hostapd-0.6.8 + madwifi + bridge + WPA-PSK

Michael Voorhaen michael.voorhaen
Sat Feb 21 02:22:12 PST 2009


Hi,

I seem to be experiencing problems when setting up an AP with WPA-PSK  
when ath0 is connected to a bridge. I've tested it with all the latest  
stable versions which all suffer from the problem.

I've set up hostap like this, enabling the bridge option like I should.

interface=ath0
bridge=br0
driver=madwifi
ssid=wpa-test
wpa=1
wpa_passphrase=********
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP CCMP

The problem does not exist when I remove ath0 from the bridge ... off  
course I need it to be bridged for my specific setup.

Anyone have any idea what could be the problem? I get the impression  
that hostap is not receiving any of the security messages.

Some output:

voyage:~# ./hostapd -ddd /etc/hostapd/hostapd.conf
Configuration file: /etc/hostapd/hostapd.conf
Line 44: DEPRECATED: 'debug' configuration variable is not used anymore
ctrl_interface_group=0
Configure bridge br0 for EAPOL traffic.
madwifi_set_iface_flags: dev_up=0
madwifi_set_privacy: enabled=0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=22 WE(source)=13 enc_capa=0xf
ath0: IEEE 802.11 Fetching hardware channel/rate support not supported.
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff  
reason 3)
Could not connect to kernel driver.
Deauthenticate all stations
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
madwifi_sta_deauth: Failed to deauth STA (addr ff:ff:ff:ff:ff:ff  
reason 2)
madwifi_set_privacy: enabled=0
Mode: IEEE 802.11g  Channel: 1  Frequency: 0 MHz
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
Using interface ath0 with hwaddr 00:80:48:52:fe:eb and ssid 'wishbone- 
wpa'
SSID - hexdump_ascii(len=12):
      77 69 73 68 62 6f 6e 65 2d 77 70 61               wishbone-wpa
PSK (ASCII passphrase) - hexdump_ascii(len=8):
      62 6f 6e 65 77 69 73 68                           ********
PSK (from passphrase) - hexdump(len=32): 38 07 a5 1a e8 d7 d5 45 1d 2d  
4b ee 43 0f 6a f6 77 11 e3 88 18 58 9c 32 bc 29 16 68 5a 52 97 4f
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0xa
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA=0x1
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
madwifi_set_iface_flags: dev_up=1
ath0: Setup of interface done.
l2_packet_receive - recvfrom: Network is down
l2_packet_receive - recvfrom: Network is down
Wireless event: cmd=0x8b1a len=21
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.11: associated
   New STA
madwifi req WPA IE - hexdump(len=256): dd 16 00 50 f2 01 01 00 00 50  
f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
madwifi req RSN IE - hexdump(len=256): 20 00 86 00 20 00 86 00 20 00  
48 fc 61 cc 1c 75 95 cc 01 00 00 00 00 00 00 00 0c c5 10 c0 00 00 00  
00 01 00 00 00 28 75 95 cc 00 c0 9b c5 00 00 00 00 82 02 20 00 01 00  
00 00 82 02 20 00 00 00 00 00 00 00 00 00 00 74 95 cc 01 df 9b c5 d1  
4d 75 cc 61 c7 1e c0 00 00 00 00 86 02 20 00 00 00 00 00 00 df 9b c5  
00 74 95 cc 09 80 8e cc cf 4d 75 cc 61 c7 1e c0 02 02 20 00 60 4c 64  
cf 00 00 00 00 00 80 8e cc 00 00 00 00 b0 c1 3e c1 a0 31 7a cf 50 00  
00 00 02 02 20 00 a0 30 7a cf 9c dd 9b c5 28 df 9b c5 00 00 00 00 01  
00 00 00 01 00 00 00 00 00 00 00 00 10 00 00 08 00 00 00 00 00 00 00  
85 88 42 44 f7 ff ff ff 80 f0 84 ce c0 68 21 cc 4e d3 24 c0 00 00 00  
00 a0 63 2d c0 0b 00 00 00 e0 41 64 cf cc 83 2a c0 48 1f dc b7 c8 de  
9b c5 e8 de 9b c5 00 00 00 00 00 70 91 cd 2c df
ath0: STA 00:1e:c2:bc:f4:a5 WPA: event 1 notification
madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
ath0: STA 00:1e:c2:bc:f4:a5 WPA: start authentication
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
madwifi_set_sta_authorized: addr=00:1e:c2:bc:f4:a5 authorized=0
ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.1X: unauthorizing port
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK_GROUP entering state IDLE
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state AUTHENTICATION
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state AUTHENTICATION2
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITPSK
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8  
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e  
02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 de 8a 6d 32 0f a1  
e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9  
3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00
ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8  
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e  
02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 de 8a 6d 32 0f a1  
e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9  
3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00
ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8  
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e  
02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 de 8a 6d 32 0f a1  
e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9  
3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00
ath0: STA 00:1e:c2:bc:f4:a5 WPA: EAPOL-Key timeout
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state PTKSTART
ath0: STA 00:1e:c2:bc:f4:a5 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8  
kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 1e c2 bc f4 a5 00 80 48 52 fe eb 88 8e  
02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 04 de 8a 6d 32 0f a1  
e7 5d 9e d8 14 9b 66 d6 5e 2a 54 96 0d 42 70 ea 16 b5 38 99 3d 7f d9  
3f 3c 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  
00 00 00 00 00 00 00
Wireless event: cmd=0x8c02 len=99
Custom wireless event: 'STA-TRAFFIC-STAT
mac=00:1e:c2:bc:f4:a5
rx_packets=3
rx_bytes=411
tx_packets=4
tx_bytes=428
'
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.11: disassociated
ath0: STA 00:1e:c2:bc:f4:a5 WPA: event 2 notification
madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
madwifi_del_key: Failed to delete key (addr 00:1e:c2:bc:f4:a5 key_idx 0)
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state DISCONNECTED
WPA: 00:1e:c2:bc:f4:a5 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:1e:c2:bc:f4:a5 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
madwifi_del_key: Failed to delete key (addr 00:1e:c2:bc:f4:a5 key_idx 0)
madwifi_set_sta_authorized: addr=00:1e:c2:bc:f4:a5 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
madwifi_set_sta_authorized: Failed to unauthorize STA 00:1e:c2:bc:f4:a5
ath0: STA 00:1e:c2:bc:f4:a5 IEEE 802.1X: unauthorizing port
Could not set station 00:1e:c2:bc:f4:a5 flags for kernel driver  
(errno=29).


Regards,
Michael

-------------------------
IBBT - PATS research group
Dept. of Mathematics and Computer Sciences
University of Antwerp
Campus Middelheim, G3.30
Middelheimlaan 1
B-2020 Antwerpen, Belgium
Phone: +32 (0)3 265.32.91
Fax: +32 (0)3 265.37.77
Web: www.pats.ua.ac.be/michael.voorhaen










More information about the Hostap mailing list