[TriLUG] wpa_supplicant blacklists my AP! [Long message!]
Brian Henning
lugmail at cheetah.dynip.com
Sat Oct 7 16:35:04 EDT 2006
Hi Gang,
Still working away at getting my T60p fully-functional under Debian Etch,
and my current issue is wireless.
Harware-wise, it seems like I have everything in order. iwconfig has no
problem configuring the device (which is the Atheros a/b/g device) and
detecting signal strength (when I set the channel manually). I'm using the
latest madwifi-ng drivers, compiled from source.
Problem is, wpa_supplicant never manages to associate with my AP. My AP is
configured with broadcast disabled, mac filtering, and WPA-PSK / TKIP. I
know my MAC address is allowed, because it all works perfectly when I'm
booted in Windows.
I'm at a total loss, and thus here comes the long part. I've been following
directions on the madwifi wiki, which basically say that after all the
drivers and microcode are properly installed and loaded, that the following
commands will associate the device with an AP. I'm looking through all the
spewing of messages by the wpa_supplicant command, and I'm not seeing
anything that looks like an error message.. it's just not associating. I'm
hoping someone on the list who knows a lot more than me will be able to look
through the output and see what's going on. Additional note: A forum post
somewhere said to use -Dwext instead of -Dmadwifi in the wpa_supplicant
command to fix an ioctl invalid argument error.
/etc/wpa_supplicant.conf:
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="mywirelesssid"
#psk=" [ my psk string ] "
psk=[my psk hex string]
key_mgmt=WPA-PSK
pairwise=TKIP
group=TKIP
proto=WPA
}
brilappy:/home/brian/sandbox/madwifi-ng# iwconfig ath0 ssid "[ masked ]"
brilappy:/home/brian/sandbox/madwifi-ng# ifconfig ath0 192.168.0.55 up
brilappy:/home/brian/sandbox/madwifi-ng#
wpa_supplicant -dd -Dwext -iath0 -c/etc/wpa_supplicant.conf
Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'wext'
ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 3 - start of a new network block
ssid - hexdump_ascii(len=9):
[ masked ]
PSK - hexdump(len=32): [REMOVED]
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
proto: 0x1
Priority group 0
id=0 ssid='[ masked ]'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=13 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:16:cf:2a:22:9d
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface ath0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to
speed up initial association
Received 448 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:13:10:77:4b:c5 ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
1: 00:13:10:77:4b:c5 ssid='[ masked ]' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Trying to associate with 00:13:10:77:4b:c5 (SSID='[ masked ]' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=18
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 448 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:13:10:77:4b:c5 ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
1: 00:13:10:77:4b:c5 ssid='[ masked ]' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Already associated with the selected AP.
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:77:4b:c5
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:77:4b:c5
No keys have been configured - skip key clearing
Associated with 00:13:10:77:4b:c5
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:13:10:77:4b:c5
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00
00 bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c 98 3f 66 22 10 cf 5d a8 e4
a3 81 9a b6 62 a5 f5 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c
98 3f 66 22 10 cf 5d a8 e4 a3 81 9a b6 62 a5 f5 ca
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00
00 00 00 00 bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c 98 3f 66 22 10 cf
5d a8 e4 a3 81 9a b6 62 a5 f5 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:77:4b:c5 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 57 38 88 84 41 e5 7e 1e 09 ef 47 19
f9 f4 9f 98 42 2c 3b b4 a6 20 c7 1b 69 fe 24 f6 b2 3f b6 00
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00
00 00 00 00 57 38 88 84 41 e5 7e 1e 09 ef 47 19 f9 f4 9f 98 42 2c 3b b4 a6
20 c7 1b 69 fe 24 f6 b2 3f b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 d4 ed 32 3e d3 4f
94 19 d2 a3 08 5d bf 42 8b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:77:4b:c5
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00
01 bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c 98 3f 66 22 10 cf 5d a8 e4
a3 81 9a b6 62 a5 f5 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 64 e9 12 50 93 39 98 4f 6f
12 26 e0 cd 8f f3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c
98 3f 66 22 10 cf 5d a8 e4 a3 81 9a b6 62 a5 f5 ca
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0e 64 e9 12 50 93 39 98 4f 6f 12 26 e0 cd 8f f3
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00
00 00 00 01 bb 31 2e 95 c5 04 fa c8 be f7 74 d1 bd c0 3c 98 3f 66 22 10 cf
5d a8 e4 a3 81 9a b6 62 a5 f5 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 64 e9 12 50 93 39
98 4f 6f 12 26 e0 cd 8f f3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:77:4b:c5 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 30 04 95 56 9b 5d
31 7d 28 d9 9a 3b 71 a2 31 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:77:4b:c5 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
-----(at this point, I have seen the "blacklisted" and hit ctrl-c)------
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath0
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Removed BSSID 00:13:10:77:4b:c5 from blacklist (clear)
Cancelling scan request
brilappy:/home/brian/sandbox/madwifi-ng#
More information about the TriLUG
mailing list