Package: wpasupplicant
Version: 0.3.8-1
Severity: important

Hi,

I tried to get wpasupplicant running with my internal centrino wlan
using ipw2100 driver. And it somehow looses the connection right after
authentication took place.

My config is:
,----
| ctrl_interface=/var/run/wpa_supplicant
| ctrl_interface_group=0
| eapol_version=1
| ap_scan=1
| network={
|       ssid="pakulat"
|       scan_ssid=1
|       proto=WPA
|       key_mgmt=WPA-PSK
|       psk="abcdefghijkl" 
|       priority=4
| }
`----

Using wpasupplicant -d -w -ieth2 -c/etc/wpa_supplicant.conf -Dipw
gives:

,----
| ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported
| Initializing interface 'eth2' conf '/etc/wpa_supplicant.conf' driver 'ipw'
| Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
| Reading configuration file '/etc/wpa_supplicant.conf'
| ctrl_interface='/var/run/wpa_supplicant'
| ctrl_interface_group=0
| eapol_version=1
| ap_scan=1
| Priority group 0
|    id=0 ssid='pakulat'
| Initializing interface (2) 'eth2'
| EAPOL: SUPP_PAE entering state DISCONNECTED
| EAPOL: KEY_RX entering state NO_KEY_RECEIVE
| EAPOL: SUPP_BE entering state INITIALIZE
| EAP: EAP entering state DISABLED
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| wpa_driver_ipw_init is called
| Own MAC address: 00:04:23:7f:cf:f4
| wpa_driver_ipw_set_wpa: enabled=1
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_countermeasures: enabled=0
| wpa_driver_ipw_set_drop_unencrypted: enabled=1
| Setting scan request: 0 sec 100000 usec
| Starting AP scan (specific SSID)
| Scan SSID - hexdump_ascii(len=7):
|      70 61 6b 75 6c 61 74                              pakulat         
| Failed to initiate AP scan.
| Setting scan request: 10 sec 0 usec
| Wireless event: cmd=0x8b06 len=8
| Scan timeout - try to get results
| Received 275 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
| Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=0 MHz)
| Cancelling scan request
| Automatic auth_alg selection: 0x1
| wpa_driver_ipw_set_auth_alg: auth_alg=0x1
| WPA: using IEEE 802.11i/D3.0
| WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2
| WPA: using GTK WEP104
| WPA: using PTK TKIP
| WPA: using KEY_MGMT WPA-PSK
| WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 
00 50 f2 02 01 00 00 50 f2 02
| No keys have been configured - skip key clearing
| wpa_driver_ipw_set_drop_unencrypted: enabled=1
| Setting authentication timeout: 5 sec 0 usec
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - EAP fail=0
| EAPOL: External notification - portControl=Auto
| Wireless event: cmd=0x8b1a len=20
| Wireless event: cmd=0x8b15 len=20
| Wireless event: new AP: 00:60:b3:99:15:70
| Association event - clear replay counter
| Associated to a new BSS: BSSID=00:60:b3:99:15:70
| No keys have been configured - skip key clearing
| Associated with 00:60:b3:99:15:70
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - portEnabled=1
| EAPOL: SUPP_PAE entering state CONNECTING
| EAPOL: txStart
| WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
| EAPOL: SUPP_BE entering state IDLE
| EAP: EAP entering state INITIALIZE
| EAP: EAP entering state IDLE
| Setting authentication timeout: 10 sec 0 usec
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
| Wireless event: cmd=0x8b1a len=20
| Wireless event: cmd=0x8b2a len=12
| Wireless event: cmd=0x8b06 len=8
| RX EAPOL from 00:60:b3:99:15:70
| Setting authentication timeout: 10 sec 0 usec
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=95
|   EAPOL-Key type=254
| WPA: RX message 1 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
05 01 00 00 50 f2 02 01 00 00 50 f2 02
| WPA: Renewed SNonce - hexdump(len=32): 4b e4 6a 57 d8 02 1e 93 7c de a9 29 9d 
ff 8f 00 0c 87 ec 75 a1 0a 11 33 cb 28 91 9b f0 69 ae 3a
| WPA: PMK - hexdump(len=32): [REMOVED]
| WPA: PTK - hexdump(len=64): [REMOVED]
| WPA: EAPOL-Key MIC - hexdump(len=16): 4a 00 03 bc d7 ec e7 78 18 5f 75 2d 4f 
0e 54 ea
| WPA: Sending EAPOL-Key 2/4
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=121
|   EAPOL-Key type=254
| WPA: RX message 3 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 
00 50 f2 02 01 00 00 50 f2 02 00 00
| WPA: Sending EAPOL-Key 4/4
| WPA: Installing PTK to the driver.
| WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
| wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=108
|   EAPOL-Key type=254
| WPA: RX message 1 of Group Key Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: Group Key - hexdump(len=13): [REMOVED]
| WPA: Installing GTK to the driver (keyidx=0 tx=0).
| WPA: RSC - hexdump(len=0):
| wpa_driver_ipw_set_key: alg=WEP key_idx=0 set_tx=0 seq_len=0 key_len=13
| WPA: Sending EAPOL-Key 2/2
| WPA: Key negotiation completed with 00:60:b3:99:15:70 [PTK=TKIP GTK=WEP-104]
| Cancelling authentication timeout
| EAPOL: External notification - portValid=1
| EAPOL: External notification - EAP success=1
| EAPOL: SUPP_PAE entering state AUTHENTICATING
| EAPOL: SUPP_BE entering state SUCCESS
| EAPOL: SUPP_PAE entering state AUTHENTICATED
| EAPOL: SUPP_BE entering state IDLE
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
| Wireless event: cmd=0x8b15 len=20
| Wireless event: new AP: 00:00:00:00:00:00
| Setting scan request: 0 sec 100000 usec
| Added BSSID 00:60:b3:99:15:70 into blacklist
| EAPOL: External notification - portEnabled=0
| EAPOL: SUPP_PAE entering state DISCONNECTED
| EAPOL: SUPP_BE entering state INITIALIZE
| EAP: EAP entering state DISABLED
| EAPOL: External notification - portValid=0
| EAPOL: External notification - EAP success=0
| Disconnect event - remove keys
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
| wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
| Starting AP scan (broadcast SSID)
| Scan timeout - try to get results
| Received 276 bytes of scan results (1 BSSes)
| Scan results: 1
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    skip - blacklisted
| No APs found - clear blacklist and try again
| Removed BSSID 00:60:b3:99:15:70 from blacklist (clear)
| Selecting BSS from priority group 0
| 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0
|    selected
| Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=0 MHz)
| Cancelling scan request
| Automatic auth_alg selection: 0x1
| wpa_driver_ipw_set_auth_alg: auth_alg=0x1
| WPA: using IEEE 802.11i/D3.0
| WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2
| WPA: using GTK WEP104
| WPA: using PTK TKIP
| WPA: using KEY_MGMT WPA-PSK
| WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 
00 50 f2 02 01 00 00 50 f2 02
| No keys have been configured - skip key clearing
| wpa_driver_ipw_set_drop_unencrypted: enabled=1
| Setting authentication timeout: 5 sec 0 usec
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - EAP fail=0
| EAPOL: External notification - portControl=Auto
| Wireless event: cmd=0x8b1a len=20
| Wireless event: cmd=0x8b15 len=20
| Wireless event: new AP: 00:60:b3:99:15:70
| Association event - clear replay counter
| Associated to a new BSS: BSSID=00:60:b3:99:15:70
| No keys have been configured - skip key clearing
| Associated with 00:60:b3:99:15:70
| EAPOL: External notification - portEnabled=0
| EAPOL: External notification - portValid=0
| EAPOL: External notification - EAP success=0
| EAPOL: External notification - portEnabled=1
| EAPOL: SUPP_PAE entering state CONNECTING
| EAPOL: txStart
| WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
| EAPOL: SUPP_BE entering state IDLE
| EAP: EAP entering state INITIALIZE
| EAP: EAP entering state IDLE
| Setting authentication timeout: 10 sec 0 usec
| RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
| RX EAPOL from 00:60:b3:99:15:70
| Setting authentication timeout: 10 sec 0 usec
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=95
|   EAPOL-Key ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported
| type=254
| WPA: RX message 1 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
05 01 00 00 50 f2 02 01 00 00 50 f2 02
| WPA: Renewed SNonce - hexdump(len=32): dd a1 0b ae f3 a2 02 cf 31 4a 34 5a 52 
e1 f6 2e 52 e2 78 68 d1 f1 23 0a c5 f9 4f 17 32 bc 6c 71
| WPA: PMK - hexdump(len=32): [REMOVED]
| WPA: PTK - hexdump(len=64): [REMOVED]
| WPA: EAPOL-Key MIC - hexdump(len=16): 96 fc 29 5f bd 97 93 dd 2a cf e8 c2 02 
55 f9 f7
| WPA: Sending EAPOL-Key 2/4
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=121
|   EAPOL-Key type=254
| WPA: RX message 3 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 
00 50 f2 02 01 00 00 50 f2 02 00 00
| WPA: Sending EAPOL-Key 4/4
| WPA: Installing PTK to the driver.
| WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
| wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
| RX EAPOL from 00:60:b3:99:15:70
| EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
| IEEE 802.1X RX: version=1 type=3 length=108
|   EAPOL-Key type=254
| WPA: RX message 1 of Group Key Handshake from 00:60:b3:99:15:70 (ver=1)
| WPA: Group Key - hexdump(len=13): [REMOVED]
| WPA: Installing GTK to the driver (keyidx=0 tx=0).
| WPA: RSC - hexdump(len=0):
| wpa_driver_ipw_set_key: alg=WEP key_idx=0 set_tx=0 seq_len=0 key_len=13
| WPA: Sending EAPOL-Key 2/2
| WPA: Key negotiation completed with 00:60:b3:99:15:70 [PTK=TKIP GTK=WEP-104]
| Cancelling authentication timeout
| EAPOL: External notification - portValid=1
| EAPOL: External notification - EAP success=1
| EAPOL: SUPP_PAE entering state AUTHENTICATING
| EAPOL: SUPP_BE entering state SUCCESS
| EAPOL: SUPP_PAE entering state AUTHENTICATED
| EAPOL: SUPP_BE entering state IDLE
`----

Andreas

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'experimental'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.11.7-nocherry
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages wpasupplicant depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to