ignores TPTK; can't verify EAPOL-Key integrity
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wpa (Ubuntu) |
Expired
|
Undecided
|
Unassigned |
Bug Description
ioctl[SIOCSIWEN
ioctl[SIOCSIWEN
ioctl[SIOCSIWSCAN]: Device or resource busy
wlan0: Failed to initiate AP scan
wlan0: Trying to associate with $BSSID (SSID=$BSSID freq=2462 MHz)
ioctl[SIOCSIWFREQ]: Device or resource busy
wlan0: Association request to the driver failed
wlan0: Associated with $BSSID
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
^C
# wl
ioctl[SIOCSIWEN
ioctl[SIOCSIWEN
wlan0: Trying to associate with 00:22:6b:fc:89:53 (SSID='HringidanET' freq=2462 MHz)
ioctl[SIOCSIWFREQ]: Device or resource busy
wlan0: Association request to the driver failed
wlan0: Associated with 00:22:6b:fc:89:53
wlan0: WPA: Key negotiation completed with 00:22:6b:fc:89:53 [PTK=CCMP GTK=TKIP]
wlan0: CTRL-EVENT-
[time passes]
wlan0: WPA: Group rekeying completed with $BSSID [GTK=TKIP]
On the first invocation of wpa_supplicant (by site-local script wl), the message integrity code (MIC) check fails repeatedly. But after an interrupt, a second invocation (the last two times I tried) succeeded immediately. Rekeying usually succeeds.
ProblemType: Bug
DistroRelease: Ubuntu 13.04
Package: wpasupplicant 1.0-3ubuntu1
ProcVersionSign
Uname: Linux 3.8.0-31-generic i686
ApportVersion: 2.9.2-0ubuntu8.3
Architecture: i386
Date: Sun Oct 20 20:03:08 2013
EcryptfsInUse: Yes
InstallationDate: Installed on 2013-03-05 (229 days ago)
InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Release i386 (20121017.2)
MarkForUpload: True
ProcEnviron:
TERM=rxvt
PATH=(custom, no user)
XDG_RUNTIME_
LANG=is_IS.UTF-8
SHELL=/bin/bash
SourcePackage: wpa
UpgradeStatus: Upgraded to raring on 2013-05-06 (167 days ago)
description: | updated |
Changed in wpa (Ubuntu): | |
status: | New → Incomplete |
[Expired for wpa (Ubuntu) because there has been no activity for 60 days.]