Re: problems making an access point w/current

From: David Cornejo <dcornejo_at_gmail.com>
Date: Tue, 6 May 2008 10:08:48 -1000
I've had a chance to rebuild and all works well now, thanks Sam!

dave c

On Sat, May 3, 2008 at 6:03 AM, Sam Leffler <sam_at_freebsd.org> wrote:
> I'm able to reproduce this now; will fix this weekend.
>
>    Sam
>
>  David Cornejo wrote:
>
> >
> >
> >
> > from dmesg:
> >
> > ath0: mac 5.9 phy 4.3 radio 3.6
> > ath_hal: 0.9.20.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413)
> >
> > [root_at_ap2] 111% ifconfig -v wlan0
> > wlan0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST>
> > metric 0 mtu 2290
> >        ether 00:0b:6b:34:65:99
> >        media: IEEE 802.11 Wireless Ethernet autoselect mode 11a <hostap>
> >        status: running
> >        ssid hmiln channel 52 (5260 Mhz 11a) bssid 00:0b:6b:34:65:99
> >        regdomain DEBUG country US anywhere ecm authmode WPA -wps -tsn
> >        privacy MIXED deftxkey 2
> >        TKIP 2:128-bit
> >        TKIP 3:128-bit powersavemode OFF powersavesleep 100 txpower 19
> >        txpowmax 50.0 -dotd rtsthreshold 2346 fragthreshold 2346 bmiss 7
> >        11a    ucast NONE    mgmt  6 Mb/s mcast  6 Mb/s maxretry 6
> >        11b    ucast NONE    mgmt  1 Mb/s mcast  1 Mb/s maxretry 6
> >        11g    ucast NONE    mgmt  1 Mb/s mcast  1 Mb/s maxretry 6
> >        turboA ucast NONE    mgmt  6 Mb/s mcast  6 Mb/s maxretry 6
> >        11na   ucast NONE    mgmt  0 MCS  mcast  0 MCS  maxretry 6
> >        11ng   ucast NONE    mgmt  0 MCS  mcast  0 MCS  maxretry 6
> >        scanvalid 60 -bgscan bgscanintvl 300 bgscanidle 250
> >        roam:11a    rssi    7dBm rate 12 Mb/s
> >        roam:11b    rssi    7dBm rate  1 Mb/s
> >        roam:11g    rssi    7dBm rate  5 Mb/s
> >        roam:turboA rssi    7dBm rate 12 Mb/s
> >        roam:sturbo rssi    7dBm rate 12 Mb/s -pureg protmode CTS -ht
> >        -htcompat -ampdu ampdulimit 8k ampdudensity - -amsdu -shortgi
> >        htprotmode RTSCTS -puren -wme burst ff dturbo -dwds -hidessid
> apbridge
> >        dtimperiod 1 doth dfs inact bintval 100
> >        groups: wlan
> >
> > I disabled WME and it behaves a little different:
> >
> > [root_at_ap2] 115% ifconfig wlan0 list sta
> > ADDR               AID CHAN RATE RSSI IDLE  TXSEQ  RXSEQ CAPS FLAG
> > 00:13:e8:30:a7:6d    1   52  54M 25.0    0      5  10624 EP   AQP  WPA WME
> >
> > But the client (Win XP) can't get an address from the DHCP server, and
> > if I set a static address on the client still nothing.  The wired LAN
> > is very busy, but from tcpdump it looks like the packets from the
> > client get to the LAN, but they aren't responded to.
> >
> > thanks,
> > dave c
> >
> >
> > On Tue, Apr 29, 2008 at 5:19 PM, Sam Leffler <sam_at_freebsd.org> wrote:
> >
> >
> > > David Cornejo wrote:
> > >
> > >
> > >
> > > > Hi,
> > > >
> > > > I am trying to build an access point out of a Soekris 4801 - I have
> > > > built two images from the CURRENT source, one on March 28, 2008
> > > > (pre-VAPS) and one from today April 29th, 2008.
> > > >
> > > > The 3/28 one works beautifully, the 4/29 one has authorization
> problems.
> > > >
> > > > I converted the rc.conf to the new wlan_* things.
> > > >
> > > > Is there something wrong with my configurations?
> > > >
> > > > thanks,
> > > > dave c
> > > >
> > > > good old config, kernel & world built march 28th sources.
> > > >
> > > > === rc.conf ===
> > > >
> > > > hostname="ap1.dogwood.com"
> > > >
> > > > hostapd_enable="YES"
> > > >
> > > > ifconfig_sis0="up"
> > > > ifconfig_sis1="up"
> > > > ifconfig_sis2="up"
> > > > ifconfig_ath0="mode 11a mediaopt hostap dturbo"
> > > >
> > > > cloned_interfaces="bridge0"
> > > > ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm
> > > > sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP"
> > > >
> > > > ntpdate_enable="YES"
> > > > ntpdate_flags="pool.ntp.org"
> > > >
> > > > sendmail_enable="NONE"
> > > > sshd_enable="YES"
> > > > syslogd_flags="-ss"
> > > > rwhod_enable="YES"
> > > >
> > > > smartd_enable="YES"
> > > >
> > > > ntpd_enable="YES"
> > > >
> > > > === hostapd.conf
> > > >
> > > > interface=ath0
> > > > driver=bsd
> > > > logger_syslog=-1
> > > > logger_syslog_level=0
> > > > logger_stdout=-1
> > > > logger_stdout_level=0
> > > > debug=4
> > > > dump_file=/tmp/hostapd.dump
> > > > ctrl_interface=/var/run/hostapd
> > > > ctrl_interface_group=wheel
> > > > ssid=hoana-a
> > > > wpa=1
> > > > wpa_passphrase=v1g1lance
> > > > wpa_key_mgmt=WPA-PSK
> > > > wpa_pairwise=TKIP
> > > >
> > > > === log output
> > > >
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> > > >
> > > >
> > > associated
> > >
> > >
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1
> > > > notification
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start
> > > > authentication
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > unauthorizing port
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/4 msg of 4-Way Handshake
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> > > > EAPOL-Key frame (2/4 Pairwise)
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 3/4 msg of 4-Way Handshake
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> > > > EAPOL-Key frame (4/4 Pairwise)
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > authorizing port
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise
> > > > key handshake completed (WPA)
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/2 msg of Group Key Handshake
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> > > > EAPOL-Key frame (2/2 Group)
> > > > Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group
> > > > key handshake completed (WPA)
> > > >
> > > > ==========
> > > >
> > > > bad new config, kernel & world built from april 29 sources
> > > >
> > > > === rc.conf ===
> > > >
> > > > hostname="ap2.dogwood.com"
> > > >
> > > > ifconfig_sis0="up"
> > > > ifconfig_sis1="up"
> > > > ifconfig_sis2="up"
> > > > ifconfig_wlan0="mode 11a"
> > > >
> > > > wlans_ath0="wlan0"
> > > > create_args_wlan0="wlanmode ap"
> > > >
> > > > cloned_interfaces="bridge0"
> > > > ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm
> > > > sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP"
> > > > hostapd_enable="YES"
> > > >
> > > > ntpdate_enable="YES"
> > > > ntpdate_flags="pool.ntp.org"
> > > > ntpd_enable="YES"
> > > >
> > > > sendmail_enable="NONE"
> > > > sshd_enable="YES"
> > > > syslogd_flags="-ss"
> > > > rwhod_enable="YES"
> > > >
> > > > # HARDWARE SPECIFIC
> > > > smartd_enable="YES"
> > > >
> > > > dumpdev="NO"
> > > >
> > > > === hostapd.conf ===
> > > >
> > > > interface=wlan0
> > > > driver=bsd
> > > > logger_syslog=-1
> > > > logger_syslog_level=0
> > > > logger_stdout=-1
> > > > logger_stdout_level=0
> > > > debug=4
> > > > dump_file=/tmp/hostapd.dump
> > > > ctrl_interface=/var/run/hostapd
> > > > ctrl_interface_group=wheel
> > > > ssid=hmiln
> > > > wpa=1
> > > > wpa_passphrase=v1g1lance
> > > > wpa_key_mgmt=WPA-PSK
> > > > wpa_pairwise=TKIP
> > > >
> > > > === log output
> > > >
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> > > > associated
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1
> > > > notification
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start
> > > > authentication
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > unauthorizing port
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/4 msg of 4-Way Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (2/4 Pairwise)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 3/4 msg of 4-Way Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (4/4 Pairwise)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > authorizing port
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > pairwise key handshake completed (WPA)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/2 msg of Group Key Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (2/2 Group)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> > > > key handshake completed (WPA)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (Request)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key Error Request (STA detected Michael MIC failure)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/4 msg of 4-Way Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (2/4 Pairwise)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 3/4 msg of 4-Way Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (4/4 Pairwise)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > authorizing port
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > pairwise key handshake completed (WPA)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/2 msg of Group Key Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (2/2 Group)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> > > > key handshake completed (WPA)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key frame (Request)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> > > > received EAPOL-Key Error Request (STA detected Michael MIC failure)
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures
> > > >
> > > >
> > > initiated
> > >
> > >
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> > > > 1/4 msg of 4-Way Handshake
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> > > > deassociated
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2
> > > > notification
> > > > Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> > > > unauthorizing port
> > > >
> > > >
> > > >
> > >  Please show the output of ifconfig -v wlan0 and the mac+phy revs of the
> ath
> > > card.  I also need to know what hal you're using.
> > >
> > >  This could be because wme is now enabled by default; if it's on try
> turning
> > > it off.
> > >
> > >        Sam
> > >
> > >
> > >
> >
> > _______________________________________________
> > freebsd-current_at_freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-current
> > To unsubscribe, send any mail to "freebsd-current-unsubscribe_at_freebsd.org"
> >
> >
> >
> >
>
>
Received on Tue May 06 2008 - 18:08:52 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:30 UTC