wpa_supplicant WPA crashes Sitecom WL-114 router

Lorenzo Colitti lorenzo
Wed Mar 23 16:49:24 PST 2005


Hi,

I am trying to use wpa_supplicant to connect to a Sitecom WL-114 AP 
using WPA. Authentication seems to go fine, but I can't send any packets 
through (except maybe a single one if I'm lucky just after authenticating).

I suspect that the AP is crashing since just after authentication 
completes it stops pinging from the wired interface for about ten 
seconds and when it comes back up the clock has been reset to its 
default value and the logs are empty.

Is there anything I can do to figure out what is causing this?

I am using latest wpa_supplicant CVS with latest madwifi CVS.

This is what I have in wpa_supplicant.conf:

> network={
>         ssid="VDM"
>         psk="xxx"
> }

and this is what wpa_supplicant says:

> # devel/hostap/wpa_supplicant/wpa_supplicant -dddd -i ath0 -D madwifi -c /etc/wpa_supplicant.conf
> Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> [...]
> Line: 273 - start of a new network block
> ssid - hexdump_ascii(len=3):
>      56 44 4d                                          VDM
> PSK (ASCII passphrase) - hexdump_ascii(len=32): [REMOVED]
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
> [...]
>    id=3 ssid='VDM'
> Initializing interface (2) 'ath0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> ioctl[SIOCSIWPMKSA]: Operation not supported
> Own MAC address: 00:11:0a:81:6b:64
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_set_countermeasures: enabled=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> Setting scan request: 0 sec 100000 usec
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 755 bytes of scan results (4 BSSes)
> Scan results: 4
> Selecting BSS from priority group 0
> 0: 00:0c:f6:10:75:a9 ssid='VDM' wpa_ie_len=24 rsn_ie_len=0
>    skip - SSID mismatch
>    skip - SSID mismatch
>    skip - SSID mismatch
>    selected
> Trying to associate with 00:0c:f6:10:75:a9 (SSID='VDM' freq=2427 MHz)
> Cancelling scan request
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> State: SCANNING -> ASSOCIATING
> wpa_driver_madwifi_associate
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> Wireless event: cmd=0x8b1a len=16
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:0c:f6:10:75:a9
> State: ASSOCIATING -> ASSOCIATED
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:0c:f6:10:75:a9
> No keys have been configured - skip key clearing
> Associated with 00:0c:f6:10:75:a9
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> RX EAPOL from 00:0c:f6:10:75:a9
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 d0 9f e5 cf 6a d5 1d c4 72 c0 86 97 15 dc 3f 88 f0 d9 9e ef 1b db 08 68 ba 6f 11 04 5e 24 83 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 d0 9f e5 cf 6a d5 1d c4 72 c0 86 97 15 dc 3f 88 f0 d9 9e ef 1b db 08 68 ba 6f 11 04 5e 24 83 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:0c:f6:10:75:a9 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02WPA: Renewed SNonce - hexdump(len=32): 76 fe 63 75 2a 3f 01 b8 19 6f f3 c6 37 5a a9 9a 28 fc 4d 58 9c c3 11 0c fd 75 af 5d 32 2a 4a 53
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=137): 00 0c f6 10 75 a9 00 11 0a 81 6b 64 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 76 fe 63 75 2a 3f 01 b8 19 6f f3 c6 37 5a a9 9a 28 fc 4d 58 9c c3 11 0c fd 75 af 5d 32 2a 4a 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 19 ae d4 d8 77 75 3b 90 d7 1e ce 05 3e 91 95 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:0c:f6:10:75:a9
> RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 06 d0 9f e5 cf 6a d5 1d c4 72 c0 86 97 15 dc 3f 88 f0 d9 9e ef 1b db 08 68 ba 6f 11 04 5e 24 83 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e ac cf 02 60 69 97 94 7d 10 1a a9 32 30 f6 44 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 06 d0 9f e5 cf 6a d5 1d c4 72 c0 86 97 15 dc 3f 88 f0 d9 9e ef 1b db 08 68 ba 6f 11 04 5e 24 83 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e ac cf 02 60 69 97 94 7d 10 1a a9 32 30 f6 44 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 3 of 4-Way Handshake from 00:0c:f6:10:75:a9 (ver=1)
> WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=113): 00 0c f6 10 75 a9 00 11 0a 81 6b 64 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6e 93 a4 53 7d 8a 4f 5d f0 b1 29 e9 3b cc c5 98 00 00
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> Wireless event: cmd=0x8c02 len=81
> Custom wireless event: 'MLME-REPLAYFAILURE.indication(keyid=0 unicast addr=00:11:0a:81:6b:64)'
> RX EAPOL from 00:0c:f6:10:75:a9
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 08 5e 37 dc e7 59 c3 e7 70 80 f3 64 d9 85 22 97 a8 58 11 be 3f c5 c5 42 cf a7 40 1f eb fb d9 e5 c4 58 11 be 3f c5 c5 42 cf a7 40 1f eb fb d9 e5 c6 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 eb d3 2f 2a 8d 16 3d 73 ba f1 5d ac 78 c7 c4 00 20 08 39 b3 25 20 02 21 ec fd 9e 7c 88 f3 a6 d8 3e d6 32 64 9c 43 49 15 df 3c 5a 49 cd 11 c7 7c 7a
> IEEE 802.1X RX: version=1 type=3 length=127
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 08 5e 37 dc e7 59 c3 e7 70 80 f3 64 d9 85 22 97 a8 58 11 be 3f c5 c5 42 cf a7 40 1f eb fb d9 e5 c4 58 11 be 3f c5 c5 42 cf a7 40 1f eb fb d9 e5 c6 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 eb d3 2f 2a 8d 16 3d 73 ba f1 5d ac 78 c7 c4 00 20 08 39 b3 25 20 02 21 ec fd 9e 7c 88 f3 a6 d8 3e d6 32 64 9c 43 49 15 df 3c 5a 49 cd 11 c7 7c 7a
> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> WPA: RX message 1 of Group Key Handshake from 00:0c:f6:10:75:a9 (ver=1)
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=1 tx=0).
> WPA: RSC - hexdump(len=6): 13 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=113): 00 0c f6 10 75 a9 00 11 0a 81 6b 64 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 75 eb ed bf 35 c5 ea e8 32 5d 99 2c 7e 34 89 00 00
> WPA: Key negotiation completed with 00:0c:f6:10:75:a9 [PTK=TKIP GTK=TKIP]
> Cancelling authentication timeout
> State: GROUP_HANDSHAKE -> COMPLETED
> Connection to 00:0c:f6:10:75:a9 completed (auth)
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE

As soon as this message appears, the router stops pinging on the wired 
interface for a few seconds, as if it had crashed and were resetting 
itself. After about ten seconds, it starts pinging again and I get the 
following:

> Wireless event: cmd=0x8c02 len=83
> Custom wireless event: 'MLME-REPLAYFAILURE.indication(keyid=1 broadcast addr=ff:ff:ff:ff:ff:ff)'
> Wireless event: cmd=0x8c02 len=83
> Custom wireless event: 'MLME-REPLAYFAILURE.indication(keyid=1 broadcast addr=ff:ff:ff:ff:ff:ff)'
> EAPOL: startWhen --> 0
> EAPOL: idleWhile --> 0

Any ideas?


Cheers,
Lorenzo




More information about the Hostap mailing list