[Madwifi-users] Can't get IP from DHCP - using WPA
Status: Beta
Brought to you by:
otaku
From: Tristan B. <tburch@u.washington.edu> - 2005-01-24 05:41:02
|
Hi, I've tried to look/search through the previous postings, but didn't find much. I'm sorry if this has been covered before. I've got madwifi installed and it seems to connect to my neightbor's AP using no encryption. I also installed wpa_supplicant so I can use my own router/AP (Linksys WRT54G) and that's where I'm having trouble. Everything seems to be configured properly and the debug information for wpa_supplicant looks like it's connecting to my router/AP, but I can't get an IP from the DHCP server. Here's the output of wpa_supplicant: [root@fart mythtv]# /usr/sbin/wpa_supplicant -c/etc/wpa_supplicant.conf -D madwi fi -iath0 -dd Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group=0 eapol_version=1 ap_scan=1 Line: 197 - start of a new network block SSID - hexdump_ascii(len=9): 74 77 69 72 65 6c 65 73 73 twireless PSK - hexdump(len=32): be c8 a8 72 5a 77 7f 14 be 30 03 e5 0b 30 32 47 0f a9 80 95 ba 9c 23 c9 6f c1 04 42 6d 2b 72 3a key_mgmt: 0x3 priority=5 Priority group 5 id=0 ssid='twireless' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_madwifi_set_wpa: enabled=1 wpa_driver_madwifi_del_key: keyidx=0 wpa_driver_madwifi_del_key: keyidx=1 wpa_driver_madwifi_del_key: keyidx=2 wpa_driver_madwifi_del_key: keyidx=3 wpa_driver_madwifi_set_countermeasures: enabled=0 wpa_driver_madwifi_set_drop_unencrypted: enabled=1 Setting scan request: 0 sec 100000 usec l2_packet_receive - recv: Network is down Starting AP scan (broadcast SSID) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b1a len=12 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 Wireless event: cmd=0x8b19 len=12 Received 633 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 5 0: 00:0c:41:37:b1:56 ssid='twireless' wpa_ie_len=24 rsn_ie_len=0 selected Trying to associate with 00:0c:41:37:b1:56 (SSID='twireless' freq=2447 MHz) Cancelling scan request WPA: using IEEE 802.11i/D3.0 WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_driver_madwifi_del_key: keyidx=0 wpa_driver_madwifi_del_key: keyidx=1 wpa_driver_madwifi_del_key: keyidx=2 wpa_driver_madwifi_del_key: keyidx=3 wpa_driver_madwifi_del_key: keyidx=0 wpa_driver_madwifi_set_drop_unencrypted: enabled=1 wpa_driver_madwifi_associate Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto Wireless event: cmd=0x8b1a len=22 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:0c:41:37:b1:56 Association event - clear replay counter Associated to a new BSS: BSSID=00:0c:41:37:b1:56 wpa_driver_madwifi_del_key: keyidx=0 wpa_driver_madwifi_del_key: keyidx=1 wpa_driver_madwifi_del_key: keyidx=2 wpa_driver_madwifi_del_key: keyidx=3 wpa_driver_madwifi_del_key: keyidx=0 Associated with 00:0c:41:37:b1:56 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Setting authentication timeout: 10 sec 0 usec RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:0c:41:37:b1:56 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX message 1 of 4-Way Handshake from 00:0c:41:37:b1:56 (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=32): d7 1f a8 22 81 d9 1f c6 73 64 b3 c3 17 4a b5 50 1e 1a 85 7e 82 31 9b a6 81 21 48 00 55 c1 4e 95 WPA: PMK - hexdump(len=32): be c8 a8 72 5a 77 7f 14 be 30 03 e5 0b 30 32 47 0f a9 80 95 ba 9c 23 c9 6f c1 04 42 6d 2b 72 3a WPA: PTK - hexdump(len=64): bb 2f c6 21 18 1d 85 f6 dc 43 30 9d 7e 2c 6f 3e 4b 54 ed a4 96 38 28 8a 2d 17 e6 73 e6 13 88 ac b2 88 df 73 8c 1f 70 08 24 cd 80 37 ca 43 1b 07 b2 7b 0d e0 c6 08 86 f7 86 ec 8f e7 59 b0 12 51 WPA: EAPOL-Key MIC - hexdump(len=16): db af 9c 4c 62 e7 17 9d 91 53 68 d3 4b 98 68 5d WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0c 41 37 b1 56 00 0f 3d ae 46 09 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 d7 1f a8 22 81 d9 1f c6 73 64 b3 c3 17 4a b5 50 1e 1a 85 7e 82 31 9b a6 81 21 48 00 55 c1 4e 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db af 9c 4c 62 e7 17 9d 91 53 68 d3 4b 98 68 5d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:0c:41:37:b1:56 RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 c4 34 b3 b9 7c 4c f2 5e e0 8c ee f8 da 87 f1 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 01 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 c4 34 b3 b9 7c 4c f2 5e e0 8c ee f8 da 87 f1 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: RX message 3 of 4-Way Handshake from 00:0c:41:37:b1:56 (ver=1) WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0c 41 37 b1 56 00 0f 3d ae 46 09 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 d7 1f a8 22 81 d9 1f c6 73 64 b3 c3 17 4a b5 50 1e 1a 85 7e 82 31 9b a6 81 21 48 00 55 c1 4e 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 2c 24 22 84 5d 43 a7 2e 20 a9 49 b1 e3 27 60 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32 RX EAPOL from 00:0c:41:37:b1:56 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 3f 72 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 10 20 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 fb 85 96 db 79 bc 6f 51 ed f7 c9 ea 68 2e df 00 20 e4 dc 3c 20 c2 d0 9a cc 35 70 a5 1d 1a 22 97 26 a6 89 db c6 ab f1 43 87 f8 6d b0 03 16 17 6e 3f EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 ce 7d bb 3b 15 a6 5e 4d 96 29 e6 7e 03 65 b1 cc 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 3f 72 24 6b 09 5d e7 cf 50 f9 eb b0 ab a3 b8 e1 40 10 20 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 fb 85 96 db 79 bc 6f 51 ed f7 c9 ea 68 2e df 00 20 e4 dc 3c 20 c2 d0 9a cc 35 70 a5 1d 1a 22 97 26 a6 89 db c6 ab f1 43 87 f8 6d b0 03 16 17 6e 3f WPA: RX message 1 of Group Key Handshake from 00:0c:41:37:b1:56 (ver=1) WPA: Group Key - hexdump(len=32): 3a 92 f4 b8 5a 27 2b 62 c4 c1 99 a9 ea 61 58 7d 9b 8e 8f d7 b6 7b b5 34 71 5b 8b 4c 78 1b 19 ea WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 20 03 00 00 00 00 wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0c 41 37 b1 56 00 0f 3d ae 46 09 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 ae 88 60 ca e6 8c 2b 08 e8 69 db 45 ab 0c 48 00 00 WPA: Key negotiation completed with 00:0c:41:37:b1:56 Cancelling authentication timeout EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state SUCCESS EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE [ended via control + c] When I run iwconfig, it also looks like it's connected: [root@fart mythtv]# /sbin/iwconfig ath0 ath0 IEEE 802.11g ESSID:"twireless" Mode:Managed Frequency:2.447GHz Access Point: 00:0C:41:37:B1:56 Bit Rate:36Mb/s Tx-Power:50 dBm Sensitivity=0/3 Retry:off RTS thr:off Fragment thr:off Encryption key:BF07-37AE-4E57-B7F5-3D82-D338-E0E9-9726 Security mode:restricted Power Management:off Link Quality=35/94 Signal level=-60 dBm Noise level=-95 dBm Rx invalid nwid:907 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:2 Invalid misc:2 Missed beacon:0 Finally, I try to bring up the ath0 and get the following: /sbin/ifup ath0 Determining IP information for ath0...PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data. --- 192.168.0.1 ping statistics --- 4 packets transmitted, 0 received, +3 errors, 100% packet loss, time 2999ms , pipe 4 failed. Here's where I'm confused. My DHCP server is 192.168.50.1 and it's trying to get a lease from 192.168.0.1, which I believe is my neightbors network that it first connected to. I'm not sure if it's my configuration of wpa_supplicant or something else with my system and I'd be grateful if someone could point me in the right direction. I'm a little bit of a linux newbie, but seem to be getting the hang of things quickly. I'm running Fedora Core 3 with kernel 2.6.10-1.737_FC3, Madwifi version 0.9.4.12, Wpa_supplicant version 0.2.6, and using a DWL-G520 Rev. B PCI wireless card. Here's my ifcfg-ath0 configuration: # Atheros Communications, Inc. AR5212 802.11abg NIC DEVICE=ath0 ONBOOT=no BOOTPROTO=dhcp HWADDR=00:0F:3D:AE:46:09 NETMASK= DHCP_HOSTNAME= IPADDR= DOMAIN= GATEWAY= TYPE=Wireless ESSID= CHANNEL= MODE= RATE= WIRELESS_IWPRIV_OPTIONS="authmode 2" and wpa_supplicant.conf: #twireless network={ ssid="twireless" #psk="apt206wireless" psk=bec8a8725a777f14be3003e50b3032470fa98095ba9c23c96fc104426d2b723a key_mgmt=WPA-PSK WPA-EAP priority=5 } Thanks! (sorry for the long email, I was trying to be as detailed as possible) |