wap_supplicant only gets to "Sending EAPOL-Key 2/4"

Matt McHenry jerith
Sun Sep 12 10:19:58 PDT 2004


	I'm trying to configure my linux box as a client in my new wireless
network w/ WPA.  The network is known to work with a WinXP box using the
exact same wireless card.  Any help would be much appreciated!

	The AP is a NetGear WGR614 802.11g wireless router. 
(http://www.ee.surrey.ac.uk/Personal/G.Wilford/WiFi.html indicates that
this should work w/ wpa_supplicant.)

	The card I'm using is a Linksys WMP54G.  lspci says:

02:09.0 Network controller: Broadcom Corporation BCM94306 802.11g (rev
03)
        Subsystem: Linksys: Unknown device 0013
        Flags: bus master, fast devsel, latency 64, IRQ 10
        Memory at feafc000 (32-bit, non-prefetchable) [size=8K]

	I'm using ndiswrapper 0.10 to load the driver provided on the
installation CD (bcmw15.[inf|sys]).  dmesg reports:

ndiswrapper: no version for "struct_module" found: kernel tainted.
ndiswrapper version 0.10 loaded (preempt=no,smp=yes)
ndiswrapper: using irq 10
wlan0: ndiswrapper ethernet device 00:0c:41:61:ea:0a using driver
bcmwl5.sys
ndiswrapper device wlan0 supports WPA with AES/CCMP and TKIP ciphers
ndiswrapper: driver bcmwl5.sys (Linksys,07/17/2003, 3.30.15.0) added

	I am able to get the card to work if I set up the AP to use no
authentication whatsoever.  So I believe that the driver is working
correctly.  However, as the subject says, I can only get to step 2 of 4
with wpa_supplicant.  iwconfig reports:

wlan0     IEEE 802.11g  ESSID:off/any  
          Mode:Managed  Frequency:2.462GHz  Access Point:
00:00:00:00:00:00  
          Bit Rate:54Mb/s   Tx-Power:14 dBm   
          RTS thr:2347 B   Fragment thr:2346 B   
          Encryption key:off
          Power Management:off
          Link Quality:100/100  Signal level:-54 dBm  Noise level:-256
dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:17  Invalid misc:3387   Missed beacon:0

my wpa_supplicant.conf file is based off of the version linked at
http://hostap.epitest.fi/wpa_supplicant/.  My network block looks like
this:

# Only WPA-PSK is used. Any valid cipher combination is accepted.
network={
	ssid="MattToby"
	proto=WPA
	key_mgmt=WPA-PSK
	pairwise=CCMP TKIP
	group=CCMP TKIP WEP104 WEP40
	psk="TobyMatt"
	priority=2
}

Here is the output from wpa_supplicant:

# wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd


Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
Line: 242 - start of a new network block
SSID - hexdump_ascii(len=8):
     4d 61 74 74 54 6f 62 79                           MattToby        
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
PSK (ASCII passphrase) - hexdump_ascii(len=8):
     54 6f 62 79 4d 61 74 74                           TobyMatt        
priority=2
PSK (from passphrase) - hexdump(len=32): c3 f9 06 19 be 7f a2 39 83 3a
0f aa 28 
9c ce d9 c6 99 24 89 47 2a 51 37 4b 6e 49 20 cd d6 55 38
Priority group 2
   id=0 ssid='MattToby'
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 308 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 2
0: 00:09:5b:dc:c4:0e ssid='MattToby' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:09:5b:dc:c4:0e (SSID='MattToby' freq=2462
MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 
50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8c02 len=159
Custom wireless event:
'ASSOCINFO(ReqIEs=00084d617474546f6279010882848b9624b0486
c32048c129860dd050010180100dd160050f20101000050f2
RespIEs=010482848b9632088c1298
24b048606c)'
Association info event
req_ies - hexdump(len=44): 00 08 4d 61 74 74 54 6f 62 79 01 08 82 84 8b
96 24 b0
 48 6c 32 04 8c 12 98 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00
50 f2
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 69 f3
01 00 00 
00 00 00 00 00 00 00 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:09:5b:dc:c4:0e
Association event - clear replay counter
Associated to a new BSS: BSSID=00:09:5b:dc:c4:0e
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:dc:c4:0e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 06 4
9 53 d4 e9 f5 ff fc f4 b8 63 ad c5 21 4a cb 80 6a d2 e4 52 0a 10 d8 43
64 97 17 
53 08 56 20 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 0
0 00 06 49 53 d4 e9 f5 ff fc f4 b8 63 ad c5 21 4a cb 80 6a d2 e4 52 0a
10 d8 43 
64 97 17 53 08 56 20 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:09:5b:dc:c4:0e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 7b ff 6a 1e e0 e1 87 cb 45 64 c8
10 db 07
 dd 9a 24 63 cb de ed c8 11 e0 fe 6f 28 be f1 2a 3f 60
WPA: PMK - hexdump(len=32): c3 f9 06 19 be 7f a2 39 83 3a 0f aa 28 9c ce
d9 c6 9
9 24 89 47 2a 51 37 4b 6e 49 20 cd d6 55 38
WPA: PTK - hexdump(len=64): 0f 14 2d 5d 65 b2 70 9f c8 13 31 a0 a3 96 71
da 14 d
3 a5 44 c9 1c 4c df 2a 04 10 19 5c 15 6f f1 b3 2c 77 9f 03 cb f6 7e f6
a9 dc d8 
84 7c ab 59 21 2b b0 42 32 c5 d8 69 0a a3 4d f6 2e 60 22 9e
WPA: EAPOL-Key MIC - hexdump(len=16): f2 2c d3 75 4c ed 34 f3 f0 60 fb
33 77 72 
c9 d7
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b dc c4 0e 00 0c 41 61
ea 0a 88
 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 7b ff 6a 1e e0 e1
87 cb 4
5 64 c8 10 db 07 dd 9a 24 63 cb de ed c8 11 e0 fe 6f 28 be f1 2a 3f 60
00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 f2 2c d3 75 4c ed 34 f3 f0 60 fb 33 77 72 c9 d7 00 18 dd 16 00 50
f2 01 0
1 00 00 50 f2 69 f3 01 00 00 00 00 00 00 00 00 00 00
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b1a len=13
Authentication with 00:09:5b:dc:c4:0e timed out.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 308 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 2
0: 00:09:5b:dc:c4:0e ssid='MattToby' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:09:5b:dc:c4:0e (SSID='MattToby' freq=2462
MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 
50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8c02 len=159
Custom wireless event:
'ASSOCINFO(ReqIEs=00084d617474546f6279010882848b9624b0486
c32048c129860dd050010180100dd160050f20101000050f2
RespIEs=010482848b9632088c1298
24b048606c)'
Association info event
req_ies - hexdump(len=44): 00 08 4d 61 74 74 54 6f 62 79 01 08 82 84 8b
96 24 b0
 48 6c 32 04 8c 12 98 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00
50 f2
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 49 f3
01 00 0c 
3d 06 08 ff ff ff ff 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:09:5b:dc:c4:0e
Association event - clear replay counter
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:dc:c4:0e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 07 c
2 b6 ba 99 1b 29 d2 48 bf 75 90 9c c7 17 23 13 29 0b 03 9e d8 4a 36 af
62 b2 88 
1c ea 5b be f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 0
0 00 07 c2 b6 ba 99 1b 29 d2 48 bf 75 90 9c c7 17 23 13 29 0b 03 9e d8
4a 36 af 
62 b2 88 1c ea 5b be f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:09:5b:dc:c4:0e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): ac 85 4d 7c b7 ca 64 48 41 ed 11
04 44 09
 47 f4 f1 eb 1f 7a 29 95 9a 74 5f cd a9 c4 34 c4 9d 9b
WPA: PMK - hexdump(len=32): c3 f9 06 19 be 7f a2 39 83 3a 0f aa 28 9c ce
d9 c6 9
9 24 89 47 2a 51 37 4b 6e 49 20 cd d6 55 38
WPA: PTK - hexdump(len=64): c8 e2 f9 62 5d a0 08 f1 5f 69 e7 12 48 05 81
20 bd 1
3 f3 d1 b7 ca b7 02 ce 5e e0 d8 a5 6e e7 80 8c e1 2e 3d ef 2e c6 aa 07
3f 53 0d 
4c 41 09 fc 77 96 3a 93 d4 46 d2 49 3d c6 1f 3f f8 55 eb 6d
WPA: EAPOL-Key MIC - hexdump(len=16): 60 59 bd 58 9c be 9f 66 28 61 cf
dc fa 31 
32 01
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b dc c4 0e 00 0c 41 61
ea 0a 88
 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 ac 85 4d 7c b7 ca
64 48 4
1 ed 11 04 44 09 47 f4 f1 eb 1f 7a 29 95 9a 74 5f cd a9 c4 34 c4 9d 9b
00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 60 59 bd 58 9c be 9f 66 28 61 cf dc fa 31 32 01 00 18 dd 16 00 50
f2 01 0
1 00 00 50 f2 49 f3 01 00 0c 3d 06 08 ff ff ff ff 00
Wireless event: cmd=0x8c02 len=159
Custom wireless event:
'ASSOCINFO(ReqIEs=00084d617474546f6279010882848b9624b0486
c32048c129860dd050010180100dd160050f20101000050f2
RespIEs=010482848b9632088c1298
24b048606c)'
Association info event
req_ies - hexdump(len=44): 00 08 4d 61 74 74 54 6f 62 79 01 08 82 84 8b
96 24 b0
 48 6c 32 04 8c 12 98 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00
50 f2
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 49 f3
01 00 ff 
ff ff ff 00 00 00 00 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:09:5b:dc:c4:0e
Association event - clear replay counter
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:dc:c4:0e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 08 c
4 83 f1 e0 37 cc e6 99 d0 df 33 76 5e 66 84 af 2a 56 24 2c 3c 3a 62 d0
59 03 3c 
b0 3e 51 d4 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 0
0 00 08 c4 83 f1 e0 37 cc e6 99 d0 df 33 76 5e 66 84 af 2a 56 24 2c 3c
3a 62 d0 
59 03 3c b0 3e 51 d4 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:09:5b:dc:c4:0e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 00 a1 fb 70 3c b1 30 a2 0a ce 48
3d 52 38
 02 fc ba 9c c4 ea 2c 26 2c 31 a4 3f 7d 16 2c 92 32 c8
WPA: PMK - hexdump(len=32): c3 f9 06 19 be 7f a2 39 83 3a 0f aa 28 9c ce
d9 c6 9
9 24 89 47 2a 51 37 4b 6e 49 20 cd d6 55 38
WPA: PTK - hexdump(len=64): 02 49 89 d4 f6 eb b0 3a a6 7a ec 3c 57 a6 64
fa 9f 2
9 78 c4 ec 56 f8 85 fd a0 e5 80 06 55 d4 92 1d 82 aa e7 20 3d 55 5a 61
1c a7 fd 
70 ca 69 0b f1 30 6a e9 9f 98 ce c8 00 70 a4 27 1a 16 08 ad
WPA: EAPOL-Key MIC - hexdump(len=16): 15 38 00 92 f9 16 5b 40 b4 9c 21
f8 e1 f5 
1d 93
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b dc c4 0e 00 0c 41 61
ea 0a 88
 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 08 00 a1 fb 70 3c b1
30 a2 0
a ce 48 3d 52 38 02 fc ba 9c c4 ea 2c 26 2c 31 a4 3f 7d 16 2c 92 32 c8
00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 15 38 00 92 f9 16 5b 40 b4 9c 21 f8 e1 f5 1d 93 00 18 dd 16 00 50
f2 01 0
1 00 00 50 f2 49 f3 01 00 ff ff ff ff 00 00 00 00 00
Wireless event: cmd=0x8c02 len=159
Custom wireless event:
'ASSOCINFO(ReqIEs=00084d617474546f6279010882848b9624b0486
c32048c129860dd050010180100dd160050f20101000050f2
RespIEs=010482848b9632088c1298
24b048606c)'
Association info event
req_ies - hexdump(len=44): 00 08 4d 61 74 74 54 6f 62 79 01 08 82 84 8b
96 24 b0
 48 6c 32 04 8c 12 98 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00
50 f2
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 49 f3
01 00 ff 
ff ff ff 00 00 00 00 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:09:5b:dc:c4:0e
Association event - clear replay counter
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:dc:c4:0e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 09 6
b 5b 15 7e 1b ca dd af 2d a3 1a 2b 04 03 e5 fd a1 29 84 78 f1 a5 73 be
41 82 7a 
c3 ab 88 ea 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 0
0 00 09 6b 5b 15 7e 1b ca dd af 2d a3 1a 2b 04 03 e5 fd a1 29 84 78 f1
a5 73 be 
41 82 7a c3 ab 88 ea 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:09:5b:dc:c4:0e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 4d 45 77 86 e5 22 4e 06 b3 3f 5a
8c a1 91
 5b 78 e3 b4 14 77 e5 c0 a6 fb 2f 8b fe 04 21 cb 0f 1c
WPA: PMK - hexdump(len=32): c3 f9 06 19 be 7f a2 39 83 3a 0f aa 28 9c ce
d9 c6 9
9 24 89 47 2a 51 37 4b 6e 49 20 cd d6 55 38
WPA: PTK - hexdump(len=64): 65 b1 f3 7f fd 2d 27 03 cf 1e b0 3d f6 00 4a
e1 37 a
4 10 e5 21 00 fd be 55 ac b1 47 cb 86 80 d6 9f 49 e5 20 e2 45 cb 3b 2f
88 fc 7e 
07 e2 de 8f 24 e6 28 7d d6 a4 33 dc b3 a5 fb cf 7b 13 80 6d
WPA: EAPOL-Key MIC - hexdump(len=16): d7 b2 3d 57 e0 8b 2c 51 7b a2 dc
76 42 df 
12 c0
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b dc c4 0e 00 0c 41 61
ea 0a 88
 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 09 4d 45 77 86 e5 22
4e 06 b
3 3f 5a 8c a1 91 5b 78 e3 b4 14 77 e5 c0 a6 fb 2f 8b fe 04 21 cb 0f 1c
00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 d7 b2 3d 57 e0 8b 2c 51 7b a2 dc 76 42 df 12 c0 00 18 dd 16 00 50
f2 01 0
1 00 00 50 f2 49 f3 01 00 ff ff ff ff 00 00 00 00 00
Wireless event: cmd=0x8c02 len=159
Custom wireless event:
'ASSOCINFO(ReqIEs=00084d617474546f6279010882848b9624b0486
c32048c129860dd050010180100dd160050f20101000050f2
RespIEs=010482848b9632088c1298
24b048606c)'
Association info event
req_ies - hexdump(len=44): 00 08 4d 61 74 74 54 6f 62 79 01 08 82 84 8b
96 24 b0
 48 6c 32 04 8c 12 98 60 dd 05 00 10 18 01 00 dd 16 00 50 f2 01 01 00 00
50 f2
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 49 f3
01 00 ff 
ff ff ff 00 00 00 00 00
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:09:5b:dc:c4:0e
Association event - clear replay counter
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:dc:c4:0e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 0a 5
f 74 40 f8 09 f8 bd 79 e0 1b 08 16 07 6c d9 8a ce 90 de 45 a1 c7 5e 34
e1 7e c6 
8d 8a 85 a6 b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 0
0 00









More information about the Hostap mailing list