David Cornejo wrote: > Hi, > > I am trying to build an access point out of a Soekris 4801 - I have > built two images from the CURRENT source, one on March 28, 2008 > (pre-VAPS) and one from today April 29th, 2008. > > The 3/28 one works beautifully, the 4/29 one has authorization problems. > > I converted the rc.conf to the new wlan_* things. > > Is there something wrong with my configurations? > > thanks, > dave c > > good old config, kernel & world built march 28th sources. > > === rc.conf === > > hostname="ap1.dogwood.com" > > hostapd_enable="YES" > > ifconfig_sis0="up" > ifconfig_sis1="up" > ifconfig_sis2="up" > ifconfig_ath0="mode 11a mediaopt hostap dturbo" > > cloned_interfaces="bridge0" > ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm > sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP" > > ntpdate_enable="YES" > ntpdate_flags="pool.ntp.org" > > sendmail_enable="NONE" > sshd_enable="YES" > syslogd_flags="-ss" > rwhod_enable="YES" > > smartd_enable="YES" > > ntpd_enable="YES" > > === hostapd.conf > > interface=ath0 > driver=bsd > logger_syslog=-1 > logger_syslog_level=0 > logger_stdout=-1 > logger_stdout_level=0 > debug=4 > dump_file=/tmp/hostapd.dump > ctrl_interface=/var/run/hostapd > ctrl_interface_group=wheel > ssid=hoana-a > wpa=1 > wpa_passphrase=v1g1lance > wpa_key_mgmt=WPA-PSK > wpa_pairwise=TKIP > > === log output > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: associated > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1 > notification > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start > authentication > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > unauthorizing port > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > 1/4 msg of 4-Way Handshake > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > EAPOL-Key frame (2/4 Pairwise) > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > 3/4 msg of 4-Way Handshake > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > EAPOL-Key frame (4/4 Pairwise) > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > authorizing port > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise > key handshake completed (WPA) > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > 1/2 msg of Group Key Handshake > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > EAPOL-Key frame (2/2 Group) > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group > key handshake completed (WPA) > > ========== > > bad new config, kernel & world built from april 29 sources > > === rc.conf === > > hostname="ap2.dogwood.com" > > ifconfig_sis0="up" > ifconfig_sis1="up" > ifconfig_sis2="up" > ifconfig_wlan0="mode 11a" > > wlans_ath0="wlan0" > create_args_wlan0="wlanmode ap" > > cloned_interfaces="bridge0" > ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm > sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP" > hostapd_enable="YES" > > ntpdate_enable="YES" > ntpdate_flags="pool.ntp.org" > ntpd_enable="YES" > > sendmail_enable="NONE" > sshd_enable="YES" > syslogd_flags="-ss" > rwhod_enable="YES" > > # HARDWARE SPECIFIC > smartd_enable="YES" > > dumpdev="NO" > > === hostapd.conf === > > interface=wlan0 > driver=bsd > logger_syslog=-1 > logger_syslog_level=0 > logger_stdout=-1 > logger_stdout_level=0 > debug=4 > dump_file=/tmp/hostapd.dump > ctrl_interface=/var/run/hostapd > ctrl_interface_group=wheel > ssid=hmiln > wpa=1 > wpa_passphrase=v1g1lance > wpa_key_mgmt=WPA-PSK > wpa_pairwise=TKIP > > === log output > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: > associated > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1 > notification > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start > authentication > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > unauthorizing port > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 1/4 msg of 4-Way Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (2/4 Pairwise) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 3/4 msg of 4-Way Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (4/4 Pairwise) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > authorizing port > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > pairwise key handshake completed (WPA) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 1/2 msg of Group Key Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (2/2 Group) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group > key handshake completed (WPA) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (Request) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key Error Request (STA detected Michael MIC failure) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 1/4 msg of 4-Way Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (2/4 Pairwise) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 3/4 msg of 4-Way Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (4/4 Pairwise) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > authorizing port > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > pairwise key handshake completed (WPA) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 1/2 msg of Group Key Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (2/2 Group) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group > key handshake completed (WPA) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key frame (Request) > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > received EAPOL-Key Error Request (STA detected Michael MIC failure) > Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures initiated > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > 1/4 msg of 4-Way Handshake > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: > deassociated > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2 > notification > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > unauthorizing port Please show the output of ifconfig -v wlan0 and the mac+phy revs of the ath card. I also need to know what hal you're using. This could be because wme is now enabled by default; if it's on try turning it off. SamReceived on Wed Apr 30 2008 - 01:19:12 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC