From owner-freebsd-current@FreeBSD.ORG Thu Feb 3 14:25:47 2005 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1276016A4CE for ; Thu, 3 Feb 2005 14:25:47 +0000 (GMT) Received: from dagobah.rfc1149.org (dagobah.rfc1149.org [217.160.170.141]) by mx1.FreeBSD.org (Postfix) with ESMTP id F12E643D5D for ; Thu, 3 Feb 2005 14:25:45 +0000 (GMT) (envelope-from arne@rfc2549.org) Received: from dsl-213-023-197-254.arcor-ip.net ([213.23.197.254] helo=kamino.rfc1149.org) by dagobah.rfc1149.org with esmtps (TLSv1:AES256-SHA:256) (Exim 4.43 (FreeBSD)) id 1Cwhv9-0008mi-VT; Thu, 03 Feb 2005 15:25:30 +0100 Received: by kamino.rfc1149.org (Postfix, from userid 1001) id E36594089; Thu, 3 Feb 2005 15:25:21 +0100 (CET) To: Tai-hwa Liang In-Reply-To: <05020311245211.96098@www.mmlab.cse.yzu.edu.tw> (Tai-hwa Liang's message of "Thu, 3 Feb 2005 11:27:54 +0800 (CST)") References: <05020311245211.96098@www.mmlab.cse.yzu.edu.tw> From: Arne Schwabe Date: Thu, 03 Feb 2005 15:25:21 +0100 Message-ID: <86u0otlnzi.fsf@kamino.rfc1149.org> User-Agent: Gnus/5.110003 (No Gnus v0.3) Emacs/21.3 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-RFC-Spam-Score: -0.5 (/) cc: Sam Leffler cc: Bryan Bunch cc: freebsd-current@freebsd.org Subject: Re: WPA with ath X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 03 Feb 2005 14:25:47 -0000 Tai-hwa Liang writes: > I guess that's why your station being deauthenticated right after > seeing "Group rekeying completed with..." since WPA requires station > sending group EAPOL key in encrypted form once the pairwise key is > available and installed. > > In my testing environment, -CURRENT if_ath + wpa_supplicant 0.3.0 > always being kicked out by Buffalo AirStation G54 AP(firmware 2.20) > after station completed the group key handshake; however, the same > station/software configuration works flawlessly(read: only one 4-way > handshake + 2 way group key exchange) with another Orinoco AP(which > allows station to reply the last EAPOL successful message in plaintext). > > The attached patch works on my box. Would you please give it a try? With this patch WPA works for me. (did not work before) Arne -- compiling millions of tiny c-programs...done checking for a working configure script... not found