Problems with wpa_supplicant and Linksys WPC54G + WPA EAP-TTLS
Dan Parsons
dparsons
Fri Dec 17 19:17:40 PST 2004
I have tested both APs in WPA-PSK mode and EAP-TTLS mode. I understand
that it may be a problem with ndiswrapper; I have written to their
mailing list as well. Below is a log of a successful WPA-PSK session
with the same driver/card:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver
'default'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ap_scan=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=18):
4e 49 43 45 5f 54 52 59 5f 57 41 52 44 52 49 56 NICE_TRY_WARDRIV
45 52 ER
proto: 0x1
key_mgmt: 0x2
auth_alg: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='NICE_TRY_WARDRIVER'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0c:41:2c:25:5d
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=0
Scan timeout - try to get results
Received 941 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:12:7f:47:f4:a0 ssid='SDPRA' wpa_ie_len=24 rsn_ie_len=0
skip - SSID mismatch
1: 00:0c:41:ad:05:fb ssid='NICE_TRY_WARDRIVER' wpa_ie_len=24
rsn_ie_len=0
selected
Trying to associate with 00:0c:41:ad:05:fb (SSID='NICE_TRY_WARDRIVER'
freq=2462 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c02 len=235
Custom wireless event:
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202
01000050f20201000050f202
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0c:41:ad:05:fb
No keys have been configured - skip key clearing
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29
idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28
idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27
idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26
idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25
idleWhile=55
Wireless event: cmd=0x8c02 len=235
Custom wireless event:
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202
01000050f20201000050f202
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24
idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23
idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22
idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21
idleWhile=51
Wireless event: cmd=0x8c02 len=235
Custom wireless event:
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202
01000050f20201000050f202
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20
idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19
idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18
idleWhile=48
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=17
idleWhile=47
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=16
idleWhile=46
Wireless event: cmd=0x8c02 len=235
Custom wireless event:
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202
01000050f20201000050f202
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 00 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83
d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 00 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 10 a7 c5 24 6f ec db 91 ad df 0c
9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86 a8 ef f7 af 99
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): dc 42 e9 cf fe 7e 19 fc 29 ac 13
6b 13 ed c6 55
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0c 41 ad 05 fb 00 0c 41 2c
25 5d 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 10 a7 c5
24 6f ec db 91 ad df 0c 9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86
a8 ef f7 af 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 dc 42 e9 cf fe 7e 19 fc 29 ac 13
6b 13 ed c6 55 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 00 01 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83
d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 23 5e 44 2c
c0 b4 f4 62 c7 b3 67 35 9e 0b ee 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
00 00 00 00 00 01 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 23
5e 44 2c c0 b4 f4 62 c7 b3 67 35 9e 0b ee 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0c 41 ad 05 fb 00 0c 41 2c
25 5d 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 10 a7 c5
24 6f ec db 91 ad df 0c 9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86
a8 ef f7 af 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 c5 7c 15 ff d5 ad 92 63 99 1c 87
69 d8 5b 38 d2 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00
00 00 02 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83
d3 76 35 57 c7 0d 21 a8 87 20 e3 14 42 68 bd 83 d3 76 35 57 c7 0d 21 a8
87 20 ee 08 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 9d 84 fb a0
b7 ac 94 c2 cf f9 93 7a 4d 88 e0 00 20 71 dc 2b 18 95 45 f4 a5 94 2b 2f
14 d7 10 6f e0 72 64 dc 0b a2 ae 6e 68 e9 bd 46 d9 69 8b 6c 68
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00
00 00 00 00 00 02 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 e3 14 42 68 bd 83 d3 76 35 57 c7
0d 21 a8 87 20 ee 08 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 9d
84 fb a0 b7 ac 94 c2 cf f9 93 7a 4d 88 e0 00 20 71 dc 2b 18 95 45 f4 a5
94 2b 2f 14 d7 10 6f e0 72 64 dc 0b a2 ae 6e 68 e9 bd 46 d9 69 8b 6c 68
WPA: RX message 1 of Group Key Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 08 10 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0c 41 ad 05 fb 00 0c 41 2c
25 5d 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 1a 7b 6e b3 0a 07 1e 33 2c a2 ed
77 11 a0 a0 6b 00 00
WPA: Key negotiation completed with 00:0c:41:ad:05:fb [PTK=TKIP
GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15
idleWhile=45
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=14
idleWhile=44
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13
idleWhile=43
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=12
idleWhile=42
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=11
idleWhile=41
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=10
idleWhile=40
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=9
idleWhile=39
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=8
idleWhile=38
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=7
idleWhile=37
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=6
idleWhile=36
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=5
idleWhile=35
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=4
idleWhile=34
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=3
idleWhile=33
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=2
idleWhile=32
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=1
idleWhile=31
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=30
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=29
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=28
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=27
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=26
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=25
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=24
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=23
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=22
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=21
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=20
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=19
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=18
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=17
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=16
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=15
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=14
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=13
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=12
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=11
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=10
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=9
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=8
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0
idleWhile=7
EAPOL: Port Timers tick - authWhil
Dan Parsons
Systems Administrator
Pioneer Research Center USA, Inc.
On Dec 17, 2004, at 6:34 PM, Jouni Malinen wrote:
> On Fri, Dec 17, 2004 at 05:56:30PM -0800, Dan Parsons wrote:
>
>> I'm having trouble making my Linksys WPC54G (v1) card work with WPA
>> (EAP-TTLS) in Linux.
>>
>> Basically, I can make the card talk to a WPA-PSK access point in Linux
>> with no problems, it's only when I try WPA EAP+TTLS that I fail. I
>> know
>> the EAP+TTLS access point is configured correctly because I can
>> connect
>> to it with a Windows machine and also a Mac.
>>
>> The problem is simply not being able to authenticate to my access
>> point
>> set up with WPA using EAP-TTLS. I've tried it against a Cisco Aironet
>> 1200 and an Apple Airport Extreme. Both APs I can successfully connect
>> to with eap-ttls under Windows and MacOS.
>
> Have you tested either of these APs in WPA-PSK mode or was it another
> AP
> that you used in the WPA-PSK test?
>
>> In addition to not being able to authenticate, my machine
>> freezes/crashes sporadically when running wpa_supplicant.
>>
>> I'm not sure if this is a wpa_supplicant or a ndiswrapper problem...
>
> As far as crashing is concerned, I would point to ndiswrapper and or
> NDIS driver. Based on the log file, it looks like wpa_supplicant gets
> an
> association event, but does not receive any EAPOL packets from the AP.
> In addition, ndiswrapper is supposed to send an association info event
> to wpa_supplicant, but that does not show up in the debug log for some
> reason.. Could you please also send a debug log from the same card and
> driver when using WPA-PSK successfully? Anyway, I would assume that
> this
> would be something ndiswrapper specific.
>
> --
> Jouni Malinen PGP id
> EFC895FA
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap
More information about the Hostap
mailing list