[Voyage-linux] Using WPA-PSK with voyage 0.2 and Atheros chipset(s)
Kim-man 'Punky' TSE
(spam-protected)
Wed Dec 13 14:24:46 HKT 2006
Hi Robin,
The debug message shows the authentication failed at very early stage.
Last hope: Are you sure you set the right things in wpa_psk_file? I
would suggest that you test with wpa_passphrase parameter first, didn't you?
for wpa_psk_file, you can see the example in:
http://hostap.epitest.fi/cgi-bin/viewcvs.cgi/hostap/hostapd/hostapd.wpa_psk?rev=1.1&content-type=text/vnd.viewcvs-markup
Regards,
Punky
Robin Levett wrote:
> Punky
>
> I've tried it; no help, I'm afraid; a chunk of the output following my attempt
> to connect follows (it seems to repeat, albeit not after the same number of
> repeats each time):-
>
> Wireless event: cmd=0x8c03 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> New STA
> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
> keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48
> 84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 57 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Wireless event: cmd=0x8c04 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 2 notification
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> Wireless event: cmd=0x8c03 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
> New STA
> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
> keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4a c2 bf 81 10 4b 54 e6 bb b3 48
> 84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
> keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 4a c2 bf 81 10 4b 54 e6 bb b3 48
> 84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
> keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 4a c2 bf 81 10 4b 54 e6 bb b3 48
> 84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0
> keyidx=0 encr=0)
> TX EAPOL - hexdump(len=113): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01 03
> 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 4a c2 bf 81 10 4b 54 e6 bb b3 48
> 84 d6 07 e5 48 43 ee 26 d4 2e 1f c6 61 b3 4f aa 2a 05 da a8 58 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
> hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA
> 00:0f:b5:ae:a0:18 reason 2
> madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local deauth
> request
> Wireless event: cmd=0x8c04 len=20
> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
>
>
> Any further thoughts - or should I just bite the bullet and upgrade to
> 0.3pre2? If so, what issues are there I should look out for? (But as it's
> gone 2am here, I'm going to bed now...)
>
> Regards and thanks
>
> Robin
>
> Kim-man 'Punky' Tse said:
>
>> Hi Robin,
>>
>> I recalled it worked on voyage 0.2 and hostapd 0.5.2-1. Last night, I
>> run voyage-current and can make my iBook (11b) associate to hostapd with
>> WPA-PSK. But I need to specify eapol_version=1
>>
>> FYR, voyage-current uses hostapd 0.5.5 and have new parameter
>> (eapol_version) support. The hostapd 0.5.2 package in voyage 0.2
>> repository is compiled explicitly with EAP_VERSION=1 flag. What I see
>> the different is your hostapd.conf uses CCMP, while my conf set to
>> TKIP. You may give it a try.
>>
>> hostapd.conf
>> =========
>> bridge=br0
>> interface=ath0
>> driver=madwifi
>> logger_syslog=-1
>> logger_syslog_level=2
>> logger_stdout=-1
>> logger_stdout_level=2
>> debug=4
>> dump_file=/tmp/hostapd.dump
>> ctrl_interface=/var/run/hostapd
>> ctrl_interface_group=0
>> ssid=voyage-wds
>> macaddr_acl=0
>> auth_algs=3
>> eapol_key_index_workaround=0
>> eap_server=0
>> wpa=3
>> wpa_passphrase=voyage-wds
>> wpa_key_mgmt=WPA-PSK
>> wpa_pairwise=TKIP
>> #eapol_version=1
>>
>> Robin Levett wrote:
>>
>>> Punky
>>>
>>> I'd seen the exchange to which you referred me, but had understood that
>>>
> the
>
>>> hostapd version you uploaded was the version I had; "dpkg --list hostapd"
>>> shows version number 0.5.2-1 installed. I had downloaded voyage 0.2. I
>>> attempted to update hostapd from the 0.2 repository, but apt-get install
>>> hostapd returned with a message that no package would be updated because I
>>> already have the latest version (as with madwifi).
>>>
>>> My hostapd.conf file reads:-
>>>
>>> interface=ath0
>>> bridge=br0
>>> driver=madwifi
>>> logger_syslog=-1
>>> logger_syslog_level=2
>>> logger_stdout=-1
>>> logger_stdout_level=2
>>> debug=4
>>> dump_file=/tmp/hostapd.dump
>>> ctrl_interface=/var/run/hostapd
>>> ctrl_interface_group=0
>>> ssid=[myssid]
>>> auth_algs=1
>>> eapol_key_index_workaround=0
>>> eap_server=0
>>> wpa=3
>>> wpa_psk_file=/etc/hostapd/wpa_psk
>>> wpa_key_mgmt=WPA-PSK
>>> wpa_pairwise=CCMP
>>>
>>> The initial output from "hostapd -dd /etc/hostapd.conf" reads;-
>>>
>>> Configuration file: /etc/hostapd/hostapd.conf
>>> ctrl_interface_group=0
>>> Configure bridge br0 for EAPOL traffic.
>>> madwifi_set_iface_flags: dev_up=0
>>> Using interface ath0 with hwaddr 00:0f:ea:8d:b2:59 and ssid 'WAPvoyage'
>>> madwifi_set_ieee8021x: enabled=1
>>> madwifi_configure_wpa: group key cipher=3
>>> madwifi_configure_wpa: pairwise key ciphers=0x8
>>> madwifi_configure_wpa: key management algorithms=0x2
>>> madwifi_configure_wpa: rsn capabilities=0x0
>>> madwifi_configure_wpa: enable WPA= 0x3
>>> madwifi_set_iface_flags: dev_up=1
>>> WPA: group state machine entering state GTK_INIT
>>> GMK - hexdump(len=32): [REMOVED]
>>> GTK - hexdump(len=16): [REMOVED]
>>> WPA: group state machine entering state SETKEYSDONE
>>> madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
>>> madwifi_set_privacy: enabled=1
>>> SIOCGIWRANGE: WE(compiled)=19 WE(source)=13 enc_capa=0xf
>>> Flushing old station entries
>>> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
>>> Deauthenticate all stations
>>> Using existing control interface directory.
>>> l2_packet_receive - recvfrom: Network is down
>>> br0: topology change detected, propagating
>>> br0: port 1(ath0) entering forwarding state
>>>
>>> On attempting connection with the WG511T in the ThinkPad, I get:-
>>>
>>> Wireless event: cmd=0x8c03 len=20
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
>>> New STA
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
>>> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
>>> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
>>> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK_GROUP entering state IDLE
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state AUTHENTICATION2
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITPSK
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
>>> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
>>>
> gtk_len=0
>
>>> key_idx=0 encr=0)
>>> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
>>>
> 03
>
>>> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 01 f1 32 54 ab 26 c3 bd 30 6e a7
>>>
> 21
>
>>> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
>>> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
>>>
> gtk_len=0
>
>>> key_idx=0 encr=0)
>>> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
>>>
> 03
>
>>> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 02 f1 32 54 ab 26 c3 bd 30 6e a7
>>>
> 21
>
>>> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
>>> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
>>>
> gtk_len=0
>
>>> key_idx=0 encr=0)
>>> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
>>>
> 03
>
>>> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 03 f1 32 54 ab 26 c3 bd 30 6e a7
>>>
> 21
>
>>> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: EAPOL-Key timeout
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state PTKSTART
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: sending 1/4 msg of 4-Way Handshake
>>> WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0
>>>
> gtk_len=0
>
>>> key_idx=0 encr=0)
>>> TX EAPOL - hexdump(len=121): 00 0f b5 ae a0 18 00 0f ea 8d b2 59 88 8e 01
>>>
> 03
>
>>> 00 67 fe 00 8a 00 10 00 00 00 00 00 00 00 04 f1 32 54 ab 26 c3 bd 30 6e a7
>>>
> 21
>
>>> 93 19 a9 cb 56 9b 99 47 7d 40 91 f4 6b 37 77 28 43 0a f0 c6 71 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>>
> 00
>
>>> 00
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECT
>>> hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA
>>> 00:0f:b5:ae:a0:18 reason 2
>>> madwifi_sta_deauth: addr=00:0f:b5:ae:a0:18 reason_code=2
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state DISCONNECTED
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK entering state INITIALIZE
>>> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
>>> ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.1X: unauthorizing port
>>> madwifi_set_sta_authorized: addr=00:0f:b5:ae:a0:18 authorized=0
>>> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: deauthenticated due to local
>>>
> deauth
>
>>> request
>>> Wireless event: cmd=0x8c04 len=20
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: disassociated
>>> Wireless event: cmd=0x8c03 len=20
>>> ath0: STA 00:0f:b5:ae:a0:18 IEEE 802.11: associated
>>> New STA
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: event 1 notification
>>> madwifi_del_key: addr=00:0f:b5:ae:a0:18 key_idx=0
>>> ath0: STA 00:0f:b5:ae:a0:18 WPA: start authentication
>>> WPA: 00:0f:b5:ae:a0:18 WPA_PTK eSignal 2 receivebr0: port 1(ath0) entering
>>> disabled state
>>>
>>> followed by Ctrl-C, which triggers the following:-
>>>
>>> d - terminating
>>> Removing station 00:0f:b5:ae:a0:18
>>> Flushing old station entries
>>> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
>>> Deauthenticate all stations
>>> madwifi_set_privacy: enabled=0
>>> madwifi_set_ieee8021x: enabled=0
>>> madwifi_set_iface_flags: dev_up=0
>>>
>>> Regards
>>>
>>> Robin
>>>
>>>
>>> Kim-man 'Punky' Tse said:
>>>
>>>
>>>
>>>> Hi Robin,
>>>>
>>>>
>>>> I have encountered the same before 0.2 was released. You may need to make
>>>>
>>>>
>>> hostapd to use the EAP_VERSION=1. And the stock voyage-0.2 is able to
>>>
> support
>
>>> it. Please read the following thread for this issue.
>>>
>>>
>>>> http://www.mail-archive.com/voyage-linux@list.voyage.hk/msg00504.html
>>>>
>>>>
>>>> Please provide hostapd debug log. I am not sure your meaning of latest
>>>>
>>>>
>>> version madwifi and hostapd. Please also provide the version information
>>>
> as
>
>>> well.
>>>
>>>
>>>> Regards,
>>>> Punky
>>>>
>>>>
>>>>> Robin Levett wrote:
>>>>>
>>>>> My WAP hardware is:-
>>>>>
>>>>> Soekris 4521-30 with a Gigabyte GN-WIAG01 mini-PCI card (Atheros 5212
>>>>> (5004XR) chipset).
>>>>>
>>>>> I have installed Voyage 0.2 with the latest (from the 0.2 repository)
>>>>> versions of madwifi and hostapd.
>>>>>
>>>>> I am connecting from a ThinkPad A22m running Win98SE using a Netgear
>>>>>
>>>>>
>>> WG511T
>>>
>>>
>>>>> PC Card using the Netgear 3.30-156 drivers (ie the latest version
>>>>>
>>>>>
>>> available
>>>
>>>
>>>>> for 98SE).
>>>>>
>>>>> I have set up the Soekris using madwifi-ng as a transparent bridge from
>>>>>
>>>>>
>>> the
>>>
>>>
>>>>> GN-WIAG01 (as ath0) to eth0; and I can connect to it from the laptop and
>>>>>
>>>>>
>>> use
>>>
>>>
>>>>> it as a WAP - but with no security at all.
>>>>>
>>>>> I am unable to persuade hostapd to use WPA-PSK security. I have set the
>>>>> hostapd.conf file up in a number of ways (all using a separate wpa_psk
>>>>> file). When I run "hostapd -dd /etc/hostapd.conf", it seems to work up
>>>>>
> to
>
>>>>>
>>>>>
>>> a
>>>
>>>
>>>>> point. When the Netgear wizard on the laptop scans, however, it sees it
>>>>>
>>>>>
>>> as
>>>
>>>
>>>>> using WEP security, but cannot connect to it. The attempt sets off a
>>>>> continual cycle of attempted handshakes that all terminate at stage 1/4.
>>>>>
>>>>> I have tried so many different variations of the hostapd.conf file that
>>>>>
> it
>
>>>>> isn't funny (and putting them all in this post would extend it more than
>>>>> somewhat) so i'd just like to approach it from the other end:-
>>>>>
>>>>> 1 Is it possible to run WPA-PSK on my Soekris using Voyage 0.2?
>>>>> 2 If someone has managed it, could they post their hostapd.conf
>>>>>
>>>>>
>>> file?
>>>
>>>
>>>>> 3 If not, will upgrading to 0.3-pre2 fix the problem?
>>>>> 4 Is there an effective way of recompiling either madwifi or
>>>>>
>>>>>
>>> hostapd?
>>>
>>>
>>>>> Thanks in advance for any help available.
>>>>>
>>>>> Robin Levett
>>>>>
>>>>> --
>>>>> No virus found in this outgoing message.
>>>>> Checked by AVG Free Edition.
>>>>> Version: 7.5.432 / Virus Database: 268.15.15/581 - Release Date:
>>>>>
> 09/12/06
>
>>>>> 15:41
>>>>>
>>>>>
> Send instant messages to your online friends http://uk.messenger.yahoo.com
>
>
--
Regards,
Punky
P U N K N ! X . c o m
Technology + Lifestyle
(http://www.punknix.com)
V O Y A G E . H K - http://www.voyage.hk
Linux - voyage-0.2 is released!
Store - New Senao NMP-8601 and NMP-8602 (100mW) in stock!
- New low price for Senao NMP-8602 Plus (400mW)!
More information about the Voyage-linux
mailing list