Do u happen ?

quakextm quakextm
Wed Sep 17 01:47:20 PDT 2008


hi all,
    I am using wpa_supplicant.exe(0.5.10,I build has the same problem) to do the 802.1x,my conf file is :
ap_scan=1
network={
 ssid="dlink"
 key_mgmt=WPA-EAP
 pairwise=CCMP TKIP
 group=CCMP TKIP
 eap=PEAP
 phase2="auth=MSCHAPV2"
 identity="test"
 password="test"
 #ca_cert="/etc/cert/ca.pem"
 #client_cert="/etc/cert/user.pem"
 #private_key="/etc/cert/user.prv"
 #private_key_passwd="password"
 priority=1
}

AP is DLink DWL-2100AP,RADIUS server is windows 2000 server.
 
My problem is :when use a ZyDAS ZD1211 802.11b+g Wireless LAN ,everything is ok!
               when use DLINK card (DWL-G132 H/W Ver:A3 F/W Ver:1.21) ,it failed. The group key has finished,(sometimes the adapter got the IP) after about 1-2 second , ndis indicate "MSNdis_StatusMediaDisconnect" , so it failed , and redo the wpa steps ,again and again. But if use windows WZC to config the dlink adapter , there's no problem.
 
Does any body know the reason?
 
the following is some log message(be careful GROUP_HANDSHAKE -> COMPLETED):
 
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x28a (ver=2 keyidx=0 rsvd=0 Pairwise Ack Secure)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 15
  key_nonce - hexdump(len=32): cc 40 35 08 9d e4 16 28 6e c8 18 15 43 3e 90 72 0
7 90 55 6b 56 7f 8f 83 37 0f 3b 59 1e ba 82 3e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1e:58:4b:0f:ad (ver=2)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): df 5f c0 d1 42 5c 1b 49 1c bd c4 82 27 7f
 81 e0 d0 44 25 4c 18 f5 77 b1 a8 de d9 78 ab 60 82 7c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 0
1 00 00 50 f2 04 01 00 00 50 f2 01
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:1e:58:4b:0f:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=123
  EAPOL-Key type=254
  key_info 0x3ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure)
  key_length=16 key_data_length=28
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 16
  key_nonce - hexdump(len=32): cc 40 35 08 9d e4 16 28 6e c8 18 15 43 3e 90 72 0
7 90 55 6b 56 7f 8f 83 37 0f 3b 59 1e ba 82 3e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 6b cb 9d 6d 4a 39 56 cb 19 7a 62 c0 06 53 e6 c0
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:1e:58:4b:0f:ad (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00
50 f2 02 00 50 f2 04 01 00 00 50 f2 01
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:1e:58:4b:0f:ad
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
  key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=40
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 17
  key_nonce - hexdump(len=32): 2e 2a e0 44 8d 1b c6 39 dc ed 78 3c 4d 84 1d 33 0
1 3c ea 13 e2 6f 78 a1 a2 d9 cf d7 b8 b3 98 d3
  key_iv - hexdump(len=16): 28 75 d8 64 8c b8 08 6a c8 a3 bd 9a c8 cb 06 6f
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): df ed 37 87 f6 af 57 8f 8e 05 e0 f0 c9 73 37 3b
WPA: RX message 1 of Group Key Handshake from 00:1e:58:4b:0f:ad (ver=2)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:1e:58:4b:0f:ad [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 00:1e:58:4b:0f:ad from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:1e:58:4b:0f:ad completed (reauth) [id=0
id_str=]
EAPOL: External notification - portValid=1
EAPOL: startWhen --> 0
MSNdis_StatusMediaDisconnect
NDIS: event - type 1
NDIS: Media Disconnect Event
Setting scan request: 0 sec 100000 usec
Added BSSID 00:1e:58:4b:0f:ad into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
__func__ not defined: oid=0xd010101 len (6) failed
__func__ not defined: oid=0xd010101 len (6) failed
__func__ not defined: oid=0xd010101 len (6) failed
__func__ not defined: oid=0xd010101 len (6) failed
State: COMPLETED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
CTRL-EVENT-TERMINATING - signal 0 received
Removing interface {E7EF437C-7515-4023-8632-5AF9584925EE}
State: SCANNING -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
__func__ not defined: enabled=0
No keys have been configured - skip key clearing
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
Removed BSSID 00:1e:58:4b:0f:ad from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
ndis_events: terminated
NDIS: WZCEnumInterfaces: 1 interfaces
NDIS: intfs 0 GUID '{E7EF437C-7515-4023-8632-5AF9584925EE}'
NDIS: Current interface found from WZC
NDIS: WZC interface flags 0x8000 dwCtlFlags 0x0
NDIS: Enabling WZC for this interface
NDIS: Re-enabled WZC for this interface
CTRL: close pipe 00BC2C38
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20080917/1fe785e5/attachment.htm 



More information about the Hostap mailing list