problems making an access point w/current
Sam Leffler
sam at freebsd.org
Thu May 1 23:28:13 UTC 2008
Are you certain hostapd is up to date? There was a bug like this a
while back (before code was committed to CVS) when I failed to update
hostapd to plumb keys correctly. I routinely test this same config
(i.e. card) w/o any issues.
Sam
David Cornejo wrote:
> from dmesg:
>
> ath0: mac 5.9 phy 4.3 radio 3.6
> ath_hal: 0.9.20.3 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413, RF5413)
>
> [root at ap2] 111% ifconfig -v wlan0
> wlan0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST>
> metric 0 mtu 2290
> ether 00:0b:6b:34:65:99
> media: IEEE 802.11 Wireless Ethernet autoselect mode 11a <hostap>
> status: running
> ssid hmiln channel 52 (5260 Mhz 11a) bssid 00:0b:6b:34:65:99
> regdomain DEBUG country US anywhere ecm authmode WPA -wps -tsn
> privacy MIXED deftxkey 2
> TKIP 2:128-bit
> TKIP 3:128-bit powersavemode OFF powersavesleep 100 txpower 19
> txpowmax 50.0 -dotd rtsthreshold 2346 fragthreshold 2346 bmiss 7
> 11a ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6
> 11b ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6
> 11g ucast NONE mgmt 1 Mb/s mcast 1 Mb/s maxretry 6
> turboA ucast NONE mgmt 6 Mb/s mcast 6 Mb/s maxretry 6
> 11na ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6
> 11ng ucast NONE mgmt 0 MCS mcast 0 MCS maxretry 6
> scanvalid 60 -bgscan bgscanintvl 300 bgscanidle 250
> roam:11a rssi 7dBm rate 12 Mb/s
> roam:11b rssi 7dBm rate 1 Mb/s
> roam:11g rssi 7dBm rate 5 Mb/s
> roam:turboA rssi 7dBm rate 12 Mb/s
> roam:sturbo rssi 7dBm rate 12 Mb/s -pureg protmode CTS -ht
> -htcompat -ampdu ampdulimit 8k ampdudensity - -amsdu -shortgi
> htprotmode RTSCTS -puren -wme burst ff dturbo -dwds -hidessid apbridge
> dtimperiod 1 doth dfs inact bintval 100
> groups: wlan
>
> I disabled WME and it behaves a little different:
>
> [root at ap2] 115% ifconfig wlan0 list sta
> ADDR AID CHAN RATE RSSI IDLE TXSEQ RXSEQ CAPS FLAG
> 00:13:e8:30:a7:6d 1 52 54M 25.0 0 5 10624 EP AQP WPA WME
>
> But the client (Win XP) can't get an address from the DHCP server, and
> if I set a static address on the client still nothing. The wired LAN
> is very busy, but from tcpdump it looks like the packets from the
> client get to the LAN, but they aren't responded to.
>
> thanks,
> dave c
>
>
> On Tue, Apr 29, 2008 at 5:19 PM, Sam Leffler <sam at freebsd.org> wrote:
>
>> David Cornejo wrote:
>>
>>
>>> Hi,
>>>
>>> I am trying to build an access point out of a Soekris 4801 - I have
>>> built two images from the CURRENT source, one on March 28, 2008
>>> (pre-VAPS) and one from today April 29th, 2008.
>>>
>>> The 3/28 one works beautifully, the 4/29 one has authorization problems.
>>>
>>> I converted the rc.conf to the new wlan_* things.
>>>
>>> Is there something wrong with my configurations?
>>>
>>> thanks,
>>> dave c
>>>
>>> good old config, kernel & world built march 28th sources.
>>>
>>> === rc.conf ===
>>>
>>> hostname="ap1.dogwood.com"
>>>
>>> hostapd_enable="YES"
>>>
>>> ifconfig_sis0="up"
>>> ifconfig_sis1="up"
>>> ifconfig_sis2="up"
>>> ifconfig_ath0="mode 11a mediaopt hostap dturbo"
>>>
>>> cloned_interfaces="bridge0"
>>> ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm
>>> sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP"
>>>
>>> ntpdate_enable="YES"
>>> ntpdate_flags="pool.ntp.org"
>>>
>>> sendmail_enable="NONE"
>>> sshd_enable="YES"
>>> syslogd_flags="-ss"
>>> rwhod_enable="YES"
>>>
>>> smartd_enable="YES"
>>>
>>> ntpd_enable="YES"
>>>
>>> === hostapd.conf
>>>
>>> interface=ath0
>>> driver=bsd
>>> logger_syslog=-1
>>> logger_syslog_level=0
>>> logger_stdout=-1
>>> logger_stdout_level=0
>>> debug=4
>>> dump_file=/tmp/hostapd.dump
>>> ctrl_interface=/var/run/hostapd
>>> ctrl_interface_group=wheel
>>> ssid=hoana-a
>>> wpa=1
>>> wpa_passphrase=v1g1lance
>>> wpa_key_mgmt=WPA-PSK
>>> wpa_pairwise=TKIP
>>>
>>> === log output
>>>
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>>
>> associated
>>
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1
>>> notification
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start
>>> authentication
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise
>>> key handshake completed (WPA)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received
>>> EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>>
>>> ==========
>>>
>>> bad new config, kernel & world built from april 29 sources
>>>
>>> === rc.conf ===
>>>
>>> hostname="ap2.dogwood.com"
>>>
>>> ifconfig_sis0="up"
>>> ifconfig_sis1="up"
>>> ifconfig_sis2="up"
>>> ifconfig_wlan0="mode 11a"
>>>
>>> wlans_ath0="wlan0"
>>> create_args_wlan0="wlanmode ap"
>>>
>>> cloned_interfaces="bridge0"
>>> ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm
>>> sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP"
>>> hostapd_enable="YES"
>>>
>>> ntpdate_enable="YES"
>>> ntpdate_flags="pool.ntp.org"
>>> ntpd_enable="YES"
>>>
>>> sendmail_enable="NONE"
>>> sshd_enable="YES"
>>> syslogd_flags="-ss"
>>> rwhod_enable="YES"
>>>
>>> # HARDWARE SPECIFIC
>>> smartd_enable="YES"
>>>
>>> dumpdev="NO"
>>>
>>> === hostapd.conf ===
>>>
>>> interface=wlan0
>>> driver=bsd
>>> logger_syslog=-1
>>> logger_syslog_level=0
>>> logger_stdout=-1
>>> logger_stdout_level=0
>>> debug=4
>>> dump_file=/tmp/hostapd.dump
>>> ctrl_interface=/var/run/hostapd
>>> ctrl_interface_group=wheel
>>> ssid=hmiln
>>> wpa=1
>>> wpa_passphrase=v1g1lance
>>> wpa_key_mgmt=WPA-PSK
>>> wpa_pairwise=TKIP
>>>
>>> === log output
>>>
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>> associated
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1
>>> notification
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start
>>> authentication
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> pairwise key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (Request)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key Error Request (STA detected Michael MIC failure)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 3/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (4/4 Pairwise)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> authorizing port
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> pairwise key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/2 msg of Group Key Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (2/2 Group)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group
>>> key handshake completed (WPA)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key frame (Request)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA:
>>> received EAPOL-Key Error Request (STA detected Michael MIC failure)
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures
>>>
>> initiated
>>
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending
>>> 1/4 msg of 4-Way Handshake
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11:
>>> deassociated
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2
>>> notification
>>> Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X:
>>> unauthorizing port
>>>
>>>
>> Please show the output of ifconfig -v wlan0 and the mac+phy revs of the ath
>> card. I also need to know what hal you're using.
>>
>> This could be because wme is now enabled by default; if it's on try turning
>> it off.
>>
>> Sam
>>
>>
> _______________________________________________
> freebsd-current at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscribe at freebsd.org"
>
>
>
More information about the freebsd-current
mailing list