Re: Getting WPA to work on ath(4)

From: Tai-hwa Liang <avatar_at_mmlab.cse.yzu.edu.tw>
Date: Wed, 22 Jun 2005 07:51:01 +0800 (CST)
On Tue, 21 Jun 2005, Wilko Bulte wrote:
> Hi,
>
> Today I decided to spend some time getting WPA to work
> on my Netgear ath(4) card. The base station is a Netgear
> WG602V3.  The AP is configured with WPA-PSK (it cannot do
> anything else).
>
> To make sure that things are sortof sound on the AP side
> I have setup 2 laptops using Windows with WPA.  Both work
> OK.
>
> One of these laptops that has the Netgear card and is dual
> boot with -current.
>
> Basically FreeBSD also (but only sortof) works with WPA
> on the ath(4).
>
> I setup a wpa_supplicant.conf taking the 'home network'
> example from the man page.
>
> What I get from wpa_supplicant on a regular interval is:
>
> Trying to associate with <MAC of AP> (SSID=<foo> freq=2412MHz)
> Associated with <MAC of AP>
> WPA: Key negotiation completeted with <MAC of AP> [PTK=CCMP GTK=TKOP]
>
> <some time passes; sometimes dhclient gets IP address and data flows
> to the outside world correctly>
>
> Disconnect event - remove keys     <--- why is this?
>
> This process repeats itself over and over.
>
> Am I missing something obvious?

   Did you enable WME on the AP?  I remembered that AP would deauth. your
client if MIC errors are detected in your frames. Disable WME on both side
might help(or to replace your TKIP group key with CCMP).

   If that still doesn't work, try to turn more debugging message on with:

 	80211debug +debug +crypto +auth

   Next time you're disconnected, dmesg may have something like:
.
.
[MAC of AP] send station deauthenticate (reason X)
[MAC of AP] send deauth on channel Y
.
.

Cheers,

Tai-hwa Liang
Received on Tue Jun 21 2005 - 21:51:04 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:37 UTC