<body style=font-size:10pt>
Hi<br />
<br />
I used to hostapd ( 0.3.7) and madwifi driver for WPA2-PSK authentication.<br />
Supplicant is "Intel Proset/wireless 9.0 driver.<br />
But WPA2-PSK Test is Fail ( WPA-PSK Test is Success ).<br />
Fail Point is "3/4 msg of 4-Way Handshake" .<br />
why WPA-PSK2 test is fail ?<br />
please send me a solution!! <br />
<br />
-----------Test enviroment------------------<br />
AP wireless : AR5213<br />
CPU = IXP425<br />
OS = linux2.4.24<br />
hostapd = 0.3.7<br />
madwifi = below <br />
AP mode : master<br />
ssid : rush<br />
supplicant : intel 2200BG ( driver version : 9.0.1.9 )<br />
<br />
<br />
--------------- hostapd.conf--------------------<br />
logger_syslog=-1<br />
logger_syslog_level=2<br />
logger_stdout=-1<br />
logger_stdout_level=2<br />
debug=0<br />
dump_file=/tmp/hostapd.dump<br />
ssid=rush<br />
eap_message=hello<br />
wep_key_len_broadcast=13<br />
wep_key_len_unicast=13<br />
wep_rekey_period=300<br />
eapol_key_index_workaround=0<br />
wpa=2<br />
wpa_passphrase=xxxxxxxxxx<br />
wpa_key_mgmt=WPA-PSK WPA-EAP<br />
wpa_pairwise=TKIP<br />
wpa_group_rekey=600<br />
wpa_gmk_rekey=86400<br />
<br />
<br />
-------------- Test Log --------------------------<br />
root@TEST-R:~# insmod ./ath_hal.o<br />
Using ./ath_hal.o<br />
insmod ./wlan_wep.o<br />
insmod ./wlan_ccmp.o<br />
ath_hal: 0.9.14.9 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413,insmod ./wlan_tkip.o<br />
REGOPS_FUNC)<br />
root@TEST-R:~# insmod ./wlan.o<br />
Using ./wlan.o<br />
insmod ./wlan_xauth.o<br />
wlan: 0.8.4.5 (EXPERIMENTAL)<br />
insmod ./ath_rate_onoe.o<br />
insmod ./ath_pci.o<br />
root@TEST-R:~# insmod ./wlan_wep.o<br />
<br />
Using ./wlan_wep.o<br />
root@TEST-R:~# insmod ./wlan_ccmp.o<br />
iwconfig ath0 essid rush<br />
Using ./wlan_ccmp.o<br />
insmod: unresolved symbol crypto_alloc_tfm<br />
insmod: unresolved symbol crypto_free_tfm<br />
iwpriv ath0 mode 3<br />
root@TEST-R:~# insmod ./wlan_tkip.o<br />
ifconfig ath0 10.10.1.254 netmask 255.255.255.0<br />
Using ./wlan_tkip.o<br />
root@TEST-R:~# insmod ./wlan_acl.o<br />
/hostapd -ddd .Using ./wlan_acl.o<br />
wlan: mac acl /hostapd.conf<br />
policy registered<br />
root@TEST-R:~# insmod ./wlan_xauth.o<br />
Using ./wlan_xauth.o<br />
root@TEST-R:~# insmod ./ath_rate_onoe.o<br />
Using ./ath_rate_onoe.o<br />
ath_rate_onoe: 1.0<br />
root@TEST-R:~# insmod ./ath_pci.o<br />
Using ./ath_pci.o<br />
ath_pci: 0.9.4.12 (EXPERIMENTAL)<br />
ath0: 11a rates: 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps<br />
ath0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps<br />
ath0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps<br />
ath0: mac 5.9 phy 4.3 radio 3.6<br />
ath0: 802.11 address: 00:02:78:42:73:1f<br />
ath0: Use hw queue 0 for WME_AC_BE traffic<br />
ath0: Use hw queue 1 for WME_AC_BK traffic<br />
ath0: Use hw queue 2 for WME_AC_VI traffic<br />
ath0: Use hw queue 3 for WME_AC_VO traffic<br />
ath0: Atheros 5212: mem=0x4bff0000, irq=19<br />
root@TEST-R:~# <br />
root@TEST-R:~# <br />
root@TEST-R:~# iwconfig ath0 mode master<br />
root@TEST-R:~# iwconfig ath0 essid rush<br />
root@TEST-R:~# iwpriv ath0 mode 3<br />
<mapping sub-ioctl mode to cmd 0x8BE0-2><br />
root@TEST-R:~# iwconfig ath0 channel 10<br />
root@TEST-R:~# ifconfig ath0 10.10.1.254 netmask 255.255.255.0<br />
root@TEST-R:~# chmod 755 h*<br />
root@TEST-R:~# ./hostapd -ddd ./hostapd.conf<br />
Configuration file: ./hostapd.conf<br />
madwifi_set_iface_flags: dev_up=0<br />
Using interface ath0 with hwaddr 00:02:78:42:73:1f and ssid 'rush'<br />
madwifi_set_ieee8021x: enabled=1<br />
madwifi_configure_wpa: group key cipher=1<br />
madwifi_configure_wpaipv6_add_addr: already assigned<br />
: pairwise key ciphers=0x2<br />
madwifi_configure_wpa: key management algorithms=0x3<br />
madwifi_configure_wpa: rsn capabilities=0x0<br />
madwifi_configure_wpa: enable WPA= 0x2<br />
madwifi_set_iface_flags: dev_up=1<br />
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0<br />
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1<br />
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2<br />
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3<br />
IEEE 802.1X: New default WEP key index 2<br />
IEEE 802.1X: New default WEP key - hexdump(len=13): e3 2e 4e 4d 82 5f 13 f6 86 19 2d 0e 72<br />
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=2<br />
madwifi_set_privacy: enabled=1<br />
WPA: group state machine entering state GTK_INIT<br />
GMK - hexdump(len=32): 5c 46 59 69 6d ab 14 cb 3b 46 42 f9 7b 72 ed 3a ad 64 bf c6 b8 de 76 d5 70 db 04 15 d6 4f a7 d7<br />
GTK - hexdump(len=32): 76 a3 6a 60 8b 6c 95 1d ae 60 e3 d0 09 0c 81 75 61 03 4b 81 35 0d 8c a6 b3 6e 9f a4 05 92 71 41<br />
WPA: group state machine entering state SETKEYSDONE<br />
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1<br />
Flushing old station entries<br />
Deauthenticate all stations<br />
l2_packet_receive - recv: Network is down<br />
Wireless event: cmd=0x8c03 len=20<br />
ath0: STA 00:0e:35:82:60:e8 IEEE 802.11: associated<br />
New STA<br />
ath0: STA 00:0e:35:82:60:e8 WPA: event 1 notification<br />
ath0: STA 00:0e:35:82:60:e8 WPA: start authentication<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state INITIALIZE<br />
madwifi_del_key: addr=00:0e:35:82:60:e8 key_idx=0<br />
ath0: STA 00:0e:35:82:60:e8 IEEE 802.1X: unauthorizing port<br />
madwifi_set_sta_authorized: addr=00:0e:35:82:60:e8 authorized=0<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK_GROUP entering state IDLE<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state AUTHENTICATION<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state AUTHENTICATION2<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state INITPSK<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state PTKSTART<br />
ath0: STA 00:0e:35:82:60:e8 WPA: sending 1/4 msg of 4-Way Handshake<br />
TX EAPOL - hexdump(len=113): 00 0e 35 82 60 e8 00 02 78 42 73 1f 88 8e 02 03 00 5f 02 00 89 00 20 00 00 00 00 00 00 00 01 77 15 57 a7 d9 27 63 7d ef 81 42 54 a8 e6 59 6c 10 14 01 10 b6 1f 3f 55 34 39 69 2f 02 25 46 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
ath0: STA 00:0e:35:82:60:e8 WPA: EAPOL-Key timeout<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state PTKSTART<br />
ath0: STA 00:0e:35:82:60:e8 WPA: sending 1/4 msg of 4-Way Handshake<br />
TX EAPOL - hexdump(len=113): 00 0e 35 82 60 e8 00 02 78 42 73 1f 88 8e 02 03 00 5f 02 00 89 00 20 00 00 00 00 00 00 00 02 77 15 57 a7 d9 27 63 7d ef 81 42 54 a8 e6 59 6c 10 14 01 10 b6 1f 3f 55 34 39 69 2f 02 25 46 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
IEEE 802.1X: 121 bytes from 00:0e:35:82:60:e8<br />
IEEE 802.1X: version=1 type=3 length=117<br />
ath0: STA 00:0e:35:82:60:e8 WPA: received EAPOL-Key frame (2/4 Pairwise)<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state PTKCALCNEGOTIATING<br />
PMK - hexdump(len=32): 5d 70 45 ab 0a f6 47 d2 76 5c b3 74 9f 7e 2a ae 94 78 b2 fa 04 da 87 5d f2 d6 85 64 c3 0d bc 82<br />
PTK - hexdump(len=64): 89 76 9f ec b6 46 99 01 91 88 18 58 a2 9f fe 20 37 14 ec 30 af 6c aa 57 62 45 ae 24 93 5f 11 89 46 5d 00 08 7f 16 3a e9 8d a7 3a 36 f0 82 09 27 4f 04 cb 2a 11 d9 ff 98 55 fa e1 e4 40 25 5e 1f<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state PTKCALCNEGOTIATING2<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state PTKINITNEGOTIATING<br />
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1<br />
ath0: STA 00:0e:35:82:60:e8 WPA: sending 3/4 msg of 4-Way Handshake<br />
Plaintext EAPOL-Key Key Data - hexdump(len=66): 30 18 01 00 00 0f ac 02 01 00 00 0f ac 02 02 00 00 0f ac 01 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 76 a3 6a 60 8b 6c 95 1d ae 60 e3 d0 09 0c 81 75 61 03 4b 81 35 0d 8c a6 b3 6e 9f a4 05 92 71 41<br />
TX EAPOL - hexdump(len=179): 00 0e 35 82 60 e8 00 02 78 42 73 1f 88 8e 02 03 00 a1 02 13 c9 00 20 00 00 00 00 00 00 00 03 77 15 57 a7 d9 27 63 7d ef 81 42 54 a8 e6 59 6c 10 14 01 10 b6 1f 3f 55 34 39 69 2f 02 25 46 ce 10 14 01 10 b6 1f 3f 55 34 39 69 2f 02 25 46 cf 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 65 14 69 b1 fc a4 f2 d0 bf d5 43 02 a9 5c e9 11 00 42 6b 11 94 5e f8 82 8f 18 58 74 ce e4 67 13 d5 5e 44 e0 b1 cf b6 df ea d3 04 92 bd 37 ba fe ee 61 9a 9a 94 90 4f 18 7b c7 fa 74 72 d3 f5 28 a9 a4 e3 c2 a8 ee af 81 32 aa 1e 49 1f 71 60 c5 19 ef ab 09<br />
Wireless event: cmd=0x8c04 len=20<br />
ath0: STA 00:0e:35:82:60:e8 IEEE 802.11: deassociated<br />
ath0: STA 00:0e:35:82:60:e8 WPA: event 2 notification<br />
madwifi_del_key: addr=00:0e:35:82:60:e8 key_idx=0<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state DISCONNECTED<br />
WPA: 00:0e:35:82:60:e8 WPA_PTK entering state INITIALIZE<br />
madwifi_del_key: addr=00:0e:35:82:60:e8 key_idx=0<br />
ath0: STA 00:0e:35:82:60:e8 IEEE 802.1X: unauthorizing port<br />
madwifi_set_sta_authorized: addr=00:0e:35:82:60:e8 authorized=0<br />
<br />
.. repeating....<br />
<br />
<br><br><br><br><br><br>
<table border="0" bordercolor="#FFFFFF" cellspacing="0" id="tb_size" width="650">
<tr>
<td height="5"></td>
</tr>
<tr>
<td height="1" bgcolor="#B0AC63"></td>
</tr>
<tr>
<td style="border:1 solid #FFFFFF;"></td>
</tr>
<td style="border:1 solid #E4E2D2; padding:7 5 5 5">
<table border="0" cellpadding="0" cellspacing="0" width="100%">
<tr>
<td><a href="http://www.paran.com" target="_blank"><img src="http://image.paran.com/paran/mail/logo_small.gif" style="border:0 solid #C5C2B1"></a></td>
<td nowrap style="padding:4 0 1 0" align="left"><a href="http://news.paran.com/sdiscuss/discussionview.php?id=27&p_eye=main^top^002^nws^dokdo_mail" target="_blank"><font style="font-size : 12px ; font-family : 굴림 ; color:#000000; text-decoration : none ">[이슈&토론] 소중한 우리의 영토. 독도 지키기를 위한 여러분의 한마디를 들려주세요.</font></a></td>
</tr>
<tr>
<td style="border:0 solid #E4E2D2;padding:0" bgcolor="#FFFFFF">
<table border="0" cellpadding="0" cellspacing="0" width="100%">
<tr>
<td width="50%" align="center">
</td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
</table>
<br><br>
<img src='http://mail12.paran.com/read/put_ack.php?hp=L0QxMi9qL3UvNC9qdWtpbTc0QHBhcmFuLmNvbS8uQ29uZmlybS8xMTExNjI0Mzc0Ljg3NTkubWFpbDEyeDE=&to=hostap@shmoo.com______________________________________________________________________________________________________________________________________' width=1 border=0 height=1>
</body>