WPA_supplicant wont respond to radius Challenges

Joel Lindsay joel
Fri Sep 15 11:33:12 PDT 2006


Hi,
 
I can't get wpa_supplicant to work with any kind of radius Authentication.
I have no problems when using wpa-psk.
 
I am trying to use:
 
eap-peap/mschapv2
eap-tls
 
with both wep and wpa.  I have tried hundreds of variations on all of the
examples in the wpa_supplicant demo config file.
 
I have verified the AP works using a windows client.
 
It appears to not be responding to the Access Challenge from the radius
server.  I am using freeradius.
 
I dont know if either of these 2 lines are the problem or not, but I cant
figure out how to fix it.
 
EAP: Building EAP-Nak (requested type 21 not allowed)
    or
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
 
Any help is appreciated.
 
Joel
 
Here  is the log
 
#wpa_supplicant -Dmadwifi -iath0 -c/persistant/temp/wpa_supplicant.conf -dd
Initializing interface 'ath0' conf '/persistant/temp/wpa_supplicant.conf'
driver 'madwifi' ctrl_interface 'N/A'
Configuration file '/persistant/temp/wpa_supplicant.conf' ->
'/persistant/temp/wpa_supplicant.conf'
Reading configuration file '/persistant/temp/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=10 (from group name 'wheel')
Line: 3 - start of a new network block
ssid - hexdump_ascii(len=8):
     57 54 6e 65 74 4c 6f 77                           WTnetLow
scan_ssid=1 (0x1)
key_mgmt: 0x1
eap methods - hexdump(len=2): 19 00
identity - hexdump_ascii(len=4):
     6a 6f 65 6c                                       joel
password - hexdump_ascii(len=5): [REMOVED]
phase1 - hexdump_ascii(len=11):
     70 65 61 70 6c 61 62 65 6c 3d 30                  peaplabel=0
phase2 - hexdump_ascii(len=13):
     61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2
Priority group 0
   id=0 ssid='WTnetLow'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
Own MAC address: 00:0b:6b:36:b9:2f
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
 
RX EAPOL from 00:0b:6b:36:b9:35
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
EAPOL: startWhen --> 0
Wireless event: cmd=0x8b19 len=12
Received 1222 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:0b:6b:36:b9:58 ssid='WTnet8021x' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:0b:6b:36:b9:35 ssid='WTnetLow' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:0b:6b:36:b9:35 (SSID='WTnetLow' freq=2452 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
ioctl[unknown???]: Invalid argument
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=21
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0b:6b:36:b9:35
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0b:6b:36:b9:35
No keys have been configured - skip key clearing
Associated with 00:0b:6b:36:b9:35
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0b:6b:36:b9:35
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=4):
     6a 6f 65 6c                                       joel
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 00 00 09 01 6a 6f 65 6c
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0b:6b:36:b9:35
RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 15 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=1
EAP: EAP entering state GET_METHOD
EAP: Building EAP-Nak (requested type 21 not allowed)
EAP: allowed methods - hexdump(len=1): 19
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 01 00 06 03 19
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0b:6b:36:b9:35
RX EAPOL - hexdump(len=10): 01 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=2
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method (25, PEAP)
EAP-PEAP: Phase2 EAP types - hexdump(len=1): 1a
CTRL-EVENT-EAP-METHOD EAP method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: startWhen --> 0
RX EAPOL from 00:0b:6b:36:b9:35
RX EAPOL - hexdump(len=10): 01 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_madwifi_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=0
wpa_driver_madwifi_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)






More information about the Hostap mailing list