hidden ssid (ap_scan=2) + multiple network blocks = WPA: Driver used disabled group cipher 0x10 (mask 0x8) - reject

Par Holmstrom par.holmstrom
Fri Jun 12 09:33:40 PDT 2009


kernel 2.6.27
wpa_supplicant 0.4.5 and 0.6.9 tested
H/W is Marvell 88w8686

Hello!  I came across a strange error when using multiple network
blocks together with ap_scan=2

conf #1? (work 100%) :

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2

network={
??????? ssid="DLINK"
??????? scan_ssid=1
??????? proto=RSN
??????? key_mgmt=WPA-PSK
??????? pairwise=CCMP
??????? group=CCMP
??????? psk="xxxxxxxx"
}
network={
??????? ssid="DLINK"
??????? scan_ssid=1
??????? proto=WPA
??????? key_mgmt=WPA-PSK
??????? pairwise=TKIP
??????? group=TKIP
??????? psk="xxxxxxxx"
}


conf #2 ( doesn't work at all )

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2

network={
??????? ssid="DLINK"
??????? scan_ssid=1
??????? proto=WPA
??????? key_mgmt=WPA-PSK
??????? pairwise=TKIP
??????? group=TKIP
??????? psk="passpass"
}
network={
??????? ssid="DLINK"
??????? scan_ssid=1
??????? proto=RSN
??????? key_mgmt=WPA-PSK
??????? pairwise=CCMP
??????? group=CCMP
??????? psk="passpass"
}



this is the output when it fails :

# wpa_supplicant -Dwext -ieth1 -c fail.conf -d
Initializing interface 'eth1' conf 'fail.conf' driver 'wext'
Configuration file 'fail.conf' -> '/var/run/wpa_supplicant/fail.conf'
Reading configuration file '/var/run/wpa_supplicant/fail.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=2
Priority group 0
?? id=0 ssid='DLINK'
?? id=1 ssid='DLINK'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
SIOCGIWRANGE: WE(compiled)=22 WE(source)=15 enc_capa=0xf
? capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:40:8c:94:7f:54
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'DLINK'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: Failed to parse WPA IE from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
WEXT auth param 10 value 0x1 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 8 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=8
Received 199 bytes of scan results (1 BSSes)
Scan results: 1
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'DLINK'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: Failed to parse WPA IE from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
WEXT auth param 10 value 0x1 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 8 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=8
Received 199 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:22:b0:70:a6:62
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:70:a6:62
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Driver used disabled group cipher 0x10 (mask 0x8) - reject
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:22:b0:70:a6:62
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:22:b0:70:a6:62
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
? EAPOL-Key type=2
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Renewed SNonce - hexdump(len=32): 3d bf 6f e0 42 ce 2f 78 3a e9
fc 8f 53 3f 58 25 b9 bc 1a 16 f0 08 37 49 4b 89 ec a9 75 8d 20 a0
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=95
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=151
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: IE KeyData - hexdump(len=56): 06 7a fb a4 c1 7b 2d 19 46 51 ee a7
07 44 f7 b0 bf 8a f0 0a cf 60 d7 6a 60 ea 0f 27 8f 4b 16 74 f1 e2 28
18 99 b3 34 15 27 4a 9f 1e 1f 63 a5 fb eb d8 33 ee 0e 10 cc c3
WPA: EAPOL-Key Key Data underflow (ie=6 len=122)
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00
0f ac 04 01 00 00 0f ac 02 00 00
WPA: Found the current AP from updated scan results
WPA: Invalid TKIP key length 16 (src=00:22:b0:70:a6:62)
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=151
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: IE KeyData - hexdump(len=56): 06 7a fb a4 c1 7b 2d 19 46 51 ee a7
07 44 f7 b0 bf 8a f0 0a cf 60 d7 6a 60 ea 0f 27 8f 4b 16 74 f1 e2 28
18 99 b3 34 15 27 4a 9f 1e 1f 63 a5 fb eb d8 33 ee 0e 10 cc c3
WPA: EAPOL-Key Key Data underflow (ie=6 len=122)
WPA: Invalid TKIP key length 16 (src=00:22:b0:70:a6:62)
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=151
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: IE KeyData - hexdump(len=56): 06 7a fb a4 c1 7b 2d 19 46 51 ee a7
07 44 f7 b0 bf 8a f0 0a cf 60 d7 6a 60 ea 0f 27 8f 4b 16 74 f1 e2 28
18 99 b3 34 15 27 4a 9f 1e 1f 63 a5 fb eb d8 33 ee 0e 10 cc c3
WPA: EAPOL-Key Key Data underflow (ie=6 len=122)
WPA: Invalid TKIP key length 16 (src=00:22:b0:70:a6:62)
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=151
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: IE KeyData - hexdump(len=56): 06 7a fb a4 c1 7b 2d 19 46 51 ee a7
07 44 f7 b0 bf 8a f0 0a cf 60 d7 6a 60 ea 0f 27 8f 4b 16 74 f1 e2 28
18 99 b3 34 15 27 4a 9f 1e 1f 63 a5 fb eb d8 33 ee 0e 10 cc c3
WPA: EAPOL-Key Key Data underflow (ie=6 len=122)
WPA: Invalid TKIP key length 16 (src=00:22:b0:70:a6:62)
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:22:b0:70:a6:62 into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys


And this is the out put when it works :

# wpa_supplicant -Dwext -ieth1 -c ok.conf -d
Initializing interface 'eth1' conf 'ok.conf' driver 'wext'
Configuration file 'ok.conf' -> '/var/run/wpa_supplicant/ok.conf'
Reading configuration file '/var/run/wpa_supplicant/ok.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=2
Priority group 0
?? id=0 ssid='DLINK'
?? id=1 ssid='DLINK'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
SIOCGIWRANGE: WE(compiled)=22 WE(source)=15 enc_capa=0xf
? capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:40:8c:94:7f:54
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'DLINK'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: Failed to parse WPA IE from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
WEXT auth param 10 value 0x1 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 8 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=8
Received 199 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:22:b0:70:a6:62
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:70:a6:62
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:22:b0:70:a6:62
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:22:b0:70:a6:62
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
? EAPOL-Key type=2
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Renewed SNonce - hexdump(len=32): 31 f8 b3 1b 11 6f 6e a2 5e 3a
e8 cc fa 55 e8 05 42 8c 1b 57 51 e5 c3 ca 93 07 74 b7 49 9d 29 e4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=95
? EAPOL-Key type=2
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:22:b0:70:a6:62
IEEE 802.1X RX: version=1 type=3 length=151
? EAPOL-Key type=2
RSN: encrypted key data - hexdump(len=56): a5 a1 ec 7f 38 ee 47 81 90
8b 87 5c eb d7 8f 17 6f c2 8e 7e 66 b5 e0 56 af a4 11 11 90 91 51 4e
6d 99 76 6d 2d 6c 9a a7 bb d8 d2 ca f1 d9 3e 05 6f b5 f1 7b 75 ad 0d
6e
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:22:b0:70:a6:62 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f
ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 de f9 8e 89 55
18 9d 69 58 82 d3 3a ec e6 0a 43 dd 00
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00
0f ac 04 01 00 00 0f ac 02 00 00
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 0c 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:22:b0:70:a6:62 [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:22:b0:70:a6:62 completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE



-->? Now to the question,? Why is wpa_supplicant failing when the 2:nd
network block obviously is correct? (switch place, and it works)
I also noticed this in the output :? WPA: Driver used disabled group
cipher 0x10 (mask 0x8) - reject? - what does that mean. Is it possible
that
the driver is unable to change group cipher the second time? And is
this error rellated to the driver or wpa_supplicant?

Worth to mention is that if i change to ap_scan=1? (and enable the
SSID broadcast in my AP)? this is no issue. its only occuring when
using ap_scan=2
I've also tried 3 diffrent AP's (D-link DAP1353 , Netgear DG834 (no
WPA2), DrayTek vigor 2820n) and the result is the same.


Thanks
Par.



More information about the Hostap mailing list