From owner-freebsd-mobile@FreeBSD.ORG Wed Oct 15 04:22:04 2003 Return-Path: Delivered-To: freebsd-mobile@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 80F3916A4B3 for ; Wed, 15 Oct 2003 04:22:04 -0700 (PDT) Received: from mx-b.gicm.net (MX-B.GICM.NET [194.51.218.3]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2554F43FA3 for ; Wed, 15 Oct 2003 04:22:02 -0700 (PDT) (envelope-from Jean-Paul.Chapalain@gicm.fr) Received: from sas-a.gicm.net ([10.154.29.20])h9FBLwS1027735 for ; Wed, 15 Oct 2003 13:21:58 +0200 Received: from dns-platine-2.platine.federalservice.fr (localhost.localdomain [127.0.0.1])h9FBRs3Y016637 for ; Wed, 15 Oct 2003 13:27:55 +0200 Received: from gicm.fr with ESMTP id NAA24653 for ; Wed, 15 Oct 2003 13:21:53 +0200 (MET DST) Message-ID: <3F8D2D52.4060200@gicm.fr> Date: Wed, 15 Oct 2003 13:19:46 +0200 From: Jean-Paul Chapalain User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4) Gecko/20030624 X-Accept-Language: en-us, en MIME-Version: 1.0 To: freebsd-mobile@freebsd.org X-Enigmail-Version: 0.76.7.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-GICM-Archive-out: 20031015132157.53818 X-Scanned-By: MIMEDefang 2.33 (www . roaringpenguin . com / mimedefang) Subject: if_wi 104 bit WEP rx problem X-BeenThere: freebsd-mobile@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Mobile computing with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 15 Oct 2003 11:22:04 -0000 > Hi, > > at my university they recently switched to 104 bit wep key encryption > (whatever this shall be good for; i'd prefer ipsec...). > > I have an orinoco card that should have a firmware supporting 104 bit > wep keys (me followed the link on fenner's homepage). > > info: > > FreeBSD 5.0-CURRENT #0: Mon Mar 24 22:43:31 UTC 2003 > > wi0: at port 0x100-0x13f irq 9 function 0 config 1 on pccard1 > wi0: 802.11 address: 00:xx:xx:my:_m:ac > wi0: using Lucent Technologies, WaveLAN/IEEE > wi0: Lucent Firmware: Station (8.10.1) > wi0: supported rates: 1Mbps 2Mbps 5.5Mbps 11Mbps > > It is still running fine with 40 bit keys but with 104 bit keys I seem > to have a problem. sending seems to work fine but receiving gives errors: > (hope I got the correct traces:) > > kernel: wi_newstate: INIT -> INIT > kernel: wi_newstate: INIT -> INIT > kernel: wi_newstate: INIT -> INIT > kernel: wi_newstate: INIT -> INIT > kernel: wi_newstate: INIT -> INIT > kernel: wi_info_intr: LINK_STAT 0x1 > kernel: wi_newstate: INIT -> RUN > > kernel: TODS 00:xx:xx:my:_m:ac->33:33:ff:my:_m:ac(00:xx:xx:49:xy:xz) data WEP > kernel: 0841 0000 0002 2d49 2324 0002 2d0f d274 3333 ff0f d274 0000 0000 0000 0000 > kernel: status 0x0 rx_tstamp1 0 rx_tstamp0 0x0 rx_silence 0 > kernel: rx_signal 0 rx_rate 0 rx_flow 0 > kernel: tx_rtry 0 tx_rate 0 tx_ctl 0xc dat_len 72 > kernel: ehdr dst 33:33:ff:my:_m:ac src 00:xx:xx:my:_m:ac type 0xdd86 > > kernel: FRDS 00:xx:xx:my:_m:ac->01:60:1d:00:01:00(00:xx:xx:49:xy:xz) data WEP +166 > kernel: 0842 0000 0160 1d00 0100 0002 2d49 2324 0002 2d0f d274 5048 0527 19a8 251a > kernel: status 0x2 rx_tstamp1 12007 rx_tstamp0 0x4 rx_silence 128 > kernel: rx_signal 166 rx_rate 20 rx_flow 144 > kernel: tx_rtry 0 tx_rate 0 tx_ctl 0x0 dat_len 60 > kernel: ehdr dst ab:1d:86:23:b0:7b src 34:12:b3:43:65:27 type 0x3c00 > kernel: wi_rx_intr: fid ca error status 2 > > kernel: TODS 00:xx:xx:my:_m:ac->ff:ff:ff:ff:ff:ff(00:xx:xx:49:xy:xz) data WEP > kernel: 0841 0000 0002 2d49 2324 0002 2d0f d274 ffff ffff ffff 1000 0000 0000 0000 > kernel: status 0x0 rx_tstamp1 0 rx_tstamp0 0x0 rx_silence 0 > kernel: rx_signal 0 rx_rate 0 rx_flow 0 > kernel: tx_rtry 0 tx_rate 0 tx_ctl 0xc dat_len 336 > kernel: ehdr dst ff:ff:ff:ff:ff:ff src 00:xx:xx:my:_m:ac type 0x8 > .... > > What I can see the status is either 0x1 or 0x2 with 104 bits but > is 0x2000 with 40 bits. > > From what I understand WEP decryption is done in card itself ? So > is this a firmware problem ? > > Any ideas on how to better debug this ? > > Thanks in advance. > > -- > Bjoern A. Zeeb bzeeb at Zabbadoz dot NeT > 56 69 73 69 74 http://www.zabbadoz.net/ Have you find a solution ? I've the same problem with a Linux machine. I've a redhat 7.3 (Kernel 2.4.22) on Satellite Pro 4600 Toshiba. The wireless card is like PrismeII and i use orinoco_cs module. [root@blabla root]# cardctl ident Socket 0: product info: "TOSHIBA", "Wireless LAN Card", "Version 01.01", "" manfid: 0x0156, 0x0002 function: 6 (network) Whem we use 40 bits keys for WEP it-s fine but with 128 bits keys there is problems. Some others informations : -------------------------- [root@blabla root]# iwconfig eth1 Warning: Driver for device eth1 has been compiled with version 15 of Wireless Extension, while this program is using version 13. Some things may be broken... eth1 IEEE 802.11-DS ESSID:"Hello" Nickname:"custren" Mode:Managed Frequency:2.442GHz Access Point: 00:07:85:B3:48:2F Bit Rate=2Mb/s Tx-Power=15 dBm Sensitivity:1/3 Retry limit:4 RTS thr:off Fragment thr:off Encryption key:1234-5678-9012-3456-7890-1234-56 Power Management:off Link Quality:51/92 Signal level:-47 dBm Noise level:-98 dBm Rx invalid nwid:0 Rx invalid crypt:97458 Rx invalid frag:83 Tx excessive retries:0 Invalid misc:0 Missed beacon:0 [root@blabla root]# iwlist eth1 key Warning: Driver for device eth1 has been compiled with version 15 of Wireless Extension, while this program is using version 13. Some things may be broken... eth1 2 key sizes : 40, 104bits 4 keys available : [1]: 1234-5678-9012-3456-7890-1234-56 (104 bits) [2]: off [3]: off [4]: off Current Transmit Key: [1] Config of AP1200 Cisco is ike this : Using 2360 out of 32768 bytes ! version 12.2 ! hostname ap-2 ! logging console informational aaa new-model ! ! aaa authentication login default group radius local aaa authorization exec default group radius local aaa accounting exec default start-stop group radius aaa session-id common ! bridge irb ! ! interface Dot11Radio0 no ip address no ip route-cache ! encryption key 1 size 128bit 0 12345678901234567890123456 transmit-key encryption mode wep mandatory ! ssid Hello max-associations 31 authentication open accounting acct_methods infrastructure-ssid ! speed basic-1.0 2.0 5.5 11.0 rts threshold 2339 rts retries 32 power local 50 packet retries 32 channel 2442 fragment-threshold 2338 station-role root l2-filter bridge-group-acl no cdp enable infrastructure-client bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled interface FastEthernet0 ip address 10.154.91.11 255.255.255.0 no ip route-cache speed 100 full-duplex ntp broadcast client l2-filter bridge-group-acl no cdp enable bridge-group 1 no bridge-group 1 source-learning bridge-group 1 spanning-disabled ! interface BVI1 ip address 10.154.91.11 255.255.255.0 no ip route-cache ! ip default-gateway 10.154.91.254 ip http server ip http help-path radius-server host 10.154.99.65 auth-port 1812 acct-port 1813 timeout 3 key xxxxx radius-server retransmit 3 radius-server authorization permit missing Service-Type bridge 1 route ip -- -- Jean-Paul Chapalain - GICM - Reseaux et Systemes Distribues -- 32 rue Mirabeau - Le Relecq-Kerhuon - 29808 Brest Cedex 9, FRANCE -- Tel +33298002873 - Fax +33298284005 - Jean-Paul.Chapalain@gicm.fr -- Key Fingerprint: 192C 1CFE F24A 050D F280 A086 AF15 8631 3ABB 4C7D