Could I get some pointers on how to enable debug output from driver ?<br><br>Thanks<br>- Paresh<br><br><div class="gmail_quote">On Thu, May 21, 2009 at 8:15 PM, Dan Williams <span dir="ltr"><<a href="mailto:dcbw@redhat.com">dcbw@redhat.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div class="im">On Thu, 2009-05-21 at 11:27 +0530, Paresh Sawant wrote:<br>
> I monitored traffic on wireshark, AP is not sending dissociate frame.<br>
> It is the driver/card at wpa_supplicant end initiating the the<br>
> dissociate.<br>
><br>
> One observation is when i run command "iwconfig wlan0" while<br>
> wpa_supplicant is running , i see the frequecy/channel varying. My AP<br>
> works at channel 6 so i think station card should be tuned to same<br>
> channel, but instead i see it changing continuosly.<br>
><br>
> Is it a correct combination of wlan0 and wext to be used to make it<br>
> work? or i should try madwifi instead?<br>
<br>
</div>ok, so then it's something in the driver. Can you enable debugging<br>
output from the driver to perhaps see what's going on here?<br>
<font color="#888888"><br>
Dan<br>
</font><div><div></div><div class="h5"><br>
<br>
><br>
> - Paresh<br>
><br>
> On Thu, May 21, 2009 at 12:51 AM, Dan Williams <<a href="mailto:dcbw@redhat.com">dcbw@redhat.com</a>><br>
> wrote:<br>
> On Wed, 2009-05-20 at 17:34 +0530, Paresh Sawant wrote:<br>
> ><br>
> > Hi,<br>
> ><br>
> > I've built wpa_supplicant on Linux (kernel<br>
> 2.6.25-14.fc9.i686), with<br>
> > wext driver, and runing it on netgear wg311T(atheros<br>
> AR5212). I start<br>
> > the wpa_supplicant with -i wlan0 and -D wext, but it fails<br>
> to do the<br>
> > connection with WPA2-PSK configured AP. wireshark shows me<br>
> that it<br>
> > reaches till 2/4 of 4-way-hshake. But then it seems to<br>
> receive<br>
> > dissociate event from the hardware/driver. I'm passing<br>
> correct key for<br>
> > PSK auth.<br>
><br>
><br>
> You'll have to find out from the driver why the disassociation<br>
> is<br>
> happening. It might also be triggered by the AP itself, so<br>
> you could<br>
> also sniff packets from the air to figure out if the AP has<br>
> disassociated you for some reason.<br>
><br>
> Dan<br>
><br>
><br>
> > Following is the log message -<br>
> ><br>
> > /******************debug<br>
> > log****************************************************<br>
> ><br>
> > State: ASSOCIATED -> DISCONNECTED<br>
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>
> > WEXT: Operstate: linkmode=-1, operstate=5<br>
> > EAPOL: External notification - portEnabled=0<br>
> > EAPOL: SUPP_PAE entering state DISCONNECTED<br>
> > EAPOL: SUPP_BE entering state INITIALIZE<br>
> > EAPOL: External notification - portValid=0<br>
> > EAPOL: External notification - EAP success=0<br>
> > RX EAPOL from 00:1d:7e:f4:d7:07<br>
> > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00<br>
> 00 00 00 00<br>
> > 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71 55 8e e4<br>
> ef 5f ea<br>
> > 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f<br>
> ac 04 b0<br>
> > 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba<br>
> > Setting authentication timeout: 10 sec 0 usec<br>
> > IEEE 802.1X RX: version=2 type=3 length=117<br>
> > EAPOL-Key type=2<br>
> > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)<br>
> > key_length=16 key_data_length=22<br>
> > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00<br>
> > key_nonce - hexdump(len=32): fd cc 9e 98 1d 47 b3 25 9a 6d<br>
> 8d fd 3d<br>
> > 71 55 8e e4 ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9<br>
> > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00<br>
> > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00<br>
> > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00<br>
> 00<br>
> > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00<br>
> 00 00 00 00<br>
> > 00 00<br>
> > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a<br>
> 00 10 00 00<br>
> > 00 00 00 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71<br>
> 55 8e e4<br>
> > ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd<br>
> 14 00 0f<br>
> > ac 04 b0 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba<br>
> > State: DISCONNECTED -> 4WAY_HANDSHAKE<br>
> > WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:f4:d7:07<br>
> (ver=2)<br>
> > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04<br>
> b0 2a ff fe<br>
> > db bc a9 c5 e2 9d 88 ae d1 df 84 ba<br>
> > RSN: PMKID from Authenticator - hexdump(len=16): b0 2a ff fe<br>
> db bc a9<br>
> > c5 e2 9d 88 ae d1 df 84 ba<br>
> > RSN: no matching PMKID found<br>
> > WPA: Renewed SNonce - hexdump(len=32): d8 f1 69 54 1a e7 9f<br>
> 46 16 b2<br>
> > b4 97 00 4b 1f 35 52 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec<br>
> d9 bd<br>
> > WPA: PMK - hexdump(len=32): [REMOVED]<br>
> > WPA: PTK - hexdump(len=64): [REMOVED]<br>
> > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f<br>
> ac 02 01<br>
> > 00 00 0f ac 04 01 00 00 0f ac 02 00 00<br>
> > WPA: Sending EAPOL-Key 2/4<br>
> > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a<br>
> 00 00 00 00<br>
> > 00 00 00 00 00 00 d8 f1 69 54 1a e7 9f 46 16 b2 b4 97 00 4b<br>
> 1f 35 52<br>
> > 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br>
> 00 00 00<br>
> > 00 63 b4 56 74 f3 18 fc f5 14 f4 64 57 d3 4e 2e 84 00 16 30<br>
> 14 01 00<br>
> > 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<br>
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>
> > Wireless event: cmd=0x8b15 len=20<br>
> > Wireless event: new AP: 00:00:00:00:00:00<br>
> > WPA: 4-Way Handshake failed - pre-shared key may be<br>
> incorrect<br>
> > Setting scan request: 0 sec 100000 usec<br>
> > Added BSSID 00:00:00:00:00:00 into blacklist<br>
> > CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys<br>
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0<br>
> key_len=0<br>
> > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0<br>
> key_len=0<br>
> > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0<br>
> key_len=0<br>
> > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0<br>
> key_len=0<br>
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0<br>
> key_len=0<br>
> > ioctl[SIOCSIWENCODEEXT]: No such file or directory<br>
> > Driver did not support SIOCSIWENCODEEXT<br>
> > State: 4WAY_HANDSHAKE -> DISCONNECTED<br>
> ><br>
> > /***********************************************end************************************************************/<br>
> ><br>
> ><br>
> > Thanks<br>
> > - Paresh<br>
><br>
> > _______________________________________________<br>
> > HostAP mailing list<br>
> > <a href="mailto:HostAP@lists.shmoo.com">HostAP@lists.shmoo.com</a><br>
> > <a href="http://lists.shmoo.com/mailman/listinfo/hostap" target="_blank">http://lists.shmoo.com/mailman/listinfo/hostap</a><br>
><br>
><br>
> _______________________________________________<br>
> HostAP mailing list<br>
> <a href="mailto:HostAP@lists.shmoo.com">HostAP@lists.shmoo.com</a><br>
> <a href="http://lists.shmoo.com/mailman/listinfo/hostap" target="_blank">http://lists.shmoo.com/mailman/listinfo/hostap</a><br>
<br>
</div></div></blockquote></div><br>