From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
To: linux-wireless@vger.kernel.org
Cc: mathieu-tl@ubuntu.com
Subject: Issues with IBSS/WPA being created unsecured IBSS
Date: Fri, 16 Mar 2012 16:23:17 -0400 [thread overview]
Message-ID: <4F63A135.1060909@canonical.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 10054 bytes --]
Hi,
I'm trying to figure out how to fix WPA-secured IBSS; which appears to
be silently falling back to creating unsecured IBSS networks at the
kernel level (or IBSS/RSN really, if need be, as it seems to react
pretty much just the same, although I understand it's not supported by
all devices).
That bug has been initially reported at
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/905748.
This has been tested on around version 3.2.11 (Ubuntu
3.2.0-18.29-generic 3.2.9); and observed on iwlwifi, iwl496, ath9k and
rt2800pci.
Wpasupplicant 0.7.3-6 appears to be creating the IBSS network just fine,
but running into an issue with the nl80211 layer:
mtrudel@gaea ~/Documents % sudo wpa_supplicant -dd -cwpa-adhoc.conf
-iwlan0 -Dnl80211
Initializing interface 'wlan0' conf 'wpa-adhoc.conf' driver 'nl80211'
ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa-adhoc.conf' ->
'/home/mtrudel/Documents/wpa-adhoc.conf'
Reading configuration file '/home/mtrudel/Documents/wpa-adhoc.conf'
ap_scan=2
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=10):
74 65 73 74 20 61 64 68 6f 63 test adhoc
mode=1 (0x1)
frequency=2412 (0x96c)
proto: 0x1
key_mgmt: 0x10
pairwise: 0x1
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='test adhoc'
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: ac:72:89:85:33:38
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=0
set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=1
set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=2
set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=3
set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=4
set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x495e2c key_idx=5
set_tx=0 seq_len=0 key_len=0
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 16 9c 02 d6 0f ea 57
44 bc 3b 45 1a 38 3d b8 9d
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'test adhoc'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 1 key_mgmt 16 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK NONE
WPA: using KEY_MGMT WPA-NONE
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00
No keys have been configured - skip key clearing
wpa_driver_nl80211_set_key: ifindex=3 alg=2 addr=0x495e2c key_idx=0
set_tx=1 seq_len=6 key_len=32
nl80211: set_key failed; err=-67 Link has been severed)
State: SCANNING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
nl80211: Join IBSS (ifindex=3)
* SSID - hexdump_ascii(len=10):
74 65 73 74 20 61 64 68 6f 63 test adhoc
* freq=2412
* Extra IEs for Beacon/Probe Response frames - hexdump(len=24): dd 16
00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00
nl80211: Join IBSS request sent successfully
wpa_driver_nl80211_set_key: ifindex=3 alg=2 addr=0x495e2c key_idx=0
set_tx=1 seq_len=6 key_len=32
nl80211: set_key failed; err=-67 Link has been severed)
Cancelling authentication timeout
State: ASSOCIATING -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed (auth)
[id=-1 id_str=]
wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=ForceAuthorized
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
nl80211: Event message available
nl80211: IBSS 52:c8:0d:3f:f1:0f joined
State: COMPLETED -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=52:c8:0d:3f:f1:0f
Select network based on association information
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 1 key_mgmt 16 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK NONE
WPA: using KEY_MGMT WPA-NONE
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=ForceAuthorized
EAPOL: Supplicant port status: Unauthorized
Associated with 52:c8:0d:3f:f1:0f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state S_FORCE_AUTH
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
Cancelling authentication timeout
State: ASSOCIATED -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 52:c8:0d:3f:f1:0f completed
(reauth) [id=0 id_str=]
wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
Cancelling scan request
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (12 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 00:22:90:50:1a:50 SSID 'Ubuntu'
BSS: Add new id 1 BSSID c0:c1:c0:87:9e:cd SSID 'ubuntu-cert-n-wpa'
BSS: Add new id 2 BSSID 00:26:0b:70:57:d0 SSID 'UbuntuConf'
BSS: Add new id 3 BSSID 00:1d:7e:5a:54:b2 SSID 'GVM'
BSS: Add new id 4 BSSID e0:cb:4e:ad:ef:97 SSID 'ubity'
BSS: Add new id 5 BSSID 4e:75:8f:95:91:12 SSID 'adhoc'
BSS: Add new id 6 BSSID 68:7f:74:01:51:52 SSID 'ubity_visiteur'
BSS: Add new id 7 BSSID 00:1e:e5:05:94:96 SSID 'TechWIRE'
BSS: Add new id 8 BSSID 00:14:bf:21:73:35 SSID ''
BSS: Add new id 9 BSSID e0:46:9a:69:b1:34 SSID 'LVLAPP03'
BSS: Add new id 10 BSSID 52:c8:0d:3f:f1:0f SSID 'test adhoc'
BSS: Add new id 11 BSSID c0:c1:c0:7a:97:f3 SSID 'ubuntu-cert-n-open'
New scan results available
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
As a side note, I've tried the same bit in wext after noticing the
nl80211 error, but I'm getting a similar error:
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWGENIE]: Operation not supported
wpa_driver_wext_set_psk
Association request to the driver failed
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
Cancelling authentication timeout
State: ASSOCIATING -> COMPLETED
At this point, 'iw dev wlan0 scan' lists the network as created, IBSS,
and using WPA version 1:
mtrudel@gaea ~/Documents % sudo iw dev wlan0 scan
[...]
BSS 52:c8:0d:3f:f1:0f (on wlan0) -- joined
freq: 2412
beacon interval: 100
capability: IBSS (0x0002)
signal: 0.00 dBm
last seen: 24888 ms ago
SSID: test adhoc
Supported rates: 1.0* 2.0 5.5 11.0 6.0 9.0 12.0 18.0
DS Parameter set: channel 1
Extended supported rates: 24.0 36.0 48.0 54.0
WPA: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: Use group cipher suite
* Authentication suites: 00-50-f2:0
WMM: information: 01 00
Other systems see that network the same way in iw; but succeed it
connecting with an invalid key. On Android; that IBSS network is seen as
Open.
Anyone has clues on how to further debug this?
Thanks.
--
Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
Freenode: cyphermox, Jabber: mathieu.tl@gmail.com
4096R/EE018C93 1967 8F7D 03A1 8F38 732E FF82 C126 33E1 EE01 8C93
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 900 bytes --]
next reply other threads:[~2012-03-16 20:23 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-03-16 20:23 Mathieu Trudel-Lapierre [this message]
2012-03-16 23:30 ` Issues with IBSS/WPA being created unsecured IBSS Nicolas Cavallari
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4F63A135.1060909@canonical.com \
--to=mathieu.trudel-lapierre@canonical.com \
--cc=linux-wireless@vger.kernel.org \
--cc=mathieu-tl@ubuntu.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).