Opened 12 years ago

Closed 6 years ago

#9646 closed bug (not reproducible)

wpa_supplicant: cannot connect to network

Reported by: dsjonny Owned by: nobody
Priority: normal Milestone: R1
Component: Network & Internet/Wireless Version: R1/Development
Keywords: Cc:
Blocked By: Blocking:
Platform: All

Description

Using 45464 nightly I cannot connect to the network with WiFi.

The network has WPA2-PSK security mode. After I enter the password, It waits some seconds, popup the "Configuring" info window, and after some seconds I got wpa_supplicant window again. After this, in the Deskbar's NetworkStatus icon shows "No wireless network available".

I need to turn off and on the adapter to have wireless networks in the list again:

~/Desktop> ifconfig /dev/net/iprowifi4965/0 down
~/Desktop> ifconfig /dev/net/iprowifi4965/0 up

My network adapter is an Intel Centrino 6230, and there was no problem since some nightlies before.

I also checked the syslog, and there is nothing.

Attachments (1)

syslog (139.4 KB ) - added by dsjonny 12 years ago.

Download all attachments as: .zip

Change History (10)

comment:1 by mmlr, 12 years ago

Please attach a syslog, it might indicate the problem from the driver side. It is possible that the timeout is simply too short so that in your case no association/authentication manages to complete.

The "no networks" symptom is expected. Scanning and displaying scan results is fully passive right now and relies on someone initiating a scan. The driver does so when it starts up, as does the wpa_supplicant to look for the desired network. If the wpa_supplicant fails to connect, it does shut down the driver and clear the scan results. The net_server never attempts to scan, therefore no networks are then shown anymore.

You can always connect to networks using ifconfig however. Just use ifconfig <interface> join <networkName> and it should bring up the wpa_supplicant dialog. Note that due to the missing scan results the wpa_supplicant cannot know what type of encryption is used (unless the network has previously been stored) and so will default to "Open" and you have to change that accrodingly.

To debug this further, please provide the output of the net_server and wpa_supplicant. To get it you need to start the net_server from a Terminal. First quit both the wpa_supplicant and net_server via hey wpa_supplicant quit and hey net_server quit respectively. Then just run the net_server via /system/servers/net_server. It should then print its output into that Terminal. Since the net_server also starts the wpa_supplicant, that one will also print its output to the same Terminal. Then try to connect to the network using ifconfig as mentioned above and save and attach the whole output here.

comment:2 by dsjonny, 12 years ago

Using 45487 nightly.

I have attached the syslog.

net_server debug output:

Welcome to the Haiku shell.

~/Desktop> /system/servers/net_server
New service ssh
Launch service: /boot/common/bin/sshd
wpa_supplicant v2.0
failed to read keystore database
Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000
/dev/net/iprowifi4965/0: Own MAC address: 00:15:00:77:2c:02
bsd_set_key: alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=2
bsd_set_key: alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=3
wpa_driver_bsd_set_countermeasures: enabled=0
/dev/net/iprowifi4965/0: RSN: flushing PMKID list in the driver
/dev/net/iprowifi4965/0: State: DISCONNECTED -> INACTIVE
/dev/net/iprowifi4965/0: Added interface /dev/net/iprowifi4965/0
/dev/net/iprowifi4965/0: State: INACTIVE -> DISCONNECTED
ssid - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
scan_ssid=1 (0x1)
proto: 0x3
key_mgmt: 0x2
pairwise: 0x19
group: 0x1e
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
/dev/net/iprowifi4965/0: Setting scan request: 0 sec 0 usec
/dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
/dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
/dev/net/iprowifi4965/0: Failed to initiate AP scan
/dev/net/iprowifi4965/0: State: SCANNING -> DISCONNECTED
/dev/net/iprowifi4965/0: Setting scan request: 1 sec 0 usec
/dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
/dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
/dev/net/iprowifi4965/0: Event SCAN_RESULTS (3) received
Received 568 bytes of scan results (2 BSSes)
Sorted scan results
cc:5d:4e:47:99:bd freq=2472 qual=47 noise=-95 level=0 flags=0x0
IEs - hexdump(len=400): 00 07 44 52 2d 57 69 46 69 01 0c 82 84 8b 96 0c 12 18 24 30 48 60 6c 2a 01 00 00 07 44 52 2d 57 69 46 69 01 08 82 84 8b 96 0c 12 18 24 03 01 0d 2a 01 00 32 04 30 48 60 6c 2d 1a 6e 18 1e ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 07 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd a9 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 98 58 f6 64 7a e3 43 07 81 48 4c c9 e2 13 65 05 10 21 00 1a 5a 79 58 45 4c 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 6f 72 70 2e 10 23 00 18 5a 79 58 45 4c 20 4e 42 47 2d 34 31 38 4e 20 41 50 20 52 6f 75 74 65 72 10 24 00 08 4e 42 47 2d 34 31 38 4e 10 42 00 0a 30 30 30 30 30 30 30 30 30 30 10 54 00 08 00 06 00 50 f2 04 00 01 10 11 00 18 5a 79 58 45 4c 20 4e 42 47 2d 34 31 38 4e 20 41 50 20 52 6f 75 74 65 72 10 08 00 02 00 86 dd 1e 00 90 4c 33 6e 18 1e ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0d 07 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 06 00 e0 4c 02 01 60
d8:5d:4c:86:24:b4 freq=2412 qual=46 noise=-95 level=0 flags=0x0
IEs - hexdump(len=89): 00 0a 54 50 4c 49 4e 4b 48 4f 4d 45 01 0c 82 84 8b 96 0c 18 30 48 12 24 60 6c 2a 01 00 00 0a 54 50 4c 49 4e 4b 48 4f 4d 45 01 08 82 84 8b 96 0c 18 30 48 03 01 01 2a 01 00 32 04 12 24 60 6c 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 01 00
/dev/net/iprowifi4965/0: BSS: Start scan result update 1
/dev/net/iprowifi4965/0: BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi'
/dev/net/iprowifi4965/0: BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME'
BSS: last_scan_res_used=2/32 last_scan_full=0
Add randomness: count=1 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=2 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
/dev/net/iprowifi4965/0: New scan results available
/dev/net/iprowifi4965/0: Selecting BSS from priority group 0
/dev/net/iprowifi4965/0: 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=0 wps
/dev/net/iprowifi4965/0:    selected based on RSN IE
/dev/net/iprowifi4965/0:    selected BSS cc:5d:4e:47:99:bd ssid='DR-WiFi'
/dev/net/iprowifi4965/0: Request association: reassociate: 1  selected: cc:5d:4e:47:99:bd  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
/dev/net/iprowifi4965/0: Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz)
/dev/net/iprowifi4965/0: Cancelling scan request
/dev/net/iprowifi4965/0: WPA: clearing own WPA/RSN IE
/dev/net/iprowifi4965/0: Automatic auth_alg selection: 0x1
/dev/net/iprowifi4965/0: RSN: using IEEE 802.11i/D9.0
/dev/net/iprowifi4965/0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
/dev/net/iprowifi4965/0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
/dev/net/iprowifi4965/0: WPA: using GTK TKIP
/dev/net/iprowifi4965/0: WPA: using PTK CCMP
/dev/net/iprowifi4965/0: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
/dev/net/iprowifi4965/0: No keys have been configured - skip key clearing
/dev/net/iprowifi4965/0: State: SCANNING -> ASSOCIATING
Limit connection to BSSID cc:5d:4e:47:99:bd freq=2472 MHz based on scan results (bssid_set=0)
wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1
wpa_driver_bsd_set_drop_unencrypted: enabled=1
bsd_set_opt_ie: set WPA+RSN ie (len 22)
wpa_driver_bsd_associate: set PRIVACY 1
/dev/net/iprowifi4965/0: Setting authentication timeout: 10 sec 0 usec
/dev/net/iprowifi4965/0: Authentication with cc:5d:4e:47:99:bd timed out.
Added BSSID cc:5d:4e:47:99:bd into blacklist
/dev/net/iprowifi4965/0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=cc:5d:4e:47:99:bd reason=3 state=ASSOCIATING
/dev/net/iprowifi4965/0: Event DEAUTH (12) received
/dev/net/iprowifi4965/0: Deauthentication notification
/dev/net/iprowifi4965/0:  * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
/dev/net/iprowifi4965/0: CTRL-EVENT-DISCONNECTED bssid=cc:5d:4e:47:99:bd reason=3 locally_generated=1
/dev/net/iprowifi4965/0: Auto connect enabled: try to reconnect (wps=0 wpa_state=5)
/dev/net/iprowifi4965/0: Setting scan request: 0 sec 100000 usec
BSSID cc:5d:4e:47:99:bd blacklist count incremented to 2
/dev/net/iprowifi4965/0: Blacklist count 2 --> request scan in 500 ms
/dev/net/iprowifi4965/0: Not rescheduling scan to ensure that specific SSID scans occur
/dev/net/iprowifi4965/0: Disconnect event - remove keys
bsd_set_key: alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=2
bsd_set_key: alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=3
bsd_set_key: alg=0 addr=0x1809e6f8 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: addr=00:00:00:00:00:00
/dev/net/iprowifi4965/0: State: ASSOCIATING -> DISCONNECTED
/dev/net/iprowifi4965/0: No keys have been configured - skip key clearing
/dev/net/iprowifi4965/0: State: DISCONNECTED -> DISCONNECTED
/dev/net/iprowifi4965/0: Not rescheduling scan to ensure that specific SSID scans occur
/dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
/dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
/dev/net/iprowifi4965/0: Removing interface /dev/net/iprowifi4965/0
/dev/net/iprowifi4965/0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
/dev/net/iprowifi4965/0: No keys have been configured - skip key clearing
/dev/net/iprowifi4965/0: State: SCANNING -> DISCONNECTED
wpa_driver_bsd_set_countermeasures: enabled=0
/dev/net/iprowifi4965/0: No keys have been configured - skip key clearing
Removed BSSID cc:5d:4e:47:99:bd from blacklist (clear)
/dev/net/iprowifi4965/0: BSS: Remove id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi' due to wpa_bss_flush
/dev/net/iprowifi4965/0: BSS: Remove id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME' due to wpa_bss_flush
/dev/net/iprowifi4965/0: Cancelling scan request
/dev/net/iprowifi4965/0: Cancelling authentication timeout
wpa_driver_bsd_set_wpa: enabled=0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
bsd_set_opt_ie: set WPA+RSN ie (len 0)
ioctl[SIOCS80211, op=26, val=0, arg_len=0]: General system error
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
bsd_set_opt_ie: set WPA+RSN ie (len 0)
ioctl[SIOCS80211, op=26, val=0, arg_len=0]: General system error

by dsjonny, 12 years ago

Attachment: syslog added

comment:3 by mmlr, 12 years ago

Well that looks like it almost made it. The things that stick out are:

wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
/dev/net/iprowifi4965/0: Failed to initiate AP scan

... and obviously:

/dev/net/iprowifi4965/0: Setting authentication timeout: 10 sec 0 usec
/dev/net/iprowifi4965/0: Authentication with cc:5d:4e:47:99:bd timed out.

It looks like the AP scan still takes place, though possibly not because of the wpa_supplicant but just generally because the driver is still in its initial scan mode. Does the output change if you retry the connection?

The rest of the output looks fine and as expected, none of the ioctls seem to fail, so connecting should theoretically work. When it worked previously, did it take a lot of time to authenticate and get the connection going? I mean the current timeout is set to 15 seconds, the auth timeout is 10 seconds, so maybe previously it would take two attempts? In that case it would have taken around 20 seconds to establish a connection.

I know that the wpa_supplicant works with this driver because I use that driver on both of my current laptops. The one in this machine is identified as:

device 088e: Centrino Advanced-N 6235 (Centrino Advanced-N 6235 AGN)

So pretty similar to the 6230 in your system.

comment:4 by dsjonny, 12 years ago

Well, I have downloaded the R1A4 and the wifi works fine. The authentication timeout was 10s too. The connecting time looks like fast. Here is the output from the Terminal:

Welcome to the Haiku shell.

~/Desktop> /system/servers/net_server
New service ssh
Launch service: /boot/common/bin/sshd
Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000
Own MAC address: 00:15:00:77:2c:02
bsd_set_key: alg=0 addr=0x2290e4 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=0x2290e4 key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=0x2290e4 key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=2
bsd_set_key: alg=0 addr=0x2290e4 key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=3
wpa_driver_bsd_set_countermeasures: enabled=0
RSN: flushing PMKID list in the driver
State: DISCONNECTED -> INACTIVE
Added interface /dev/net/iprowifi4965/0
ssid - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
scan_ssid=1 (0x1)
proto: 0x3
key_mgmt: 0x2
pairwise: 0x19
group: 0x1e
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Setting scan request: 0 sec 0 usec
State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
Failed to initiate AP scan.
State: SCANNING -> INACTIVE
Setting scan request: 1 sec 0 usec
State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
Failed to initiate AP scan.
State: SCANNING -> INACTIVE
Setting scan request: 1 sec 0 usec
Received 1116 bytes of scan results (5 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi'
BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME'
BSS: Add new id 2 BSSID c8:60:00:67:32:d4 SSID 'SZKSZAK_T10Z'
BSS: Add new id 3 BSSID 94:0c:6d:fe:c0:92 SSID 'CSSK_WLAN'
BSS: Add new id 4 BSSID 00:1d:0f:c5:44:3c SSID 'WIFIZZ'
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi'
Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: INACTIVE -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1
wpa_driver_bsd_set_drop_unencrypted: enabled=1
bsd_set_opt_ie: set WPA+RSN ie (len 22)
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
Authentication with cc:5d:4e:47:99:bd timed out.
Added BSSID cc:5d:4e:47:99:bd into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
     44 52 2d 57 69 46 69                              DR-WiFi         
Starting AP scan for wildcard SSID
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
Received 1016 bytes of scan results (4 BSSes)
BSS: Start scan result update 2
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi'
Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1
wpa_driver_bsd_set_drop_unencrypted: enabled=1
bsd_set_opt_ie: set WPA+RSN ie (len 22)
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=cc:5d:4e:47:99:bd
No keys have been configured - skip key clearing
Associated with cc:5d:4e:47:99:bd
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from cc:5d:4e:47:99:bd
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d
WPA: PTK derivation - A1=00:15:00:77:2c:02 A2=cc:5d:4e:47:99:bd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 d5 65 3f eb aa a2 53 4a cf 10 cb 88 0a 24 e8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from cc:5d:4e:47:99:bd
RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
IEEE 802.1X RX: version=1 type=3 length=175
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=80
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5
  key_iv - hexdump(len=16): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39
WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
RSN: encrypted key data - hexdump(len=80): 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 0e 36 d9 02 17 04 d5 c2 c9 4b 9e 07 ba f4 1f bb 46 b4 92 47 06 9f f6 05 42 9c b9 55 4a 30 7d fb dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 bf 87 01 ba 93 f4 e2 7e cf 4e fc 38 fe e8 5e 00 00
WPA: Installing PTK to the driver.
bsd_set_key: alg=3 addr=0x180a3368 key_idx=0 set_tx=1 seq_len=6 key_len=16
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
bsd_set_key: alg=2 addr=0x22579c key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with cc:5d:4e:47:99:bd [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID cc:5d:4e:47:99:bd from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:47:99:bd completed (auth) [id=0 id_str=]

comment:5 by mmadia, 11 years ago

Priority: highnormal

comment:6 by axeld, 8 years ago

Owner: changed from axeld to nobody
Status: newassigned

comment:7 by waddlesplash, 6 years ago

Still an issue?

comment:8 by dsjonny, 6 years ago

Hi. Unfortunatelly I cannot test is anymore. :/

comment:9 by waddlesplash, 6 years ago

Resolution: not reproducible
Status: assignedclosed
Note: See TracTickets for help on using tickets.