can't get wpasupplicant to authenticate against router using wpa-psk
Jason Carr
jason
Wed Feb 15 10:10:26 PST 2006
Hello Pittsburgh Friend ;)
The access point is actually a hacked WRT54G v4 running OpenWRT. I
haven't rebooted it since I installed OpenWRT, so I haven't changed
anything on that device.
The similarities are that both devices are Cisco or Linksys. We use
Cisco 1220's and 1240's, although the one I would have been connecting
to is the 1220.
Here's from the Cisco AP:
Feb 15 13:03:32.481390: Scan SSID - hexdump_ascii(len=7):
43 4d 55 2d 57 50 41 CMU-WPA
Feb 15 13:03:35.481848: Scan timeout - try to get results
Feb 15 13:03:35.482088: Received 2896 bytes of scan results (13 BSSes)
Feb 15 13:03:35.482104: Scan results: 13
Feb 15 13:03:35.482118: Selecting BSS from priority group 0
Feb 15 13:03:35.482131: 0: aa:bb:cc:dd:ee:ff ssid='CMU-WPA'
wpa_ie_len=26 rsn_ie_len=22 caps=0x11
Feb 15 13:03:35.482146: skip - SSID mismatch
Feb 15 13:03:35.482163: selected based on RSN IE
Feb 15 13:03:35.482179: Trying to associate with aa:bb:cc:dd:ee:ff
(SSID='CMU-WPA' freq=0 MHz)
Feb 15 13:03:35.482192: Cancelling scan request
Feb 15 13:03:35.482205: WPA: clearing own WPA/RSN IE
Feb 15 13:03:35.482216: Automatic auth_alg selection: 0x1
Feb 15 13:03:35.482236: RSN: using IEEE 802.11i/D9.0
Feb 15 13:03:35.482249: WPA: Selected cipher suites: group 8 pairwise 16
key_mgmt 1
Feb 15 13:03:35.482275: WPA: set AP WPA IE - hexdump(len=26): dd 18 00
50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00
Feb 15 13:03:35.482294: WPA: set AP RSN IE - hexdump(len=22): 30 14 01
00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
Feb 15 13:03:35.482312: WPA: using GTK TKIP
Feb 15 13:03:35.482325: WPA: using PTK CCMP
Feb 15 13:03:35.482337: WPA: using KEY_MGMT 802.1X
Feb 15 13:03:35.482350: WPA: Set own WPA IE default - hexdump(len=22):
xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
Same problem. :(
On Wed, 2006-02-15 at 12:11 -0500, Brian Bender wrote:
> Jason, I'm working on a vendor-supplied proprietary driver
> [disclaimer: not using hostap] for an embedded product, and I see
> something in your logs (selectively snipped to point it out) that is
> similar to a situation I'm currently fighting with.
>
> On Feb 14, 2006, at 10:38 PM, Jason Carr wrote:
>
> > Feb 14 21:58:52.374089: Selecting BSS from priority group 0
> > Feb 14 21:58:52.374105: 0: 00:13:10:68:b7:d2 ssid='flacid.org'
> > wpa_ie_len=30 rsn_ie_len=26 caps=0x11
> ^^^^^^^^^^
> > Feb 14 21:58:52.374126: selected based on RSN IE
> > Feb 14 21:58:52.374145: Trying to associate with 00:13:10:68:b7:d2
> > (SSID='flacid.org' freq=0 MHz)
> > Feb 14 21:58:52.374162: CTRL_IFACE monitor send - hexdump(len=23):
> > 2f 74
> > 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 39 37 32 2d 30 00 00 00
> > Feb 14 21:58:52.374194: Cancelling scan request
> > Feb 14 21:58:52.374211: WPA: clearing own WPA/RSN IE
> > Feb 14 21:58:52.374226: Automatic auth_alg selection: 0x1
> > Feb 14 21:58:52.374246: RSN: using IEEE 802.11i/D9.0
> > Feb 14 21:58:52.374261: WPA: Selected cipher suites: group 8
> > pairwise 24
> > key_mgmt 1
> > Feb 14 21:58:52.374277: WPA: set AP WPA IE - hexdump(len=30): dd 1c 00
> > 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00
> > 50 f2
> > 01 01 00
> > Feb 14 21:58:52.374302: WPA: set AP RSN IE - hexdump(len=26): 30 18 01
> > 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 01 01 00
> > Feb 14 21:58:52.374326: WPA: using GTK TKIP
> > Feb 14 21:58:52.374342: WPA: using PTK CCMP
> > Feb 14 21:58:52.374358: WPA: using KEY_MGMT 802.1X
> > Feb 14 21:58:52.374373: WPA: Set own WPA IE default - hexdump(len=22):
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> > 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
> <snip>
> > Feb 14 21:58:53.358609: Wireless event: cmd=0x8b15 len=20
> > Feb 14 21:58:53.358654: Wireless event: new AP: 00:00:00:00:00:00
> > Feb 14 21:58:53.358674: Setting scan request: 0 sec 100000 usec
> > Feb 14 21:58:53.358695: BSSID 00:13:10:68:b7:d2 blacklist count
> > incremented to 2
> > Feb 14 21:58:53.358712: State: ASSOCIATED -> DISCONNECTED
> <snip>
>
> With newer Cisco APs (yours looks to be a Cisco-Linksys, so I assume
> it's a Linksys after the Cisco buyout?), they've started including
> the "RSN capabilities" field in the WPA_IE. The WPA_IE in the
> association request needs to match the one in the 3/4 key message in
> the 802.1X 4-way handshake, where you've selected the features you're
> going to use. Notice the line that says "Set own WPA IE default -
> hexdump(len=22)"? That doesn't have the rsn caps element in it. See
> my question below as to why I think that's important. As to the "used
> to work, now it doesn't, was the firmware on that AP by any chance
> updated from a version that was merely WPA-capable to one that was
> 802.11i-capable? I have one 1200-series Cisco AP that only does WPA,
> and it only sends/requires the len==22 version of the WPA_IE, while
> the newer ones we have use the longer one, so it seems that they
> changed at some point, and it probably has something to do with code
> reuse between WPA and WPA2 cases. *shrug*
>
> Question for the group: from what I can tell in testing, I'm not able
> to authenticate with the newer Cisco APs _unless_ I include that RSN
> Caps element in my WPA_IEs. It seems that even if my WPA_IE's match
> like they're supposed to (that was an earlier bug I had to fix <g>),
> if they're the len==22 variety, with no RSN Caps field, the AP
> disassociates me immediately after the 4-way handshake.
>
> The WPA spec is a little vague; it says that "Clause 7.3.2.25.3?RSN
> Capabilities, the GTKSA and PTKSA Replay counter flags are not used
> in WPA." (incidentally, Cisco _is_ sending data in those flags within
> the capabilities field, so in that sense, they look like they're
> slightly wrong in their implementation) It doesn't address, though,
> whether that whole field is absolutely required. Their sample code
> illustrates conditionally looking for successive elements in the
> variable IEs based on IELen; I'd expect that the APs _should_ be able
> to tell from the length that that RSN Caps field isn't there, and the
> IE is still technically valid for a WPA session. At least I think so. :)
>
> Has anyone else run into this situation?
>
> Thanks,
>
> Brian
>
More information about the Hostap
mailing list