wpa_supplicant not working with speedport w303 accesspoint

Jan Marc Hoffmann exelnet at exelnet.de
Thu Feb 26 09:18:06 EST 2009


Doh, that was a stupid fault of mine. The conection process works fine 
now, but the connection isnt working. I tried to get a lease with 
"dhclient eth0" but dhcp wont revceive any ip. All broadcasts wont get 
answered. Any idea whats wrong? Is this a dhclient problem or is it a 
wpa_supplicant problem? Adding manually an ip with "ifconfig eth0 
192.168.0.11" wont help either...


The wpa_supplicant auth log:

Initializing interface 'eth0' conf 
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 
'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> 
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' 

ctrl_interface='/var/run/wpa_supplicant' 

Line: 11 - start of a new network block 

ssid - hexdump_ascii(len=6): 

      6d 79 77 6c 61 6e                                 mywlan 

scan_ssid=1 (0x1) 

proto: 0x3 

key_mgmt: 0x2 

pairwise: 0x18 

group: 0x18 

PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] 

PSK (from passphrase) - hexdump(len=32): [REMOVED] 

Priority group 0 

    id=0 ssid='mywlan' 

SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf 

   capabilities: key_mgmt 0xf enc 0xf flags 0x0 

WEXT: Operstate: linkmode=1, operstate=5 

Own MAC address: 00:0e:35:b9:80:d9 

wpa_driver_wext_set_wpa 

wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 

wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 

wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 

wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 

wpa_driver_wext_set_countermeasures 

wpa_driver_wext_set_drop_unencrypted 

RSN: flushing PMKID list in the driver 

Setting scan request: 0 sec 100000 usec 

EAPOL: SUPP_PAE entering state DISCONNECTED 

EAPOL: KEY_RX entering state NO_KEY_RECEIVE 

EAPOL: SUPP_BE entering state INITIALIZE 

EAP: EAP entering state DISABLED 

Added interface eth0 

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 

RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added 

Wireless event: cmd=0x8b06 len=8 

Trying to get current scan results first without requesting a new scan 
to speed up initial association
Received 3759 bytes of scan results (14 BSSes) 

CTRL-EVENT-SCAN-RESULTS 

Selecting BSS from priority group 0 

Try to find WPA-enabled AP 

0: 00:1c:4a:ca:50:75 ssid='FRITZ!Box Fon WLAN 7113' wpa_ie_len=24 
rsn_ie_len=20 caps=0x11
    skip - SSID mismatch 

1: 00:23:08:0b:26:72 ssid='mywlan' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 

    selected based on RSN IE 

    selected WPA AP 00:23:08:0b:26:72 ssid='mywlan' 

Trying to associate with 00:23:08:0b:26:72 (SSID='mywlan' freq=2452 MHz) 

Cancelling scan request 

WPA: clearing own WPA/RSN IE 

Automatic auth_alg selection: 0x1 

RSN: using IEEE 802.11i/D9.0 

WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 

WPA: clearing AP WPA IE 

WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP 

WPA: using PTK CCMP 

WPA: using KEY_MGMT WPA-PSK 

WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing 

wpa_driver_wext_set_drop_unencrypted 

State: DISCONNECTED -> ASSOCIATING 

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 

WEXT: Operstate: linkmode=-1, operstate=5 

wpa_driver_wext_associate 

wpa_driver_wext_set_psk 

Setting authentication timeout: 10 sec 0 usec 

EAPOL: External notification - EAP success=0 

EAPOL: External notification - EAP fail=0 

EAPOL: External notification - portControl=Auto 

RSN: Ignored PMKID candidate without preauth flag 

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 

RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added 

Wireless event: cmd=0x8b06 len=8 

RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 

RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added 

Wireless event: cmd=0x8b04 len=12 

RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 

RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added 

Wireless event: cmd=0x8b15 len=20 

Wireless event: new AP: 00:23:08:0b:26:72 

State: ASSOCIATING -> ASSOCIATED 

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 

WEXT: Operstate: linkmode=-1, operstate=5 

Associated to a new BSS: BSSID=00:23:08:0b:26:72 

No keys have been configured - skip key clearing 

Associated with 00:23:08:0b:26:72 

WPA: Association event - clear replay counter 

WPA: Clear old PTK 

EAPOL: External notification - portEnabled=0 

EAPOL: External notification - portValid=0 

EAPOL: External notification - EAP success=0 

EAPOL: External notification - portEnabled=1 

EAPOL: SUPP_PAE entering state CONNECTING 

EAPOL: SUPP_BE entering state IDLE 

Setting authentication timeout: 10 sec 0 usec 

Cancelling scan request 

RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 

RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added 

RX EAPOL from 00:23:08:0b:26:72 

RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 01 d9 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 5b 9d 2b 3f fc b4 06 43 
f8 6d 61 80 9b 24 37 4c a5 1a b0 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 ac 6c bc 71 c7 
2a df a6 3c 9f 71 e8 39 9b e1 07
Setting authentication timeout: 10 sec 0 usec 

IEEE 802.1X RX: version=1 type=3 length=117 

   EAPOL-Key type=2 

   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) 

   key_length=16 key_data_length=22 

   replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 d9 

   key_nonce - hexdump(len=32): 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 
5b 9d 2b 3f fc b4 06 43 f8 6d 61 80 9b 24 37 4c a5 1a b0
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 

   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 

   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
00 00 00 00 01 d9 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 5b 9d 2b 3f fc 
b4 06 43 f8 6d 61 80 9b 24 37 4c a5 1a b0 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 ac 6c 
bc 71 c7 2a df a6 3c 9f 71 e8 39 9b e1 07
State: ASSOCIATED -> 4WAY_HANDSHAKE 

WPA: RX message 1 of 4-Way Handshake from 00:23:08:0b:26:72 (ver=2) 

RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 ac 6c bc 71 
c7 2a df a6 3c 9f 71 e8 39 9b e1 07
RSN: PMKID from Authenticator - hexdump(len=16): ac 6c bc 71 c7 2a df a6 
3c 9f 71 e8 39 9b e1 07
RSN: no matching PMKID found 

WPA: Renewed SNonce - hexdump(len=32): 7d 58 1e b9 d8 d5 4d 99 88 02 f9 
87 18 65 f3 7a c4 7a 63 ed cf bd b2 4c e5 76 78 db 7a 7d 2b f8
WPA: PTK derivation - A1=00:0e:35:b9:80:d9 A2=00:23:08:0b:26:72 

WPA: PMK - hexdump(len=32): [REMOVED] 

WPA: PTK - hexdump(len=64): [REMOVED] 

WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4 

WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
00 00 00 00 01 d9 7d 58 1e b9 d8 d5 4d 99 88 02 f9 87 18 65 f3 7a c4 7a 
63 ed cf bd b2 4c e5 76 78 db 7a 7d 2b f8 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5a 5a 
9b c1 67 25 0a 39 96 8b 4e 04 00 0b 68 9e 00 16 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:08:0b:26:72 

RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 
00 01 da 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 5b 9d 2b 3f fc b4 06 43 
f8 6d 61 80 9b 24 37 4c a5 1a b0 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 7e a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 23 48 0b ea 
1a 0b c8 3c d9 1f 1e 5d e0 39 f3 00 38 1e 2a dc ba 7b c7 87 9c c2 3a 5c 
e9 84 52 fc 69 ed 02 cb e9 95 11 4f cd 38 b9 c0 81 b9 0f e7 3c 0e 4c a6 
38 1d 28 8d a8 a9 13 b0 56 40 59 8b 06 b6 2a 61 24 af db 1b fe 

IEEE 802.1X RX: version=1 type=3 length=151 

   EAPOL-Key type=2 

   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC 
Secure Encr)
   key_length=16 key_data_length=56 

   replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 da 

   key_nonce - hexdump(len=32): 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 
5b 9d 2b 3f fc b4 06 43 f8 6d 61 80 9b 24 37 4c a5 1a b0
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00
   key_rsc - hexdump(len=8): 7e a3 00 00 00 00 00 00 

   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 

   key_mic - hexdump(len=16): 16 23 48 0b ea 1a 0b c8 3c d9 1f 1e 5d e0 
39 f3
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 
00 00 00 00 01 da 2c d8 fd e5 33 23 19 c2 0a c5 bc f6 f3 5b 9d 2b 3f fc 
b4 06 43 f8 6d 61 80 9b 24 37 4c a5 1a b0 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 7e a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 23 
48 0b ea 1a 0b c8 3c d9 1f 1e 5d e0 39 f3 00 38 1e 2a dc ba 7b c7 87 9c 
c2 3a 5c e9 84 52 fc 69 ed 02 cb e9 95 11 4f cd 38 b9 c0 81 b9 0f e7 3c 
0e 4c a6 38 1d 28 8d a8 a9 13 b0 56 40 59 8b 06 b6 2a 61 24 af db 1b fe 

RSN: encrypted key data - hexdump(len=56): 1e 2a dc ba 7b c7 87 9c c2 3a 
5c e9 84 52 fc 69 ed 02 cb e9 95 11 4f cd 38 b9 c0 81 b9 0f e7 3c 0e 4c 
a6 38 1d 28 8d a8 a9 13 b0 56 40 59 8b 06 b6 2a 61 24 af db 1b fe 

WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] 

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE 

WPA: RX message 3 of 4-Way Handshake from 00:23:08:0b:26:72 (ver=2) 

WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 03 00 ce 4b c4 87 d0 c9 
11 d7 30 fa 84 36 75 a4 a7 4c dd 00 

WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 
00 00 00 01 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a 0f 64 
fc 8d d9 f8 8a 12 68 c4 4f a6 26 b8 d4 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=3 tx=0 len=16).
WPA: RSC - hexdump(len=6): 7e a3 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=3 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:23:08:0b:26:72 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:08:0b:26:72 completed (auth) 
[id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick


The iwconfig log:

eth0      IEEE 802.11g  ESSID:"mywlan"
           Mode:Managed  Frequency:2.452 GHz  Access Point: 
00:23:08:0B:26:72
           Bit Rate:54 Mb/s   Tx-Power=20 dBm   Sensitivity=8/0
           Retry limit:7   RTS thr:off   Fragment thr:off
           Power Management:off
           Link Quality=92/100  Signal level=-36 dBm  Noise level=-89 dBm
           Rx invalid nwid:0  Rx invalid crypt:1393  Rx invalid frag:0
           Tx excessive retries:0  Invalid misc:5   Missed beacon:1


The ifconfig log:

eth0      Link encap:Ethernet  Hardware Adresse 00:0e:35:b9:80:d9
           inet6-Adresse: fe80::20e:35ff:feb9:80d9/64 
Gültigkeitsbereich:Verbindung
           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
           RX packets:33 errors:1657 dropped:1662 overruns:0 frame:0
           TX packets:9 errors:0 dropped:5 overruns:0 carrier:0
           Kollisionen:0 Sendewarteschlangenlänge:1000
           RX bytes:137912 (137.9 KB)  TX bytes:58817 (58.8 KB)
           Interrupt:17 Basisadresse:0x4000 Speicher:c820b000-c820bfff


thanks
Jan Marc Hoffmann

Jouni Malinen schrieb:
> On Thu, Feb 26, 2009 at 12:07:21PM +0100, Jan Marc Hoffmann wrote:
> 
>> i ve been following your tip and recorded the communication between the
>> ap and the client. Broadcasts and other communications are filtered out.
>>
>> http://user.cs.tu-berlin.de/~exelnet/wlan-capture
> 
> Thanks. It looks like the driver is disconnecting pretty much
> immediately after the association. Do you happen to be running
> NetworkManager? It can get very unhappy about network connections that
> it does not know about and ask the driver to disconnect.. I would
> suggest a test with NetworkManager (or any other program that could try
> to manage the network) to be disabled when running wpa_supplicant.
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3254 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20090226/2ef8c0e0/attachment-0001.bin 


More information about the HostAP mailing list