Package: wpasupplicant Version: 0.6.0-4 Severity: normal
I have a a lot of difficulties when I want to use wireless network, they seem to work only 1 time out of 10. It was a lot better a month ago. I think I have isolated my problem to a segfault in wpa_suplicant, I will attach a log of the segfault. I have tried to get a backtrace with gdb, but the binary is stripped so it might not be of much use: Program received signal SIGSEGV, Segmentation fault. 0xb7e06954 in ?? () from /usr/lib/i686/cmov/libcrypto.so.0.9.8 (gdb) bt #0 0xb7e06954 in ?? () from /usr/lib/i686/cmov/libcrypto.so.0.9.8 #1 0xb7e0751b in AES_decrypt () from /usr/lib/i686/cmov/libcrypto.so.0.9.8 #2 0xbfcfd28c in ?? () #3 0x00000001 in ?? () #4 0x00000000 in ?? () (gdb) If you want me to rebuild the package with debug symbols or do something else in order to pinpoint the bug just ask. Thanks for the package, Kim Hansen -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (1050, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/2 CPU cores) Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages wpasupplicant depends on: ii adduser 3.105 add and remove users and groups ii libc6 2.6.1-6 GNU C Library: Shared libraries ii libdbus-1-3 1.1.1-3 simple interprocess messaging syst ii libncurses5 5.6+20071013-1 Shared libraries for terminal hand ii libreadline5 5.2-3 GNU readline and history libraries ii libssl0.9.8 0.9.8g-2 SSL shared libraries ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip Versions of packages wpasupplicant recommends: ii dhcp3-client 3.0.6.dfsg-1 DHCP client -- no debconf information
raph:/etc/wpa_supplicant# wpa_supplicant -d -Dwext -iwlan9 -c wpa_supplicant.conf-debug Initializing interface 'wlan9' conf 'wpa_supplicant.conf-debug' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_supplicant.conf-debug' -> '/etc/wpa_supplicant/wpa_supplicant.conf-debug' Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf-debug' ctrl_interface='/var/run/wpa_supplicant' Priority group 0 id=0 ssid='i9.dk' Initializing interface (2) 'wlan9' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:19:d2:16:1f:20 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec Using existing control interface directory. ctrl_iface bind(PF_UNIX) failed: Address already in use ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlan9' Added interface wlan9 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b06 len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 269 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:13:10:83:c8:9c ssid='i9.dk' wpa_ie_len=30 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:13:10:83:c8:9c ssid='i9.dk' Try to find non-WPA AP Trying to associate with 00:13:10:83:c8:9c (SSID='i9.dk' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:13:10:83:c8:9c into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b1a len=13 Authentication with 00:00:00:00:00:00 timed out. Added BSSID 00:00:00:00:00:00 into blacklist No keys have been configured - skip key clearing State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan timeout - try to get results Received 966 bytes of scan results (4 BSSes) Scan results: 4 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:13:10:83:c8:9c ssid='i9.dk' wpa_ie_len=30 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:13:10:83:c8:9c ssid='i9.dk' Try to find non-WPA AP Trying to associate with 00:13:10:83:c8:9c (SSID='i9.dk' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) Wireless event: cmd=0x8b1a len=13 RX EAPOL from 00:13:10:83:c8:9c Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): 63 6e 8a 5e 50 cc c5 8e 5c 11 13 58 91 2a a0 4a ec 47 bd 90 ae 25 de 75 49 2c 81 b4 a9 ad 6c 26 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATING -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:13:10:83:c8:9c (ver=2) WPA: Renewed SNonce - hexdump(len=32): 8c 01 bd f3 0a 29 9f c5 b2 d1 32 1b e5 33 c4 da b4 06 52 83 b9 ef c0 a6 07 6f 42 48 d3 ab df ed WPA: PTK derivation - A1=00:19:d2:16:1f:20 A2=00:00:00:00:00:00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: Use BSSID (00:13:10:83:c8:9c) as the destination for EAPOL-Key RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan9' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:13:10:83:c8:9c State: 4WAY_HANDSHAKE -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:13:10:83:c8:9c No keys have been configured - skip key clearing Associated with 00:13:10:83:c8:9c WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:13:10:83:c8:9c Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 63 6e 8a 5e 50 cc c5 8e 5c 11 13 58 91 2a a0 4a ec 47 bd 90 ae 25 de 75 49 2c 81 b4 a9 ad 6c 26 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:13:10:83:c8:9c (ver=2) WPA: Renewed SNonce - hexdump(len=32): 5b 50 d7 16 1c 84 f9 93 ae b6 f7 d4 a4 f5 8d 8e b6 5d 23 0c c0 73 f5 f0 9f 89 fe f3 1d c5 96 27 WPA: PTK derivation - A1=00:19:d2:16:1f:20 A2=00:13:10:83:c8:9c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:13:10:83:c8:9c IEEE 802.1X RX: version=1 type=3 length=125 EAPOL-Key type=254 key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=16 key_data_length=30 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 63 6e 8a 5e 50 cc c5 8e 5c 11 13 58 91 2a a0 4a ec 47 bd 90 ae 25 de 75 49 2c 81 b4 a9 ad 6c 26 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ff d0 00 1b 4a 25 19 f9 11 3c ad ca 54 fd f0 e0 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:10:83:c8:9c (ver=2) WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:13:10:83:c8:9c IEEE 802.1X RX: version=1 type=3 length=135 EAPOL-Key type=254 key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=40 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 63 6e 8a 5e 50 cc c5 8e 5c 11 13 58 91 2a a0 4a ec 47 bd 90 ae 25 de 75 49 2c 81 b4 a9 ad 6c 25 key_iv - hexdump(len=16): ec 47 bd 90 ae 25 de 75 49 2c 81 b4 a9 ad 6c 27 key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): f9 d2 69 d1 4c 64 17 f0 7c b3 7d a9 6e 48 2f 39 WPA: RX message 1 of Group Key Handshake from 00:13:10:83:c8:9c (ver=2) Segmentation fault raph:/etc/wpa_supplicant#