WPA - AP association Issue

Mr. Maloomnahi maloomnahi at indiatimes.com
Fri Nov 2 08:55:43 EDT 2007


Hi Bryan,

Thanks for your sugegstions and they have proved fruitful for me. Thanks a lot again.

Now its reading the CONF file, and executing. But the associated device later disconnects due to the " unknown CA error " !!?

I have annexed the dump for your perusal. If you have time please tell me:

1] Can we use same server-client certificates at AP and STA with different CA?
2] Does the CA of the certificate become important? Can it be made by ourselves or procured from some websites and used? [current mode]
3] Do you know of any certificate provider who does not charge and is easily available to download?
4] What do you fel is the issue other than CA error?

Thanks
PPN
-------------- next part --------------
State: ASSOCIATING -> ASSOCIATED
TLS: Certificate verification failed, error 18 (self signed certificate) depth 0 for '/CN=Sial CA/C=US/ST=Washington/L=Seattle/O=sial.org/emailAddress=jmates at sial.org'
SSL: (where=0x4008 ret=0x230)
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server certificate B
OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
SSL: 7 bytes pending from ssl_out
SSL: Failed - tls_out available to report error
SSL: 7 bytes left to be sent out (of total 7 bytes)
EAP-TLS: TLS processing failed
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=17): 01 00 00 0d 02 53 00 0d 0d 00 15 03 01 00 02 02 30
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:78:8f:5e:49
RX EAPOL - hexdump(len=8): 01 00 00 04 04 53 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: heldWhile --> 0
EAPOL: idleWhile --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:14:78:8f:5e:49
RX EAPOL - hexdump(len=14): 01 00 00 0a 01 ff 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=255 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
     68 65 6c 6c 6f                                    hello
EAP: using real identity - hexdump_ascii(len=5):
     73 65 6d 63 6f                                    semco
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=14): 01 00 00 0a 02 ff 00 0a 01 73 65 6d 63 6f
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:78:8f:5e:49
RX EAPOL - hexdump(len=10): 01 00 00 06 01 00 00 06 0d 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=13 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
TLS: Trusted root certificate(s) loaded
TLS - SSL error: error:0B07C065:x509 certificate routines:X509_STORE_add_cert:cert already in hash table
OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib
OpenSSL: SSL_use_certificate_file (PEM) --> OK
OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag
OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib
OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib
OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
SSL: Private key loaded successfully
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-TLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 101 bytes pending from ssl_out
SSL: 101 bytes left to be sent out (of total 101 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=111): 01 00 00 6b 02 00 00 6b 0d 00 16 03 01 00 60 01 00 00 5c 03 01 47 2b 1a 56 94 f3 f1 71 ed ca d8 b4 0e 8d 93 40 8c 02 af 1a 6d fc 89 f0 3c 7e 0d 4a 22 32 00 46 00 00 34 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00 62 00 61 00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 02 01 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:78:8f:5e:49
RX EAPOL - hexdump(len=1359): 01 00 05 4b 01 01 05 4b 0d 00 16 03 01 00 4a 02 00 00 46 03 01 47 2b 19 bc 66 3b ba 33 af 4e f0 d6 fb 50 df 20 69 22 88 66 38 8e 71 f6 3d 35 d4 8c 37 cb 34 3b 20 bf 2d 26 23 1a 03 19 ba 6c 52 e4 8f 7e 0a 9e 4f f3 28 2b 4b 48 59 df 1d 07 ee be c4 f9 be a4 e3 00 35 01 16 03 01 04 62 0b 00 04 5e 00 04 5b 00 04 58 30 82 04 54 30 82 03 3c a0 03 02 01 02 02 09 00 ee b9 f1 84 58 2b 61 44 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 79 31 10 30 0e 06 03 55 04 03 13 07 53 69 61 6c 20 43 41 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 53 65 61 74 74 6c 65 31 11 30 0f 06 03 55 04 0a 13 08 73 69 61 6c 2e 6f 72 67 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 6a 6d 61 74 65 73 40 73 69 61 6c 2e 6f 72 67 30 1e 17 0d 30 37 31 30 31 36 30 37 33 31 31 39 5a 17 0d 31 32 31 30 31 34 30 37 33 31 31 39 5a 30 79 31 10 30 0e 06 03 55 04 03 13 07 53 69 61 6c 20 43 41 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 53 65 61 74 74 6c 65 31 11 30 0f 06 03 55 04 0a 13 08 73 69 61 6c 2e 6f 72 67 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 6a 6d 61 74 65 73 40 73 69 61 6c 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 de f6 ee 2c 67 18 0c 37 11 df 63 e2 8c cf 81 f6 88 30 8d 7c 27 d6 9f 91 b9 b3 fb b5 39 26 73 f7 4e b7 70 d7 55 26 ff 54 d6 1a 5c 19 8b 06 62 9e 1b 5b c2 df 1e 82 de 53 84 8f eb d2 19 7c ef 04 5b 94 b9 3e b0 37 98 99 82 6a 41 20 c8 10 6d 66 c7 3e 53 a8 6f 49 0b 4d 33 3f 0e e4 b0 b0 f3 42 be f7 07 58 0e 48 70 87 c3 9a 29 10 de f4 c2 74 2d 35 1c 4d c3 f8 36 e1 2c 62 0a e1 ff fa 1e c0 2a 35 60 c6 b1 f5 08 db 72 b9 dd 9a c1 e0 99 1f f8 96 0b 3a 68 8e f2 57 d6 5e 4a 57 df d9 f6 81 2b 3f a9 8a f9 96 29 aa 54 32 60 00 10 dd 03 6d d1 f7 2c 9e 6c f1 4c a3 f0 b8 e2 20 c6 22 76 8a 9d 93 d3 2e 1b d9 a7 08 fb b1 a1 7d 40 05 49 c0 f5 80 52 10 78 72 73 85 4f 74 c3 bd 24 40 7a 5b 18 eb 07 30 f6 b1 79 c9 5a 28 f0 49 c1 17 21 83 06 e5 da 7a 91 32 fa 54 4e cd 5b f0 7a f8 70 17 02 03 01 00 01 a3 81 de 30 81 db 30 1d 06 03 55 1d 0e 04 16 04 14 fb cb 0b 89 af 24 1a ac 77 37 68 13 75 05 91 7f ee 99 5f 2c 30 81 ab 06 03 55 1d 23 04 81 a3 30 81 a0 80 14 fb cb 0b 89 af 24 1a ac 77 37 68 13 75 05 91 7f ee 99 5f 2c a1 7d a4 7b 30 79 31 10 30 0e 06 03 55 04 03 13 07 53 69 61 6c 20 43 41 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 53 65 61 74 74 6c 65 31 11 30 0f 06 03 55 04 0a 13 08 73 69 61 6c 2e 6f 72 67 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 6a 6d 61 74 65 73 40 73 69 61 6c 2e 6f 72 67 82 09 00 ee b9 f1 84 58 2b 61 44 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 6e 48 45 5c 64 4a 2c be e2 0f e4 e7 7d 78 c5 a0 08 62 9e cb fa ee 04 59 81 68 78 a7 28 aa 29 db 18 f6 2b cf 92 bc 8b 32 46 58 00 e5 6a f5 8d a3 4c 5e 1c 32 22 0a e2 1b 65 ac 45 3d b1 c2 0a bc 6e 6c 19 a4 5a d8 e8 85 f9 64 dc 77 e7 0c f6 66 b5 12 15 8b 8b 98 7b 84 4d 46 6d bc 0e a7 b2 ff d0 d2 d0 3e 70 45 7a 13 3b cd 67 ea 38 38 5d 04 9a ff 08 e7 50 68 18 4b 14 32 8d a0 7a 6d 8e fd e8 60 ee 5b 81 ab b0 a7 17 fc 85 36 8b 11 18 46 b1 f6 dc 21 18 98 8e 42 69 16 44 96 d4 02 16 b7 c6 63 86 23 50 89 f6 21 12 2d 45 fc 38 46 2a 14 ea 55 4c 8c 01 b3 a4 b0 76 3d 88 8f 0c 16 95 99 6c 29 80 58 5a 34 da a5 74 75 01 4b dc d6 d5 d5 33 92 08 43 e7 39 e3 6a 02 d7 09 fd 2c a7 7d 0e 80 65 d7 bf 2a 79 08 0e 8d 29 ba 27 ac af c5 df ce 6c 11 59 1c 02 90 1e ee e9 c1 50 fd 64 c5 33 16 03 01 00 8a 0d 00 00 82 02 01 02 00 7d 00 7b 30 79 31 10 30 0e 06 03 55 04 03 13 07 53 69 61 6c 20 43 41 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 53 65 61 74 74 6c 65 31 11 30 0f 06 03 55 04 0a 13 08 73 69 61 6c 2e 6f 72 67 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 6a 6d 61 74 65 73 40 73 69 61 6c 2e 6f 72 67 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=13 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1355) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: Certificate verification failed, error 18 (self signed certificate) depth 0 for '/CN=Sial CA/C=US/ST=Washington/L=Seattle/O=sial.org/emailAddress=jmates at sial.org'
SSL: (where=0x4008 ret=0x230)
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server certificate B
OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
SSL: 7 bytes pending from ssl_out
SSL: Failed - tls_out available to report error
SSL: 7 bytes left to be sent out (of total 7 bytes)
EAP-TLS: TLS processing failed
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=17): 01 00 00 0d 02 01 00 0d 0d 00 15 03 01 00 02 02 30
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:78:8f:5e:49
RX EAPOL - hexdump(len=8): 01 00 00 04 04 01 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
Authentication with 00:14:78:8f:5e:49 timed out.
Added BSSID 00:14:78:8f:5e:49 into blacklist
wpa_driver_madwifi_disassociate
No keys have been configured - skip key clearing
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'SEMCO_AP'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 9 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=17
EAPOL: authWhile --> 0
EAPOL: heldWhile --> 0
EAPOL: idleWhile --> 0
EAPOL: idleWhile --> 0
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'SEMCO_AP'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 9 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=17
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'SEMCO_AP'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 9 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=17
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 4
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'SEMCO_AP'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 9 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=17


More information about the HostAP mailing list