OpenWrt Forum Archive

Topic: What other supplicant besides wpa_supplicant can I use?

The content of this topic has been archived on 25 Mar 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.

Hello world,

I'm trying to isolate an issue I'm seeing with some DSL routers, specifically:

  • AT&T - Uverse

  • AT&T - Pace

  • AT&T - Arris

  • Verizon - FiOS

  • Xfinity - HOME

The issue I see, below, is when I try to connect using WPA2:

1495759332.988382: Successfully initialized wpa_supplicant
1495759336.851410: wlan0: SME: Trying to authenticate with e0:22:04:0c:3b:9a (SSID='ATT7yrg2U6' freq=2437 MHz)
1495759336.897855: wlan0: CTRL-EVENT-DISCONNECTED bssid=e0:22:04:0c:3b:9a reason=2 locally_generated=1
1495759337.867456: wlan0: Trying to associate with e0:22:04:0c:3b:9a (SSID='ATT7yrg2U6' freq=2437 MHz)
1495759337.986141: wlan0: Associated with e0:22:04:0c:3b:9a
1495759338.998475: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759338.998618: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759338.999122: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759338.999227: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759339.982425: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759339.982569: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759340.965901: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759340.966043: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759341.948180: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759341.948323: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759343.024263: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759343.024406: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759343.925354: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759343.925497: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759344.903828: wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
1495759344.903970: wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
1495759345.918475: wlan0: CTRL-EVENT-DISCONNECTED bssid=e0:22:04:0c:3b:9a reason=15

I have a Ralink/MediaTek RT3352 using the rt2x00 driver (Barrier Breaker). I don't see this issue when I set:

nohwcrypt=1

I don't see this issue associating with non-ISP routers such as Netgear, Linksys, Asus, etc. I'm going through the process of elimination to get to the bottom of the issue and I need to rule out wpa_supplicant. I'd also appreciate it if someone has run into the issue and found away around it. I need to run with hardware encryption or the whole system goes to pot; so I need to find a solution to this issue.

Thanks.

As far as I'm aware everyone on Linux is using wpa_supplicant (Wicd, connman, networkmanager etc.) and there are no alternatives for WPA2

Maybe use an different version / configuration?

Thanks Sera

The DSL router should be configured to WPA2 with AES (CCMP) forced.  TKIP is obsolete and less secure.

Setting nohwcrypt tells the driver in the kernel to encrypt packets in software rather than try to use the hardware encryption engine in the wifi chip.  The clear packets sent to user space (where wpa-supplicant runs) should be identical in either case.  This appears to be a driver bug.  wpa-supplicant is likely not even aware of your hwcrypt setting.

Barrier Breaker's kernel and driver suite is now very old.

The discussion might have continued from here.