Hostapd and wpa_supplicant configuration -Failure - Invalid MAC_P - supplicant used different EAP type 47
jackbaker
jackbaker
Wed Oct 22 07:09:06 PDT 2008
Hello,
Please, could you help me.
Hostapd is on 0.5.x
I want to use hostapd and wpa_supplicant to sercure the access to a
Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
the Access Point and wa_supplicant in the client laptop.
I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
I want to know il my configuration is valid or not.
If it is valid, what is the problem? Is there a solution.
Thanks.
Jack
I used these
configurations :
* The file .config of the hostapd :
_________________________________________
CONFIG_DRIVER_MADWIFI=y
CFLAG += -I/usr/......#path to madwifi src
CONFIG_EAP=y
CONFIG_EAP_PSK=y
CONFIG_RADIUS_SERVER=y
_________________________________________
* The file hostapd.conf :
_________________________________________
interface=ath1
driver=madwifi
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=test
ath_algs=1
ignore_broadcast_ssid=0
ieee8021x=1
eapol_key_index_workaround=0
eap_server=1
wpa_pairwise=TKIP
own_ip_addr=10.0.0.20
pa=1
wpa_key_management=WPA-EAP
_________________________________________
* The file hostapd.eap_user.conf :
_________________________________________
"psk user" PSK "unknown"
"eap_psk_user" PSK 0123456789abcdef0123456789abcdef
"eap_psk_user at example.com" PSK 0123456789abcdef0123456789abcdef
_________________________________________
* The file madwifi.conf :
_________________________________________
interface=ath1
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ssid=wpa-test
eap_server=0
own_ip_addr=127.0.0.1
_________________________________________
* The file .config of the wpa_supplicant :
_________________________________________
CONFIG_DRIVER_MADWIFI=y
CFLAG += -I/usr/......#path to madwifi src
CONFIG_IEEE8021X_EAPOL=y
CONFIG_EAP_PSK=y
CONFIG_CTRL_IFACE=y
CONFIG_BACKEND=file
CONFIG_PEERKEY=y
_________________________________________
* The file wpa_supplicant.conf of the :
_________________________________________
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=1
network={
ssid="test"
key_mgmt=WPA-EAP
eap=PSK
identity="eap_psk_user"
eappsk=0123456789abcdef0123456789abcdef
nai="eap_psk_user at example.com"
}
_________________________________________
When running hostapd, this message is shown (access point) :
_________________________________________
...
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
...
could not connect to kernel driver.
....
l2_packet_receive - recvfrom: Network is down
_________________________________________
And when running the wpa_supplicant, the hostapd show :
_________________________________________
IEEE 802.1X: 4 bytes from 00:20:a6:61:07:50
IEEE 802.1X: version=1 type=1 length=0
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAPOL-Start from STA
ath1: STA 00:20:a6:61:07:50 WPA: event 5 notification
WPA: 00:20:a6:61:07:50 WPA_PTK entering state AUTHENTICATION2
IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state ABORTING
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state INITIALIZE
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: aborting authentication
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state RESTART
IEEE 802.1X: Integrated EAP server in use - do not generate EAP-Request/Identity
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 1
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 236
EAP: EAP entering state SEND_REQUEST
EAP: eapReqData -> EAPOL - hexdump(len=5): 01 ec 00 05 01
EAP: EAP entering state IDLE
IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state CONNECTING
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 236)
TX EAPOL - hexdump(len=23): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 05 01 ec 00 05 01
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 21 bytes from 00:20:a6:61:07:50
IEEE 802.1X: version=1 type=0 length=17
EAP: code=2 identifier=236 length=17 (response)
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=236 len=17) from STA: EAP Response-Identity (1)
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: STA identity 'eap_psk_user'
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
EAP: EAP-Response received - hexdump(len=17): 02 ec 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=236 respMethod=1 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
EAP-Identity: Peer identity - hexdump_ascii(len=12):
65 61 70 5f 70 73 6b 5f 75 73 65 72 eap_psk_user
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: another method available -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 47
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 237
EAP-PSK: PSK-1 (sending)
EAP-PSK: RAND_S (server rand) - hexdump(len=16): 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7
EAP: EAP entering state SEND_REQUEST
EAP: eapReqData -> EAPOL - hexdump(len=29): 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
EAP: EAP entering state IDLE
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
TX EAPOL - hexdump(len=47): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 1d 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 82 bytes from 00:20:a6:61:07:50
IEEE 802.1X: version=1 type=0 length=78
EAP: code=2 identifier=237 length=78 (response)
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=237 len=78) from STA: EAP Response-PSK (47)
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
EAP: EAP-Response received - hexdump(len=78): 02 ed 00 4e 2f 40 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=237 respMethod=47 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP-PSK: received frame: T=1
EAP: EAP entering state METHOD_RESPONSE
EAP-PSK: Received PSK-2
EAP-PSK: ID_P - hexdump_ascii(len=24):
65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 eap_psk_user at exa
6d 70 6c 65 2e 63 6f 6d mple.com
psk : ?d??g??] : 17
EAP-PSK: AK - hexdump(len=16): [REMOVED]
EAP-PSK: KDK - hexdump(len=16): [REMOVED]
EAP-PSK: RAND_P (client rand) - hexdump(len=16): 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8
EAP-PSK: MAC_P - hexdump(len=16): 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66
EAP-PSK: Invalid MAC_P
EAP-PSK: Expected MAC_P - hexdump(len=16): fb 91 91 fb 90 4b f1 23 aa 16 86 2a e8 a5 48 15
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: method failed -> FAILURE
EAP: EAP entering state FAILURE
EAP: Building EAP-Failure (id=237)
EAP: eapReqData -> EAPOL - hexdump(len=4): 04 ed 00 04
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state FAIL
IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
TX EAPOL - hexdump(len=22): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 04 04 ed 00 04
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state HELD
madwifi_set_sta_authorized: addr=00:20:a6:61:07:50 authorized=0
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: unauthorizing port
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: authentication failed - EAP type: 0 (Unknown)
ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: Supplicant used different EAP type: 47 (PSK)
IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
Signal 2 received - terminating
ath1: STA 00:20:a6:61:07:50 MLME: MLME-DEAUTHENTICATE.indication(00:20:a6:61:07:50, 1)
ath1: STA 00:20:a6:61:07:50 MLME: MLME-DELETEKEYS.request(00:20:a6:61:07:50)
madwifi_del_key: addr=00:20:a6:61:07:50 key_idx=0
Removing station 00:20:a6:61:07:50
EAP: State machine removed
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
madwifi_set_iface_flags: dev_up=0
_________________________________________
the supplicant show :
_________________________________________
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:20:a6:61:1c:da ssid='test' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:20:a6:61:1c:da ssid='test'
Try to find non-WPA AP
Trying to associate with 00:20:a6:61:1c:da (SSID='test' freq=2417 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_madwifi_associate
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
wpa_driver_madwifi_associate: SETMLME[ASSOC] failed
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:20:a6:61:1c:da
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:20:a6:61:1c:da
No keys have been configured - skip key clearing
Associated with 00:20:a6:61:1c:da
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
RX EAPOL from 00:20:a6:61:1c:da
RX EAPOL - hexdump(len=9): 01 00 00 05 01 67 00 05 01
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=103 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=12):
65 61 70 5f 70 73 6b 5f 75 73 65 72 eap_psk_user
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:20:a6:61:1c:da
TX EAPOL - hexdump(len=21): 01 00 00 11 02 67 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:20:a6:61:1c:da
RX EAPOL - hexdump(len=33): 01 00 00 1d 01 68 00 1d 2f 00 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 68 6f 73 74 61 70 64
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=104 method=47 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)
EAP-PSK: AK - hexdump(len=16): [REMOVED]
EAP-PSK: KDK - hexdump(len=16): [REMOVED]
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 47 (PSK) selected
EAP: EAP entering state METHOD
EAP-PSK: in INIT state
EAP-PSK: Flags=0x0
EAP-PSK: RAND_S - hexdump(len=16): a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4
EAP-PSK: ID_S - hexdump_ascii(len=7):
68 6f 73 74 61 70 64 hostapd
EAP-PSK: RAND_P - hexdump(len=16): 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac
EAP-PSK: MAC_P - hexdump(len=16): 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25
EAP-PSK: ID_P - hexdump_ascii(len=24):
65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 eap_psk_user at exa
6d 70 6c 65 2e 63 6f 6d mple.com
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:20:a6:61:1c:da
TX EAPOL - hexdump(len=82): 01 00 00 4e 02 68 00 4e 2f 40 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:20:a6:61:1c:da
RX EAPOL - hexdump(len=8): 01 00 00 04 04 68 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:20:a6:61:1c:da into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=8
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath1
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=0
wpa_driver_madwifi_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
EAP: deinitialize previously used EAP method (47, PSK) at EAP deinit
Removed BSSID 00:20:a6:61:1c:da from blacklist (clear)
_________________________________________
Thanks Again
____________________________________________________
Voila vous offre 1 Go d?espace pour stocker et partager photos, vid?os, mp3 et autres documents ! http://www.voila.fr/Macle/
More information about the Hostap
mailing list