wpa_supplicant and Michael MIC failures
Torsten Wolf
t.wolf
Thu Jul 21 11:57:50 PDT 2005
Hi!
While WEP encryption works fine, I have not been able to set up WPA with
my laptop and AP yet. The hardware is an internal Atheros AR5211 device
in an IBM Thinkpad and a DLink 624 router. The kernel is 2.6.10 (Debian
source package). Madwifi drivers were fetched via CVS two days ago and
wpa_supplicant is 0.4.3 (built against the correct madwifi headers). I
followed the instructions in
http://madwifi.sourceforge.net/dokuwiki/doku.php?id=wpa_802.11i to set
up the wpa-psk client and added the information in the router
configuration as well. However, when I run
wpa_supplicant -w -dd -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi
the association fails after several seconds. The router log lists the
association, but wpa_cli immediately complains about a Michael MIC
failure. I checked this archive and found nothing that would help me, so
your help is greatly appreciated. Did I make errors in the configuration
file? Is my hardware not suited for WPA? Is the driver buggy? Michael
MIC is available as a kernel module, but loading michael_mic had no
effect.
I've listed the content of /etc/wpasupplicant.conf as well as the output
of wpa_supplicant below. Hopefully, I did not cut off the important
stuff.
Regards,
Torsten
***** /etc/wpa_supplicant.conf *****
ctrl_interface=/var/run/wpa_supplicant # for wpa_cli support
#ctrl_interface_group=0
network={
scan_ssid=1
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
ssid="mySSID"
#psk="secretpassphrase"
psk=e5570d7249baf19bc59fdc0218d9ca5b7b27bb3d81a7eb653ee8cf0d9bf66515
}
***** wpa_supplicant -w -dd -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi
ioctl[SIOCSIWPMKSA]: Operation not supported
Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 4 - start of a new network block
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
ssid - hexdump_ascii(len=9):
53 75 6d 65 72 6c 61 6e 64 mySSID
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='mySSID'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:05:4e:42:39:70
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=9):
53 75 6d 65 72 6c 61 6e 64 mySSID
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b19 len=12
Received 653 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:11:95:68:2f:c2 ssid='mySSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected
Trying to associate with 00:11:95:68:2f:c2 (SSID='mySSID' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:95:68:2f:c2
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:11:95:68:2f:c2
No keys have been configured - skip key clearing
Associated with 00:11:95:68:2f:c2
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:11:95:68:2f:c2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ab b8 68 4a e7 59 d7 8d 4d 71 e2 ee 29 71 12 a2 3b c8 62 82 8d 65 1d 34 6b fa 07 0b 4b 58 27 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ab b8 68 4a e7 59 d7 8d 4d 71 e2 ee 29 71 12 a2 3b c8 62 82 8d 65 1d 34 6b fa 07 0b 4b 58 27 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:11:95:68:2f:c2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 2f 67 2f 3c 74 cf 37 c4 ce 42 3e ac b7 80 44 98 94 b0 20 aa ee 5d 2c 92 0e 94 77 ca 74 aa fe 18
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 2f 67 2f 3c 74 cf 37 c4 ce 42 3e ac b7 80 44 98 94 b0 20 aa ee 5d 2c 92 0e 94 77 ca 74 aa fe 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 bd 21 e5 15 36 0b 14 33 71 7a e8 bc 93 8e 0f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:11:95:68:2f:c2
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 ab b8 68 4a e7 59 d7 8d 4d 71 e2 ee 29 71 12 a2 3b c8 62 82 8d 65 1d 34 6b fa 07 0b 4b 58 27 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f db 59 50 f2 fa e6 ef 02 92 c9 3d 22 2b 78 fe 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 ab b8 68 4a e7 59 d7 8d 4d 71 e2 ee 29 71 12 a2 3b c8 62 82 8d 65 1d 34 6b fa 07 0b 4b 58 27 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f db 59 50 f2 fa e6 ef 02 92 c9 3d 22 2b 78 fe 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:11:95:68:2f:c2 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=113): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 76 67 fb d4 d5 cc 1e 2d 01 21 1d ec eb c2 d8 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Wireless event: cmd=0x8c02 len=85
Custom wireless event: 'MLME-MICHAELMICFAILURE.indication(keyid=4 unicast addr=00:05:4e:42:39:70)'
Michael MIC failure detected
WPA: Sending EAPOL-Key Request (error=1 pairwise=1 ptk_set=1 len=113)
WPA: TX EAPOL-Key - hexdump(len=113): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 5f fe 0d 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 b7 0b f3 33 01 8a ae 05 b6 69 46 49 f4 3b a6 00 00
Authentication with 00:11:95:68:2f:c2 timed out.
Added BSSID 00:11:95:68:2f:c2 into blacklist
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_madwifi_disassociate
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:11:95:68:2f:c2 blacklist count incremented to 2
State: SCANNING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 432 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:11:95:68:2f:c2 ssid='mySSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
skip - blacklisted
1: 00:02:6f:33:ba:4a ssid='wlan.magniviertel.de_kirchturm' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 00:11:95:68:2f:c2 from blacklist (clear)
Selecting BSS from priority group 0
0: 00:11:95:68:2f:c2 ssid='mySSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected
Trying to associate with 00:11:95:68:2f:c2 (SSID='mySSID' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: DISCONNECTED -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:95:68:2f:c2
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:11:95:68:2f:c2
No keys have been configured - skip key clearing
Associated with 00:11:95:68:2f:c2
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:11:95:68:2f:c2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 a3 a3 67 26 0d 76 45 7e 6e 29 5c d8 fc 0b c3 a6 1d ea 16 5b 02 54 05 76 2f 66 20 ca 1d 0d b2 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 a3 a3 67 26 0d 76 45 7e 6e 29 5c d8 fc 0b c3 a6 1d ea 16 5b 02 54 05 76 2f 66 20 ca 1d 0d b2 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:11:95:68:2f:c2 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): bd e8 d9 93 8d ce c7 9d e4 4e 0d 79 b9 a2 d3 30 02 e2 35 0c e4 3b 58 c4 51 4b 84 12 b8 c9 3e c4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 bd e8 d9 93 8d ce c7 9d e4 4e 0d 79 b9 a2 d3 30 02 e2 35 0c e4 3b 58 c4 51 4b 84 12 b8 c9 3e c4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 4a 13 f0 e2 7f 0a 35 f9 c8 ec 8e 88 14 b1 d3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:11:95:68:2f:c2
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 a3 a3 67 26 0d 76 45 7e 6e 29 5c d8 fc 0b c3 a6 1d ea 16 5b 02 54 05 76 2f 66 20 ca 1d 0d b2 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af d1 07 bb 6d cf b6 5d b7 35 96 8d 4e 7e 19 12 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 a3 a3 67 26 0d 76 45 7e 6e 29 5c d8 fc 0b c3 a6 1d ea 16 5b 02 54 05 76 2f 66 20 ca 1d 0d b2 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af d1 07 bb 6d cf b6 5d b7 35 96 8d 4e 7e 19 12 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:11:95:68:2f:c2 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=113): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 84 42 39 c0 95 d8 3b 61 c0 2b ba 29 98 98 53 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Wireless event: cmd=0x8c02 len=85
Custom wireless event: 'MLME-MICHAELMICFAILURE.indication(keyid=4 unicast addr=00:05:4e:42:39:70)'
Michael MIC failure detected
WPA: Sending EAPOL-Key Request (error=1 pairwise=1 ptk_set=1 len=113)
WPA: TX EAPOL-Key - hexdump(len=113): 00 11 95 68 2f c2 00 05 4e 42 39 70 88 8e 01 03 00 5f fe 0d 09 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 59 f9 64 bd 76 a8 26 e9 5c 23 82 a1 24 79 9c 00 00
TKIP countermeasures started
wpa_driver_madwifi_set_countermeasures: enabled=1
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_madwifi_deauthenticate
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:11:95:68:2f:c2 into blacklist
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
...
More information about the Hostap
mailing list