WPA2-PSK with TKIP fails to set GTK/PTK to driver: ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address

kstauffer uglymouse at saunalahti.fi
Mon Feb 12 19:01:59 EST 2007


Hi,
For some reason GTK or PTK cannot be installed to driver and 
authentication to WPA2 AP fails when TKIP is used.
If switched to CCMP, authentication is successfull according to 
wpa_supplicant logs but immediately after authentication 4Way Handshake 
is restarted and it fails.
"WPA: 4-Way Handshake failed - pre-shared key may be incorrect" message 
appears, though PSK is correct.

Any idea why?

Thanks in advanced!

-Kristian

AP Beacon as attachement.

wpa_supplicant configuration:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
network={
 ssid="DEVPROST"
 key_mgmt=WPA-PSK
 group=TKIP
 pairwise=TKIP
#  group=CCMP
#  pairwise=CCMP
 proto=RSN
 psk="12345678"
}

#wpa_supplicant -Dmadwifi -iwlan0 -c /etc/wpa_supplicant_wlan0.conf -dd

wpa_supplicant log(TKIP):

WPA: RX message 3 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=1)
WPA: IE KeyData - hexdump(len=62): 30 14 01 00 00 0f ac 02 01 00 00 0f 
ac 02 01 00 00 0f ac 02 05 00 dd 26 00 0f ac 01 02 00 d0 9c 7a bc 49 ae 
9e 50 f1 bd 1e 9b 94 b2 a6 9e 25 7e 9a 99 ed 71 bb a2 a9 c1 24 b0 27 15 
83 9c
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 09 00 00 00 00 00 
00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 0c 2e 
12 83 ea 10 d5 03 11 aa eb 71 60 e3 f5 00 00
WPA: Installing PTK to the driver.
wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 
key_len=32
ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address
WPA: Failed to set PTK to the driver.
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=2 set_tx=0 seq_len=6 
key_len=32
ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address
WPA: Failed to set GTK to the driver.
RSN: Failed to install GTK
RSN: Failed to configure GTK

wpa_supplicant log(CCMP)

Removed BSSID 00:a0:0a:a8:93:6c from blacklist (clear)
Selecting BSS from priority group 0
0: 00:a0:0a:a8:93:6c ssid='DEVPROST' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
  selected based on RSN IE
Trying to associate with 00:a0:0a:a8:93:6c (SSID='DEVPROST' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 05 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: added PMKSA cache candidate 00:a0:0a:a8:93:6c prio 1000
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b1a len=21
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:a0:0a:a8:93:6c
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:a0:0a:a8:93:6c
No keys have been configured - skip key clearing
Associated with 00:a0:0a:a8:93:6c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 65 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
 EAPOL-Key type=2
 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=16 key_data_length=22
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 65
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 65 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 7f 10 23 26 e6 9a d7 a1 9b 04 94 
41 df ee b4 6f fa f8 ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 00 01 7f 10 23 26 e6 9a d7 a1 9b 04 94 41 df ee b4 6f fa f8 
ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 dd 
e3 b3 5f 8c 2e d9 b3 bb c0 fb 63 0e eb b1 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=117
 EAPOL-Key type=2
 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=16 key_data_length=22
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 00 01 7f 10 23 26 e6 9a d7 a1 9b 04 94 41 df ee b4 6f fa f8 
ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 ca 
7a ba 01 89 db cd a0 cd fa 5a c7 3d 96 90 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 
00 00 02 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 e1 2c 6b 24 
66 1e fd 71 52 3e c8 cd 60 19 04 00 38 76 4a c4 9d 67 38 4c 42 ce 15 4e 
db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b a6 87 28 49 02 29 95 b8 
95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a b2 1a d5 dc ab 18
IEEE 802.1X RX: version=1 type=3 length=151
 EAPOL-Key type=2
 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure 
Encr)
 key_length=16 key_data_length=56
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): c7 e1 2c 6b 24 66 1e fd 71 52 3e c8 cd 60 19 04
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 
00 00 00 00 00 02 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 e1 
2c 6b 24 66 1e fd 71 52 3e c8 cd 60 19 04 00 38 76 4a c4 9d 67 38 4c 42 
ce 15 4e db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b a6 87 28 49 02 
29 95 b8 95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a b2 1a d5 dc ab 18
RSN: encrypted key data - hexdump(len=56): 76 4a c4 9d 67 38 4c 42 ce 15 
4e db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b a6 87 28 49 02 29 95 
b8 95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a b2 1a d5 dc ab 18
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 05 00 dd 16 00 0f ac 01 02 00 b0 e5 51 59 59 ba 
c2 4a f0 3d 0d f3 70 25 c8 3c dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 
00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 5b 51 
90 a8 96 15 90 f0 0d 21 be 8a 57 44 3e 00 00
WPA: Installing PTK to the driver.
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 
key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=2 set_tx=0 seq_len=6 
key_len=16
WPA: Key negotiation completed with 00:a0:0a:a8:93:6c [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:a0:0a:a8:93:6c completed (auth) 
[id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
EAPOL: startWhen --> 0
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 03 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=117
 EAPOL-Key type=2
 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=16 key_data_length=22
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 00 03 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: COMPLETED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 1a a5 39 88 eb 82 a0 f2 a1 1c e4 
af 09 79 cd b1 b3 27 b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 00 03 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 27 
b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 91 
22 14 da 93 85 49 8f 43 b3 ff ee ce 23 1e 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 04 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=117
 EAPOL-Key type=2
 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=16 key_data_length=22
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 00 04 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 00 04 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 27 
b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 3d 
61 5f 4d 40 a0 d6 62 2b 74 4b 37 18 b4 f2 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:a0:0a:a8:93:6c
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 05 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 89 
d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=117
 EAPOL-Key type=2
 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=16 key_data_length=22
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
 key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 00 05 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e 
f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 00 05 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 27 
b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 21 
b3 1d 49 70 f5 72 4e eb 59 5b 13 a5 f3 1c 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:a0:0a:a8:93:6c into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:a0:0a:a8:93:6c
State: DISCONNECTED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:a0:0a:a8:93:6c
No keys have been configured - skip key clearing
Associated with 00:a0:0a:a8:93:6c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=0
wpa_driver_madwifi_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Removed BSSID 00:a0:0a:a8:93:6c from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

-------------- next part --------------
A non-text attachment was scrubbed...
Name: AP_capabilities_rsn.cap
Type: application/octet-stream
Size: 313 bytes
Desc: not available
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20070213/dab04a65/attachment.obj 


More information about the HostAP mailing list