wpa_supplicant receives dissociate event

Paresh Sawant paresh.sawant
Thu May 21 10:48:15 PDT 2009


Could I get some pointers on how to enable debug output from driver ?

Thanks
- Paresh

On Thu, May 21, 2009 at 8:15 PM, Dan Williams <dcbw at redhat.com> wrote:

> On Thu, 2009-05-21 at 11:27 +0530, Paresh Sawant wrote:
> > I monitored traffic on wireshark, AP is not sending dissociate frame.
> > It is the driver/card at wpa_supplicant end initiating the the
> > dissociate.
> >
> > One observation is when i run command "iwconfig wlan0" while
> > wpa_supplicant is running , i see the frequecy/channel varying. My AP
> > works at channel 6 so i think station card should be tuned to same
> > channel, but instead i see it changing continuosly.
> >
> >  Is it a correct combination of wlan0 and wext to be used to make it
> > work? or i should try madwifi instead?
>
> ok, so then it's something in the driver.  Can you enable debugging
> output from the driver to perhaps see what's going on here?
>
> Dan
>
>
> >
> > - Paresh
> >
> > On Thu, May 21, 2009 at 12:51 AM, Dan Williams <dcbw at redhat.com>
> > wrote:
> >         On Wed, 2009-05-20 at 17:34 +0530, Paresh Sawant wrote:
> >         >
> >         > Hi,
> >         >
> >         > I've built wpa_supplicant on Linux (kernel
> >         2.6.25-14.fc9.i686), with
> >         > wext driver, and runing it on netgear wg311T(atheros
> >         AR5212). I start
> >         > the wpa_supplicant with -i wlan0 and -D wext, but it fails
> >         to do the
> >         > connection with WPA2-PSK configured AP. wireshark shows me
> >         that it
> >         > reaches till 2/4 of 4-way-hshake. But then it seems to
> >         receive
> >         > dissociate event from the hardware/driver. I'm passing
> >         correct key for
> >         > PSK auth.
> >
> >
> >         You'll have to find out from the driver why the disassociation
> >         is
> >         happening.  It might also be triggered by the AP itself, so
> >         you could
> >         also sniff packets from the air to figure out if the AP has
> >         disassociated you for some reason.
> >
> >         Dan
> >
> >
> >         > Following is the log message -
> >         >
> >         > /******************debug
> >         > log****************************************************
> >         >
> >         > State: ASSOCIATED -> DISCONNECTED
> >         > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> >         > WEXT: Operstate: linkmode=-1, operstate=5
> >         > EAPOL: External notification - portEnabled=0
> >         > EAPOL: SUPP_PAE entering state DISCONNECTED
> >         > EAPOL: SUPP_BE entering state INITIALIZE
> >         > EAPOL: External notification - portValid=0
> >         > EAPOL: External notification - EAP success=0
> >         > RX EAPOL from 00:1d:7e:f4:d7:07
> >         > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00
> >         00 00 00 00
> >         > 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71 55 8e e4
> >         ef 5f ea
> >         > 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00 00 00 00
> >         00 00 00
> >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >         00 00 00
> >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> >         ac 04 b0
> >         > 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> >         > Setting authentication timeout: 10 sec 0 usec
> >         > IEEE 802.1X RX: version=2 type=3 length=117
> >         >   EAPOL-Key type=2
> >         >   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> >         >   key_length=16 key_data_length=22
> >         >   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
> >         >   key_nonce - hexdump(len=32): fd cc 9e 98 1d 47 b3 25 9a 6d
> >         8d fd 3d
> >         > 71 55 8e e4 ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9
> >         >   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00
> >         00 00 00
> >         > 00 00
> >         >   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> >         >   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00
> >         00
> >         >   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00
> >         00 00 00 00
> >         > 00 00
> >         > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a
> >         00 10 00 00
> >         > 00 00 00 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71
> >         55 8e e4
> >         > ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00
> >         00 00 00
> >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >         00 00 00
> >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd
> >         14 00 0f
> >         > ac 04 b0 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> >         > State: DISCONNECTED -> 4WAY_HANDSHAKE
> >         > WPA: RX message 1 of 4-Way Handshake from 00:1d:7e:f4:d7:07
> >         (ver=2)
> >         > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04
> >         b0 2a ff fe
> >         > db bc a9 c5 e2 9d 88 ae d1 df 84 ba
> >         > RSN: PMKID from Authenticator - hexdump(len=16): b0 2a ff fe
> >         db bc a9
> >         > c5 e2 9d 88 ae d1 df 84 ba
> >         > RSN: no matching PMKID found
> >         > WPA: Renewed SNonce - hexdump(len=32): d8 f1 69 54 1a e7 9f
> >         46 16 b2
> >         > b4 97 00 4b 1f 35 52 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec
> >         d9 bd
> >         > WPA: PMK - hexdump(len=32): [REMOVED]
> >         > WPA: PTK - hexdump(len=64): [REMOVED]
> >         > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f
> >         ac 02 01
> >         > 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> >         > WPA: Sending EAPOL-Key 2/4
> >         > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a
> >         00 00 00 00
> >         > 00 00 00 00 00 00 d8 f1 69 54 1a e7 9f 46 16 b2 b4 97 00 4b
> >         1f 35 52
> >         > 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd 00 00 00 00 00
> >         00 00 00
> >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >         00 00 00
> >         > 00 63 b4 56 74 f3 18 fc f5 14 f4 64 57 d3 4e 2e 84 00 16 30
> >         14 01 00
> >         > 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> >         > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> >         > Wireless event: cmd=0x8b15 len=20
> >         > Wireless event: new AP: 00:00:00:00:00:00
> >         > WPA: 4-Way Handshake failed - pre-shared key may be
> >         incorrect
> >         > Setting scan request: 0 sec 100000 usec
> >         > Added BSSID 00:00:00:00:00:00 into blacklist
> >         > CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> >         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
> >         key_len=0
> >         > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0
> >         key_len=0
> >         > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0
> >         key_len=0
> >         > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0
> >         key_len=0
> >         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
> >         key_len=0
> >         > ioctl[SIOCSIWENCODEEXT]: No such file or directory
> >         > Driver did not support SIOCSIWENCODEEXT
> >         > State: 4WAY_HANDSHAKE -> DISCONNECTED
> >         >
> >         >
> /***********************************************end************************************************************/
> >         >
> >         >
> >         > Thanks
> >         > - Paresh
> >
> >         > _______________________________________________
> >         > HostAP mailing list
> >         > HostAP at lists.shmoo.com
> >         > http://lists.shmoo.com/mailman/listinfo/hostap
> >
> >
> > _______________________________________________
> > HostAP mailing list
> > HostAP at lists.shmoo.com
> > http://lists.shmoo.com/mailman/listinfo/hostap
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20090521/d7da2380/attachment.htm 



More information about the Hostap mailing list