Problems with wpa_supplicant and Linksys WPC54G + WPA EAP-TTLS

Dan Parsons dparsons
Fri Dec 17 19:17:40 PST 2004


I have tested both APs in WPA-PSK mode and EAP-TTLS mode. I understand  
that it may be a problem with ndiswrapper; I have written to their  
mailing list as well. Below is a log of a successful WPA-PSK session  
with the same driver/card:

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver  
'default'
Configuration file '/etc/wpa_supplicant.conf' ->  
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ap_scan=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=18):
      4e 49 43 45 5f 54 52 59 5f 57 41 52 44 52 49 56   NICE_TRY_WARDRIV
      45 52                                             ER
proto: 0x1
key_mgmt: 0x2
auth_alg: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
    id=0 ssid='NICE_TRY_WARDRIVER'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0c:41:2c:25:5d
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=0
Scan timeout - try to get results
Received 941 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:12:7f:47:f4:a0 ssid='SDPRA' wpa_ie_len=24 rsn_ie_len=0
    skip - SSID mismatch
1: 00:0c:41:ad:05:fb ssid='NICE_TRY_WARDRIVER' wpa_ie_len=24  
rsn_ie_len=0
    selected
Trying to associate with 00:0c:41:ad:05:fb (SSID='NICE_TRY_WARDRIVER'  
freq=2462 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c02 len=235
Custom wireless event:  
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4 
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202 
01000050f20201000050f202  
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44  
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00  
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92  
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01  
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0c:41:ad:05:fb
No keys have been configured - skip key clearing
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29  
idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28  
idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27  
idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26  
idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25  
idleWhile=55
Wireless event: cmd=0x8c02 len=235
Custom wireless event:  
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4 
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202 
01000050f20201000050f202  
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44  
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00  
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92  
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01  
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24  
idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23  
idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22  
idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21  
idleWhile=51
Wireless event: cmd=0x8c02 len=235
Custom wireless event:  
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4 
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202 
01000050f20201000050f202  
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44  
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00  
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92  
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01  
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20  
idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19  
idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18  
idleWhile=48
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=17  
idleWhile=47
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=16  
idleWhile=46
Wireless event: cmd=0x8c02 len=235
Custom wireless event:  
'ASSOCINFO(ReqIEs=00124e4943455f5452595f574152445249564552010882848b96a4 
b0c8ec32048c9298e0dd06004096010100dd050010180100dd160050f20101000050f202 
01000050f20201000050f202  
RespIEs=010882848b96a4b0c8ec32048c9298e0dd050010180100)'
Association info event
req_ies - hexdump(len=75): 00 12 4e 49 43 45 5f 54 52 59 5f 57 41 52 44  
52 49 56 45 52 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92 98 e0 dd 06 00  
40 96 01 01 00 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=23): 01 08 82 84 8b 96 a4 b0 c8 ec 32 04 8c 92  
98 e0 dd 05 00 10 18 01 00
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01  
00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00  
00 00 00 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83  
d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00  
00 00 00 00 00 00 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42  
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 10 a7 c5 24 6f ec db 91 ad df 0c  
9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86 a8 ef f7 af 99
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): dc 42 e9 cf fe 7e 19 fc 29 ac 13  
6b 13 ed c6 55
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0c 41 ad 05 fb 00 0c 41 2c  
25 5d 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 10 a7 c5  
24 6f ec db 91 ad df 0c 9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86  
a8 ef f7 af 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 dc 42 e9 cf fe 7e 19 fc 29 ac 13  
6b 13 ed c6 55 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2  
02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:ad:05:fb
Association event - clear replay counter
Associated with 00:0c:41:ad:05:fb
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00  
00 00 01 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83  
d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 23 5e 44 2c  
c0 b4 f4 62 c7 b3 67 35 9e 0b ee 00 18 dd 16 00 50 f2 01 01 00 00 50 f2  
02 01 00 00 50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00  
00 00 00 00 00 01 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42  
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 ed 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 23  
5e 44 2c c0 b4 f4 62 c7 b3 67 35 9e 0b ee 00 18 dd 16 00 50 f2 01 01 00  
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02  
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0c 41 ad 05 fb 00 0c 41 2c  
25 5d 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 10 a7 c5  
24 6f ec db 91 ad df 0c 9f 05 ff 38 6b cd d1 be 98 d4 e7 f1 56 17 e7 86  
a8 ef f7 af 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 c5 7c 15 ff d5 ad 92 63 99 1c 87  
69 d8 5b 38 d2 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:0c:41:ad:05:fb
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00  
00 00 02 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42 68 bd 83  
d3 76 35 57 c7 0d 21 a8 87 20 e3 14 42 68 bd 83 d3 76 35 57 c7 0d 21 a8  
87 20 ee 08 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 9d 84 fb a0  
b7 ac 94 c2 cf f9 93 7a 4d 88 e0 00 20 71 dc 2b 18 95 45 f4 a5 94 2b 2f  
14 d7 10 6f e0 72 64 dc 0b a2 ae 6e 68 e9 bd 46 d9 69 8b 6c 68
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
   EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00  
00 00 00 00 00 02 c9 3c 76 1c 52 b0 bd 10 18 d8 93 06 a3 4b 28 95 14 42  
68 bd 83 d3 76 35 57 c7 0d 21 a8 87 20 e3 14 42 68 bd 83 d3 76 35 57 c7  
0d 21 a8 87 20 ee 08 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 9d  
84 fb a0 b7 ac 94 c2 cf f9 93 7a 4d 88 e0 00 20 71 dc 2b 18 95 45 f4 a5  
94 2b 2f 14 d7 10 6f e0 72 64 dc 0b a2 ae 6e 68 e9 bd 46 d9 69 8b 6c 68
WPA: RX message 1 of Group Key Handshake from 00:0c:41:ad:05:fb (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 08 10 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0c 41 ad 05 fb 00 0c 41 2c  
25 5d 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 1a 7b 6e b3 0a 07 1e 33 2c a2 ed  
77 11 a0 a0 6b 00 00
WPA: Key negotiation completed with 00:0c:41:ad:05:fb [PTK=TKIP  
GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15  
idleWhile=45
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=14  
idleWhile=44
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13  
idleWhile=43
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=12  
idleWhile=42
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=11  
idleWhile=41
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=10  
idleWhile=40
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=9  
idleWhile=39
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=8  
idleWhile=38
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=7  
idleWhile=37
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=6  
idleWhile=36
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=5  
idleWhile=35
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=4  
idleWhile=34
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=3  
idleWhile=33
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=2  
idleWhile=32
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=1  
idleWhile=31
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=30
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=29
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=28
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=27
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=26
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=25
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=24
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=23
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=22
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=21
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=20
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=19
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=18
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=17
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=16
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=15
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=14
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=13
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=12
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=11
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=10
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=9
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=8
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0  
idleWhile=7
EAPOL: Port Timers tick - authWhil

Dan Parsons
Systems Administrator
Pioneer Research Center USA, Inc.

On Dec 17, 2004, at 6:34 PM, Jouni Malinen wrote:

> On Fri, Dec 17, 2004 at 05:56:30PM -0800, Dan Parsons wrote:
>
>> I'm having trouble making my Linksys WPC54G (v1) card work with WPA
>> (EAP-TTLS) in Linux.
>>
>> Basically, I can make the card talk to a WPA-PSK access point in Linux
>> with no problems, it's only when I try WPA EAP+TTLS that I fail. I  
>> know
>> the EAP+TTLS access point is configured correctly because I can  
>> connect
>> to it with a Windows machine and also a Mac.
>>
>> The problem is simply not being able to authenticate to my access  
>> point
>> set up with WPA using EAP-TTLS. I've tried it against a Cisco Aironet
>> 1200 and an Apple Airport Extreme. Both APs I can successfully connect
>> to with eap-ttls under Windows and MacOS.
>
> Have you tested either of these APs in WPA-PSK mode or was it another  
> AP
> that you used in the WPA-PSK test?
>
>> In addition to not being able to authenticate, my machine
>> freezes/crashes sporadically when running wpa_supplicant.
>>
>> I'm not sure if this is a wpa_supplicant or a ndiswrapper problem...
>
> As far as crashing is concerned, I would point to ndiswrapper and or
> NDIS driver. Based on the log file, it looks like wpa_supplicant gets  
> an
> association event, but does not receive any EAPOL packets from the AP.
> In addition, ndiswrapper is supposed to send an association info event
> to wpa_supplicant, but that does not show up in the debug log for some
> reason.. Could you please also send a debug log from the same card and
> driver when using WPA-PSK successfully? Anyway, I would assume that  
> this
> would be something ndiswrapper specific.
>
> -- 
> Jouni Malinen                                            PGP id  
> EFC895FA
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap





More information about the Hostap mailing list