PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : WPA mit wpa_supplicant und ipw2200



BoomXsBigHeart
15.07.06, 17:45
Hallo zusammen!

Ich hab mal ne Frage bzgl. des wpa_supplicants. Ich krieg den unter WPA einfach nicht zum laufen bzw. er macht die Verbindung ned komplett und hört immer beim 2. Schritt vom 4-Wege-Handshake auf. Hab das ganze schon mal unter WEP laufen gehabt, hat wunderbar geklappt. Nur WPA-PSK will er irgendwie nicht. Hier mal die Ausgaben:



Boom@ubuntu:~$ sudo wpa_supplicant -i eth1 -c /etc/wpa_supplicant.conf -D ipw -d


Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'ipw' ctrl_ interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Priority group 0
id=0 ssid='meinWLAN'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_ipw_init is called
SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
Own MAC address: xx:xx:xx:xx:xx:xx
wpa_driver_ipw_set_wpa: enabled=1
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_countermeasures: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=12
Received 250 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:88:91:60:75 ssid='meinWLAN' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Trying to associate with xx:xx:xx:xx:xx:xx (SSID='meinWLAN' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=12
Received 250 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:88:91:60:75 ssid='meinWLAN' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Trying to associate with xx:xx:xx:xx:xx:xx (SSID='meinWLAN' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
State: DISCONNECTED -> ASSOCIATING
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: xx:xx:xx:xx:xx:xx
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx
No keys have been configured - skip key clearing
Associated with xx:xx:xx:xx:xx:xx
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from xx:xx:xx:xx:xx:xx
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): ca 86 68 73 6c 8f fc d8 7d 2c 88 9e 88 dc fe 09 6 f b3 9e cb b7 46 10 7d e7 62 50 db d3 25 23 36
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0d:88:91:60:75 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 0 1 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 4a ac b4 01 8c d9 89 58 a2 60 a8 ac dc 24 e2 d7 9a 4e 14 fd c0 4d f4 5f 60 8e fe 0c a7 4f 96 9b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
Authentication with xx:xx:xx:xx:xx:xx timed out.
Added BSSID xx:xx:xx:xx:xx:xx into blacklist
State: 4WAY_HANDSHAKE -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID xx:xx:xx:xx:xx:xx blacklist count incremented to 2
State: SCANNING -> DISCONNECTED
....





Boom@ubuntu:~$ iwconfig
lo no wireless extensions.

eth0 no wireless extensions.

eth1 IEEE 802.11b ESSID:"meinWLAN" Nickname:"meinWLAN"
Mode:Managed Frequency:2.467 GHz Access Point: xx:xx:xx:xx:xx:xx
Bit Rate:11 Mb/s Tx-Power=20 dBm Sensitivity=8/0
Retry limit:7 RTS thr:off Fragment thr:off
Power Management:off
Link Quality=79/100 Signal level=-39 dBm Noise level=-86 dBm
Rx invalid nwid:0 Rx invalid crypt:43 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:48 Missed beacon:0

sit0 no wireless extensions.




meine /etc/wpa_supplicant.conf

#update_config=1

# This variable can be a group name or gid.
#ctrl_interface_group=wheel
#ctrl_interface_group=0

#eapol_version=1
#ap_scan=2
#fast_reauth=1

network={
ssid="hackfisch"
# scan_ssid=1
proto=WPA
key_mgmt=WPA-PSK
pairwise=TKIP
group=TKIP
psk="wzlyqsFCln"
# priority=5
}



meine /etc/network/interfaces

# The loopback network interface
auto lo
iface lo inet loopback

iface eth0 inet dhcp
gateway 192.168.0.1
auto eth0

#WLAN
# This is a list of hotpluggable network interfaces.
# They will be activated automatically by the hotplug subsystem.
mapping hotplug
script grep
map eth1


iface eth1 inet static
address 192.168.0.20
netmask 255.255.255.0
gateway 192.168.0.1
auto eth1



Ich kann mir der Ausgabe leider nicht so viel anfangen. Habs aber auch unter Windows mal mit WPA-PSK gesichert, ging ohne Probleme. Von daher dürfts ja nicht am AP liegen...

TheChosen1
15.07.06, 18:03
Hi,
-D ipw funktioniert bei mir auch ned.
Probiers mal mit -D wext

BoomXsBigHeart
15.07.06, 18:20
Danke für die schnelle Antwort.

Aber dadran liegts ned, sonst würd er ja auch erst gar ned anfangen was zu machen. Das mit wext gilt erst ab 2.6.14.

TheChosen1
15.07.06, 18:48
Auch wieder wahr.
Was mir noch auffällt ist, dass du ssid="hackfisch" angegeben hast, der AP aber anscheinend "meinWLAN" sendet.
Bei nem Kernel < 2.6.14 wär ein Update sicher ned schlecht (inkl. der ipw Treiber).
Dass es unter Windows geht ist leiser kein Grund den AP freizusprechen; mit meinem alten Dlink 900+ war an WPA unter Linux nicht zu denken, unter Windows gings.

BoomXsBigHeart
15.07.06, 18:55
Was mir noch auffällt ist, dass du ssid="hackfisch" angegeben hast, der AP aber anscheinend "meinWLAN" sendet.
Habs gesehen und geändert, geht aber trotzdem nicht :(



Bei nem Kernel < 2.6.14 wär ein Update sicher ned schlecht (inkl. der ipw Treiber).
Dass es unter Windows geht ist leiser kein Grund den AP freizusprechen; mit meinem alten Dlink 900+ war an WPA unter Linux nicht zu denken, unter Windows gings.
Dann hat sichs wohl schon erledigt, hab nämlich nen Dlink DWL 900AP+ ;)
Aber mit der Firmware sollte es doch gehen eigentlich??? Und wenn der AP ned könnte, dürfte er doch auch erst gar nicht anfangen oder???

Und wegen dem Update: Lieber nicht. Hab da keine Ahnung von kernel updates... allerdings hab ich die aktuellen ipw treiber schon drauf.

TheChosen1
15.07.06, 19:14
Gut dann hau den AP in die Tonne ;-). Der WPA Support von dem Ding scheint ziemlich Buggy zu sein. Hab da damals im Dlink Forum einige Post drüber gelesen; das funktioniert selbst unter Windows nicht so wies soll.
Da Dlink den Support ja gleich nach der Veröffintlichung der WPA Firmware eingestellt hat, ist da auch keine Besserung in Sicht.
Da hilft auch kein Kernel Update.

Hab mir dann den Asus WL-300g gehohlt, der tut einwandfrei.

BoomXsBigHeart
15.07.06, 19:25
Mir reicht das im Prinzip auch unter Windows. Muss aber fürn Seminar da mit Linux rumtüfteln... praktische Übungen machen... naja mal sehen was mir noch so einfällt...


Aber unter windows macht das schon ab und an mal zicken. Vor allem hat der mit DNS irgendwie Probleme glaub ich. Musste bisher jedes mal nen neuen key eingeben dass der das gemacht hat.

Naja, trotzdem danke :))

BoomXsBigHeart
16.07.06, 17:19
Also so abwegig ist es vielleicht doch nicht mit dem dwl 900ap+, linux und wpa :rolleyes:

Hab den 4 Wege Handshake geschafft, aber den Group Handshake will er ned. Siehe Ausgabe:




Boom@ubuntu:~$ sudo wpa_supplicant -i eth1 -c /etc/wpa_supplicant.conf -D ipw -d


Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'ipw' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
eapol_version=1
ap_scan=2
fast_reauth=1
Line 26: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 9
id=0 ssid='meinWLAN'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_ipw_init is called
SIOCGIWRANGE: too old (short) data - assuming WPA is not supported
Own MAC address: xx:xx:xx:xx:xx:xx
wpa_driver_ipw_set_wpa: enabled=1
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_countermeasures: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'meinWLAN'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: xx:xx:xx:xx:xx:xx
State: DISCONNECTED -> ASSOCIATED
Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:0d:88:91:60:75
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Wireless event: cmd=0x8b19 len=12
Received 250 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from xx:xx:xx:xx:xx:xx
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 00 9c 35 cb a0 25 5f c5 0d f7 ca 88 36 af a0 b4 bb 0d 95 9f de 21 30 92 dd bf 37 c8 a9 6d 32 85
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): d5 a3 2c 61 31 c7 4b 64 be 80 bb 90 1f f8 91 5f 8a 6e 77 96 e4 d3 9e f2 1d c0 1c 40 3b 5f 76 5e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0d:88:91:60:75
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=26
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 00 9c 35 cb a0 25 5f c5 0d f7 ca 88 36 af a0 b4 bb 0d 95 9f de 21 30 92 dd bf 37 c8 a9 6d 32 85
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 8e d2 4c 6f 27 63 c0 08 45 28 d6 e7 67 3f 5a cd
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:xx:xx(ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Authentication with xx:xx:xx:xx:xx:xx timed out.
Added BSSID xx:xx:xx:xx:xx:xx into blacklist
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'meinWLAN'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=22
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID xx:xx:xx:xx:xx:xx blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: xx:xx:xx:xx:xx:xx
State: DISCONNECTED -> ASSOCIATED
Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with xx:xx:xx:xx:xx:xx
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Wireless event: cmd=0x8b19 len=12
Received 250 bytes of scan results (1 BSSes)
Scan results: 1
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: ASSOCIATED -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_ipw_set_wpa: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=0
wpa_driver_ipw_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Removed BSSID xx:xx:xx:xx:xx:xx from blacklist (clear)
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Cancelling scan request



Weiss da evtl. jemand weiter warum der hier stoppt?:confused:

schmidt_baer
05.03.07, 15:58
Hallo,
hatte ein das gleiche Problem. Ist wahrscheinlich ein Bug im der DWL-900AP+ Firmware. Kann aber durch Eingriff in den Kernel Source-Code korrigiert werden.

ieee80211_crypto_tkip.c

Die tkip_decap-Funktion (ca. Zeile 260) durch folgendes ersetzen:

/*
* Validate and strip privacy headers (and trailer) for a
* received frame. If necessary, decrypt the frame using
* the specified key.
*/
static int
tkip_decap(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen)
{
struct tkip_ctx *ctx = k->wk_private;
struct ieee80211vap *vap = ctx->tc_vap;
struct ieee80211_frame *wh;
uint8_t *ivp;
u_int8_t tid;
static int not_first = 0; // This is dirty hacking the driver!
// SORRY! MS

/*
* Header should have extended IV and sequence number;
* verify the former and validate the latter.
*/
wh = (struct ieee80211_frame *)skb->data;

ivp = skb->data + hdrlen;
if ((ivp[IEEE80211_WEP_IVLEN] & IEEE80211_WEP_EXTIV) == 0) {
/*
* No extended IV; discard frame.
*/
IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
"%s", "missing ExtIV for TKIP cipher");
vap->iv_stats.is_rx_tkipformat++;
return 0;
}
/*
* Handle TKIP counter measures requirement.
*/
if (vap->iv_flags & IEEE80211_F_COUNTERM) {
IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
"discard frame due to countermeasures (%s)", __func__);
vap->iv_stats.is_crypto_tkipcm++;
return 0;
}

tid = 0;
if (IEEE80211_QOS_HAS_SEQ(wh))
tid = ((struct ieee80211_qosframe *)wh)->i_qos[0] & IEEE80211_QOS_TID;

ctx->rx_rsc = READ_6(ivp[2], ivp[0], ivp[4], ivp[5], ivp[6], ivp[7]);
if (ctx->rx_rsc <= k->wk_keyrsc[tid]) {
/*
* Replay violation; notify upper layer.
*/
printk(KERN_INFO "MARCUS: still problems in: ieee80211_crypto_tkip.c\n");

ieee80211_notify_replay_failure(vap, wh, k, ctx->rx_rsc);
vap->iv_stats.is_rx_tkipreplay++;
//SORRY AGAIN but D-link needs this!
if (not_first < 2)
not_first++;
else
return 0;
}
/*
* NB: We can't update the rsc in the key until MIC is verified.
*
* We assume we are not preempted between doing the check above
* and updating wk_keyrsc when stripping the MIC in tkip_demic.
* Otherwise we might process another packet and discard it as
* a replay.
*/

/*
* Check if the device handled the decrypt in hardware.
* If so we just strip the header; otherwise we need to
* handle the decrypt in software.
*/
if ((k->wk_flags & IEEE80211_KEY_SWCRYPT) &&
!tkip_decrypt(ctx, k, skb, hdrlen))
return 0;

/*
* Copy up 802.11 header and strip crypto bits.
*/
memmove(skb->data + tkip.ic_header, skb->data, hdrlen);
skb_pull(skb, tkip.ic_header);
while (skb->next != NULL)
skb = skb->next;
skb_trim(skb, skb->len - tkip.ic_trailer);

return 1;
}


Viel Glück
Marcus