I'm successfully using a Linksys WPC54G adapter with a WRT54G router AP and WPA-PSK AES on an XP notebook.
However, I'm curious about why ethereal indicates that the group key eapol sent from my AP to my pc is MALFORMED.
Any ideas? Thanks
Here's a copy...
Frame 6 (137 bytes on wire, 137 bytes captured)
Arrival Time: Jan 24, 2004 23:40:41.059921000
Time delta from previous packet: 0.005241000 seconds
Time since reference or first frame: 1.196815000 seconds
Frame Number: 6
Packet Length: 137 bytes
Capture Length: 137 bytes
...
Type: 802.1X Authentication (0x888e)
802.1x Authentication
Version: 1
Type: Key (3)
Length: 119
Descriptor Type: EAPOL WPA key (254)
Key Information: 0x03a2
.... .... .... .010 = Key Descriptor Version: AES-CBC-MAC for MIC and HMAC-SHA1 for encryption (2)
.... .... .... 0... = Key Type: Group key
.... .... ..10 .... = Key Index: 2
.... .... .0.. .... = Install flag: Not set
.... .... 1... .... = Key Ack flag: Set
.... ...1 .... .... = Key MIC flag: Set
.... ..1. .... .... = Secure flag: Set
.... .0.. .... .... = Error flag: Not set
.... 0... .... .... = Request flag: Not set
Key Length: 16
Replay Counter: 2
Nonce: 8F1A989E3BDF073B6CC6A88F74A229B4...
Key IV: 74297C8E78CD523B8E2FE64E3E812BFF
WPA Key RSC: 0000000000000000
WPA Key ID: 0000000000000000
WPA Key MIC: ED2ECC053E76B53B2C4487A62531B22A
WPA Key Length: 24
WPA Key: 89D4D411809C36D9C044F5AA02877C7F...
Tag Number: 137 (Reserved tag number)
Tag length: 212
[Malformed Packet: EAPOL]