Madwifi-NG + hostapd + RSN

Leonardo Maccari maccari-thisaintpartofmyaddress-
Mon Jan 30 14:18:49 PST 2006


On Mon, Jan 30, 2006 at 09:02:07AM +0100, Stijn Tintel wrote:

I'm having problems with madwifi/hostapd too, I downgraded to svn revision 1356
of the driver but still having no luck.

these are the facts:

I'm running debian stable with kernel 2.6.8. 

Jan 30 22:38:18 localhost kernel: ath_hal: module license 'Proprietary' taints kernel.
Jan 30 22:38:18 localhost kernel: ath_hal: 0.9.16.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413, DFS)
Jan 30 22:38:18 localhost kernel: wlan: 0.8.4.2 (Atheros/multi-bss)
Jan 30 22:38:18 localhost kernel: ath_rate_sample: 1.2
Jan 30 22:38:18 localhost kernel: ath_pci: 0.9.4.5 (Atheros/multi-bss)

ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
l2_packet_receive - recv: Network is down
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
Configuration file: /etc/hostapd/hostapd.conf
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:03:2f:30:ae:6a and ssid 'coimbra'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x2
madwifi_set_iface_flags: dev_up=1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): fb 7b 00 98 92 16 2d 22 94 08 98 39 a6 3f 8c 6d 8b
14 9f c4 e6 5d 27 17 91 3d 8c 2b 0d 60 65 89
GTK - hexdump(len=32): 6b c7 ab d2 10 8e 7e 73 fb fb f8 0f 0f 90 00 9e 89
3f ac 77 ce 75 51 d9 66 57 f9 78 bd 9b 84 2d
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
Flushing old station entries
Deauthenticate all stations
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:09:5b:27:ec:42 IEEE 802.11: associated
  New STA
ath0: STA 00:09:5b:27:ec:42 WPA: event 1 notification
ath0: STA 00:09:5b:27:ec:42 WPA: start authentication
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:09:5b:27:ec:42 key_idx=0
ath0: STA 00:09:5b:27:ec:42 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:09:5b:27:ec:42 authorized=0
WPA: 00:09:5b:27:ec:42 WPA_PTK_GROUP entering state IDLE
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state AUTHENTICATION
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state AUTHENTICATION2
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state INITPSK
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state PTKSTART
ath0: STA 00:09:5b:27:ec:42 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 09 5b 27 ec 42 00 03 2f 30 ae 6a 88 8e 02
03 00 5f 02 00 89 00 20 00 00 00 00 00 00 00 01 0e 2a d4 e3 f5 06 cd 30 85
81 25 8d 6c e3 10 bb f0 e4 80 91 63 58 93 6f 50 fd 5a 32 bc ec c3 e3 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 121 bytes from 00:09:5b:27:ec:42
   IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:09:5b:27:ec:42 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 80 43 95 bd 37 c0 bb 49 77 33 ea c0 40 b2 4a db b2
df cb df 6f 0a 4b 51 20 5d c2 44 45 ff 25 9f
PTK - hexdump(len=64): 8a f3 65 bb 22 4c 7a 40 6e 4e 11 81 c1 17 3d 90 16
8c d1 07 b5 7f ae c0 00 70 42 3d 20 f3 88 79 72 e2 d4 9d 8d 56 b1 80 ba e0
9a 84 6a ff 1a d3 7f 6f 50 d6 f8 33 5a ca d6 c5 e3 c9 dd 03 c6 07
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:09:5b:27:ec:42 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=66): 30 18 01 00 00 0f ac 02 02
00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00
6b c7 ab d2 10 8e 7e 73 fb fb f8 0f 0f 90 00 9e 89 3f ac 77 ce 75 51 d9 66
57 f9 78 bd 9b 84 2d
TX EAPOL - hexdump(len=179): 00 09 5b 27 ec 42 00 03 2f 30 ae 6a 88 8e 02
03 00 a1 02 13 c9 00 20 00 00 00 00 00 00 00 02 0e 2a d4 e3 f5 06 cd 30 85
81 25 8d 6c e3 10 bb f0 e4 80 91 63 58 93 6f 50 fd 5a 32 bc ec c3 e3 f0 e4
80 91 63 58 93 6f 50 fd 5a 32 bc ec c3 e4 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 4a d2 4c 66 f1 9b 64 47 b8 74 45 9c 85 8c c6 5c 00 42 f6 3d
e2 9c 47 59 ae 14 c6 e5 e2 57 d8 03 1e d3 fe 8e de 60 3d 42 60 b8 06 a7 8f
15 f2 61 63 75 19 d4 e8 dd 5d ac 6e 03 8f 9d 88 af 5c 2a ea e4 af 84 8f 04
9f fb fc 3c d8 6f 5c 7e 81 ce 89 7e aa b8
IEEE 802.1X: 99 bytes from 00:09:5b:27:ec:42
   IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:09:5b:27:ec:42 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:09:5b:27:ec:42 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=TKIP addr=00:09:5b:27:ec:42 key_idx=0
madwifi_sta_deauth: addr=00:09:5b:27:ec:42 reason_code=2
ath0: STA 00:09:5b:27:ec:42 IEEE 802.11: deauthenticated due to local
deauth request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:09:5b:27:ec:42 IEEE 802.11: deassociated
Signal 2 received - terminating
Flushing old station entries
Deauthenticate all stations
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
madwifi_set_iface_flags: dev_up=0


WPA_SUPPLICANT:


Initializing interface 'wlan0' conf
'/etc/hostapd/wpa_supplicant-psk-home.conf' driver 'default'
ctrl_interface 'N/A'
Configuration file '/etc/hostapd/wpa_supplicant-psk-home.conf' ->
'/etc/hostapd/wpa_supplicant-psk-home.conf'
Reading configuration file '/etc/hostapd/wpa_supplicant-psk-home.conf'
eapol_version=2
ap_scan=1
fast_reauth=1
Line: 232 - start of a new network block
ssid - hexdump_ascii(len=7):
     63 6f 69 6d 62 72 61                              coimbra         
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
key_mgmt: 0x2
pairwise: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 239: removed CCMP from group cipher list since it was not allowed for
pairwise cipher
Priority group 0
   id=0 ssid='coimbra'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=19 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
Added alternative ifindex 5 (wifi0) for wireless events
Added alternative ifindex 5 (wifi0) for wireless events
Own MAC address: 00:09:5b:27:ec:42
wpa_driver_hostap_set_wpa: enabled=1
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_countermeasures: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Added interface wlan0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 339 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:03:2f:30:ae:6a ssid='coimbra' wpa_ie_len=0 rsn_ie_len=26 caps=0x11
   selected based on RSN IE
Trying to associate with 00:03:2f:30:ae:6a (SSID='coimbra' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f
ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01
00 00 0f ac 02 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_hostap_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_hostap_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=16
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:03:2f:30:ae:6a
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:03:2f:30:ae:6a
No keys have been configured - skip key clearing
Associated with 00:03:2f:30:ae:6a
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:03:2f:30:ae:6a
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 89 00 20 00 00 00 00 00 00
00 01 0e 2a d4 e3 f5 06 cd 30 85 81 25 8d 6c e3 10 bb f0 e4 80 91 63 58 93
6f 50 fd 5a 32 bc ec c3 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 89 00 20 00 00 00
00 00 00 00 01 0e 2a d4 e3 f5 06 cd 30 85 81 25 8d 6c e3 10 bb f0 e4 80 91
63 58 93 6f 50 fd 5a 32 bc ec c3 e3 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:03:2f:30:ae:6a (ver=1)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Renewed SNonce - hexdump(len=32): 65 f4 cd 6a 3c 89 7c 27 70 29 88 00
ab 80 0a d1 df e3 44 f0 5a 88 51 e9 9e af 7b ec dd 06 1f 22
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 09 00 00 00 00 00
00 00 00 00 01 65 f4 cd 6a 3c 89 7c 27 70 29 88 00 ab 80 0a d1 df e3 44 f0
5a 88 51 e9 9e af 7b ec dd 06 1f 22 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd 0a f4 2d 15 70
4d cd ef e3 b5 81 00 4b f7 7d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac
02 01 00 00 0f ac 02 00 00
RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:03:2f:30:ae:6a
RX EAPOL - hexdump(len=165): 02 03 00 a1 02 13 c9 00 20 00 00 00 00 00 00
00 02 0e 2a d4 e3 f5 06 cd 30 85 81 25 8d 6c e3 10 bb f0 e4 80 91 63 58 93
6f 50 fd 5a 32 bc ec c3 e3 f0 e4 80 91 63 58 93 6f 50 fd 5a 32 bc ec c3 e4
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a d2 4c 66 f1 9b 64 47 b8
74 45 9c 85 8c c6 5c 00 42 f6 3d e2 9c 47 59 ae 14 c6 e5 e2 57 d8 03 1e d3
fe 8e de 60 3d 42 60 b8 06 a7 8f 15 f2 61 63 75 19 d4 e8 dd 5d ac 6e 03 8f
9d 88 af 5c 2a ea e4 af 84 8f 04 9f fb fc 3c d8 6f 5c 7e 81 ce 89 7e aa b8
IEEE 802.1X RX: version=2 type=3 length=161
  EAPOL-Key type=2
WPA: RX EAPOL-Key - hexdump(len=165): 02 03 00 a1 02 13 c9 00 20 00 00 00
00 00 00 00 02 0e 2a d4 e3 f5 06 cd 30 85 81 25 8d 6c e3 10 bb f0 e4 80 91
63 58 93 6f 50 fd 5a 32 bc ec c3 e3 f0 e4 80 91 63 58 93 6f 50 fd 5a 32 bc
ec c3 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a d2 4c 66 f1 9b
64 47 b8 74 45 9c 85 8c c6 5c 00 42 f6 3d e2 9c 47 59 ae 14 c6 e5 e2 57 d8
03 1e d3 fe 8e de 60 3d 42 60 b8 06 a7 8f 15 f2 61 63 75 19 d4 e8 dd 5d ac
6e 03 8f 9d 88 af 5c 2a ea e4 af 84 8f 04 9f fb fc 3c d8 6f 5c 7e 81 ce 89
7e aa b8
RSN: encrypted key data - hexdump(len=66): f6 3d e2 9c 47 59 ae 14 c6 e5
e2 57 d8 03 1e d3 fe 8e de 60 3d 42 60 b8 06 a7 8f 15 f2 61 63 75 19 d4 e8
dd 5d ac 6e 03 8f 9d 88 af 5c 2a ea e4 af 84 8f 04 9f fb fc 3c d8 6f 5c 7e
81 ce 89 7e aa b8
WPA: decrypted EAPOL-Key key data - hexdump(len=66): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:03:2f:30:ae:6a (ver=1)
WPA: IE KeyData - hexdump(len=66): 30 18 01 00 00 0f ac 02 02 00 00 0f ac
04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 6b c7 ab d2
10 8e 7e 73 fb fb f8 0f 0f 90 00 9e 89 3f ac 77 ce 75 51 d9 66 57 f9 78 bd
9b 84 2d
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 03 09 00 00 00 00 00
00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d8 6e 10 b1 71
57 4a b0 3d 21 83 a9 f9 c0 c4 00 00
WPA: Installing PTK to the driver.
wpa_driver_hostap_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6
key_len=32
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6
key_len=32
WPA: Key negotiation completed with 00:03:2f:30:ae:6a [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:03:2f:30:ae:6a completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_hostap_deauthenticate
wpa_driver_hostap_reset: type=2
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_hostap_set_wpa: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=0
wpa_driver_hostap_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Cancelling scan request


\and this is ethereal dump from a third interface (netgear is the 
client interface).


No.     Time            Source                Destination Protocol Info
 26 22:57:49.345984 ::                    ff02::16              ICMPv6 Multicast Listener Report Message v2
 36 22:57:50.266503 ::                    ff02::1:ff30:ae6a     ICMPv6 Neighbor solicitation
 46 22:57:51.265416 fe80::203:2fff:fe30:ae6a ff02::2 ICMPv6   Router solicitation
 54 22:57:51.923806 Netgear_27:ec:42      Broadcast             Probe Request Probe Request,SN=639,FN=0, SSID: "coimbra"
 55 22:57:51.925185 GlobalSu_30:ae:6a     Netgear_27:ec:42      Probe Response Probe Response,SN=28,FN=0,BI=100, SSID: "coimbra"
 56 22:57:51.925472                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 59 22:57:52.120479 Netgear_27:ec:42      Broadcast             Probe Request Probe Request,SN=640,FN=0, SSID: Broadcast
 60 22:57:52.121816 GlobalSu_30:ae:6a     Netgear_27:ec:42      Probe Response Probe Response,SN=31,FN=0,BI=100, SSID: "coimbra"
 61 22:57:52.122262                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 63 22:57:52.235639 GlobalSu_30:ae:6a     Netgear_27:ec:42      Probe Response Probe Response,SN=33,FN=0,BI=100, SSID: "coimbra"
 67 22:57:52.566059 Netgear_27:ec:42      GlobalSu_30:ae:6a Authentication Authentication,SN=653,FN=0
 68 22:57:52.566317                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
 69 22:57:52.566867 GlobalSu_30:ae:6a     Netgear_27:ec:42 Authentication Authentication,SN=37,FN=0
 70 22:57:52.567188                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 71 22:57:52.567936 Netgear_27:ec:42      GlobalSu_30:ae:6a Association Request Association Request,SN=654,FN=0, SSID: "coimbra"
 72 22:57:52.568195                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
 73 22:57:52.568845 GlobalSu_30:ae:6a     Netgear_27:ec:42 Association Response Association Response,SN=38,FN=0
 74 22:57:52.569210                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 75 22:57:52.569497 GlobalSu_30:ae:6a     Netgear_27:ec:42      EAPOL Key
 76 22:57:52.569689                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 77 22:57:52.573620 Netgear_27:ec:42      GlobalSu_30:ae:6a     EAPOL Key
 78 22:57:52.573815                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
 79 22:57:52.575986 GlobalSu_30:ae:6a     Netgear_27:ec:42      EAPOL Key
 80 22:57:52.576297                       GlobalSu_30:ae:6a (RA) Acknowledgement Acknowledgement
 81 22:57:52.577330 Netgear_27:ec:42      GlobalSu_30:ae:6a     EAPOL Key
 82 22:57:52.577518                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
 88 22:57:53.054242 Netgear_27:ec:42 IPv6-Neighbor-Discovery_00:00:00:02 Data     Data,SN=657,FN=0
 89 22:57:53.054426                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
111 22:57:55.264704 fe80::203:2fff:fe30:ae6a ff02::2 ICMPv6   Router solicitation
130 22:57:57.054173 Netgear_27:ec:42 IPv6-Neighbor-Discovery_00:00:00:02 Data     Data,SN=658,FN=0
131 22:57:57.054343                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
153 22:57:59.263858 fe80::203:2fff:fe30:ae6a ff02::2 ICMPv6   Router solicitation
172 22:58:01.054405 Netgear_27:ec:42 IPv6-Neighbor-Discovery_00:00:00:02 Data     Data,SN=659,FN=0
173 22:58:01.054586                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
182 22:58:01.922426 Netgear_27:ec:42      Broadcast             Data Data,SN=660,FN=0
183 22:58:01.922626                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
194 22:58:02.922453 Netgear_27:ec:42      Broadcast             Data Data,SN=661,FN=0
195 22:58:02.922665                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement
206 22:58:03.922572 Netgear_27:ec:42      Broadcast             Data Data,SN=662,FN=0
207 22:58:03.922782                       Netgear_27:ec:42 (RA) Acknowledgement Acknowledgement


If I turn off hostapd&wpa_supplicant, set no keys at all, they ping.

ciao,
leonardo.

-- Key fingerprint = 3129 C583 F03B 2E73 0115  C040 3489 0185 B592 19FE
 Obviously -thisaintpartofmyaddress- is not part of my real email address 




More information about the Hostap mailing list