WPA2-PSK with TKIP fails to set GTK/PTK to driver: ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address

kstauffer uglymouse
Mon Feb 12 17:00:53 PST 2007


I made some further investigations.
Also hostapd have this GTK or PTK cannot be installed problem with TKIP 
if WPA2 Only mode is used.

WPA2-PSK CCMP Only mode works nicely between wpa_supplicant and hostapd 
0.5.7.
I noticed that ProST AP has some differences in RSN caps comparing to my 
hostapd RSN caps.
RSN pre-authentication seems to be enabled in ProST AP and RSN PTKSA 
Reply Counter is 1.
I enabled pre-authentication from hostapd and checked if it  behaves the 
same as ProST board, but it worked nicely.

Could it be that the RSN PTKSA Reply Counter is causing 4way Handshake 
to be restarted, even Authentication were succesfull?

What is the meaning of those PTKSA/GTKSA Reply Counter capabilities?
 
-Kristian
> Hi,
> For some reason GTK or PTK cannot be installed to driver and 
> authentication to WPA2 AP fails when TKIP is used.
> If switched to CCMP, authentication is successfull according to 
> wpa_supplicant logs but immediately after authentication 4Way 
> Handshake is restarted and it fails.
> "WPA: 4-Way Handshake failed - pre-shared key may be incorrect" 
> message appears, though PSK is correct.
>
> Any idea why?
>
> Thanks in advanced!
>
> -Kristian
>
> AP Beacon as attachement.
>
> wpa_supplicant configuration:
> ctrl_interface=/var/run/wpa_supplicant
> ap_scan=1
> network={
> ssid="DEVPROST"
> key_mgmt=WPA-PSK
> group=TKIP
> pairwise=TKIP
> #  group=CCMP
> #  pairwise=CCMP
> proto=RSN
> psk="12345678"
> }
>
> #wpa_supplicant -Dmadwifi -iwlan0 -c /etc/wpa_supplicant_wlan0.conf -dd
>
> wpa_supplicant log(TKIP):
>
> WPA: RX message 3 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=1)
> WPA: IE KeyData - hexdump(len=62): 30 14 01 00 00 0f ac 02 01 00 00 0f 
> ac 02 01 00 00 0f ac 02 05 00 dd 26 00 0f ac 01 02 00 d0 9c 7a bc 49 
> ae 9e 50 f1 bd 1e 9b 94 b2 a6 9e 25 7e 9a 99 ed 71 bb a2 a9 c1 24 b0 
> 27 15 83 9c
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 09 00 00 00 00 
> 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 1a 0c 2e 12 83 ea 10 d5 03 11 aa eb 71 60 e3 f5 00 00
> WPA: Installing PTK to the driver.
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 
> key_len=32
> ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address
> WPA: Failed to set PTK to the driver.
> EAPOL: External notification - portValid=1
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
> WPA: Group Key - hexdump(len=32): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=TKIP key_idx=2 set_tx=0 seq_len=6 
> key_len=32
> ioctl[IEEE80211_IOCTL_SETMODE]: No such device or address
> WPA: Failed to set GTK to the driver.
> RSN: Failed to install GTK
> RSN: Failed to configure GTK
>
> wpa_supplicant log(CCMP)
>
> Removed BSSID 00:a0:0a:a8:93:6c from blacklist (clear)
> Selecting BSS from priority group 0
> 0: 00:a0:0a:a8:93:6c ssid='DEVPROST' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
>  selected based on RSN IE
> Trying to associate with 00:a0:0a:a8:93:6c (SSID='DEVPROST' freq=2412 
> MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> RSN: using IEEE 802.11i/D9.0
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
> 0f ac 04 01 00 00 0f ac 02 05 00
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_madwifi_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RSN: added PMKSA cache candidate 00:a0:0a:a8:93:6c prio 1000
> RSN: processing PMKSA candidate list
> RSN: not in suitable state for new pre-authentication
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> Wireless event: cmd=0x8b1a len=21
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:a0:0a:a8:93:6c
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:a0:0a:a8:93:6c
> No keys have been configured - skip key clearing
> Associated with 00:a0:0a:a8:93:6c
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
> 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 65 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=117
> EAPOL-Key type=2
> key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=16 key_data_length=22
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 65
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
> 00 00 00 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 65 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f 
> ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00
> RSN: no matching PMKID found
> WPA: Renewed SNonce - hexdump(len=32): 7f 10 23 26 e6 9a d7 a1 9b 04 
> 94 41 df ee b4 6f fa f8 ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
> 00 00 00 00 00 01 7f 10 23 26 e6 9a d7 a1 9b 04 94 41 df ee b4 6f fa 
> f8 ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 f8 dd e3 b3 5f 8c 2e d9 b3 bb c0 fb 63 0e eb b1 00 16 30 14 01 00 
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
> 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=117
> EAPOL-Key type=2
> key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=16 key_data_length=22
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
> 00 00 00 00 00 01 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f 
> ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00
> RSN: no matching PMKID found
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
> 00 00 00 00 00 01 7f 10 23 26 e6 9a d7 a1 9b 04 94 41 df ee b4 6f fa 
> f8 ff 84 b1 24 cb 22 91 09 0a 97 ce 0d 30 5d 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 30 ca 7a ba 01 89 db cd a0 cd fa 5a c7 3d 96 90 00 16 30 14 01 00 
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 
> 00 00 02 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 e1 
> 2c 6b 24 66 1e fd 71 52 3e c8 cd 60 19 04 00 38 76 4a c4 9d 67 38 4c 
> 42 ce 15 4e db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b a6 87 28 
> 49 02 29 95 b8 95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a b2 1a d5 
> dc ab 18
> IEEE 802.1X RX: version=1 type=3 length=151
> EAPOL-Key type=2
> key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure 
> Encr)
> key_length=16 key_data_length=56
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): c7 e1 2c 6b 24 66 1e fd 71 52 3e c8 cd 60 
> 19 04
> WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 
> 00 00 00 00 00 02 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 c7 e1 2c 6b 24 66 1e fd 71 52 3e c8 cd 60 19 04 00 38 76 4a c4 9d 
> 67 38 4c 42 ce 15 4e db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b 
> a6 87 28 49 02 29 95 b8 95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a 
> b2 1a d5 dc ab 18
> RSN: encrypted key data - hexdump(len=56): 76 4a c4 9d 67 38 4c 42 ce 
> 15 4e db ed d0 9d 3f f8 12 c2 20 c5 6b fd 5a 51 31 2b a6 87 28 49 02 
> 29 95 b8 95 7a 5d b0 77 09 04 d8 37 be ae 37 6f a3 5a b2 1a d5 dc ab 18
> WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 3 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f 
> ac 04 01 00 00 0f ac 02 05 00 dd 16 00 0f ac 01 02 00 b0 e5 51 59 59 
> ba c2 4a f0 3d 0d f3 70 25 c8 3c dd 00
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 
> 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 c7 5b 51 90 a8 96 15 90 f0 0d 21 be 8a 57 44 3e 00 00
> WPA: Installing PTK to the driver.
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 
> key_len=16
> EAPOL: External notification - portValid=1
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
> WPA: Group Key - hexdump(len=16): [REMOVED]
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_madwifi_set_key: alg=CCMP key_idx=2 set_tx=0 seq_len=6 
> key_len=16
> WPA: Key negotiation completed with 00:a0:0a:a8:93:6c [PTK=CCMP GTK=CCMP]
> Cancelling authentication timeout
> State: GROUP_HANDSHAKE -> COMPLETED
> CTRL-EVENT-CONNECTED - Connection to 00:a0:0a:a8:93:6c completed 
> (auth) [id=0 id_str=]
> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> WEXT: Operstate: linkmode=-1, operstate=6
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state DISABLED
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RSN: processing PMKSA candidate list
> RSN: not in suitable state for new pre-authentication
> EAPOL: startWhen --> 0
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
> 00 00 03 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=117
> EAPOL-Key type=2
> key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=16 key_data_length=22
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
> 00 00 00 00 00 03 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f 
> ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: COMPLETED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00
> RSN: no matching PMKID found
> WPA: Renewed SNonce - hexdump(len=32): 1a a5 39 88 eb 82 a0 f2 a1 1c 
> e4 af 09 79 cd b1 b3 27 b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
> 00 00 00 00 00 03 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 
> 27 b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 50 91 22 14 da 93 85 49 8f 43 b3 ff ee ce 23 1e 00 16 30 14 01 00 
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
> 00 00 04 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=117
> EAPOL-Key type=2
> key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=16 key_data_length=22
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
> 00 00 00 00 00 04 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f 
> ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00
> RSN: no matching PMKID found
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
> 00 00 00 00 00 04 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 
> 27 b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 47 3d 61 5f 4d 40 a0 d6 62 2b 74 4b 37 18 b4 f2 00 16 30 14 01 00 
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RX EAPOL from 00:a0:0a:a8:93:6c
> RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 
> 00 00 05 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 5e f6 e2 
> 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> IEEE 802.1X RX: version=1 type=3 length=117
> EAPOL-Key type=2
> key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=16 key_data_length=22
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
> key_nonce - hexdump(len=32): 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 
> 91 10 65 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 
> 00 00 00 00 00 05 00 b0 96 45 16 63 76 11 97 cd 76 ea 4d 39 91 10 65 
> 5e f6 e2 89 d1 fc 23 fc f4 15 64 ec c4 a9 67 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f 
> ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:a0:0a:a8:93:6c (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00
> RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00
> RSN: no matching PMKID found
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 
> 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 
> 00 00 00 00 00 05 1a a5 39 88 eb 82 a0 f2 a1 1c e4 af 09 79 cd b1 b3 
> 27 b7 60 69 fa 0f 39 f2 a8 94 87 88 cc 93 da 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 83 21 b3 1d 49 70 f5 72 4e eb 59 5b 13 a5 f3 1c 00 16 30 14 01 00 
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> WPA: 4-Way Handshake failed - pre-shared key may be incorrect
> Setting scan request: 0 sec 100000 usec
> Added BSSID 00:a0:0a:a8:93:6c into blacklist
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> State: 4WAY_HANDSHAKE -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:a0:0a:a8:93:6c
> State: DISCONNECTED -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:a0:0a:a8:93:6c
> No keys have been configured - skip key clearing
> Associated with 00:a0:0a:a8:93:6c
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> EAPOL: startWhen --> 0
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface wlan0
> State: ASSOCIATED -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_madwifi_deauthenticate
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=0
> wpa_driver_madwifi_set_countermeasures: enabled=0
> No keys have been configured - skip key clearing
> Removed BSSID 00:a0:0a:a8:93:6c from blacklist (clear)
> Cancelling scan request
> Cancelling authentication timeout
> WEXT: Operstate: linkmode=0, operstate=6
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap
>   





More information about the Hostap mailing list