from dmesg: ath0: mac 5.9 phy 4.3 radio 3.6 ath_hal: 0.9.20.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413) [root_at_ap2] 111% ifconfig -v wlan0 wlan0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 2290 ether 00:0b:6b:34:65:99 media: IEEE 802.11 Wireless Ethernet autoselect mode 11a <hostap> status: running ssid hmiln channel 52 (5260 Mhz 11a) bssid 00:0b:6b:34:65:99 regdomain DEBUG country US anywhere ecm authmode WPA -wps -tsn privacy MIXED deftxkey 2 TKIP 2:128-bit TKIP 3:128-bit powersavemode OFF powersavesleep 100 txpower 19 txpowmax 50.0 -dotd rtsthreshold 2346 fragthreshold 2346 bmiss 7 11a ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6 11b ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6 11g ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6 turboA ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6 11na ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6 11ng ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6 scanvalid 60 -bgscan bgscanintvl 300 bgscanidle 250 roam:11a rssi 7dBm rate 12 Mb/s roam:11b rssi 7dBm rate 1 Mb/s roam:11g rssi 7dBm rate 5 Mb/s roam:turboA rssi 7dBm rate 12 Mb/s roam:sturbo rssi 7dBm rate 12 Mb/s -pureg protmode CTS -ht -htcompat -ampdu ampdulimit 8k ampdudensity - -amsdu -shortgi htprotmode RTSCTS -puren -wme burst ff dturbo -dwds -hidessid apbridge dtimperiod 1 doth dfs inact bintval 100 groups: wlan I disabled WME and it behaves a little different: [root_at_ap2] 115% ifconfig wlan0 list sta ADDR AID CHAN RATE RSSI IDLE TXSEQ RXSEQ CAPS FLAG 00:13:e8:30:a7:6d 1 52 54M 25.0 0 5 10624 EP AQP WPA WME But the client (Win XP) can't get an address from the DHCP server, and if I set a static address on the client still nothing. The wired LAN is very busy, but from tcpdump it looks like the packets from the client get to the LAN, but they aren't responded to. thanks, dave c On Tue, Apr 29, 2008 at 5:19 PM, Sam Leffler <sam_at_freebsd.org> wrote: > > David Cornejo wrote: > > > Hi, > > > > I am trying to build an access point out of a Soekris 4801 - I have > > built two images from the CURRENT source, one on March 28, 2008 > > (pre-VAPS) and one from today April 29th, 2008. > > > > The 3/28 one works beautifully, the 4/29 one has authorization problems. > > > > I converted the rc.conf to the new wlan_* things. > > > > Is there something wrong with my configurations? > > > > thanks, > > dave c > > > > good old config, kernel & world built march 28th sources. > > > > === rc.conf === > > > > hostname="ap1.dogwood.com" > > > > hostapd_enable="YES" > > > > ifconfig_sis0="up" > > ifconfig_sis1="up" > > ifconfig_sis2="up" > > ifconfig_ath0="mode 11a mediaopt hostap dturbo" > > > > cloned_interfaces="bridge0" > > ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm > > sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP" > > > > ntpdate_enable="YES" > > ntpdate_flags="pool.ntp.org" > > > > sendmail_enable="NONE" > > sshd_enable="YES" > > syslogd_flags="-ss" > > rwhod_enable="YES" > > > > smartd_enable="YES" > > > > ntpd_enable="YES" > > > > === hostapd.conf > > > > interface=ath0 > > driver=bsd > > logger_syslog=-1 > > logger_syslog_level=0 > > logger_stdout=-1 > > logger_stdout_level=0 > > debug=4 > > dump_file=/tmp/hostapd.dump > > ctrl_interface=/var/run/hostapd > > ctrl_interface_group=wheel > > ssid=hoana-a > > wpa=1 > > wpa_passphrase=v1g1lance > > wpa_key_mgmt=WPA-PSK > > wpa_pairwise=TKIP > > > > === log output > > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: > associated > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1 > > notification > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start > > authentication > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > unauthorizing port > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/4 msg of 4-Way Handshake > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > > EAPOL-Key frame (2/4 Pairwise) > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > > 3/4 msg of 4-Way Handshake > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > > EAPOL-Key frame (4/4 Pairwise) > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > authorizing port > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise > > key handshake completed (WPA) > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/2 msg of Group Key Handshake > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received > > EAPOL-Key frame (2/2 Group) > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group > > key handshake completed (WPA) > > > > ========== > > > > bad new config, kernel & world built from april 29 sources > > > > === rc.conf === > > > > hostname="ap2.dogwood.com" > > > > ifconfig_sis0="up" > > ifconfig_sis1="up" > > ifconfig_sis2="up" > > ifconfig_wlan0="mode 11a" > > > > wlans_ath0="wlan0" > > create_args_wlan0="wlanmode ap" > > > > cloned_interfaces="bridge0" > > ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm > > sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP" > > hostapd_enable="YES" > > > > ntpdate_enable="YES" > > ntpdate_flags="pool.ntp.org" > > ntpd_enable="YES" > > > > sendmail_enable="NONE" > > sshd_enable="YES" > > syslogd_flags="-ss" > > rwhod_enable="YES" > > > > # HARDWARE SPECIFIC > > smartd_enable="YES" > > > > dumpdev="NO" > > > > === hostapd.conf === > > > > interface=wlan0 > > driver=bsd > > logger_syslog=-1 > > logger_syslog_level=0 > > logger_stdout=-1 > > logger_stdout_level=0 > > debug=4 > > dump_file=/tmp/hostapd.dump > > ctrl_interface=/var/run/hostapd > > ctrl_interface_group=wheel > > ssid=hmiln > > wpa=1 > > wpa_passphrase=v1g1lance > > wpa_key_mgmt=WPA-PSK > > wpa_pairwise=TKIP > > > > === log output > > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: > > associated > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1 > > notification > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start > > authentication > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > unauthorizing port > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/4 msg of 4-Way Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (2/4 Pairwise) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 3/4 msg of 4-Way Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (4/4 Pairwise) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > authorizing port > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > pairwise key handshake completed (WPA) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/2 msg of Group Key Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (2/2 Group) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group > > key handshake completed (WPA) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (Request) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key Error Request (STA detected Michael MIC failure) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/4 msg of 4-Way Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (2/4 Pairwise) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 3/4 msg of 4-Way Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (4/4 Pairwise) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > authorizing port > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > pairwise key handshake completed (WPA) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/2 msg of Group Key Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (2/2 Group) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group > > key handshake completed (WPA) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key frame (Request) > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: > > received EAPOL-Key Error Request (STA detected Michael MIC failure) > > Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures > initiated > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending > > 1/4 msg of 4-Way Handshake > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: > > deassociated > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2 > > notification > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: > > unauthorizing port > > > > Please show the output of ifconfig -v wlan0 and the mac+phy revs of the ath > card. I also need to know what hal you're using. > > This could be because wme is now enabled by default; if it's on try turning > it off. > > Sam >Received on Thu May 01 2008 - 18:34:14 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC