WPA2, compat-wireless-2.6.31-rc4, kernel 2.6.28 - rtl8187 - association works but no ping

Ivan Kuten ivan.kuten
Fri Jul 24 02:29:31 PDT 2009


Hello,

I have WPA2, compat-wireless-2.6.31-rc4, kernel 2.6.28 - driver rtl8187, wpa_supplicant 0.6.5
Association works but no ping.
With the same wpa_supplicant config it works on kernel 2.6.28 and rtl8187 driver.
I need to fugure out it this wpa_supplicant problem or kernel related one.

Config: /home/ACORP.conf
network={
        ssid="ACORP"
        key_mgmt=WPA-PSK
        proto=WPA2
        pairwise=CCMP
        group=CCMP
        psk="HIDDEN"
}

Here is a good log (2.6.28):

wpa_supplicant -Dwext -iwlan0 -c /home/ACORP.conf -dd &
299
# Initializing interface 'wlan0' conf '/home/ACORP.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/ACORP.conf' -> '/home/ACORP.conf'
Reading configuration file '/home/ACORP.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=5):
     41 43 4f 52 50                                    ACORP
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='ACORP'
Initializing interface (2) 'wlan0'
 /sbin/udhcpc -n -q -i wlan0 -s /bin/default.script
udhcpc (v1.4.1) started
Interface wlan0 set UP - waiting a second for the driver to complete initialization
Sending discover...
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:0e:98:67:fc
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan0
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Cached scan results are empty - not posting
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
EAPOL: disable timer tick
Sending discover...
Sending discover...
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Received 1735 bytes of scan results (6 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:16:b6:ec:80:91 ssid='HiQo' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:02:72:74:ac:85 ssid='ACORP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:02:72:74:ac:85 ssid='ACORP'
Trying to associate with 00:02:72:74:ac:85 (SSID='ACORP' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c02 len=157
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000541434f5250010802040b160c12182432043048606c30140100000fac040100000fac040100000fac020000 Resp'
Association info event
req_ies - hexdump(len=45): 00 05 41 43 4f 52 50 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00
resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:02:72:74:ac:85
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:02:72:74:ac:85
No keys have been configured - skip key clearing
Associated with 00:02:72:74:ac:85
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:02:72:74:ac:85
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 323
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
  key_nonce - hexdump(len=32): e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 90
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 673
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:02:72:74:ac:85 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2b c5 db c9 32 ea f5 1a 72 9b 52 28 a2 eb ee 13
RSN: PMKID from Authenticator - hexdump(len=16): 2b c5 db c9 32 ea f5 1a 72 9b 52 28 a2 eb ee 13
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 68 ac 05 eb 85 31 fe c8 1e 21 d2 d7 27 ac 20 48 96 42 34 4b 50 8e 97 9c 01 7c ff 56 23 c3 ea 04
WPA: PTK derivation - A1=00:12:0e:98:67:fc A2=00:02:72:74:ac:85
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 05 68 ac 05 eb 85 31 fe c8 1e 21 d2 d7 27 ac 20 48 96 420
RX EAPOL from 00:02:72:74:ac:85
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 326
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
  key_nonce - hexdump(len=32): e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 90
  key_iv - hexdump(len=16): 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 92
  key_rsc - hexdump(len=8): 75 3e 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 0f 86 74 76 05 9f 37 57 dc f1 f1 7f 18 96 3a cf
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 676
RSN: encrypted key data - hexdump(len=56): 4d 08 d9 a5 ec 26 47 0c 3f f0 b1 3a 12 02 cf 88 02 22 0d 17 56 41 89 fb 0b b3 c7 aa c0 ff bc 8e f9 6
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:02:72:74:ac:85 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 2b ac 63 b9 5d 990
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 75 3e 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:02:72:74:ac:85 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:02:72:74:ac:85 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
# EAPOL: startWhen --> 0
EAPOL: disable timer tick
#  /sbin/udhcpc -n -q -i wlan0 -s /bin/default.script
udhcpc (v1.4.1) started
Sending discover...
Sending discover...
Sending select for 192.168.10.135...
Lease of 192.168.10.135 obtained, lease time 360
# RX EAPOL from 00:02:72:74:ac:85
RX EAPOL - hexdump(len=131): 01 03 00 7f 02 13 92 00 10 00 00 00 00 00 00 00 0b e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 325
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=2
  key_info 0x1392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure Encr)
  key_length=16 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
  key_nonce - hexdump(len=32): e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 95
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 60 3f 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 3f b9 99 74 d9 f6 e8 2c eb f9 fe fb 46 bf ff 24
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f 02 13 92 00 10 00 00 00 00 00 00 00 0b e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 675
RSN: encrypted key data - hexdump(len=32): d0 f2 b5 45 e9 b2 ca b2 a0 f5 50 62 f6 49 60 a4 5d d0 c5 0b 1e 08 e4 a5 91 b6 fb e0 74 77 a1 c5
WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED]
WPA: RX message 1 of Group Key Handshake from 00:02:72:74:ac:85 (ver=2)
RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 01 00 2b ac 63 b9 5d 99 cf 9a 4d 39 07 9f bb 55 5d 39
RSN: received GTK in group key handshake - hexdump(len=18): 01 00 2b ac 63 b9 5d 99 cf 9a 4d 39 07 9f bb 55 5d 39
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 60 3f 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 12 00 00 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
WPA: Group rekeying completed with 00:02:72:74:ac:85 [GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED

And now here is a bad log (2.6.28+compat-wireless-2.6.30-rc4):

wpa_supplicant -Dwext -iwlan0 -c /home/ACORP.conf -dd &
294
# Initializing interface 'wlan0' conf '/home/ACORP.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/ACORP.conf' -> '/home/ACORP.conf'
Reading configuration file '/home/ACORP.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=5):
     41 43 4f 52 50                                    ACORP
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='ACORP'
Initializing interface (2) 'wlan0'
/sbin/udhcpc -n -q -i wlan0 -s /bin/default.script
udhcpc (v1.4.1) started
Interface wlan0 set UP - waiting a second for the driver to complete initialization
Sending discover...
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:0e:98:67:fc
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan0
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Cached scan results are empty - not posting
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
EAPOL: disable timer tick
Sending discover...
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Received 1755 bytes of scan results (6 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:14:d1:31:a3:d0 ssid='TRENDnet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:02:72:74:ac:85 ssid='ACORP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:02:72:74:ac:85 ssid='ACORP'
Trying to associate with 00:02:72:74:ac:85 (SSID='ACORP' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
Sending discover...
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c02 len=157
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000541434f5250010802040b160c12182432043048606c30140100000fac040100000fac040100000fac020000 Resp'
Association info event
req_ies - hexdump(len=45): 00 05 41 43 4f 52 50 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00
resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:02:72:74:ac:85
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:02:72:74:ac:85
No keys have been configured - skip key clearing
Associated with 00:02:72:74:ac:85
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:02:72:74:ac:85
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 323
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 8b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 2e 8f b6 47 34 65 7d 26 0a ec 4f f2 4c a6 84 22
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 673
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:02:72:74:ac:85 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2b c5 db c9 32 ea f5 1a 72 9b 52 28 a2 eb ee 13
RSN: PMKID from Authenticator - hexdump(len=16): 2b c5 db c9 32 ea f5 1a 72 9b 52 28 a2 eb ee 13
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 1d 28 8a 3a 4b fc 2d 9b 3d c9 f7 f5 8c 34 71 29 08 9b f4 c9 5a 08 cd da 49 a8 2b 47 90 2e ca 77
WPA: PTK derivation - A1=00:12:0e:98:67:fc A2=00:02:72:74:ac:85
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 1d 28 8a 3a 4b fc 2d 9b 3d c9 f7 f5 8c 34 71 29 08 9b0
RX EAPOL from 00:02:72:74:ac:85
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32c
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 8b
  key_iv - hexdump(len=16): 7e 67 62 59 32 bc 49 ee 1f 8e a2 5e 94 64 6f 90
  key_rsc - hexdump(len=8): 34 3d 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): fc fc 7d 60 a8 fe 4a e4 65 b1 7a cf de bf 69 f8
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e7 56 98 96 5c b8 84 97 a0 7c 3f 76 86 3b bf 2a 7e 67c
RSN: encrypted key data - hexdump(len=56): eb b6 e0 00 d6 9e 8c 53 b0 13 3e b1 5e 53 7f b3 15 58 97 56 f7 af 6f b6 12 0d 7e d8 9e 5b 8d 34 30 c
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:02:72:74:ac:85 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 2b ac 63 b9 5d 990
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 34 3d 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:02:72:74:ac:85 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:02:72:74:ac:85 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
No lease, failing
# EAPOL: startWhen --> 0
EAPOL: disable timer tick
# /sbin/udhcpc -n -q -i wlan0 -s /bin/default.script
udhcpc (v1.4.1) started
Sending discover...
Sending discover...
Sending discover...
No lease, failing


Any clues what can be wrong?

Best regards,
Ivan



More information about the Hostap mailing list