Hostapd WPA2 and XP Supplicant
Andrew Tarabaras
atp3
Sun Jul 6 18:39:41 PDT 2008
Hi,
I have 1 last issue with hostapd. All works well except Windows XP.
I have 4 clients to test with.
1. WPA Supplicant linux
2. Nokia N95
3 Vista's Supplicant
4. And XP sp3 wpa supplicant.
They all connect ok but WinXP keeps disconnecting and re authenticating
. Vista is OK so I sure the problem is in XP. Windows XP is no help in
the debugging of this problem and tells me nothing. If I keep the
interface busy with data it stays up. A few seconds of quiet on the
interface it starts to disconnecting and re authenticating again.
Heres what I get from Hostapd.
I only included 2 authentications to save room.
STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:14:a5:ce:44:5d auth_alg=0 auth_transaction=1
status_code=0 wep=0
New STA
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authentication OK (open system)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-AUTHENTICATE.indication(00:14:a5:ce:44:5d, OPEN_SYSTEM)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
authentication reply: STA=00:14:a5:ce:44:5d auth_alg=0
auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:14:a5:ce:44:5d capab_info=0x431
listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:40:96
len=6)
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
WME IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WME IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1
new AID 1
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: associated (aid 1, accounting
session 48716CF9-00000002)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-ASSOCIATE.indication(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 1 notification
wlan0: STA 00:14:a5:ce:44:5d WPA: start authentication
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITIALIZE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: unauthorizing port
WPA: 00:14:a5:ce:44:5d WPA_PTK_GROUP entering state IDLE
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITPSK
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKSTART
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8
kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 121 bytes from 00:14:a5:ce:44:5d
IEEE 802.1X: version=1 type=3 length=117
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:17:9a:77:1d:cf A2=00:14:a5:ce:44:5d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=1 mic=1 ack=1 install=1 pairwise=8
kde_len=62 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=62): [REMOVED]
IEEE 802.1X: 99 bytes from 00:14:a5:ce:44:5d
IEEE 802.1X: version=1 type=3 length=95
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITDONE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: authorizing port
wlan0: STA 00:14:a5:ce:44:5d WPA: pairwise key handshake completed (RSN)
**** THIS IS WHERE IT HAPPENS ******************************************
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
STA 00:14:a5:ce:44:5d sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
STA 00:14:a5:ce:44:5d sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
STA 00:14:a5:ce:44:5d sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:14:a5:ce:44:5d auth_alg=0 auth_transaction=1
status_code=0 wep=0
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authentication OK (open system)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 0 notification
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-AUTHENTICATE.indication(00:14:a5:ce:44:5d, OPEN_SYSTEM)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
authentication reply: STA=00:14:a5:ce:44:5d auth_alg=0
auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:14:a5:ce:44:5d capab_info=0x431
listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:40:96
len=6)
unknown vendor specific information element ignored (vendor OUI 00:10:18
len=9)
WME IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WME IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1
old AID 1
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.11: associated (aid 1, accounting
session 48716CF9-00000003)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-ASSOCIATE.indication(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d MLME:
MLME-DELETEKEYS.request(00:14:a5:ce:44:5d)
wlan0: STA 00:14:a5:ce:44:5d WPA: event 1 notification
wlan0: STA 00:14:a5:ce:44:5d WPA: event 4 notification
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state AUTHENTICATION2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state INITPSK
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKSTART
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8
kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 121 bytes from 00:14:a5:ce:44:5d
IEEE 802.1X: version=1 type=3 length=117
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:17:9a:77:1d:cf A2=00:14:a5:ce:44:5d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:14:a5:ce:44:5d WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=1 secure=1 mic=1 ack=1 install=1 pairwise=8
kde_len=62 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=62): [REMOVED]
IEEE 802.1X: 99 bytes from 00:14:a5:ce:44:5d
IEEE 802.1X: version=1 type=3 length=95
wlan0: STA 00:14:a5:ce:44:5d WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:14:a5:ce:44:5d WPA_PTK entering state PTKINITDONE
wlan0: STA 00:14:a5:ce:44:5d IEEE 802.1X: authorizing port
wlan0: STA 00:14:a5:ce:44:5d WPA: pairwise key handshake completed (RSN)
Thanks
Andrew
More information about the Hostap
mailing list