WPA2/AES disconnect problem
Alexander Pohl
a.h.pohl
Mon Dec 4 14:20:22 PST 2006
Hello,
I have a problem with WPA2/AES. The client gets disconnected due to "local
deauth request" soon after successful authentication against
freeradius (EAP-PEAP). In the moment I am using WPA/TKIP, which does
not have the above problem.
My setup:
Client: IBM Thinkpad R50 (WinXP SP2) with Access Connections v4.21 and
11a/b/g Wireless LAN Mini PCI Adapter II (Atheros)
AP: IBM Thinkpad X23 (Debian Etch 4.0) with hostapd 0.5.5, freeradius
1.1.3 and Cisco Aironet 11a/b/g CardBus Wireless LAN Client Adapter
(Atheros)
hostapd.log:
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=0
eapol_version=2
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:40:96:a1:c8:a0 and ssid 'debian-ssid'
ath0: RADIUS Authentication server 127.0.0.1:1812
ath0: RADIUS Accounting server 127.0.0.1:1813
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x1
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x3
madwifi_set_iface_flags: dev_up=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
IEEE 802.1X: New default WEP key index 2
IEEE 802.1X: New default WEP key - hexdump(len=13): [REMOVED]
madwifi_set_key: alg=WEP addr=00:00:00:00:00:00 key_idx=2
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
ath0: RADIUS Sending RADIUS message to accounting server
ath0: RADIUS Next RADIUS client retransmit in 3 seconds
SIOCGIWRANGE: WE(compiled)=20 WE(source)=13 enc_capa=0xf
ath0: IEEE 802.11 Fetching hardware channel/rate support not supported.
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
ath0: RADIUS Received 20 bytes from RADIUS server
ath0: RADIUS Received RADIUS message
ath0: STA 00:00:00:00:00:00 RADIUS: Received RADIUS packet matched
with a pending request, round trip time 0.00 sec
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0e:9b:ba:1e:ea IEEE 802.11: associated
New STA
ath0: STA 00:0e:9b:ba:1e:ea WPA: event 1 notification
......
......
......
ath0: STA 00:0e:9b:ba:1e:ea WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): [REMOVED]
PTK - hexdump(len=64): [REMOVED]
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0e:9b:ba:1e:ea WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=1 pairwise=8 ie_len=54
gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=104): [REMOVED]
TX EAPOL - hexdump(len=217): 00 0e 9b ba 1e ea 00 40 96 a1 c8 a0 88 8e
02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 fb fa e6 59 6b 61
54 3e bd 5c 48 36 72 03 f0 dd c7 9a b7 04 0c f0 25 f4 a7 76 ed 65 8f
2e e7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 72 04 41 c1 0a 29 cc a3 67 2d be
cf 26 df 98 a2 00 68 22 89 93 38 c0 ad 26 9b 74 4c aa bb e0 5f f7 e1
33 b9 f5 b6 31 bb 59 ac bc 89 86 e8 5a 69 0c db d0 a6 89 d2 c7 d5 d0
9a c6 1b 04 9b c9 22 bc 0f fe e6 d4 38 29 7e 91 39 5e 65 8d a2 4c 6b
85 30 68 c9 b6 70 d8 7c 8e 0b a4 e8 bd e6 ac f1 d8 c8 80 53 37 f0 6b
00 f8 f8 d9 e1 59 c4 b2 9a 0c 3f 37 47 72 fc 77 49 d3 16
IEEE 802.1X: 00:0e:9b:ba:1e:ea REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0e:9b:ba:1e:ea WPA: EAPOL-Key timeout
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0e:9b:ba:1e:ea WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=1 pairwise=8 ie_len=54
gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=104): [REMOVED]
TX EAPOL - hexdump(len=217): 00 0e 9b ba 1e ea 00 40 96 a1 c8 a0 88 8e
02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fa e6 59 6b 61
54 3e bd 5c 48 36 72 03 f0 dd c7 9a b7 04 0c f0 25 f4 a7 76 ed 65 8f
2e e7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 7e 2e 6c 0c 58 34 fc 67 ba 10 24
e2 72 3a 8e 78 00 68 22 89 93 38 c0 ad 26 9b 74 4c aa bb e0 5f f7 e1
33 b9 f5 b6 31 bb 59 ac bc 89 86 e8 5a 69 0c db d0 a6 89 d2 c7 d5 d0
9a c6 1b 04 9b c9 22 bc 0f fe e6 d4 38 29 7e 91 39 5e 65 8d a2 4c 6b
85 30 68 c9 b6 70 d8 7c 8e 0b a4 e8 bd e6 ac f1 d8 c8 80 53 37 f0 6b
00 f8 f8 d9 e1 59 c4 b2 9a 0c 3f 37 47 72 fc 77 49 d3 16
IEEE 802.1X: 00:0e:9b:ba:1e:ea REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0e:9b:ba:1e:ea WPA: EAPOL-Key timeout
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0e:9b:ba:1e:ea WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=1 pairwise=8 ie_len=54
gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=104): [REMOVED]
TX EAPOL - hexdump(len=217): 00 0e 9b ba 1e ea 00 40 96 a1 c8 a0 88 8e
02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 04 fb fa e6 59 6b 61
54 3e bd 5c 48 36 72 03 f0 dd c7 9a b7 04 0c f0 25 f4 a7 76 ed 65 8f
2e e7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 05 72 ad 6f b9 9b 4e d4 76 e4 0b
76 fa 40 f7 35 00 68 22 89 93 38 c0 ad 26 9b 74 4c aa bb e0 5f f7 e1
33 b9 f5 b6 31 bb 59 ac bc 89 86 e8 5a 69 0c db d0 a6 89 d2 c7 d5 d0
9a c6 1b 04 9b c9 22 bc 0f fe e6 d4 38 29 7e 91 39 5e 65 8d a2 4c 6b
85 30 68 c9 b6 70 d8 7c 8e 0b a4 e8 bd e6 ac f1 d8 c8 80 53 37 f0 6b
00 f8 f8 d9 e1 59 c4 b2 9a 0c 3f 37 47 72 fc 77 49 d3 16
IEEE 802.1X: 00:0e:9b:ba:1e:ea REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0e:9b:ba:1e:ea WPA: EAPOL-Key timeout
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0e:9b:ba:1e:ea WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=1 pairwise=8 ie_len=54
gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=104): [REMOVED]
TX EAPOL - hexdump(len=217): 00 0e 9b ba 1e ea 00 40 96 a1 c8 a0 88 8e
02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 05 fb fa e6 59 6b 61
54 3e bd 5c 48 36 72 03 f0 dd c7 9a b7 04 0c f0 25 f4 a7 76 ed 65 8f
2e e7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 f1 08 2a 6b 05 e4 4e c2 67 9b 01
cd 76 b1 73 ad 00 68 22 89 93 38 c0 ad 26 9b 74 4c aa bb e0 5f f7 e1
33 b9 f5 b6 31 bb 59 ac bc 89 86 e8 5a 69 0c db d0 a6 89 d2 c7 d5 d0
9a c6 1b 04 9b c9 22 bc 0f fe e6 d4 38 29 7e 91 39 5e 65 8d a2 4c 6b
85 30 68 c9 b6 70 d8 7c 8e 0b a4 e8 bd e6 ac f1 d8 c8 80 53 37 f0 6b
00 f8 f8 d9 e1 59 c4 b2 9a 0c 3f 37 47 72 fc 77 49 d3 16
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect:
STA 00:0e:9b:ba:1e:ea reason 2
madwifi_sta_deauth: addr=00:0e:9b:ba:1e:ea reason_code=2
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state DISCONNECTED
WPA: 00:0e:9b:ba:1e:ea WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0e:9b:ba:1e:ea key_idx=0
ath0: STA 00:0e:9b:ba:1e:ea IEEE 802.11: deauthenticated due to local
deauth request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0e:9b:ba:1e:ea IEEE 802.11: disassociated
Any help is very appreciated,
Alexander
More information about the Hostap
mailing list