wpa_supplicant receives dissociate event

Dan Williams dcbw at redhat.com
Thu May 21 10:45:47 EDT 2009


On Thu, 2009-05-21 at 11:27 +0530, Paresh Sawant wrote:
> I monitored traffic on wireshark, AP is not sending dissociate frame.
> It is the driver/card at wpa_supplicant end initiating the the
> dissociate. 
> 
> One observation is when i run command "iwconfig wlan0" while
> wpa_supplicant is running , i see the frequecy/channel varying. My AP
> works at channel 6 so i think station card should be tuned to same
> channel, but instead i see it changing continuosly.
> 
>  Is it a correct combination of wlan0 and wext to be used to make it
> work? or i should try madwifi instead?

ok, so then it's something in the driver.  Can you enable debugging
output from the driver to perhaps see what's going on here?

Dan


> 
> - Paresh
> 
> On Thu, May 21, 2009 at 12:51 AM, Dan Williams <dcbw at redhat.com>
> wrote:
>         On Wed, 2009-05-20 at 17:34 +0530, Paresh Sawant wrote:
>         >
>         > Hi,
>         >
>         > I've built wpa_supplicant on Linux (kernel
>         2.6.25-14.fc9.i686), with
>         > wext driver, and runing it on netgear wg311T(atheros
>         AR5212). I start
>         > the wpa_supplicant with -i wlan0 and -D wext, but it fails
>         to do the
>         > connection with WPA2-PSK configured AP. wireshark shows me
>         that it
>         > reaches till 2/4 of 4-way-hshake. But then it seems to
>         receive
>         > dissociate event from the hardware/driver. I'm passing
>         correct key for
>         > PSK auth.
>         
>         
>         You'll have to find out from the driver why the disassociation
>         is
>         happening.  It might also be triggered by the AP itself, so
>         you could
>         also sniff packets from the air to figure out if the AP has
>         disassociated you for some reason.
>         
>         Dan
>         
>         
>         > Following is the log message -
>         >
>         > /******************debug
>         > log****************************************************
>         >
>         > State: ASSOCIATED -> DISCONNECTED
>         > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>         > WEXT: Operstate: linkmode=-1, operstate=5
>         > EAPOL: External notification - portEnabled=0
>         > EAPOL: SUPP_PAE entering state DISCONNECTED
>         > EAPOL: SUPP_BE entering state INITIALIZE
>         > EAPOL: External notification - portValid=0
>         > EAPOL: External notification - EAP success=0
>         > RX EAPOL from 00:1d:7e:f4:d7:07
>         > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00
>         00 00 00 00
>         > 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71 55 8e e4
>         ef 5f ea
>         > 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00 00 00 00
>         00 00 00
>         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
>         ac 04 b0
>         > 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
>         > Setting authentication timeout: 10 sec 0 usec
>         > IEEE 802.1X RX: version=2 type=3 length=117
>         >   EAPOL-Key type=2
>         >   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
>         >   key_length=16 key_data_length=22
>         >   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
>         >   key_nonce - hexdump(len=32): fd cc 9e 98 1d 47 b3 25 9a 6d
>         8d fd 3d
>         > 71 55 8e e4 ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9
>         >   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         > 00 00
>         >   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>         >   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00
>         00
>         >   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00
>         00 00 00 00
>         > 00 00
>         > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a
>         00 10 00 00
>         > 00 00 00 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71
>         55 8e e4
>         > ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00
>         00 00 00
>         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd
>         14 00 0f
>         > ac 04 b0 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
>         > State: DISCONNECTED -> 4WAY_HANDSHAKE
>         > WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:f4:d7:07
>         (ver=2)
>         > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04
>         b0 2a ff fe
>         > db bc a9 c5 e2 9d 88 ae d1 df 84 ba
>         > RSN: PMKID from Authenticator - hexdump(len=16): b0 2a ff fe
>         db bc a9
>         > c5 e2 9d 88 ae d1 df 84 ba
>         > RSN: no matching PMKID found
>         > WPA: Renewed SNonce - hexdump(len=32): d8 f1 69 54 1a e7 9f
>         46 16 b2
>         > b4 97 00 4b 1f 35 52 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec
>         d9 bd
>         > WPA: PMK - hexdump(len=32): [REMOVED]
>         > WPA: PTK - hexdump(len=64): [REMOVED]
>         > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f
>         ac 02 01
>         > 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>         > WPA: Sending EAPOL-Key 2/4
>         > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a
>         00 00 00 00
>         > 00 00 00 00 00 00 d8 f1 69 54 1a e7 9f 46 16 b2 b4 97 00 4b
>         1f 35 52
>         > 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd 00 00 00 00 00
>         00 00 00
>         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         > 00 63 b4 56 74 f3 18 fc f5 14 f4 64 57 d3 4e 2e 84 00 16 30
>         14 01 00
>         > 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>         > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>         > Wireless event: cmd=0x8b15 len=20
>         > Wireless event: new AP: 00:00:00:00:00:00
>         > WPA: 4-Way Handshake failed - pre-shared key may be
>         incorrect
>         > Setting scan request: 0 sec 100000 usec
>         > Added BSSID 00:00:00:00:00:00 into blacklist
>         > CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
>         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
>         key_len=0
>         > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0
>         key_len=0
>         > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0
>         key_len=0
>         > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0
>         key_len=0
>         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
>         key_len=0
>         > ioctl[SIOCSIWENCODEEXT]: No such file or directory
>         > Driver did not support SIOCSIWENCODEEXT
>         > State: 4WAY_HANDSHAKE -> DISCONNECTED
>         >
>         > /***********************************************end************************************************************/
>         >
>         >
>         > Thanks
>         > - Paresh
>         
>         > _______________________________________________
>         > HostAP mailing list
>         > HostAP at lists.shmoo.com
>         > http://lists.shmoo.com/mailman/listinfo/hostap
>         
> 
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap



More information about the HostAP mailing list