I'm able to reproduce this now; will fix this weekend. Sam David Cornejo wrote: > from dmesg: > > ath0: mac 5.9 phy 4.3 radio 3.6 > ath_hal: 0.9.20.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413) > > [root_at_ap2] 111% ifconfig -v wlan0 > wlan0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> > metric 0 mtu 2290 > ether 00:0b:6b:34:65:99 > media: IEEE 802.11 Wireless Ethernet autoselect mode 11a <hostap> > status: running > ssid hmiln channel 52 (5260 Mhz 11a) bssid 00:0b:6b:34:65:99 > regdomain DEBUG country US anywhere ecm authmode WPA -wps -tsn > privacy MIXED deftxkey 2 > TKIP 2:128-bit > TKIP 3:128-bit powersavemode OFF powersavesleep 100 txpower 19 > txpowmax 50.0 -dotd rtsthreshold 2346 fragthreshold 2346 bmiss 7 > 11a ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6 > 11b ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6 > 11g ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6 > turboA ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6 > 11na ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6 > 11ng ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6 > scanvalid 60 -bgscan bgscanintvl 300 bgscanidle 250 > roam:11a rssi 7dBm rate 12 Mb/s > roam:11b rssi 7dBm rate 1 Mb/s > roam:11g rssi 7dBm rate 5 Mb/s > roam:turboA rssi 7dBm rate 12 Mb/s > roam:sturbo rssi 7dBm rate 12 Mb/s -pureg protmode CTS -ht > -htcompat -ampdu ampdulimit 8k ampdudensity - -amsdu -shortgi > htprotmode RTSCTS -puren -wme burst ff dturbo -dwds -hidessid apbridge > dtimperiod 1 doth dfs inact bintval 100 > groups: wlan > > I disabled WME and it behaves a little different: > > [root_at_ap2] 115% ifconfig wlan0 list sta > ADDR AID CHAN RATE RSSI IDLE TXSEQ RXSEQ CAPS FLAG > 00:13:e8:30:a7:6d 1 52 54M 25.0 0 5 10624 EP AQP WPA WME > > But the client (Win XP) can't get an address from the DHCP server, and > if I set a static address on the client still nothing. The wired LAN > is very busy, but from tcpdump it looks like the packets from the > client get to the LAN, but they aren't responded to. > > thanks, > dave c > > > On Tue, Apr 29, 2008 at 5:19 PM, Sam Leffler <sam_at_freebsd.org> wrote: > >> David Cornejo wrote: >> >> >>> Hi, >>> >>> I am trying to build an access point out of a Soekris 4801 - I have >>> built two images from the CURRENT source, one on March 28, 2008 >>> (pre-VAPS) and one from today April 29th, 2008. >>> >>> The 3/28 one works beautifully, the 4/29 one has authorization problems. >>> >>> I converted the rc.conf to the new wlan_* things. >>> >>> Is there something wrong with my configurations? >>> >>> thanks, >>> dave c >>> >>> good old config, kernel & world built march 28th sources. >>> >>> === rc.conf === >>> >>> hostname="ap1.dogwood.com" >>> >>> hostapd_enable="YES" >>> >>> ifconfig_sis0="up" >>> ifconfig_sis1="up" >>> ifconfig_sis2="up" >>> ifconfig_ath0="mode 11a mediaopt hostap dturbo" >>> >>> cloned_interfaces="bridge0" >>> ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm >>> sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP" >>> >>> ntpdate_enable="YES" >>> ntpdate_flags="pool.ntp.org" >>> >>> sendmail_enable="NONE" >>> sshd_enable="YES" >>> syslogd_flags="-ss" >>> rwhod_enable="YES" >>> >>> smartd_enable="YES" >>> >>> ntpd_enable="YES" >>> >>> === hostapd.conf >>> >>> interface=ath0 >>> driver=bsd >>> logger_syslog=-1 >>> logger_syslog_level=0 >>> logger_stdout=-1 >>> logger_stdout_level=0 >>> debug=4 >>> dump_file=/tmp/hostapd.dump >>> ctrl_interface=/var/run/hostapd >>> ctrl_interface_group=wheel >>> ssid=hoana-a >>> wpa=1 >>> wpa_passphrase=v1g1lance >>> wpa_key_mgmt=WPA-PSK >>> wpa_pairwise=TKIP >>> >>> === log output >>> >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: >>> >> associated >> >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1 >>> notification >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start >>> authentication >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> unauthorizing port >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/4 msg of 4-Way Handshake >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received >>> EAPOL-Key frame (2/4 Pairwise) >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending >>> 3/4 msg of 4-Way Handshake >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received >>> EAPOL-Key frame (4/4 Pairwise) >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> authorizing port >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise >>> key handshake completed (WPA) >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/2 msg of Group Key Handshake >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received >>> EAPOL-Key frame (2/2 Group) >>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group >>> key handshake completed (WPA) >>> >>> ========== >>> >>> bad new config, kernel & world built from april 29 sources >>> >>> === rc.conf === >>> >>> hostname="ap2.dogwood.com" >>> >>> ifconfig_sis0="up" >>> ifconfig_sis1="up" >>> ifconfig_sis2="up" >>> ifconfig_wlan0="mode 11a" >>> >>> wlans_ath0="wlan0" >>> create_args_wlan0="wlanmode ap" >>> >>> cloned_interfaces="bridge0" >>> ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm >>> sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP" >>> hostapd_enable="YES" >>> >>> ntpdate_enable="YES" >>> ntpdate_flags="pool.ntp.org" >>> ntpd_enable="YES" >>> >>> sendmail_enable="NONE" >>> sshd_enable="YES" >>> syslogd_flags="-ss" >>> rwhod_enable="YES" >>> >>> # HARDWARE SPECIFIC >>> smartd_enable="YES" >>> >>> dumpdev="NO" >>> >>> === hostapd.conf === >>> >>> interface=wlan0 >>> driver=bsd >>> logger_syslog=-1 >>> logger_syslog_level=0 >>> logger_stdout=-1 >>> logger_stdout_level=0 >>> debug=4 >>> dump_file=/tmp/hostapd.dump >>> ctrl_interface=/var/run/hostapd >>> ctrl_interface_group=wheel >>> ssid=hmiln >>> wpa=1 >>> wpa_passphrase=v1g1lance >>> wpa_key_mgmt=WPA-PSK >>> wpa_pairwise=TKIP >>> >>> === log output >>> >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: >>> associated >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1 >>> notification >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start >>> authentication >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> unauthorizing port >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/4 msg of 4-Way Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (2/4 Pairwise) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 3/4 msg of 4-Way Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (4/4 Pairwise) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> authorizing port >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> pairwise key handshake completed (WPA) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/2 msg of Group Key Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (2/2 Group) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group >>> key handshake completed (WPA) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (Request) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key Error Request (STA detected Michael MIC failure) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/4 msg of 4-Way Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (2/4 Pairwise) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 3/4 msg of 4-Way Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (4/4 Pairwise) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> authorizing port >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> pairwise key handshake completed (WPA) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/2 msg of Group Key Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (2/2 Group) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group >>> key handshake completed (WPA) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key frame (Request) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: >>> received EAPOL-Key Error Request (STA detected Michael MIC failure) >>> Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures >>> >> initiated >> >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending >>> 1/4 msg of 4-Way Handshake >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: >>> deassociated >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2 >>> notification >>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: >>> unauthorizing port >>> >>> >> Please show the output of ifconfig -v wlan0 and the mac+phy revs of the ath >> card. I also need to know what hal you're using. >> >> This could be because wme is now enabled by default; if it's on try turning >> it off. >> >> Sam >> >> > _______________________________________________ > freebsd-current_at_freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe_at_freebsd.org" > > >Received on Sat May 03 2008 - 14:03:25 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC