Public bug reported: Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi with WPA/WPA2 AP's (although it should work). WEP/Unencrypted AP's yet untested! I'll give some information:
Distribution: Ubuntu 6.10 (Edgy) modinfo ath_pci version: 0.9.2.1 Kernel version: 2.6.17-11-386 Wireless protocol: WPA2/Personal (so no RADIUS server) Hardware: * 3Com card 3CRXJK10075 (PCMCIA card) * Linksys WAP54G * Broadcom BCM4318 internal chipset (used with ndiswrapper and works - used for testing the AP's connectivity) Part of the wpa_supplicant log with my 3Com 3CRXJK10075: BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 skip - blacklisted 1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE No APs found - clear blacklist and try again Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Ignore event for foreign ifindex 5 Ignore event for foreign ifindex 5 Authentication with 00:00:00:00:00:00 timed out. Added BSSID 10:23:41:91:0F:11 into blacklist State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Ignore event for foreign ifindex 5 Ignore event for foreign ifindex 5 Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 skip - blacklisted 1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE No APs found - clear blacklist and try again Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. Added BSSID 10:23:41:91:0F:11 into blacklist State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) CTRL-EVENT-TERMINATING - signal 2 received Removing interface ath0 State: SCANNING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing WEXT: Operstate: linkmode=0, operstate=6 Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Cancelling scan request Part of the wpa_supplicant log with my Broadcom chipset (working with ndiswrapper): [EMAIL PROTECTED]:~$ sudo wpa_supplicant -dd -D wext -i eth1 -c /etc/wpa_supplicant/wlanconfig Initializing interface 'eth1' conf '/etc/wpa_supplicant/wlanconfig' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wlanconfig' -> '/etc/wpa_supplicant/wlanconfig' Reading configuration file '/etc/wpa_supplicant/wlanconfig' Line: 9 - start of a new network block ssid - hexdump_ascii(len=3): 53 46 43 STFU proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='STFU' Initializing interface (2) 'eth1' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:14:a5:29:62:2e wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted Setting scan request: 0 sec 100000 usec Added interface eth1 Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 663 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 0F:9D:42:91:A0:0B ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 0F:9D:42:91:A0:0B (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=11 RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added Wireless event: cmd=0x8c07 len=67 AssocReq IE wireless event - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01 Wireless event: cmd=0x8c08 len=32 AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 0F:9D:42:91:A0:0B Association info event req_ies - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 State: ASSOCIATING -> ASSOCIATED WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=0F:9D:42:91:A0:0B No keys have been configured - skip key clearing Associated with 0F:9D:42:91:A0:0B WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RX EAPOL from 0F:9D:42:91:A0:0B RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 RSN: PMKID from Authenticator - hexdump(len=16): d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 96 ac ce 08 9e 6f 33 b3 50 58 6e ab 6c 15 bb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 0F:9D:42:91:A0:0B RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b IEEE 802.1X RX: version=2 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 key_iv - hexdump(len=16): 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 key_rsc - hexdump(len=8): 0d 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 4 0 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b RSN: encrypted key data - hexdump(len=56): 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8e 31 73 e9 ec 8b 91 68 e8 36 06 d8 a7 5a 84 d4 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 e2 19 59 6e 87 82 01 ce 1d a2 0f 24 59 07 ff 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 0d 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 0F:9D:42:91:A0:0B [PTK=CCMP GTK=CCMP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 0F:9D:42:91:A0:0B completed (auth) [id=0 id_str=] WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added EAPOL: startWhen --> 0 CTRL-EVENT-TERMINATING - signal 2 received Removing interface eth1 State: COMPLETED -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing WEXT: Operstate: linkmode=0, operstate=6 Cancelling scan request My wpa_supplicant connection file (which works fine with my ndiswrapper/Broadcom solution): network={ ssid="STFU" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP psk="password" } ** Affects: Ubuntu Importance: Undecided Status: Unconfirmed ** Description changed: - Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi - (although it should work). I'll give some information: + Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi with WPA/WPA2 AP's (although it should work). WEP/Unencrypted AP's yet untested! + I'll give some information: Distribution: Ubuntu 6.10 (Edgy) modinfo ath_pci version: 0.9.2.1 Kernel version: 2.6.17-11-386 Wireless protocol: WPA2/Personal (so no RADIUS server) Hardware: * 3Com card 3CRXJK10075 (PCMCIA card) * Linksys WAP54G * Broadcom BCM4318 internal chipset (used with ndiswrapper and works - used for testing the AP's connectivity) Part of the wpa_supplicant log with my 3Com 3CRXJK10075: BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 skip - blacklisted 1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE No APs found - clear blacklist and try again Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Ignore event for foreign ifindex 5 Ignore event for foreign ifindex 5 Authentication with 00:00:00:00:00:00 timed out. Added BSSID 10:23:41:91:0F:11 into blacklist State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Ignore event for foreign ifindex 5 Ignore event for foreign ifindex 5 Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 skip - blacklisted 1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE No APs found - clear blacklist and try again Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. Added BSSID 10:23:41:91:0F:11 into blacklist State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=0x8b19 len=8 Received 561 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=12 Authentication with 00:00:00:00:00:00 timed out. BSSID 10:23:41:91:0F:11 blacklist count incremented to 2 State: ASSOCIATING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) CTRL-EVENT-TERMINATING - signal 2 received Removing interface ath0 State: SCANNING -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing WEXT: Operstate: linkmode=0, operstate=6 Removed BSSID 10:23:41:91:0F:11 from blacklist (clear) Cancelling scan request Part of the wpa_supplicant log with my Broadcom chipset (working with ndiswrapper): [EMAIL PROTECTED]:~$ sudo wpa_supplicant -dd -D wext -i eth1 -c /etc/wpa_supplicant/wlanconfig Initializing interface 'eth1' conf '/etc/wpa_supplicant/wlanconfig' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wlanconfig' -> '/etc/wpa_supplicant/wlanconfig' Reading configuration file '/etc/wpa_supplicant/wlanconfig' Line: 9 - start of a new network block ssid - hexdump_ascii(len=3): 53 46 43 STFU proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='STFU' Initializing interface (2) 'eth1' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:14:a5:29:62:2e wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted Setting scan request: 0 sec 100000 usec Added interface eth1 Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 663 bytes of scan results (3 BSSes) Scan results: 3 Selecting BSS from priority group 0 0: 0F:9D:42:91:A0:0B ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE Trying to associate with 0F:9D:42:91:A0:0B (SSID='STFU' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag Wireless event: cmd=0x8b06 len=8 Wireless event: cmd=0x8b04 len=12 Wireless event: cmd=0x8b1a len=11 RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added Wireless event: cmd=0x8c07 len=67 AssocReq IE wireless event - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01 Wireless event: cmd=0x8c08 len=32 AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 0F:9D:42:91:A0:0B Association info event req_ies - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 State: ASSOCIATING -> ASSOCIATED WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=0F:9D:42:91:A0:0B No keys have been configured - skip key clearing Associated with 0F:9D:42:91:A0:0B WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RX EAPOL from 0F:9D:42:91:A0:0B RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 RSN: PMKID from Authenticator - hexdump(len=16): d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 96 ac ce 08 9e 6f 33 b3 50 58 6e ab 6c 15 bb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 0F:9D:42:91:A0:0B RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b IEEE 802.1X RX: version=2 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31 key_iv - hexdump(len=16): 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 key_rsc - hexdump(len=8): 0d 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 4 0 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b RSN: encrypted key data - hexdump(len=56): 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8e 31 73 e9 ec 8b 91 68 e8 36 06 d8 a7 5a 84 d4 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 e2 19 59 6e 87 82 01 ce 1d a2 0f 24 59 07 ff 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 0d 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 0F:9D:42:91:A0:0B [PTK=CCMP GTK=CCMP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 0F:9D:42:91:A0:0B completed (auth) [id=0 id_str=] WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added EAPOL: startWhen --> 0 CTRL-EVENT-TERMINATING - signal 2 received Removing interface eth1 State: COMPLETED -> DISCONNECTED WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing WEXT: Operstate: linkmode=0, operstate=6 Cancelling scan request My wpa_supplicant connection file (which works fine with my ndiswrapper/Broadcom solution): network={ ssid="STFU" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP psk="password" } -- [madwifi] 3Com 3CRXJK10075 PCMCIA (Atheros chipset) does not associate with WPA2 or WPA AP's https://launchpad.net/bugs/91508 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs