Date: Thu, 03 Feb 2005 15:25:21 +0100 From: Arne Schwabe <arne@rfc2549.org> To: Tai-hwa Liang <avatar@mmlab.cse.yzu.edu.tw> Cc: freebsd-current@freebsd.org Subject: Re: WPA with ath Message-ID: <86u0otlnzi.fsf@kamino.rfc1149.org> In-Reply-To: <05020311245211.96098@www.mmlab.cse.yzu.edu.tw> (Tai-hwa Liang's message of "Thu, 3 Feb 2005 11:27:54 %2B0800 (CST)") References: <a651cd6f05012117183fead6df@mail.gmail.com> <a651cd6f05012122089521251@mail.gmail.com> <05020311245211.96098@www.mmlab.cse.yzu.edu.tw>
next in thread | previous in thread | raw e-mail | index | archive | help
Tai-hwa Liang <avatar@mmlab.cse.yzu.edu.tw> writes: > I guess that's why your station being deauthenticated right after > seeing "Group rekeying completed with..." since WPA requires station > sending group EAPOL key in encrypted form once the pairwise key is > available and installed. > > In my testing environment, -CURRENT if_ath + wpa_supplicant 0.3.0 > always being kicked out by Buffalo AirStation G54 AP(firmware 2.20) > after station completed the group key handshake; however, the same > station/software configuration works flawlessly(read: only one 4-way > handshake + 2 way group key exchange) with another Orinoco AP(which > allows station to reply the last EAPOL successful message in plaintext). > > The attached patch works on my box. Would you please give it a try? With this patch WPA works for me. (did not work before) Arne -- compiling millions of tiny c-programs...done checking for a working configure script... not found
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86u0otlnzi.fsf>