Chen Lihong wrote: > I am using wpa_supplicant 0.3.2. > I can associated and authenticated with my AP with WPA/TKIP/1X-KEY-MGMT. > The hosts that at wired side can send packets to my FreeBSD station, but > wired hosts can not receive any station's packets. > Then, I use AiroPeek to capture wireless packets. I saw that any data > packet sent by wired side is encrypted, and station can decrypte that > well. > When station reply or send any packet it is not encrypted, at this time > AP may drop the packet. > I think I see the same problem, enabling 802.11 and ath debugging yields this "kernel: [00:11:95:3a:46:39] no default transmit key". I have no idea how my AP can give me an IP address but I still can't send any traffic. This was using WPA-PSK/TKIP with wpa_supplicant 0.3.0. Try enabling some debugging and check if you see the same thing: sysctl dev.ath.0.debug=0x20000 sysctl net.wlan.0.debug=0x10001000 Full kernel debug output: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 0 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 1 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 2 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_key_delete: delete key 3 kernel: ath_key_update_end: kernel: ath_init: if_flags 0x8903 kernel: ath_stop_locked: invalid 0 if_flags 0x8903 kernel: ath_initkeytable: reset key 0 kernel: ath_initkeytable: reset key 1 kernel: ath_initkeytable: reset key 2 kernel: ath_initkeytable: reset key 3 kernel: ieee80211_newstate: INIT -> SCAN kernel: ieee80211_newstate: SCAN -> SCAN [more scanning] kernel: ieee80211_newstate: SCAN -> SCAN kernel: [ff:ff:ff:ff:ff:ff] send probe_req on channel 10 kernel: ath_start: ignore data packet, state 1 last message repeated 2 times kernel: ath0: received probe_resp from 00:11:95:3a:46:39 rssi 32 kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 32 kernel: ath0: received beacon from 00:11:95:3a:46:39 rssi 30 kernel: ath_key_update_begin: kernel: ath_key_update_end: kernel: ieee80211_newstate: SCAN -> AUTH kernel: [00:11:95:3a:46:39] send auth on channel 10 kernel: ath_staath_start: ignore data packet, state 2 kernel: rt: ignore data packet, state 2 kernel: ath_start: ignore data packet, state 2 kernel: ath0: received auth from 00:11:95:3a:46:39 rssi 28 kernel: ieee80211_newstate: AUTH -> ASSOC kernel: [00:11:95:3a:46:39] send assoc_req on channel 10 kernel: ath_start: ignore data packet, state 3 last message repeated 2 times kernel: ath0: received assoc_resp from 00:11:95:3a:46:39 rssi 28 kernel: ieee80211_newstate: ASSOC -> RUN kernel: ath0: associated with 00:11:95:3a:46:39 ssid "Unknown10" channel 10 start 36Mb kernel: ath_key_update_begin: kernel: ath_keyset_tkip: [00] TKIP 2135386f071435017a6381ace441f9de mac 00:00:00:00:00:00 mic f536ed0931076b74 kernel: ath_keyset_tkip: [32] TKIP 2135386f071435017a6381ace441f9de mac 00:11:95:3a:46:39 mic 2ea713b61a53cdc2 kernel: ath_key_update_end: kernel: ath_key_update_begin: kernel: ath_keyset_tkip: [02] TKIP fe34c355fc29db8723c490390296706a mac 00:00:00:00:00:00 mic 729fa3ee38c77f87 kernel: ath_key_update_end: kernel: [00:11:95:3a:46:39] TKIP replay detected <rsc 0, csc 0> kernel: [00:11:95:3a:46:39] no default transmit key kernel: [00:11:95:3a:46:39] no default transmit key dhclient: New IP Address (ath0): 192.168.10.102 dhclient: New Subnet Mask (ath0): 255.255.255.0 dhclient: New Broadcast Address (ath0): 192.168.10.255 dhclient: New Routers: 192.168.10.1 kernel: [00:11:95:3a:46:39] no default transmit key last message repeated 2 times -- PawelReceived on Fri Dec 31 2004 - 11:57:02 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:25 UTC