From owner-freebsd-current@FreeBSD.ORG Mon Jun 6 15:12:14 2005 Return-Path: X-Original-To: freebsd-current@FreeBSD.org Delivered-To: freebsd-current@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0A91E16A41C; Mon, 6 Jun 2005 15:12:14 +0000 (GMT) (envelope-from sam@errno.com) Received: from ebb.errno.com (ebb.errno.com [66.127.85.87]) by mx1.FreeBSD.org (Postfix) with ESMTP id 90B1643D49; Mon, 6 Jun 2005 15:12:13 +0000 (GMT) (envelope-from sam@errno.com) Received: from [66.127.85.91] (sam@[66.127.85.91]) (authenticated bits=0) by ebb.errno.com (8.12.9/8.12.6) with ESMTP id j56FCBms041383 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 6 Jun 2005 08:12:13 -0700 (PDT) (envelope-from sam@errno.com) Message-ID: <42A468BB.2000307@errno.com> Date: Mon, 06 Jun 2005 08:16:11 -0700 From: Sam Leffler User-Agent: Mozilla Thunderbird 1.0.2 (X11/20050327) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Doug Barton References: <429B71C4.9080803@FreeBSD.org> <20050531013528.V940@ync.qbhto.arg> <429C920B.30005@errno.com> <429D5D81.6020802@FreeBSD.org> <42A3F712.5000302@FreeBSD.org> In-Reply-To: <42A3F712.5000302@FreeBSD.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: wpaul@FreeBSD.org, freebsd-current@FreeBSD.org Subject: Re: wpa_supplicant + NDIS (broadcom) + linksys WRT54G possible? X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jun 2005 15:12:14 -0000 Doug Barton wrote: > Doug Barton wrote: > >> Sam Leffler wrote: > > >>> You would probably better off setting up an ap where you can see >>> what's happening on the ap side. Since you have an ath card you >>> could use that to test with (even in the same laptop). >> >> >> >> I can try that, be a couple days before I get to it though. > > > Ok, I finally got around to this. Using the wpa code that Sam just > committed to -current, I set up the ath card in hostap mode, and ran > wpa_supplicant on the ndis card. > > Here is the ath (hostap) side: > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: associated > New STA > ath0: STA 00:90:4b:63:5f:e0 WPA: event 1 notification > ath0: STA 00:90:4b:63:5f:e0 WPA: start authentication > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:90:4b:63:5f:e0 key_idx=0 > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.1X: unauthorizing port > bsd_set_sta_authorized: addr=00:90:4b:63:5f:e0 authorized=0 > WPA: 00:90:4b:63:5f:e0 WPA_PTK_GROUP entering state IDLE > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITPSK > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state PTKSTART > ath0: STA 00:90:4b:63:5f:e0 WPA: sending 1/4 msg of 4-Way Handshake > TX EAPOL - hexdump(len=113): 00 90 4b 63 5f e0 00 0d 88 8a 77 c6 88 8e > 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 27 55 b1 da 18 ef 6e > 41 78 4b 6c b3 31 26 56 9a a9 28 9a 9f d7 73 fe 01 d0 38 dc ba 59 93 5e > 9b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 > IEEE 802.1X: 123 bytes from 00:90:4b:63:5f:e0 > IEEE 802.1X: version=1 type=3 length=119 > ath0: STA 00:90:4b:63:5f:e0 WPA: WPA IE from (Re)AssocReq did not match > with msg 2/4 > WPA IE in AssocReq - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 > 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 > WPA IE in msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 > 01 00 00 50 f2 02 01 00 00 50 f2 02 I know what this is; I've got the fix in another tree. Sam > bsd_sta_deauth: addr=00:90:4b:63:5f:e0 reason_code=2 > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deauthenticated due to local > deauth request > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deassociated > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: associated > New STA > ath0: STA 00:90:4b:63:5f:e0 WPA: event 1 notification > ath0: STA 00:90:4b:63:5f:e0 WPA: start authentication > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:90:4b:63:5f:e0 key_idx=0 > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.1X: unauthorizing port > bsd_set_sta_authorized: addr=00:90:4b:63:5f:e0 authorized=0 > WPA: 00:90:4b:63:5f:e0 WPA_PTK_GROUP entering state IDLE > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITPSK > WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state PTKSTART > ath0: STA 00:90:4b:63:5f:e0 WPA: sending 1/4 msg of 4-Way Handshake > TX EAPOL - hexdump(len=113): 00 90 4b 63 5f e0 00 0d 88 8a 77 c6 88 8e > 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 27 55 b1 da 18 ef 6e > 41 78 4b 6c b3 31 26 56 9a a9 28 9a 9f d7 73 fe 01 d0 38 dc ba 59 93 5e > 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 > IEEE 802.1X: 123 bytes from 00:90:4b:63:5f:e0 > IEEE 802.1X: version=1 type=3 length=119 > ath0: STA 00:90:4b:63:5f:e0 WPA: WPA IE from (Re)AssocReq did not match > with msg 2/4 > WPA IE in AssocReq - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 > 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 > WPA IE in msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 > 01 00 00 50 f2 02 01 00 00 50 f2 02 > bsd_sta_deauth: addr=00:90:4b:63:5f:e0 reason_code=2 > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deauthenticated due to local > deauth request > ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deassociated > > > And here is the ndis side: > Trying to associate with 00:0d:88:8a:77:c6 (SSID='wpa-test' freq=2412 MHz) > Cancelling scan request > Automatic auth_alg selection: 0x1 > WPA: using IEEE 802.11i/D3.0 > WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 > WPA: using GTK TKIP > WPA: using PTK TKIP > WPA: using KEY_MGMT WPA-PSK > WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 > 01 00 00 50 f2 02 01 00 00 50 f2 02 > No keys have been configured - skip key clearing > wpa_driver_bsd_set_drop_unencrypted: enabled=1 > wpa_driver_bsd_associate > Setting authentication timeout: 5 sec 0 usec > RX EAPOL from 00:0d:88:8a:77:c6 > Setting authentication timeout: 10 sec 0 usec > IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > WPA: RX message 1 of 4-Way Handshake from 00:0d:88:8a:77:c6 (ver=1) > WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 > f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 > WPA: Renewed SNonce - hexdump(len=32): 71 cc f2 16 d3 bf fe 59 72 ee 19 > 61 ea e6 11 fb 07 ef 9f a3 01 83 67 c4 78 54 6a c2 4d 2e 29 12 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=64): [REMOVED] > WPA: EAPOL-Key MIC - hexdump(len=16): 5a 6b 0e 62 1d 10 d5 b4 89 c2 0b > a6 72 70 e9 66 > WPA: Sending EAPOL-Key 2/4 > RX EAPOL from 00:0d:88:8a:77:c6 > IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > WPA: RX message 1 of 4-Way Handshake from 00:0d:88:8a:77:c6 (ver=1) > WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 > f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=64): [REMOVED] > WPA: EAPOL-Key MIC - hexdump(len=16): 24 e2 bc 1e a1 5d ad 71 29 e9 fa > b2 5f e4 2d a9 > WPA: Sending EAPOL-Key 2/4 > > Hope this helps, > > Doug > >