On Thu, 2012-10-18 at 09:30 +0200, Cedric Debarge wrote: > Hi all, > > I am not sure if this is the right place to post my question. Please forgive me if not. > > I am experimenting roaming between two APs with wpa_supplicant (WPA2 + EAP-TLS). > When WPA_Supplicant come back from an AP for which it has already cached the key, I saw that during WPA2 4 Handshake (in case of reassociation), data are sent through wpa_supplicant unencrypted. > > As soon as the WPA2 successfully ends its negotiation, the data are sent encrypted back. > > I attached to this email a Wireshark capture of the wireless transaction. Before this capture the frames were correctly encrypted. > You can see the start of the WPA2 4 Handshake protocol at packet number 10. > During this 4 Handshake protocol you could see unencrypted iperf (UDP 5001) packets N°12/17/18/22/24.. until packet 55. > 4 Handshake protocol ends at packet 49. > > Can you give me some clue how to work it out ? Can you show the wpa_supplicant debug log for this? johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html