pre-shared key may be incorrect

Jose Rogado jose.rogado at sapo.pt
Fri Sep 29 21:31:01 EDT 2006


Hi,

I've read the postings on wpa supplicant problems about pre-shared key
incorrect and I have something similar with an Atheros card on Kubuntu
Dapper. The card works fine with this AP with WEP in Kubuntu and WEP and
WPA-PSK in Windows.

Here's the conf file:

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0

#eapol_version=1
#ap_scan=2
#fast_reauth=1

network={
	ssid="PipaNet"
	proto=WPA
	key_mgmt=WPA-PSK
	pairwise=TKIP
	psk="A8601B4A46A5886E8FD6DDFCD5"
#	psk=8e1bd415437e5510c12e82970f3096e520fe7a340f1ad14bd996c24cb21d5744
}

And here's the log (long versison -dd option):

# wpa_supplicant -dd -i ath0 -c /etc/wpa_supplicant.conf -D madwifi

Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver
'madwifi' 
ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=7):
     50 69 70 61 4e 65 74                              PipaNet
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=26): [REMOVED] PSK (from
passphrase) - hexdump(len=32): [REMOVED] Line 15: removed CCMP from group
cipher list since it was not allowed for pairwise cipher Priority group 0
   id=0 ssid='PipaNet'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:0d:88:52:3c:4f
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1 Setting scan request: 0
sec 100000 usec Added interface ath0 Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RTM_NEWLINK, IFLA_IFNAME:
Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=8
Wireless event: cmd=0x8b19 len=8
Received 253 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS
from priority group 0
0: 00:90:96:f7:ff:78 ssid='PipaNet' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:90:96:f7:ff:78 (SSID='PipaNet' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured -
skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto Wireless event: cmd=0x8b1a
len=16 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP:
00:90:96:f7:ff:78
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:90:96:f7:ff:78 No keys have been
configured - skip key clearing Associated with 00:90:96:f7:ff:78
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec RX EAPOL from
00:0e:50:28:0a:94 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00
00 00 00 00 00 00 00
08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83 ca 80 d4 bf
a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE
802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 00 08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83
ca 80
d4 bf a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:28:0a:94 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 06 53 df 2c fd d0 c7 b1 7f 3a 65 90
07 2f 09 24 16 d8 bd 1f 92 8d 85 f1 2d 1f 86 8d 2e 8b 58 de
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00
00 00 00 00 06 53 df 2c fd d0 c7 b1 7f 3a 65 90 07 2f 09 24 16 d8 bd 1f 92
8d
85 f1 2d 1f 86 8d 2e 8b 58 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 13 4c 78 15 e4 da 27
16 ca dc 10 4e 80 00 67 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02
01 00 00 50 f2 02
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from
00:0e:50:28:0a:94 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00
00 00 00 00 00 00 01
08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83 ca 80 d4 bf
a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 01 08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83
ca 80
d4 bf a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:28:0a:94 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00
00 00 00 01 06 53 df 2c fd d0 c7 b1 7f 3a 65 90 07 2f 09 24 16 d8 bd 1f 92
8d
85 f1 2d 1f 86 8d 2e 8b 58 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 a2 80 06 41 e5 e5 15
26 b2 df a5 18 02 d1 02 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02
01 00 00 50 f2 02
RX EAPOL from 00:0e:50:28:0a:94
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00
02
08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83 ca 80 d4 bf
a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 02 08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83
ca 80
d4 bf a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:28:0a:94 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00
00 00 00 02 06 53 df 2c fd d0 c7 b1 7f 3a 65 90 07 2f 09 24 16 d8 bd 1f 92
8d
85 f1 2d 1f 86 8d 2e 8b 58 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 2f 42 6a 5e e8 5b fd
60 d2 3b 2a d1 23 21 fa 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02
01 00 00 50 f2 02
RX EAPOL from 00:0e:50:28:0a:94
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00
03
08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83 ca 80 d4 bf
a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 03 08 27 37 3d ed c5 1a e2 83 ec 81 4d b7 bf e8 31 71 c9 0e 8b 83
ca 80
d4 bf a3 ef ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:50:28:0a:94 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00
00 00 00 03 06 53 df 2c fd d0 c7 b1 7f 3a 65 90 07 2f 09 24 16 d8 bd 1f 92
8d
85 f1 2d 1f 86 8d 2e 8b 58 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 e1 6d cd 27 37 cd 79
11 53
53 87 88 d2 04 a6 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02
01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect

Any clues?

Thank's.

J. Rogado




More information about the HostAP mailing list