Problems to autenticat with EAP-TTLS and broadcom driver - "wpa_parse_wpa_ie_wpa: malformed ie or unknown version"

Joao Paulo Pereira de Sousa jpaulo at ipb.pt
Thu Feb 15 07:09:33 EST 2007


Hi,

I want authenticate my linksys WRT54GL router in client mode
withEAP-TTLS. I have instaled whiterussian 0.9 and the
wpa_supplicantpackage with libssl. This is my wpa_supplicant.conf file:

#ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
# se a placa nao suporta scanning, usar ap_scan=0
ap_scan=1
network={
 ssid="e-U"
 scan_ssid=1
 key_mgmt=IEEE8021X
 eap=TTLS
 anonymous_identity="anonymous at utad.pt"
 identity="jp at utad.pt"
 password="xxxxxx"
 phase2="auth=PAP"
}


And I have this debug:

root at Freifunk:~# more debug.txt 
Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver
'broadcom' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
ap_scan=1
Line: 8 - start of a new network block
ssid - hexdump_ascii(len=3):
     65 2d 55                                          e-U             
scan_ssid=1 (0x1)
key_mgmt: 0x8
eap methods - hexdump(len=2): 15 00
anonymous_identity - hexdump_ascii(len=17):
     61 6e 6f 6e 79 6d 6f 75 73 40 75 74 61 64 2e 70   anonymous at utad.p
     74                                                t               
identity - hexdump_ascii(len=10):
     6a 70 40 75 74 61 64 2e 70 74                     jp at utad.pt      
password - hexdump_ascii(len=10): [REMOVED]
phase2 - hexdump_ascii(len=8):
     61 75 74 68 3d 50 41 50                           auth=PAP        
Priority group 0
   id=0 ssid='e-U'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:18:f8:e5:fe:4b
BROADCOM: wlioctl(eth1,164,len=4,val=0x7fff7c68)
BROADCOM: wlioctl(eth1,133,len=4,val=0x7fff7c6c)
BROADCOM: wlioctl(eth1,165,len=4,val=0x7fff7c68)
BROADCOM: wlioctl(eth1,134,len=4,val=0x7fff7c6c)
BROADCOM: wlioctl(eth1,122,len=6,val=0x7fff7c60)
BROADCOM: SET KEY[0] alg=0
BROADCOM: addr - hexdump(len=6): ff ff ff ff ff ff
BROADCOM: wlioctl(eth1,45,len=164,val=0x7fff7b80)
BROADCOM: SET KEY[1] alg=0
BROADCOM: addr - hexdump(len=6): ff ff ff ff ff ff
BROADCOM: wlioctl(eth1,45,len=164,val=0x7fff7b80)
BROADCOM: SET KEY[2] alg=0
BROADCOM: addr - hexdump(len=6): ff ff ff ff ff ff
BROADCOM: wlioctl(eth1,45,len=164,val=0x7fff7b80)
BROADCOM: SET KEY[3] alg=0
BROADCOM: addr - hexdump(len=6): ff ff ff ff ff ff
BROADCOM: wlioctl(eth1,45,len=164,val=0x7fff7b80)
BROADCOM: wlioctl(eth1,82,len=4,val=0x7fff7c78)
BROADCOM: wlioctl(eth1,120,len=4,val=0x7fff7c78)
Setting scan request: 0 sec 100000 usec
Added interface eth1
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=3):
     65 2d 55                                          e-U             
BROADCOM: wlioctl(eth1,50,len=36,val=0x7fff7c40)
Scan timeout - try to get results
BROADCOM: wlioctl(eth1,51,len=8192,val=0x10007840)
BROADCOM: AP IEs - hexdump(len=123): 00 03 65 2d 55 01 08 82 84 8b 0c12
96 18 24 03 01 0d 2a 01 02 32 03 30 48 60 85 1e 00 00 84 00 0f 00 ff03
19 00 43 49 46 4f 50 5f 30 33 00 00 00 00 00 00 00 00 00 00 00 25 dd06
00 40 96 01 01 00 dd 05 00 40 96 03 03 dd 16 00 40 96 04 00 02 07 a400
00 23 a4 00 00 42 43 00 00 62 32 00 00 dd 18 00 50 f2 02 01 01 02 0003
a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
BROADCOM: IE: id:0, len:3
BROADCOM: oui:652d55
BROADCOM: IE: id:1, len:8
BROADCOM: oui:82848b
BROADCOM: IE: id:3, len:1
BROADCOM: IE: id:2a, len:1
BROADCOM: IE: id:32, len:3
BROADCOM: oui:304860
BROADCOM: IE: id:85, len:30
BROADCOM: oui:000084
BROADCOM: IE: id:dd, len:6
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:5
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:22
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:24
BROADCOM: oui:0050f2
BROADCOM: AP IEs - hexdump(len=123): 00 03 65 2d 55 01 08 82 84 8b 0c12
96 18 24 03 01 04 2a 01 00 32 03 30 48 60 85 1e 00 00 84 00 0f 00 ff03
19 00 43 49 46 4f 50 5f 30 32 00 00 00 00 00 00 00 00 01 00 00 25 dd06
00 40 96 01 01 00 dd 05 00 40 96 03 03 dd 16 00 40 96 04 00 05 07 a400
00 23 a4 00 00 42 43 00 00 62 32 00 00 dd 18 00 50 f2 02 01 01 05 0003
a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
BROADCOM: IE: id:0, len:3
BROADCOM: oui:652d55
BROADCOM: IE: id:1, len:8
BROADCOM: oui:82848b
BROADCOM: IE: id:3, len:1
BROADCOM: IE: id:2a, len:1
BROADCOM: IE: id:32, len:3
BROADCOM: oui:304860
BROADCOM: IE: id:85, len:30
BROADCOM: oui:000084
BROADCOM: IE: id:dd, len:6
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:5
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:22
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:24
BROADCOM: oui:0050f2
BROADCOM: AP IEs - hexdump(len=123): 00 03 65 2d 55 01 08 82 84 8b 0c12
96 18 24 03 01 09 2a 01 00 32 03 30 48 60 85 1e 00 00 84 00 0f 00 ff03
19 00 43 49 46 4f 50 5f 30 36 00 00 00 00 00 00 00 00 00 00 00 25 dd06
00 40 96 01 01 00 dd 05 00 40 96 03 03 dd 16 00 40 96 04 00 02 07 a400
00 23 a4 00 00 42 43 00 00 62 32 00 00 dd 18 00 50 f2 02 01 01 02 0003
a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
BROADCOM: IE: id:0, len:3
BROADCOM: oui:652d55
BROADCOM: IE: id:1, len:8
BROADCOM: oui:82848b
BROADCOM: IE: id:3, len:1
BROADCOM: IE: id:2a, len:1
BROADCOM: IE: id:32, len:3
BROADCOM: oui:304860
BROADCOM: IE: id:85, len:30 
BROADCOM: oui:000084
BROADCOM: IE: id:dd, len:6
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:5
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:22
BROADCOM: oui:004096
BROADCOM: IE: id:dd, len:24
BROADCOM: oui:0050f2
Received 648 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:12:d9:42:ae:10 ssid='e-U' wpa_ie_len=26 rsn_ie_len=0 caps=0x0
wpa_parse_wpa_ie_wpa: malformed ie or unknown version
   skip WPA IE - parse failed
1: 00:12:d9:4a:1b:a0 ssid='e-U' wpa_ie_len=26 rsn_ie_len=0 caps=0x0
wpa_parse_wpa_ie_wpa: malformed ie or unknown version
   skip WPA IE - parse failed
2: 00:12:d9:42:ae:00 ssid='e-U' wpa_ie_len=26 rsn_ie_len=0 caps=0x0
wpa_parse_wpa_ie_wpa: malformed ie or unknown version
   skip WPA IE - parse failed
No suitable AP found.
Setting scan request: 5 sec 0 usec
Starting AP scan (broadcast SSID)
BROADCOM: wlioctl(eth1,50,len=36,val=0x7fff7c40)
Scan timeout - try to get results
BROADCOM: wlioctl(eth1,51,len=8192,val=0x10007a18)
BROADCOM: AP IEs - hexdump(len=129): 00 09 67 75 65 73 74 2d 65 2d 5501
08 82 84 8b 0c 12 96 18 24 03 01 0d 2a 01 02 32 03 30 48 60 85 1e 0000
84 00 0f 00 ff 03 19 00 43 49 46 4f 50 5f 30 33 00 00 00 00 00 00 0000
00 00 00 25 dd 06 00 40 96 01 01 00 dd 05 00 40 96 03 03 dd 16 00 4096
04 00 02 07 a4 00 00 23 a4 00 00 42 43 00 00 62 32 00 00 dd 18 00 50f2
02 01 01 02 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
BROADCOM: IE: id:0, len:9


This is a problem of broadcom driver? Anybody can help me to solve this
problem?

Regards

-- 
							<!--		@page { size: 21.59cm 27.94cm; margin: 2cm }		P {
margin-bottom: 0.21cm }	-->	
JoãoPaulo


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20070215/0b3c6848/attachment.htm 


More information about the HostAP mailing list