<div>Hello,</div>
<div>I still can't deal with the problem.</div>
<div>I have the same conf as above shows,</div>
<div>both hostapd and wpa_supplicant.</div>
<div> </div>
<div>What I want to achieve is connecting with LAN by 802.1X.</div>
<div>My AP's ESSID is "MyAP"</div>
<div>and without any key used.</div>
<div> </div>
<div>I meet two problems in my situation.</div>
<div> </div>
<div>The first problem is,</div>
<div>after I successfully authentic with server,</div>
<div>I send a ARP packet to AP's IP address,</div>
<div>and AP respond that packet.</div>
<div>But, I can't receive any message at my supplicant!!</div>
<div>What I guess is wpa_supplicant deny those packets and drop them.</div>
<div>I'm sure that AP actually respond those packets,</div>
<div>I use another wireless-card to be a monitor.</div>
<div> </div>
<div>The second problem,</div>
<div>every time I connect with AP and successfully authentic,</div>
<div>about two minutes later,</div>
<div>wpa shows:</div>
<div><em><font color="#ff0000">Authentication with 00:19:5b:ec:9a:70 timed out.</font></em></div>
<div><em><font color="#ff0000">CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys</font></em></div>
<div>and hostapd shows:</div>
<div><em><font color="#ff0000">ath0: STA 00:19:5b:72:61:6e IEEE 802.11: disassociated</font></em></div>
<div><em><font color="#ff0000">ioctl[unknown???]: Invalid argument</font></em></div>
<div>then, my supplicant shutdown the ath0 interface.</div>
<div> </div>
<div>Can someone give me some ideas to deal with these two problem?</div>
<div>I try my best many days and still can't handle them.</div>
<div> </div>
<div>Following is my wpa_supplicant debugging message:</div>
<div>Initializing interface 'ath0' conf 'md5.conf' driver 'madwifi' ctrl_interface 'N/A' bridge 'N/A'<br>Configuration file 'md5.conf' -> '/root/wifi/wpa_supplicant-
0.6.0/wpa_supplicant/md5.conf'<br>Reading configuration file '/root/wifi/wpa_supplicant-0.6.0/wpa_supplicant/md5.conf'<br>Priority group 0<br> id=0 ssid='MyAP'<br>Initializing interface (2) 'ath0'
<br>EAPOL: SUPP_PAE entering state DISCONNECTED<br>EAPOL: KEY_RX entering state NO_KEY_RECEIVE<br>EAPOL: SUPP_BE entering state INITIALIZE<br>EAP: EAP entering state DISABLED<br>EAPOL: External notification - portEnabled=0
<br>EAPOL: External notification - portValid=0<br>Interface ath0 set UP - waiting a second for the driver to complete initialization<br>SIOCGIWRANGE: too old (short) data - assuming WPA is not supported<br>WEXT: Operstate: linkmode=1, operstate=5
<br>Own MAC address: 00:19:5b:72:61:6e<br>wpa_driver_madwifi_del_key: keyidx=0<br>wpa_driver_madwifi_del_key: keyidx=1<br>wpa_driver_madwifi_del_key: keyidx=2<br>wpa_driver_madwifi_del_key: keyidx=3<br>wpa_driver_madwifi_set_countermeasures: enabled=0
<br>wpa_driver_madwifi_set_drop_unencrypted: enabled=1<br>RSN: flushing PMKID list in the driver<br>Setting scan request: 0 sec 100000 usec<br>Added interface ath0<br>Ignore event for foreign ifindex 3<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:19:5b:ec:9a:70<br>State: DISCONNECTED -> ASSOCIATED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5
<br>Associated to a new BSS: BSSID=00:19:5b:ec:9a:70<br>No keys have been configured - skip key clearing<br>Network configuration found for the current AP<br>WPA: clearing AP WPA IE<br>WPA: clearing AP RSN IE<br>WPA: clearing own WPA/RSN IE
<br>EAPOL: External notification - portControl=Auto<br>Associated with 00:19:5b:ec:9a:70<br>WPA: Association event - clear replay counter<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0
<br>EAPOL: External notification - portEnabled=1<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>Setting authentication timeout: 10 sec 0 usec
<br>Cancelling scan request<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])<br>Wireless event: cmd=0x8b06 len=8
<br>EAPOL: startWhen --> 0<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: txStart<br>TX EAPOL: dst=00:19:5b:ec:9a:70<br>RX EAPOL from 00:19:5b:ec:9a:70<br>Setting authentication timeout: 70 sec 0 usec<br>EAPOL: Received EAP-Packet frame
<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp
<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>EAP: EAP-Request Identity data - hexdump_ascii(len=5):
<br> 68 65 6c 6c 6f hello <br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65 72 testuser <br>EAP: EAP entering state SEND_RESPONSE
<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL: dst=00:19:5b:ec:9a:70<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:19:5b:ec:9a:70<br>EAPOL: Received EAP-Packet frame
<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)
<br>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>EAP: EAP entering state METHOD<br>EAP-MD5: Generating Challenge Response<br>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>
EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL: dst=00:19:5b:ec:9a:70<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:19:5b:ec:9a:70
<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Success<br>EAP: EAP entering state SUCCESS<br>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
<br>EAPOL: SUPP_BE entering state RECEIVE<br>EAPOL: SUPP_BE entering state SUCCESS<br>EAPOL: SUPP_BE entering state IDLE</div>
<div> </div>
<div>Until now, I think I authentic with SERVER successfully,</div>
<div>right?</div>
<div> </div>
<div>About few minutes later, debugging message continue shows:</div>
<div>EAPOL: authWhile --> 0<br>EAPOL: startWhen --> 0<br>EAPOL: idleWhile --> 0<br>Authentication with 00:19:5b:ec:9a:70 timed out.<br>Added BSSID 00:19:5b:ec:9a:70 into blacklist<br>wpa_driver_madwifi_disassociate
<br>No keys have been configured - skip key clearing<br>State: ASSOCIATED -> DISCONNECTED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>EAPOL: External notification - portEnabled=0
<br>EAPOL: SUPP_PAE entering state DISCONNECTED<br>EAPOL: SUPP_BE entering state INITIALIZE<br>EAP: EAP entering state DISABLED<br>EAPOL: External notification - portValid=0<br>Setting scan request: 0 sec 0 usec<br>State: DISCONNECTED -> SCANNING
<br>Starting AP scan (broadcast SSID)<br>Trying to get current scan results first without requesting a new scan to speed up initial association<br>Received 2921 bytes of scan results (12 BSSes)<br>Scan results: 12<br>Selecting BSS from priority group 0
</div>
<div>........(a lot of AP information)</div>
<div>No suitable AP found.<br>Setting scan request: 5 sec 0 usec<br>CTRL-EVENT-TERMINATING - signal 2 received<br>Removing interface ath0<br>State: SCANNING -> DISCONNECTED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
<br>WEXT: Operstate: linkmode=-1, operstate=5<br>No keys have been configured - skip key clearing<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0<br>wpa_driver_madwifi_set_drop_unencrypted: enabled=0
<br>wpa_driver_madwifi_set_countermeasures: enabled=0<br>No keys have been configured - skip key clearing<br>EAP: deinitialize previously used EAP method (4, MD5) at EAP deinit<br>Cancelling scan request<br>Cancelling authentication timeout
<br>WEXT: Operstate: linkmode=0, operstate=6<br> </div>