LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking
User Name
Password
Linux - Wireless Networking This forum is for the discussion of wireless networking in Linux.

Notices


Reply
  Search this Thread
Old 09-23-2008, 11:48 AM   #1
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Rep: Reputation: 17
4-Way Handshake Fails


Last week I successfully (or so I thought) installed wpa_supplicant onto my Dell Inspiron 9300, running Slackware 10.1 (w/ custom 2.6.21.5 kernel).
I'm using the ipw2200 driver from the kernel source, and it works beautifully on unsecure or WEP access points- even when using wpa_supplicant.

But now I'm on 'vacation', staying with family friends, and their wireless network is secured using WPA (which I anticipated, hence why I installed wpa_supplicant last week). Nothing abnormal, here is the output from the iwlist scan (note that I have replaced the SSID with <removed> myself:

Code:
eth0      Scan completed :
          Cell 01 - Address: 00:1B:11:4B:4F:45
                    ESSID: <removed>
                    Protocol:IEEE 802.11bg
                    Mode:Master
                    Channel:6
                    Encryption key:on
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 9 Mb/s; 11 Mb/s
                              6 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                              48 Mb/s; 54 Mb/s
                    Quality=95/100  Signal level=-19 dBm
                    IE: WPA Version 1
                        Group Cipher : TKIP
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : PSK
                    Extra: Last beacon: 85ms ago
I should note that I just today upgraded my wireless tools to the latest version (29) as I was previously using something out-of-date (like v.17 or something).

My wpa_supplicant.conf file is as such:
Code:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=2
ap_scan=2
update_config=1

network={
        ssid="<removed>"
        psk=79c46c071a14b091613c7360d766dc08658b94cb4e064b35bace44e8a875f4bb
        proto=WPA RSN
        key_mgmt=WPA-PSK
        pairwise=TKIP
        group=TKIP
}
So I run wpa_supplicant using the following command:

Code:
wpa_supplicant -ieth0 -c /etc/wpa_supplicant.conf -B
... then I go into wpa_cli and check the 'status', which returns, initially:

Code:
bssid=00:1b:11:4b:4f:45
ssid=<removed>
id=2
pairwise_cipher=TKIP
group_cipher=TKIP
key_mgmt=WPA2-PSK
wpa_state=4WAY_HANDSHAKE
... but after a few seconds, I start getting the following output:

Code:
<2>WPA: 4-Way Handshake failed - pre-shared key may be incorrect
<2>CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
<2>CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
<2>Trying to associate with SSID '<removed>'
<2>Associated with 00:1b:11:4b:4f:45
... it reassociates and tried to perform the authentication again, but ultimately fails. I have a Wireless Information widget in KDE which shows me my signal strength, and I see that it does connect and have a strong signal, but it drops-out completely, about the same time as the above output is displayed in the terminal, and retries to associate. But this process just continues forever.

As far as I know, I'm using ipw2200 firmware v3.0, though it looks like I *could* have multiple versions on my system- notably v2.4, but I want to rule out a problem with wpa_supplicant itself before diving into the firmware. Perhaps that isn't the best approach. :/

I *thought* that the passphrase could be incorrect, as the people we're staying with aren't entirely computer savvy and don't have their SSID written down. But I did try it at another friends' place (which was using WPA2) and who *did* know his SSID passphrase, and I had the same results- it would associate, but drop-off after a few seconds.

I have taken the debug output when running wpa_supplicant itself, but I'm not quite sure what to make of it. If it would help, let me know and I can post it to this thread.

Any thoughts as to whether I'm doing something wrong or what else I might be able to try to get this working?

Much thanks!!

- skubik.
 
Old 09-23-2008, 02:32 PM   #2
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 420Reputation: 420Reputation: 420Reputation: 420Reputation: 420
Quote:
wpa_supplicant -ieth0 -c /etc/wpa_supplicant.conf -B
If that is correct, you're missing the driver declaration. Try this:

wpa_supplicant -ieth0 -c /etc/wpa_supplicant.conf -B -Dwext
 
Old 09-23-2008, 09:52 PM   #3
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Original Poster
Rep: Reputation: 17
Quote:
Originally Posted by Hangdog42 View Post
If that is correct, you're missing the driver declaration. Try this:

wpa_supplicant -ieth0 -c /etc/wpa_supplicant.conf -B -Dwext
Tried this- still has the same problem. I recall trying this earlier as well anyways, yielding the same result, I dropped the driver from the command.
 
Old 09-24-2008, 07:37 AM   #4
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 420Reputation: 420Reputation: 420Reputation: 420Reputation: 420
I did a bit of googling and there seem to be no real good answers out there. However, there are some things to try:

- Use the -dd flag to make the error reporting more verbose. That may give some additional clues

- Is your psk value the hex value or the ascii value for your router? I believe that wpa_supplicant is expecting the ascii key value.

- This error seems to be associated with version 0.5.2 of wpa_supplicant. If you're running that, you might try upgrading.

- If you've set your router to not broadcast the SSID, you might try turning it on.

- Try compiling wpa_supplicant with only the options you are absolutely 100% sure you need. In particular, enabling EAPOL may be an issue.
 
Old 09-24-2008, 05:57 PM   #5
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Original Poster
Rep: Reputation: 17
Quote:
Originally Posted by Hangdog42 View Post
I did a bit of googling and there seem to be no real good answers out there. However, there are some things to try:

- Use the -dd flag to make the error reporting more verbose. That may give some additional clues

- Is your psk value the hex value or the ascii value for your router? I believe that wpa_supplicant is expecting the ascii key value.

- This error seems to be associated with version 0.5.2 of wpa_supplicant. If you're running that, you might try upgrading.

- If you've set your router to not broadcast the SSID, you might try turning it on.

- Try compiling wpa_supplicant with only the options you are absolutely 100% sure you need. In particular, enabling EAPOL may be an issue.
- I have a dump of -dd output- I will post it later assuming a few other things don't work. (and because I'm about to run out the door- again- but one other point you make may be worth trying...)

Did you see the PSK value in my original post? It's the output produced by running my SSID and the PSK through wpa_passphrase. Perhaps I shouldn't be using this? I was previously using the plaintext passphrase instead, but it was producing the same results as well.

Nope- my version of wpa_supplicant is 0.5.10.

The router *is* broadcasting the SSID- though it isn't at home (which is WEP anyways- and works after adding the ap_scan=2 line to my /etc/wpa_supplicant.conf file).

Enabling EAPOL, however, is something that caught my attention. It *is* enabled in my .config when I built wpa_supplicant. Perhaps I should try disabling it and rebuilding. But what is that limited to? ONLY the line called CONFIG_IEEE8021X_EAPOL=y? or ANY line containing EAP?
Again, I don't have time to try this right now, but I'll try again this evening and post the results- along with my -dd output, unless the EAPOL thing works.
 
Old 09-25-2008, 09:39 AM   #6
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Original Poster
Rep: Reputation: 17
Update

So I rebuilt wpa_supplicant after removing EAPOL and pretty much anything related to EAP from the .config file prior to building- but I'm encountering the same problem.

So I dumped the output of -dd to a text file to post here in hopes that it will shed some light on the situation and might be wrong. Note that I have snipped some of the other network block output from this output, as well as changed my SSID to <removed>:

Code:
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=2
ap_scan=2
update_config=1
Line: 22 - start of a new network block
ssid - hexdump_ascii(len=15):
     43 61 72 70 69 6e 69 20 4e 65 74 77 6f 72 6b      <removed> 
PSK (ASCII passphrase) - hexdump_ascii(len=21): [REMOVED]
proto: 0x3
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=2 ssid='<removed>'
Initializing interface (2) 'eth0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:f0:29:7a:84
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth0
RTM_NEWLINK: operstate=0 ifi_flags=0x1022 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID '<removed>'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 261 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1b:11:4b:4f:45
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1b:11:4b:4f:45
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:1b:11:4b:4f:45
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RX EAPOL from 00:1b:11:4b:4f:45
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:4b:4f:45 (ver=1)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 0b f8 b4 2d f4 6c c1 27 a0 50 12 c4 36 fd b0 51 99 ad 4f eb b9 31 e1 dd 6d 4a 82 7b 52 26 74 fd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 09 00 00 00 00 00 00 00 00 00 01 0b f8 b4 2d f4 6c c1 27 a0 50 12 c4 36 fd b0 51 99 ad 4f eb b9 31 e1 dd 6d 4a 82 7b 52 26 74 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 2e d2 7b e3 aa ce eb 5e 3f a1 42 a2 1b c3 97 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1b:11:4b:4f:45
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:4b:4f:45 (ver=1)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 09 00 00 00 00 00 00 00 00 00 02 0b f8 b4 2d f4 6c c1 27 a0 50 12 c4 36 fd b0 51 99 ad 4f eb b9 31 e1 dd 6d 4a 82 7b 52 26 74 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 aa 4a 64 a7 15 39 86 63 df 1b 1b 4e 71 68 9e 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1b:11:4b:4f:45
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:4b:4f:45 (ver=1)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 09 00 00 00 00 00 00 00 00 00 03 0b f8 b4 2d f4 6c c1 27 a0 50 12 c4 36 fd b0 51 99 ad 4f eb b9 31 e1 dd 6d 4a 82 7b 52 26 74 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 eb 73 68 49 9a ea 4a ce 49 e0 93 9f 94 6f 1d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
RX EAPOL from 00:1b:11:4b:4f:45
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 4f 6c b0 53 3e d6 2e 3d 88 96 2b 1f ab d7 be 9a 2c db 03 ed 4f 6a 7f 63 3e 45 a3 f6 69 ee ac 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:4b:4f:45 (ver=1)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 09 00 00 00 00 00 00 00 00 00 04 0b f8 b4 2d f4 6c c1 27 a0 50 12 c4 36 fd b0 51 99 ad 4f eb b9 31 e1 dd 6d 4a 82 7b 52 26 74 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6b bd 4e 3e c2 8e aa 25 db 16 37 76 62 a0 e0 90 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:1b:11:4b:4f:45 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
State: DISCONNECTED -> SCANNING
wpa_supplicant_scan: Reached end of scan list - go back to beginning
Setting scan request: 0 sec 0 usec
Trying to associate with SSID '<removed>'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x1023 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 261 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK: operstate=0 ifi_flags=0x11023 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:1b:11:4b:4f:45
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:1b:11:4b:4f:45
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:1b:11:4b:4f:45
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 00:1b:11:4b:4f:45 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
I still see a lot of EAP & EAPOL references in this output. Perhaps I'm doing something wrong when building?

Any help is MUCH appreciated!

- skubik
 
Old 09-25-2008, 04:09 PM   #7
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 420Reputation: 420Reputation: 420Reputation: 420Reputation: 420
Here's an idea. Wpa_supplicant is included in later versions of Slackware, where it works just fine. You might grab the Slackbuild script and use that to compile on your system. I don't think there are any dependencies for wpa_supplicant, so it should go. At least that would eliminate any configuration/compilation issues. I think.


I also stumbled upon this thread, which while not your card, suggest that maybe there is a firmware issue behind this error. You might have a look in your log files and see if ipw2100 is complaining about anything. Since there are several firmware options, make sure you've got the right one.
 
Old 09-26-2008, 09:48 AM   #8
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Original Poster
Rep: Reputation: 17
Quote:
Originally Posted by Hangdog42 View Post
Here's an idea. Wpa_supplicant is included in later versions of Slackware, where it works just fine. You might grab the Slackbuild script and use that to compile on your system. I don't think there are any dependencies for wpa_supplicant, so it should go. At least that would eliminate any configuration/compilation issues. I think.


I also stumbled upon this thread, which while not your card, suggest that maybe there is a firmware issue behind this error. You might have a look in your log files and see if ipw2100 is complaining about anything. Since there are several firmware options, make sure you've got the right one.
Thank's for the suggestion. I wasn't aware that wpa_supplicant was packaged with later versions of Slack. I did download the package and install it- and made some adjustments to my wpa_supplicant.conf file as suggested in the .conf file included with the package- but now I'm getting this error when I attempt to run wpa_supplicant:

Code:
/usr/sbin/wpa_supplicant: symbol lookup error: /usr/sbin/wpa_supplicant: undefined symbol: SSL_CTX_set_info_callback

This just can't be easy can it?

I briefly looked at the thread you suggested, but I'll have to take a deeper look at it later. If could very well be a firmware problem- as I said, it looks like I found a few different versions floating around on my system, so perhaps it's using an older version when it shouldn't be.

Thanks!

- skubik.
 
Old 09-26-2008, 10:31 AM   #9
skubik
Member
 
Registered: May 2003
Location: A dark corner in Canada
Distribution: Slackware 13.37 / Slackware64 14.x
Posts: 130

Original Poster
Rep: Reputation: 17
I had a brief chance to play around with things a little more.
I removed all previous instances of the firmware, downloaded a fresh copy of ipw2200 v3.0's firmware, placed it into /lib/firmware, modprobed 'ipw2200', which loaded fine- and confirmed by finding the following in dmesg:
Code:
ieee80211: 802.11 data/management/control stack, git-1.1.13
ieee80211: Copyright (C) 2004-2005 Intel Corporation <jketreno@linux.intel.com>
ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.0kmq
ipw2200: Copyright(c) 2003-2006 Intel Corporation
ACPI: PCI Interrupt 0000:03:03.0[A] -> GSI 17 (level, low) -> IRQ 18
ipw2200: Detected Intel PRO/Wireless 2200BG Network Connection
ipw2200: Detected geography ZZM (11 802.11bg channels, 0 802.11a channels)
eth0: no IPv6 routers present
Tried the wpa_supplicant from the installed package: but still get the same error message as I posted above.

So I re-enabled the files I built from source (I simply renamed them so they wouldn't be used), ran wpa_supplicant, checked wpa_cli...

... same problem exists.

I can't believe how much of a headache this has become. I suppose it's entirely possible that the passphrase is incorrect. As I said in my original post, the friends I'm staying with aren't exactly 'computer savvy'- they *think* they know what the passphrase is, but they don't have it written down ANYWHERE, and their laptops won't give it up, and it's not available in plaintext (it's in a password box) on the router itself. I suppose I could have just changed the passphrase on the router myself, but if I didn't change it back to what they THOUGHT it was, then *their* computers would cease to work on the network as well. So I'm not sure what more to try besides waiting until I get home and can test it on my own network since everything else seems to be a dead end.

Any other suggestions are greatly appreciated.

Thanks,

- skubik.
 
Old 09-26-2008, 11:15 AM   #10
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 420Reputation: 420Reputation: 420Reputation: 420Reputation: 420
Quote:
I did download the package and install it- and made some adjustments to my wpa_supplicant.conf file as suggested in the .conf file included with the package- but now I'm getting this error when I attempt to run wpa_supplicant:
If you downloaded the pre-compiled package and installed that, I wouldn't be surprised if there were errors. There have been a lot of changes to Slackware since 10.1 so I wouldn't expect the package to work. However, if you download the source code and the Slackbuild script you should be able to build a package compiled against your system and I would be that the undefined symbol error would be gone. Those sorts of errors usually arise when there is a mismatch between a library the package was compiled against and those it finds on the existing system.

By the way, is there a reason you've stuck with 10.1? If wireless is a major part of what you need from this box, you might consider jumping to 12.1. Things have improved a lot and it is possible that some of what you're seeing is simply due to 10.1 not being real good with wireless.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
TCP handshake fails, SYN/ACK ignored by system. xnomad Linux - Networking 1 09-28-2011 11:10 AM
/dev/ptmx vs handshake gearloose Linux - Software 0 01-20-2008 02:28 PM
Iptables: track 3-way handshake? Peter_APIIT Linux - Security 1 07-21-2007 06:04 AM
is it possible to ignore TCP three way handshake? Thinking Programming 7 12-02-2005 04:20 AM
modem handshake!!! help!!!! novice_din Programming 1 02-11-2005 08:18 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking

All times are GMT -5. The time now is 05:24 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration