WPA-EAP network stops working after random interval
George B.
list1
Mon Dec 5 13:48:25 PST 2011
Hello,
I believe I have also hit the issue described here (not sure how to
properly reply to an archived message):
http://lists.shmoo.com/pipermail/hostap/2011-November/024771.html
Debian (Sid)
Linux 3.1.0-1-amd64
wpasupplicant 0.7.3-5
firmware-iwlwifi 0.34
0c:00.0 Network controller: Intel Corporation WiFi Link 5100
Subsystem: Intel Corporation WiFi Link 5100 AGN
Upstream router is an old 3Com Office Connect that has been working
perfectly for about 3 years.
I have only noticed the problem in the last few weeks, which makes me
suspect that some recent update (kernel, or driver, or something else)
broke something, but I wanted to run the data past you guys first.
I am able to reproduce the issue - it takes about 5-10 minutes to hit.
Running "reassoc" from wpa_cli also resolves the issue for me until next
time (thanks H?vard!)
Setup:
---
ap_scan=1
ctrl_interface=/var/run/wpa_supplicant
network={
ssid=...
scan_ssid=0
proto=WPA RSN
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
psk=...
}
wpa_supplicant -i wlan0 -c wpa_supplicant.conf -D wext -ddd
pump -i wlan0
ping 8.8.8.8 (until no reply)
wpa_cli (to monitor)
---
The patter is always the following message seen twice (in wpa_cli, with
some time in between):
---
<2>WPA: Group rekeying completed with 00:1e:c1:a2:70:50 [GTK=TKIP]
<2>WPA: Group rekeying completed with 00:1e:c1:a2:70:50 [GTK=TKIP]
---
After the first time everything works, after the second time
connectivity is lost (traces will eventually show ARP packets being sent
out by my laptop into the ether).
This is the bit from the debug log at the time of the second message above:
---
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX EAPOL from 00:1e:c1:a2:70:50
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00
01 ea 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4 13 26 5e 0b
58 90 35 a3 3d a9 0f 09 c2 a7 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 ea
key_nonce - hexdump(len=32): 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc
f5 62 d1 50 e4 13 26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a7
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00
00 00 00 01 ea 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4 13
26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a7 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: COMPLETED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1e:c1:a2:70:50 (ver=1)
WPA: PTK derivation - A1=00:22:fb:2b:05:0e A2=00:1e:c1:a2:70:50
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00
00 00 00 00 01 ea 1a f9 5a ad 59 d1 38 02 11 e0 97 7b f8 e6 4e 17 55 47
4b 7a 72 a6 b2 c5 fb 4b d2 cb b0 20 e1 4a 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 53
9d e7 32 7b 8c 92 2e cf 3d 4a 89 d8 31 cd 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:1e:c1:a2:70:50
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 01 eb 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4 13 26 5e
0b 58 90 35 a3 3d a9 0f 09 c2 a7 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c8 94 47 7c
ae a6 a5 ac 7e 7c f4 a5 55 a7 c8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 eb
key_nonce - hexdump(len=32): 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc
f5 62 d1 50 e4 13 26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a7
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a3 c8 94 47 7c ae a6 a5 ac 7e 7c f4 a5 55
a7 c8
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
00 00 00 00 01 eb 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4
13 26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a7 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c8
94 47 7c ae a6 a5 ac 7e 7c f4 a5 55 a7 c8 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX EAPOL from 00:1e:c1:a2:70:50
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 b1 00 20 00 00 00 00 00
00 01 ed 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4 13 26 5e
0b 58 90 35 a3 3d a9 0f 09 c2 a9 d1 50 e4 13 26 5e 0b 58 90 35 a3 3d a9
0f 09 c2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 8a 0f c0 d7
7d ff 33 14 31 b8 da 7b c6 4e a5 00 20 42 42 4a 6c c2 3b 77 2f 78 b1 16
77 57 47 06 cc b9 4a 2c 4b 05 99 f7 cf 10 9c b5 d1 93 e0 d1 a8
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x3b1 (ver=1 keyidx=3 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 01 ed
key_nonce - hexdump(len=32): 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc
f5 62 d1 50 e4 13 26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a9
key_iv - hexdump(len=16): d1 50 e4 13 26 5e 0b 58 90 35 a3 3d a9 0f
09 c2
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 86 8a 0f c0 d7 7d ff 33 14 31 b8 da 7b c6
4e a5
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 b1 00 20 00 00
00 00 00 00 01 ed 00 b8 ef 01 4a 65 0c 9e 7e 52 3a a8 dc f5 62 d1 50 e4
13 26 5e 0b 58 90 35 a3 3d a9 0f 09 c2 a9 d1 50 e4 13 26 5e 0b 58 90 35
a3 3d a9 0f 09 c2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 8a
0f c0 d7 7d ff 33 14 31 b8 da 7b c6 4e a5 00 20 42 42 4a 6c c2 3b 77 2f
78 b1 16 77 57 47 06 cc b9 4a 2c 4b 05 99 f7 cf 10 9c b5 d1 93 e0 d1 a8
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: RX message 1 of Group Key Handshake from 00:1e:c1:a2:70:50 (ver=1)
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=3 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 31 00 20 00 00 00
00 00 00 01 ed 00 00 00 00 00 00 00 00 00 00 0
---
I attach an extract from the capture file:
.104 is my laptop
.101 is the 3Com router
:23:11 is another PC on the wireless network (Windows Vista which works
just fine)
I also have an iPhone on the WLAN and it also works fine (not in the
capture).
Apologies if the data is incomplete I have never spent any time digging
around with Linux WPA stuff - always used Wicd to care of it for me -
let me know what else I can send you.
Thanks,
George
-------------- next part --------------
A non-text attachment was scrubbed...
Name: wlan0-snip.cap
Type: application/cap
Size: 2629 bytes
Desc: not available
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20111205/347b9555/attachment-0001.cap
More information about the Hostap
mailing list