Hostapd WPA2 and XP Supplicant

Andrew Tarabaras atp3 at optusnet.com.au
Sun Jul 6 21:39:41 EDT 2008


Hi,
  I have 1 last issue with hostapd. All works well except Windows XP.
I have 4 clients to test with.
1. WPA Supplicant linux
2. Nokia N95
3  Vista's Supplicant
4. And XP sp3 wpa supplicant.

They all connect ok but WinXP keeps disconnecting and re authenticating 
. Vista is OK so I sure the problem is in XP. Windows XP is no help in 
the debugging of this problem and tells me nothing. If I keep the 
interface busy with data it stays up. A few seconds of quiet on the 
interface it starts to disconnecting and re authenticating again.

Heres what I get from Hostapd.
I only included 2 authentications to save room.

STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:14:a5:ce:44:5d auth_alg=0 auth_transaction=1 
status_code=0 wep=0
   New STA
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authentication OK (open system)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-AUTHENTICATE.indication(00:14:a5:ce:44:5d, OPEN_SYSTEM)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
authentication reply: STA=00:14:a5:ce:44:5d auth_alg=0 
auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:14:a5:ce:44:5d capab_info=0x431 
listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:40:96 
len=6)
unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
WME IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WME IE: OUI 00:50:f2  OUI type 2  OUI sub-type 0  version 1
   new AID 1
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: associated (aid 1, accounting 
session 48716CF9-00000002)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-ASSOCIATE.indication(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 1 notification
wlan0: STA 00:14:a5:ce:44:5d WPA: start authentication
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITIALIZE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: unauthorizing port
WPA: 00:14:a5:ce:44:5d WPA_PTK_GROUP entering state IDLE
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITPSK
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKSTART
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 
kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 121 bytes from 00:14:a5:ce:44:5d
    IEEE 802.1X: version=1 type=3 length=117
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:17:9a:77:1d:cf A2=00:14:a5:ce:44:5d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=1 mic=1 ack=1 install=1 pairwise=8 
kde_len=62 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=62): [REMOVED]
IEEE 802.1X: 99 bytes from 00:14:a5:ce:44:5d
    IEEE 802.1X: version=1 type=3 length=95
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITDONE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: authorizing port
wlan0: STA 00:14:a5:ce:44:5d WPA: pairwise key handshake completed (RSN)


**** THIS IS WHERE IT HAPPENS ******************************************

unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
STA 00:14:a5:ce:44:5d sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
STA 00:14:a5:ce:44:5d sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:14:a5:ce:44:5d auth_alg=0 auth_transaction=1 
status_code=0 wep=0
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authentication OK (open system)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 0 notification
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-AUTHENTICATE.indication(00:14:a5:ce:44:5d, OPEN_SYSTEM)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
authentication reply: STA=00:14:a5:ce:44:5d auth_alg=0 
auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:14:a5:ce:44:5d capab_info=0x431 
listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:40:96 
len=6)
unknown vendor specific information element ignored (vendor OUI 00:10:18 
len=9)
WME IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WME IE: OUI 00:50:f2  OUI type 2  OUI sub-type 0  version 1
   old AID 1
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: associated (aid 1, accounting 
session 48716CF9-00000003)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-ASSOCIATE.indication(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d MLME: 
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 1 notification
wlan0: STA 00:14:a5:ce:44:5d WPA: event 4 notification
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITPSK
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKSTART
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 
kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 121 bytes from 00:14:a5:ce:44:5d
    IEEE 802.1X: version=1 type=3 length=117
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:17:9a:77:1d:cf A2=00:14:a5:ce:44:5d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=1 mic=1 ack=1 install=1 pairwise=8 
kde_len=62 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=62): [REMOVED]
IEEE 802.1X: 99 bytes from 00:14:a5:ce:44:5d
    IEEE 802.1X: version=1 type=3 length=95
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITDONE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: authorizing port
wlan0: STA 00:14:a5:ce:44:5d WPA: pairwise key handshake completed (RSN)


Thanks
Andrew


More information about the HostAP mailing list