Handshake fails with wpa2 enterprise
Frank Zambrini
fzambrini
Wed Jun 23 10:23:12 PDT 2010
Long story short, I was able to connect to my university's wpa2
enterprise network using wpa_supplicant with a configuration file I
found somewhere on the Internet (made the configuration file about 7
months ago). About two weeks ago my hard drive was corrupted and I lost
everything including my wpa_supplicant.conf file. After reinstalling the
same operating system (puppy linux), and using the same ssl certificate
I am unable to connect to the same network. I have tried every
configuration I for wpa enterprise (peap) that I could find (including
the one from the man page and one made by my university) but I still
keep getting the same error when attempting the 4way handshake. It keeps
repeating until I kill wpa_supplicant.
Does anyone know what the culprit could be? Any help would be GREATLY
appreciated.
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1a:6c:3c:37:c2 (ver=1)
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:1a:6c:3c:37:c2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
00 01 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08 6a a9 2a c8 68 0c 91 e7 0a
41 06 f4 1e f3 c0 09 8e 93 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08
6a a9 2a c8 68 0c 91 e7 0a 41 06 f4 1e f3 c0 09 8e 93 8d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 00 00 01 2b 67 1e 7f 46 0a 0e f1 9b 3d dc 9f 08 6a a9 2a c8 68 0c
91 e7 0a 41 06 f4 1e f3 c0 09 8e 93 8d 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1a:6c:3c:37:c2 (ver=1)
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
Here are the specifics about the network I obtained from wpa_cli
Selected interface 'wlan0'
bssid / frequency / signal level / flags / ssid
00:1a:6c:3c:2f:53 2462 159
[WPA-EAP-TKIP][WPA2-EAP-TKIP+CCMP] MYSSD
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20100623/0e0031ee/attachment.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: fzambrini.vcf
Type: text/x-vcard
Size: 105 bytes
Desc: not available
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20100623/0e0031ee/attachment.vcf
More information about the Hostap
mailing list