can not connect to Cisco 1231 with WPA-PSK(wpa_supplicant 0.3.8 and madwifi)
Michael Reilly
michaelr
Mon Feb 14 20:13:19 PST 2005
Looks like the problem I've been having for several months. wpa_supplicant +
madwifi doesn't work for me with a Cisco AP in 802.11b or 802.11g mode.
michael
YenJung Chang wrote:
> Hi, List,
>
> I can not connect to Cisco 1231 with WPA-PSK.
>
> Following is my configure file, wpa_supplicant.conf, and output message.
> Any advice is appreciated.
>
> I used wpa_supplicant 0.3.8 and madwifi.
>
> --------wpa_supplicant.conf-------------
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> network={
> proto=WPA
> ssid="Cisco1231g"
> psk="12345678"
> auth_alg=OPEN
> key_mgmt=WPA-PSK
> pairwise=TKIP
> group=TKIP
> }
> ---------------------------------------------------------
>
> --------output message-----------
> Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'default'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> Priority group 0
> id=0 ssid='Cisco1231g'
> Initializing interface (2) 'ath0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Own MAC address: 00:30:ab:24:fc:ef
> wpa_driver_madwifi_set_wpa: enabled=1
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_set_countermeasures: enabled=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> Setting scan request: 0 sec 100000 usec
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 4095 bytes of scan results (18 BSSes)
> Scan results: 18
> Selecting BSS from priority group 0
> 0: 00:0f:b5:36:c7:fd ssid='spencer-602v3' wpa_ie_len=0 rsn_ie_len=22
> skip - SSID mismatch
> 1: 00:0f:b5:0f:27:df ssid='*spencer*' wpa_ie_len=24 rsn_ie_len=0
> skip - SSID mismatch
> 2: 00:09:5b:f7:14:8c ssid='3067' wpa_ie_len=24 rsn_ie_len=0
> skip - SSID mismatch
> 3: 00:03:7f:bf:06:f4 ssid='test goose' wpa_ie_len=26 rsn_ie_len=0
> skip - SSID mismatch
> 4: 00:0f:b5:35:4f:19 ssid='wifi' wpa_ie_len=0 rsn_ie_len=22
> skip - SSID mismatch
> 5: 00:12:00:d7:4f:20 ssid='Cisco1231g' wpa_ie_len=26 rsn_ie_len=0
> selected
> Trying to associate with 00:12:00:d7:4f:20 (SSID='Cisco1231g' freq=2462 MHz)
> Cancelling scan request
> Automatic auth_alg selection: 0x1
> Overriding auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
> 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> wpa_driver_madwifi_associate
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> Wireless event: cmd=0x8b1a len=23
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:12:00:d7:4f:20
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:12:00:d7:4f:20
> No keys have been configured - skip key clearing
> Associated with 00:12:00:d7:4f:20
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:12:00:d7:4f:20
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
> EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:12:00:d7:4f:20 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Renewed SNonce - hexdump(len=32): df df 5b 9d 46 26 d7 ca 57 89
> 44 08 50 4c 9c 4f 9d a8 95 e8 33 37 76 55 c7 e6 9b b7 ee b2 4c b4
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: EAPOL-Key MIC - hexdump(len=16): 4a 6a c1 75 b3 8e 72 6c af 64 eb
> eb ea 1a 2e 96
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:12:00:d7:4f:20
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=121
> EAPOL-Key type=254
> WPA: RX message 3 of 4-Way Handshake from 00:12:00:d7:4f:20 (ver=1)
> WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02
> 01 00 00 50 f2 02 01 00 00 50 f2 02 28 00
> WPA: Sending EAPOL-Key 4/4
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
> RX EAPOL from 00:12:00:d7:4f:20
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=127
> EAPOL-Key type=254
> WPA: RX message 1 of Group Key Handshake from 00:12:00:d7:4f:20 (ver=1)
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 3e 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: Key negotiation completed with 00:12:00:d7:4f:20 [PTK=TKIP GTK=TKIP]
> Cancelling authentication timeout
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RX EAPOL from 00:12:00:d7:4f:20
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=127
> EAPOL-Key type=254
> WPA: RX message 1 of Group Key Handshake from 00:12:00:d7:4f:20 (ver=1)
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 3e 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: Group rekeying completed with 00:12:00:d7:4f:20 [GTK=TKIP]
> RX EAPOL from 00:12:00:d7:4f:20
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=127
> EAPOL-Key type=254
> WPA: RX message 1 of Group Key Handshake from 00:12:00:d7:4f:20 (ver=1)
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 3e 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: Group rekeying completed with 00:12:00:d7:4f:20 [GTK=TKIP]
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> Setting scan request: 0 sec 100000 usec
> Added BSSID 00:12:00:d7:4f:20 into blacklist
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> Disconnect event - remove keys
> ------------------------------------------------------------------------------
>
> Regards,
> YJ.
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap
--
---- ---- ----
Michael Reilly michaelr at cisco.com
Cisco Systems, California
More information about the Hostap
mailing list