FW: [wpa_supplicant] Most WPA AP:s dont get to WPA_4WAY_HANDSHAKE state when wrong PSK is supplied

Jouni Malinen j
Mon Dec 13 13:15:08 PST 2010


On Mon, Dec 13, 2010 at 06:19:19PM +0100, Olsson, Ola1 wrote:
> I have attached the whole log from a bad-psk on a less good behaving AP. I can't see why I am inconsistent as the first example was a "bad psk on a bad AP" which is now attached. The logs you were referring to were an example of a good behaving AP " Bad PSK on a good AP (Dlink DIR-635)". I am sorry if that confused you, I am not interested in that case as it works perfectly. I just brought it up to show you that I actually have an AP where the supplicant is working fine.

Are you able to associate with this "bad AP" even with the correct
passphrase? The debug log here seemed to indicate that the driver did
not event manage to get associated and there was not even a single
EAPOL-Key frame coming to wpa_supplicant. As such, there was no way of
the incorrect passphrase having been used and there should not have been
any difference whatsoever on which passphrase were configured. In this
type of case, wpa_supplicant has no way of knowing whether the
passphrase was correct and as such, not seeing an event indicating
possible incorrect passphrase is the expected and correct behavior.

-- 
Jouni Malinen                                            PGP id EFC895FA



More information about the Hostap mailing list