[Voyage-linux] Using WPA-PSK with voyage 0.2 and =?iso-8859-1?q?Atheros=09chipset?=(s)
Robin Levett
(spam-protected)
Wed Dec 13 08:04:04 HKT 2006
Punky
I'd seen the exchange to which you referred me, but had understood that the
hostapd version you uploaded was the version I had; "dpkg --list hostapd"
shows version number 0.5.2-1 installed. I had downloaded voyage 0.2. I
attempted to update hostapd from the 0.2 repository, but apt-get install
hostapd returned with a message that no package would be updated because I
already have the latest version (as with madwifi).
My hostapd.conf file reads:-
interface=ath0
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=4
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=[myssid]
auth_algs=1
eapol_key_index_workaround=0
eap_server=0
wpa=3
wpa_psk_file=/etc/hostapd/wpa_psk
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
The initial output from "hostapd -dd /etc/hostapd.conf" reads;-
Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=0
Configure bridge br0 for EAPOL traffic.
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:0f:ea:8d:b2:59 and ssid 'WAPvoyage'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=3
madwifi_configure_wpa: pairwise key ciphers=0x8
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x3
madwifi_set_iface_flags: dev_up=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
Using existing control interface directory.
l2_packet_receive - recvfrom: Network is down
br0: topology change detected, propagating
br0: port 1(ath0) entering forwarding state
On attempting connection with the WG511T in the ThinkPad, I get:-
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
key_idx=0 encr=0)
TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 01 f1 32 54 ab 26 c3 bd 30 6e a7 21
93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
key_idx=0 encr=0)
TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 02 f1 32 54 ab 26 c3 bd 30 6e a7 21
93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
key_idx=0 encr=0)
TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 03 f1 32 54 ab 26 c3 bd 30 6e a7 21
93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
key_idx=0 encr=0)
TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 04 f1 32 54 ab 26 c3 bd 30 6e a7 21
93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA
00:0f:b5:ae:a0:18 reason 2
madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local deauth
request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK eSignal 2 receivebr0: port 1(ath0) entering
disabled state
followed by Ctrl-C, which triggers the following:-
d - terminating
Removing station 00:0f:b5:ae:a0:18
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
madwifi_set_privacy: enabled=0
madwifi_set_ieee8021x: enabled=0
madwifi_set_iface_flags: dev_up=0
Regards
Robin
Kim-man 'Punky' Tse said:
> Hi Robin,
>
>
> I have encountered the same before 0.2 was released. You may need to make
hostapd to use the EAP_VERSION=1. And the stock voyage-0.2 is able to support
it. Please read the following thread for this issue.
> http://www.mail-archive.com/voyage-linux@list.voyage.hk/msg00504.html
>
>
> Please provide hostapd debug log. I am not sure your meaning of latest
version madwifi and hostapd. Please also provide the version information as
well.
>
> Regards,
> Punky
> > Robin Levett wrote:
> >
> > My WAP hardware is:-
> >
> > Soekris 4521-30 with a Gigabyte GN-WIAG01 mini-PCI card (Atheros 5212
> > (5004XR) chipset).
> >
> > I have installed Voyage 0.2 with the latest (from the 0.2 repository)
> > versions of madwifi and hostapd.
> >
> > I am connecting from a ThinkPad A22m running Win98SE using a Netgear
WG511T
> > PC Card using the Netgear 3.30-156 drivers (ie the latest version
available
> > for 98SE).
> >
> > I have set up the Soekris using madwifi-ng as a transparent bridge from
the
> > GN-WIAG01 (as ath0) to eth0; and I can connect to it from the laptop and
use
> > it as a WAP - but with no security at all.
> >
> > I am unable to persuade hostapd to use WPA-PSK security. I have set the
> > hostapd.conf file up in a number of ways (all using a separate wpa_psk
> > file). When I run "hostapd -dd /etc/hostapd.conf", it seems to work up to
a
> > point. When the Netgear wizard on the laptop scans, however, it sees it
as
> > using WEP security, but cannot connect to it. The attempt sets off a
> > continual cycle of attempted handshakes that all terminate at stage 1/4.
> >
> > I have tried so many different variations of the hostapd.conf file that it
> > isn't funny (and putting them all in this post would extend it more than
> > somewhat) so i'd just like to approach it from the other end:-
> >
> > 1 Is it possible to run WPA-PSK on my Soekris using Voyage 0.2?
> > 2 If someone has managed it, could they post their hostapd.conf
file?
> > 3 If not, will upgrading to 0.3-pre2 fix the problem?
> > 4 Is there an effective way of recompiling either madwifi or
hostapd?
> >
> > Thanks in advance for any help available.
> >
> > Robin Levett
> >
> > --
> > No virus found in this outgoing message.
> > Checked by AVG Free Edition.
> > Version: 7.5.432 / Virus Database: 268.15.15/581 - Release Date: 09/12/06
> > 15:41
Send instant messages to your online friends http://uk.messenger.yahoo.com
More information about the Voyage-linux
mailing list