Thread: [Madwifi-users] WPA Problems
Status: Beta
Brought to you by:
otaku
From: Craig B. <cra...@gm...> - 2005-01-21 02:09:31
|
I've finally got my IBM T41's Atheros card working with MadWifi. The only thing that won't work now is WPA with TKIP, I can only get it to associate with non-secure APs. Here is the output of wpa_supplicant. I've loaded wlan_ccmp and am using the latest CVS with 2.6.10 under Debian. ~# wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0 -D madwifi Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' Priority group 0 id=0 ssid='2414' Initializing interface (2) 'ath0' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Own MAC address: 00:05:4e:47:3f:1f wpa_driver_madwifi_set_wpa: enabled=1 wpa_driver_madwifi_del_key: keyidx=0 wpa_driver_madwifi_del_key: keyidx=1 wpa_driver_madwifi_del_key: keyidx=2 wpa_driver_madwifi_del_key: keyidx=3 wpa_driver_madwifi_set_countermeasures: enabled=0 wpa_driver_madwifi_set_drop_unencrypted: enabled=1 Setting scan request: 0 sec 100000 usec Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=4): 32 34 31 34 2414 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b19 len=12 Received 274 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:0f:66:dd:11:94 ssid='2414' wpa_ie_len=28 rsn_ie_len=0 selected Trying to associate with 00:0f:66:dd:11:94 (SSID='2414' freq=2462 MHz) Cancelling scan request Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_madwifi_set_drop_unencrypted: enabled=1 wpa_driver_madwifi_associate Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:0f:66:dd:11:94 Association event - clear replay counter Associated to a new BSS: BSSID=00:0f:66:dd:11:94 No keys have been configured - skip key clearing Associated with 00:0f:66:dd:11:94 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:0f:66:dd:11:94 Setting authentication timeout: 10 sec 0 usec EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 WPA: RX message 1 of 4-Way Handshake from 00:0f:66:dd:11:94 (ver=2) WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 0 1 00 00 50 f2 04 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=32): 90 32 98 89 f9 ca e6 9c 35 c1 59 19 ae 58 03 bf 1b 07 5a 50 e6 03 02 5a 8c 28 86 02 8b c2 50 20 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: EAPOL-Key MIC - hexdump(len=16): 17 da 81 20 03 35 03 47 a4 ab 6e b9 f3 8a b9 3e WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0f:66:dd:11:94 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=123 EAPOL-Key type=254 WPA: RX message 3 of 4-Way Handshake from 00:0f:66:dd:11:94 (ver=2) WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16 ioctl[IEEE80211_IOCTL_SETKEY]: No such device or address WPA: Failed to set PTK to the driver. Signal 2 received - terminating -- Craig Bruenderman |
From: Michael R. <ma...@no...> - 2005-01-24 06:41:09
|
Hi. Craig Bruenderman wrote: > wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16 > ioctl[IEEE80211_IOCTL_SETKEY]: No such device or address This looks like being the core problem. My first guess would be that you need wlan_tkip instead of wlan_ccmp. The second guess would be that you might need both, and the third would be to also load aes.o. All three guesses are done "blind", they might or might not be the solution for you. Nevertheless I'd give it a try :) Bye, Mike |
From: Craig B. <cra...@gm...> - 2005-01-31 02:34:03
|
I loaded both of these modules, no luck. On Thu, 20 Jan 2005 21:09:23 -0500, Craig Bruenderman <cra...@gm...> wrote: > I've finally got my IBM T41's Atheros card working with MadWifi. The > only thing that won't work now is WPA with TKIP, I can only get it to > associate with non-secure APs. > > Here is the output of wpa_supplicant. I've loaded wlan_ccmp and am > using the latest CVS with 2.6.10 under Debian. > > ~# wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0 -D madwifi > Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi' > Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' > Reading configuration file '/etc/wpa_supplicant.conf' > ctrl_interface='/var/run/wpa_supplicant' > Priority group 0 > id=0 ssid='2414' > Initializing interface (2) 'ath0' > EAPOL: SUPP_PAE entering state DISCONNECTED > EAPOL: KEY_RX entering state NO_KEY_RECEIVE > EAPOL: SUPP_BE entering state INITIALIZE > EAP: EAP entering state DISABLED > EAPOL: External notification - portEnabled=0 > EAPOL: External notification - portValid=0 > Own MAC address: 00:05:4e:47:3f:1f > wpa_driver_madwifi_set_wpa: enabled=1 > wpa_driver_madwifi_del_key: keyidx=0 > wpa_driver_madwifi_del_key: keyidx=1 > wpa_driver_madwifi_del_key: keyidx=2 > wpa_driver_madwifi_del_key: keyidx=3 > wpa_driver_madwifi_set_countermeasures: enabled=0 > wpa_driver_madwifi_set_drop_unencrypted: enabled=1 > Setting scan request: 0 sec 100000 usec > Starting AP scan (specific SSID) > Scan SSID - hexdump_ascii(len=4): > 32 34 31 34 2414 > Wireless event: cmd=0x8b1a len=17 > Wireless event: cmd=0x8b19 len=12 > Received 274 bytes of scan results (1 BSSes) > Scan results: 1 > Selecting BSS from priority group 0 > 0: 00:0f:66:dd:11:94 ssid='2414' wpa_ie_len=28 rsn_ie_len=0 > selected > Trying to associate with 00:0f:66:dd:11:94 (SSID='2414' freq=2462 MHz) > Cancelling scan request > Automatic auth_alg selection: 0x1 > WPA: using IEEE 802.11i/D3.0 > WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 > WPA: using GTK TKIP > WPA: using PTK CCMP > WPA: using KEY_MGMT WPA-PSK > WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 > 01 00 00 50 f2 04 01 00 00 50 f2 02 > No keys have been configured - skip key clearing > wpa_driver_madwifi_set_drop_unencrypted: enabled=1 > wpa_driver_madwifi_associate > Setting authentication timeout: 5 sec 0 usec > EAPOL: External notification - EAP success=0 > EAPOL: External notification - EAP fail=0 > EAPOL: External notification - portControl=Auto > Wireless event: cmd=0x8b1a len=17 > Wireless event: cmd=0x8b15 len=20 > Wireless event: new AP: 00:0f:66:dd:11:94 > Association event - clear replay counter > Associated to a new BSS: BSSID=00:0f:66:dd:11:94 > No keys have been configured - skip key clearing > Associated with 00:0f:66:dd:11:94 > EAPOL: External notification - portEnabled=0 > EAPOL: External notification - portValid=0 > EAPOL: External notification - EAP success=0 > EAPOL: External notification - portEnabled=1 > EAPOL: SUPP_PAE entering state CONNECTING > EAPOL: txStart > WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) > EAPOL: SUPP_BE entering state IDLE > EAP: EAP entering state INITIALIZE > EAP: EAP entering state IDLE > Setting authentication timeout: 10 sec 0 usec > RX EAPOL from 00:0f:66:dd:11:94 > Setting authentication timeout: 10 sec 0 usec > EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines > IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > WPA: RX message 1 of 4-Way Handshake from 00:0f:66:dd:11:94 (ver=2) > WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 > 50 f2 02 0 1 00 00 50 f2 04 01 00 00 50 f2 02 > WPA: Renewed SNonce - hexdump(len=32): 90 32 98 89 f9 ca e6 9c 35 c1 > 59 19 ae 58 03 bf 1b 07 5a 50 e6 03 02 5a 8c 28 86 02 8b c2 50 20 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=64): [REMOVED] > WPA: EAPOL-Key MIC - hexdump(len=16): 17 da 81 20 03 35 03 47 a4 ab 6e > b9 f3 8a b9 3e > WPA: Sending EAPOL-Key 2/4 > RX EAPOL from 00:0f:66:dd:11:94 > EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines > IEEE 802.1X RX: version=1 type=3 length=123 > EAPOL-Key type=254 > WPA: RX message 3 of 4-Way Handshake from 00:0f:66:dd:11:94 (ver=2) > WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 > 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 > WPA: Sending EAPOL-Key 4/4 > WPA: Installing PTK to the driver. > WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 > wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16 > ioctl[IEEE80211_IOCTL_SETKEY]: No such device or address > WPA: Failed to set PTK to the driver. > Signal 2 received - terminating > > -- > Craig Bruenderman > -- Craig Bruenderman |