rt73 WPAPSK problem

Live forum: http://rt2x00.serialmonkey.com/viewtopic.php?t=5022

vitor.cristina

01-10-2008 18:39:34

I've been trying to use the rt73 Driver on an embedded system with linux 2.6.23.

The driver works just fine when using an open wireless network, both with a D-Link DWL-G122 C1 and with a MSI US54SE II Ver2.0.

However, when I try to establish a connection to a WEP or a WPAPSK network, I cannot get a stable link.

In attach is a dmesg log while trying to link to a WPAPSK network.

It seems to me that the problem is on the transmission of encryption keys. On a vanilla linux everithing works just fine.

Am I missing some module kernels? Am I missing some library?

Thanks in advance for your help.

Spy84464

01-10-2008 19:00:02

Hello,
You do not need any extra kernel module or library. How did you configure the stick? Which version of the driver are you using? Have you tried the latest CVS tarball?

Regards,
Romain

vitor.cristina

02-10-2008 08:22:36

Hello,

I've just tested with the latest CVS tarball.
I configured the stick with the set of iwpriv commands on the iwpriv_usage.txt file.
Attached are the dmesg output and the console with the commands that I used to configure.

by issuing iwconfig commands, It seems that everything is going fine, but then the link is lost. This happens on a cycle basis, either with WEP or WPA. Without security, the link stays up "forever".

Regards
Vitor Cristina

Spy84464

02-10-2008 19:52:02

is the access point far? That could be a simple sensitivity issue. If not, that may be a driver bug, maybe a driver developer can spot something in the dmesg trace you provided.
What do you mean by "a vanilla linux", is the kernel patched? Or did you simply mean in a non-embedded environment?

vitor.cristina

03-10-2008 07:39:47

Hello,

The Access Point is in the same room, I suposse the signal quality is not an issue.
The Kernel on the embedded system is 2.6.23 with a patch from maxim.org.za to run on a AT91RM9200 board.

From the inumerous tests I've performed, once it worked (just once).
Then I switched to a diferent AP (a Microtik router with Atheros boards) and got an error message stating that there was a timeout on the key exchange process.

I'll try to take out all debug information and run it again to see if this is a performance issue. The CPU runs at 180Mhz (200 MIPS).

Thanks for your support. Best regards,
Vitor Cristina

Spy84464

03-10-2008 18:12:07


Then I switched to a diferent AP (a Microtik router with Atheros boards) and got an error message stating that there was a timeout on the key exchange process.[/quote3dbfl6on]
Were you 100% sure the key was correct? I also observe rapid connection/disconnection cycles when setting an invalid wpa key, this is not while using a rt73 hardware, but all legacy drivers exhibit very similar behaviors.
Since your kernel is fairly recent, have you tried rt2x00?

Starcrasher

04-10-2008 22:50:05

Since your kernel is fairly recent, have you tried rt2x00?[/quote36vhdrbj]Romain, the new driver was not in 2.6.23.
Vitor Cristina, as it was introduced in 2.6.24, it is a good idea anyway.
But if you want to make this test, you will need wireless-compat package. Make a search on the forum for more info about this or simply visit Linux Wireless site[/url36vhdrbj].

vitor.cristina

07-10-2008 14:00:25

Thank you all!!!

I compiled the wireless-compat package then used wpa_supplicant and now its working.

My problem now is to put everithing on the tiny memory of the embedded system, but at least now I can see the light at the end of the tunnel.

Best Regards,
Vitor Cristina

vitor.cristina

08-10-2008 08:57:49

Bad news.

Afterall the problem is still happening.
I could only establish the connection 2 times. (the first 2).
But I think that the problem can be on some configuration.

It seems to me that for some reason that the wpa_supplicant, after some scans, wants to connect to the AP without security.

Can anybody see what am I doing wrong?

The log of wpa_supplicant
[codereky4ldu][root@MTOUCH0001 /root]$
<plicant -Dwext -iwlan0 -c/mnt/nfs/wpapsk.conf -dddd
Initializing interface 'wlan0' conf '/mnt/nfs/wpapsk.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/mnt/nfs/wpapsk.conf' -> '/mnt/nfs/wpapsk.conf'
Reading configuration file '/mnt/nfs/wpapsk.conf'
ap_scan=1
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=7):
54 45 4b 45 56 45 52 TEKEVER
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='TEKEVER'
Initializing interface (2) 'wlan0'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1f:cf:11:75:10
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 304 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1e:58:4b:12:a7 ssid='TEKEVER' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
selected based on WPA IE
selected WPA AP 00:1e:58:4b:12:a7 ssid='TEKEVER'
Try to find non-WPA AP
Trying to associate with 00:1e:58:4b:12:a7 (SSID='TEKEVER' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
Authentication with 00:1e:58:4b:12:a7 timed out.
Added BSSID 00:1e:58:4b:12:a7 into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 305 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:1e:58:4b:12:a7 ssid='TEKEVER' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
selected based on WPA IE
selected WPA AP 00:1e:58:4b:12:a7 ssid='TEKEVER'
Try to find non-WPA AP
Trying to associate with 00:1e:58:4b:12:a7 (SSID='TEKEVER' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing
Removed BSSID 00:1e:58:4b:12:a7 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
[root@MTOUCH0001 /root]$[/codereky4ldu]

Thanks you all.