Hostapd 0.4.2, madwifi and windows xp sp2

Michael Misiewicz mmisiewicz
Sun Oct 16 12:14:26 PDT 2005


Hello all,

I'm trying to set up a WPA enabled AP using madwifi and hostapd. I have 
a XP sp2 client that is able to associate with the network, and hostapd 
seems happy with it, but cannot send or receive any data (ie, no dhcp, 
ping, etc). The curious thing is that hostapd indicates that the client 
is authorized.

Some details:
The card is a netgear atheros pci card (PCI ID 168c:0013 rev 01), and 
works just fine with madwifi in WEP mode. I've used this card in managed 
mode for some time with WEP and its worked well.
Using hostapd 0.4.2 from debian unstable
Madwifi from CVS (I cant seem to build hostapd against madwifi from CVS)
XP Client has a broadcom card and has SP2 installed- so WPA support 
should be enabled.

The details from my hostapd.conf file:

 interface=ath0
 driver=madwifi
 logger_syslog=-1
 logger_syslog_level=2
 logger_stdout=-1
 logger_stdout_level=2
 dump_file=/tmp/hostapd.dump
 ctrl_interface=/var/run/hostapd
 ctrl_interface_group=0
 eapol_key_index_workaround=0
 macaddr_acl=0
 auth_algs=3
 ssid=the matrix
 wpa=1
 wpa_passphrase=password
 wpa_key_mgmt=WPA-PSK
 wpa_pairwise=TKIP
 wpa_group_rekey=600


Below is the output from hostapd -dd hostapd.conf.
 
Thanks in advance for any help!

Configuration file: hostapd.conf
Line 106: obsolete eap_authenticator used; this has been renamed to 
eap_server
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:09:5b:92:a7:76 and ssid 'the matrix'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x1
madwifi_set_iface_flags: dev_up=1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 7c 8a 63 45 92 96 17 46 d7 b5 ec c8 3c f1 a1 4b 
52 d0 79 90 18 71 df c7 90 aa 35 b2 29 87 82 f0
GTK - hexdump(len=32): 86 27 ff ea 25 65 64 c0 e2 1a d1 6d 08 f2 44 25 
4c 3f 74 6e 40 31 be 3c 54 6a 90 86 d2 f2 b3 bc
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
Flushing old station entries
Deauthenticate all stations
l2_packet_receive - recv: Network is down
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:90:4b:f8:ea:07 IEEE 802.11: associated
  New STA
ath0: STA 00:90:4b:f8:ea:07 WPA: event 1 notification
ath0: STA 00:90:4b:f8:ea:07 WPA: start authentication
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:90:4b:f8:ea:07 key_idx=0
ath0: STA 00:90:4b:f8:ea:07 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:90:4b:f8:ea:07 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
WPA: 00:90:4b:f8:ea:07 WPA_PTK_GROUP entering state IDLE
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state AUTHENTICATION
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state AUTHENTICATION2
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state INITPSK
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state PTKSTART
ath0: STA 00:90:4b:f8:ea:07 WPA: sending 1/4 msg of 4-Way Handshake
IEEE 802.1X: 5 bytes from 00:90:4b:f8:ea:07
   IEEE 802.1X: version=1 type=1 length=0
   ignoring 1 extra octets after IEEE 802.1X packet
IEEE 802.1X: 125 bytes from 00:90:4b:f8:ea:07
   IEEE 802.1X: version=1 type=3 length=121
ath0: STA 00:90:4b:f8:ea:07 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 10 12 20 04 56 36 6f 83 07 b7 af b3 b0 fa 7d 65 
7b 01 0d 9f 55 71 14 a7 7f 0c 17 c4 3c 77 88 52
PTK - hexdump(len=64): ed 12 83 70 cf 2d 36 57 d0 13 38 be f6 71 ab 02 
5a 61 ec 3c 98 91 be a1 a8 d3 be 34 c0 68 27 e1 e8 8f af 85 6f c3 ce a0 
34 69 f8 bf a5 2a b9 47 67 68 46 72 84 29 ea 15 ef dd 74 cc 74 ab 7e 9b
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:90:4b:f8:ea:07 WPA: sending 3/4 msg of 4-Way Handshake
IEEE 802.1X: 99 bytes from 00:90:4b:f8:ea:07
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:90:4b:f8:ea:07 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:90:4b:f8:ea:07 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:90:4b:f8:ea:07 key_idx=0
ath0: STA 00:90:4b:f8:ea:07 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:90:4b:f8:ea:07 authorized=1
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
ath0: STA 00:90:4b:f8:ea:07 WPA: pairwise key handshake completed (WPA)
WPA: 00:90:4b:f8:ea:07 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:90:4b:f8:ea:07 WPA: sending 1/2 msg of Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=40): 86 27 ff ea 25 65 64 c0 
e2 1a d1 6d 08 f2 44 25 4c 3f 74 6e 40 31 be 3c 54 6a 90 86 d2 f2 b3 bc 
00 00 00 00 00 00 00 00
ath0: STA 00:90:4b:f8:ea:07 WPA: EAPOL-Key timeout
WPA: 00:90:4b:f8:ea:07 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:90:4b:f8:ea:07 WPA: sending 1/2 msg of Group Key Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=40): 86 27 ff ea 25 65 64 c0 
e2 1a d1 6d 08 f2 44 25 4c 3f 74 6e 40 31 be 3c 54 6a 90 86 d2 f2 b3 bc 
00 00 00 00 00 00 00 00
IEEE 802.1X: 99 bytes from 00:90:4b:f8:ea:07
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:90:4b:f8:ea:07 WPA: received EAPOL-Key frame (2/2 Group)
WPA: 00:90:4b:f8:ea:07 WPA_PTK_GROUP entering state REKEYESTABLISHED
ath0: STA 00:90:4b:f8:ea:07 WPA: group key handshake completed (WPA)
WPA: 00:90:4b:f8:ea:07 WPA_PTK_GROUP entering state IDLE






More information about the Hostap mailing list