Johannes Berg wrote:
> On Wed, 2006-06-07 at 10:47 -0500, Larry Finger wrote:
>
>> I have a little more information on what is happening.
>
> Great.
>
>> In IEEE Std 802.11i-2004, which defines the
>> WPA protocol, Figure 11a shows the sequence of exchanges needed to
>> associate. Both bcm43xx-softmac
>> and ndiswrapper go through the "Open System Authentication" process.
>
> Right, you always have to do that.
>
>> Where they seem to diverge is
>> in the STA's "Association Request (Security Parameters)" step. With
>> ndiswrapper, the AP responds
>> with a WPA EAPOL-Key message; whereas with softmac, the AP sends back the
>> "invalid pairwise cipher
>> message" and rejects the association.
>
> Interesting. That's strange.
>
>> Can anyone point to a reference that states what the content of the
>> Association Request should be to
>> get the AP to respond with the EAPOL-Key message? Unfortunately, I have no
>> possibility of
>> implementing a sniffer to see what a "correct" message contains.
>
> Well, it should be shown in the 802.11i spec too.
Beware of the order of IE's in the management frames; some AP's are
touchy about this.
Sam
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html