Hello everyone,
I have a laptop with a BCM43XX chipset, which I'm trying to make it work using ndiswrapper. Until now I had Slackware 11.0 and I managed to make it work, even if sometimes several network restarts were required. Now I installed Slackware 13.0 and problems occur
First, I tried to use the b43-fwcutter method and to install firmware for b43. Everything was ok, the module was there, but connection keeps re-authenticate all the time. I tried there ndiswrapper with the windows drivers for Broadcom (method used succesfully on the other slack ver), but again the same problem.
Technical details follow:
Code:
ndiswrapper -l
bcmwl5 : driver installed
device (14E4:4311) present (alternate driver: ssb)
Code:
lspci -v | grep Broadcom
03:00.0 Network controller: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)
These are the messages wpa_supplicant throw:
Code:
wpa_supplicant -W -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
Trying to associate with SSID 'DAA'
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (auth) [id=0 id_str=]
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
... last message just keep repeated indefinitely ...
and now a more detailed look:
Code:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0'
eapol_version=1
ap_scan=2
fast_reauth=0
Line: 16 - start of a new network block
scan_ssid=1 (0x1)
ssid - hexdump_ascii(len=3):
44 41 41 DAA
proto: 0x2
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (ASCII passphrase) - hexdump_ascii(len=33): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='DAA'
Initializing interface (2) 'wlan0'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1c:26:50:d8:30
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 67 eb 08 96 3b 6c 54 60 8b 08 80 f3 c8 3b 03 b3
WPS: Build Beacon and Probe Response IEs
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Version
WPS: * Wi-Fi Protected Setup State (0)
WPS: * Response Type (2)
WPS: * UUID-E
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * Config Methods (0)
WPS: * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
ctrl_interface_group=0
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlan0'
Added interface wlan0
CTRL_IFACE - wlan0 - wait for monitor to attach
CTRL_IFACE monitor attached - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'DAA'
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c07 len=78
AssocReq IE wireless event - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0e:2e:b0:02:9d
Association info event
req_ies - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
resp_ies - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:0e:2e:b0:02:9d
No keys have been configured - skip key clearing
Select network based on association information
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:0e:2e:b0:02:9d
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: PMKID from Authenticator - hexdump(len=16): 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 49 4c 99 4d bd e9 5c 9b fd 20 fb 23 17 79 c5 61 24 84 d5 2c 3f d7 09 5a bb 14 70 b6 eb 90 fd 99
WPA: PTK derivation - A1=00:1c:26:50:d8:30 A2=00:0e:2e:b0:02:9d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 49 4c 99 4d bd e9 5c 9b fd 20 fb 23 17 79 c5 61 24 84 d5 2c 3f d7 09 5a bb 14 70 b6 eb 90 fd 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 48 8d b0 52 56 cc 6c 54 c6 ba ba 57 d0 35 7a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45 00 38 c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
key_iv - hexdump(len=16): 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45 00 38 c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
RSN: encrypted key data - hexdump(len=56): c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 83 fc 8b 14 9c 65 bd 68 4c 21 04 eb 1b 72 d1 f3 dd 00
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
Received 250 bytes of scan results (1 BSSes)
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 0e e7 ce 0f e4 7e 72 22 74 5a 57 71 60 ba 1c 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (auth) [id=0 id_str=]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c07 len=78
AssocReq IE wireless event - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0e:2e:b0:02:9d
Association info event
req_ies - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
resp_ies - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
State: COMPLETED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:0e:2e:b0:02:9d
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: PMKID from Authenticator - hexdump(len=16): 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): a4 18 e9 03 97 46 c6 db ee 59 33 89 06 15 e4 b4 4c 2b 3d 67 5a b6 ba 99 b5 e0 2b 36 14 de ed 50
WPA: PTK derivation - A1=00:1c:26:50:d8:30 A2=00:0e:2e:b0:02:9d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 a4 18 e9 03 97 46 c6 db ee 59 33 89 06 15 e4 b4 4c 2b 3d 67 5a b6 ba 99 b5 e0 2b 36 14 de ed 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 e7 3c db 0e c2 63 2b 11 05 34 a4 01 03 74 d6 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
RX ctrl_iface - hexdump_ascii(len=4):
50 49 4e 47 PING
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47 00 38 d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
IEEE 802.1X RX: version=1 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
key_iv - hexdump(len=16): 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47 00 38 d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
RSN: encrypted key data - hexdump(len=56): d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 83 fc 8b 14 9c 65 bd 68 4c 21 04 eb 1b 72 d1 f3 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f ea 90 fc 36 05 fa 53 82 20 a0 75 09 12 8c 20 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
CTRL-EVENT-TERMINATING - signal 2 received
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
CTRL_IFACE wait for attached monitors to receive messages
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
So, basically if a grep States, I have
Code:
State: DISCONNECTED -> SCANNING
State: SCANNING -> ASSOCIATING
State: ASSOCIATING -> ASSOCIATED
State: ASSOCIATED -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
State: GROUP_HANDSHAKE -> COMPLETED
State: COMPLETED -> ASSOCIATED
State: ASSOCIATED -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
State: GROUP_HANDSHAKE -> COMPLETED
State: COMPLETED -> DISCONNECTED
Slackware 13.0 with default wpa_supplicant 0.6.9, ndiswrapper 1.55.
Anyone, an idea how can I make the connection stable ?
Thanks.
LAST DISCOVERY: w/out encryption the connection seem to be stable (usually I use WPA-preshared key with WPA(AES2)). So it'a a problem related to encryption? :-?