Johannes Berg wrote:
> On Wed, 2006-06-07 at 10:47 -0500, Larry Finger wrote:
> 
>> I have a little more information on what is happening. 
> 
> Great.
> 
>> In IEEE Std 802.11i-2004, which defines the 
>> WPA protocol, Figure 11a shows the sequence of exchanges needed to 
>> associate. Both bcm43xx-softmac 
>> and ndiswrapper go through the "Open System Authentication" process. 
> 
> Right, you always have to do that.
> 
>> Where they seem to diverge is 
>> in the STA's "Association Request (Security Parameters)" step. With 
>> ndiswrapper, the AP responds 
>> with a WPA EAPOL-Key message; whereas with softmac, the AP sends back the 
>> "invalid pairwise cipher 
>> message" and rejects the association.
> 
> Interesting. That's strange.
> 
>> Can anyone point to a reference that states what the content of the 
>> Association Request should be to 
>> get the AP to respond with the EAPOL-Key message? Unfortunately, I have no 
>> possibility of 
>> implementing a sniffer to see what a "correct" message contains.
> 
> Well, it should be shown in the 802.11i spec too.

Beware of the order of IE's in the management frames; some AP's are
touchy about this.

        Sam

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to