hostapd-0.6.8 + madwifi + bridge + WPA-PSK
Michael Voorhaen
michael.voorhaen
Sun Feb 22 12:59:00 PST 2009
I have just been browsing the archives and found this post that
describes exactly the same problem:
http://lists.shmoo.com/pipermail/hostap/2008-July/018021.html
Then there is an answer in the next mail in the thread and i quote:
"You need eaaab2bd98b0b08f1ff77303a0f142af029884a6." What does this
mean is it a revision from the cvs/svn you are using? I get the
impression that someone fixed this, but I don't see how :D.
Regards,
Michael
-------------------------
IBBT - PATS research group
Dept. of Mathematics and Computer Sciences
University of Antwerp
Campus Middelheim, G3.30
Middelheimlaan 1
B-2020 Antwerpen, Belgium
Phone: +32 (0)3 265.32.91
Fax: +32 (0)3 265.37.77
Web: www.pats.ua.ac.be/michael.voorhaen
On 21 Feb 2009, at 11:22, Michael Voorhaen wrote:
> Hi,
>
> I seem to be experiencing problems when setting up an AP with WPA-PSK
> when ath0 is connected to a bridge. I've tested it with all the latest
> stable versions which all suffer from the problem.
>
> I've set up hostap like this, enabling the bridge option like I
> should.
>
> interface=ath0
> bridge=br0
> driver=madwifi
> ssid=wpa-test
> wpa=1
> wpa_passphrase=********
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP CCMP
>
> The problem does not exist when I remove ath0 from the bridge ... off
> course I need it to be bridged for my specific setup.
>
> Anyone have any idea what could be the problem? I get the impression
> that hostap is not receiving any of the security messages.
>
> Some output:
>
> voyage:~# ./hostapd -ddd /etc/hostapd/hostapd.conf
> Configuration file: /etc/hostapd/hostapd.conf
> Line 44: DEPRECATED: 'debug' configuration variable is not used
> anymore
> ctrl_interface_group=0
> Configure bridge br0 for EAPOL traffic.
> madwifi_set_iface_flags: dev_up=0
> madwifi_set_privacy: enabled=0
> BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
> SIOCGIWRANGE: WE(compiled)=22 WE(source)=13 enc_capa=0xf
> ath0: IEEE 802.11 Fetching hardware channel/rate support not
> supported.
> Flushing old station entries
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff
> reason 3)
> Could not connect to kernel driver.
> Deauthenticate all stations
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff
> reason 2)
> madwifi_set_privacy: enabled=0
> Mode: IEEE 802.11g Channel: 1 Frequency: 0 MHz
> madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
> madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
> madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
> madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
> Using interface ath0 with hwaddr 00:80:48:52:fe:eb and ssid 'wishbone-
> wpa'
> SSID - hexdump_ascii(len=12):
> 77 69 73 68 62 6f 6e 65 2d 77 70 61 wishbone-wpa
> PSK (ASCII passphrase) - hexdump_ascii(len=8):
> 62 6f 6e 65 77 69 73 68 ********
> PSK (from passphrase) - hexdump(len=32): 38 07 a5 1a e8 d7 d5 45 1d 2d
> 4b ee 43 0f 6a f6 77 11 e3 88 18 58 9c 32 bc 29 16 68 5a 52 97 4f
> madwifi_set_ieee8021x: enabled=1
> madwifi_configure_wpa: group key cipher=1
> madwifi_configure_wpa: pairwise key ciphers=0xa
> madwifi_configure_wpa: key management algorithms=0x2
> madwifi_configure_wpa: rsn capabilities=0x0
> madwifi_configure_wpa: enable WPA=0x1
> WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
> GMK - hexdump(len=32): [REMOVED]
> GTK - hexdump(len=32): [REMOVED]
> WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
> madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
> madwifi_set_privacy: enabled=1
> madwifi_set_iface_flags: dev_up=1
> ath0: Setup of interface done.
> l2_packet_receive - recvfrom: Network is down
> l2_packet_receive - recvfrom: Network is down
> Wireless event: cmd=0x8b1a len=21
> Wireless event: cmd=0x8c03 len=20
> ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.11: associated
> New STA
> madwifi req WPA IE - hexdump(len=256): dd 16 00 50 f2 01 01 00 00 50
> f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> madwifi req RSN IE - hexdump(len=256): 20 00 86 00 20 00 86 00 20 00
> 48 fc 61 cc 1c 75 95 cc 01 00 00 00 00 00 00 00 0c c5 10 c0 00 00 00
> 00 01 00 00 00 28 75 95 cc 00 c0 9b c5 00 00 00 00 82 02 20 00 01 00
> 00 00 82 02 20 00 00 00 00 00 00 00 00 00 00 74 95 cc 01 df 9b c5 d1
> 4d 75 cc 61 c7 1e c0 00 00 00 00 86 02 20 00 00 00 00 00 00 df 9b c5
> 00 74 95 cc 09 80 8e cc cf 4d 75 cc 61 c7 1e c0 02 02 20 00 60 4c 64
> cf 00 00 00 00 00 80 8e cc 00 00 00 00 b0 c1 3e c1 a0 31 7a cf 50 00
> 00 00 02 02 20 00 a0 30 7a cf 9c dd 9b c5 28 df 9b c5 00 00 00 00 01
> 00 00 00 01 00 00 00 00 00 00 00 00 10 00 00 08 00 00 00 00 00 00 00
> 85 88 42 44 f7 ff ff ff 80 f0 84 ce c0 68 21 cc 4e d3 24 c0 00 00 00
> 00 a0 63 2d c0 0b 00 00 00 e0 41 64 cf cc 83 2a c0 48 1f dc b7 c8 de
> 9b c5 e8 de 9b c5 00 00 00 00 00 70 91 cd 2c df
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: event 1 notification
> madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: start authentication
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
> madwifi_set_sta_authorized: addr=00:1e:c2:bc:f4:a5 authorized=0
> ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.1X: unauthorizing port
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK_GROUP entering state IDLE
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state AUTHENTICATION
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITPSK
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8
> kde_len=0 keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e
> 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 de 8a 6d 32 0f a1
> e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9
> 3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8
> kde_len=0 keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e
> 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 de 8a 6d 32 0f a1
> e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9
> 3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8
> kde_len=0 keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e
> 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 de 8a 6d 32 0f a1
> e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9
> 3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8
> kde_len=0 keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e
> 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 04 de 8a 6d 32 0f a1
> e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9
> 3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00
> Wireless event: cmd=0x8c02 len=99
> Custom wireless event: 'STA-TRAFFIC-STAT
> mac=00:1e:c2:bc:f4:a5
> rx_packets=3
> rx_bytes=411
> tx_packets=4
> tx_bytes=428
> '
> Wireless event: cmd=0x8c04 len=20
> ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.11: disassociated
> ath0: STA 00:1e:c2:bc:f4:a5 WPA: event 2 notification
> madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> madwifi_del_key: Failed to delete key (addr 00:1e:c2:bc:f4:a5
> key_idx 0)
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state DISCONNECTED
> WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> madwifi_del_key: Failed to delete key (addr 00:1e:c2:bc:f4:a5
> key_idx 0)
> madwifi_set_sta_authorized: addr=00:1e:c2:bc:f4:a5 authorized=0
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> madwifi_set_sta_authorized: Failed to unauthorize STA
> 00:1e:c2:bc:f4:a5
> ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.1X: unauthorizing port
> Could not set station 00:1e:c2:bc:f4:a5 flags for kernel driver
> (errno=29).
>
>
> Regards,
> Michael
>
> -------------------------
> IBBT - PATS research group
> Dept. of Mathematics and Computer Sciences
> University of Antwerp
> Campus Middelheim, G3.30
> Middelheimlaan 1
> B-2020 Antwerpen, Belgium
> Phone: +32 (0)3 265.32.91
> Fax: +32 (0)3 265.37.77
> Web: www.pats.ua.ac.be/michael.voorhaen
>
>
>
>
>
>
>
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap
More information about the Hostap
mailing list