Handshake fails with wpa2 enterprise

Frank Zambrini fzambrini at gmail.com
Wed Jun 23 13:23:12 EDT 2010


Long story short, I was able to connect to my university's wpa2 
enterprise network using wpa_supplicant with a configuration file I 
found somewhere on the Internet (made the configuration file about 7 
months ago). About two weeks ago my hard drive was corrupted and I lost 
everything including my wpa_supplicant.conf file. After reinstalling the 
same operating system (puppy linux), and using the same ssl certificate 
I am unable to connect to the same network. I have tried every 
configuration I for wpa enterprise (peap) that I could find (including 
the one from the man page and one made by my university) but I still 
keep getting the same error when attempting the 4way handshake. It keeps 
repeating until I kill wpa_supplicant.

Does anyone know what the culprit could be? Any help would be GREATLY 
appreciated.

State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1a:6c:3c:37:c2 (ver=1)
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:1a:6c:3c:37:c2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 
00 01 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08 6a a9 2a c8 68 0c 91 e7 0a 
41 06 f4 1e f3 c0 09 8e 93 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
   EAPOL-Key type=254
   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
   key_length=32 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08 
6a a9 2a c8 68 0c 91 e7 0a 41 06 f4 1e f3 c0 09 8e 93 8d
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 
00 00 00 00 01 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08 6a a9 2a c8 68 0c 
91 e7 0a 41 06 f4 1e f3 c0 09 8e 93 8d 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1a:6c:3c:37:c2 (ver=1)
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted

Here are the specifics about the network I obtained from wpa_cli

Selected interface 'wlan0'
bssid / frequency / signal level / flags / ssid
00:1a:6c:3c:2f:53    2462    159    
[WPA-EAP-TKIP][WPA2-EAP-TKIP+CCMP]    MYSSD
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20100623/0e0031ee/attachment.htm 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: fzambrini.vcf
Type: text/x-vcard
Size: 105 bytes
Desc: not available
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20100623/0e0031ee/attachment.vcf 


More information about the HostAP mailing list