is wpa_supplicant possible on bridged interface?

Markus Krieger krieger
Sun Feb 5 13:43:53 PST 2006


Hi there,

is there a way to tell wpa_supplicant that the given interface is part
of a bridge setup like the "bridge=" option for hostapd? The goal would be
to connect two layer 2 networks via a WPA protected wireless link.

I'm using madwifi-ng-r1437-20060204 for both the AP (hostapd-0.4.7)
and the client (wpa_supplicant-0.4.7). 

If the interface is not part of the bridge wpa_supplicant works like a charm:
# wpa_supplicant -iath0 -Dmadwifi -c/etc/wpa_supplicant.conf -dd

--- snip ---
Wireless event: new AP: 00:0b:6b:36:01:52
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0b:6b:36:01:52
No keys have been configured - skip key clearing
Associated with 00:0b:6b:36:01:52
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0b:6b:36:01:52
RX EAPOL - hexdump(len=99): 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 58
 f2 71 63 d1 d9 50 6e 58 54 8d 3c f2 39 30 f0 46 80 f9 85 2d 8d 6d 43 ff ae ca e4
 04 4b b8 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
--- snip ---

With the interface part of the bridge the wpa_supplicant gives 

--- snip --- 
Wireless event: new AP: 00:0b:6b:36:01:52
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:0b:6b:36:01:52
No keys have been configured - skip key clearing
Associated with 00:0b:6b:36:01:52
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0b:6b:36:01:52 into blacklist
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
--- snip ---

The hostapd output during the failed connect is:
--- snip ---
Wireless event: cmd=0x8c03 len=20
ath1: STA 00:0b:6b:36:01:04 IEEE 802.11: associated
  New STA
ath1: STA 00:0b:6b:36:01:04 WPA: event 1 notification
ath1: STA 00:0b:6b:36:01:04 WPA: start authentication
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0b:6b:36:01:04 key_idx=0
ath1: STA 00:0b:6b:36:01:04 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0b:6b:36:01:04 authorized=0
WPA: 00:0b:6b:36:01:04 WPA_PTK_GROUP entering state IDLE
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state AUTHENTICATION
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state INITPSK
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state PTKSTART
ath1: STA 00:0b:6b:36:01:04 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 0b 6b 36 01 04 00 0b 6b 36 01 52 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 28 89 11 8e b0 ba 6f d8 ab 51 bf f3 7c df a8 99 12 7b 61 e1 44 37 d5 3c 23 cc d6 71 31 25 b6 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath1: STA 00:0b:6b:36:01:04 WPA: EAPOL-Key timeout
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state PTKSTART
ath1: STA 00:0b:6b:36:01:04 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 0b 6b 36 01 04 00 0b 6b 36 01 52 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 28 89 11 8e b0 ba 6f d8 ab 51 bf f3 7c df a8 99 12 7b 61 e1 44 37 d5 3c 23 cc d6 71 31 25 b6 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath1: STA 00:0b:6b:36:01:04 WPA: EAPOL-Key timeout
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state PTKSTART
ath1: STA 00:0b:6b:36:01:04 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 0b 6b 36 01 04 00 0b 6b 36 01 52 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 28 89 11 8e b0 ba 6f d8 ab 51 bf f3 7c df a8 99 12 7b 61 e1 44 37 d5 3c 23 cc d6 71 31 25 b6 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath1: STA 00:0b:6b:36:01:04 WPA: EAPOL-Key timeout
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state PTKSTART
ath1: STA 00:0b:6b:36:01:04 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 0b 6b 36 01 04 00 0b 6b 36 01 52 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 28 89 11 8e b0 ba 6f d8 ab 51 bf f3 7c df a8 99 12 7b 61 e1 44 37 d5 3c 23 cc d6 71 31 25 b6 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state DISCONNECT
madwifi_sta_deauth: addr=00:0b:6b:36:01:04 reason_code=2
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state DISCONNECTED
WPA: 00:0b:6b:36:01:04 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0b:6b:36:01:04 key_idx=0
ioctl[unknown???]: Invalid argument
ath1: STA 00:0b:6b:36:01:04 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0b:6b:36:01:04 authorized=0
ioctl[unknown???]: Invalid argument
ath1: STA 00:0b:6b:36:01:04 IEEE 802.11: deauthenticated due to local deauth request
Wireless event: cmd=0x8c04 len=20
ath1: STA 00:0b:6b:36:01:04 IEEE 802.11: deassociated
--- snip ---

Regards,
Markus




More information about the Hostap mailing list