[icebox-devel] Wireless Association Issues
Brought to you by:
purbanec
|
From: Craig J. <cr...@ro...> - 2005-10-07 00:10:58
|
Hi,
I'm new to the list, but was asked to post here by Daniel from ICE regarding
the issues i have been experiencing (and likely overcome) regarding wireless
association of my ICE router.
In short, I couldn't associate when using WEP, however had no issues when
using no encryption.
When I had a WEP key entered, the web GUI said that I was associated, and
could tell me the MAC address of my access point. L2 was all looking good.
However, I could not get any L3 connectivity happening and could not see an
association entry in my access point (DLink DI764).
After SSHing into the ICE router, I ran an iwconfig.
Output below:
~ # iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
ath0 IEEE 802.11g ESSID:"myssid"
Mode:Managed Frequency:2.412 GHz Access Point: 00:00:00:00:00:00
Bit Rate:11 Mb/s Tx-Power:50 dBm Sensitivity=0/3
Retry:off RTS thr:off Fragment thr:off
Encryption key:FFFF-FFFF-FFFF-FFFF-FFFF-FFFF-00 Security
mode:restricted
Power Management:off
Link Quality=0/94 Signal level=-83 dBm Noise level=-95 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
From here I noted that the security mode is set to "restricted".
In restricted mode the client will only associate with APs that it can first
do shared key authentication with. If the AP is not configured to require
shared key authentication, association won't happen.
My access point is configured for open authentication, based upon the
information available here:
http://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutio
ns_white_paper09186a008009c8b3.shtml
Note: With open authentication, the use of WEP prevents the client from
sending data to and receiving data from the access point, unless the client
has the correct WEP key. With shared-key authentication, the access point
sends the client device a challenge text packet that the client must then
encrypt with the correct WEP key and return to the access point. If the
client has the wrong key or no key, authentication will fail and the client
will not be allowed to associate with the access point. Shared-key
authentication is not considered secure because a hacker who detects both
the clear text challenge and the same challenge encrypted with a WEP key can
decipher the WEP key.
I have then set my ICE router to use the Open security mode to match my AP,
but this was unsuccessful too.
Upon changing the security mode of the access point to support shared mode
authentication, the connection was successfully achieved with encryption on
the link.
I'm unlikley to be the first or last person to experience this, and I
suggest that some further testing be done to ascertain whether Open
authentication can be reliably supported, or if this information should be
built into the support documentation for the ICE router firmware.
Sorry for the long post first up.
Cheers,
Craig Joyce
|