[Voyage-linux] Using WPA-PSK with voyage 0.2 and Atheros chipset(s)
Robin Levett
(spam-protected)
Wed Dec 13 10:09:20 HKT 2006
Punky
I've tried it; no help, I'm afraid; a chunk of the output following my attempt
to connect follows (it seems to repeat, albeit not after the same number of
repeats each time):-
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 57 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 2 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
New STA
ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 4a c2 bf 81 10 4b 54 e6 bb b3 48
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 4a c2 bf 81 10 4b 54 e6 bb b3 48
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 4a c2 bf 81 10 4b 54 e6 bb b3 48
84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA
00:0f:b5:ae:a0:18 reason 2
madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local deauth
request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
Any further thoughts - or should I just bite the bullet and upgrade to
0.3pre2? If so, what issues are there I should look out for? (But as it's
gone 2am here, I'm going to bed now...)
Regards and thanks
Robin
Kim-man 'Punky' Tse said:
> Hi Robin,
>
> I recalled it worked on voyage 0.2 and hostapd 0.5.2-1. Last night, I
> run voyage-current and can make my iBook (11b) associate to hostapd with
> WPA-PSK. But I need to specify eapol_version=1
>
> FYR, voyage-current uses hostapd 0.5.5 and have new parameter
> (eapol_version) support. The hostapd 0.5.2 package in voyage 0.2
> repository is compiled explicitly with EAP_VERSION=1 flag. What I see
> the different is your hostapd.conf uses CCMP, while my conf set to
> TKIP. You may give it a try.
>
> hostapd.conf
> =========
> bridge=br0
> interface=ath0
> driver=madwifi
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=voyage-wds
> macaddr_acl=0
> auth_algs=3
> eapol_key_index_workaround=0
> eap_server=0
> wpa=3
> wpa_passphrase=voyage-wds
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> #eapol_version=1
>
> Robin Levett wrote:
> > Punky
> >
> > I'd seen the exchange to which you referred me, but had understood that
the
> > hostapd version you uploaded was the version I had; "dpkg --list hostapd"
> > shows version number 0.5.2-1 installed. I had downloaded voyage 0.2. I
> > attempted to update hostapd from the 0.2 repository, but apt-get install
> > hostapd returned with a message that no package would be updated because I
> > already have the latest version (as with madwifi).
> >
> > My hostapd.conf file reads:-
> >
> > interface=ath0
> > bridge=br0
> > driver=madwifi
> > logger_syslog=-1
> > logger_syslog_level=2
> > logger_stdout=-1
> > logger_stdout_level=2
> > debug=4
> > dump_file=/tmp/hostapd.dump
> > ctrl_interface=/var/run/hostapd
> > ctrl_interface_group=0
> > ssid=[myssid]
> > auth_algs=1
> > eapol_key_index_workaround=0
> > eap_server=0
> > wpa=3
> > wpa_psk_file=/etc/hostapd/wpa_psk
> > wpa_key_mgmt=WPA-PSK
> > wpa_pairwise=CCMP
> >
> > The initial output from "hostapd -dd /etc/hostapd.conf" reads;-
> >
> > Configuration file: /etc/hostapd/hostapd.conf
> > ctrl_interface_group=0
> > Configure bridge br0 for EAPOL traffic.
> > madwifi_set_iface_flags: dev_up=0
> > Using interface ath0 with hwaddr 00:0f:ea:8d:b2:59 and ssid 'WAPvoyage'
> > madwifi_set_ieee8021x: enabled=1
> > madwifi_configure_wpa: group key cipher=3
> > madwifi_configure_wpa: pairwise key ciphers=0x8
> > madwifi_configure_wpa: key management algorithms=0x2
> > madwifi_configure_wpa: rsn capabilities=0x0
> > madwifi_configure_wpa: enable WPA= 0x3
> > madwifi_set_iface_flags: dev_up=1
> > WPA: group state machine entering state GTK_INIT
> > GMK - hexdump(len=32): [REMOVED]
> > GTK - hexdump(len=16): [REMOVED]
> > WPA: group state machine entering state SETKEYSDONE
> > madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
> > madwifi_set_privacy: enabled=1
> > SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
> > Flushing old station entries
> > madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> > Deauthenticate all stations
> > Using existing control interface directory.
> > l2_packet_receive - recvfrom: Network is down
> > br0: topology change detected, propagating
> > br0: port 1(ath0) entering forwarding state
> >
> > On attempting connection with the WG511T in the ThinkPad, I get:-
> >
> > Wireless event: cmd=0x8c03 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> > New STA
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> > madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
gtk_len=0
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
03
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 01 f1 32 54 ab 26 c3 bd 30 6e a7
21
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
gtk_len=0
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
03
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 02 f1 32 54 ab 26 c3 bd 30 6e a7
21
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
gtk_len=0
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
03
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 03 f1 32 54 ab 26 c3 bd 30 6e a7
21
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
gtk_len=0
> > key_idx=0 encr=0)
> > TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
03
> > 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 04 f1 32 54 ab 26 c3 bd 30 6e a7
21
> > 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
> > 00
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
> > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA
> > 00:0f:b5:ae:a0:18 reason 2
> > madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> > madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> > ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local
deauth
> > request
> > Wireless event: cmd=0x8c04 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
> > Wireless event: cmd=0x8c03 len=20
> > ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> > New STA
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> > madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> > ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> > WPA: 00:0f:b5:ae:a0:18 WPA_PTK eSignal 2 receivebr0: port 1(ath0) entering
> > disabled state
> >
> > followed by Ctrl-C, which triggers the following:-
> >
> > d - terminating
> > Removing station 00:0f:b5:ae:a0:18
> > Flushing old station entries
> > madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> > Deauthenticate all stations
> > madwifi_set_privacy: enabled=0
> > madwifi_set_ieee8021x: enabled=0
> > madwifi_set_iface_flags: dev_up=0
> >
> > Regards
> >
> > Robin
> >
> >
> > Kim-man 'Punky' Tse said:
> >
> >
> >> Hi Robin,
> >>
> >>
> >> I have encountered the same before 0.2 was released. You may need to make
> >>
> > hostapd to use the EAP_VERSION=1. And the stock voyage-0.2 is able to
support
> > it. Please read the following thread for this issue.
> >
> >> http://www.mail-archive.com/voyage-linux@list.voyage.hk/msg00504.html
> >>
> >>
> >> Please provide hostapd debug log. I am not sure your meaning of latest
> >>
> > version madwifi and hostapd. Please also provide the version information
as
> > well.
> >
> >> Regards,
> >> Punky
> >>
> >>> Robin Levett wrote:
> >>>
> >>> My WAP hardware is:-
> >>>
> >>> Soekris 4521-30 with a Gigabyte GN-WIAG01 mini-PCI card (Atheros 5212
> >>> (5004XR) chipset).
> >>>
> >>> I have installed Voyage 0.2 with the latest (from the 0.2 repository)
> >>> versions of madwifi and hostapd.
> >>>
> >>> I am connecting from a ThinkPad A22m running Win98SE using a Netgear
> >>>
> > WG511T
> >
> >>> PC Card using the Netgear 3.30-156 drivers (ie the latest version
> >>>
> > available
> >
> >>> for 98SE).
> >>>
> >>> I have set up the Soekris using madwifi-ng as a transparent bridge from
> >>>
> > the
> >
> >>> GN-WIAG01 (as ath0) to eth0; and I can connect to it from the laptop and
> >>>
> > use
> >
> >>> it as a WAP - but with no security at all.
> >>>
> >>> I am unable to persuade hostapd to use WPA-PSK security. I have set the
> >>> hostapd.conf file up in a number of ways (all using a separate wpa_psk
> >>> file). When I run "hostapd -dd /etc/hostapd.conf", it seems to work up
to
> >>>
> > a
> >
> >>> point. When the Netgear wizard on the laptop scans, however, it sees it
> >>>
> > as
> >
> >>> using WEP security, but cannot connect to it. The attempt sets off a
> >>> continual cycle of attempted handshakes that all terminate at stage 1/4.
> >>>
> >>> I have tried so many different variations of the hostapd.conf file that
it
> >>> isn't funny (and putting them all in this post would extend it more than
> >>> somewhat) so i'd just like to approach it from the other end:-
> >>>
> >>> 1 Is it possible to run WPA-PSK on my Soekris using Voyage 0.2?
> >>> 2 If someone has managed it, could they post their hostapd.conf
> >>>
> > file?
> >
> >>> 3 If not, will upgrading to 0.3-pre2 fix the problem?
> >>> 4 Is there an effective way of recompiling either madwifi or
> >>>
> > hostapd?
> >
> >>> Thanks in advance for any help available.
> >>>
> >>> Robin Levett
> >>>
> >>> --
> >>> No virus found in this outgoing message.
> >>> Checked by AVG Free Edition.
> >>> Version: 7.5.432 / Virus Database: 268.15.15/581 - Release Date:
09/12/06
> >>> 15:41
> >>>
Send instant messages to your online friends http://uk.messenger.yahoo.com
More information about the Voyage-linux
mailing list