wpasupplicant and WEP (more info)
Erich Titl
erich.titl
Sun Jan 4 05:14:18 PST 2015
Hi Jouni
Am 03.01.2015 um 20:21 schrieb Jouni Malinen:
> On Wed, Dec 31, 2014 at 02:50:02PM +0100, Erich Titl wrote:
>> Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver
>> 'wext' ctrl_interface 'N/A' bridge 'N/A'
>> WEXT: cfg80211-based driver detected
>
> Which WLAN driver are you using and do you have any specific reason for
> using the years old and obsolete WEXT instead of the nl80211 control
> interface?
I am using b43
While WEXT is supposed to work, there is no point in trying
> to use it with a cfg80211-based driver that support nl80211.. In other
> words, please replace -Dwext on the command line with -Dnl80211 and try
> again. If that is still failing, this sounds like a driver specific
> issue since there is not really much that wpa_supplicant does for a WEP
> connection (it just configures the fixed WEP key).
I had to include nl80211 which was left out from the config, now using a
freshly compiled wpasupplicant
wlan0: Considering connect request: reassociate: 0 selected:
f8:1a:67:56:42:96 bssid: 00:00:00:00:
wlan0: Request association with f8:1a:67:56:42:96
wlan0: Add radio work 'sme-connect'@0x86d04a0
wlan0: First radio work item in the queue - schedule start immediately
wlan0: Starting radio work 'sme-connect'@0x86d04a0 after 0.000402 second
wait
wlan0: Automatic auth_alg selection: 0x1
wlan0: WPA: clearing AP WPA IE
wlan0: WPA: clearing AP RSN IE
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Cancelling scan request
wlan0: SME: Trying to authenticate with f8:1a:67:56:42:96
(SSID='scoobly' freq=2427 MHz)
wlan0: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=ForceAuthorized
nl80211: Authenticate (ifindex=4)
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=1 addr=(nil) key_idx=0
set_tx=1 seq_len=0 key_len=
nl80211: KEY_DATA - hexdump(len=13): [REMOVED]
nl80211: set_key failed; err=-67 Link has been severed)
* bssid=f8:1a:67:56:42:96
* freq=2427
* SSID - hexdump_ascii(len=7):
73 63 6f 6f 62 6c 79 scoobly
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station f8:1a:67:56:42:96
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlan0
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on
wlan0(00:1a:2b:5f:61:11) A1=00:1a:2b:5f:61:11 A
nl80211: MLME event frame - hexdump(len=30): b0 00 40 01 00 1a 2b 5f 61
11 f8 1a 67 56 42 96 f8 1a 6
nl80211: Authenticate event
wlan0: Event AUTH (11) received
wlan0: SME: Authentication response: peer=f8:1a:67:56:42:96 auth_type=0
auth_transaction=2 status_co
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlan0: Trying to associate with f8:1a:67:56:42:96 (SSID='scoobly'
freq=2427 MHz)
wlan0: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5
(IF_OPER_DORMANT)
wlan0: WPA: clearing own WPA/RSN IE
nl80211: Associate (ifindex=4)
* bssid=f8:1a:67:56:42:96
* freq=2427
* SSID - hexdump_ascii(len=7):
73 63 6f 6f 62 6c 79 scoobly
* IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
* pairwise=0xfac05
* group=0xfac05
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=5 linkmode=1
ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext ifi_flags=0x11003
([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext ifi_flags=0x11003
([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on
wlan0(00:1a:2b:5f:61:11) A1=00:1a:2b:5f:61:11 A2=f
nl80211: MLME event frame - hexdump(len=95): 10 00 40 01 00 1a 2b 5f 61
11 f8 1a 67 56 42 96 f8 1a 6
nl80211: Associate event
wlan0: Event ASSOC (0) received
wlan0: Association info event
resp_ies - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60
6c dd 18 00 50 f2 02 01 01
wlan0: freq=2427 MHz
wlan0: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5
(IF_OPER_DORMANT)
wlan0: Associated to a new BSS: BSSID=f8:1a:67:56:42:96
wlan0: Associated with f8:1a:67:56:42:96
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state S_FORCE_AUTH
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for f8:1a:67:56:42:96
EAPOL: SUPP_BE entering state IDLE
wlan0: Cancelling authentication timeout
wlan0: State: ASSOCIATED -> COMPLETED
wlan0: Radio work 'sme-connect'@0x86d04a0 done in 0.038049 seconds
wlan0: CTRL-EVENT-CONNECTED - Connection to f8:1a:67:56:42:96 completed
[id=0 id_str=]
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=6
(IF_OPER_UP)
wlan0: Cancelling scan request
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=1 addr=(nil) key_idx=0
set_tx=1 seq_len=0 key_len=
nl80211: KEY_DATA - hexdump(len=13): [REMOVED]
This here appears to be interesting
nl80211: set_key failed; err=-22 Invalid argument)
RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=6 linkmode=1
ifi_flags=0x11043 ([UP][RUNNING][LOWER_
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
nl80211: Ignore connect event (cmd=46) when using userspace SME
CTRL_IFACE monitor attached /tmp/wpa_ctrl_8578-2\x00
wlan0: Control interface command 'BSS RANGE=ALL MASK=0x2'
wlan0: Control interface command 'STATUS'
wlan0: Removing interface wlan0
wlan0: Request to deauthenticate - bssid=f8:1a:67:56:42:96
pending_bssid=00:00:00:00:00:00 reason=3
wpa_driver_nl80211_deauthenticate(addr=f8:1a:67:56:42:96 reason_code=3)
wlan0: Event DEAUTH (12) received
wlan0: Deauthentication notification
Still no luck with dhcpcd wlan0
I can see dhcp requests being sent on wlan0. The fact that I see them
coming in to the dhcp server and being replied to makes me believe that
WEP works at least for outgoing packets, but possibly not for incoming
reply packets.
cheers
Erich
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1908 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.shmoo.com/pipermail/hostap/attachments/20150104/ac58fa03/attachment-0001.bin>
More information about the Hostap
mailing list