Hostapd and wpa_supplicant configuration -Failure - Invalid MAC_P - supplicant used different EAP type 47

jackbaker jackbaker at voila.fr
Wed Oct 22 10:09:06 EDT 2008


Hello,

Please, could you help me. 

Hostapd is on 0.5.x

I want to use hostapd and wpa_supplicant to sercure the access to a
Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
the Access Point and wa_supplicant in the client laptop. 

I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"


I want to know il my configuration is valid or not.
If it is valid, what is the problem? Is there a solution.

Thanks.

Jack





I used these
configurations :

* The file .config of the hostapd :
_________________________________________
CONFIG_DRIVER_MADWIFI=y
CFLAG += -I/usr/......#path to madwifi src
CONFIG_EAP=y
CONFIG_EAP_PSK=y
CONFIG_RADIUS_SERVER=y
_________________________________________

* The file hostapd.conf :
_________________________________________

interface=ath1
driver=madwifi
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=test
ath_algs=1
ignore_broadcast_ssid=0

ieee8021x=1
eapol_key_index_workaround=0
eap_server=1

wpa_pairwise=TKIP
own_ip_addr=10.0.0.20
pa=1
wpa_key_management=WPA-EAP





_________________________________________

* The file hostapd.eap_user.conf :
_________________________________________


"psk user"  PSK   "unknown"
"eap_psk_user"    PSK   0123456789abcdef0123456789abcdef
"eap_psk_user at example.com"   PSK   0123456789abcdef0123456789abcdef




_________________________________________

* The file madwifi.conf :
_________________________________________



interface=ath1


bridge=br0


driver=madwifi


logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0

dump_file=/tmp/hostapd.dump


ssid=wpa-test


eap_server=0
own_ip_addr=127.0.0.1




_________________________________________

* The file .config of the wpa_supplicant :
_________________________________________
CONFIG_DRIVER_MADWIFI=y
CFLAG += -I/usr/......#path to madwifi src
CONFIG_IEEE8021X_EAPOL=y
CONFIG_EAP_PSK=y
CONFIG_CTRL_IFACE=y
CONFIG_BACKEND=file
CONFIG_PEERKEY=y
_________________________________________

* The file wpa_supplicant.conf of the :
_________________________________________

ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=1

network={
      ssid="test"
      key_mgmt=WPA-EAP
      eap=PSK
      identity="eap_psk_user"
      eappsk=0123456789abcdef0123456789abcdef
      nai="eap_psk_user at example.com"
}


_________________________________________

When running hostapd, this message is shown (access point) :

_________________________________________
...
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
...
could not connect to kernel driver.
....
l2_packet_receive - recvfrom: Network is down
_________________________________________

And when running the wpa_supplicant, the hostapd show : 
_________________________________________

IEEE 802.1X: 4 bytes from 00:20:a6:61:07:50

   IEEE 802.1X: version=1 type=1 length=0

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAPOL-Start from STA

ath1: STA 00:20:a6:61:07:50 WPA: event 5 notification

WPA: 00:20:a6:61:07:50 WPA_PTK entering state AUTHENTICATION2

IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state ABORTING

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state INITIALIZE

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: aborting authentication

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state RESTART

IEEE 802.1X: Integrated EAP server in use - do not generate EAP-Request/Identity

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

EAP: EAP entering state INITIALIZE

EAP: EAP entering state SELECT_ACTION

EAP: getDecision: no identity known yet -> CONTINUE

EAP: EAP entering state PROPOSE_METHOD

EAP: getNextMethod: vendor 0 type 1

EAP: EAP entering state METHOD_REQUEST

EAP: building EAP-Request: Identifier 236

EAP: EAP entering state SEND_REQUEST

EAP: eapReqData -> EAPOL - hexdump(len=5): 01 ec 00 05 01

EAP: EAP entering state IDLE

IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state CONNECTING

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state AUTHENTICATING

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST

IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 236)

TX EAPOL - hexdump(len=23): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 05 01 ec 00 05 01

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 21 bytes from 00:20:a6:61:07:50

   IEEE 802.1X: version=1 type=0 length=17

   EAP: code=2 identifier=236 length=17 (response)

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=236 len=17) from STA: EAP Response-Identity (1)

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: STA identity 'eap_psk_user'

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE

EAP: EAP-Response received - hexdump(len=17): 02 ec 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

EAP: EAP entering state RECEIVED

EAP: parseEapResp: rxResp=1 respId=236 respMethod=1 respVendor=0 respVendorMethod=0

EAP: EAP entering state INTEGRITY_CHECK

EAP: EAP entering state METHOD_RESPONSE

EAP-Identity: Peer identity - hexdump_ascii(len=12):

     65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user

EAP: EAP entering state SELECT_ACTION

EAP: getDecision: another method available -> CONTINUE

EAP: EAP entering state PROPOSE_METHOD

EAP: getNextMethod: vendor 0 type 47

EAP: EAP entering state METHOD_REQUEST

EAP: building EAP-Request: Identifier 237

EAP-PSK: PSK-1 (sending)

EAP-PSK: RAND_S (server rand) - hexdump(len=16): 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7

EAP: EAP entering state SEND_REQUEST

EAP: eapReqData -> EAPOL - hexdump(len=29): 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64

EAP: EAP entering state IDLE

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST

IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)

TX EAPOL - hexdump(len=47): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 1d 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 82 bytes from 00:20:a6:61:07:50

   IEEE 802.1X: version=1 type=0 length=78

   EAP: code=2 identifier=237 length=78 (response)

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=237 len=78) from STA: EAP Response-PSK (47)

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE

EAP: EAP-Response received - hexdump(len=78): 02 ed 00 4e 2f 40 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

EAP: EAP entering state RECEIVED

EAP: parseEapResp: rxResp=1 respId=237 respMethod=47 respVendor=0 respVendorMethod=0

EAP: EAP entering state INTEGRITY_CHECK

EAP-PSK: received frame: T=1

EAP: EAP entering state METHOD_RESPONSE

EAP-PSK: Received PSK-2

EAP-PSK: ID_P - hexdump_ascii(len=24):

     65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61   eap_psk_user at exa

     6d 70 6c 65 2e 63 6f 6d                           mple.com

psk : �d��g��] : 17

EAP-PSK: AK - hexdump(len=16): [REMOVED]

EAP-PSK: KDK - hexdump(len=16): [REMOVED]

EAP-PSK: RAND_P (client rand) - hexdump(len=16): 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8

EAP-PSK: MAC_P - hexdump(len=16): 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66

EAP-PSK: Invalid MAC_P

EAP-PSK: Expected MAC_P - hexdump(len=16): fb 91 91 fb 90 4b f1 23 aa 16 86 2a e8 a5 48 15

EAP: EAP entering state SELECT_ACTION

EAP: getDecision: method failed -> FAILURE

EAP: EAP entering state FAILURE

EAP: Building EAP-Failure (id=237)

EAP: eapReqData -> EAPOL - hexdump(len=4): 04 ed 00 04

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state FAIL

IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)

TX EAPOL - hexdump(len=22): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 04 04 ed 00 04

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state HELD

madwifi_set_sta_authorized: addr=00:20:a6:61:07:50 authorized=0

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: unauthorizing port

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: authentication failed - EAP type: 0 (Unknown)

ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: Supplicant used different EAP type: 47 (PSK)

IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE

Signal 2 received - terminating

ath1: STA 00:20:a6:61:07:50 MLME: MLME-DEAUTHENTICATE.indication(00:20:a6:61:07:50, 1)

ath1: STA 00:20:a6:61:07:50 MLME: MLME-DELETEKEYS.request(00:20:a6:61:07:50)

madwifi_del_key: addr=00:20:a6:61:07:50 key_idx=0

Removing station 00:20:a6:61:07:50

EAP: State machine removed

Flushing old station entries

madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3

Deauthenticate all stations

madwifi_set_privacy: enabled=0

madwifi_set_ieee8021x: enabled=0

madwifi_set_iface_flags: dev_up=0

_________________________________________



 the supplicant show :

_________________________________________



Selecting BSS from priority group 0
Try to find WPA-enabled AP

0: 00:20:a6:61:1c:da ssid='test' wpa_ie_len=24 rsn_ie_len=0 caps=0x11

   selected based on WPA IE

   selected WPA AP 00:20:a6:61:1c:da ssid='test'

Try to find non-WPA AP

Trying to associate with 00:20:a6:61:1c:da (SSID='test' freq=2417 MHz)

Cancelling scan request

WPA: clearing own WPA/RSN IE

Automatic auth_alg selection: 0x1

WPA: using IEEE 802.11i/D3.0

WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1

WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01

WPA: clearing AP RSN IE

WPA: using GTK TKIP

WPA: using PTK TKIP

WPA: using KEY_MGMT 802.1X

WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01

No keys have been configured - skip key clearing

wpa_driver_madwifi_set_drop_unencrypted: enabled=1

State: SCANNING -> ASSOCIATING

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)

WEXT: Operstate: linkmode=-1, operstate=5

wpa_driver_madwifi_associate

ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument

wpa_driver_madwifi_associate: SETMLME[ASSOC] failed

Association request to the driver failed

Setting authentication timeout: 5 sec 0 usec

EAPOL: External notification - portControl=Auto

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])

Wireless event: cmd=0x8b1a len=12

RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])

Wireless event: cmd=0x8b15 len=20

Wireless event: new AP: 00:20:a6:61:1c:da

State: ASSOCIATING -> ASSOCIATED

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)

WEXT: Operstate: linkmode=-1, operstate=5

Associated to a new BSS: BSSID=00:20:a6:61:1c:da

No keys have been configured - skip key clearing

Associated with 00:20:a6:61:1c:da

WPA: Association event - clear replay counter

EAPOL: External notification - portEnabled=0

EAPOL: External notification - portValid=0

EAPOL: External notification - portEnabled=1

EAPOL: SUPP_PAE entering state CONNECTING

EAPOL: SUPP_BE entering state IDLE

EAP: EAP entering state INITIALIZE

EAP: EAP entering state IDLE

Setting authentication timeout: 10 sec 0 usec

Cancelling scan request

RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])

RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added

RX EAPOL from 00:20:a6:61:1c:da

RX EAPOL - hexdump(len=9): 01 00 00 05 01 67 00 05 01

Setting authentication timeout: 70 sec 0 usec

EAPOL: Received EAP-Packet frame

EAPOL: SUPP_PAE entering state RESTART

EAP: EAP entering state INITIALIZE

EAP: EAP entering state IDLE

EAPOL: SUPP_PAE entering state AUTHENTICATING

EAPOL: SUPP_BE entering state REQUEST

EAPOL: getSuppRsp

EAP: EAP entering state RECEIVED

EAP: Received EAP-Request id=103 method=1 vendor=0 vendorMethod=0

EAP: EAP entering state IDENTITY

CTRL-EVENT-EAP-STARTED EAP authentication started

EAP: EAP-Request Identity data - hexdump_ascii(len=0):

EAP: using real identity - hexdump_ascii(len=12):

     65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user

EAP: EAP entering state SEND_RESPONSE

EAP: EAP entering state IDLE

EAPOL: SUPP_BE entering state RESPONSE

EAPOL: txSuppRsp

TX EAPOL: dst=00:20:a6:61:1c:da

TX EAPOL - hexdump(len=21): 01 00 00 11 02 67 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72

EAPOL: SUPP_BE entering state RECEIVE

RX EAPOL from 00:20:a6:61:1c:da

RX EAPOL - hexdump(len=33): 01 00 00 1d 01 68 00 1d 2f 00 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 68 6f 73 74 61 70 64

EAPOL: Received EAP-Packet frame

EAPOL: SUPP_BE entering state REQUEST

EAPOL: getSuppRsp

EAP: EAP entering state RECEIVED

EAP: Received EAP-Request id=104 method=47 vendor=0 vendorMethod=0

EAP: EAP entering state GET_METHOD

EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)

EAP-PSK: AK - hexdump(len=16): [REMOVED]

EAP-PSK: KDK - hexdump(len=16): [REMOVED]

CTRL-EVENT-EAP-METHOD EAP vendor 0 method 47 (PSK) selected

EAP: EAP entering state METHOD

EAP-PSK: in INIT state

EAP-PSK: Flags=0x0

EAP-PSK: RAND_S - hexdump(len=16): a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4

EAP-PSK: ID_S - hexdump_ascii(len=7):

     68 6f 73 74 61 70 64                              hostapd

EAP-PSK: RAND_P - hexdump(len=16): 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac

EAP-PSK: MAC_P - hexdump(len=16): 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25

EAP-PSK: ID_P - hexdump_ascii(len=24):

     65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61   eap_psk_user at exa

     6d 70 6c 65 2e 63 6f 6d                           mple.com

EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL

EAP: EAP entering state SEND_RESPONSE

EAP: EAP entering state IDLE

EAPOL: SUPP_BE entering state RESPONSE

EAPOL: txSuppRsp

TX EAPOL: dst=00:20:a6:61:1c:da

TX EAPOL - hexdump(len=82): 01 00 00 4e 02 68 00 4e 2f 40 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d

EAPOL: SUPP_BE entering state RECEIVE

RX EAPOL from 00:20:a6:61:1c:da

RX EAPOL - hexdump(len=8): 01 00 00 04 04 68 00 04

EAPOL: Received EAP-Packet frame

EAPOL: SUPP_BE entering state REQUEST

EAPOL: getSuppRsp

EAP: EAP entering state RECEIVED

EAP: Received EAP-Failure

EAP: EAP entering state FAILURE

CTRL-EVENT-EAP-FAILURE EAP authentication failed

EAPOL: SUPP_PAE entering state HELD

EAPOL: SUPP_BE entering state RECEIVE

EAPOL: SUPP_BE entering state FAIL

EAPOL: SUPP_BE entering state IDLE

EAPOL: startWhen --> 0

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])

Wireless event: cmd=0x8b15 len=20

Wireless event: new AP: 00:00:00:00:00:00

Setting scan request: 0 sec 100000 usec

Added BSSID 00:20:a6:61:1c:da into blacklist

CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys

wpa_driver_madwifi_del_key: keyidx=0

wpa_driver_madwifi_del_key: keyidx=1

wpa_driver_madwifi_del_key: keyidx=2

wpa_driver_madwifi_del_key: keyidx=3

wpa_driver_madwifi_del_key: keyidx=0

State: ASSOCIATED -> DISCONNECTED

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)

WEXT: Operstate: linkmode=-1, operstate=5

EAPOL: External notification - portEnabled=0

EAPOL: SUPP_PAE entering state DISCONNECTED

EAPOL: SUPP_BE entering state INITIALIZE

EAP: EAP entering state DISABLED

EAPOL: External notification - portValid=0

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])

RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added

State: DISCONNECTED -> SCANNING

Starting AP scan (broadcast SSID)

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])

Wireless event: cmd=0x8b1a len=8

CTRL-EVENT-TERMINATING - signal 2 received

Removing interface ath1

State: SCANNING -> DISCONNECTED

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)

WEXT: Operstate: linkmode=-1, operstate=5

No keys have been configured - skip key clearing

EAPOL: External notification - portEnabled=0

EAPOL: External notification - portValid=0

wpa_driver_madwifi_set_drop_unencrypted: enabled=0

wpa_driver_madwifi_set_countermeasures: enabled=0

No keys have been configured - skip key clearing

EAP: deinitialize previously used EAP method (47, PSK) at EAP deinit

Removed BSSID 00:20:a6:61:1c:da from blacklist (clear)


_________________________________________



Thanks Again





____________________________________________________

Voila vous offre 1 Go d’espace pour stocker et partager photos, vidéos, mp3 et autres documents ! http://www.voila.fr/Macle/




More information about the HostAP mailing list