[Voyage-linux] Using WPA-PSK with voyage 0.2 and Atheros chipset(s)

Robin Levett (spam-protected)
Wed Dec 13 10:09:20 HKT 2006


Punky

I've tried it; no help, I'm afraid; a chunk of the output following my attempt 
to connect follows (it seems to repeat, albeit not after the same number of 
repeats each time):-

Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
  New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48 
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 57 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 2 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
  New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48 
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 4a c2 bf 81 10 4b 54 e6 bb b3 48 
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 4a c2 bf 81 10 4b 54 e6 bb b3 48 
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03 
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 4a c2 bf 81 10 4b 54 e6 bb b3 48 
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 
00:0f:b5:ae:a0:18 reason 2
madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local deauth 
request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated


Any further thoughts - or should I just bite the bullet and upgrade to 
0.3pre2?  If so, what issues are there I should look out for?  (But as it's 
gone 2am here, I'm going to bed now...)

Regards and thanks

Robin

Kim-man 'Punky' Tse  said:
> Hi Robin,
> 
> I recalled it worked on voyage 0.2 and hostapd 0.5.2-1.  Last night, I 
> run voyage-current and can make my iBook (11b) associate to hostapd with 
> WPA-PSK.  But I need to specify eapol_version=1
> 
> FYR, voyage-current uses hostapd 0.5.5 and have new parameter 
> (eapol_version) support.  The hostapd 0.5.2 package in voyage 0.2 
> repository is compiled explicitly with EAP_VERSION=1 flag.  What I see 
> the different is your hostapd.conf uses CCMP, while my conf set to 
> TKIP.  You may give it a try.
> 
> hostapd.conf
> =========
> bridge=br0
> interface=ath0
> driver=madwifi
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=voyage-wds
> macaddr_acl=0
> auth_algs=3
> eapol_key_index_workaround=0
> eap_server=0
> wpa=3
> wpa_passphrase=voyage-wds
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> #eapol_version=1
> 
> Robin Levett wrote:
> > Punky
> >
> > I'd seen the exchange to which you referred me, but had understood that 
the 
> > hostapd version you uploaded was the version I had; "dpkg --list hostapd" 
> > shows version number 0.5.2-1 installed.  I had downloaded voyage 0.2.  I 
> > attempted to update  hostapd from the 0.2 repository, but apt-get install 
> > hostapd returned with a message that no package would be updated because I 
> > already have the latest version (as with madwifi).
> >
> > My hostapd.conf file reads:-
> >
> > interface=ath0
> > bridge=br0
> > driver=madwifi
> > logger_syslog=-1
> > logger_syslog_level=2
> > logger_stdout=-1
> > logger_stdout_level=2
> > debug=4
> > dump_file=/tmp/hostapd.dump
> > ctrl_interface=/var/run/hostapd
> > ctrl_interface_group=0
> > ssid=[myssid]
> > auth_algs=1
> > eapol_key_index_workaround=0
> > eap_server=0
> > wpa=3
> > wpa_psk_file=/etc/hostapd/wpa_psk
> > wpa_key_mgmt=WPA-PSK
> > wpa_pairwise=CCMP
> >
> > The initial output from "hostapd -dd /etc/hostapd.conf" reads;-
> >
> > Configuration file: /etc/hostapd/hostapd.conf
> > ctrl_interface_group=0
> > Configure bridge br0 for EAPOL traffic.
> > madwifi_set_iface_flags: dev_up=0
> > Using interface ath0 with hwaddr 00:0f:ea:8d:b2:59 and ssid 'WAPvoyage'
> > madwifi_set_ieee8021x: enabled=1
> > madwifi_configure_wpa: group key cipher=3
> > madwifi_configure_wpa: pairwise key ciphers=0x8
> > madwifi_configure_wpa: key management algorithms=0x2
> > madwifi_configure_wpa: rsn capabilities=0x0
> > madwifi_configure_wpa: enable WPA= 0x3
> > madwifi_set_iface_flags: dev_up=1
> > WPA: group state machine entering state GTK_INIT
> > GMK - hexdump(len=32): [REMOVED]
> > GTK - hexdump(len=16): [REMOVED]
> > WPA: group state machine entering state SETKEYSDONE
> > madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
> > madwifi_set_privacy: enabled=1
> > SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
> > Flushing old station entries
> > madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> > Deauthenticate all stations
> > Using existing control interface directory.
> > l2_packet_receive - recvfrom: Network is down
> > br0: topology change detected, propagating
> > br0: port 1(ath0) entering forwarding state
> >
> > On attempting connection with the WG511T in the ThinkPad, I get:-
> >
> > Wireless event: cmd=0x8c03 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> >   New STA
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> > madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 
gtk_len=0 
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 
03 
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 01 f1 32 54 ab 26 c3 bd 30 6e a7 
21 
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 
gtk_len=0 
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 
03 
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 02 f1 32 54 ab 26 c3 bd 30 6e a7 
21 
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 
gtk_len=0 
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 
03 
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 03 f1 32 54 ab 26 c3 bd 30 6e a7 
21 
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 
gtk_len=0 
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 
03 
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 04 f1 32 54 ab 26 c3 bd 30 6e a7 
21 
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 
> > 00
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
> > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 
> > 00:0f:b5:ae:a0:18 reason 2
> > madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> > madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> > ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local 
deauth 
> > request
> > Wireless event: cmd=0x8c04 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
> > Wireless event: cmd=0x8c03 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> >   New STA
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK eSignal 2 receivebr0: port 1(ath0) entering 
> > disabled state
> >
> > followed by Ctrl-C, which triggers the following:-
> >
> > d - terminating
> > Removing station 00:0f:b5:ae:a0:18
> > Flushing old station entries
> > madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> > Deauthenticate all stations
> > madwifi_set_privacy: enabled=0
> > madwifi_set_ieee8021x: enabled=0
> > madwifi_set_iface_flags: dev_up=0
> >
> > Regards
> >
> > Robin
> >
> >
> > Kim-man 'Punky' Tse said:
> >
> >   
> >> Hi Robin,
> >>
> >>
> >> I have encountered the same before 0.2 was released. You may need to make 
> >>     
> > hostapd to use the EAP_VERSION=1. And the stock voyage-0.2 is able to 
support 
> > it. Please read the following thread for this issue. 
> >   
> >>    http://www.mail-archive.com/voyage-linux@list.voyage.hk/msg00504.html
> >>
> >>
> >> Please provide hostapd debug log. I am not sure your meaning of latest 
> >>     
> > version madwifi and hostapd. Please also provide the version information 
as 
> > well. 
> >   
> >> Regards,
> >> Punky
> >> 
> >>> Robin Levett wrote:
> >>>
> >>> My WAP hardware is:-
> >>>
> >>> Soekris 4521-30 with a Gigabyte GN-WIAG01 mini-PCI card (Atheros 5212
> >>> (5004XR) chipset).
> >>>
> >>> I have installed Voyage 0.2 with the latest (from the 0.2 repository)
> >>> versions of madwifi and hostapd.
> >>>
> >>> I am connecting from a ThinkPad A22m running Win98SE using a Netgear 
> >>>       
> > WG511T
> >   
> >>> PC Card using the Netgear 3.30-156 drivers (ie the latest version 
> >>>       
> > available
> >   
> >>> for 98SE).
> >>>
> >>> I have set up the Soekris using madwifi-ng as a transparent bridge from 
> >>>       
> > the
> >   
> >>> GN-WIAG01 (as ath0) to eth0; and I can connect to it from the laptop and 
> >>>       
> > use
> >   
> >>> it as a WAP - but with no security at all.
> >>>
> >>> I am unable to persuade hostapd to use WPA-PSK security.  I have set the
> >>> hostapd.conf file up in a number of ways (all using a separate wpa_psk
> >>> file).  When I run "hostapd -dd /etc/hostapd.conf", it seems to work up 
to 
> >>>       
> > a
> >   
> >>> point.  When the Netgear wizard on the laptop scans, however, it sees it 
> >>>       
> > as
> >   
> >>> using WEP security, but cannot connect to it.  The attempt sets off a
> >>> continual cycle of attempted handshakes that all terminate at stage 1/4.
> >>>
> >>> I have tried so many different variations of the hostapd.conf file that 
it
> >>> isn't funny (and putting them all in this post would extend it more than
> >>> somewhat) so i'd just like to approach it from the other end:-
> >>>
> >>> 1       Is it possible to run WPA-PSK on my Soekris using Voyage 0.2?
> >>> 2       If someone has managed it, could they post their hostapd.conf 
> >>>       
> > file?
> >   
> >>> 3       If not, will upgrading to 0.3-pre2 fix the problem?
> >>> 4       Is there an effective way of recompiling either madwifi or 
> >>>       
> > hostapd?
> >   
> >>> Thanks in advance for any help available.
> >>>
> >>> Robin Levett
> >>>
> >>> --
> >>> No virus found in this outgoing message.
> >>> Checked by AVG Free Edition.
> >>> Version: 7.5.432 / Virus Database: 268.15.15/581 - Release Date: 
09/12/06
> >>> 15:41
> >>>       
Send instant messages to your online friends http://uk.messenger.yahoo.com 





More information about the Voyage-linux mailing list