Could use some help with sw-crypt and ath10k.

Antonio Quartulli antonio
Wed Dec 11 11:47:36 PST 2013


Hi Ben,

meanwhile somebody else gives his own feedback, I try to guess something..

On 11/12/13 20:34, Ben Greear wrote:
> Hello!
> 
> I'm trying to get sw-crypt (ie, just refuse to set the key and return -ENOSPC) to work with ath10k client.  The server is ath9k and has been working
> fine.  It appears that the station connects, but then the AP kicks it out.  Almost certainly
> the problem is that the ath10k client is doing something wrong, but I could use some help in
> figuring out where the problem lies.
> 
> The AP's log looks like this below.  I can get packet captures on a monitor port,
> more verbose logs or other debugging if someone would like to see it.
> 
> Thanks,
> Ben
> 
> 
> 2013-12-11 11:19:46.493  1386789586.322929: vap0: Event EAPOL_TX_STATUS (48) received
> 2013-12-11 11:19:46.493  1386789586.322951: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
> 2013-12-11 11:19:46.494  1386789586.322967: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
> 2013-12-11 11:19:46.494  1386789587.322842: 1386789587.322849: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
> 2013-12-11 11:19:46.494  1386789587.322954: 1386789587.322957: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
> 2013-12-11 11:19:46.494  1386789587.322967: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
> 2013-12-11 11:19:46.494  1386789587.323083: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 2)

Here (and also in the following 3 attempts) it looks like the station is
not replying to the EAPOL 1/4.
Doesn't wpa_supplicant on the station say anything interesting?


[....]

> b4 2e da 3a 2f 77
> 2013-12-11 11:19:54.335  1386789595.751332: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state INITPSK
> 2013-12-11 11:19:54.335  1386789595.751341: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
> 2013-12-11 11:19:54.335  1386789595.751351: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
> 2013-12-11 11:19:54.335  1386789595.751362: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKSTART
> 2013-12-11 11:19:54.335  1386789595.751373: 1386789595.751376: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
> 2013-12-11 11:19:54.335  1386789595.751410: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
> 2013-12-11 11:19:54.335  1386789595.751423: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 00:03:7f:48:cc:b0 (300 seconds - ap_max_inactivity)
> 2013-12-11 11:19:54.335  1386789595.751445: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for vap0
> 2013-12-11 11:19:54.335  1386789595.751457: nl80211: New station 00:03:7f:48:cc:b0
> 2013-12-11 11:19:54.335  1386789595.751580: vap0: Event EAPOL_TX_STATUS (48) received
> 2013-12-11 11:19:54.335  1386789595.751595: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=95 - ack=1
> 2013-12-11 11:19:54.335  1386789595.751605: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
> 2013-12-11 11:19:54.335  1386789595.751614: WPA: Increase initial EAPOL-Key 1/4 timeout by 2000 ms because of acknowledged frame
> 2013-12-11 11:19:54.372  1386789595.772632: vap0: Event EAPOL_RX (27) received
> 2013-12-11 11:19:54.372  1386789595.772666: IEEE 802.1X: 121 bytes from 00:03:7f:48:cc:b0
> 2013-12-11 11:19:54.372  1386789595.772690:    IEEE 802.1X: version=1 type=3 length=117
> 2013-12-11 11:19:54.372  1386789595.772711: WPA: Received EAPOL-Key from 00:03:7f:48:cc:b0 key_info=0x10a type=2 key_data_length=22
> 2013-12-11 11:19:54.372  1386789595.772764: WPA: Received Key Nonce - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8
> b3 2d d1 9a e9 26 1b cf
> 2013-12-11 11:19:54.372  1386789595.772790: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> 2013-12-11 11:19:54.372  1386789595.772807: 1386789595.772811: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING
> 2013-12-11 11:19:54.372  1386789595.772819: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
> 2013-12-11 11:19:54.372  1386789595.772853: WPA: PTK derivation - A1=00:03:83:3d:30:aa A2=00:03:7f:48:cc:b0
> 2013-12-11 11:19:54.372  1386789595.772864: WPA: Nonce1 - hexdump(len=32): 45 f9 7c 60 08 6c b5 06 4b 1a 1f 6e d0 d7 24 c1 15 82 a8 f6 52 fc e4 7b 2c 22 b4 2e
> da 3a 2f 77
> 2013-12-11 11:19:54.382  1386789595.772879: WPA: Nonce2 - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8 b3 2d d1 9a
> e9 26 1b cf
> 2013-12-11 11:19:54.382  1386789595.772893: WPA: PMK - hexdump(len=32): [REMOVED]
> 2013-12-11 11:19:54.382  1386789595.772899: WPA: PTK - hexdump(len=48): [REMOVED]
> 2013-12-11 11:19:54.382  1386789595.772913: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING2
> 2013-12-11 11:19:54.382  1386789595.772924: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
> 2013-12-11 11:19:54.382  1386789595.772978: 1386789595.772981: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
> 2013-12-11 11:19:54.382  1386789595.772995: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
> 2013-12-11 11:19:54.382  1386789595.773063: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
> 2013-12-11 11:19:54.382  1386789595.773222: vap0: Event EAPOL_TX_STATUS (48) received
> 2013-12-11 11:19:54.382  1386789595.773232: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
> 2013-12-11 11:19:54.382  1386789595.773240: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
> 


What happens after this? In this case it seems that the AP got to the
point of sending the EAPOL 3/4. Did the station reply after that? Or what?

my 2 cents.

Cheers,


-- 
Antonio Quartulli

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://lists.shmoo.com/pipermail/hostap/attachments/20131211/7a2d4a1d/attachment.pgp>



More information about the Hostap mailing list