[Madwifi-users] trouble with wpa_supplicant
Status: Beta
Brought to you by:
otaku
From: David L. C. Jr. <sha...@ya...> - 2006-09-26 06:37:47
|
I am having difficulties getting wpa_supplicant to work properly. I am using a Netgear WGT624 access point and a Netgear WG311T PCI card on an Ubuntu Dapper Drake system. I will try to post as much information here as I can, please let me know if any other information is needed. Access point settings: WPA-PSK (TKIP), g only, DHCP. Latest madwifi-ng available from sourceforge, wpa_supplicant-0.4.9 built against madwifi-ng source. Build with entries for both madwifi and wext in .config: CONFIG_DRIVER_MADWIFI=y CFLAGS += -I/usr/src/madwifi-ng CONFIG_DRIVER_WEXT=y CONFIG_CTRL_IFACE=y root@sharkdesk:/home/sharkcohen# uname -a Linux sharkdesk 2.6.15-26-686 #1 SMP PREEMPT Fri Sep 8 20:16:40 UTC 2006 i686 GNU/Linux [17179591.040000] ath_hal: 0.9.18.0 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2 413, RF5413) [17179591.092000] ath_rate_sample: 1.2 (svn r1722) [17179591.116000] ath_pci: 0.9.4.5 (svn r1722) [17179591.116000] ACPI: PCI Interrupt 0000:02:06.0[A] -> GSI 18 (level, low) -> IRQ 177 [17179591.704000] wifi0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps [17179591.704000] wifi0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbp s 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps [17179591.704000] wifi0: turboG rates: 6Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps [17179591.704000] wifi0: H/W encryption support: WEP AES AES_CCM TKIP [17179591.704000] wifi0: mac 7.9 phy 4.5 radio 5.6 [17179591.704000] wifi0: Use hw queue 1 for WME_AC_BE traffic [17179591.704000] wifi0: Use hw queue 0 for WME_AC_BK traffic [17179591.704000] wifi0: Use hw queue 2 for WME_AC_VI traffic [17179591.704000] wifi0: Use hw queue 3 for WME_AC_VO traffic [17179591.704000] wifi0: Use hw queue 8 for CAB traffic [17179591.704000] wifi0: Use hw queue 9 for beacons [17179591.716000] wifi0: Atheros 5212: mem=0xd2000000, irq=177 root@sharkdesk:/etc# cat wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 fast_reauth=1 network={ ssid="SHARKNET" scan_ssid=1 bssid=00:18:4D:4C:E0:6C proto=WPA key_mgmt=WPA-PSK pairwise=TKIP #psk="carcharodon" psk=33f597be96efc4b8693f9c88544c0030937e00c13cc321c6f898049d9176d856 priority=1 } When attempting /usr/local/sbin/wpa_supplicant -Dwext -iath0 -c/etc/wpa_supplicant.conf -dd there is a repeated attempt to associate. Once it finally associates, it tries 4way and group handshakes several times, as follows: State: ASSOCIATING -> ASSOCIATING wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b19 len=8 Received 3608 bytes of scan results (17 BSSes) Scan results: 17 Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:4d:4c:e0:6c (SSID='SHARKNET' freq=2417 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: ASSOCIATING -> ASSOCIATING wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b19 len=8 Received 3608 bytes of scan results (17 BSSes) Scan results: 17 Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:4d:4c:e0:6c (SSID='SHARKNET' freq=2417 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: ASSOCIATING -> ASSOCIATING wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b19 len=8 Received 3608 bytes of scan results (17 BSSes) Scan results: 17 Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:4d:4c:e0:6c (SSID='SHARKNET' freq=2417 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: ASSOCIATING -> ASSOCIATING wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b19 len=8 Received 3608 bytes of scan results (17 BSSes) Scan results: 17 Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:4d:4c:e0:6c (SSID='SHARKNET' freq=2417 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: ASSOCIATING -> ASSOCIATING wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=17 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:4d:4c:e0:6c State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=00:18:4d:4c:e0:6c No keys have been configured - skip key clearing Associated with 00:18:4d:4c:e0:6c WPA: Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:18:4d:4c:e0:6c RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:4d:4c:e0:6c (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=32): 94 82 f3 1e 2c 6f 1a e8 4c 97 22 11 12 15 e3 7b 4d 2f bb 64 30 32 4f f7 ab ad 91 8c 67 97 8a de WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 94 82 f3 1e 2c 6f 1a e8 4c 97 22 11 12 15 e3 7b 4d 2f bb 64 30 32 4f f7 ab ad 91 8c 67 97 8a de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 5d 0c 31 ff 76 c2 0d ac 89 55 7b cb d9 6a 81 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:4d:4c:e0:6c RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 ff af ac 40 17 1c 5c ca 29 dc 62 8d 39 d2 1d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 23 ff af ac 40 17 1c 5c ca 29 dc 62 8d 39 d2 1d WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 ca 54 9a 2f 4a af f5 3f 9f e4 e8 85 c0 63 5b 93 5d 70 6c e1 df 92 56 54 9b 1f b7 32 97 fd 39 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 ff af ac 40 17 1c 5c ca 29 dc 62 8d 39 d2 1d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:4d:4c:e0:6c (ver=1) WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 10 c9 8c de 63 53 59 76 a7 67 76 84 09 7b b3 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:18:4d:4c:e0:6c blacklist count incremented to 2 State: GROUP_HANDSHAKE -> DISCONNECTED CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:4d:4c:e0:6c State: DISCONNECTED -> ASSOCIATED Associated to a new BSS: BSSID=00:18:4d:4c:e0:6c No keys have been configured - skip key clearing Associated with 00:18:4d:4c:e0:6c WPA: Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:18:4d:4c:e0:6c RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:4d:4c:e0:6c (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=32): 20 04 8e 89 4b e8 22 c0 a0 e1 03 f9 0d 5b 3f 8b c9 fc 99 c7 dc fd 0d 63 a4 50 60 27 c9 19 09 97 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 20 04 8e 89 4b e8 22 c0 a0 e1 03 f9 0d 5b 3f 8b c9 fc 99 c7 dc fd 0d 63 a4 50 60 27 c9 19 09 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 41 52 48 13 a2 a5 cb 21 e6 56 f5 34 c0 6b 01 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Starting AP scan (broadcast SSID) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 3608 bytes of scan results (17 BSSes) Scan results: 17 Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted 1: 00:12:17:04:28:ef ssid='4MyEyesOnly' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:13:f7:0c:43:10 ssid='Dima' wpa_ie_len=28 rsn_ie_len=22 caps=0x11 skip - SSID mismatch 3: 00:15:e9:65:1d:ba ssid='juicy' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 4: 00:16:b6:2e:e7:69 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 5: 00:14:6c:44:cb:72 ssid='DRISHTI' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 6: 00:14:6c:14:93:60 ssid='meenu_randeep' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 7: 00:18:3f:1a:0b:21 ssid='2WIRE244' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 8: 00:30:bd:fb:b4:db ssid='belkin54g' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 9: 00:09:5b:6e:a0:ce ssid='Nokia 9500' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 10: 00:09:5b:d9:7a:40 ssid='Suresh' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 11: 00:0d:88:87:17:3d ssid='chandan' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 12: 00:0f:b5:67:e8:98 ssid='NETGEAR' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE 13: 00:14:bf:b8:43:be ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE 14: 00:14:bf:a3:6a:60 ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE 15: 00:13:46:07:02:70 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE 16: 00:0d:88:25:32:c1 ssid='sanjapat' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE No APs found - clear blacklist and try again Removed BSSID 00:18:4d:4c:e0:6c from blacklist (clear) Selecting BSS from priority group 0 0: 00:18:4d:4c:e0:6c ssid='SHARKNET' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE Already associated with the selected AP. RX EAPOL from 00:18:4d:4c:e0:6c RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:4d:4c:e0:6c (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 20 04 8e 89 4b e8 22 c0 a0 e1 03 f9 0d 5b 3f 8b c9 fc 99 c7 dc fd 0d 63 a4 50 60 27 c9 19 09 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 03 2d 0d f7 83 65 5b c1 8f 94 c2 66 fd ab 91 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:4d:4c:e0:6c RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 04 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e3 a9 7a d9 74 0b f3 27 75 ef c7 3a fe 06 92 fa 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): e3 a9 7a d9 74 0b f3 27 75 ef c7 3a fe 06 92 fa WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 04 aa 17 3e 28 6b bf 2d 24 1d 89 38 7c c9 4f 87 a2 43 c7 c3 e1 fc 8e 7c 62 f1 09 02 6e ee 1d 13 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e3 a9 7a d9 74 0b f3 27 75 ef c7 3a fe 06 92 fa 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:4d:4c:e0:6c (ver=1) WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b fc fe 37 d7 ea 0d 77 44 e8 0c 61 09 7d 87 02 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:18:4d:4c:e0:6c into blacklist State: GROUP_HANDSHAKE -> DISCONNECTED CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 Please help -- shark David L. Cohen, Jr. sha...@ya... all your base are belong to shark you have no chance to survive make your time ha ha ha __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com |