On Tue, Apr 24, 2012 at 05:26:07PM -0700, Ben Greear wrote: > On 04/24/2012 03:50 PM, Ben Greear wrote: > > I am trying some ath9k virtual clients against an ASUS N66U. > > Here is part of the N66U wifi log showing that it > > thinks sta11 is not authorized: > > > > 00:95:95:00:00:0C associated > > 00:95:95:00:00:0D associated authorized > Here's a better log. Makes me think supplicant might be at fault??? Looks more like an AP bug to me.. > sta8 failed, sta9 works fine. The difference appears to be the extra > RX EAPOL packet that sta8 receives... > 1335313181.999422: sta8: WPA: RX message 3 of 4-Way Handshake from c8:60:00:e8:88:b0 (ver=2) > 1335313181.999465: sta8: WPA: Sending EAPOL-Key 4/4 > 1335313182.063695: sta8: WPA: RX message 3 of 4-Way Handshake from c8:60:00:e8:88:b0 (ver=2) > 1335313182.063745: sta8: WPA: Sending EAPOL-Key 4/4 Either the AP did not receive the first EAPOL-Key 4/4 or processed it only after retransmitting 3/4. Supplicant side will need to to reply to retransmitted 3/4 to complete the 4-way handshake. If the AP received either of these 4/4 messages, it should be fine with the result. If it didn't receive either, it should disconnect the station. It does not look like either of those happened. -- Jouni Malinen PGP id EFC895FA -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html