Re: 802.11 WPA and wpa_supplicant

From: Pawel Worach <pawel.worach_at_telia.com>
Date: Fri, 31 Dec 2004 13:56:50 +0100
Chen Lihong wrote:
> I am using wpa_supplicant 0.3.2.
> I can associated and authenticated with my AP with WPA/TKIP/1X-KEY-MGMT.
> The hosts that at wired side can send packets to my FreeBSD station, but
> wired hosts can not receive any station's packets.
> Then, I use AiroPeek to capture wireless packets. I saw that any data
> packet sent by wired side is encrypted, and station can decrypte that
> well. 
> When station reply or send any packet it is not encrypted, at this time
> AP may drop the packet.
> 

I think I see the same problem, enabling 802.11 and ath debugging
yields this "kernel: [00:11:95:3a:46:39] no default transmit key".
I have no idea how my AP can give me an IP address but I still can't
send any traffic. This was using WPA-PSK/TKIP with wpa_supplicant
0.3.0.

Try enabling some debugging and check if you see the same thing:
sysctl dev.ath.0.debug=0x20000
sysctl net.wlan.0.debug=0x10001000

Full kernel debug output:
kernel: ath_key_update_begin:
kernel: ath_key_delete: delete key 0
kernel: ath_key_update_end:
kernel: ath_key_update_begin:
kernel: ath_key_delete: delete key 1
kernel: ath_key_update_end:
kernel: ath_key_update_begin:
kernel: ath_key_delete: delete key 2
kernel: ath_key_update_end:
kernel: ath_key_update_begin:
kernel: ath_key_delete: delete key 3
kernel: ath_key_update_end:
kernel: ath_init: if_flags 0x8903
kernel: ath_stop_locked: invalid 0 if_flags 0x8903
kernel: ath_initkeytable: reset key 0
kernel: ath_initkeytable: reset key 1
kernel: ath_initkeytable: reset key 2
kernel: ath_initkeytable: reset key 3
kernel: ieee80211_newstate: INIT -> SCAN
kernel: ieee80211_newstate: SCAN -> SCAN
[more scanning]
kernel: ieee80211_newstate: SCAN -> SCAN
kernel: [ff:ff:ff:ff:ff:ff] send probe_req on channel 10
kernel: ath_start: ignore data packet, state 1
last message repeated 2 times
kernel: ath0: received probe_resp from 00:11:95:3a:46:39 rssi 32
kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 32
kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 30
kernel: ath_key_update_begin:
kernel: ath_key_update_end:
kernel: ieee80211_newstate: SCAN -> AUTH
kernel: [00:11:95:3a:46:39] send auth on channel 10
kernel: ath_staath_start: ignore data packet, state 2
kernel: rt: ignore data packet, state 2
kernel: ath_start: ignore data packet, state 2
kernel: ath0: received auth from 00:11:95:3a:46:39 rssi 28
kernel: ieee80211_newstate: AUTH -> ASSOC
kernel: [00:11:95:3a:46:39] send assoc_req on channel 10
kernel: ath_start: ignore data packet, state 3
last message repeated 2 times
kernel: ath0: received assoc_resp from 00:11:95:3a:46:39 rssi 28
kernel: ieee80211_newstate: ASSOC -> RUN
kernel: ath0: associated with 00:11:95:3a:46:39 ssid "Unknown10" channel 10 
start 36Mb
kernel: ath_key_update_begin:
kernel: ath_keyset_tkip: [00] TKIP    2135386f071435017a6381ace441f9de mac 
00:00:00:00:00:00 mic f536ed0931076b74
kernel: ath_keyset_tkip: [32] TKIP    2135386f071435017a6381ace441f9de mac 
00:11:95:3a:46:39 mic 2ea713b61a53cdc2
kernel: ath_key_update_end:
kernel: ath_key_update_begin:
kernel: ath_keyset_tkip: [02] TKIP    fe34c355fc29db8723c490390296706a mac 
00:00:00:00:00:00 mic 729fa3ee38c77f87
kernel: ath_key_update_end:
kernel: [00:11:95:3a:46:39] TKIP replay detected <rsc 0, csc 0>
kernel: [00:11:95:3a:46:39] no default transmit key
kernel: [00:11:95:3a:46:39] no default transmit key
dhclient: New IP Address (ath0): 192.168.10.102
dhclient: New Subnet Mask (ath0): 255.255.255.0
dhclient: New Broadcast Address (ath0): 192.168.10.255
dhclient: New Routers: 192.168.10.1
kernel: [00:11:95:3a:46:39] no default transmit key
last message repeated 2 times

-- 
Pawel
Received on Fri Dec 31 2004 - 11:57:02 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:25 UTC