WPA with ath
Arne Schwabe
arne at rfc2549.org
Thu Feb 3 06:25:47 PST 2005
Tai-hwa Liang <avatar at mmlab.cse.yzu.edu.tw> writes:
> I guess that's why your station being deauthenticated right after
> seeing "Group rekeying completed with..." since WPA requires station
> sending group EAPOL key in encrypted form once the pairwise key is
> available and installed.
>
> In my testing environment, -CURRENT if_ath + wpa_supplicant 0.3.0
> always being kicked out by Buffalo AirStation G54 AP(firmware 2.20)
> after station completed the group key handshake; however, the same
> station/software configuration works flawlessly(read: only one 4-way
> handshake + 2 way group key exchange) with another Orinoco AP(which
> allows station to reply the last EAPOL successful message in plaintext).
>
> The attached patch works on my box. Would you please give it a try?
With this patch WPA works for me. (did not work before)
Arne
--
compiling millions of tiny c-programs...done
checking for a working configure script... not found
More information about the freebsd-current
mailing list