[Voyage-linux] WPA-PSK setup problem

Kim-man "Punky" TSE (spam-protected)
Tue Mar 28 02:51:00 HKT 2006


Hi all,

I have uploaded hostapd-0.5.2 deb package to:

http://www.voyage.hk/dists/unstable/hostapd/hostapd_0.5.2-1_i386.deb

I also set EAP_VERSION to 1 so that my iBook can be associated.

Anyone has some pointers for proper setup for WPA Enterprise (i.e.
WPA-EAP) ? Especially it is workable for my iBook 2001.

- Punky

P.S. : 0.2 release is very close.

Kim-man "Punky" TSE wrote:
> Hi Keith and all,
>
> Over the weekend I have tried the hostapd (0.3.7 and 0.5.0-2) for
> WPA-PSK and it seems not working properly. I used old iBook (i.e. 2001
> version) with 11b Airport. I have been using this iBook connecting to my
> University wireless using WPA Enterprise without problem. When I used
> WPA Personal to connect my the hostapd box, all I got from hostapd debug
> messagges are "EAPOL timeout". Later on, I used another WRAP board using
> wpa_supplicant and no success. For your reference, on the hostapd box I
> tried two cards, madwifi-ng and hostap drivers.
>
> I don't know what went wrong. The below is the hostapd.conf, which is
> similar to what Keith used. Anyone has success in hostapd before?
>
> interface=wlan0
> driver=hostap
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=voyage-wds
> macaddr_acl=0
> auth_algs=3
> #eap_authenticator=0
> eapol_key_index_workaround=0
> eap_server=0
> wpa=3
> #wpa_psk=76ab47787aa8b560895f617dd351ad9d32faa86232f5366b6554832073d07481
> wpa_passphrase=voyage-wds
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> #wpa_group_rekey=600
> #wpa_gmk_rekey=86400
>
> Regards,
> Punky
>
> Keith Cheung wrote:
>   
>> Hi,
>> I have run the Voyage on Wrap which has two wireless card, Intersil
>> 2.5 and Atheros 4th generation. Both cards work ok in AP mode with
>> WEP. However I have encountered some problems on WPA-PSK.
>> For 02pre4 (hostapd V0.5.0), the default interface of hostapd.conf is
>> wlan0. When hostapd starts up, the client can scan it as AP with WEP
>> not WPA-PSK. Then I change the interface from wlan0 to ath0. The
>> system reports as follows:
>> ioctl(SIOCGIFINDEX): No such device
>> hostap driver initialization failed.
>> rmdir[ctrl_interface]: No such file or directory
>>
>> For 02pre3 (hostapd V0.3.7), the ath0 can startup as AP with WEP-PSK
>> support. The client can connect to it, but both cannot ping with each
>> other. The hostapd.conf and output are as follows:
>> interface=ath0
>> driver=madwifi
>> logger_syslog=-1
>> logger_syslog_level=2
>> logger_stdout=-1
>> logger_stdout_level=2
>> debug=0
>> dump_file=/tmp/hostapd.dump
>> ctrl_interface=/var/run/hostapd
>> ctrl_interface_group=0
>> ssid=wpa_ssid
>> macaddr_acl=0
>> auth_algs=3
>> eap_authenticator=0
>> wpa=1
>> wpa_psk=24b8946cf9ec3f9654f97c9394e8bd1a324c82562194d12e27ccdd9f4feda3a1
>> wpa_key_mgmt=WPA-PSK
>> wpa_pairwise=TKIP
>> wpa_group_rekey=600
>> wpa_gmk_rekey=86400
>> voyage:~# cd /etc/hostapd
>> voyage:/etc/hostapd# hostapd -dd hostapd.txt
>> Configuration file: hostapd.txt
>> madwifi_set_iface_flags: dev_up=0
>> Using interface ath0 with hwaddr 00:0b:6b:37:d2:a4 and ssid 'wpa_ssid'
>> madwifi_set_ieee8021x: enabled=1
>> madwifi_configure_wpa: group key cipher=1
>> madwifi_configure_wpa: pairwise key ciphers=0x2
>> madwifi_configure_wpa: key management algorithms=0x2
>> madwifi_configure_wpa: rsn capabilities=0x0
>> madwifi_configure_wpa: enable WPA= 0x1
>> madwifi_set_iface_flags: dev_up=1
>> madwifi_set_privacy: enabled=1
>> WPA: group state machine entering state GTK_INIT
>> GMK - hexdump(len=32): 5f 06 c2 a5 a0 ee 25 c2 17 b6 71 e7 af fe 25 cc
>> ac f2 a5 16 cb 7b 0e 92 07 0e 4f b8 f8 be 86 35
>> GTK - hexdump(len=32): a5 8d 74 d5 91 f6 ae ce 26 0a 48 84 d4 b0 a6 a0
>> 33 c2 17 65 7c e4 8f ca 12 72 70 30 0f 74 19 af
>> WPA: group state machine entering state SETKEYSDONE
>> madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
>> ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
>> Flushing old station entries
>> Deauthenticate all stations
>> l2_packet_receive - recv: Network is down
>> Wireless event: cmd=0x8c03 len=20
>> ath0: STA 00:12:17:87:6c:d6 IEEE 802.11: associated
>> New STA
>> ath0: STA 00:12:17:87:6c:d6 WPA: event 1 notification
>> ath0: STA 00:12:17:87:6c:d6 WPA: start authentication
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state INITIALIZE
>> madwifi_del_key: addr=00:12:17:87:6c:d6 key_idx=0
>> ath0: STA 00:12:17:87:6c:d6 IEEE 802.1X: unauthorizing port
>> madwifi_set_sta_authorized: addr=00:12:17:87:6c:d6 authorized=0
>> ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
>> WPA: 00:12:17:87:6c:d6 WPA_PTK_GROUP entering state IDLE
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state AUTHENTICATION
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state AUTHENTICATION2
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state INITPSK
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKSTART
>> ath0: STA 00:12:17:87:6c:d6 WPA: sending 1/4 msg of 4-Way Handshake
>> ath0: STA 00:12:17:87:6c:d6 WPA: EAPOL-Key timeout
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKSTART
>> ath0: STA 00:12:17:87:6c:d6 WPA: sending 1/4 msg of 4-Way Handshake
>> IEEE 802.1X: 123 bytes from 00:12:17:87:6c:d6
>> IEEE 802.1X: version=1 type=3 length=119
>> ath0: STA 00:12:17:87:6c:d6 WPA: received EAPOL-Key frame (2/4 Pairwise)
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKCALCNEGOTIATING
>> PMK - hexdump(len=32): 24 b8 94 6c f9 ec 3f 96 54 f9 7c 93 94 e8 bd 1a
>> 32 4c 82 56 21 94 d1 2e 27 cc dd 9f 4f ed a3 a1
>> PTK - hexdump(len=64): 98 a3 89 28 85 86 87 aa 55 46 2e ad e1 41 66 f0
>> 50 76 61 b3 55 3f c8 11 60 b1 a7 3a 12 fe 51 c1 a1 45 97 e4 08 89 cf
>> 69 8f 4b bd 4c 7d 56 73 5a 2e 90 a6 07 c6 c5 5f 4c 3d 7f dc 67 cd 41 bd 4f
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKCALCNEGOTIATING2
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKINITNEGOTIATING
>> madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
>> ath0: STA 00:12:17:87:6c:d6 WPA: sending 3/4 msg of 4-Way Handshake
>> IEEE 802.1X: 99 bytes from 00:12:17:87:6c:d6
>> IEEE 802.1X: version=1 type=3 length=95
>> ath0: STA 00:12:17:87:6c:d6 WPA: received EAPOL-Key frame (4/4 Pairwise)
>> WPA: 00:12:17:87:6c:d6 WPA_PTK entering state PTKINITDONE
>> madwifi_set_key: alg=TKIP addr=00:12:17:87:6c:d6 key_idx=0
>> ioctl[IEEE80211_IOCTL_SETKEY]: Argument list too long
>> madwifi_sta_deauth: addr=00:12:17:87:6c:d6 reason_code=2
>> ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
>> ath0: STA 00:12:17:87:6c:d6 IEEE 802.11: deauthenticated due to local
>> deauth request
>> Can anyone help ?? Thanks.
>> Keith
>>
>> _______________________________________
>> YM - 離線訊息
>> 就算你沒有上網,你的朋友仍可以留下訊息給你,當你上網時就能立即看到,任
>> 何說話都冇走失。
>> http://messenger.yahoo.com.hk
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> Voyage-linux mailing list
>> Voyage-linux at list.voyage.hk
>> http://list.voyage.hk/mailman/listinfo/voyage-linux
>>   
>>     
>
>
>   


-- 
Regards,
Punky
P U N K N ! X . c o m
Technology + Lifestyle
(http://www.punknix.com)

Voyage Linux
(http://www.voyage.hk/software/voyage.html)





More information about the Voyage-linux mailing list