mac os 10.3.9 wpa supplicant unvollständig
hi,
tja nachbarin war gestern mit ihrem powerbook g4 hier und hat sich soo gefreut an unseren linux ap mit wpa+wpa2 (rsn) zu gehen.
leider ein totaler fehlschlag, der apple supplicant erscheint unvollständig implementiert und nicht standardkonform:
1. bietet ein ap wpa und wpa2 an, so ignoriert apple den ap ( ein anderer user hat das problem bez. seines schulnetzes gepostet)
2. mit nur wpa1, eap-tls (zertifikate), tkip im angebot kommt es zumindest zum zur erkennung als "firmenweites netzwerk" und verhandlungsbeginn der dann in der 2. stufe von apple abgebrochen wird, siehe logauszug unten.
also wieder zurück zu linux. mit sicherem aes ccmp brauch ich da garnich erst anfangen. am ap laufen bereits 3 clients mit linux und xp sp2 wpa-supplikanten problemlos. supportanfrage an apple ist gemailt ich bin gespannt auf die ausreden.
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.11: deassociated
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.11: associated
New STA
ath0: STA 00:0d:93:8b:bf:95 WPA: event 1 notification
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.1X: start authentication
EAP: State machine created
IEEE 802.1X: 00:0d:93:8b:bf:95 AUTH_PAE entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 AUTH_KEY_TX entering state NO_KEY_TRANSMIT
IEEE 802.1X: 00:0d:93:8b:bf:95 KEY_RX entering state NO_KEY_RECEIVE
IEEE 802.1X: 00:0d:93:8b:bf:95 CTRL_DIR entering state IN_OR_BOTH
IEEE 802.1X: 00:0d:93:8b:bf:95 AUTH_PAE entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state IDLE
IEEE 802.1X: 00:0d:93:8b:bf:95 KEY_RX entering state NO_KEY_RECEIVE
IEEE 802.1X: 00:0d:93:8b:bf:95 CTRL_DIR entering state FORCE_BOTH
IEEE 802.1X: 00:0d:93:8b:bf:95 AUTH_PAE entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 KEY_RX entering state NO_KEY_RECEIVE
ath0: STA 00:0d:93:8b:bf:95 WPA: start authentication
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0d:93:8b:bf:95 key_idx=0
WPA: 00:0d:93:8b:bf:95 WPA_PTK_GROUP entering state IDLE
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state AUTHENTICATION
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state AUTHENTICATION2
...
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=102 respMethod=13
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
EAP-TLS: Received packet(len=929) - Flags 0x00
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 read client certificate A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 read client key exchange A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 read certificate verify A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 read finished A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 write change cipher spec A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 write finished A
SSL: (where=0x2001 ret=0x1)
SSL: SSL_accept:SSLv3 flush data
SSL: (where=0x20 ret=0x1)
SSL: (where=0x2002 ret=0x1)
SSL: 47 bytes pending from ssl_out
SSL: 47 bytes left to be sent out (of total 47 bytes)
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 103
EAP-TLS: Done
EAP: EAP entering state SEND_REQUEST
EAP: eapReqData -> EAPOL - hexdump(len=53): 01 67 00 35 0d 00 14 03 01
00 01 01 16 03 01 00 24 33 cd 75 fe 1b 90 73 94 85 17 ea cc fc b1 99 20
c9 0e b6 76 b4 7a c7 62 86 68 ee 0d 6c 20 0c 24 81 ec bc da
EAP: EAP entering state IDLE
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:0d:93:8b:bf:95 (identifier 103)
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 10 bytes from 00:0d:93:8b:bf:95
IEEE 802.1X: version=1 type=0 length=6
EAP: code=2 identifier=103 length=6 (response)
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.1X: received EAP packet (code=2
id=103 len=6) from STA: EAP Response-TLS (13)
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state RESPONSE
EAP: EAP-Response received - hexdump(len=6): 02 67 00 06 0d 00
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=103 respMethod=13
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
EAP-TLS: Received packet(len=6) - Flags 0x00
SSL: 0 bytes pending from ssl_out
SSL: No data to be sent out
EAP-TLS: Derived key - hexdump(len=64): cc c5 c5 38 a5 2c 64 bd 3d bb a7
e0 8e e8 7b 0b 4e c7 35 38 d6 89 de 8c 41 65 af fc 83 c0 14 12 32 15 34
9a b7 7f 5e 7d 1d dc d0 23 57 78 d0 a0 3b f3 cf c9 c6 81 ab 3d f8 a6 26
07 26 0c bc d3
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: method succeeded -> SUCCESS
EAP: EAP entering state SUCCESS
EAP: Building EAP-Success (id=103)
EAP: eapReqData -> EAPOL - hexdump(len=4): 03 67 00 04
EAP: eapKeyData -> EAPOL - hexdump(len=64): cc c5 c5 38 a5 2c 64 bd 3d
bb a7 e0 8e e8 7b 0b 4e c7 35 38 d6 89 de 8c 41 65 af fc 83 c0 14 12 32
15 34 9a b7 7f 5e 7d 1d dc d0 23 57 78 d0 a0 3b f3 cf c9 c6 81 ab 3d f8
a6 26 07 26 0c bc d3
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state SUCCESS
IEEE 802.1X: Sending EAP Packet to 00:0d:93:8b:bf:95 (identifier 103)
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 BE_AUTH entering state IDLE
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state INITPMK
WPA: PMK from EAPOL state machine (len=32)
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state PTKSTART
ath0: STA 00:0d:93:8b:bf:95 WPA: sending 1/4 msg of 4-Way Handshake
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0d:93:8b:bf:95 WPA: EAPOL-Key timeout
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state PTKSTART
ath0: STA 00:0d:93:8b:bf:95 WPA: sending 1/4 msg of 4-Way Handshake
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0d:93:8b:bf:95 WPA: EAPOL-Key timeout
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state PTKSTART
ath0: STA 00:0d:93:8b:bf:95 WPA: sending 1/4 msg of 4-Way Handshake
IEEE 802.1X: 00:0d:93:8b:bf:95 REAUTH_TIMER entering state INITIALIZE
ath0: STA 00:0d:93:8b:bf:95 WPA: EAPOL-Key timeout
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state PTKSTART
ath0: STA 00:0d:93:8b:bf:95 WPA: sending 1/4 msg of 4-Way Handshake
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state DISCONNECT
madwifi_sta_deauth: addr=00:0d:93:8b:bf:95 reason_code=2
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state DISCONNECTED
WPA: 00:0d:93:8b:bf:95 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:0d:93:8b:bf:95 key_idx=0
ioctl[IEEE80211_IOCTL_DELKEY]: Invalid argument
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.11: deauthenticated due to local
deauth request
EAP: State machine removed
Wireless event: cmd=0x8c02 len=106
Custom wireless event: 'STA-TRAFFIC-STAT
mac=00:0d:93:8b:bf:95
rx_packets=5
tx_packets=10
rx_bytes=2565
tx_bytes=1992
'
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:0d:93:8b:bf:95 IEEE 802.11: deassociated