wpa_supplicant receives dissociate event

Dan Williams dcbw
Thu May 21 15:29:03 PDT 2009


On Thu, 2009-05-21 at 23:18 +0530, Paresh Sawant wrote:
> Could I get some pointers on how to enable debug output from driver ?

Well... which driver are we talking about here?  ath5k?  I think you
just said you were using 2.6.25, but I didn't recall seeing anything
about the driver here.  If so, run 'modinfo mac80211' and 'modinfo
ath5k' and you'll probably see some debug module parameters there.  They
usually control flags for which certain values turn on/off certain debug
topics.  Try 'options ath5k debug=0xff' in your /etc/modprobe.conf file
(or just 'modprobe ath5k debug=0xff') for starters.  I don't think
mac80211 has debugging code enabled in production kernels.

The other thing that's useful is the output of 'dmesg' from around the
time you get disconnect events.

Dan

> Thanks
> - Paresh
> 
> On Thu, May 21, 2009 at 8:15 PM, Dan Williams <dcbw at redhat.com> wrote:
>         On Thu, 2009-05-21 at 11:27 +0530, Paresh Sawant wrote:
>         > I monitored traffic on wireshark, AP is not sending
>         dissociate frame.
>         > It is the driver/card at wpa_supplicant end initiating the
>         the
>         > dissociate.
>         >
>         > One observation is when i run command "iwconfig wlan0" while
>         > wpa_supplicant is running , i see the frequecy/channel
>         varying. My AP
>         > works at channel 6 so i think station card should be tuned
>         to same
>         > channel, but instead i see it changing continuosly.
>         >
>         >  Is it a correct combination of wlan0 and wext to be used to
>         make it
>         > work? or i should try madwifi instead?
>         
>         
>         ok, so then it's something in the driver.  Can you enable
>         debugging
>         output from the driver to perhaps see what's going on here?
>         
>         Dan
>         
>         
>         
>         >
>         > - Paresh
>         >
>         > On Thu, May 21, 2009 at 12:51 AM, Dan Williams
>         <dcbw at redhat.com>
>         > wrote:
>         >         On Wed, 2009-05-20 at 17:34 +0530, Paresh Sawant
>         wrote:
>         >         >
>         >         > Hi,
>         >         >
>         >         > I've built wpa_supplicant on Linux (kernel
>         >         2.6.25-14.fc9.i686), with
>         >         > wext driver, and runing it on netgear
>         wg311T(atheros
>         >         AR5212). I start
>         >         > the wpa_supplicant with -i wlan0 and -D wext, but
>         it fails
>         >         to do the
>         >         > connection with WPA2-PSK configured AP. wireshark
>         shows me
>         >         that it
>         >         > reaches till 2/4 of 4-way-hshake. But then it
>         seems to
>         >         receive
>         >         > dissociate event from the hardware/driver. I'm
>         passing
>         >         correct key for
>         >         > PSK auth.
>         >
>         >
>         >         You'll have to find out from the driver why the
>         disassociation
>         >         is
>         >         happening.  It might also be triggered by the AP
>         itself, so
>         >         you could
>         >         also sniff packets from the air to figure out if the
>         AP has
>         >         disassociated you for some reason.
>         >
>         >         Dan
>         >
>         >
>         >         > Following is the log message -
>         >         >
>         >         > /******************debug
>         >         >
>         log****************************************************
>         >         >
>         >         > State: ASSOCIATED -> DISCONNECTED
>         >         > wpa_driver_wext_set_operstate: operstate 0->0
>         (DORMANT)
>         >         > WEXT: Operstate: linkmode=-1, operstate=5
>         >         > EAPOL: External notification - portEnabled=0
>         >         > EAPOL: SUPP_PAE entering state DISCONNECTED
>         >         > EAPOL: SUPP_BE entering state INITIALIZE
>         >         > EAPOL: External notification - portValid=0
>         >         > EAPOL: External notification - EAP success=0
>         >         > RX EAPOL from 00:1d:7e:f4:d7:07
>         >         > RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a
>         00 10 00
>         >         00 00 00 00
>         >         > 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d fd 3d 71
>         55 8e e4
>         >         ef 5f ea
>         >         > 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00 00 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd
>         14 00 0f
>         >         ac 04 b0
>         >         > 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84 ba
>         >         > Setting authentication timeout: 10 sec 0 usec
>         >         > IEEE 802.1X RX: version=2 type=3 length=117
>         >         >   EAPOL-Key type=2
>         >         >   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise
>         Ack)
>         >         >   key_length=16 key_data_length=22
>         >         >   replay_counter - hexdump(len=8): 00 00 00 00 00
>         00 00 00
>         >         >   key_nonce - hexdump(len=32): fd cc 9e 98 1d 47
>         b3 25 9a 6d
>         >         8d fd 3d
>         >         > 71 55 8e e4 ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a
>         c7 a9
>         >         >   key_iv - hexdump(len=16): 00 00 00 00 00 00 00
>         00 00 00 00
>         >         00 00 00
>         >         > 00 00
>         >         >   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00
>         00
>         >         >   key_id (reserved) - hexdump(len=8): 00 00 00 00
>         00 00 00
>         >         00
>         >         >   key_mic - hexdump(len=16): 00 00 00 00 00 00 00
>         00 00 00
>         >         00 00 00 00
>         >         > 00 00
>         >         > WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75
>         02 00 8a
>         >         00 10 00 00
>         >         > 00 00 00 00 00 00 fd cc 9e 98 1d 47 b3 25 9a 6d 8d
>         fd 3d 71
>         >         55 8e e4
>         >         > ef 5f ea 9a 08 21 b1 be d0 20 55 2d 4a c7 a9 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 16 dd
>         >         14 00 0f
>         >         > ac 04 b0 2a ff fe db bc a9 c5 e2 9d 88 ae d1 df 84
>         ba
>         >         > State: DISCONNECTED -> 4WAY_HANDSHAKE
>         >         > WPA: RX message 1 of 4-Way Handshake from
>         00:1d:7e:f4:d7:07
>         >         (ver=2)
>         >         > RSN: msg 1/4 key data - hexdump(len=22): dd 14 00
>         0f ac 04
>         >         b0 2a ff fe
>         >         > db bc a9 c5 e2 9d 88 ae d1 df 84 ba
>         >         > RSN: PMKID from Authenticator - hexdump(len=16):
>         b0 2a ff fe
>         >         db bc a9
>         >         > c5 e2 9d 88 ae d1 df 84 ba
>         >         > RSN: no matching PMKID found
>         >         > WPA: Renewed SNonce - hexdump(len=32): d8 f1 69 54
>         1a e7 9f
>         >         46 16 b2
>         >         > b4 97 00 4b 1f 35 52 1d 9f 87 0a 49 fd df 46 70 4e
>         d7 04 ec
>         >         d9 bd
>         >         > WPA: PMK - hexdump(len=32): [REMOVED]
>         >         > WPA: PTK - hexdump(len=64): [REMOVED]
>         >         > WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14
>         01 00 00 0f
>         >         ac 02 01
>         >         > 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>         >         > WPA: Sending EAPOL-Key 2/4
>         >         > WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75
>         02 01 0a
>         >         00 00 00 00
>         >         > 00 00 00 00 00 00 d8 f1 69 54 1a e7 9f 46 16 b2 b4
>         97 00 4b
>         >         1f 35 52
>         >         > 1d 9f 87 0a 49 fd df 46 70 4e d7 04 ec d9 bd 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>         00 00 00
>         >         00 00 00
>         >         > 00 63 b4 56 74 f3 18 fc f5 14 f4 64 57 d3 4e 2e 84
>         00 16 30
>         >         14 01 00
>         >         > 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00
>         00
>         >         > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>         >         > Wireless event: cmd=0x8b15 len=20
>         >         > Wireless event: new AP: 00:00:00:00:00:00
>         >         > WPA: 4-Way Handshake failed - pre-shared key may
>         be
>         >         incorrect
>         >         > Setting scan request: 0 sec 100000 usec
>         >         > Added BSSID 00:00:00:00:00:00 into blacklist
>         >         > CTRL-EVENT-DISCONNECTED - Disconnect event -
>         remove keys
>         >         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0
>         seq_len=0
>         >         key_len=0
>         >         > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0
>         seq_len=0
>         >         key_len=0
>         >         > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0
>         seq_len=0
>         >         key_len=0
>         >         > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0
>         seq_len=0
>         >         key_len=0
>         >         > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0
>         seq_len=0
>         >         key_len=0
>         >         > ioctl[SIOCSIWENCODEEXT]: No such file or directory
>         >         > Driver did not support SIOCSIWENCODEEXT
>         >         > State: 4WAY_HANDSHAKE -> DISCONNECTED
>         >         >
>         >
>         > /***********************************************end************************************************************/
>         >         >
>         >         >
>         >         > Thanks
>         >         > - Paresh
>         >
>         >         > _______________________________________________
>         >         > HostAP mailing list
>         >         > HostAP at lists.shmoo.com
>         >         > http://lists.shmoo.com/mailman/listinfo/hostap
>         >
>         >
>         > _______________________________________________
>         > HostAP mailing list
>         > HostAP at lists.shmoo.com
>         > http://lists.shmoo.com/mailman/listinfo/hostap
>         
>         
> 
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap




More information about the Hostap mailing list