WPA_Supplicant, iwl3945 and la Fonera
Christian Rothländer
mailinglisten
Sun Jun 1 01:40:00 PDT 2008
Hi there
I've got a weird problem. My wireless is working without any flaw at
home (AP: Linksys WRT54g using OpenWRT). If I try to use any la Fonera I
only get connection if I reset the router before trying to connect
(Power off, power on).
Sometimes I run into trouble at other AP's, too, but usually after a
iwl3945-module-reload its working again.
This time I recorded the difference between both connection trials. My
father's Laptop is working without problem, so I conclude it has to be
an issue with either the iwl3945 (tried several different driver
versions) or with the wpa_supplicant. My current WPA_supplicant Version
is 0.5.10 (the one gentoo recommends)
Logs attached, perhaps somebody is able to see the problem. Association
is failing somewhere during the process. Already tried to change WPA1/2
and CCMP/TKIP in the config file.
So thanks in advance,
Christian
p.S.: sorry if the first mail comes through, used the wrong email address :(
Config:
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
#update_config=1
..some other networks
network={
ssid="Rothlaender"
scan_ssid=1
psk="psk" <- that's not the real one ;-)
key_mgmt=WPA-PSK
priority=3
}
the Network:
Cell 02 - Address: 00:18:84:13:E6:6E
ESSID:"Rothlaender"
Mode:Master
Frequency:2.412 GHz (Channel 1)
Channel:1
Quality=65/100 Signal level=-68 dBm Noise level=-95
dBm
Encryption key:on
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:tsf=0000000057305181
Bad trial:
Selecting BSS from priority group 3
Try to find WPA-enabled AP
0: 00:18:84:13:e6:6e ssid='Rothlaender' wpa_ie_len=28 rsn_ie_len=26
caps=0x11
selected based on RSN IE
selected WPA AP 00:18:84:13:e6:6e ssid='Rothlaender'
Try to find non-WPA AP
Trying to associate with 00:18:84:13:e6:6e (SSID='Rothlaender' freq=2412
MHz)
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 31 32 35 33 2d 30 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00
0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
Authentication with 00:18:84:13:e6:6e timed out.
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 31 32 35 33 2d 30 00
Added BSSID 00:18:84:13:e6:6e into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
good trial (after router reset):
Trying to associate with 00:18:84:13:e6:6e (SSID='Rothlaender' freq=2412
MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00
0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=261
WEXT: Custom wireless event:
'ASSOCINFO(ReqIEs=000b526f74686c61656e646572010802040b160c12182432043048606c30140100000fac020100000fac040100000fac020000dd070050f202000100
RespIEs=010882848b0c1296182432043048606cdd180050f2020101860002a3400027a4000042435e0062322f00dd0900037f01010000ff7f)'
Association info event
req_ies - hexdump(len=60): 00 0b 52 6f 74 68 6c 61 65 6e 64 65 72 01 08
02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00
00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=53): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60
6c dd 18 00 50 f2 02 01 01 86 00 02 a3 40 00 27 a4 00 00 42 43 5e 00 62
32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:84:13:e6:6e
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:84:13:e6:6e
No keys have been configured - skip key clearing
Associated with 00:18:84:13:e6:6e
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:84:13:e6:6e
RX EAPOL - hexdump(len=107): 02 03 00 67 02 00 8a 00 10 00 00 00 00 00
00 00 01 e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97 8a 97 80 37 8a 3e 81
c6 79 40 f0 25 76 da bd 3a f7 ad 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=103
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97
8a 97 80 37 8a 3e 81 c6 79 40 f0 25 76 da bd 3a f7 ad
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=107): 02 03 00 67 02 00 8a 00 10 00 00
00 00 00 00 00 01 e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97 8a 97 80 37
8a 3e 81 c6 79 40 f0 25 76 da bd 3a f7 ad 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:84:13:e6:6e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): c7 c8 1e 94 c5 bb 6f af 4e 43 fd
7c b3 63 39 d0 0b 6c f1 d3 f7 8f a1 de 85 6c b2 1e b3 70 83 fa
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
00 00 00 00 00 01 c7 c8 1e 94 c5 bb 6f af 4e 43 fd 7c b3 63 39 d0 0b 6c
f1 d3 f7 8f a1 de 85 6c b2 1e b3 70 83 fa 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 83
1e da 3f bb 7f a9 11 aa 18 5e fc f9 e0 30 00 16 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:18:84:13:e6:6e
RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00
00 00 02 e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97 8a 97 80 37 8a 3e 81
c6 79 40 f0 25 76 da bd 3a f7 ad 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 6b 48 ea e2
f0 d0 7f c0 14 bd 0e 46 51 cb b3 00 68 9c 2b 34 17 91 5f b9 cb 76 7e 4f
2f 96 82 ec b3 29 ee e3 40 26 b9 cc e6 b5 98 c8 9a e0 51 9e 4a a4 86 f2
09 88 0f f2 74 16 10 f8 a8 da b3 be 65 e9 49 d5 6d e6 95 e2 a7 89 c5 86
10 91 f1 16 41 f9 d4 83 ae ee 8c 44 13 cc 03 87 bd 7f 1b 33 e9 3d 30 7c
46 a1 92 32 6f c9 ab aa 23 a1 ef db 6a 15 50 2b 6e 7e 0d 27 b4
IEEE 802.1X RX: version=2 type=3 length=199
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure
Encr)
key_length=16 key_data_length=104
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97
8a 97 80 37 8a 3e 81 c6 79 40 f0 25 76 da bd 3a f7 ad
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 02 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 68 6b 48 ea e2 f0 d0 7f c0 14 bd 0e 46 51 cb b3
WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00
00 00 00 00 00 02 e5 d6 b0 cb d3 f4 71 84 99 da 35 b0 2c 97 8a 97 80 37
8a 3e 81 c6 79 40 f0 25 76 da bd 3a f7 ad 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 6b
48 ea e2 f0 d0 7f c0 14 bd 0e 46 51 cb b3 00 68 9c 2b 34 17 91 5f b9 cb
76 7e 4f 2f 96 82 ec b3 29 ee e3 40 26 b9 cc e6 b5 98 c8 9a e0 51 9e 4a
a4 86 f2 09 88 0f f2 74 16 10 f8 a8 da b3 be 65 e9 49 d5 6d e6 95 e2 a7
89 c5 86 10 91 f1 16 41 f9 d4 83 ae ee 8c 44 13 cc 03 87 bd 7f 1b 33 e9
3d 30 7c 46 a1 92 32 6f c9 ab aa 23 a1 ef db 6a 15 50 2b 6e 7e 0d 27 b4
RSN: encrypted key data - hexdump(len=104): 9c 2b 34 17 91 5f b9 cb 76
7e 4f 2f 96 82 ec b3 29 ee e3 40 26 b9 cc e6 b5 98 c8 9a e0 51 9e 4a a4
86 f2 09 88 0f f2 74 16 10 f8 a8 da b3 be 65 e9 49 d5 6d e6 95 e2 a7 89
c5 86 10 91 f1 16 41 f9 d4 83 ae ee 8c 44 13 cc 03 87 bd 7f 1b 33 e9 3d
30 7c 46 a1 92 32 6f c9 ab aa 23 a1 ef db 6a 15 50 2b 6e 7e 0d 27 b4
WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:84:13:e6:6e (ver=2)
WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f
ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50
f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01
01 00 3d 7e b7 59 ff d4 b1 07 14 d6 0e f8 1e 06 60 0a d5 77 b8 35 66 0f
2e b3 1a 99 3c 7e 1a 49 82 60 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00
00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2a 9c 77
1c 02 74 ae 8c db 5a 6f 44 00 23 a4 ad 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 02 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:18:84:13:e6:6e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:84:13:e6:6e completed (auth)
[id=4 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:84:13:e6:6e into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
More information about the Hostap
mailing list