[Voyage-linux] Using WPA-PSK with voyage 0.2 and Atheros chipset(s)

Kim-man 'Punky' TSE (spam-protected)
Wed Dec 13 09:20:17 HKT 2006


Hi Robin,

I recalled it worked on voyage 0.2 and hostapd 0.5.2-1.  Last night, I 
run voyage-current and can make my iBook (11b) associate to hostapd with 
WPA-PSK.  But I need to specify eapol_version=1

FYR, voyage-current uses hostapd 0.5.5 and have new parameter 
(eapol_version) support.  The hostapd 0.5.2 package in voyage 0.2 
repository is compiled explicitly with EAP_VERSION=1 flag.  What I see 
the different is your hostapd.conf uses CCMP, while my conf set to 
TKIP.  You may give it a try.

hostapd.conf
=========
bridge=br0
interface=ath0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=4
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=voyage-wds
macaddr_acl=0
auth_algs=3
eapol_key_index_workaround=0
eap_server=0
wpa=3
wpa_passphrase=voyage-wds
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
#eapol_version=1

Robin Levett wrote:
> Punky
>
> I'd seen the exchange to which you referred me, but had understood that the 
> hostapd version you uploaded was the version I had; "dpkg --list hostapd" 
> shows version number 0.5.2-1 installed.  I had downloaded voyage 0.2.  I 
> attempted to update  hostapd from the 0.2 repository, but apt-get install 
> hostapd returned with a message that no package would be updated because I 
> already have the latest version (as with madwifi).
>
> My hostapd.conf file reads:-
>
> interface=ath0
> bridge=br0
> driver=madwifi
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=[myssid]
> auth_algs=1
> eapol_key_index_workaround=0
> eap_server=0
> wpa=3
> wpa_psk_file=/etc/hostapd/wpa_psk
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=CCMP
>
> The initial output from "hostapd -dd /etc/hostapd.conf" reads;-
>
> Configuration file: /etc/hostapd/hostapd.conf
> ctrl_interface_group=0
> Configure bridge br0 for EAPOL traffic.
> madwifi_set_iface_flags: dev_up=0
> Using interface ath0 with hwaddr 00:0f:ea:8d:b2:59 and ssid 'WAPvoyage'
> madwifi_set_ieee8021x: enabled=1
> madwifi_configure_wpa: group key cipher=3
> madwifi_configure_wpa: pairwise key ciphers=0x8
> madwifi_configure_wpa: key management algorithms=0x2
> madwifi_configure_wpa: rsn capabilities=0x0
> madwifi_configure_wpa: enable WPA= 0x3
> madwifi_set_iface_flags: dev_up=1
> WPA: group state machine entering state GTK_INIT
> GMK - hexdump(len=32): [REMOVED]
> GTK - hexdump(len=16): [REMOVED]
> WPA: group state machine entering state SETKEYSDONE
> madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
> madwifi_set_privacy: enabled=1
> SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
> Flushing old station entries
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> Deauthenticate all stations
> Using existing control interface directory.
> l2_packet_receive - recvfrom: Network is down
> br0: topology change detected, propagating
> br0: port 1(ath0) entering forwarding state
>
> On attempting connection with the WG511T in the ThinkPad, I get:-
>
> Wireless event: cmd=0x8c03 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
>   New STA
> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
> key_idx=0 encr=0)
> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 01 f1 32 54 ab 26 c3 bd 30 6e a7 21 
> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
> key_idx=0 encr=0)
> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 02 f1 32 54 ab 26 c3 bd 30 6e a7 21 
> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
> key_idx=0 encr=0)
> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 03 f1 32 54 ab 26 c3 bd 30 6e a7 21 
> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
> key_idx=0 encr=0)
> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 04 f1 32 54 ab 26 c3 bd 30 6e a7 21 
> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
> hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 
> 00:0f:b5:ae:a0:18 reason 2
> madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local deauth 
> request
> Wireless event: cmd=0x8c04 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
> Wireless event: cmd=0x8c03 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
>   New STA
> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK eSignal 2 receivebr0: port 1(ath0) entering 
> disabled state
>
> followed by Ctrl-C, which triggers the following:-
>
> d - terminating
> Removing station 00:0f:b5:ae:a0:18
> Flushing old station entries
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> Deauthenticate all stations
> madwifi_set_privacy: enabled=0
> madwifi_set_ieee8021x: enabled=0
> madwifi_set_iface_flags: dev_up=0
>
> Regards
>
> Robin
>
>
> Kim-man 'Punky' Tse said:
>
>   
>> Hi Robin,
>>
>>
>> I have encountered the same before 0.2 was released. You may need to make 
>>     
> hostapd to use the EAP_VERSION=1. And the stock voyage-0.2 is able to support 
> it. Please read the following thread for this issue. 
>   
>>    http://www.mail-archive.com/voyage-linux@list.voyage.hk/msg00504.html
>>
>>
>> Please provide hostapd debug log. I am not sure your meaning of latest 
>>     
> version madwifi and hostapd. Please also provide the version information as 
> well. 
>   
>> Regards,
>> Punky
>>     
>
>   
>>> Robin Levett wrote:
>>>
>>> My WAP hardware is:-
>>>
>>> Soekris 4521-30 with a Gigabyte GN-WIAG01 mini-PCI card (Atheros 5212
>>> (5004XR) chipset).
>>>
>>> I have installed Voyage 0.2 with the latest (from the 0.2 repository)
>>> versions of madwifi and hostapd.
>>>
>>> I am connecting from a ThinkPad A22m running Win98SE using a Netgear 
>>>       
> WG511T
>   
>>> PC Card using the Netgear 3.30-156 drivers (ie the latest version 
>>>       
> available
>   
>>> for 98SE).
>>>
>>> I have set up the Soekris using madwifi-ng as a transparent bridge from 
>>>       
> the
>   
>>> GN-WIAG01 (as ath0) to eth0; and I can connect to it from the laptop and 
>>>       
> use
>   
>>> it as a WAP - but with no security at all.
>>>
>>> I am unable to persuade hostapd to use WPA-PSK security.  I have set the
>>> hostapd.conf file up in a number of ways (all using a separate wpa_psk
>>> file).  When I run "hostapd -dd /etc/hostapd.conf", it seems to work up to 
>>>       
> a
>   
>>> point.  When the Netgear wizard on the laptop scans, however, it sees it 
>>>       
> as
>   
>>> using WEP security, but cannot connect to it.  The attempt sets off a
>>> continual cycle of attempted handshakes that all terminate at stage 1/4.
>>>
>>> I have tried so many different variations of the hostapd.conf file that it
>>> isn't funny (and putting them all in this post would extend it more than
>>> somewhat) so i'd just like to approach it from the other end:-
>>>
>>> 1       Is it possible to run WPA-PSK on my Soekris using Voyage 0.2?
>>> 2       If someone has managed it, could they post their hostapd.conf 
>>>       
> file?
>   
>>> 3       If not, will upgrading to 0.3-pre2 fix the problem?
>>> 4       Is there an effective way of recompiling either madwifi or 
>>>       
> hostapd?
>   
>>> Thanks in advance for any help available.
>>>
>>> Robin Levett
>>>
>>> --
>>> No virus found in this outgoing message.
>>> Checked by AVG Free Edition.
>>> Version: 7.5.432 / Virus Database: 268.15.15/581 - Release Date: 09/12/06
>>> 15:41
>>>       
> Send instant messages to your online friends http://uk.messenger.yahoo.com 
>
>   


-- 
Regards,
Punky

P U N K N ! X  . c o m
Technology + Lifestyle
(http://www.punknix.com)

V O Y A G E . H K - http://www.voyage.hk
Linux - voyage-0.2 is released!
Store - New Senao NMP-8601 and NMP-8602 (100mW) in stock!
      - New low price for Senao NMP-8602 Plus (400mW)! 





More information about the Voyage-linux mailing list