PDA

Ver la Versión Completa : Wpa-Psk Tkip



kosuke
18-dic-2005, 19:43
Hola,

tengo un pequeño problema que no se como solucionarlo por mas que lo he intentado. Tengo un router D-Link G604T, tiene habilitada la WLAN protegida con WPA-PSK TKIP, por ejemplo con "pepitogrillo". Tengo instalado el wpa_supplicant y mi wpa_supplicant.conf es el siguiente:

#########wpa.conf#########
ctrl_interface=/var/run/wpa_supplicant

eapol_version=1

network={
ssid="Pruebas"
proto=WPA
key_mgmt=WPA-PSK
pairwise=TKIP
psk="pepitogrillo"
}
#########wpa.conf########

He probado con 2 tarjetas diferentes (son pcmcia):

- SMC2335W(a/b) Chipset Atheros.

Tatil:/home/kosuke/capturas # wpa_supplicant -dd -cwpa.conf -iath0 -Dmadwifi
Initializing interface 'ath0' conf 'wpa.conf' driver 'madwifi'
Configuration file 'wpa.conf' -> '/home/kosuke/capturas/wpa.conf'
Reading configuration file '/home/kosuke/capturas/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 6 - start of a new network block
ssid - hexdump_ascii(len=4):
4c 61 62 73 Pruebas
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='Pruebas'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
SIOCGIWRANGE: WE(compiled)=18 WE(source)=13 enc_capa=0x0
capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: "MAC Tarjeta"
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 474 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: "MAC Router" ssid='Pruebas' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected
Trying to associate with "MAC Router" (SSID='Pruebas' freq=2447 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=17
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: "MAC Router"
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID="MAC Router"
No keys have been configured - skip key clearing
Associated with "MAC Router"
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from "MAC Router"
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 62 bd 8c a5 57 99 38 b9 00 02 fa 17 9c 99 32 4c 06 ba f4 d1 63 12 84 2b d6 a8 75 5e 79 3b 28 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 62 bd 8c a5 57 99 38 b9 00 02 fa 17 9c 99 32 4c 06 ba f4 d1 63 12 84 2b d6 a8 75 5e 79 3b 28 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from "MAC Router" (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): e8 44 8c eb d6 28 e5 53 2f ff 7f d7 c0 7d 54 08 a1 47 6b 8a de 56 d1 64 4e fe d5 60 6d c2 93 7c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=137): "MAC Router" "MAC Tarjeta" 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 e8 44 8c eb d6 28 e5 53 2f ff 7f d7 c0 7d 54 08 a1 47 6b 8a de 56 d1 64 4e fe d5 60 6d c2 93 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 82 01 3b 51 fc 64 da 95 91 dd a1 c7 ba 9a fc 66 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from "MAC Router"
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 62 bd 8c a5 57 99 38 b9 00 02 fa 17 9c 99 32 4c 06 ba f4 d1 63 12 84 2b d6 a8 75 5e 79 3b 28 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c a3 bb 7e 63 55 3a 29 75 4f 57 dd 56 cc 28 b0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 62 bd 8c a5 57 99 38 b9 00 02 fa 17 9c 99 32 4c 06 ba f4 d1 63 12 84 2b d6 a8 75 5e 79 3b 28 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c a3 bb 7e 63 55 3a 29 75 4f 57 dd 56 cc 28 b0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from "MAC Router" (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=113): "MAC Router" "MAC Tarjeta" 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 51 b4 68 53 ba 39 eb 7d f6 45 82 94 d2 ba 14 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Wireless event: cmd=0x8c02 len=81
Custom wireless event: 'MLME-REPLAYFAILURE.indication(keyid=0 unicast addr="MAC Router")'
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID "MAC Router" into blacklist
State: GROUP_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
State: SCANNING -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=0
wpa_driver_madwifi_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Control interface directory not empty - leaving it behind
Removed BSSID "MAC Router" from blacklist (clear)

Apartir de aqui es un bucle intentado conectar pero no lo hace.

- Symantec Gateway Security (g), Chipset Prism54 (FullMAC)

Tatil:/home/kosuke/capturas # wpa_supplicant -dd -cwpa.conf -Dprism54 -ieth1
Initializing interface 'eth1' conf 'wpa.conf' driver 'prism54'
Configuration file 'wpa.conf' -> '/home/kosuke/capturas/wpa.conf'
Reading configuration file '/home/kosuke/capturas/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=4):
4c 61 62 73 Pruebas
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='Pruebas'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
SIOCGIWRANGE: WE(compiled)=18 WE(source)=16 enc_capa=0x0
capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: "MAC Tarjeta"
wpa_driver_prism54_set_countermeasures - not yet implemented
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c02 len=67
Custom wireless event: 'Received a probe from client to "MAC Router" (00)'State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8c02 len=74
Custom wireless event: 'Received a beacon from an unkown AP to "MAC Otro AP" (00)'
Wireless event: cmd=0x8c02 len=67
Custom wireless event: 'Received a probe from client to "MAC Router" (00)'Wireless event: cmd=0x8c02 len=74
Custom wireless event: 'Received a beacon from an unkown AP to "MAC Otro AP" (00)'
Wireless event: cmd=0x8c02 len=76
Custom wireless event: 'Authenticate request (ex) to "MAC Router" : REJECTED (0C)'
Wireless event: cmd=0x8c02 len=76
Custom wireless event: 'Authenticate request (ex) to "MAC Router" : REJECTED (0C)'
Scan timeout - try to get results
Received 300 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: "MAC Router" ssid='Pruebas' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected
Trying to associate with "MAC Router" (SSID='Pruebas' freq=2447 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing

Apartir de aqui igual, un bucle y no funciona.

Las tarjetas funcionan perfectamente en Linux en WLANs abieras y con WEP, y en Windows funcionan en abiertas, con WEP y WPA-PSK.

A ver si alguien tiene alguna idea de porque me falla.

Un saludo.