LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking
User Name
Password
Linux - Wireless Networking This forum is for the discussion of wireless networking in Linux.

Notices


Reply
  Search this Thread
Old 10-10-2009, 12:03 PM   #1
xcristi
Member
 
Registered: Sep 2005
Distribution: Slackware
Posts: 35

Rep: Reputation: 16
Wifi connection keeps re-authenticate BCM43XX and ndiswrapper


Hello everyone,

I have a laptop with a BCM43XX chipset, which I'm trying to make it work using ndiswrapper. Until now I had Slackware 11.0 and I managed to make it work, even if sometimes several network restarts were required. Now I installed Slackware 13.0 and problems occur

First, I tried to use the b43-fwcutter method and to install firmware for b43. Everything was ok, the module was there, but connection keeps re-authenticate all the time. I tried there ndiswrapper with the windows drivers for Broadcom (method used succesfully on the other slack ver), but again the same problem.

Technical details follow:

Code:
ndiswrapper -l
bcmwl5 : driver installed
	device (14E4:4311) present (alternate driver: ssb)
Code:
lspci -v | grep Broadcom
03:00.0 Network controller: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)

These are the messages wpa_supplicant throw:

Code:
wpa_supplicant -W -Dwext -iwlan0 -c/etc/wpa_supplicant.conf
Trying to associate with SSID 'DAA'
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (auth) [id=0 id_str=]
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
Associated with 00:0e:2e:b0:02:9d
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
... last message just keep repeated indefinitely ...
and now a more detailed look:

Code:
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0'
eapol_version=1
ap_scan=2
fast_reauth=0
Line: 16 - start of a new network block
scan_ssid=1 (0x1)
ssid - hexdump_ascii(len=3):
     44 41 41                                          DAA             
proto: 0x2
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (ASCII passphrase) - hexdump_ascii(len=33): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='DAA'
Initializing interface (2) 'wlan0'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1c:26:50:d8:30
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 67 eb 08 96 3b 6c 54 60 8b 08 80 f3 c8 3b 03 b3
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
ctrl_interface_group=0
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlan0'
Added interface wlan0
CTRL_IFACE - wlan0 - wait for monitor to attach
CTRL_IFACE monitor attached - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'DAA'
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b06 len=8
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c07 len=78
AssocReq IE wireless event - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0e:2e:b0:02:9d
Association info event
req_ies - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
resp_ies - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:0e:2e:b0:02:9d
No keys have been configured - skip key clearing
Select network based on association information
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:0e:2e:b0:02:9d
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: PMKID from Authenticator - hexdump(len=16): 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 49 4c 99 4d bd e9 5c 9b fd 20 fb 23 17 79 c5 61 24 84 d5 2c 3f d7 09 5a bb 14 70 b6 eb 90 fd 99
WPA: PTK derivation - A1=00:1c:26:50:d8:30 A2=00:0e:2e:b0:02:9d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 49 4c 99 4d bd e9 5c 9b fd 20 fb 23 17 79 c5 61 24 84 d5 2c 3f d7 09 5a bb 14 70 b6 eb 90 fd 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 48 8d b0 52 56 cc 6c 54 c6 ba ba 57 d0 35 7a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45 00 38 c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
  key_iv - hexdump(len=16): 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c fb 23 14 7f 64 0d 81 cb fc 36 2d 3c 3e 91 45 00 38 c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
RSN: encrypted key data - hexdump(len=56): c4 1e 44 9c 8d d0 cd ee eb cd 4b c2 15 fe 70 c0 1f 0c ac 51 db 54 de 0b fc 51 bc 6f d6 d0 a4 51 60 15 18 51 23 5c fc c8 08 37 f8 01 94 50 f8 44 1e b5 60 ea 90 fc 3e b9
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 83 fc 8b 14 9c 65 bd 68 4c 21 04 eb 1b 72 d1 f3 dd 00
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
Received 250 bytes of scan results (1 BSSes)
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 0e e7 ce 0f e4 7e 72 22 74 5a 57 71 60 ba 1c 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (auth) [id=0 id_str=]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c07 len=78
AssocReq IE wireless event - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0e:2e:b0:02:9d
Association info event
req_ies - hexdump(len=70): 00 03 44 41 41 01 08 82 84 0b 16 24 30 48 6c 21 02 08 12 24 02 01 0e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 09 00 10 18 02 00 10 00 00 00
resp_ies - hexdump(len=16): 01 08 82 84 0b 16 0c 12 18 24 32 04 30 48 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
State: COMPLETED -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated with 00:0e:2e:b0:02:9d
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: PMKID from Authenticator - hexdump(len=16): 11 32 fa 1e 21 52 c3 09 17 b1 2d 2e 17 eb 61 44
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): a4 18 e9 03 97 46 c6 db ee 59 33 89 06 15 e4 b4 4c 2b 3d 67 5a b6 ba 99 b5 e0 2b 36 14 de ed 50
WPA: PTK derivation - A1=00:1c:26:50:d8:30 A2=00:0e:2e:b0:02:9d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 a4 18 e9 03 97 46 c6 db ee 59 33 89 06 15 e4 b4 4c 2b 3d 67 5a b6 ba 99 b5 e0 2b 36 14 de ed 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c7 e7 3c db 0e c2 63 2b 11 05 34 a4 01 03 74 d6 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX EAPOL from 00:0e:2e:b0:02:9d
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47 00 38 d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14
  key_iv - hexdump(len=16): 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 84 81 95 68 b5 c6 54 9c 46 ed e0 d5 5a 88 b9 a0 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0b 14 41 07 e6 5e 5c 8a 26 30 d7 f6 90 6a c4 00 0d 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 90 66 fc 9e 49 24 b1 f0 56 b3 d5 a2 e3 69 47 00 38 d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
RSN: encrypted key data - hexdump(len=56): d0 d4 17 d6 da 7f 7d 0e 84 50 8a a9 92 2d 5a 35 e4 e1 5e 0c e5 f3 95 79 f8 a9 98 3e a5 25 95 8a 9f 6e 50 a2 ca df 22 d0 d8 d3 89 c2 24 23 0f ea 80 32 f9 8e 34 8a 75 17
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0e:2e:b0:02:9d (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 83 fc 8b 14 9c 65 bd 68 4c 21 04 eb 1b 72 d1 f3 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f ea 90 fc 36 05 fa 53 82 20 a0 75 09 12 8c 20 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:0e:2e:b0:02:9d [PTK=CCMP GTK=CCMP]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0e:2e:b0:02:9d completed (reauth) [id=0 id_str=]
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
CTRL-EVENT-TERMINATING - signal 2 received
CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 34 32 33 2d 34 36 37 00
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
CTRL_IFACE wait for attached monitors to receive messages
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
So, basically if a grep States, I have

Code:
State: DISCONNECTED -> SCANNING
State: SCANNING -> ASSOCIATING
State: ASSOCIATING -> ASSOCIATED
State: ASSOCIATED -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
State: GROUP_HANDSHAKE -> COMPLETED
State: COMPLETED -> ASSOCIATED
State: ASSOCIATED -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
State: GROUP_HANDSHAKE -> COMPLETED
State: COMPLETED -> DISCONNECTED
Slackware 13.0 with default wpa_supplicant 0.6.9, ndiswrapper 1.55.

Anyone, an idea how can I make the connection stable ?
Thanks.

LAST DISCOVERY: w/out encryption the connection seem to be stable (usually I use WPA-preshared key with WPA(AES2)). So it'a a problem related to encryption? :-?

Last edited by xcristi; 10-11-2009 at 03:29 AM. Reason: update
 
Old 10-10-2009, 03:23 PM   #2
xcristi
Member
 
Registered: Sep 2005
Distribution: Slackware
Posts: 35

Original Poster
Rep: Reputation: 16
Thumbs up [SOLVED] Wifi connection keeps re-authenticate BCM43XX and ndiswrapper

BEST SOLUTION AT THIS TIME

If you have problems with b43 drivers extracted with b43-fwcutter from linuxwireless.com, then grab the archive from here and replace in /lib/firmware/b43 all the files (better empty the b43 folder and then put there the archive contents).

For me (and some several more guys) this was working; the files seem to be the same (archive from omattos and the ones extracted by linuxwireless method) but there are a few differences. As a result, now the connection is pretty stable. Not perfect (sometimes, when it comes back from suspending mode, it takes several shots to get the AP), but it's from far better than the other one.

Case closed.

Last edited by xcristi; 10-11-2009 at 03:28 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
BCM43XX fails, ndiswrapper works, want BCM43XX Shadow_7 Linux - Wireless Networking 9 01-27-2013 08:11 AM
bcm43xx OR ndiswrapper theofb Linux - Wireless Networking 7 09-15-2008 07:36 PM
Changing bcm43xx to ndiswrapper. wilku Debian 2 11-15-2007 06:47 AM
best distro for bcm43xx wifi driver? elvenson Linux - Distributions 11 11-29-2006 05:25 PM
bcm43xx and ndiswrapper BCarey Linux - Wireless Networking 3 09-15-2006 04:52 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking

All times are GMT -5. The time now is 04:22 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration