problems making an access point w/current
Sam Leffler
sam at freebsd.org
Wed Apr 30 03:19:12 UTC 2008
David Cornejo wrote:
> Hi,
>
> I am trying to build an access point out of a Soekris 4801 - I have
> built two images from the CURRENT source, one on March 28, 2008
> (pre-VAPS) and one from today April 29th, 2008.
>
> The 3/28 one works beautifully, the 4/29 one has authorization problems.
>
> I converted the rc.conf to the new wlan_* things.
>
> Is there something wrong with my configurations?
>
> thanks,
> dave c
>
> good old config, kernel & world built march 28th sources.
>
> === rc.conf ===
>
> hostname="ap1.dogwood.com"
>
> hostapd_enable="YES"
>
> ifconfig_sis0="up"
> ifconfig_sis1="up"
> ifconfig_sis2="up"
> ifconfig_ath0="mode 11a mediaopt hostap dturbo"
>
> cloned_interfaces="bridge0"
> ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm
> sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP"
>
> ntpdate_enable="YES"
> ntpdate_flags="pool.ntp.org"
>
> sendmail_enable="NONE"
> sshd_enable="YES"
> syslogd_flags="-ss"
> rwhod_enable="YES"
>
> smartd_enable="YES"
>
> ntpd_enable="YES"
>
> === hostapd.conf
>
> interface=ath0
> driver=bsd
> logger_syslog=-1
> logger_syslog_level=0
> logger_stdout=-1
> logger_stdout_level=0
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=wheel
> ssid=hoana-a
> wpa=1
> wpa_passphrase=v1g1lance
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
>
> === log output
>
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: associated
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1
> notification
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start
> authentication
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise
> key handshake completed (WPA)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
> EAPOL-Key frame (2/2 Group)
> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
>
> ==========
>
> bad new config, kernel & world built from april 29 sources
>
> === rc.conf ===
>
> hostname="ap2.dogwood.com"
>
> ifconfig_sis0="up"
> ifconfig_sis1="up"
> ifconfig_sis2="up"
> ifconfig_wlan0="mode 11a"
>
> wlans_ath0="wlan0"
> create_args_wlan0="wlanmode ap"
>
> cloned_interfaces="bridge0"
> ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm
> sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP"
> hostapd_enable="YES"
>
> ntpdate_enable="YES"
> ntpdate_flags="pool.ntp.org"
> ntpd_enable="YES"
>
> sendmail_enable="NONE"
> sshd_enable="YES"
> syslogd_flags="-ss"
> rwhod_enable="YES"
>
> # HARDWARE SPECIFIC
> smartd_enable="YES"
>
> dumpdev="NO"
>
> === hostapd.conf ===
>
> interface=wlan0
> driver=bsd
> logger_syslog=-1
> logger_syslog_level=0
> logger_stdout=-1
> logger_stdout_level=0
> debug=4
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=wheel
> ssid=hmiln
> wpa=1
> wpa_passphrase=v1g1lance
> wpa_key_mgmt=WPA-PSK
> wpa_pairwise=TKIP
>
> === log output
>
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> associated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1
> notification
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start
> authentication
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> pairwise key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/2 Group)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (Request)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key Error Request (STA detected Michael MIC failure)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 3/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (4/4 Pairwise)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> authorizing port
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> pairwise key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/2 msg of Group Key Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (2/2 Group)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
> key handshake completed (WPA)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key frame (Request)
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
> received EAPOL-Key Error Request (STA detected Michael MIC failure)
> Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures initiated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
> 1/4 msg of 4-Way Handshake
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
> deassociated
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2
> notification
> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
> unauthorizing port
Please show the output of ifconfig -v wlan0 and the mac+phy revs of the
ath card. I also need to know what hal you're using.
This could be because wme is now enabled by default; if it's on try
turning it off.
Sam
More information about the freebsd-current
mailing list