Package: wpasupplicant Version: 0.3.8-1 Severity: important Hi, I tried to get wpasupplicant running with my internal centrino wlan using ipw2100 driver. And it somehow looses the connection right after authentication took place. My config is: ,---- | ctrl_interface=/var/run/wpa_supplicant | ctrl_interface_group=0 | eapol_version=1 | ap_scan=1 | network={ | ssid="pakulat" | scan_ssid=1 | proto=WPA | key_mgmt=WPA-PSK | psk="abcdefghijkl" | priority=4 | } `---- Using wpasupplicant -d -w -ieth2 -c/etc/wpa_supplicant.conf -Dipw gives: ,---- | ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported | Initializing interface 'eth2' conf '/etc/wpa_supplicant.conf' driver 'ipw' | Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' | Reading configuration file '/etc/wpa_supplicant.conf' | ctrl_interface='/var/run/wpa_supplicant' | ctrl_interface_group=0 | eapol_version=1 | ap_scan=1 | Priority group 0 | id=0 ssid='pakulat' | Initializing interface (2) 'eth2' | EAPOL: SUPP_PAE entering state DISCONNECTED | EAPOL: KEY_RX entering state NO_KEY_RECEIVE | EAPOL: SUPP_BE entering state INITIALIZE | EAP: EAP entering state DISABLED | EAPOL: External notification - portEnabled=0 | EAPOL: External notification - portValid=0 | wpa_driver_ipw_init is called | Own MAC address: 00:04:23:7f:cf:f4 | wpa_driver_ipw_set_wpa: enabled=1 | wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_countermeasures: enabled=0 | wpa_driver_ipw_set_drop_unencrypted: enabled=1 | Setting scan request: 0 sec 100000 usec | Starting AP scan (specific SSID) | Scan SSID - hexdump_ascii(len=7): | 70 61 6b 75 6c 61 74 pakulat | Failed to initiate AP scan. | Setting scan request: 10 sec 0 usec | Wireless event: cmd=0x8b06 len=8 | Scan timeout - try to get results | Received 275 bytes of scan results (1 BSSes) | Scan results: 1 | Selecting BSS from priority group 0 | 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0 | selected | Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=0 MHz) | Cancelling scan request | Automatic auth_alg selection: 0x1 | wpa_driver_ipw_set_auth_alg: auth_alg=0x1 | WPA: using IEEE 802.11i/D3.0 | WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2 | WPA: using GTK WEP104 | WPA: using PTK TKIP | WPA: using KEY_MGMT WPA-PSK | WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 | No keys have been configured - skip key clearing | wpa_driver_ipw_set_drop_unencrypted: enabled=1 | Setting authentication timeout: 5 sec 0 usec | EAPOL: External notification - EAP success=0 | EAPOL: External notification - EAP fail=0 | EAPOL: External notification - portControl=Auto | Wireless event: cmd=0x8b1a len=20 | Wireless event: cmd=0x8b15 len=20 | Wireless event: new AP: 00:60:b3:99:15:70 | Association event - clear replay counter | Associated to a new BSS: BSSID=00:60:b3:99:15:70 | No keys have been configured - skip key clearing | Associated with 00:60:b3:99:15:70 | EAPOL: External notification - portEnabled=0 | EAPOL: External notification - portValid=0 | EAPOL: External notification - EAP success=0 | EAPOL: External notification - portEnabled=1 | EAPOL: SUPP_PAE entering state CONNECTING | EAPOL: txStart | WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) | EAPOL: SUPP_BE entering state IDLE | EAP: EAP entering state INITIALIZE | EAP: EAP entering state IDLE | Setting authentication timeout: 10 sec 0 usec | RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added | Wireless event: cmd=0x8b1a len=20 | Wireless event: cmd=0x8b2a len=12 | Wireless event: cmd=0x8b06 len=8 | RX EAPOL from 00:60:b3:99:15:70 | Setting authentication timeout: 10 sec 0 usec | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=95 | EAPOL-Key type=254 | WPA: RX message 1 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 | WPA: Renewed SNonce - hexdump(len=32): 4b e4 6a 57 d8 02 1e 93 7c de a9 29 9d ff 8f 00 0c 87 ec 75 a1 0a 11 33 cb 28 91 9b f0 69 ae 3a | WPA: PMK - hexdump(len=32): [REMOVED] | WPA: PTK - hexdump(len=64): [REMOVED] | WPA: EAPOL-Key MIC - hexdump(len=16): 4a 00 03 bc d7 ec e7 78 18 5f 75 2d 4f 0e 54 ea | WPA: Sending EAPOL-Key 2/4 | RX EAPOL from 00:60:b3:99:15:70 | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=121 | EAPOL-Key type=254 | WPA: RX message 3 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 | WPA: Sending EAPOL-Key 4/4 | WPA: Installing PTK to the driver. | WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32 | RX EAPOL from 00:60:b3:99:15:70 | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=108 | EAPOL-Key type=254 | WPA: RX message 1 of Group Key Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: Group Key - hexdump(len=13): [REMOVED] | WPA: Installing GTK to the driver (keyidx=0 tx=0). | WPA: RSC - hexdump(len=0): | wpa_driver_ipw_set_key: alg=WEP key_idx=0 set_tx=0 seq_len=0 key_len=13 | WPA: Sending EAPOL-Key 2/2 | WPA: Key negotiation completed with 00:60:b3:99:15:70 [PTK=TKIP GTK=WEP-104] | Cancelling authentication timeout | EAPOL: External notification - portValid=1 | EAPOL: External notification - EAP success=1 | EAPOL: SUPP_PAE entering state AUTHENTICATING | EAPOL: SUPP_BE entering state SUCCESS | EAPOL: SUPP_PAE entering state AUTHENTICATED | EAPOL: SUPP_BE entering state IDLE | RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added | Wireless event: cmd=0x8b15 len=20 | Wireless event: new AP: 00:00:00:00:00:00 | Setting scan request: 0 sec 100000 usec | Added BSSID 00:60:b3:99:15:70 into blacklist | EAPOL: External notification - portEnabled=0 | EAPOL: SUPP_PAE entering state DISCONNECTED | EAPOL: SUPP_BE entering state INITIALIZE | EAP: EAP entering state DISABLED | EAPOL: External notification - portValid=0 | EAPOL: External notification - EAP success=0 | Disconnect event - remove keys | wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 | wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 | Starting AP scan (broadcast SSID) | Scan timeout - try to get results | Received 276 bytes of scan results (1 BSSes) | Scan results: 1 | Selecting BSS from priority group 0 | 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0 | skip - blacklisted | No APs found - clear blacklist and try again | Removed BSSID 00:60:b3:99:15:70 from blacklist (clear) | Selecting BSS from priority group 0 | 0: 00:60:b3:99:15:70 ssid='pakulat' wpa_ie_len=26 rsn_ie_len=0 | selected | Trying to associate with 00:60:b3:99:15:70 (SSID='pakulat' freq=0 MHz) | Cancelling scan request | Automatic auth_alg selection: 0x1 | wpa_driver_ipw_set_auth_alg: auth_alg=0x1 | WPA: using IEEE 802.11i/D3.0 | WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 2 | WPA: using GTK WEP104 | WPA: using PTK TKIP | WPA: using KEY_MGMT WPA-PSK | WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 | No keys have been configured - skip key clearing | wpa_driver_ipw_set_drop_unencrypted: enabled=1 | Setting authentication timeout: 5 sec 0 usec | EAPOL: External notification - EAP success=0 | EAPOL: External notification - EAP fail=0 | EAPOL: External notification - portControl=Auto | Wireless event: cmd=0x8b1a len=20 | Wireless event: cmd=0x8b15 len=20 | Wireless event: new AP: 00:60:b3:99:15:70 | Association event - clear replay counter | Associated to a new BSS: BSSID=00:60:b3:99:15:70 | No keys have been configured - skip key clearing | Associated with 00:60:b3:99:15:70 | EAPOL: External notification - portEnabled=0 | EAPOL: External notification - portValid=0 | EAPOL: External notification - EAP success=0 | EAPOL: External notification - portEnabled=1 | EAPOL: SUPP_PAE entering state CONNECTING | EAPOL: txStart | WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) | EAPOL: SUPP_BE entering state IDLE | EAP: EAP entering state INITIALIZE | EAP: EAP entering state IDLE | Setting authentication timeout: 10 sec 0 usec | RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added | RX EAPOL from 00:60:b3:99:15:70 | Setting authentication timeout: 10 sec 0 usec | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=95 | EAPOL-Key ioctl[SIOCSIWSCAN{,EXT}]: Operation not supported | type=254 | WPA: RX message 1 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 | WPA: Renewed SNonce - hexdump(len=32): dd a1 0b ae f3 a2 02 cf 31 4a 34 5a 52 e1 f6 2e 52 e2 78 68 d1 f1 23 0a c5 f9 4f 17 32 bc 6c 71 | WPA: PMK - hexdump(len=32): [REMOVED] | WPA: PTK - hexdump(len=64): [REMOVED] | WPA: EAPOL-Key MIC - hexdump(len=16): 96 fc 29 5f bd 97 93 dd 2a cf e8 c2 02 55 f9 f7 | WPA: Sending EAPOL-Key 2/4 | RX EAPOL from 00:60:b3:99:15:70 | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=121 | EAPOL-Key type=254 | WPA: RX message 3 of 4-Way Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 | WPA: Sending EAPOL-Key 4/4 | WPA: Installing PTK to the driver. | WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32 | RX EAPOL from 00:60:b3:99:15:70 | EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | IEEE 802.1X RX: version=1 type=3 length=108 | EAPOL-Key type=254 | WPA: RX message 1 of Group Key Handshake from 00:60:b3:99:15:70 (ver=1) | WPA: Group Key - hexdump(len=13): [REMOVED] | WPA: Installing GTK to the driver (keyidx=0 tx=0). | WPA: RSC - hexdump(len=0): | wpa_driver_ipw_set_key: alg=WEP key_idx=0 set_tx=0 seq_len=0 key_len=13 | WPA: Sending EAPOL-Key 2/2 | WPA: Key negotiation completed with 00:60:b3:99:15:70 [PTK=TKIP GTK=WEP-104] | Cancelling authentication timeout | EAPOL: External notification - portValid=1 | EAPOL: External notification - EAP success=1 | EAPOL: SUPP_PAE entering state AUTHENTICATING | EAPOL: SUPP_BE entering state SUCCESS | EAPOL: SUPP_PAE entering state AUTHENTICATED | EAPOL: SUPP_BE entering state IDLE `---- Andreas -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (990, 'unstable'), (500, 'experimental'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.11.7-nocherry Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages wpasupplicant depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7e-3 SSL shared libraries -- no debconf information