wpa_supplicant fails to connect with some D-Link wireless routers

Ivan Li lijinlei1
Tue Jul 14 03:37:47 PDT 2009


Hi Dan,

Thanks for your reply.
I upgraded libertas from 2.6.27 to 2.6.28, seems it can successfully connect to that router now.
Really thanks.

----- Original Message ----- 
From: "Dan Williams" <dcbw at redhat.com>
To: "Ivan Li" <lijinlei1 at 163.com>
Cc: <hostap at lists.shmoo.com>
Sent: Tuesday, July 14, 2009 1:44 AM
Subject: Re: wpa_supplicant fails to connect with some D-Link wireless routers


> On Mon, 2009-07-13 at 22:57 +0800, Ivan Li wrote:
>> Hi guys,
>>  
>> I found wpa_supplicant 0.6.9 can't connect with some D-Link wireless
>> routers, but it works very well with some other brands.
>>  
>> My system configuration:
>> 1. i.MX31 3stack CPU
>> 2. Marvell sd8686, using firmware 9.70.
>> 3. Linux-2.6.26, but using libertas ported from 2.6.27 to support 9.70
>> firmware.
>> 4. wpa_supplicant 0.6.9
> 
> Do the commits:
> 
> 9c31fd635ddfae6eb61712491770befa2ce1fdde
> 9c40fc510a3df3a74731f5f251b9481feffc0ed5
> 
> make a difference for you?  These were WPA fixes that got into 2.6.28,
> but probably wouldn't be in your 2.6.27-based driver.  I'm not 100% sure
> they apply to the earlier stages of the 4-way handshake that your logs
> seem to be failing at, but it's worth checking out if these commits help
> you.
> 
> Dan
> 
>> From the log printed by wpa_supplicant, I found 1 line:
>> IEEE 802.1X RX: version=1 type=3 length=95
>> The version of eap is 1, so I am wondering if the protocol running on
>> wireless router is too old to be working with wpa_supplicant.
>> Below is the complete log:
>>  
>> Initializing interface (2) 'eth0'
>> Interface eth0 set UP - waiting a second for the driver to complete
>> initialization
>> SIOCGIWRANGE: WE(compiled)=22 WE(source)=15 enc_capa=0xf
>>   capabilities: key_mgmt 0xf enc 0xf flags 0x0
>> WEXT: Operstate: linkmode=1, operstate=5
>> Own MAC address: 00:1a:6b:a1:21:53
>> wpa_driver_wext_set_wpa
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_countermeasures
>> wpa_driver_wext_set_drop_unencrypted
>> RSN: flushing PMKID list in the driver
>> Setting scan request: 0 sec 100000 usec
>> EAPOL: SUPP_PAE entering state DISCONNECTED
>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>> EAPOL: SUPP_BE entering state INITIALIZE
>> EAP: EAP entering state DISABLED
>> Added interface eth0
>> State: DISCONNECTED -> SCANNING
>> Starting AP scan (broadcast SSID)
>> Trying to get current scan results first without requesting a new scan
>> to speed up initial association
>> Received 0 bytes of scan results (0 BSSes)
>> Cached scan results are empty - not posting
>> Selecting BSS from priority group 0
>> Try to find WPA-enabled AP
>> Try to find non-WPA AP
>> No suitable AP found.
>> Setting scan request: 0 sec 0 usec
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> Starting AP scan (broadcast SSID)
>> Scan requested (ret=0) - scan timeout 5 seconds
>> EAPOL: disable timer tick
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 546 bytes of scan results (3 BSSes)
>> CTRL-EVENT-SCAN-RESULTS 
>> Selecting BSS from priority group 0
>> Try to find WPA-enabled AP
>> 0: 00:15:e9:0e:98:d2 ssid='tiger' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
>>    selected based on WPA IE
>>    selected WPA AP 00:15:e9:0e:98:d2 ssid='tiger'
>> Trying to associate with 00:15:e9:0e:98:d2 (SSID='tiger' freq=2437
>> MHz)
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: using IEEE 802.11i/D3.0
>> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
>> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
>> 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> WPA: clearing AP RSN IE
>> WPA: using GTK TKIP
>> WPA: using PTK TKIP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
>> 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> wpa_driver_wext_set_psk
>> Association request to the driver failed
>> Setting authentication timeout: 5 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b04 len=12
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=13
>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>> Wireless event: cmd=0x8b15 len=20
>> Wireless event: new AP: 00:15:e9:0e:98:d2
>> State: ASSOCIATING -> ASSOCIATED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> Associated to a new BSS: BSSID=00:15:e9:0e:98:d2
>> No keys have been configured - skip key clearing
>> Associated with 00:15:e9:0e:98:d2
>> WPA: Association event - clear replay counter
>> WPA: Clear old PTK
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - portEnabled=1
>> EAPOL: SUPP_PAE entering state CONNECTING
>> EAPOL: enable timer tick
>> EAPOL: SUPP_BE entering state IDLE
>> Setting authentication timeout: 10 sec 0 usec
>> Cancelling scan request
>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
>> RX EAPOL from 00:15:e9:0e:98:d2
>> RX EAPOL - hexdump(len=107): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
>> 00 04 c1 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f e7 4a 58 6a e8 61 3f
>> 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00
>> Setting authentication timeout: 10 sec 0 usec
>> IEEE 802.1X RX: version=1 type=3 length=95
>>   EAPOL-Key type=254
>>   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
>>   key_length=32 key_data_length=0
>>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 04 c1
>>   key_nonce - hexdump(len=32): 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f
>> e7 4a 58 6a e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6
>>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00
>>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00
>> WPA: RX EAPOL-Key - hexdump(len=107): 01 03 00 5f fe 00 89 00 20 00 00
>> 00 00 00 00 04 c1 41 54 43 3b 77 97 f2 56 00 b8 1d 08 3f e7 4a 58 6a
>> e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 00 00 00
>> WPA: ignoring 8 bytes after the IEEE 802.1X data
>> State: ASSOCIATED -> 4WAY_HANDSHAKE
>> WPA: RX message 1 of 4-Way Handshake from 00:15:e9:0e:98:d2 (ver=1)
>> WPA: Renewed SNonce - hexdump(len=32): 33 b6 17 64 96 be c5 d0 80 53
>> 8e 3c c5 42 1f 70 80 58 bb 35 36 3d c7 28 d5 ca da 35 a2 84 29 87
>> WPA: PTK derivation - A1=00:1a:6b:a1:21:53 A2=00:15:e9:0e:98:d2
>> WPA: PMK - hexdump(len=32): [REMOVED]
>> WPA: PTK - hexdump(len=64): [REMOVED]
>> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
>> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> WPA: Sending EAPOL-Key 2/4
>> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00
>> 00 00 00 00 04 c1 33 b6 17 64 96 be c5 d0 80 53 8e 3c c5 42 1f 70 80
>> 58 bb 35 36 3d c7 28 d5 ca da 35 a2 84 29 87 00 00 00 00 00 00 00 00
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>> 00 a9 93 a1 4a 43 bf 6e 29 27 b3 97 f9 df 15 21 48 00 18 dd 16 00 50
>> f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
>> EAPOL: startWhen --> 0
>> EAPOL: disable timer tick
>> EAPOL: SUPP_PAE entering state CONNECTING
>> EAPOL: enable timer tick
>> EAPOL: txStart
>> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>> Wireless event: cmd=0x8b15 len=20
>> Wireless event: new AP: 00:00:00:00:00:00
>> WPA: 4-Way Handshake failed - pre-shared key may be incorrect
>> Setting scan request: 0 sec 100000 usec
>> Added BSSID 00:15:e9:0e:98:d2 into blacklist
>> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> State: 4WAY_HANDSHAKE -> DISCONNECTED
>> _______________________________________________
>> HostAP mailing list
>> HostAP at lists.shmoo.com
>> http://lists.shmoo.com/mailman/listinfo/hostap
>



More information about the Hostap mailing list