[Voyage-linux] WPA-PSK setup problem
Keith Cheung
(spam-protected)
Fri Mar 17 16:21:15 HKT 2006
Hi,
I have run the Voyage on Wrap which has two wireless card, Intersil 2.5 and Atheros 4th generation. Both cards work ok in AP mode with WEP. However I have encountered some problems on WPA-PSK.
For 02pre4 (hostapd V0.5.0), the default interface of hostapd.conf is wlan0. When hostapd starts up, the client can scan it as AP with WEP not WPA-PSK. Then I change the interface from wlan0 to ath0. The system reports as follows:
ioctl(SIOCGIFINDEX): No such device
hostap driver initialization failed.
rmdir[ctrl_interface]: No such file or directory
For 02pre3 (hostapd V0.3.7), the ath0 can startup as AP with WEP-PSK support. The client can connect to it, but both cannot ping with each other. The hostapd.conf and output are as follows:
interface=ath0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=wpa_ssid
macaddr_acl=0
auth_algs=3
eap_authenticator=0
wpa=1
wpa_psk=24b8946cf9ec3f9654f97c9394e8bd1a324c82562194d12e27ccdd9f4feda3a1
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
wpa_group_rekey=600
wpa_gmk_rekey=86400
voyage:~# cd /etc/hostapd
voyage:/etc/hostapd# hostapd -dd hostapd.txt
Configuration file: hostapd.txt
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:0b:6b:37:d2:a4 and ssid 'wpa_ssid'
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0x2
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x1
madwifi_set_iface_flags: dev_up=1
madwifi_set_privacy: enabled=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 5f 06 c2 a5 a0 ee 25 c2 17 b6 71 e7 af fe 25 cc ac f2 a5 16 cb 7b 0e 92 07 0e 4f b8 f8 be 86 35
GTK - hexdump(len=32): a5 8d 74 d5 91 f6 ae ce 26 0a 48 84 d4 b0 a6 a0 33 c2 17 65 7c e4 8f ca 12 72 70 30 0f 74 19 af
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
Flushing old station entries
Deauthenticate all stations
l2_packet_receive - recv: Network is down
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:12:17:87:6c:d6 IEEE 802.11: associated
New STA
ath0: STA 00:12:17:87:6c:d6 WPA: event 1 notification
ath0: STA 00:12:17:87:6c:d6 WPA: start authentication
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:12:17:87:6c:d6 key_idx=0
ath0: STA 00:12:17:87:6c:d6 IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:12:17:87:6c:d6 authorized=0
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
WPA: 00:12:17:87:6c:d6 WPA_PTK_GROUP entering state IDLE
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state AUTHENTICATION
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state AUTHENTICATION2
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state INITPSK
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKSTART
ath0: STA 00:12:17:87:6c:d6 WPA: sending 1/4 msg of 4-Way Handshake
ath0: STA 00:12:17:87:6c:d6 WPA: EAPOL-Key timeout
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKSTART
ath0: STA 00:12:17:87:6c:d6 WPA: sending 1/4 msg of 4-Way Handshake
IEEE 802.1X: 123 bytes from 00:12:17:87:6c:d6
IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:12:17:87:6c:d6 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): 24 b8 94 6c f9 ec 3f 96 54 f9 7c 93 94 e8 bd 1a 32 4c 82 56 21 94 d1 2e 27 cc dd 9f 4f ed a3 a1
PTK - hexdump(len=64): 98 a3 89 28 85 86 87 aa 55 46 2e ad e1 41 66 f0 50 76 61 b3 55 3f c8 11 60 b1 a7 3a 12 fe 51 c1 a1 45 97 e4 08 89 cf 69 8f 4b bd 4c 7d 56 73 5a 2e 90 a6 07 c6 c5 5f 4c 3d 7f dc 67 cd 41 bd 4f
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:12:17:87:6c:d6 WPA: sending 3/4 msg of 4-Way Handshake
IEEE 802.1X: 99 bytes from 00:12:17:87:6c:d6
IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:12:17:87:6c:d6 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=TKIP addr=00:12:17:87:6c:d6 key_idx=0
ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
madwifi_sta_deauth: addr=00:12:17:87:6c:d6 reason_code=2
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
ath0: STA 00:12:17:87:6c:d6 IEEE 802.11: deauthenticated due to local deauth request
Can anyone help ?? Thanks.
Keith
_______________________________________
YM - 離線訊息
就算你沒有上網,你的朋友仍可以留下訊息給你,當你上網時就能立即看到,任何說話都冇走失。
http://messenger.yahoo.com.hk
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://list.voyage.hk/pipermail/voyage-linux/attachments/20060317/5e372d7b/attachment-0002.html>
More information about the Voyage-linux
mailing list