Unable to connect to AP on TL-WDR3600

leschmidtson nalimegavas at zoho.com
Sun Oct 11 19:35:31 UTC 2015


to close this thread:

"ifconifg wlan0 -ht" makes iwn to connect to TL-WDR3600.  
Found in this post:
http://www.daemonology.net/blog/2015-01-13-freebsd-10-iwn-problems.html

Thanks&regards
Georg

---- On Thu, 08 Oct 2015 13:18:50 -0700 leschmidtson <nalimegavas at zoho.com> wrote ---- 

Dear all,

as per Wiki page the TL-WDR3600 should work fine under FreeBSD. So I gave it a try.
Unfortunately there are some issues with my configuration. The painful one is with wireless: clients are unable to connect to AP on router. 
Tested with FreeBSD 10.2 and Windows7 clients.  Currently r288948M is installed on router. The same problem was observed in few previous versions as well.

In test hostapd was running on wlan0 only. (Problem persists with hostapd active on both wlan interfaces as well). 


ifconfig output:

wlan0: flags=8902<BROADCAST,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
        ether e8:de:27:65:bc:8c
        media: IEEE 802.11 Wireless Ethernet autoselect <hostap> (autoselect <hostap>)
        status: no carrier
        ssid GGWL030 channel 4 (2427 MHz 11g ht/40+)
        country US ecm authmode AUTO privacy OFF deftxkey 2 txpower 27
        scanvalid 60 protmode CTS ampdulimit 64k ampdudensity 8 shortgi wme
        burst dtimperiod 1 -dfs
        groups: wlan 
wlan1: flags=8902<BROADCAST,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
        ether e8:de:27:65:bc:8b
        media: IEEE 802.11 Wireless Ethernet autoselect <hostap> (autoselect <hostap>)
        status: no carrier
        ssid GGWL031 channel 52 (5260 MHz 11a ht/40+)
        country US ecm authmode WPA1+WPA2/802.11i privacy OFF deftxkey 2
        TKIP 2:128-bit TKIP 3:128-bit txpower 23 mcastrate 6 mgmtrate 6
        scanvalid 60 ampdulimit 64k ampdudensity 8 shortgi wme burst
        dtimperiod 1 -dfs
        groups: wlan 

hostapd.conf

interface=wlan0
driver=bsd
ssid=GGWL030
wpa=3
wpa_key_mgmt=WPA-PSK
wpa_passphrase=abcd1234
wpa_pairwise=CCMP TKIP
ctrl_interface=/var/svc/hostapd0/ctl


Here is the relevant part of hostapd log

1444248053.841730: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state AUTHENTICATION2
1444248053.841776: Get randomness: len=32 entropy=1
1444248053.843475: WPA: Assign ANonce - hexdump(len=32): 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 
24 0f a8 69 1b
1444248053.843647: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state INITPSK
1444248053.843694: Searching a PSK for a4:4e:31:b9:34:08 prev_psk=0x0
1444248053.843744: Searching a PSK for a4:4e:31:b9:34:08 prev_psk=0x0
1444248053.843790: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART
1444248053.843905: 1444248053.843919: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake
1444248053.843988: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
1444248053.844063: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1444248053.844150: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c
9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1444248053.877706: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
1444248053.877832: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for a4:4e:31:b9:34:08 (300 seconds - ap_max_inactivity)
1444248054.899958: 1444248054.899977: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout
1444248054.900086: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART
1444248054.900228: 1444248054.900241: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake
1444248054.900315: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
1444248054.900392: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1444248054.900464: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c
9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1444248054.901103: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
1444248055.923954: 1444248055.923973: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout
1444248055.924083: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART
1444248055.924223: 1444248055.924237: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake
1444248055.924310: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
1444248055.924401: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1444248055.924474: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c
9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1444248055.925098: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
1444248056.947963: 1444248056.947982: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout

The last two lines imho indicate the problem.

As per  wpa_supplicant log the client is sending the EAPOL response (EAPOL: txStart line in the log), however it is interrupted by next EAPOL Key message from router (if I correctly read this log):

wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from e8:de:27:65:bc:8c (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 0d 96 79 d6 82 7b 6d 06 bc 93 12 b5 64 7b 46 1b 36 92 7d 8e 90 82 85 ed c7 63 9f cf 52 b5 f8 8d
WPA: PTK derivation - A1=a4:4e:31:b9:34:08 A2=e8:de:27:65:bc:8c
WPA: Nonce1 - hexdump(len=32): 0d 96 79 d6 82 7b 6d 06 bc 93 12 b5 64 7b 46 1b 36 92 7d 8e 90 82 85 ed c7 63 9f cf 52 b5 f8 8d
WPA: Nonce2 - hexdump(len=32): ba 52 4e b6 7a ee 46 3b 4e 19 8f b9 47 b8 1c a6 d0 aa 94 69 a6 ef 36 94 a1 3b ed c7 b5 d4 70 1b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 89 1f b0 dc b0 aa dd c8 9d 13 1a 67 15 e2 fd a4
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wlan0: RX EAPOL from e8:de:27:65:bc:8c


The client is able problem free to connect to another AP.

Appreciate your advice on what/where to look next?

Thanks.

Georg








More information about the freebsd-mips mailing list