wpa_supplicant fails to connect with some D-Link wireless routers

Dan Williams dcbw
Mon Jul 13 10:44:29 PDT 2009


On Mon, 2009-07-13 at 22:57 +0800, Ivan Li wrote:
> Hi guys,
>  
> I found wpa_supplicant 0.6.9 can't connect with some D-Link wireless
> routers, but it works very well with some other brands.
>  
> My system configuration:
> 1. i.MX31 3stack CPU
> 2. Marvell sd8686, using firmware 9.70.
> 3. Linux-2.6.26, but using libertas ported from 2.6.27 to support 9.70
> firmware.
> 4. wpa_supplicant 0.6.9

Do the commits:

9c31fd635ddfae6eb61712491770befa2ce1fdde
9c40fc510a3df3a74731f5f251b9481feffc0ed5

make a difference for you?  These were WPA fixes that got into 2.6.28,
but probably wouldn't be in your 2.6.27-based driver.  I'm not 100% sure
they apply to the earlier stages of the 4-way handshake that your logs
seem to be failing at, but it's worth checking out if these commits help
you.

Dan

> From the log printed by wpa_supplicant, I found 1 line:
> IEEE 802.1X RX: version=1 type=3 length=95
> The version of eap is 1, so I am wondering if the protocol running on
> wireless router is too old to be working with wpa_supplicant.
> Below is the complete log:
>  
> Initializing interface (2) 'eth0'
> Interface eth0 set UP - waiting a second for the driver to complete
> initialization
> SIOCGIWRANGE: WE(compiled)=22 WE(source)=15 enc_capa=0xf
>   capabilities: key_mgmt 0xf enc 0xf flags 0x0
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:1a:6b:a1:21:53
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> RSN: flushing PMKID list in the driver
> Setting scan request: 0 sec 100000 usec
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> Added interface eth0
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Trying to get current scan results first without requesting a new scan
> to speed up initial association
> Received 0 bytes of scan results (0 BSSes)
> Cached scan results are empty - not posting
> Selecting BSS from priority group 0
> Try to find WPA-enabled AP
> Try to find non-WPA AP
> No suitable AP found.
> Setting scan request: 0 sec 0 usec
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> Starting AP scan (broadcast SSID)
> Scan requested (ret=0) - scan timeout 5 seconds
> EAPOL: disable timer tick
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 546 bytes of scan results (3 BSSes)
> CTRL-EVENT-SCAN-RESULTS 
> Selecting BSS from priority group 0
> Try to find WPA-enabled AP
> 0: 00:15:e9:0e:98:d2 ssid='tiger' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
>    selected WPA AP 00:15:e9:0e:98:d2 ssid='tiger'
> Trying to associate with 00:15:e9:0e:98:d2 (SSID='tiger' freq=2437
> MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> wpa_driver_wext_set_psk
> Association request to the driver failed
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=13
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:15:e9:0e:98:d2
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:15:e9:0e:98:d2
> No keys have been configured - skip key clearing
> Associated with 00:15:e9:0e:98:d2
> WPA: Association event - clear replay counter
> WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
> RX EAPOL from 00:15:e9:0e:98:d2
> RX EAPOL - hexdump(len=107): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
> 00 04 c1 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f e7 4a 58 6a e8 61 3f
> 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
>   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
>   key_length=32 key_data_length=0
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 04 c1
>   key_nonce - hexdump(len=32): 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f
> e7 4a 58 6a e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=107): 01 03 00 5f fe 00 89 00 20 00 00
> 00 00 00 00 04 c1 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f e7 4a 58 6a
> e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00
> WPA: ignoring 8 bytes after the IEEE 802.1X data
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:15:e9:0e:98:d2 (ver=1)
> WPA: Renewed SNonce - hexdump(len=32): 33 b6 17 64 96 be c5 d0 80 53
> 8e 3c c5 42 1f 70 80 58 bb 35 36 3d c7 28 d5 ca da 35 a2 84 29 87
> WPA: PTK derivation - A1=00:1a:6b:a1:21:53 A2=00:15:e9:0e:98:d2
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00
> 00 00 00 00 04 c1 33 b6 17 64 96 be c5 d0 80 53 8e 3c c5 42 1f 70 80
> 58 bb 35 36 3d c7 28 d5 ca da 35 a2 84 29 87 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 a9 93 a1 4a 43 bf 6e 29 27 b3 97 f9 df 15 21 48 00 18 dd 16 00 50
> f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> WPA: 4-Way Handshake failed - pre-shared key may be incorrect
> Setting scan request: 0 sec 100000 usec
> Added BSSID 00:15:e9:0e:98:d2 into blacklist
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> State: 4WAY_HANDSHAKE -> DISCONNECTED
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap




More information about the Hostap mailing list