#8799 HIGH 8.2.1: WPA association issue: XO do not respond to first EAPOL frame

Zarro Boogs per Child bugtracker at laptop.org
Thu Oct 30 16:12:44 EDT 2008


#8799: WPA association issue: XO do not respond to first EAPOL frame
---------------------------+------------------------------------------------
     Reporter:  carrano    |        Owner:  jcardona     
         Type:  defect     |       Status:  new          
     Priority:  high       |    Milestone:  8.2.1        
    Component:  wireless   |      Version:  not specified
   Resolution:             |     Keywords:               
  Next_action:  never set  |   Spec_stage:  unknown      
    Blockedby:             |     Blocking:               
Spec_reviewer:             |     Verified:  0            
Spec_reviewed:  0          |  
---------------------------+------------------------------------------------

Comment(by jcardona):

 One of the failure modes that we see ("bad-secinfo") is characterized by
 using
 an invalid security configuration to associate with a WPA AP.  This only
 happens when the association is requested from the GUI.  A log showing
 this
 failure is included in my previous comment:

 {{{
 [  520.445201]     secinfo:             #  <---- should be WPA
 }}}

 In my last comment I suspected the driver clearing secinfo.  Turns out
 that the security info is cleared by wpa_supplicant via a SIOCSIWAUTH
 ioctl prior to associating:

 {{{
 [70110.612569] libertas wext: IW_AUTH_WPA_VERSION_DISABLED
 }}}

 In addition to this, we've observed that this failure always happens when
 NetworkManager invokes wpa_supplicant with a ap_scan mode set to 2 (see
 /usr/share/doc/wpasupplicant/examples/README.wpa_supplicant.conf for
 details about scan modes).
 In those instances when NM invokes wpa_supplicant with ap_scan mode set to
 1 we do
 not observe this failure.

 We can successfully associate with our AP by invoking wpa_supplicant in
 both
 modes, 1 and 2.  But looking at NM source code we see that AP_SCAN 2 is
 only
 used if:

 {{{
 if (!nm_ap_get_broadcast (ap) || is_adhoc || !supports_wpa)
                 ap_scan = "AP_SCAN 2";
 }}}

 And none of these conditions should be true:

  * !nm_ap_get_broadcast (ap): true for hidden APs that do not broadcast
 their SSID (not our case)
  * is_adhoc: if the network is ad_hoc
  * !supports_wpa: if the driver reports that the hardware can't do WPA

 Our conclusion at this time is that this failure occurs because NM gets
 invalid information about the AP and invokes wpa_supplicant with invalid
 security parameters.

-- 
Ticket URL: <http://dev.laptop.org/ticket/8799#comment:7>
One Laptop Per Child <http://laptop.org/>
OLPC bug tracking system


More information about the Bugs mailing list