wpa_supplicant receives dissociate event

Dan Williams dcbw at redhat.com
Wed May 20 15:21:35 EDT 2009


On Wed, 2009-05-20 at 17:34 +0530, Paresh Sawant wrote:
> 
> Hi, 
> 
> I've built wpa_supplicant on Linux (kernel 2.6.25-14.fc9.i686), with
> wext driver, and runing it on netgear wg311T(atheros AR5212). I start
> the wpa_supplicant with -i wlan0 and -D wext, but it fails to do the
> connection with WPA2-PSK configured AP. wireshark shows me that it
> reaches till 2/4 of 4-way-hshake. But then it seems to receive
> dissociate event from the hardware/driver. I'm passing correct key for
> PSK auth.

You'll have to find out from the driver why the disassociation is
happening.  It might also be triggered by the AP itself, so you could
also sniff packets from the air to figure out if the AP has
disassociated you for some reason.

Dan

> Following is the log message -
> 
> /******************debug
> log****************************************************
> 
> State: ASSOCIATED -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> RX EAPOL from 00:1d:7e:f4:d7:07
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71 55 8e e4 ef 5f ea
> 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 b0
> 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=2 type=3 length=117
>   EAPOL-Key type=2
>   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
>   key_length=16 key_data_length=22
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_nonce - hexdump(len=32): fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d
> 71 55 8e e4 ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
> 00 00 00 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71 55 8e e4
> ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> ac 04 b0 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> State: DISCONNECTED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:f4:d7:07 (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 b0 2a ff fe
> db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> RSN: PMKID from Authenticator - hexdump(len=16): b0 2a ff fe db bc a9
> c5 e2 9d 88 ae d1 df 84 ba
> RSN: no matching PMKID found
> WPA: Renewed SNonce - hexdump(len=32): d8 f1 69 54 1a e7 9f 46 16 b2
> b4 97 00 4b 1f 35 52 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
> 00 00 00 00 00 00 d8 f1 69 54 1a e7 9f 46 16 b2 b4 97 00 4b 1f 35 52
> 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 63 b4 56 74 f3 18 fc f5 14 f4 64 57 d3 4e 2e 84 00 16 30 14 01 00
> 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> WPA: 4-Way Handshake failed - pre-shared key may be incorrect
> Setting scan request: 0 sec 100000 usec
> Added BSSID 00:00:00:00:00:00 into blacklist
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> ioctl[SIOCSIWENCODEEXT]: No such file or directory
> Driver did not support SIOCSIWENCODEEXT
> State: 4WAY_HANDSHAKE -> DISCONNECTED
> 
> /***********************************************end************************************************************/
> 
> 
> Thanks
> - Paresh
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap



More information about the HostAP mailing list