You are not logged in.
I'm using ndiswrapper with wpa supplicant support, with ndiswrapper is all ok.
wg311v2 : driver installed
device (104C:9066) presentwlan0 IEEE 802.11g ESSID:off/any
Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated
Bit Rate:54 Mb/s Tx-Power:10 dBm Sensitivity=0/3
RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality:0 Signal level:0 Noise level:0
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0A strange thing or not maybe, is that i cannot modify wlan0 parameters, for example if i use:
iwconfig wlan0 essid "WCB"The ESSID parameter remains:off/any. Maybe is a limititaion of the wrapper, am i wrong ?
when i launch wpa_supplicant with this parameters:
wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_support.confUsing this configuration:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=1
fast_reauth=1
network={
ssid="WCB"
key_mgmt=WPA-PSK
proto=WPA
pairwise=TKIP
group=TKIP
psk="XXXXXX"
priority=9
}i got this output:
ioctl[SIOCSIWPMKSA]: Invalid argument
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Trying to associate with XX:XX:XX:XX:XX:XX (SSID='WCB' freq=2452 MHz)
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Trying to associate with XX:XX:XX:XX:XX:XX (SSID='WCB' freq=2452 MHz)
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Associated with XX:XX:XX:XX:XX:XX
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: Invalid argument
CTRL-EVENT-TERMINATING - signal 2 receivedi don't understand this error... ![]()
Last edited by marcs (2008-04-23 21:30:19)
Offline
I've used some debugging output and i descovered this message:
wpa: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)Maybe a problem with the key ? or with the transmission of the key ?
This message compare every time that wpa_supplicant is "handshaking" with the router.
thanks for your attention.
Offline
Thanks for your reply. I don't get it what exactly network manager is, i'm not using it, i don't have install it, i'll try to install it and see if something change.
Yeah i got ndiswrapper installed using the pacman procedure and i launch the module at boot but i launch the connection manually, i got it to work only two times in a week, i don't know how or why, i've did always the same procedure.
i've read that with the new version of ndiswrappper using the wext driver is raccomended, and -Dndiswrapper is for older ndiswrapper versions.
using -Dndiswrapper i got
ioctl[SIOCSIWPMKSA]: Invalid argument
Trying to associate with SSID 'WCB'
Association request to the driver failed
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with SSID 'WCB'
Association request to the driver failed
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with SSID 'WCB'
Association request to the driver failed
CTRL-EVENT-TERMINATING - signal 2 received
Failed to disable WPA in the driver.Offline
Ok, maybe i'm starting to understanding something more:
The problem is on the 4 way handshake procedure:
1-Card -> Router
2-Router -> Card
3-Card -> Router
4-Router -> Card
The fourth EAPOL key from router to card is zero, i don't know why, but is unvalid. And the procedure restart again, i've done some scanning also with wireshark.
In this week i got the wifi connected only two times, the time that worked i've saved a log:
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:85:12:d8 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): b1 09 fd 52 6a bb 4c 81 68 c9 d0 df 29 40 61 95 f2 6a 3a ea ea fc 26 27 93 cd 41 68 5d fd 74 96
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 05 3b b1 09 fd 52 6a bb 4c 81 68 c9 d0 df 29 40 61 95 f2 6a 3a ea ea fc 26 27 93 cd 41 68 5d fd 74 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de bf 54 43 9b 8c 9e 26 09 dd 49 a3 9c b9 d4 f0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:1b:11:85:12:d8
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 05 3c 98 f1 51 a8 f2 e6 07 b1 2b ce 7c 10 15 ac a6 06 87 f8 ff 94 ad 5c 91 34 89 51 e3 bc ce 8b 0c 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 fb 43 75 84 bc e5 82 d6 d0 3a b5 a0 31 07 32 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 05 3c
key_nonce - hexdump(len=32): 98 f1 51 a8 f2 e6 07 b1 2b ce 7c 10 15 ac a6 06 87 f8 ff 94 ad 5c 91 34 89 51 e3 bc ce 8b 0c 72
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): f8 fb 43 75 84 bc e5 82 d6 d0 3a b5 a0 31 07 32
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 05 3c 98 f1 51 a8 f2 e6 07 b1 2b ce 7c 10 15 ac a6 06 87 f8 ff 94 ad 5c 91 34 89 51 e3 bc ce 8b 0c 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 fb 43 75 84 bc e5 82 d6 d0 3a b5 a0 31 07 32 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:1b:11:85:12:d8 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 05 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 56 9f fa 6a c7 53 7c 4c 4e fc 18 e0 5b 61 7b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:1b:11:85:12:d8
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 05 3d 8b 73 1e 43 43 dd 77 ff e6 45 bf 93 4e 43 a8 19 e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 97 e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 99 59 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8a aa 76 78 3e e6 62 9e 67 68 16 84 b0 f3 0e fc 00 20 a7 d3 c7 74 63 ce d2 1d df 6e e8 2d 40 25 bb ea 2c 54 18 dd f2 e0 74 30 7e 0b 10 38 11 a6 13 28
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 05 3d
key_nonce - hexdump(len=32): 8b 73 1e 43 43 dd 77 ff e6 45 bf 93 4e 43 a8 19 e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 97
key_iv - hexdump(len=16): e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 99
key_rsc - hexdump(len=8): 59 4b 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 8a aa 76 78 3e e6 62 9e 67 68 16 84 b0 f3 0e fc
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 05 3d 8b 73 1e 43 43 dd 77 ff e6 45 bf 93 4e 43 a8 19 e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 97 e1 91 be 6b 21 c9 d6 a9 13 f4 8d cc 54 f8 93 99 59 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8a aa 76 78 3e e6 62 9e 67 68 16 84 b0 f3 0e fc 00 20 a7 d3 c7 74 63 ce d2 1d df 6e e8 2d 40 25 bb ea 2c 54 18 dd f2 e0 74 30 7e 0b 10 38 11 a6 13 28
WPA: RX message 1 of Group Key Handshake from 00:1b:11:85:12:d8 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 59 4b 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 05 3d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 b7 09 a3 c6 24 5a 75 9f 9c d6 3c 71 ed aa d4 00 00
WPA: Key negotiation completed with 00:1b:11:85:12:d8 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 00:1b:11:85:12:d8 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:1b:11:85:12:d8 completed (auth) [id=0 id_str=]Apart this two incredible exceptions, i got always this message just after the group_handshake:
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)Hope i find something else soon...
Offline