#633: WPA-PSK broken because of r1553 ?
----------------------------------------+-----------------------------------
Reporter: [EMAIL PROTECTED] | Owner: dyqith
Type: defect | Status: new
Priority: major | Milestone: version 0.9.x -
progressive release candidate phase
Component: madwifi: 802.11 stack | Version: trunk
Resolution: | Keywords:
Patch_attached: 0 |
----------------------------------------+-----------------------------------
Comment (by [EMAIL PROTECTED]):
Ok, I've tried svn 1575 with hostapd 0.4.9/0.5.3 and it still doesn't work
for me. Something I didn't notice before (sorry) is the output of the
wlanconfig 'list' command.
{{{
ADDR AID CHAN RATE RSSI DBM IDLE TXSEQ RXSEQ CAPS ACAPS
ERP STATE MODE
00:20:4a:82:52:5e 1 1 11M 43 -52 30 2 1648 EP
0 20 Normal
00:90:96:a3:cf:b5 2 1 54M 50 -45 0 6 1008 EPSs
0 25 Normal WPA
}}}
which shows the wi-port associated, but not using WPA. The connected
station with 'WPA' is my laptop using the ndiswrapper and wpa_supplicant
(0.5.3). The console also prints this occasionally.
{{{
[ath008:00:20:4a:82:52:5e] discard data frame, unauthorized port: ether
type 0x608 len 42
}}}
I also have an iPAQ rx4700, which I couldn't get working with with 1575
and hostapd (0.4.9/0.5.3) either. The hostapd (0.5.3) debug logs show
{{{
Aug 5 06:33:37 an0001ap01 daemon.info hostapd: ath008: STA
00:11:85:c4:a9:9b IEEE 802.11: associated
Aug 5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: event 1 notification
Aug 5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: start authentication
Aug 5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b IEEE 802.1X: unauthorizing port
Aug 5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
Aug 5 06:33:38 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
Aug 5 06:33:38 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
Aug 5 06:33:39 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
Aug 5 06:33:39 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
Aug 5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
Aug 5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
Aug 5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
00:11:85:c4:a9:9b IEEE 802.1X: unauthorizing port
Aug 5 06:33:40 an0001ap01 daemon.info hostapd: ath008: STA
00:11:85:c4:a9:9b IEEE 802.11: deauthenticated due to local deauth request
Aug 5 06:33:40 an0001ap01 daemon.info hostapd: ath008: STA
00:11:85:c4:a9:9b IEEE 802.11: disassociated
}}}
I also am pretty sure I never got this iPAQ to work with the Cisco AP
using WPA-PSK, so never really tried it with the madwifi + hostapd combo
before. I will double check the iPAQ connecting to the Cisco AP on
Wednesday.
--
Ticket URL: <http://madwifi.org/ticket/633>
MadWifi <http://madwifi.org/>
Multiband Atheros Driver for Wireless Fidelity