Can't authenticate: WPA, RaLink 2500 (NdisWrapper), SpeedTouch 580 router

Stefan gentoopower
Thu Apr 13 06:55:14 PDT 2006



Check if your router is broadcasting it's ssid and remove:

scan_ssid=1

from your conf

Neil Smith wrote:
> Yet another plea for help... I can't get my wireless link to authenticate when
>  using wpa_supplicant.  
>
> My machine's running FC 3 (2.6.10-1.770_FC3smp kernel, in case you're
>  interested).
>
> I've got a Belkin Wireless G Desktop card (RaLink 2500 chipset, PCI bus)
>  working under NdisWrapper 1.13.  The wireless hub is a Thomson SpeedTouch 580
>  wireless router.  The wireless link works perfectly when the router is
>  configured with "No security".
>
> I've downloaded wpa_supplicant 0.4.8 and compiled from source (the .config
>  file is below) then copied the executables to /usr/local/bin.  I use
>  wpa_passphrase to generate the WPA key:
>
> [root at temujin ~]# wpa_passphrase IDNET <keyphrase here>
> network={
>         ssid="IDNET"
>         #psk="<keyphrase"
>         psk=0c34f..long key ...758497bdce1d2f
> }
>
> and use that as the basis of /etc/wpa_supplicant.conf (again, below).
>
> I then give the commands...
>
> [root at temujin ~]# ifdown wlan0
> [[ Set router to use WPA encryption ]]
> [root at temujin ~]# ifconfig wlan0 up
> [root at temujin ~]# wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd
>
> ...and it all goes horribly wrong.  wpa_supplicant gets to the 4-way handshake
>  stage and then gives up.  If I omit the -Dndiswrapper option (or use -Dwext),
>  things don't even get to the 4-way handshake stage.  
>
> Yes, the passphrases are identical on both the router and the Linux box 
> (I've tried a few alternatives).  The router is using TKIP encryption.
>
>
> Can anyone give any suggestions as to what I should do to get this working?
>
> (There was something in this list's archives about problems with this router 
> having different MAC addresses for the wireless connection and the WPA
> authentication, e.g. the debug lines...
>
> Associated to a new BSS: BSSID=00:11:f5:89:f7:57
> ...
> RX EAPOL from 00:0e:50:b2:b9:f2
>
> ...but I couldn't find if that was either resolved or relevant.)
>
>
> Thanks,
>
> Neil.
>
> --------------
> .config for compiling: 
>
> CONFIG_DRIVER_NDISWRAPPER=y
> CONFIG_DRIVER_WEXT=y
> CONFIG_IEEE8021X_EAPOL=y
> CONFIG_EAP_MD5=y
> CONFIG_EAP_MSCHAPV2=y
> CONFIG_EAP_TLS=y
> CONFIG_EAP_PEAP=y
> CONFIG_EAP_TTLS=y
> CONFIG_EAP_GTC=y
> CONFIG_EAP_OTP=y
> CONFIG_EAP_LEAP=y
> CONFIG_PKCS12=y
> CONFIG_CTRL_IFACE=y
> CONFIG_BACKEND=file
>
> --------------
> /etc/wpa_supplicant.conf: 
>
> ctrl_interface=/var/run/wpa_supplicant
>
> network={
>         ssid="IDNET"
>         key_mgmt=WPA-PSK
>         scan_ssid=1
>         proto=WPA
>         pairwise=TKIP
>         group=TKIP
>         #psk="<pass phrase>"
>         psk=0c34f...rest of key...dce1d2f
> }
>
>
> --------------
> Results of wpa_supplicant -Dndiswrapper -iwlan0 -c/etc/wpa_supplicant.conf -dd:
>
> Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'ndiswrapper' ctrl_interface 'N/A'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 4 - start of a new network block
> ssid - hexdump_ascii(len=5):
>      49 44 4e 45 54                                    IDNET           
> key_mgmt: 0x2
> scan_ssid=1 (0x1)
> proto: 0x1
> pairwise: 0x8
> group: 0x8
> PSK - hexdump(len=32): [REMOVED]
> Priority group 0
>    id=0 ssid='IDNET'
> Initializing interface (2) 'wlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
> Own MAC address: 00:11:50:90:bd:f5
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> Setting scan request: 0 sec 100000 usec
> Added interface wlan0
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=5):
>      49 44 4e 45 54                                    IDNET           
> Scan timeout - try to get results
> Received 305 bytes of scan results (1 BSSes)
> Scan results: 1
> Selecting BSS from priority group 0
> 0: 00:11:f5:89:f7:57 ssid='IDNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
> Trying to associate with 00:11:f5:89:f7:57 (SSID='IDNET' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> State: SCANNING -> ASSOCIATING
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> Added BSSID 00:00:00:00:00:00 into blacklist
> State: ASSOCIATING -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8c02 len=205
> Custom wireless event: 'ASSOCINFO(ReqIEs=000549444e4554010c82848b962430486c0c121860dd160050f20101000050f20201000050f20201000050f202 RespIEs=010c82848b962430486c0c121860dd160050f20101000050f20201000050f20201000050f202)'
> Association info event
> req_ies - hexdump(len=45): 00 05 49 44 4e 45 54 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> resp_ies - hexdump(len=38): 01 0c 82 84 8b 96 24 30 48 6c 0c 12 18 60 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:11:f5:89:f7:57
> State: DISCONNECTED -> ASSOCIATED
> Associated to a new BSS: BSSID=00:11:f5:89:f7:57
> No keys have been configured - skip key clearing
> Associated with 00:11:f5:89:f7:57
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:0e:50:b2:b9:f2
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Renewed SNonce - hexdump(len=32): e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 e3 cc 13 66 44 23 75 da e5 cc a3 d5 31 0f 76 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:0e:50:b2:b9:f2
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 42 08 2a a1 3d 80 a0 4d 93 23 42 87 95 17 84 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:0e:50:b2:b9:f2
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 6e ef d3 6a e3 9c e1 7a 58 1f 0d 9b cc 78 88 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:0e:50:b2:b9:f2
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 fa 1b 55 a7 dc a8 3f 2f 40 2e 89 ec 8f ca d7 8d 3a 68 d7 ba b5 c9 d6 23 9f dc e8 25 ac d6 8b 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:0e:50:b2:b9:f2 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 e3 bf e0 44 34 0b 1d 58 4f 84 a2 b1 f3 00 2c e9 27 0f 9e fa f9 41 30 27 51 60 be b8 eb 00 4c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab f7 fe 52 18 17 4a 1a c4 ef 7a 75 f0 68 ec 71 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> EAPOL: startWhen --> 0
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> WPA: 4-Way Handshake failed - pre-shared key may be incorrect
> Setting scan request: 0 sec 100000 usec
> Added BSSID 00:11:f5:89:f7:57 into blacklist
> State: 4WAY_HANDSHAKE -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> Driver did not support SIOCSIWENCODEEXT, trying SIOCSIWENCODE
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> Wireless event: cmd=0x8b2a len=12
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Wireless event: cmd=0x8c02 len=205
>
> (... and so on until I stop wpa_supplicant)
>   





More information about the Hostap mailing list