General questions about hostapd

Jeremy Tourville organ_dr
Mon Apr 28 16:56:46 PDT 2008


I have setup my router to have a wireless AP using Madwifi and Hostapd.  
I followed the instructions listed here:http://leaf.sourceforge.net/doc/bucu-ap.html 

Problem #1I notice that I am only connecting at the "b" rate with my laptop.  I have a "g" card for both my AP and my laptop.If I setup my AP with no encryption though, I can connect at "g" speed. 

Problem #2I'm not quite sure how to change to using AES for encryption.  Right now I am using TKIP.  
I thought in hostapd.conf you would list only ccmp.   
wpa_pairwise=CCMP
vs
wpa_pairwise=TKIP CCMP (my current config)

If I do the first example I am unable to connect at all. 


Here is my configuration- 
# apkg -l 
libm 0.9.28 Rev 1 uClibc 0.9.28
libssl 0.9.7l Rev 1 uClibc 0.9.28
libcrpto 0.9.7l Rev 1 uClibc 0.9.28
hostapd 0.5.7 Rev 1 uClibc 0.9.28

#less hostapd.conf
interface=ath0
driver=madwifi
logger_syslog=-1
logger_syslog_level=1
logger_stdout=1
logger_stdout_level=2
debug=2
ctrl_interface=/var/run/hostapd
ssid=test
hw_mode=g
macaddr_acl=0
auth_algs=3
ignore_broadcast_ssid=0
wpa=3
wpa_psk=my key here
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP CCM
Peap_server=0
eapol_key_index_workaround=0

#dmesg 
ath_hal: 0.9.18.0 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413)
wlan: 0.8.4.2 (0.9.3)
ath_rate_sample: 1.2 (0.9.3)
ath_pci: 0.9.4.5 (0.9.3)
PCI: Found IRQ 7 for device 01:0a.0
wifi0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
wifi0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
wifi0: turboG rates: 6Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
wifi0: H/W encryption support: WEP AES AES_CCM TKIP
wifi0: mac 7.9 phy 4.5 radio 5.6
wifi0: Use hw queue 1 for WME_AC_BE traffic
wifi0: Use hw queue 0 for WME_AC_BK traffic
wifi0: Use hw queue 2 for WME_AC_VI traffic
wifi0: Use hw queue 3 for WME_AC_VO traffic
wifi0: Use hw queue 8 for CAB traffic
wifi0: Use hw queue 9 for beacons
wifi0: Atheros 5212: mem=0xf4100000, irq=7wlan: mac acl policy registered

# tail /etc/network/interfaces#    
# Step 7 (optional): configure Wireless Access Point
auto ath0
iface ath0 inet static        
address 192.168.4.1        
netmask 255.255.255.0        
broadcast 192.168.4.255

# tail /etc/modules
# Wireless AP (Madwifi) w/ WPA
ath_halwlan
wlan_scan_ap
ath_rate_sample
ath_pci autocreate=ap
wlan_acl
waln_ccmp
wlan_tkip
wlan_xauth 

I'm seeing a lot of this in my daemon logs-
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: EAPOL-Key timeout
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: sending 1/4 msg of 4-Way Handshake
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 IEEE 802.1X: unauthorizing port
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 IEEE 802.11: deauthenticated due to local deauth request
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 IEEE 802.11: disassociated
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 IEEE 802.11: associated
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: event 1 notification
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: start authentication
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 IEEE 802.1X: unauthorizing port
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: sending 1/4 msg of 4-Way Handshake
Apr 19 12:05:15  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: received EAPOL-Key frame (2/4 Pairwise)
Apr 19 12:05:15  hostapd: ath0: STA  00:16:b6:b6:84:90 WPA: invalid MIC in msg 2/4 of 4-Way Handshake
Apr 19 12:05:16  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: EAPOL-Key timeout
Apr 19 12:05:16  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: sending 1/4 msg of 4-Way Handshake
Apr 19 12:05:16  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: received EAPOL-Key frame (2/4 Pairwise)
Apr 19 12:05:16  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: invalid MIC in msg 2/4 of 4-Way Handshake
Apr 19 12:05:17  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: EAPOL-Key timeout
Apr 19 12:05:17  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: sending 1/4 msg of 4-Way Handshake
Apr 19 12:05:17  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: received EAPOL-Key frame (2/4 Pairwise)
Apr 19 12:05:17  hostapd: ath0: STA 00:16:b6:b6:84:90 WPA: invalid MIC in msg 2/4 of 4-Way Handshake

Any insight you may have is greatly appreciated.  Thanks in advance for your help!
-Jeremy



More information about the Hostap mailing list