OpenWrt Forum Archive

Topic: wl500g + (wpa/x)supplicant, possible on broadcom card or wan port?

The content of this topic has been archived on 4 Apr 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.

Hi all

We're trying to get an old wl500g to work in wireless client mode.
We already made it connect to a unsecured or WEP-secured network, that works.
However, we're also trying to make it work at our school, which is using WPA2.
It uses EAP-TTLS and user login with a radius server.

The WL500g has a broadcom 4710 processor, and uses a broadcom (49xxx or 43xxx, something like that) mini pci card.

What we want to know:

- How can we know if we could get wpa2 working on that broadcom wireless card?
Is wpa2 software only and should it work with any card?
And we have to use xsupplicant (because of broadcom card), is that going to work with WPA2 / EAP-TTLS?
Or should we put in an other wireless mini pci card of a different brand with better driver support?

- Can we make wpa supplicant work on a wired port?
Our school network also has wpa on the wired network, so maybe that's the way to go?

thanks in advance

(we are using kamikaze 7.09)

(Last edited by Swing on 9 Mar 2008, 16:04)

Hi Swing,

I'm having troubles connecting a wl-500gp in client mode to a AP using the following xsupplicant.conf:

network_list = all
default_netname = eduroam
logfile = /var/log/xsupplicant.log
passive_scanning = no

eduroam
{
  type = wireless
  allow_types = eap_ttls
  force_eapol_ver = 1
  wpa_pairwise_cipher = tkip
  wpa_group_cipher = tkip

  identity = user@domain

  eap-ttls {
    root_cert = /etc/cert/rootcert.pem
    chunk_size = 1398
    random_file = /dev/urandom
    session_resume = no
    phase2_type = pap
    pap {
      username = user@domain
      password = password
    }
  }
}

I see these messages being logged:

Successfully authenticated wl0
Set new pairwise WPA key.
MIC failure on pairwise key!
Unknown MIC version!  (4)
MIC failure #1!
MIC failure on pairwise key!
Unknown MIC version!  (4)
MIC failure #2!
Enabling MIC countermeasures!
The wireless card is not associated to an AP.

Did you have any luck?




The entire log is:

[STATE] Changing from AUTHENTICATING to AUTHENTICATED.
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[CONFIG] Socket 4 (frame handler) had an event!
[ALL] Got Frame (139) :
000 | 00 1d 60 9f 22 ef 00 0f f7 b6 95 50 88 8e 01 03 | ..`."......P....
010 | 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 f7 | .y.... .........
020 | a1 27 d9 89 14 ed 41 9e bc 4c db 2e 83 7d 2a 3f | .'....A..L...}*?
030 | 84 24 ba 8e 01 f5 bf 04 56 7e 6c d1 cc 27 2e 00 | .$......V~l..'..
040 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
050 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 | ................
060 | c3 d9 c0 ec 3e 08 14 fd 0b c4 fa ef 75 ed 97 00 | ....>.......u...
070 | 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 | ....P.....P.....
080 | 50 f2 02 01 00 00 50 f2 01 28 00                | P.....P..(.
[ALL] Processing EAPoL-Key!
[INT] Processing WPA key message!
[INT] Key Descriptor      = 254
[INT] Key Information     = 01C9  (Flags : Pairwise Key, Install Key, Key Ack, MIC)
[INT] Key Descriptor Version : HMAC-MD5 for MIC and RC4 for encryption.
[INT] Key Length          = 32
[INT] Key Replay Counter  = 00 00 00 00 00 00 00 02
[INT] Key NONCE           = f7 a1 27 d9 89 14 ed 41 9e bc 4c db 2e 83 7d 2a 3f 84 24 ba 8e 01 f5 bf 04 56 7e 6c d1 cc 27 2e
[INT] Key IV              = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[INT] Key RSC             = 00 00 00 00 00 00 00 00
[INT] Key ID              = 00 00 00 00 00 00 00 00
[INT] Key MIC             = a9 c3 d9 c0 ec 3e 08 14 fd 0b c4 fa ef 75 ed 97
[INT] Key Material Length = 26
[INT] Key Data : (26)
000 | dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 | ...P.....P.....P
010 | f2 02 01 00 00 50 f2 01 28 00                   | .....P..(.
[INT] Calculating MIC for Version 1!
[INT] Key Packet #3 (response) :
[INT] Calculating MIC for Version 1!
[INT] Key Descriptor      = 254
[INT] Key Information     = 0109  (Flags : Pairwise Key, MIC)
[INT] Key Descriptor Version : HMAC-MD5 for MIC and RC4 for encryption.
[INT] Key Length          = 32
[INT] Key Replay Counter  = 00 00 00 00 00 00 00 02
[INT] Key NONCE           = 66 32 0d b7 31 58 a3 5a 25 5d 05 17 58 e9 5e d4 ab b2 cd c6 9b b4 54 11 0e 82 74 41 21 3d dc 87
[INT] Key IV              = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[INT] Key RSC             = 00 00 00 00 00 00 00 00
[INT] Key ID              = 00 00 00 00 00 00 00 00
[INT] Key MIC             = 42 94 91 47 64 55 7a 1e 7b 3e 19 ff 40 de ba 24
[INT] Key Material Length = 0
[INT] WPA IE from Key Packet (26) : dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00
[INT] WPA IE from AP Scan (26)    : dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00
[INT] TK1 : 58 a3 d7 8f 93 99 a4 5f f7 6a 82 06 6b 33 b8 a5 f1 2a ea 4e 26 fd 40 94 1f e3 58 85 e7 82 44 a6
[ALL] Frame to be sent (113) :
000 | 00 0f f7 b6 95 50 00 1d 60 9f 22 ef 88 8e 01 03 | .....P..`.".....
010 | 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 66 | ._.... ........f
020 | 32 0d b7 31 58 a3 5a 25 5d 05 17 58 e9 5e d4 ab | 2..1X.Z%]..X.^..
030 | b2 cd c6 9b b4 54 11 0e 82 74 41 21 3d dc 87 00 | .....T...tA!=...
040 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
050 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 42 | ...............B
060 | 94 91 47 64 55 7a 1e 7b 3e 19 ff 40 de ba 24 00 | ..GdUz.{>..@..$.
070 | 00                                              | .
[INT] Setting PTK1! (Index : 0 Length : 32)
[INT] Key Index : 0   Length : 32
[INT] Destination MAC : 00 0f f7 XX XX XX
[INT] Setting key : 58 a3 d7 8f 93 99 a4 5f f7 6a 82 06 6b 33 b8 a5 1f e3 58 85 e7 82 44 a6 f1 2a ea 4e 26 fd 40 94
Set new pairwise WPA key.
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[INT] Got an RTM_NEWLINK!
[INT] MIC Failure!
[INT] MIC failure :
[INT]   Key ID   : 0
[INT]   Key Type : Pairwise
MIC failure on pairwise key!
[INT] Calculating MIC for Version 4!
Unknown MIC version!  (4)
[ALL] Frame to be sent (113) :
000 | 00 0f f7 b6 95 50 00 1d 60 9f 22 ef 88 8e 01 03 | .....P..`.".....
010 | 00 5f fe 09 0c 00 00 00 00 00 00 00 00 00 00 00 | ._..............
020 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
030 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
040 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
050 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 | ...............@
060 | 43 4a 00 00 00 00 00 e8 26 4a 00 60 cf 40 00 00 | CJ......&J.`.@..
070 | 00                                              | .
MIC failure #1!
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[INT] Got an RTM_NEWLINK!
[INT] MIC Failure!
[INT] MIC failure :
[INT]   Key ID   : 0
[INT]   Key Type : Pairwise
MIC failure on pairwise key!
[INT] Calculating MIC for Version 4!
Unknown MIC version!  (4)
[ALL] Frame to be sent (113) :
000 | 00 0f f7 b6 95 50 00 1d 60 9f 22 ef 88 8e 01 03 | .....P..`.".....
010 | 00 5f fe 09 0c 00 00 00 00 00 00 00 00 00 00 00 | ._..............
020 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
030 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
040 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
050 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 | ...............@
060 | 43 4a 00 00 00 00 00 e8 26 4a 00 60 cf 40 00 00 | CJ......&J.`.@..
070 | 00                                              | .
MIC failure #2!
[ALL] No existing timers in the list!
Enabling MIC countermeasures!
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[INT] Got an RTM_NEWLINK!
[INT] Wireless TX Drop
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[INT] Got an RTM_NEWLINK!
[INT] Wireless TX Drop
[ALL] Clock tick! authWhile=29 heldWhile=58 startWhen=29 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=28 heldWhile=57 startWhen=28 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=27 heldWhile=56 startWhen=27 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=26 heldWhile=55 startWhen=26 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=25 heldWhile=54 startWhen=25 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=24 heldWhile=53 startWhen=24 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=23 heldWhile=52 startWhen=23 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=22 heldWhile=51 startWhen=22 curState=AUTHENTICATED
[ALL] Clock tick! authWhile=21 heldWhile=50 startWhen=21 curState=AUTHENTICATED
[CONFIG] Socket 5 (rtnetlink handler) had an event!
[INT] Got an RTM_NEWLINK!
[INT] AP MAC : 00 00 00 00 00 00
[INT] (cardif_linux_rtnetlink_process_SIOCGIWAP)  ws->associated == 0
The wireless card is not associated to an AP.
ASSOCIATED -> UNASSOCIATED
[ALL] (TLS-FUNCS) Cleaning up!
[ALL] (TLS-FUNCS) Cleaning up (possible after a failure)!
[AUTH TYPE] (EAP-TLS) Calling SSL_shutdown()
[AUTH TYPE]      --- SSL : SSL negotiation finished successfully
[AUTH TYPE]      --- ALERT : close notify
[CONFIG] Couldn't shut down SSL connection. We will leak memory!
[AUTH TYPE] (EAP-TLS) Freeing mytls_vars->ctx!
[AUTH TYPE] (EAP-TLS) Freeing session key const!
[ALL] (EAP-TTLS) Cleaned up.
UNASSOCIATED -> ACTIVE_SCAN
Scanning for wireless networks.  Please wait.
[STATE] Reinit state machine
[STATE] [backend_sm] IDLE -> INITIALIZE
[STATE] [backend_sm] INITIALIZE -> IDLE
[INT] Issuing active scan request for interface wl0!
[INT] Checking for returned SSID information....

The discussion might have continued from here.