmt=WPA-PSK
        scan_ssid=1
        proto=WPA
        pairwise=TKIP
        group=TKIP
        #psk="<pass phrase>"
        psk=0c34f...rest of key...dce1d2f
}


--------------
Results of wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd:

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'ndiswrapper' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=5):
     49 44 4e 45 54                                    IDNET           
key_mgmt: 0x2
scan_ssid=1 (0x1)
proto: 0x1
pairwise: 0x8
group: 0x8
PSK - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='IDNET'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
Own MAC address: 00:11:50:90:bd:f5
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
Setting scan request: 0 sec 100000 usec
Added interface wlan0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=5):
     49 44 4e 45 54                                    IDNET           
Scan timeout - try to get results
Received 305 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:11:f5:89:f7:57 ssid='IDNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:11:f5:89:f7:57 (SSID='IDNET' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8c02 len=205
Custom wireless event: 'ASSOCINFO(ReqIEs=000549444e4554010c82848b962430486c0c121860dd160050f20101000050f20201000050f20201000050f202 RespIEs=010c82848b962430486c0c121860dd160050f20101000050f20201000050f20201000050f202)'
Association info event
req_ies - hexdump(len=45): 00 05 49 44 4e 45 54 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=38): 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:f5:89:f7:57
State: DISCONNECTED -> ASSOCIATED
Associated to a new BSS: BSSID=00:11:f5:89:f7:57
No keys have been configured - skip key clearing
Associated with 00:11:f5:89:f7:57
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0e:50:b2:b9:f2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 e3 cc 13 66 44 23 75 da e5 cc a3 d5 31 0f 76 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:b2:b9:f2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 42 08 2a a1 3d 80 a0 4d 93 23 42 87 95 17 84 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:b2:b9:f2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 6e ef d3 6a e3 9c e1 7a 58 1f 0d 9b cc 78 88 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0e:50:b2:b9:f2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab f7 fe 52 18 17 4a 1a c4 ef 7a 75 f0 68 ec 71 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:11:f5:89:f7:57 into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8c02 len=205

(... and so on until I stop wpa_supplicant)
-- 
Neil Smith                         Milton Keynes Roleplaying Games Club
neil.gd at njae.me.uk                             http://www.mk-rpg.org.uk
http://home.freeuk.com/wimp/  Honorary Life Member www.SADWargamers.com



More information about the HostAP mailing list