WPA-PSK problem with Q-TEC 54G and MSI AP54G

Freek de Kruijf f.de.kruijf
Wed May 18 14:20:05 PDT 2005


I have a Toshiba laptop with SuSE 9.2, ndiswrapper with PCMCIA Q-TEC 
Wireless 54G (chipset: Marvell W8300), driver mrv8k51.sys and an Access 
Point MSI AP54G. I am using wpa_supplicant v0.3.8

I have this combination working with WEP 128bit, not using wpa_supplicant.

I tried to get this combination working with WPA-PSK which is supported by 
the AP. The AP only has the option WPA-PSK with a passphrase and Encryption 
type TKIP. Logging in the AP is rather limited. See the following 2 lines.
2005/5/18 16:01:18  System   802.1x authenticator started
2005/5/18 17:08:33  Security WPA-PSK four-way handshake failed for 
00:03:2f:24:a7:9b

The wpa configuration file is:
# configuartion file for wpa_supplicant
# this is to use WPA-PSK for connection with a wireless AP (access point)
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=audio
eapol_version=1
ap_scan=1
#Home network
network={
	ssid="FGHIJKL"
	priority=2
	scan_ssid=0
	proto=WPA RSN
	key_mgmt=WPA-PSK
	psk="199966669999666999999669666666"
	pairwise=TKIP
	group=TKIP
}

wpa_supplicant is started with the following command:
wpa_supplicant -iwlan0 -Dndiswrapper -c/etc/wpa_supplicant.conf -dd > 
supplicant.txt

The wpa_supplicant process is closed with <Ctrl>C after only about 10 
seconds. The output is a large file because the process repeats its actions 
rather fast.

The first part of the output file is as follows:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 
'ndiswrapper'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=17 (from group name 'audio')
eapol_version=1
ap_scan=1
Line: 10 - start of a new network block
ssid - hexdump_ascii(len=7):
     46 47 48 49 4a 4b 4c                              FGHIJKL         
priority=2 (0x2)
scan_ssid=0 (0x0)
proto: 0x3
key_mgmt: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=30): [REMOVED]
pairwise: 0x8
group: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 2
   id=0 ssid='FLM42BJ'
Initializing interface (2) 'wlan0'
Own MAC address: 00:03:2f:24:a7:9b
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 311 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 2
0: 00:11:09:08:07:5e ssid='FGHIJKL' wpa_ie_len=26 rsn_ie_len=0
   selected
Trying to associate with 00:11:09:08:07:5e (SSID='FGHIJKL' freq=2442 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 
00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8c02 len=215
Custom wireless event: 
'ASSOCINFO(ReqIEs=0007464c4d3432424a010882848b960c18304832041224606cdd050010180100dd180050f20101000050f202 
RespIEs=010482848b9632080c1218243048606c0482848b960301072a01003200000000000000000000000000000000)'
Association info event
req_ies - hexdump(len=44): 00 07 46 4c 4d 34 32 42 4a 01 08 82 84 8b 96 0c 
18 30 48 32 04 12 24 60 6c dd 05 00 10 18 01 00 dd 18 00 50 f2 01 01 00 00 
50 f2 02
resp_ies - hexdump(len=44): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 
04 82 84 8b 96 03 01 07 2a 01 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
Truncated IE in assoc_info - hexdump(len=12): dd 18 00 50 f2 01 01 00 00 50 
f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:09:08:07:5e
Association event - clear replay counter
Associated to a new BSS: BSSID=00:11:09:08:07:5e
No keys have been configured - skip key clearing
Associated with 00:11:09:08:07:5e
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:11:09:08:07:5e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 
01 90 03 f5 e5 a6 44 e7 fe 19 e6 ca 7d 7d df 5f 33 9a 8c 22 36 68 1d 84 3a 
27 b9 91 87 29 6d 43 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 
00 00 00 01 90 03 f5 e5 a6 44 e7 fe 19 e6 ca 7d 7d df 5f 33 9a 8c 22 36 68 
1d 84 3a 27 b9 91 87 29 6d 43 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:11:09:08:07:5e (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): c0 46 87 52 91 ab 7c d9 ab 35 6f 8f 
3d 6f 38 99 15 7d 62 e5 78 bc 5f 45 9a 69 59 de be 2f b7 d8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 11 58 a9 21 ab 2f ec 2a 1f a1 04 f7 16 
07 32 18
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 11 09 08 07 5e 00 03 2f 24 a7 
9b 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 c0 46 87 52 91 
ab 7c d9 ab 35 6f 8f 3d 6f 38 99 15 7d 62 e5 78 bc 5f 45 9a 69 59 de be 2f 
b7 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 11 58 a9 21 ab 2f ec 2a 1f a1 04 f7 16 07 32 18 
00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 
02
Wireless event: cmd=0x8c02 len=215
Custom wireless event: 
'ASSOCINFO(ReqIEs=0007464c4d3432424a010882848b960c18304832041224606cdd050010180100dd180050f20101000050f202 
RespIEs=010482848b9632080c1218243048606c0482848b960301072a01003200000000000000000000000000000000)'
Association info event
req_ies - hexdump(len=44): 00 07 46 4c 4d 34 32 42 4a 01 08 82 84 8b 96 0c 
18 30 48 32 04 12 24 60 6c dd 05 00 10 18 01 00 dd 18 00 50 f2 01 01 00 00 
50 f2 02
resp_ies - hexdump(len=44): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 
04 82 84 8b 96 03 01 07 2a 01 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
Truncated IE in assoc_info - hexdump(len=12): dd 18 00 50 f2 01 01 00 00 50 
f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:09:08:07:5e
Association event - clear replay counter
Associated with 00:11:09:08:07:5e
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:11:09:08:07:5e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 
02 90 03 f5 e5 a6 44 e7 fe 19 e6 ca 7d 7d df 5f 33 9a 8c 22 36 68 1d 84 3a 
27 b9 91 87 29 6d 43 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 
00 00 00 02 90 03 f5 e5 a6 44 e7 fe 19 e6 ca 7d 7d df 5f 33 9a 8c 22 36 68 
1d 84 3a 27 b9 91 87 29 6d 43 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:11:09:08:07:5e (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 6f dc c2 1b 11 3d 7e 9e ff 44 f4 0b 
78 75 54 72 e2 75 5c 30 64 af 38 e6 08 8c ba 40 af 3f f4 76
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 7e 4f f4 20 62 b5 d0 43 1e 39 6f de 8a 
ad 17 3f
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 11 09 08 07 5e 00 03 2f 24 a7 
9b 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 6f dc c2 1b 11 
3d 7e 9e ff 44 f4 0b 78 75 54 72 e2 75 5c 30 64 af 38 e6 08 8c ba 40 af 3f 
f4 76 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 7e 4f f4 20 62 b5 d0 43 1e 39 6f de 8a ad 17 3f 
00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 
02
Wireless event: cmd=0x8c02 len=215
Custom wireless event: 
'ASSOCINFO(ReqIEs=0007464c4d3432424a010882848b960c18304832041224606cdd050010180100dd180050f20101000050f202 
RespIEs=010482848b9632080c1218243048606c0482848b960301072a01003200000000000000000000000000000000)'
Association info event
req_ies - hexdump(len=44): 00 07 46 4c 4d 34 32 42 4a 01 08 82 84 8b 96 0c 
18 30 48 32 04 12 24 60 6c dd 05 00 10 18 01 00 dd 18 00 50 f2 01 01 00 00 
50 f2 02
resp_ies - hexdump(len=44): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 
04 82 84 8b 96 03 01 07 2a 01 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
Truncated IE in assoc_info - hexdump(len=12): dd 18 00 50 f2 01 01 00 00 50 
f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:11:09:08:07:5e
Association event - clear replay counter
Associated with 00:11:09:08:07:5e
Setting authentication timeout: 10 sec 0 usec

the above seams to repeat itself indefinitely.

Anybody who knows how I should proceed.

-- 
Freek




More information about the Hostap mailing list