Re: problems making an access point w/current

From: Sam Leffler <sam_at_freebsd.org>
Date: Thu, 01 May 2008 16:28:11 -0700
Are you certain hostapd is up to date?  There was a bug like this a 
while back (before code was committed to CVS) when I failed to update 
hostapd to plumb keys correctly.  I routinely test this same config 
(i.e. card) w/o any issues.

    Sam

David Cornejo wrote:
> from dmesg:
>
> ath0: mac 5.9 phy 4.3 radio 3.6
> ath_hal: 0.9.20.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413)
>
> [root_at_ap2] 111% ifconfig -v wlan0
> wlan0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST>
> metric 0 mtu 2290
>         ether 00:0b:6b:34:65:99
>         media: IEEE 802.11 Wireless Ethernet autoselect mode 11a <hostap>
>         status: running
>         ssid hmiln channel 52 (5260 Mhz 11a) bssid 00:0b:6b:34:65:99
>         regdomain DEBUG country US anywhere ecm authmode WPA -wps -tsn
>         privacy MIXED deftxkey 2
>         TKIP 2:128-bit
>         TKIP 3:128-bit powersavemode OFF powersavesleep 100 txpower 19
>         txpowmax 50.0 -dotd rtsthreshold 2346 fragthreshold 2346 bmiss 7
>         11a    ucast NONE    mgmt  6 Mb/s mcast  6 Mb/s maxretry 6
>         11b    ucast NONE    mgmt  1 Mb/s mcast  1 Mb/s maxretry 6
>         11g    ucast NONE    mgmt  1 Mb/s mcast  1 Mb/s maxretry 6
>         turboA ucast NONE    mgmt  6 Mb/s mcast  6 Mb/s maxretry 6
>         11na   ucast NONE    mgmt  0 MCS  mcast  0 MCS  maxretry 6
>         11ng   ucast NONE    mgmt  0 MCS  mcast  0 MCS  maxretry 6
>         scanvalid 60 -bgscan bgscanintvl 300 bgscanidle 250
>         roam:11a    rssi    7dBm rate 12 Mb/s
>         roam:11b    rssi    7dBm rate  1 Mb/s
>         roam:11g    rssi    7dBm rate  5 Mb/s
>         roam:turboA rssi    7dBm rate 12 Mb/s
>         roam:sturbo rssi    7dBm rate 12 Mb/s -pureg protmode CTS -ht
>         -htcompat -ampdu ampdulimit 8k ampdudensity - -amsdu -shortgi
>         htprotmode RTSCTS -puren -wme burst ff dturbo -dwds -hidessid apbridge
>         dtimperiod 1 doth dfs inact bintval 100
>         groups: wlan
>
> I disabled WME and it behaves a little different:
>
> [root_at_ap2] 115% ifconfig wlan0 list sta
> ADDR               AID CHAN RATE RSSI IDLE  TXSEQ  RXSEQ CAPS FLAG
> 00:13:e8:30:a7:6d    1   52  54M 25.0    0      5  10624 EP   AQP  WPA WME
>
> But the client (Win XP) can't get an address from the DHCP server, and
> if I set a static address on the client still nothing.  The wired LAN
> is very busy, but from tcpdump it looks like the packets from the
> client get to the LAN, but they aren't responded to.
>
> thanks,
> dave c
>
>
> On Tue, Apr 29, 2008 at 5:19 PM, Sam Leffler <sam_at_freebsd.org> wrote:
>   
>> David Cornejo wrote:
>>
>>     
>>> Hi,
>>>
>>> I am trying to build an access point out of a Soekris 4801 - I have
>>> built two images from the CURRENT source, one on March 28, 2008
>>> (pre-VAPS) and one from today April 29th, 2008.
>>>
>>> The 3/28 one works beautifully, the 4/29 one has authorization problems.
>>>
>>> I converted the rc.conf to the new wlan_* things.
>>>
>>> Is there something wrong with my configurations?
>>>
>>> thanks,
>>> dave c
>>>
>>> good old config, kernel & world built march 28th sources.
>>>
>>> === rc.conf ===
>>>
>>> hostname="ap1.dogwood.com"
>>>
>>> hostapd_enable="YES"
>>>
>>> ifconfig_sis0="up"
>>> ifconfig_sis1="up"
>>> ifconfig_sis2="up"
>>> ifconfig_ath0="mode 11a mediaopt hostap dturbo"
>>>
>>> cloned_interfaces="bridge0"
>>> ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm
>>> sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP"
>>>
>>> ntpdate_enable="YES"
>>> ntpdate_flags="pool.ntp.org"
>>>
>>> sendmail_enable="NONE"
>>> sshd_enable="YES"
>>> syslogd_flags="-ss"
>>> rwhod_enable="YES"
>>>
>>> smartd_enable="YES"
>>>
>>> ntpd_enable="YES"
>>>
>>> === hostapd.conf
>>>
>>> interface=ath0
>>> driver=bsd
>>> logger_syslog=-1
>>> logger_syslog_level=0
>>> logger_stdout=-1
>>> logger_stdout_level=0
>>> debug=4
>>> dump_file=/tmp/hostapd.dump
>>> ctrl_interface=/var/run/hostapd
>>> ctrl_interface_group=wheel
>>> ssid=hoana-a
>>> wpa=1
>>> wpa_passphrase=v1g1lance
>>> wpa_key_mgmt=WPA-PSK
>>> wpa_pairwise=TKIP
>>>
>>> === log output
>>>
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>>       
>> associated
>>     
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1
>>> notification
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start
>>> authentication
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise
>>> key handshake completed (WPA)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>>
>>> ==========
>>>
>>> bad new config, kernel & world built from april 29 sources
>>>
>>> === rc.conf ===
>>>
>>> hostname="ap2.dogwood.com"
>>>
>>> ifconfig_sis0="up"
>>> ifconfig_sis1="up"
>>> ifconfig_sis2="up"
>>> ifconfig_wlan0="mode 11a"
>>>
>>> wlans_ath0="wlan0"
>>> create_args_wlan0="wlanmode ap"
>>>
>>> cloned_interfaces="bridge0"
>>> ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm
>>> sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP"
>>> hostapd_enable="YES"
>>>
>>> ntpdate_enable="YES"
>>> ntpdate_flags="pool.ntp.org"
>>> ntpd_enable="YES"
>>>
>>> sendmail_enable="NONE"
>>> sshd_enable="YES"
>>> syslogd_flags="-ss"
>>> rwhod_enable="YES"
>>>
>>> # HARDWARE SPECIFIC
>>> smartd_enable="YES"
>>>
>>> dumpdev="NO"
>>>
>>> === hostapd.conf ===
>>>
>>> interface=wlan0
>>> driver=bsd
>>> logger_syslog=-1
>>> logger_syslog_level=0
>>> logger_stdout=-1
>>> logger_stdout_level=0
>>> debug=4
>>> dump_file=/tmp/hostapd.dump
>>> ctrl_interface=/var/run/hostapd
>>> ctrl_interface_group=wheel
>>> ssid=hmiln
>>> wpa=1
>>> wpa_passphrase=v1g1lance
>>> wpa_key_mgmt=WPA-PSK
>>> wpa_pairwise=TKIP
>>>
>>> === log output
>>>
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>> associated
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1
>>> notification
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start
>>> authentication
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> pairwise key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (Request)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key Error Request (STA detected Michael MIC failure)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> pairwise key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (Request)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key Error Request (STA detected Michael MIC failure)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures
>>>       
>> initiated
>>     
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>> deassociated
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2
>>> notification
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>>
>>>       
>>  Please show the output of ifconfig -v wlan0 and the mac+phy revs of the ath
>> card.  I also need to know what hal you're using.
>>
>>  This could be because wme is now enabled by default; if it's on try turning
>> it off.
>>
>>         Sam
>>
>>     
> _______________________________________________
> freebsd-current_at_freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscribe_at_freebsd.org"
>
>
>   
Received on Thu May 01 2008 - 21:28:13 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC