On Wed, 2006-06-07 at 10:47 -0500, Larry Finger wrote:

> I have a little more information on what is happening. 

Great.

> In IEEE Std 802.11i-2004, which defines the 
> WPA protocol, Figure 11a shows the sequence of exchanges needed to associate. 
> Both bcm43xx-softmac 
> and ndiswrapper go through the "Open System Authentication" process. 

Right, you always have to do that.

> Where they seem to diverge is 
> in the STA's "Association Request (Security Parameters)" step. With 
> ndiswrapper, the AP responds 
> with a WPA EAPOL-Key message; whereas with softmac, the AP sends back the 
> "invalid pairwise cipher 
> message" and rejects the association.

Interesting. That's strange.

> Can anyone point to a reference that states what the content of the 
> Association Request should be to 
> get the AP to respond with the EAPOL-Key message? Unfortunately, I have no 
> possibility of 
> implementing a sniffer to see what a "correct" message contains.

Well, it should be shown in the 802.11i spec too.

johannes

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to