You are not logged in.
Pages: 1
Hi,
in our company we are moving from WPA2-Personal to WPA2-Ent and I have a problem with my card AR9485 (ath9k module).
my wpa_supplicant.conf:
network={
ssid="networkers"
key_mgmt=WPA-EAP
eap=PEAP
identity="jwidel"
password="somepassword"
ca_cert="/home/jwidel/tmp/rootca-networkers.pem"
phase1="peaplabel=0"
phase2="auth=MSCHAPV2"
priority=10
}
Here is a debug from: wpa_supplicant -i wlan0 -c wpa_supplicant.conf -dd
tcpdumpd:
reading from file wpa.debug.tcpdump, link-type EN10MB (Ethernet)
17:31:42.637147 EAP packet (0) v2, len 62, Request (1), id 1, len 62
Type Identity (1), Identity:
17:31:42.637282 EAP packet (0) v1, len 11, Response (2), id 1, len 11
Type Identity (1), Identity: jwidel
17:31:42.662007 EAP packet (0) v2, len 22, Request (1), id 2, len 22
Type MD5-challenge (4)
17:31:42.662231 EAP packet (0) v1, len 6, Response (2), id 2, len 6
Type Nak (3) unknown (25),
17:31:42.684806 EAP packet (0) v2, len 6, Request (1), id 3, len 6
Type unknown (25)
17:31:42.685601 EAP packet (0) v1, len 233, Response (2), id 3, len 233
Type unknown (25)
after its start over and over again.
[jwidel@klapek ~]$ uname -a
Linux klapek 3.8.4-1-ARCH #1 SMP PREEMPT Wed Mar 20 22:10:25 CET 2013 x86_64 GNU/Linux04:00.0 Network controller: Atheros Communications Inc. AR9485 Wireless Network Adapter (rev 01)
Subsystem: Lenovo Device 3218
Flags: bus master, fast devsel, latency 0, IRQ 18
Memory at f3900000 (64-bit, non-prefetchable) [size=512K]
Expansion ROM at cfa00000 [disabled] [size=64K]
Capabilities: [40] Power Management version 2
Capabilities: [50] MSI: Enable- Count=1/4 Maskable+ 64bit+
Capabilities: [70] Express Endpoint, MSI 00
Capabilities: [100] Advanced Error Reporting
Capabilities: [140] Virtual Channel
Capabilities: [160] Device Serial Number 00-00-00-00-00-00-00-00
Kernel driver in use: ath9k
I check this configuration on another laptop (Broadcom BCM43xx on brcmsmac module) and everything works great.
Here is a debug output from Broadcom BCM43xx chipset.
http://pastebin.com/j0Y2bTvw
The difference is after SSL session. On 299 line ath9k get "EAPOL: SUPP_BE entering state TIMEOUT" where on BMC chipset on 303 line get "RX EAPOL (...)". I check on radius server, and the packets are sending back.
I checked on LEAP security (without SSL), and everything pass well.
Any thoughts? I don't know how debug better this issue.
UPDATE:
On linux-lts (3.0.70-1-lts) everything is OK
http://pastebin.com/PcWMeM7Q
Last edited by jwidel (2013-03-26 12:55:01)
Offline
Pages: 1