#633: WPA-PSK broken because of r1553 ?
----------------------------------------+-----------------------------------
      Reporter:  [EMAIL PROTECTED]       |       Owner:  dyqith                 
                            
          Type:  defect                 |      Status:  new                     
                           
      Priority:  major                  |   Milestone:  version 0.9.x - 
progressive release candidate phase
     Component:  madwifi: 802.11 stack  |     Version:  trunk                   
                           
    Resolution:                         |    Keywords:                          
                           
Patch_attached:  0                      |  
----------------------------------------+-----------------------------------
Comment (by [EMAIL PROTECTED]):

 Ok, I've tried svn 1575 with hostapd 0.4.9/0.5.3 and it still doesn't work
 for me.  Something I didn't notice before (sorry) is the output of the
 wlanconfig 'list' command.

 {{{
 ADDR               AID CHAN RATE RSSI  DBM IDLE  TXSEQ  RXSEQ CAPS ACAPS
 ERP    STATE     MODE
 00:20:4a:82:52:5e    1    1  11M   43  -52   30      2   1648 EP
 0       20   Normal
 00:90:96:a3:cf:b5    2    1  54M   50  -45    0      6   1008 EPSs
 0       25   Normal WPA
 }}}

 which shows the wi-port associated, but not using WPA.  The connected
 station with 'WPA' is my laptop using the ndiswrapper and wpa_supplicant
 (0.5.3). The console also prints this occasionally.
 {{{
 [ath008:00:20:4a:82:52:5e] discard data frame, unauthorized port: ether
 type 0x608 len 42
 }}}

 I also have an iPAQ rx4700, which I couldn't get working with with 1575
 and hostapd (0.4.9/0.5.3) either.  The hostapd (0.5.3) debug logs show
 {{{
 Aug  5 06:33:37 an0001ap01 daemon.info hostapd: ath008: STA
 00:11:85:c4:a9:9b IEEE 802.11: associated
 Aug  5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: event 1 notification
 Aug  5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: start authentication
 Aug  5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b IEEE 802.1X: unauthorizing port
 Aug  5 06:33:37 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
 Aug  5 06:33:38 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
 Aug  5 06:33:38 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
 Aug  5 06:33:39 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
 Aug  5 06:33:39 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
 Aug  5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: EAPOL-Key timeout
 Aug  5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b WPA: sending 1/4 msg of 4-Way Handshake
 Aug  5 06:33:40 an0001ap01 daemon.debug hostapd: ath008: STA
 00:11:85:c4:a9:9b IEEE 802.1X: unauthorizing port
 Aug  5 06:33:40 an0001ap01 daemon.info hostapd: ath008: STA
 00:11:85:c4:a9:9b IEEE 802.11: deauthenticated due to local deauth request
 Aug  5 06:33:40 an0001ap01 daemon.info hostapd: ath008: STA
 00:11:85:c4:a9:9b IEEE 802.11: disassociated
 }}}

 I also am pretty sure I never got this iPAQ to work with the Cisco AP
 using WPA-PSK, so never really tried it with the madwifi + hostapd combo
 before.  I will double check the iPAQ connecting to the Cisco AP on
 Wednesday.

-- 
Ticket URL: <http://madwifi.org/ticket/633>
MadWifi <http://madwifi.org/>
Multiband Atheros Driver for Wireless Fidelity

Reply via email to