From owner-freebsd-current@FreeBSD.ORG Fri Dec 31 12:57:02 2004 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A4D8416A4CE for ; Fri, 31 Dec 2004 12:57:02 +0000 (GMT) Received: from pne-smtpout1-sn2.hy.skanova.net (pne-smtpout1-sn2.hy.skanova.net [81.228.8.83]) by mx1.FreeBSD.org (Postfix) with ESMTP id 4CF6843D31 for ; Fri, 31 Dec 2004 12:57:02 +0000 (GMT) (envelope-from pawel.worach@telia.com) Received: from [127.0.0.1] (81.225.14.129) by pne-smtpout1-sn2.hy.skanova.net (7.1.026.6) (authenticated as u86211448) id 4199C6960002EE62; Fri, 31 Dec 2004 13:56:55 +0100 Message-ID: <41D54C92.3010407@telia.com> Date: Fri, 31 Dec 2004 13:56:50 +0100 From: Pawel Worach User-Agent: Mozilla Thunderbird 1.0 (X11/20041223) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Chen Lihong References: <6eb82e04122905361ccd6af0@mail.gmail.com> <6eb82e04123010035e379e48@mail.gmail.com> <41D4A140.8060502@errno.com> <1104486844.43764.6.camel@OmniBook.accton.com.tw> In-Reply-To: <1104486844.43764.6.camel@OmniBook.accton.com.tw> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit cc: Sam Leffler cc: Rong-En Fan cc: current@freebsd.org Subject: Re: 802.11 WPA and wpa_supplicant X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Dec 2004 12:57:02 -0000 Chen Lihong wrote: > I am using wpa_supplicant 0.3.2. > I can associated and authenticated with my AP with WPA/TKIP/1X-KEY-MGMT. > The hosts that at wired side can send packets to my FreeBSD station, but > wired hosts can not receive any station's packets. > Then, I use AiroPeek to capture wireless packets. I saw that any data > packet sent by wired side is encrypted, and station can decrypte that > well. > When station reply or send any packet it is not encrypted, at this time > AP may drop the packet. > I think I see the same problem, enabling 802.11 and ath debugging yields this "kernel: [00:11:95:3a:46:39] no default transmit key". I have no idea how my AP can give me an IP address but I still can't send any traffic. This was using WPA-PSK/TKIP with wpa_supplicant 0.3.0. Try enabling some debugging and check if you see the same thing: sysctl dev.ath.0.debug=0x20000 sysctl net.wlan.0.debug=0x10001000 Full kernel debug output: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 0 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 1 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 2 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 3 kernel: ath_key_update_end: kernel: ath_init: if_flags 0x8903 kernel: ath_stop_locked: invalid 0 if_flags 0x8903 kernel: ath_initkeytable: reset key 0 kernel: ath_initkeytable: reset key 1 kernel: ath_initkeytable: reset key 2 kernel: ath_initkeytable: reset key 3 kernel: ieee80211_newstate: INIT -> SCAN kernel: ieee80211_newstate: SCAN -> SCAN [more scanning] kernel: ieee80211_newstate: SCAN -> SCAN kernel: [ff:ff:ff:ff:ff:ff] send probe_req on channel 10 kernel: ath_start: ignore data packet, state 1 last message repeated 2 times kernel: ath0: received probe_resp from 00:11:95:3a:46:39 rssi 32 kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 32 kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 30 kernel: ath_key_update_begin: kernel: ath_key_update_end: kernel: ieee80211_newstate: SCAN -> AUTH kernel: [00:11:95:3a:46:39] send auth on channel 10 kernel: ath_staath_start: ignore data packet, state 2 kernel: rt: ignore data packet, state 2 kernel: ath_start: ignore data packet, state 2 kernel: ath0: received auth from 00:11:95:3a:46:39 rssi 28 kernel: ieee80211_newstate: AUTH -> ASSOC kernel: [00:11:95:3a:46:39] send assoc_req on channel 10 kernel: ath_start: ignore data packet, state 3 last message repeated 2 times kernel: ath0: received assoc_resp from 00:11:95:3a:46:39 rssi 28 kernel: ieee80211_newstate: ASSOC -> RUN kernel: ath0: associated with 00:11:95:3a:46:39 ssid "Unknown10" channel 10 start 36Mb kernel: ath_key_update_begin: kernel: ath_keyset_tkip: [00] TKIP 2135386f071435017a6381ace441f9de mac 00:00:00:00:00:00 mic f536ed0931076b74 kernel: ath_keyset_tkip: [32] TKIP 2135386f071435017a6381ace441f9de mac 00:11:95:3a:46:39 mic 2ea713b61a53cdc2 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_keyset_tkip: [02] TKIP fe34c355fc29db8723c490390296706a mac 00:00:00:00:00:00 mic 729fa3ee38c77f87 kernel: ath_key_update_end: kernel: [00:11:95:3a:46:39] TKIP replay detected kernel: [00:11:95:3a:46:39] no default transmit key kernel: [00:11:95:3a:46:39] no default transmit key dhclient: New IP Address (ath0): 192.168.10.102 dhclient: New Subnet Mask (ath0): 255.255.255.0 dhclient: New Broadcast Address (ath0): 192.168.10.255 dhclient: New Routers: 192.168.10.1 kernel: [00:11:95:3a:46:39] no default transmit key last message repeated 2 times -- Pawel