no success with wpa_supplicant 0.4.7, ipw2100 and WRK54G

Yann Rouillard yann at pleiades.fr.eu.org
Mon Jan 23 18:41:04 EST 2006


Hi,

I have a Linksys WRK54G Broadband router and I have no success
associating with it using WPA PSK.
Any help is welcome !

Here is my wpa_supplicat.conf

# Minimal /etc/wpa_supplicant.conf to associate with open
#  access points. Please see
#  /usr/share/doc/wpasupplicant/wpa_supplicant.conf.gz for more complete
#  configuration parameters.

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0

eapol_version=1
ap_scan=1
fast_reauth=1

### Associate with any open access point
###  Scans/ESSID changes can be done with wpa_cli
network={
        ssid="pleiades"
        scan_ssid=1
   psk=7d59f9d52d1c4da68477d89a671bd33524f807f4216a052deaf96e23418a7a29
        key_mgmt=WPA-PSK
        proto=WPA
        pairwise=TKIP
        group=TKIP
}


Here is the output of wpa_supplicant:

Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver
'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 20 - start of a new network block
ssid - hexdump_ascii(len=8):
     70 6c 65 69 61 64 65 73                           pleiades
scan_ssid=1 (0x1)
PSK - hexdump(len=32): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
Priority group 0
   id=0 ssid='pleiades'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=19 WE(source)=16 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: 00:0c:f1:17:eb:e3
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=8):
     70 6c 65 69 61 64 65 73                           pleiades
Scan timeout - try to get results
Received 1080 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:12:17:41:bd:cf ssid='pleiades' wpa_ie_len=24 rsn_ie_len=0
caps=0x11
   selected based on WPA IE
Trying to associate with 00:12:17:41:bd:cf (SSID='pleiades' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=17
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:17:41:bd:cf
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:12:17:41:bd:cf
No keys have been configured - skip key clearing
Associated with 00:12:17:41:bd:cf
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:12:17:41:bd:cf
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 27 92 72 21 1d eb
da 16 73 65 d2 86 e2 07 1e 1f 42 53 26 e1 ec 52 f9 66 af fe fa be 5f 1c
a6 5f 99 28 4c 59 ad b5 06 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00Setting authentication timeout: 10
sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 27 92 72
21 1d eb da 16 73 65 d2 86 e2 07 1e 1f 42 53 26 e1 ec 52 f9 66 af fe fa
be 5f 1c a6 5f 99 28 4c 59 ad b5 06 72 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:12:17:41:bd:cf (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): be 23 5a 33 2c ea 9f f1 99 75 d1
05 e3 74 18 ce 2c cb 52 55 97 e3 fd fc 11 d0 68 e3 9b 92 fc ca
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 27 92
72 21 1d eb da 16 be 23 5a 33 2c ea 9f f1 99 75 d1 05 e3 74 18 ce 2c cb
52 55 97 e3 fd fc 11 d0 68 e3 9b 92 fc ca 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 6f
df 0d da 4a 3e 2f aa ac 65 76 b1 a9 21 18 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:12:17:41:bd:cf
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 27 92 72 21 1d
eb da 17 73 65 d2 86 e2 07 1e 1f 42 53 26 e1 ec 52 f9 66 af fe fa be 5f
1c a6 5f 99 28 4c 59 ad b5 06 72 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 34 46 a9 e1
b4 ae 9b 93 8a 8e 7d 74 7d 1f 82 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 27 92
72 21 1d eb da 17 73 65 d2 86 e2 07 1e 1f 42 53 26 e1 ec 52 f9 66 af fe
fa be 5f 1c a6 5f 99 28 4c 59 ad b5 06 72 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 34
46 a9 e1 b4 ae 9b 93 8a 8e 7d 74 7d 1f 82 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:12:17:41:bd:cf (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 27 92 72
21 1d eb da 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b3 6c 69
cd ab 35 77 d9 dd c1 62 9b db 89 c3 43 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:12:17:41:bd:cf
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 27 92 72 21 1d
eb da 18 1a c4 a4 de 08 77 fc d4 c3 78 f2 0c 3b 9c 68 f8 38 09 76 d9 46
12 32 35 f8 ae 1f 34 ab 76 57 1a 0f 91 e2 ae 7e 60 20 f8 ca 92 17 85 65
8f 63 02 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b eb 39 bf 3e
dc 99 d4 c4 9c 78 c9 19 00 4e 72 00 20 9d a8 0c a5 a7 4e 14 33 78 7e 46
ec f7 64 ac 61 f7 62 46 2e ea 34 26 e3 a4 b6 77 25 bf f7 7d 50
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 27 92
72 21 1d eb da 18 1a c4 a4 de 08 77 fc d4 c3 78 f2 0c 3b 9c 68 f8 38 09
76 d9 46 12 32 35 f8 ae 1f 34 ab 76 57 1a 0f 91 e2 ae 7e 60 20 f8 ca 92
17 85 65 8f 63 02 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b eb
39 bf 3e dc 99 d4 c4 9c 78 c9 19 00 4e 72 00 20 9d a8 0c a5 a7 4e 14 33
78 7e 46 ec f7 64 ac 61 f7 62 46 2e ea 34 26 e3 a4 b6 77 25 bf f7 7d 50
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:12:17:41:bd:cf (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 15 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 27 92 72
21 1d eb da 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 71 ee ef
66 00 60 84 f2 f9 7d 52 5a 7d 61 40 7f 00 00
WPA: Key negotiation completed with 00:12:17:41:bd:cf [PTK=TKIP
GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:12:17:41:bd:cf completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:12:17:41:bd:cf
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 27 92 72 21 1d
eb da 19 1a c4 a4 de 08 77 fc d4 c3 78 f2 0c 3b 9c 68 f8 38 09 76 d9 46
12 32 35 f8 ae 1f 34 ab 76 57 1a 37 0c d7 94 b8 e3 5a c2 f0 5b d5 84 47
e8 c0 9a 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 08 a3 67 4c
de 36 c8 93 7a 54 17 d4 a7 9d d3 00 20 94 3e f0 86 fb 5a 63 37 43 a5 70
ad 9d ec 4e 54 95 04 bb 86 f2 38 81 44 e7 74 f7 a4 3a a8 23 c1
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 27 92
72 21 1d eb da 19 1a c4 a4 de 08 77 fc d4 c3 78 f2 0c 3b 9c 68 f8 38 09
76 d9 46 12 32 35 f8 ae 1f 34 ab 76 57 1a 37 0c d7 94 b8 e3 5a c2 f0 5b
d5 84 47 e8 c0 9a 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 08
a3 67 4c de 36 c8 93 7a 54 17 d4 a7 9d d3 00 20 94 3e f0 86 fb 5a 63 37
43 a5 70 ad 9d ec 4e 54 95 04 bb 86 f2 38 81 44 e7 74 f7 a4 3a a8 23 c1
State: COMPLETED -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:12:17:41:bd:cf (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 16 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 27 92 72
21 1d eb da 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 43 f9
c3 9c 30 5a ff 23 f7 08 b3 4d 51 85 f5 00 00
WPA: Group rekeying completed with 00:12:17:41:bd:cf [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
...





More information about the HostAP mailing list