Re: problems making an access point w/current

From: Sam Leffler <sam_at_freebsd.org>
Date: Tue, 29 Apr 2008 20:19:11 -0700
David Cornejo wrote:
> Hi,
> 
> I am trying to build an access point out of a Soekris 4801 - I have
> built two images from the CURRENT source, one on March 28, 2008
> (pre-VAPS) and one from today April 29th, 2008.
> 
> The 3/28 one works beautifully, the 4/29 one has authorization problems.
> 
> I converted the rc.conf to the new wlan_* things.
> 
> Is there something wrong with my configurations?
> 
> thanks,
> dave c
> 
> good old config, kernel & world built march 28th sources.
> 
> === rc.conf ===
> 
> hostname="ap1.dogwood.com"
> 
> hostapd_enable="YES"
> 
> ifconfig_sis0="up"
> ifconfig_sis1="up"
> ifconfig_sis2="up"
> ifconfig_ath0="mode 11a mediaopt hostap dturbo"
> 
> cloned_interfaces="bridge0"
> ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm
> sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP"
> 
> ntpdate_enable="YES"
> ntpdate_flags="pool.ntp.org"
> 
> sendmail_enable="NONE"
> sshd_enable="YES"
> syslogd_flags="-ss"
> rwhod_enable="YES"
> 
> smartd_enable="YES"
> 
> ntpd_enable="YES"
> 
> === hostapd.conf
> 
> interface=ath0
> driver=bsd
> logger_syslog=-1
> logger_syslog_level=0
> logger_stdout=-1
> logger_stdout_level=0
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=wheel
> ssid=hoana-a
> wpa=1
> wpa_passphrase=v1g1lance
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> 
> === log output
> 
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: associated
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1
> notification
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start
> authentication
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise
> key handshake completed (WPA)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (2/2 Group)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
> 
> ==========
> 
> bad new config, kernel & world built from april 29 sources
> 
> === rc.conf ===
> 
> hostname="ap2.dogwood.com"
> 
> ifconfig_sis0="up"
> ifconfig_sis1="up"
> ifconfig_sis2="up"
> ifconfig_wlan0="mode 11a"
> 
> wlans_ath0="wlan0"
> create_args_wlan0="wlanmode ap"
> 
> cloned_interfaces="bridge0"
> ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm
> sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP"
> hostapd_enable="YES"
> 
> ntpdate_enable="YES"
> ntpdate_flags="pool.ntp.org"
> ntpd_enable="YES"
> 
> sendmail_enable="NONE"
> sshd_enable="YES"
> syslogd_flags="-ss"
> rwhod_enable="YES"
> 
> # HARDWARE SPECIFIC
> smartd_enable="YES"
> 
> dumpdev="NO"
> 
> === hostapd.conf ===
> 
> interface=wlan0
> driver=bsd
> logger_syslog=-1
> logger_syslog_level=0
> logger_stdout=-1
> logger_stdout_level=0
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=wheel
> ssid=hmiln
> wpa=1
> wpa_passphrase=v1g1lance
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
> 
> === log output
> 
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> associated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1
> notification
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start
> authentication
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> pairwise key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/2 Group)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (Request)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key Error Request (STA detected Michael MIC failure)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> pairwise key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/2 Group)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (Request)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key Error Request (STA detected Michael MIC failure)
> Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures initiated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> deassociated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2
> notification
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port

Please show the output of ifconfig -v wlan0 and the mac+phy revs of the 
ath card.  I also need to know what hal you're using.

This could be because wme is now enabled by default; if it's on try 
turning it off.

	Sam
Received on Wed Apr 30 2008 - 01:19:12 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC