Please note: This project is no longer active. The website is kept online for historic purposes only.
If you´re looking for a Linux driver for your Atheros WLAN device, you should continue here .

Ticket #1171 (new defect)

Opened 15 years ago

Last modified 13 years ago

Madwifi and wpa_supplicant (WPA2) don't work (no association is made) - WEP/WPA untested

Reported by: SWAT@ZWHLUG.org Assigned to:
Priority: major Milestone:
Component: madwifi: other Version: v0.9.2.1
Keywords: wpa_supplicant wpa2 association ubuntu edgy Cc:
Patch is attached: 0 Pending:

Description

Distribution: Ubuntu
Version: 6.10 (Edgy)
modinfo ath_pci version: 0.9.2.1
Kernel version: 2.6.17-11-386
Wireless protocol: WPA2/Personal (so no RADIUS server)

Hardware:
* 3Com card 3CRXJK10075
* Linksys WAP54G
* Broadcom BCM4318 internal chipset (used with ndiswrapper)

Part of the wpa_supplicant log with my 3Com 3CRXJK10075

BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Ignore event for foreign ifindex 5
Ignore event for foreign ifindex 5
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 10:23:41:91:0F:11 into blacklist
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Ignore event for foreign ifindex 5
Ignore event for foreign ifindex 5
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 10:23:41:91:0F:11 into blacklist
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath0
State: SCANNING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Cancelling scan request

Part of the wpa_supplicant log with my Broadcom chipset (working with ndiswrapper)

user@computer:~$ sudo wpa_supplicant -dd -D wext -i eth1 -c /etc/wpa_supplicant/wlanconfig
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wlanconfig' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wlanconfig' -> '/etc/wpa_supplicant/wlanconfig'
Reading configuration file '/etc/wpa_supplicant/wlanconfig'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=3):
     53 46 43                                          STFU             
proto: 0x2
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='STFU'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:14:a5:29:62:2e
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 663 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 0F:9D:42:91:A0:0B ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 0F:9D:42:91:A0:0B (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=11
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c07 len=67
AssocReq IE wireless event - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
Wireless event: cmd=0x8c08 len=32
AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 0F:9D:42:91:A0:0B
Association info event
req_ies - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
State: ASSOCIATING -> ASSOCIATED
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=0F:9D:42:91:A0:0B
No keys have been configured - skip key clearing
Associated with 0F:9D:42:91:A0:0B
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 0F:9D:42:91:A0:0B
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
RSN: PMKID from Authenticator - hexdump(len=16): d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 96 ac ce 08 9e 6f 33 b3 50 58 6e ab 6c 15 bb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 0F:9D:42:91:A0:0B
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b
IEEE 802.1X RX: version=2 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
  key_iv - hexdump(len=16): 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32
  key_rsc - hexdump(len=8): 0d 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 4
0 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b
RSN: encrypted key data - hexdump(len=56): 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8e 31 73 e9 ec 8b 91 68 e8 36 06 d8 a7 5a 84 d4 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 e2 19 59 6e 87 82 01 ce 1d a2 0f 24 59 07 ff 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 0d 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 0F:9D:42:91:A0:0B [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 0F:9D:42:91:A0:0B completed (auth) [id=0 id_str=]
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: COMPLETED -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Cancelling scan request

My wpa_supplicant connection file (which works fine with my ndiswrapper/Broadcom solution)

network={
ssid="STFU"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP
psk="password"
}

Change History

03/01/07 23:09:58 changed by SWAT#ZWHLUG.org

Okay, I tried it with normal WPA and I have the same problem with it.

03/04/07 10:41:16 changed by yasker@gmail.com

I have the same problem with AR5212 on my Thinkpad T41. And it bothered me since I bought the laptop. It occurs almost everytime, but sometime it works very well (but seldom). So I think there is something racing between the thread, so it has chances to run well.

I also tried to debug the wpa_supplicant, but it may take a lot of time to understand the code. So please help to solve this. My wireless can't work for several months...

07/22/07 17:03:40 changed by anonymous

I had the same problem...

turns out I had set passwords and ssids in /etc/network/interfaces.

This seems to have been conflicting with the wpa settings. The workaround is to remove them. :-)

03/19/08 03:08:49 changed by thomas..

yeah.. ..so do i, im running a t42 with the internal ipw2200, i get the same problem, monitor mode works fine, kismet works fine. im running backtrack 3 beta, a distro based on slackware, my wpa_supplicant version is v0.5.7 but i tried the slackware package install upgrade to 5.9 and it didnt change a thing :-( where do i fill out the application to get the forms that allow me to submit this bug as a severity 1??

cheers, thomas

03/19/08 06:02:10 changed by mrenzmann

@yasker: What version of MadWifi do you use?

@thomas: if your card is ipw2200, MadWifi is not suited for you. It works with Atheros cards only.

08/21/08 15:43:40 changed by eladkuzy@gmail.com

i have linksys wrk54, same prob.

sometimes it works,int general it isnt.

04/20/09 13:32:28 changed by anonymous

I have same problem! First i install wadwifi hal version, but the wpa_supplicant accept instruction "-D wext" only. But i think that would to be "-D madwifi".

I dont know to do. I already tried everything!