CCMP and Apple and WPS

Drasko DRASKOVIC drasko.draskovic
Tue May 6 09:46:55 PDT 2014


Hi all,

On Tue, May 6, 2014 at 9:37 AM, Drasko DRASKOVIC
<drasko.draskovic at gmail.com> wrote:
> Hi Avinash,
>
> On Tue, May 6, 2014 at 3:53 AM, Avinash Patil <avinashapatil at gmail.com> wrote:
>> Hi Drasko,
>>
>> With WPS2.0, WPA TKIP is not allowed combination.
>
> - How to force WPS v1.0 then?
> - Any idea why CCMP does not work with Apple devices?

Here is log from iPad trying to connect to hostapd2.1 (below).

Do you have any idea why
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
is provoked after
wlan0: STA fc:25:3f:90:a4:b6 WPA: pairwise key handshake completed (RSN)

BR,
Drasko


nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station fc:25:3f:90:a4:b6
nl80211: Assoc Req IEs - hexdump(len=134): 00 06 41 4c 54 45 52 41 01
08 82 84 8b 96 24 30 48 6c 21 02 08 11 24 02 01 0d 30 14 01 00 00 0f
ac 02 01 00 00 0f0
wlan0: Event ASSOC (0) received
Add randomness: count=5 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=6): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: STA fc:25:3f:90:a4:b6 IEEE 802.11: associated
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for fc:25:3f:90:a4:b6
(300 seconds - ap_max_inactivity)
wlan0: STA fc:25:3f:90:a4:b6 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x2f3d20
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=fc:25:3f:90:a4:b6
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA fc:25:3f:90:a4:b6 WPA: start authentication
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x2f3d20
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=fc:25:3f:90:a4:b6
wlan0: STA fc:25:3f:90:a4:b6 IEEE 802.1X: unauthorizing port
WPA: fc:25:3f:90:a4:b6 WPA_PTK_GROUP entering state IDLE
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state AUTHENTICATION
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state AUTHENTICATION2
Get randomness: len=32 entropy=2
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Assign ANonce - hexdump(len=32): 9e 60 c5 2a 00 4c fc 39 2f d2 fb
eb 06 7a 7f f0 1f aa 11 e2 6b 19 c3 ba 48 ab 68 60 db d8 cd d8
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state INITPSK
Searching a PSK for fc:25:3f:90:a4:b6 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
Searching a PSK for fc:25:3f:90:a4:b6 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state PTKSTART
wlan0: STA fc:25:3f:90:a4:b6 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1
kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for
fc:25:3f:90:a4:b6 (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 121 bytes from fc:25:3f:90:a4:b6
   IEEE 802.1X: version=2 type=3 length=117
WPA: Received EAPOL-Key from fc:25:3f:90:a4:b6 key_info=0x10a type=2
key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): e2 ae ea 89 ab b5 a2 51 da
e9 d7 4b 45 a6 d2 cd 69 94 66 b9 ca 36 51 b3 72 62 6c ed ce dd 76 ea
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
Add randomness: count=6 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=32): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: STA fc:25:3f:90:a4:b6 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for fc:25:3f:90:a4:b6 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
WPA: PTK derivation - A1=80:1f:02:a7:98:25 A2=fc:25:3f:90:a4:b6
WPA: Nonce1 - hexdump(len=32): 9e 60 c5 2a 00 4c fc 39 2f d2 fb eb 06
7a 7f f0 1f aa 11 e2 6b 19 c3 ba 48 ab 68 60 db d8 cd d8
WPA: Nonce2 - hexdump(len=32): e2 ae ea 89 ab b5 a2 51 da e9 d7 4b 45
a6 d2 cd 69 94 66 b9 ca 36 51 b3 72 62 6c ed ce dd 76 ea
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA fc:25:3f:90:a4:b6 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1
kde_len=86 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 99 bytes from fc:25:3f:90:a4:b6
   IEEE 802.1X: version=2 type=3 length=95
WPA: Received EAPOL-Key from fc:25:3f:90:a4:b6 key_info=0x30a type=2
key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA fc:25:3f:90:a4:b6 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=3 addr=0x2f3d20
key_idx=0 set_tx=1 seq_len=0 key_len=16
   addr=fc:25:3f:90:a4:b6
wlan0: AP-STA-CONNECTED fc:25:3f:90:a4:b6
wlan0: STA fc:25:3f:90:a4:b6 IEEE 802.1X: authorizing port
wlan0: STA fc:25:3f:90:a4:b6 RADIUS: starting accounting session
00000388-00000002
wlan0: STA fc:25:3f:90:a4:b6 WPA: pairwise key handshake completed (RSN)
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station fc:25:3f:90:a4:b6
wlan0: Event DISASSOC (1) received
wlan0: STA fc:25:3f:90:a4:b6 IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED fc:25:3f:90:a4:b6
wlan0: STA fc:25:3f:90:a4:b6 WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x2f3d20
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=fc:25:3f:90:a4:b6
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state DISCONNECTED
WPA: fc:25:3f:90:a4:b6 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x2f3d20
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=fc:25:3f:90:a4:b6
wlan0: STA fc:25:3f:90:a4:b6 IEEE 802.1X: unauthorizing port
nl80211: sta_remove -> DEL_STATION wlan0 fc:25:3f:90:a4:b6 --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for fc:25:3f:90:a4:b6



More information about the Hostap mailing list