回复: Re: Re?? Re: wpa_supplicant problems with authentication

段宁 duanng88
Thu Jul 7 01:25:36 PDT 2005


Thanks.
I have reconfiged the hostapd and make the authentication ok.
It seems that the supplicant have been right authenticated.
But I still cannot access the network ,I event cannot ping the AP  and other host in the Lan.
why ?
the debug message is as follow: 

...
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:60:b3:64:c3:a6
wpa_driver_hostap_set_wpa: enabled=1
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_countermeasures: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=7):
     63 6e 69 73 39 31 32                              cnis912         

......
SSL: 1842 bytes left to be sent out (of total 1842 bytes)
SSL: sending 1398 bytes, more fragments will follow
EAP: method process -> ignore=FALSE methodState=CONT decision=COND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=712
WPA: EAPOL frame (type 0) discarded, not a Key frame
GHJ RF Hexdump : (num=004) 00 60 b3 64 c3 a6 00 60 b3 64 c3 2d 88 8e 
RX EAPOL from 00:60:b3:64:c3:2d
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=4
EAP: EAP entering state METHOD
EAP-TLS: Received packet(len=6) - Flags 0x00
SSL: 444 bytes left to be sent out (of total 1842 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=COND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
GHJ RF Hexdump : (num=005) 00 60 b3 64 c3 a6 00 60 b3 64 c3 2d 88 8e 
RX EAPOL from 00:60:b3:64:c3:2d
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=5
EAP: EAP entering state METHOD
EAP-TLS: Received packet(len=69) - Flags 0x80
EAP-TLS: TLS Message Length: 59
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No data to be sent out
EAP-TLS: Done

....
WPA: RX message 1 of 4-Way Handshake from 00:60:b3:64:c3:2d (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: Renewed SNonce - hexdump(len=32): 29 f7 f4 ce 50 1e b9 9c 7c b6 9a df 74 8a a6 e1 87 b1 d8 6a 33 58 77 b8 28 22 73 19 2c ff 0e 80
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 40 ff 63 ec c5 96 34 25 a0 38 3e 07 a9 e8 de 0f
WPA: Sending EAPOL-Key 2/4
GHJ RF Hexdump : (num=008) 00 60 b3 64 c3 a6 00 60 b3 64 c3 2d 88 8e 
RX EAPOL from 00:60:b3:64:c3:2d
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=119
  EAPOL-Key type=254
WPA: RX message 3 of 4-Way Handshake from 00:60:b3:64:c3:2d (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
GHJ RF Hexdump : (num=009) 00 60 b3 64 c3 a6 00 60 b3 64 c3 2d 88 8e 
RX EAPOL from 00:60:b3:64:c3:2d
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=127
  EAPOL-Key type=254
WPA: RX message 1 of Group Key Handshake from 00:60:b3:64:c3:2d (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 01 00 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:60:b3:64:c3:2d [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
 

Jouni Malinen <jkmaline at cc.hut.fi> ???
On Thu, Jul 07, 2005 at 09:33:49AM +0800, ???? wrote:

> wheather the following config make the time out error in the wpa_supplicant. the error message is showed below the config 

Your debug log did not include the beginning of the connection, so I

should happen after the EAP-Success frame is received.






		
---------------------------------
DO YOU YAHOO!?
  ????G??????????????????? 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20050707/df06023d/attachment.htm 



More information about the Hostap mailing list