Supplicant : 8021X-PSK not associating to AP

Mr. Maloomnahi maloomnahi at indiatimes.com
Thu Oct 11 06:59:12 EDT 2007


Hi,

I have the following set up:
Machine A: Hostapd source code, TP Link AR5212, key mgt 8021X-PSK, group=TKIP, private key password = wep key 0 = XXXX
Machine B: WPA Supplicant code, Netgear AR5212, keymgt 8021X-PSK, group =TKIP, private key = wep key = XXXX

Problem Faced: No Association between both. WPA goes to INACTIVE mode after scanning. Please help in solving the problem.
[No server, client and private key file used since PKSC is giving asn1 errors]

Ironical Point: On performing the "iwlist ath0 scanning" it finds the AP with details as follows. 

Moreover HOSTAPD dump shows association with the STA for few seconds 
While WPA dump does not show associated state !! why and why is it getting disconnected soon?

[root at localhost wpa_supplicant-0.5.8]# iwlist ath0 scanning
ath0      Scan completed :
          Cell 01 - Address: 00:14:78:8F:5E:49
                    ESSID:"SEMCO_AP"
                    Mode:Master
                    Frequency:2.412 GHz (Channel 1)
                    Quality=9/94  Signal level=-86 dBm  Noise level=-95 dBm
                    Encryption key:on
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
                              9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                              48 Mb/s; 54 Mb/s
                    Extra:bcn_int=100
                    IE: WPA Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (2) : CCMP TKIP
                        Authentication Suites (2) : 802.1X  PSK
                    Extra:wme_ie=dd180050f20201018f0002a3400027a4000042435e0062322f00
                    Extra:ath_ie=dd0900037f01010024ff7f

---------------DUMP from Hostapd and WPA Attached ----------------------------------

Thanks
PPN

--
My life has changed. What about yours?
Log on to the new Indiatimes Mail and Live out of the Inbox!
-------------- next part --------------
[root at localhost wpa_supplicant-0.5.8]# wpa_supplicant -Dmadwifi -iath0 -c /home/prashant/authenticator/wpa_supplicant-0.5.8/wpa_supplicant.conf -ddd
Initializing interface 'ath0' conf '/home/prashant/authenticator/wpa_supplicant-0.5.8/wpa_supplicant.conf' driver 'madwifi' ctrl_interface 'N/A' bridge 'N/A'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=13 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0f:b5:83:b9:c1
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Added interface ath0
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 335 bytes of scan results (1 BSSes)
Scan results: 1
No suitable AP found.
Setting scan request: 0 sec 0 usec
No enabled networks - do not scan
State: SCANNING -> INACTIVE
-------------- next part --------------
Also ifconfig2.txt and iwconfig2.txt in machine 6
-------------------------------------

[root at localhost ~]# hostapd -Kt -ddd /home/prashant/authenticator/hostapd-0.5.8/hostapd_EAP.conf
Configuration file: /home/prashant/authenticator/hostapd-0.5.8/hostapd_EAP.conf
1192097005.053996: ctrl_interface_group=0
1192097005.054215: eapol_version=1
Configure bridge br0 for EAPOL traffic.
1192097005.079449: madwifi_set_iface_flags: dev_up=0
madwifi_set_privacy: enabled=0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
1192097005.079635: SIOCGIWRANGE: WE(compiled)=20 WE(source)=13 enc_capa=0xf
1192097005.079677: eth1: IEEE 802.11 Fetching hardware channel/rate support not supported.
1192097005.079711: Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
1192097005.079886: madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff reason 3)
Could not connect to kernel driver.
1192097005.079912: Deauthenticate all stations
madwifi_set_privacy: enabled=0
Mode: IEEE 802.11g  Channel: 11  Frequency: 0 MHz
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=0
madwifi_set_privacy: enabled=1
Using interface eth1 with hwaddr 00:14:78:8f:5e:49 and ssid 'SEMCO_AP'
1192097005.080235: SSID - hexdump_ascii(len=8):
     53 45 4d 43 4f 5f 41 50                           SEMCO_AP
1192097005.080268: PSK (ASCII passphrase) - hexdump_ascii(len=12):
     44 45 41 44 2d 42 45 45 46 2d 41 41               DEAD-BEEF-AA
1192097005.091554: PSK (from passphrase) - hexdump(len=32): 3a 3e 07 89 3a 02 ef 41 71 0a 12 bd f3 ac 21 4f 83 bb 70 8c 33 75 77 51 68 a7 9c fd 66 e4 e1 35
1192097005.091639: eth1: RADIUS Authentication server 192.168.1.151:1812
1192097005.091818: eth1: RADIUS Accounting server 192.168.1.151:1813
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x3
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA=0x1
madwifi_set_privacy: enabled=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
IEEE 802.1X: New default WEP key index 2
1192097005.093882: IEEE 802.1X: New default WEP key - hexdump(len=5): 2e 77 6a c6 ce
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=2
1192097005.096184: WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
1192097005.096208: GMK - hexdump(len=32): f1 eb 7a 23 c3 d7 63 9a 49 24 5b 60 d0 28 63 05 de 24 1f 9b 48 23 cd 9e df 87 ae 71 28 e5 2b 71
1192097005.096232: GTK - hexdump(len=32): e7 36 60 1f 8c e8 87 76 bf f2 a1 36 38 ba ae 22 2b 6c ff f4 b4 3e f3 ab d9 07 3c db d1 54 c2 b3
1192097005.096255: WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
1192097005.096356: eth1: RADIUS Sending RADIUS message to accounting server
RADIUS message: code=4 (Accounting-Request) identifier=0 length=72
   Attribute 40 (Acct-Status-Type) length=6
      Value: 7
   Attribute 45 (Acct-Authentic) length=6
      Value: 1
   Attribute 4 (NAS-IP-Address) length=6
      Value: 192.168.1.151
   Attribute 30 (Called-Station-Id) length=28
      Value: '00-14-78-8F-5E-49:SEMCO_AP'
   Attribute 49 (Acct-Terminate-Cause) length=6
      Value: 11
1192097005.096606: eth1: RADIUS Next RADIUS client retransmit in 3 seconds

1192097005.096641: Using existing control interface directory.
1192097005.096858: madwifi_set_iface_flags: dev_up=1
1192097005.105047: eth1: Setup of interface done.
l2_packet_receive - recvfrom: Network is down
l2_packet_receive - recvfrom: Network is down
recv[RADIUS]: Connection refused
1192097008.099549: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097008.099637: eth1: RADIUS Next RADIUS client retransmit in 6 seconds
recv[RADIUS]: Connection refused
Wireless event: cmd=0x8b19 len=8
1192097014.103439: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097014.103534: eth1: RADIUS Next RADIUS client retransmit in 12 seconds
recv[RADIUS]: Connection refused
1192097026.107064: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097026.107128: eth1: RADIUS Next RADIUS client retransmit in 24 seconds
recv[RADIUS]: Connection refused
1192097050.110333: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097050.110421: eth1: RADIUS Next RADIUS client retransmit in 48 seconds
recv[RADIUS]: Connection refused
1192097098.112799: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097098.112875: eth1: RADIUS Next RADIUS client retransmit in 96 seconds
recv[RADIUS]: Connection refused
1192097194.113768: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097194.113851: eth1: RADIUS Next RADIUS client retransmit in 120 seconds
recv[RADIUS]: Connection refused
Wireless event: cmd=0x8c03 len=20
1192097293.010561: eth1: STA 00:0f:b5:83:b9:c1 IEEE 802.11: associated
  New STA
No WPA/RSN information element for station!?
IEEE 802.1X: New default WEP key index 3
1192097305.095483: IEEE 802.1X: New default WEP key - hexdump(len=5): d4 b0 34 ce 00
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=3
Wireless event: cmd=0x8c02 len=95
Custom wireless event: 'STA-TRAFFIC-STAT
mac=00:0f:b5:83:b9:c1
rx_packets=0
rx_bytes=0
tx_packets=0
tx_bytes=0
'
Wireless event: cmd=0x8c04 len=20
1192097306.199023: eth1: STA 00:0f:b5:83:b9:c1 IEEE 802.11: disassociated
1192097314.113975: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097314.114079: eth1: RADIUS Next RADIUS client retransmit in 120 seconds
recv[RADIUS]: Connection refused
1192097434.114158: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
1192097434.114278: eth1: RADIUS Next RADIUS client retransmit in 120 seconds
recv[RADIUS]: Connection refused
1192097554.114532: eth1: STA 00:00:00:00:00:00 RADIUS: Resending RADIUS message (id=0)
Removing un-ACKed RADIUS message due to too many failed retransmit attempts
recv[RADIUS]: Connection refused
IEEE 802.1X: New default WEP key index 1
1192097605.098244: IEEE 802.1X: New default WEP key - hexdump(len=5): 6f b3 78 ed 2b
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=1

IEEE 802.1X: New default WEP key index 2
1192097905.100837: IEEE 802.1X: New default WEP key - hexdump(len=5): be 96 08 f4 8d
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=2
IEEE 802.1X: New default WEP key index 3
1192098205.103296: IEEE 802.1X: New default WEP key - hexdump(len=5): bb 28 82 0e 05
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=3
Signal 2 received - terminating
1192098283.560415: Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
1192098283.560453: Deauthenticate all stations
1192098283.560603: eth1: RADIUS Sending RADIUS message to accounting server
RADIUS message: code=4 (Accounting-Request) identifier=1 length=72
   Attribute 40 (Acct-Status-Type) length=6
      Value: 8
   Attribute 45 (Acct-Authentic) length=6
      Value: 1
   Attribute 4 (NAS-IP-Address) length=6
      Value: 192.168.1.151
   Attribute 30 (Called-Station-Id) length=28
      Value: '00-14-78-8F-5E-49:SEMCO_AP'
   Attribute 49 (Acct-Terminate-Cause) length=6
      Value: 11
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
1192098283.560846: madwifi_set_iface_flags: dev_up=0


More information about the HostAP mailing list