wpa supplicant fails 4-way handshake

Ken Koster ken.koster at elektrobit.com
Tue Jun 17 19:52:08 EDT 2008


I'm having problems connecting to the guest network here at work.

Immediately after the access points have been powered up I have no trouble
connecting and authenticating.  However within a period of 1-7 days both my 
Linux laptop (Thinkpad T60p with Intel 3945 chipset) and my Nokia N-800 will
suddenly no longer be able to connect while my co-workers Dell laptops 
running windows connect just fine.  Our IT guy says 'hey it works for windows
so it must be Linux' and I'm stuck waiting for the access points to be reset
so I can get back on for a couple of days.

We have two access points with the same ESSID one on ch-1 and the other
on ch-11.  Both are quite strong,  -60dbm to -65dbm.

I've tried 0.5.10, 0.6.3 and the latest GIT repository, they all behave the
same.

Kernel 2.6.25,  Intel iwl3945 driver, OpenSuse 10.3, Knetworkmanager 0.2,
networkmanager 0.6.5-37

The error seems to be related to the 4-way handshake, I get "WPA: 4-Way 
Handshake failed - pre-shared key may be incorrect"  just before
it disconnects.

Attached is a partial log showing the failure, I can make a full log 
available if it is needed.

Any help would be appreciated.


Running  ./wpa_supplicant -c wpa_supplicant.conf -i wlan0 -D wext -ddd 
--------- eb.log--------
...
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1d:7e:9c:ad:c8
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1d:7e:9c:ad:c8
No keys have been configured - skip key clearing
Associated with 00:1d:7e:9c:ad:c8
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:1d:7e:9c:ad:c8
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 22 81 eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 22 81
  key_nonce - hexdump(len=32): eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 22 81 eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:9c:ad:c8 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 89 b5 81 bb 0f 7b 47 95 8b 39 61 21 c4 88 42 0f 99 f0 c0 84 54 bc 14 ec d2 b1 20 e7 1e 8a 4f 06
WPA: PTK derivation - A1=00:13:02:71:59:e5 A2=00:1d:7e:9c:ad:c8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 22 81 89 b5 81 bb 0f 7b 47 95 8b 39 61 21 c4 88 42 0f 99 f0 c0 84 54 bc 14 ec d2 b1 20 e7 1e 8a 4f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 08 82 53 e5 16 26 73 4f ee d3 48 f9 ba e1 29 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:1d:7e:9c:ad:c8
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 22 82 eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 22 82
  key_nonce - hexdump(len=32): eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 22 82 eb c0 49 ae 9f 84 1d 12 53 88 f1 b6 47 cc 05 9a bb 50 99 be 2f 14 2d e2 e3 18 01 86 17 5c 55 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:9c:ad:c8 (ver=1)
WPA: PTK derivation - A1=00:13:02:71:59:e5 A2=00:1d:7e:9c:ad:c8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 22 82 89 b5 81 bb 0f 7b 47 95 8b 39 61 21 c4 88 42 0f 99 f0 c0 84 54 bc 14 ec d2 b1 20 e7 1e 8a 4f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 42 6d 1d 71 01 c6 1e 05 a9 bd 67 94 06 5b 01 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:1d:7e:9c:ad:c8 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED


-- 
Ken Koster
Senior Software Engineer

EB - Discover the Experience 
22745 29th Dr. SE, Suite 200
Bothell, WA 98021, USA 
Tel: +1 425-444-2691 
Fax: +1 425-686-3102 
ken.koster at elektrobit.com 
www.elektrobit.com


----------------------------------------------------------------
Please note: This e-mail may contain confidential information
intended solely for the addressee. If you have received this
e-mail in error, please do not disclose it to anyone, notify
the sender promptly, and delete the message from your system.
Thank you.



More information about the HostAP mailing list