WPA2(hostapd latest CVS) and madwifi driver
Chuanhua Lei
ch_lei
Fri Dec 3 22:55:16 PST 2004
Hi, Jouni,
When I try WPA2 (hostapd latest CVS) with madwifi driver (Master Mode).
After 4-way is finished, no 2-way group, Why?
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b2 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
83 13 b4 bc 98 33 e3 b8 77 0f 76 92 2b 5e ff ef 7b
4d cd d2 b4 38 8a f0 c3 2c 79 e5 03 a0 4c 4f 9f
8f e0 99 60 44 c4 05 70 ce b0 a1 ec a8 fc e2 d9
7b 63 a1 4c 8a c5 e5 5e 33 c0 67 f6 7a 87 b9
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
af 02 13 ca 00 10 00 00 00 00 00 00 00 06 de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b2 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 eb
ef af d3 b4 57 45 b4 21 7f 44 a5 50 2b fd 00 50
5f e6 20 c7 dc 00 9d 02 83 a2 b8 73 fe 87 31 97
c8 f9 02 90 64 3f 29 9a 3c 5d dc a9 18 6b 69 d9
41 4e 47 ee c4 65 b5 49 0b 87 7a d8 e1 ec 5d 8f
5f 0f 2d 16 53 c0 f5 3f d6 99 61 5d e1 da 0d d2
bf 06 07 73 5e 7e 08 22 72 b0 a7 3f 12 ca 9d 6b
IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)
=============>Then repeat
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b3 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
64 99 e4 a0 e9 d7 d7 1f 82 ac 3c 3f e2 1b 66 2e 2a
8d 1f ea 2c df a0 5c 94 31 a4 2c 5b 0d f0 a9 10
68 fb ab eb a7 1d 7a f8 4e 61 68 80 bb e8 85 7b
ce db e9 cd e2 e6 78 34 ff 01 75 35 24 64 30
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
af 02 13 ca 00 10 00 00 00 00 00 00 00 08 de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b3 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 4b
6b c1 1d 9c 53 d2 03 fc 86 da ea 76 60 c2 00 50
ab 9b ab f2 33 db 1d 65 e1 2b 65 f3 89 51 bb e0
07 7a c4 58 3d 5b 92 65 f0 32 9f 24 7a 65 5a e8
c1 cc 56 5f 72 aa f9 c6 3f e6 c4 86 f1 80 df 5e
b6 ae bd 60 90 fc a1 9c 9a cd 8e 55 d6 16 d0 2e
6e 5e 4f f4 26 aa b7 35 ed dd 94 e3 5a e7 cc 0c
IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
5f 02 00 8a 00 10 00 00 00 00 00 00 00 09 de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b4 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
0f 68 05 dd c7 5f 08 a7 a2 47 63 ee 24 aa f5 75 76
65 db 77 a3 1e 22 7c a4 08 fd 2b 8e 91 62 7d 43
cf 01 b2 71 a6 a2 90 23 08 cc 37 6b dc 76 f1 a5
a4 8f 96 87 76 cd 7c 01 a5 7e ae 6d 69 14 75
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
af 02 13 ca 00 10 00 00 00 00 00 00 00 0a de 4a
16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b4 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 3b
4a 7e 40 ab 48 91 86 7e a9 a9 d7 3b 62 62 00 50
7c d1 03 c9 6c c7 6e a5 64 8a 1a 1c fb 87 8e 2a
62 66 e6 ac 55 02 30 eb 77 47 20 76 c0 71 8a 68
20 13 40 8f 80 ac 62 f8 3c 16 1f 42 14 93 f3 95
5b 16 fb 86 3d 94 05 41 96 4e e1 6e d4 76 87 bb
1f 62 33 8d db 27 34 cc 2e d9 3b f9 3c be 97 e9
IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)
My hostap.conf as the following,
interface=ath0
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
ssid=linux
minimal_eap=0
wpa=2
wpa_passphrase=12345678
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP TKIP
wpa_group_rekey=600
wpa_gmk_rekey=86400
I use odyssey client 3.1 and your wpa_supplicant with madwifi driver(managed
mode), and has the same results as above.
More information about the Hostap
mailing list