psk AUTHENTICATED but no connection

and hansen and0806
Thu May 19 08:58:00 PDT 2005


Hello list users

I'm trying to make a simple wpa-psk setup with
hostapd-0.3.7, wpa_supplicant0.3.8, madwifi-20050511
and
2.6.8.1-24mdk linux (mandrake10.1)

The master mode device is controlling its own NAT
network
and its working very nice whitout any security setup
but when I switch to wpa-psk with hostap, on the ap
and wpa_supp. on the client, then I get SUCCESS and
AUTHENTICEATED
but I can't drag any data from a to b ?
I have testet my wpa_supp. configuration against a
linksys wap54g
with wpa-psk enablet, so i guess my wpa client is ok.
I also have to mention that I have to restart the
network after the start of
hostapd and wpa_supp. in both ends, before I get
"AUTHENTICATED"
but still no data.
I hope someone can crawl down in my output and perhaps
spot the problem,
I'm om dead gound here, I have been fiddling around
whitout any success

Best Regards Lasse T. Jensen
here follows my two config files and their output.


##### hostapd configuration file
##############################################
interface=ath0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=t245
macaddr_acl=0
accept_mac_file=/etc/hostapd.accept
deny_mac_file=/etc/hostapd.deny
auth_algs=1 
eap_authenticator=0
eap_message=hello
eapol_key_index_workaround=0
own_ip_addr=10.10.10.1
wpa=1
wpa_psk=5fdaeed52572ab31258c1ccd48ed73775bc476c239c6e626010e0a0b9269651e
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP CCMP
###############################################################################



##### wpa_supplicant configuration file
#######################################
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
network={
        ssid="t245"
       
psk=5fdaeed52572ab31258c1ccd48ed73775bc476c239c6e626010e0a0b9269651e
}
###############################################################################



###############################################################################
[root at accesspoint root]# hostapd /etc/hostapd.conf -d
Configuration file: /etc/hostapd.conf
Using interface ath0 with hwaddr 00:0f:a3:80:bb:23 and
ssid 't245'
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 9c aa cf 84 b6 8f 12 81 79 36
93 e2 0e 76 67 99 f0 74 17 5c 97 26 c7 92 b7 1b 46 94
32 2c 7f 71
GTK - hexdump(len=32): cb 73 bb ee 46 59 47 35 1b dc
22 2d e4 f2 11 5b a9 a9 3a 4e 7b 59 0c bb 3e f8 59 69
18 0c 95 b2
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00
key_idx=1
Flushing old station entries
Deauthenticate all stations
l2_packet_receive - recv: Network is down
l2_packet_receive - recv: Network is down
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.11: associated
  New STA
No WPA/RSN information element for station!?
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.11: deassociated
ath0: STA 00:0f:a3:07:16:b3 WPA: event 2 notification
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.11: associated
  New STA
ath0: STA 00:0f:a3:07:16:b3 WPA: event 1 notification
ath0: STA 00:0f:a3:07:16:b3 WPA: start authentication
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
INITIALIZE
madwifi_del_key: addr=00:0f:a3:07:16:b3 key_idx=0
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.1X: unauthorizing
port
WPA: 00:0f:a3:07:16:b3 WPA_PTK_GROUP entering state
IDLE
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
AUTHENTICATION
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
AUTHENTICATION2
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state INITPSK
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:a3:07:16:b3 WPA: sending 1/4 msg of
4-Way Handshake
IEEE 802.1X: 123 bytes from 00:0f:a3:07:16:b3
   IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:0f:a3:07:16:b3 WPA: received EAPOL-Key
frame (2/4 Pairwise)
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
PTKCALCNEGOTIATING
PMK - hexdump(len=32): 5f da ee d5 29 72 ab 31 25 8c
1c fd 48 ed 77 77 5b c6 76 c2 39 c6 e6 26 01 0e 0a 0b
92 69 65 1e
PTK - hexdump(len=64): 01 49 f5 af 42 24 d8 3b ab 09
93 a0 9a 1a 93 ea 66 b0 7b 88 2b 88 14 71 8a a1 f3 a0
3d ec 8b 17 76 4d 6a 2e 73 5b e8 67 06 cf 97 95 ee 1b
70 fe 9c 5e 4b 23 0d 43 c2 64 06 6f 72 fd 12 66 9c 77
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
PTKCALCNEGOTIATING2
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0f:a3:07:16:b3 WPA: sending 3/4 msg of
4-Way Handshake
IEEE 802.1X: 99 bytes from 00:0f:a3:07:16:b3
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:0f:a3:07:16:b3 WPA: received EAPOL-Key
frame (4/4 Pairwise)
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:0f:a3:07:16:b3
key_idx=0
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.1X: authorizing
port
ath0: STA 00:0f:a3:07:16:b3 WPA: pairwise key
handshake completed (WPA)
WPA: 00:0f:a3:07:16:b3 WPA_PTK_GROUP entering state
REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:0f:a3:07:16:b3 WPA: sending 1/2 msg of
Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=40): cb 73
bb ee 46 59 47 35 1b dc 22 2d e4 f2 11 5b a9 a9 3a 4e
7b 59 0c bb 3e f8 59 69 18 0c 95 b2 00 00 00 00 00 00
00 00
IEEE 802.1X: 99 bytes from 00:0f:a3:07:16:b3
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:0f:a3:07:16:b3 WPA: received EAPOL-Key
frame (2/2 Group)
WPA: 00:0f:a3:07:16:b3 WPA_PTK_GROUP entering state
REKEYESTABLISHED
ath0: STA 00:0f:a3:07:16:b3 WPA: group key handshake
completed (WPA)
WPA: 00:0f:a3:07:16:b3 WPA_PTK_GROUP entering state
IDLE
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.11: deassociated
ath0: STA 00:0f:a3:07:16:b3 WPA: event 2 notification
madwifi_del_key: addr=00:0f:a3:07:16:b3 key_idx=0
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
DISCONNECTED
WPA: 00:0f:a3:07:16:b3 WPA_PTK entering state
INITIALIZE
madwifi_del_key: addr=00:0f:a3:07:16:b3 key_idx=0
ath0: STA 00:0f:a3:07:16:b3 IEEE 802.1X: unauthorizing
port
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
Signal 2 received - terminating
Flushing old station entries
Deauthenticate all stations
madwifi_set_privacy: enabled=0
###############################################################################
here i have killed the procces with Ctrl+C





###############################################################################
[root at wlan-client root]# wpa_supplicant -iath0
-c/etc/wpa_supplicant.conf -d
Initializing interface 'ath0' conf
'/etc/wpa_supplicant.conf' driver 'default'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
Priority group 0
   id=0 ssid='t245'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0f:a3:07:16:b3
wpa_driver_madwifi_set_wpa: enabled=1
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 210 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:a3:80:bb:23 ssid='t245' wpa_ie_len=28
rsn_ie_len=0
   selected
Trying to associate with 00:0f:a3:80:bb:23
(SSID='t245' freq=2457 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24
key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01
01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=17
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
l2_packet_receive - recv: Network is down
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Authentication with 00:00:00:00:00:00 timed out.
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
ioctl[SIOCSIWSCAN]: Invalid argument
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b1a len=13
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=17
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 210 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:a3:80:bb:23 ssid='t245' wpa_ie_len=28
rsn_ie_len=0
   selected
Trying to associate with 00:0f:a3:80:bb:23
(SSID='t245' freq=2457 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24
key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01
01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=17
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:a3:80:bb:23
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0f:a3:80:bb:23
No keys have been configured - skip key clearing
Associated with 00:0f:a3:80:bb:23
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1
len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0f:a3:80:bb:23
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state
machines
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from
00:0f:a3:80:bb:23 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50
f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50
f2 02
WPA: Renewed SNonce - hexdump(len=32): ee 80 ef 67 1c
78 e1 86 df e9 b5 2c 81 88 fa b2 51 70 90 4e f6 c2 fc
e8 19 65 5e 5b f8 ba 9b 98
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): ef 8f 47 56 bd
3e b8 e0 15 02 04 46 db a6 5c b8
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0f:a3:80:bb:23
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state
machines
IEEE 802.1X RX: version=2 type=3 length=123
  EAPOL-Key type=254
WPA: RX message 3 of 4-Way Handshake from
00:0f:a3:80:bb:23 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01
01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00
00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0
set_tx=1 seq_len=6 key_len=16
RX EAPOL from 00:0f:a3:80:bb:23
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state
machines
IEEE 802.1X RX: version=2 type=3 length=135
  EAPOL-Key type=254
WPA: RX message 1 of Group Key Handshake from
00:0f:a3:80:bb:23 (ver=2)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 04 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=1
set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:0f:a3:80:bb:23
[PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
###############################################################################




More information about the Hostap mailing list