Modify

Opened 7 years ago

Closed 6 years ago

Last modified 4 years ago

#9561 closed defect (fixed)

TP-Link tl-wr1043nd wifi problem (repeated authentication/deauth)

Reported by: AndreZ Owned by: nbd
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

I'm seeing these repeated messages in the log about one wifi client (IP camera). It goes like that every three seconds forever:

Jun 13 09:50:47 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
Jun 13 09:50:47 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 1)
Jun 13 09:50:50 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Jun 13 09:50:53 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
Jun 13 09:50:53 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 1)
Jun 13 09:50:56 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request

I first saw it when running Backfire. It is the same in 10.03.1-RC5 prerelease and in the latest trunk (r27153). It worked fine in Kamikaze though.

The wifi is AP mode, wpa2-psk. I've tried different options like channel, encryption, mode, HT-mode etc, but it's all the same.

It's only this wireless camera that's having problems. Other clients (laptop and phone) are fine, but again the camera worked fine with Kamikaze. What could be the problem now?

Attachments (17)

hostapd.log.txt (69.6 KB) - added by duvi 7 years ago.
logread.log.txt (4.4 KB) - added by duvi 7 years ago.
841nd.hostapd.log (32.9 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
hp deauth (597.2 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
libpcap of HP printer experiencing local deauth
hostapd.complete.log (77.8 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
841nd.hostapd_working.log (18.6 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
old revision (219.4 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
Pcap of printer connecting
old revision 2 (337.0 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
android not working (218.0 KB) - added by Jonathan Bennett <jbscience87@…> 6 years ago.
Pcap of android not connecting
hostapd.log (124.3 KB) - added by AndreZ 6 years ago.
log.txt (18.8 KB) - added by AndreZ 6 years ago.
Another log.
hostapd.2.log (305.9 KB) - added by AndreZ 6 years ago.
out.txt (176.4 KB) - added by AndreZ 6 years ago.
Another one with Encryption: WPA PSK (TKIP, CCMP)
psk+ccmp.txt (54.0 KB) - added by AndreZ 6 years ago.
psk+ccmp
psk+tkip.txt (88.7 KB) - added by AndreZ 6 years ago.
psk+tkip
php9Ill3b (11.3 KB) - added by mlealbr 6 years ago.
hostapd log files
hostapd-wifi_debug-mlealbr.zip (105.6 KB) - added by mlealbr 6 years ago.
hostapd-wifi_debug-mlealbr

Change History (130)

comment:1 Changed 7 years ago by AndreZ

Output from:

killall -9 hostapd; hostapd -dd /var/run/hostapd-phy0.conf

Output:

random: Trying to read entropy from /dev/random
Configuration file: /var/run/hostapd-phy0.conf
nl80211: interface wlan0 in phy phy0
nl80211: Failed to set interface 9 to mode 2: -16 (Device or resource busy)
nl80211: Interface already in requested mode - ignore error
netlink: Operstate: linkmode=1, operstate=5
nl80211: Using driver-based off-channel TX
nl80211: Interface wlan0 is in bridge br-lan
nl80211: Add own interface ifindex 5
nl80211: Add own interface ifindex 9
nl80211: New interface mon.wlan0 created: ifindex=13
nl80211: Add own interface ifindex 13
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=27 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=27 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=27 dBm
Completing interface initialization
Mode: IEEE 802.11g  Channel: 11  Frequency: 2462 MHz
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Flushing old station entries
Deauthenticate all stations
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
Using interface wlan0 with hwaddr 94:0c:6d:xx:xx:xx and ssid 'xxxxxxxxx'
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=7):
     xx xx xx xx xx xx xx                              xxxxxxxxx         
PSK (ASCII passphrase) - hexdump_ascii(len=15): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 alg=3 addr=0x45642c key_idx=1 set_tx=1 seq_len=0 key_len=16
   broadcast key
nl80211: Set beacon (beacon_set=0)
wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
wlan0: Setup of interface done.
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
nl80211: Interface down
Unknown event 30
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Interface up
Unknown event 29
RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
nl80211: Add ifindex 5 for bridge br-lan
nl80211: Add own interface ifindex 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
Add randomness: count=1 entropy=0
Add randomness: count=2 entropy=1
Add randomness: count=3 entropy=2
Add randomness: count=4 entropy=3
Add randomness: count=5 entropy=4
Add randomness: count=6 entropy=5
Add randomness: count=7 entropy=6
Add randomness: count=8 entropy=7
Add randomness: count=9 entropy=8
Add randomness: count=10 entropy=9
Add randomness: count=11 entropy=10
Add randomness: count=12 entropy=11
Add randomness: count=13 entropy=12
Add randomness: count=14 entropy=13
Add randomness: count=15 entropy=14
Add randomness: count=16 entropy=15
Add randomness: count=17 entropy=16
Add randomness: count=18 entropy=17
Add randomness: count=19 entropy=18
Add randomness: count=20 entropy=19
Add randomness: count=21 entropy=20
Add randomness: count=22 entropy=21
Add randomness: count=23 entropy=22
Add randomness: count=24 entropy=23
Add randomness: count=25 entropy=24
Add randomness: count=26 entropy=25
Add randomness: count=27 entropy=26
Add randomness: count=28 entropy=27
Add randomness: count=29 entropy=28
Add randomness: count=30 entropy=29
Add randomness: count=31 entropy=30
mgmt::auth
authentication: STA=00:02:d1:xx:xx:xx auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authentication OK (open system)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-AUTHENTICATE.indication(00:02:d1:xx:xx:xx, OPEN_SYSTEM)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-DELETEKEYS.request(00:02:d1:xx:xx:xx)
authentication reply: STA=00:02:d1:xx:xx:xx auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=32 entropy=31
mgmt::auth cb
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=00:02:d1:xx:xx:xx capab_info=0x411 listen_interval=3
  new AID 1
nl80211: Set beacon (beacon_set=1)
update_sta_no_ht STA 00:02:d1:xx:xx:xx - no HT, num of non-HT stations 1
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x13 changes=2
nl80211: Set beacon (beacon_set=1)
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: association OK (aid 1)
Add randomness: count=33 entropy=32
mgmt::assoc_resp cb
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 1)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-ASSOCIATE.indication(00:02:d1:xx:xx:xx)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-DELETEKEYS.request(00:02:d1:xx:xx:xx)
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 00:02:d1:xx:xx:xx WPA: start authentication
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.1X: unauthorizing port
WPA: 00:02:d1:xx:xx:xx WPA_PTK_GROUP entering state IDLE
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state AUTHENTICATION
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=33
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=1
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=9 alg=3 addr=0x45642c key_idx=1 set_tx=1 seq_len=0 key_len=16
   broadcast key
WPA: Assign ANonce - hexdump(len=32): 20 df 97 4b c3 d1 a7 b8 93 90 df cd b1 5d d0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITPSK
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKSTART
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: New station 00:02:d1:xx:xx:xx
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=95 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame
Add randomness: count=34 entropy=0
IEEE 802.1X: 121 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received Key Nonce - hexdump(len=32): 1e dd 8f 40 fd b9 a5 ce 99 ed c7 e2 43 36 a0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
Add randomness: count=35 entropy=1
wlan0: STA 00:02:d1:xx:xx:xx WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=94:0c:6d:xx:xx:xx A2=00:02:d1:xx:xx:xx
WPA: Nonce1 - hexdump(len=32): 20 df 97 4b c3 d1 a7 b8 93 90 df cd b1 5d d0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: Nonce2 - hexdump(len=32): 1e dd 8f 40 fd b9 a5 ce 99 ed c7 e2 43 36 a0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=36 entropy=2
Add randomness: count=37 entropy=3
Add randomness: count=38 entropy=4
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=39 entropy=5
Add randomness: count=40 entropy=6
Add randomness: count=41 entropy=7
Add randomness: count=42 entropy=8
Add randomness: count=43 entropy=9
Add randomness: count=44 entropy=10
Add randomness: count=45 entropy=11
Add randomness: count=46 entropy=12
Add randomness: count=47 entropy=13
Add randomness: count=48 entropy=14
Add randomness: count=49 entropy=15
Add randomness: count=50 entropy=16
Add randomness: count=51 entropy=17
Add randomness: count=52 entropy=18
Add randomness: count=53 entropy=19
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=54 entropy=20
Add randomness: count=55 entropy=21
Add randomness: count=56 entropy=22
Add randomness: count=57 entropy=23
Add randomness: count=58 entropy=24
Add randomness: count=59 entropy=25
Add randomness: count=60 entropy=26
Add randomness: count=61 entropy=27
Add randomness: count=62 entropy=28
Add randomness: count=63 entropy=29
Add randomness: count=64 entropy=30
Add randomness: count=65 entropy=31
Add randomness: count=66 entropy=32
Add randomness: count=67 entropy=33
Add randomness: count=68 entropy=34
Add randomness: count=69 entropy=35
Add randomness: count=70 entropy=36
Add randomness: count=71 entropy=37
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=72 entropy=38
Add randomness: count=73 entropy=39
Add randomness: count=74 entropy=40
Add randomness: count=75 entropy=41
Add randomness: count=76 entropy=42
Add randomness: count=77 entropy=43
Add randomness: count=78 entropy=44
Add randomness: count=79 entropy=45
Add randomness: count=80 entropy=46
Add randomness: count=81 entropy=47
Add randomness: count=82 entropy=48
Add randomness: count=83 entropy=49
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: PTKINITNEGOTIATING: Retry limit 4 reached
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:02:d1:xx:xx:xx reason 2
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state DISCONNECTED
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.1X: unauthorizing port
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
hostapd_ht_operation_update current operation mode=0x13
hostapd_ht_operation_update new operation mode=0x0 changes=2
nl80211: Set beacon (beacon_set=1)
nl80211: Event message available
nl80211: Delete station 00:02:d1:xx:xx:xx
Add randomness: count=84 entropy=50
Add randomness: count=85 entropy=51
Add randomness: count=86 entropy=52
Add randomness: count=87 entropy=53
Add randomness: count=88 entropy=54
Add randomness: count=89 entropy=55
Add randomness: count=90 entropy=56
Add randomness: count=91 entropy=57
Add randomness: count=92 entropy=58
Add randomness: count=93 entropy=59
Add randomness: count=94 entropy=60
Add randomness: count=95 entropy=61
Add randomness: count=96 entropy=62
Add randomness: count=97 entropy=63
Add randomness: count=98 entropy=64
Add randomness: count=99 entropy=65
Add randomness: count=100 entropy=66
Add randomness: count=101 entropy=67
Add randomness: count=102 entropy=68
Add randomness: count=103 entropy=69
Add randomness: count=104 entropy=70
Add randomness: count=105 entropy=71
Add randomness: count=106 entropy=72
Add randomness: count=107 entropy=73
Add randomness: count=108 entropy=74
Add randomness: count=109 entropy=75
Add randomness: count=110 entropy=76
Add randomness: count=111 entropy=77
Add randomness: count=112 entropy=78
Add randomness: count=113 entropy=79
Add randomness: count=114 entropy=80
Add randomness: count=115 entropy=81
Add randomness: count=116 entropy=82
Add randomness: count=117 entropy=83
Add randomness: count=118 entropy=84
Add randomness: count=119 entropy=85
Add randomness: count=120 entropy=86
Add randomness: count=121 entropy=87
Add randomness: count=122 entropy=88
Add randomness: count=123 entropy=89
Add randomness: count=124 entropy=90
Add randomness: count=125 entropy=91
mgmt::auth
authentication: STA=00:02:d1:xx:xx:xx auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authentication OK (open system)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-AUTHENTICATE.indication(00:02:d1:xx:xx:xx, OPEN_SYSTEM)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-DELETEKEYS.request(00:02:d1:xx:xx:xx)
authentication reply: STA=00:02:d1:xx:xx:xx auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
Add randomness: count=126 entropy=92
mgmt::auth cb
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=00:02:d1:xx:xx:xx capab_info=0x411 listen_interval=3
  new AID 1
nl80211: Set beacon (beacon_set=1)
update_sta_no_ht STA 00:02:d1:xx:xx:xx - no HT, num of non-HT stations 1
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x13 changes=2
nl80211: Set beacon (beacon_set=1)
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: association OK (aid 1)
Add randomness: count=127 entropy=93
mgmt::assoc_resp cb
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 1)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-ASSOCIATE.indication(00:02:d1:xx:xx:xx)
wlan0: STA 00:02:d1:xx:xx:xx MLME: MLME-DELETEKEYS.request(00:02:d1:xx:xx:xx)
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 00:02:d1:xx:xx:xx WPA: start authentication
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.1X: unauthorizing port
WPA: 00:02:d1:xx:xx:xx WPA_PTK_GROUP entering state IDLE
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state AUTHENTICATION
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 20 df 97 4b c3 d1 a7 b8 93 90 df cd b1 5d d0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITPSK
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKSTART
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: New station 00:02:d1:xx:xx:xx
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=95 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame
IEEE 802.1X: 121 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received Key Nonce - hexdump(len=32): f6 a6 3b bd 91 51 9e 86 90 bc bc 3a 6d d2 77 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
Add randomness: count=128 entropy=94
wlan0: STA 00:02:d1:xx:xx:xx WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=94:0c:6d:xx:xx:xx A2=00:02:d1:xx:xx:xx
WPA: Nonce1 - hexdump(len=32): 20 df 97 4b c3 d1 a7 b8 93 90 df cd b1 5d d0 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: Nonce2 - hexdump(len=32): f6 a6 3b bd 91 51 9e 86 90 bc bc 3a 6d d2 77 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=129 entropy=95
Add randomness: count=130 entropy=96
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=131 entropy=97
Add randomness: count=132 entropy=98
Add randomness: count=133 entropy=99
Add randomness: count=134 entropy=100
Add randomness: count=135 entropy=101
Add randomness: count=136 entropy=102
Add randomness: count=137 entropy=103
Add randomness: count=138 entropy=104
Add randomness: count=139 entropy=105
Add randomness: count=140 entropy=106
Add randomness: count=141 entropy=107
Add randomness: count=142 entropy=108
Add randomness: count=143 entropy=109
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=144 entropy=110
Add randomness: count=145 entropy=111
Add randomness: count=146 entropy=112
Add randomness: count=147 entropy=113
Add randomness: count=148 entropy=114
Add randomness: count=149 entropy=115
Add randomness: count=150 entropy=116
Add randomness: count=151 entropy=117
Add randomness: count=152 entropy=118
Add randomness: count=153 entropy=119
Add randomness: count=154 entropy=120
Add randomness: count=155 entropy=121
Add randomness: count=156 entropy=122
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
IEEE 802.1X: 00:02:d1:xx:xx:xx TX status - version=2 type=3 length=151 - ack=1
WPA: EAPOL-Key TX status for STA 00:02:d1:xx:xx:xx ack=1
IEEE 802.1X: 99 bytes from 00:02:d1:xx:xx:xx
   IEEE 802.1X: version=1 type=3 length=95
Ignore EAPOL-Key with unexpected type 254 in RSN mode
Add randomness: count=157 entropy=123
Add randomness: count=158 entropy=124
Add randomness: count=159 entropy=125
Add randomness: count=160 entropy=126
Add randomness: count=161 entropy=127
Add randomness: count=162 entropy=128
Add randomness: count=163 entropy=129
Add randomness: count=164 entropy=130
Add randomness: count=165 entropy=131
Add randomness: count=166 entropy=132
wlan0: STA 00:02:d1:xx:xx:xx WPA: EAPOL-Key timeout
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:02:d1:xx:xx:xx WPA: PTKINITNEGOTIATING: Retry limit 4 reached
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:02:d1:xx:xx:xx reason 2
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state DISCONNECTED
WPA: 00:02:d1:xx:xx:xx WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 alg=0 addr=0x8a5fd0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=00:02:d1:xx:xx:xx
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.1X: unauthorizing port
wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
hostapd_ht_operation_update current operation mode=0x13
hostapd_ht_operation_update new operation mode=0x0 changes=2
nl80211: Set beacon (beacon_set=1)
nl80211: Event message available
nl80211: Delete station 00:02:d1:xx:xx:xx
Add randomness: count=167 entropy=133
Add randomness: count=168 entropy=134
Add randomness: count=169 entropy=135
Add randomness: count=170 entropy=136
Add randomness: count=171 entropy=137
Add randomness: count=172 entropy=138
Add randomness: count=173 entropy=139
Add randomness: count=174 entropy=140
Add randomness: count=175 entropy=141
Add randomness: count=176 entropy=142
Add randomness: count=177 entropy=143
Add randomness: count=178 entropy=144
Add randomness: count=179 entropy=145
Add randomness: count=180 entropy=146
Add randomness: count=181 entropy=147
Add randomness: count=182 entropy=148
Add randomness: count=183 entropy=149
Add randomness: count=184 entropy=150
Add randomness: count=185 entropy=151
Add randomness: count=186 entropy=152
Add randomness: count=187 entropy=153
Add randomness: count=188 entropy=154
Add randomness: count=189 entropy=155
Add randomness: count=190 entropy=156
Add randomness: count=191 entropy=157
Add randomness: count=192 entropy=158
Add randomness: count=193 entropy=159
Add randomness: count=194 entropy=160
Add randomness: count=195 entropy=161
Add randomness: count=196 entropy=162
Add randomness: count=197 entropy=163
Add randomness: count=198 entropy=164
Add randomness: count=199 entropy=165
Add randomness: count=200 entropy=166
Add randomness: count=201 entropy=167
Add randomness: count=202 entropy=168
Add randomness: count=203 entropy=169
Add randomness: count=204 entropy=170
Add randomness: count=205 entropy=171
Add randomness: count=206 entropy=172
Add randomness: count=207 entropy=173
Add randomness: count=208 entropy=174
Add randomness: count=209 entropy=175
Add randomness: count=210 entropy=176
Add randomness: count=211 entropy=177
Add randomness: count=212 entropy=178

comment:2 Changed 7 years ago by duvi

I am seeing the same thing.
AP: RB433UAH, R52N wlan card.
Station: Dell Latitude D630, Intel 3945ABG

If I reboot the AP or restart hostapd manually, connection is possible, but after a while, e.g. taking my laptop away from home then coming back, or resuming from hibernation after a night, the same errors appear, and it just keeps trying to connect without success.

I attach a log from logread and hostapd.

AP config:

config wifi-device  radio1
        option disabled 0
        option type     mac80211
        option channel  36
        option macaddr  00:0c:42:61:a4:41
        option hwmode   11na
        option htmode   HT40+
        list ht_capab   SHORT-GI-40
        list ht_capab   TX-STBC
        list ht_capab   RX-STBC1
        list ht_capab   DSSS_CCK-40

config wifi-iface
        option device   radio1
        option network  lan
        option mode     ap
        option wds      0
        option ssid     *******
        option encryption psk-mixed
        option key      *********
        option wpa_group_rekey 3600

Changed 7 years ago by duvi

Changed 7 years ago by duvi

comment:3 Changed 7 years ago by AndreZ

Looks like in duvi's case the reason is different (timeouts). In mine seems that the following string is of most interest:

Ignore EAPOL-Key with unexpected type 254 in RSN mode

Andre

comment:4 Changed 7 years ago by jow

  • Owner changed from developers to nbd
  • Status changed from new to assigned

comment:5 Changed 7 years ago by duvi

Yes, it seems in my case these timeouts are the cause:

WPA: 00:1f:3c:52:74:13 WPA_PTK entering state INITPSK
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state PTKSTART
wlan1: STA 00:1f:3c:52:74:13 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: New station 00:1f:3c:52:74:13
wlan1: STA 00:1f:3c:52:74:13 WPA: EAPOL-Key timeout
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state PTKSTART
wlan1: STA 00:1f:3c:52:74:13 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan1: STA 00:1f:3c:52:74:13 WPA: EAPOL-Key timeout
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state PTKSTART
wlan1: STA 00:1f:3c:52:74:13 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan1: STA 00:1f:3c:52:74:13 WPA: EAPOL-Key timeout
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state PTKSTART
wlan1: STA 00:1f:3c:52:74:13 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan1: STA 00:1f:3c:52:74:13 WPA: EAPOL-Key timeout
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state PTKSTART
wlan1: STA 00:1f:3c:52:74:13 WPA: PTKSTART: Retry limit 4 reached
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:1f:3c:52:74:13 reason 2
WPA: 00:1f:3c:52:74:13 WPA_PTK entering state DISCONNECTED

Btw, forgot to say, I'm on r27139

comment:6 Changed 7 years ago by anonymous

my router have this case, wifi card ar9160.

comment:7 Changed 7 years ago by nbd

please try copying http://nbd.name/760-eapol_qos_high_priority.patch to package/hostapd/patches and check if it improves stability.

comment:8 Changed 7 years ago by nbd

  • Resolution set to duplicate
  • Status changed from assigned to closed

duplicate of #9646, which is more active

comment:9 Changed 7 years ago by anonymous

  • Resolution duplicate deleted
  • Status changed from closed to reopened

The fix that closed /ticket/9646.html did not help in my case. It must be something different.

Andre

comment:10 Changed 7 years ago by AndreZ

I'm using a Vivotek wifi camera IP7134.

Andre

comment:11 Changed 7 years ago by AndreZ

The config is pretty standard:

config 'wifi-device' 'radio0'

option 'type' 'mac80211'
option 'channel' '11'
option 'macaddr' '94:0c:6d:xx:xx:xx'
list 'ht_capab' 'SHORT-GI-40'
list 'ht_capab' 'DSSS_CCK-40'
option 'txpower' '27'
option 'country' 'US'
option 'disabled' '0'
option 'hwmode' '11ng'
option 'htmode' 'HT20'

config 'wifi-iface'

option 'device' 'radio0'
option 'network' 'lan'
option 'mode' 'ap'
option 'ssid' 'blabla'
option 'key' '*'
option 'encryption' 'psk2'

comment:12 Changed 7 years ago by AndreZ

It's Aplha Networks WMP-G11 Mini PCI board with Ralink RT2561/RT5225 dual band B/G chip.

Andre

comment:13 Changed 7 years ago by Paul Geraedts <p.f.j.geraedts@…>

@Andre: So for my understanding, you have tried a set of basic settings? Something like 'txpower' left to default, 'hwmode' set to '11g' and possibly even the 'encryption' to 'psk'?

For the rest you could take the same approach as I did in #9646. That is, first define the last known working release and the first known faulty release. Then test a release halfway these two known releases and update the last working and first faulty release numbers accordingly. Afterwards, test again a release halfway, and so on..

comment:14 Changed 7 years ago by AndreZ

Yes I tried all that before and retried again. Still the same.

comment:15 Changed 6 years ago by nbd

please try current trunk

comment:16 Changed 6 years ago by repvik@…

I've tried jow_laptop's "rc6" on an Asus-router with ath5k, and a D-Link wireless camera.
I'm getting the same log output from hostapd -dd as AndreZ, with the possibly interesting: "Ignore EAPOL-Key with unexpected type 254 in RSN mode"

Other wireless devices work fine, it is only the webcamera (D-link DCS-2121) that has this issue.

comment:17 Changed 6 years ago by AndreZ

It's running r27832. Is it current? The date on the ar71xx files there is still July 30.

Andre

comment:18 Changed 6 years ago by anonymous

Mine is current, was built approx. 2011-Aug-12 21:18:59
I can't check exact revision atm.

comment:19 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

nbd updated mac80211 in r27958, so it's interesting to test that release (or a later one); the release number is part of the banner text as shown when you login.

comment:20 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

I'm seeing the same issues on a wr841nd v5. I just built r27972 from source, and observing "wlan0: STA 5c:da:d4:87:90:8e IEEE 802.11: deauthenticated due to local deauth request" in my logs. I'm attempting to connect from an android phone. Will attach the hostapd log.

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

comment:21 Changed 6 years ago by nbd

After reading some more standard documents and RFCs, I came to the conclusion that the message "Ignore EAPOL-Key with unexpected type 254 in RSN mode" indicates that the client for some reason does not like the AP's authentication type. This error is not supposed to be used as a generic error indication, but the client uses it anyway.
Try 802.11g mode with WPA1 and TKIP, maybe that works better. I don't think this is an openwrt, mac80211, hostapd or ath9k bug.

comment:22 Changed 6 years ago by nbd

as for jonathan's wr841nd: there seem to be two clients, one can properly associate and authenticate, the other one (probably the android phone) does not even reply to WPA authentication packets. to see what's going on, please make a monitor mode capture of an assoc attempt to see if there's anything on the air that hostapd may be missing.

comment:23 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

I just realized that it seems to only be a problem when running in 802.11g + n mode. When running G only, everything seems to run just fine. Could it be that the AP is trying to talk to the android using wireless N, and the phone can't see those packets at all.

I'll go get wireshark running, and report anything I find.

comment:24 Changed 6 years ago by nbd

The AP will only use 802.11n for devices that have support for it (and announce it in their probe/assoc requests)
If this only shows up when 802.11n is enabled, then probably the driver running on the android device is buggy.

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

libpcap of HP printer experiencing local deauth

comment:25 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

mgmt::action cb
Add randomness: count=65 entropy=41
wlan0: STA 98:4b:e1:50:6f:dd WPA: EAPOL-Key timeout
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state PTKSTART
wlan0: STA 98:4b:e1:50:6f:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
Add randomness: count=66 entropy=42
Add randomness: count=67 entropy=43
Add randomness: count=68 entropy=44
Add randomness: count=69 entropy=45
Add randomness: count=70 entropy=46
Add randomness: count=71 entropy=47
Add randomness: count=72 entropy=48
wlan0: STA 98:4b:e1:50:6f:dd WPA: EAPOL-Key timeout
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state PTKSTART
wlan0: STA 98:4b:e1:50:6f:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
Add randomness: count=73 entropy=49
Add randomness: count=74 entropy=50
Add randomness: count=75 entropy=51
Add randomness: count=76 entropy=52
Add randomness: count=77 entropy=53
Add randomness: count=78 entropy=54
Add randomness: count=79 entropy=55
Add randomness: count=80 entropy=56
Add randomness: count=81 entropy=57
wlan0: STA 98:4b:e1:50:6f:dd WPA: EAPOL-Key timeout
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state PTKSTART
wlan0: STA 98:4b:e1:50:6f:dd WPA: PTKSTART: Retry limit 4 reached
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 98:4b:e1:50:6f:dd reason 2
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state DISCONNECTED
WPA: 98:4b:e1:50:6f:dd WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=12 alg=0 addr=0x780fc8 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=98:4b:e1:50:6f:dd
wlan0: STA 98:4b:e1:50:6f:dd IEEE 802.1X: unauthorizing port
wlan0: STA 98:4b:e1:50:6f:dd IEEE 802.11: deauthenticated due to local deauth request
hostapd_ht_operation_update current operation mode=0x4
hostapd_ht_operation_update new operation mode=0x4 changes=0
nl80211: Event message available
nl80211: Delete station 98:4b:e1:50:6f:dd
Add randomness: count=82 entropy=58

Now the android connects without problem, and the other device (a printer) is throwing the errors. I've got two laptops, and they are all showing the issue from time to time. I have attached a wireshark pcap file that I captured while the second device was trying to connect.

comment:26 Changed 6 years ago by nbd

Can you provide a bit more context of the hostapd log when the printer fails? I'd like all of the output that belongs to the initial connection attempt, so that I can see if it treats it as an N client or a legacy one.

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

comment:27 Changed 6 years ago by nbd

actually, i already found out from the capture that the printer is connecting as a single stream 802.11n client. The EAP frames are the first ones to be sent using 802.11n data rates (I can only see this indirectly due to the lack of radiotap MCS reporting), and they are not acknowledged by the printer. I suspect a client side issue here.

comment:28 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

I've had a laptop, a phone and a printer all exhibit this problem. It seems odd that it's all client side issues. And also that a previous revision didn't seem to exhibit this behaviour.

comment:29 Changed 6 years ago by nbd

which previous revision?

comment:30 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

I believe it was 27114 that I last used as my pseudo-stable build. I didn't observe any problems on that revision, and I ran it for a couple months, at least.

comment:31 Changed 6 years ago by nbd

do you still have that build somewhere? could you make a capture of a successful connection attempt with that, using same client device?

comment:32 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

I do have it. You want a wireshark capture, or a hostapd capture?

comment:33 Changed 6 years ago by nbd

both

comment:34 Changed 6 years ago by nbd

Just installed a newer version of wireshark and now I see proper MCS rate information. The AP sends its EAP packets using MCS0, which is something that the client should definitely be able to receive.

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

Pcap of printer connecting

comment:35 Changed 6 years ago by anonymous

So the printer connected just fine, from what I could see. Strangely enough, when I stopped wireshark and try to put the laptop back on the network, *it* got flaky and I got a couple deauth messages. This is just strange.

comment:36 Changed 6 years ago by nbd

please make another one, this one didn't contain the EAP packets sent from the AP to the client.

comment:37 Changed 6 years ago by nbd

just the pcap is enough

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

comment:38 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

The pcap is uploaded

comment:39 Changed 6 years ago by nbd

in that capture it only starts working after a while and after *huge* amounts of retransmissions. it seems that early rx after assoc on that particular client is very unreliable. the new builds may have decreased the number of retransmissions that it's allowed to do, maybe that's what's making it less reliable.

still does look like a client problem though. the signal strength is fine in both directions.

Changed 6 years ago by Jonathan Bennett <jbscience87@…>

Pcap of android not connecting

comment:40 Changed 6 years ago by Jon

Just for kicks, here is a pcap of the Android device not connecting to the router. On the android, I get a "authentication error" response. I'm fairly sure that the android is wireless G only.

comment:41 Changed 6 years ago by nbd

same thing, ap keeps retransmitting, client doesn't hear, AP eventually gives up and kicks the client. have you tried using a different channel, maybe there's some interference that's causing these mobile chipsets to act up.

I can't see anything wrong in what the AP is doing in these captures.

comment:42 Changed 6 years ago by Jonathan Bennett <jbscience87@…>

OK, I'll switch up the channel, and keep playing with it. Thanks for your input and help.

comment:43 Changed 6 years ago by AndreZ

Installed r27963 and it's still the same.

Andre

comment:44 Changed 6 years ago by nbd

Andre, did you see my comment about the "Ignore EAPOL-Key with unexpected type 254 in RSN mode" error?

comment:45 Changed 6 years ago by anonymous

I'm on r27962, and downgrading from WPA2 to WPA/TKIP works. But it's strange that the camera can connect to a whole host of other routers if it is a client problem.

comment:46 Changed 6 years ago by nbd

Maybe the problem is that your client device can't do CCMP. If 802.11n is enabled and the encryption type is not specified, the AP automatically enables CCMP only (because TKIP is not usable for 802.11n).

comment:47 Changed 6 years ago by repvik

In my case, the network is G only.

comment:48 Changed 6 years ago by AndreZ

Whatewer I try - WPA-TKIP, G, different channels - it's still the same:

Aug 14 15:05:48 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 3)
Aug 14 15:05:52 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Aug 14 15:05:55 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
Aug 14 15:05:55 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 3)
Aug 14 15:05:59 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Aug 14 15:06:02 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
Aug 14 15:06:02 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 3)
Aug 14 15:06:06 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request
Aug 14 15:06:09 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: authenticated
Aug 14 15:06:09 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: associated (aid 3)
Aug 14 15:06:13 OpenWrt daemon.info hostapd: wlan0: STA 00:02:d1:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request

comment:49 Changed 6 years ago by AndreZ

BTW, I'm on r27963.

Andre

Changed 6 years ago by AndreZ

comment:50 Changed 6 years ago by anonymous

I'm on r28007. Still the same. Attached a new log for reference.

Andre

comment:51 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

Ok, so it seems that the remaining issue of this ticket comes down to this 'Ignore EAPOL-Key with unexpected type 254 in RSN mode' that both Andre and repvik observe..

@nbd: I'm interested in the standard documents you referred to earlier. Could you tell me how I can acquire those documents? Up to so far I only came across '254' as the 'Descriptor Type' of an EAPOL key message meaning it's an '802.11i Key Message'. But that's probably not what is reported here I guess.. [read: currently I simply lack proper 802.11i knowledge unfortunately]

Anyhow, whatever it means, I'm interested in what would happen if hostapd *wouldn't* ignore this key, but would parse it anyhow. Maybe this unexpected type is only meant to *inform* the AP of something. Or the STA sets this 'RSN mode' to 254 accidentally..

Or could such an approach have side effects?

comment:52 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

Actually, I just observed in Andre's log that his STA uses the older EAPOL version 1. So maybe the STA tries to indicate that hostapd should use this older EAPOL version as well (eapol_version=1).

comment:53 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

@Andre: Could you please test something like:

  echo eapol_version=1 >> /var/run/hostapd-phy0.conf
  killall hostapd; hostapd -dd -t /var/run/hostapd-phy0.conf 2>&1 | grep -v "Add randomness:"

Changed 6 years ago by AndreZ

Another log.

comment:54 Changed 6 years ago by AndreZ

There you go.

Andre

comment:55 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

@Andre: Initially I got the impression from your log that hostapd was still using EAPOL version 2. Some personal testing changed my mind though: the (detailed) log of wpa_supplicant contains evidence that hostapd *is* using version 1 when you ask it to (although it does not mention it properly in its own log so it seems). See below for details.

So using EAPOL version 1 doesn't fix this behavior.. That brings me back to my earlier post about what if hostapd would not ignore the key, but parse it anyhow. Old hostapd logs give me the impression that this ignoring has been added somewhere in recent years. See for instance this forum post. If so, it has probably been done for good reasons, although I'm not sure which..

@nbd: Do you think the idea of not ignoring the keys makes sense?

hostapd's eapol_version=1 turns up into wpa_supplicant's detailed log as:
wifi0.sta0: IEEE 802.1X RX: version=1 type=3 length=127

hostapd's eapol_version=2 turns up into wpa_supplicant's detailed log as:
wifi0.sta0: IEEE 802.1X RX: version=2 type=3 length=127

comment:56 Changed 6 years ago by nbd

Try copying http://nbd.name/790-eapol_key_type.patch to package/hostapd/patches then

comment:57 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

Andre, can you please test this and post the log? (I haven't got access to the right equipment at the moment.)

comment:58 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

I compiled latest trunk including patch 790 overnight. Just copied the ar71xx images including the patch here.

comment:59 Changed 6 years ago by AndreZ

@Paul Geraedts: Flashed the image from your repository. Now it works perfectly! For the first time I see the camera normally associate with the AP and stay working fine. Fantastic! Thanks a lot for your help. I think this fix is definitely worth going into the normal OpenWrt.

Andre

comment:60 Changed 6 years ago by repvik

nbd: The patch isn't a permanent solution, is it? I'm getting the same issue with a Canon MP600R wireless printer as I'm getting with the D-Link camera.

comment:61 Changed 6 years ago by AndreZ

I'm still seeing occasional "deauthenticated due to local deauth request" messages, but much less frequent (once every 10 minutes instead of 3 times a minute like before) and the camera is connected and reachable.

Andre

comment:62 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

@Andre: The main purpose of this patch is to figure out what is going on. (The hostapd developers will have a good reason to ignore this specific key in the first place.) About the connection drops every 10 minutes: my guess is that the key is still ignored during the group rekeying (that happens by default every 10 minutes). Can you please send a detailed hostapd log of the current situation?

@repvik: What router are you using and which release of OpenWrt are you using? Did you add the 790 patch manually?

comment:63 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

..and to double-check, are you both using the latest firmwares for your camera/printer devices?

comment:64 Changed 6 years ago by AndreZ

Yes, I'm definitely using the latest fw for the camera.

Changed 6 years ago by AndreZ

comment:65 Changed 6 years ago by AndreZ

Added another log. The camera MAC is 00:02:d1:xx:xx:xx. There is also another client (laptop) - c0:cb:38:xx:xx:xx.

comment:66 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

Andre, your log indicates that hostapd does not (successfully) receive a reply of the camera during the group rekeying. Hostapd does not however report ignoring a received reply, so it is very well possible that the camera is sending none. For a definite answer we will need a capture of the traffic being sent. Please post this too.

For details you could have a look at my initial post of #9646.

comment:67 Changed 6 years ago by anonymous

@Paul: I'm using a TP-Link wr940n with -RC5 where the MP600R printer is. I don't think there's any available firmware for that one.
I'm also using a WRT350N and an ASUS WL500GP with -RC5. I can connect to neither with the DCS-2121 camera. It also has the latest firmware.

I cannot upgrade any of the routers atm, so I haven't tested the patch at all.

comment:68 Changed 6 years ago by AndreZ

@Paul: How should I capture the traffic?

comment:69 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

@repvik: Ok, that makes sense then. Does your printer also cause 'Ignore EAPOL-Key with unexpected type 254 in RSN mode' log messages? In general, it would be helpful if you could add a detailed hostapd log of both the camera and printer connection attempts, just like Andre did.

@Andre: Please have a look at nbd's explanation here. Be sure to write the file to a location which has lots of free space (e.g. USB disk).

comment:70 Changed 6 years ago by AndreZ

@Paul: OK I'll do it later at home. I need to plug in a USB drive.

comment:71 Changed 6 years ago by AndreZ

Somehow rebooting bricked my router. I'll need some time to unbrick it.

comment:72 Changed 6 years ago by AndreZ

@Paul: How do I get the log to you?

comment:73 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

Andre, please send the log to openwrt@….

comment:74 Changed 6 years ago by AndreZ

openwrt@…?

comment:75 Changed 6 years ago by repvik

(at) paulgeraedts.nl

comment:76 Changed 6 years ago by Paul Geraedts <p.f.j.geraedts@…>

@Andre: can you leave me your email address too (I think something went wrong).

P.S. You can see the full email addresses if you fill in your own during posting..

comment:77 Changed 6 years ago by nbd

  • Resolution set to fixed
  • Status changed from reopened to closed

patch committed in r28111, r28112

comment:78 Changed 6 years ago by AndreZ

andre at zuban dot com

comment:79 Changed 6 years ago by nbd

Andre, I had to revert that patch because it was causing regressions. Could you please run a version without the patch in WPA1 instead of WPA2 and show me if you get any similar error messages in the log?

comment:80 Changed 6 years ago by Pilot6 <hanipouspilot@…>

What do you mean by regressions? It is important because I try to finalize a build.

comment:81 Changed 6 years ago by AndreZ

I installed r28173 and the issue is back.

Andre

comment:82 Changed 6 years ago by nbd

Andre, See my comment from 11 days ago.

Changed 6 years ago by AndreZ

Another one with Encryption: WPA PSK (TKIP, CCMP)

comment:83 Changed 6 years ago by AndreZ

nbd: Updates?

comment:84 Changed 6 years ago by nbd

It's odd that it doesn't seem to send any WPA auth frames. try forcing TKIP or CCMP only

Changed 6 years ago by AndreZ

psk+ccmp

Changed 6 years ago by AndreZ

psk+tkip

comment:85 Changed 6 years ago by AndreZ

nbd: see two new logs for CCMP and TKIP.

comment:86 Changed 6 years ago by AndreZ

Bump.

comment:87 Changed 6 years ago by Andrew

  • Resolution fixed deleted
  • Status changed from closed to reopened

Hi.
I've got the deauth problem too on latest trunk (28310) build.
TP-Link 1043, client - D-link DWA-140 rev. B1 (Ralink RT2870)

comment:88 Changed 6 years ago by Andrew <pouchin@…>

WPA2-PSK, 11gn mode.
If i could help with logs, please tell me.

comment:89 Changed 6 years ago by mlealbr

Hi AndreZ and nbd,

Is there any news about this issue? I'm running r28173 and still experiencing this problem with an STB wifi. My router is a Linksys WRT160nl. Let me know if I can help with logs from both side (STB or router).

comment:90 Changed 6 years ago by nbd

there is no 'this problem', there are multiple completely different issues that share one symptom (deauthentications show up in the log).

I'm pretty sure you don't have the same issue as AndreZ. AndreZ's issue is rare and not fixed (most likely caused by broken client behavior, with no regression-free workaround found yet).

Whatever your issue is, it is not unlikely that it could go away if you update to current trunk.

Changed 6 years ago by mlealbr

hostapd log files

comment:91 Changed 6 years ago by mlealbr

I'm trying to insert a valid comment but it is being classified as spam.
Sorry.

comment:92 Changed 6 years ago by anonymous

nbd, thanks for your fast reply.

Well, I updated to the current trunk (r28499) and I'm still having the same problem that before.
I did some test trying to connect STB into the wifi and it failed with WPA2 with CCMP and TKIP, but was ok with WPA (both encryptions).
I attached the hostapd log from all cases.
When the connection failed, I received the message: "Ignore EAPOL-Key with unexpected type 254 in RSN mode"
And the more interesting thing is that if I put the original firmware (Linksys), the STB connect successfully to the wifi with WPA2+CCMP.
And, at the end, I can connect into wireless network from other clients (notebook, ps3 and iphone).

PS: I'm sorry by my misunderstood with the ticket system.

comment:93 Changed 6 years ago by nbd

Interesting. Do you have another device that you could use to capture the exchange between the STB and the AP with both the Linksys firmware and OpenWrt with WPA2? I'd like to compare both to see what the original firmware does differently.

comment:94 Changed 6 years ago by mlealbr

Hi nbd,
Excuse the delay. I'm trying to capture the exchange with tcpdump but I'm not getting it. Do you have any idea? I'm using BT5-R1.

comment:95 Changed 6 years ago by AndreZ

RC6 - same story.

Andre

comment:96 Changed 6 years ago by anonymous

root@debian:/home/en1gma# cd /home/en1gma/src/hostapd/hostapd
bash: cd: /home/en1gma/src/hostapd/hostapd: No such file or directory
root@debian:/home/en1gma# cd /home/en1gma/src/hostap/hostapd
root@debian:/home/en1gma/src/hostap/hostapd# ./hostapd -dd ./hostapd.conf
random: Trying to read entropy from /dev/random
Configuration file: ./hostapd.conf
nl80211: interface wlan0 in phy phy1
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Using driver-based off-channel TX
nl80211: Add own interface ifindex 3
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Create interface iftype 6 (MONITOR)
nl80211: New interface mon.wlan0 created: ifindex=7
nl80211: Add own interface ifindex 7
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz
nl80211: 2457-2482 @ 20 MHz
nl80211: 2474-2494 @ 20 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
Completing interface initialization
Mode: IEEE 802.11g Channel: 11 Frequency: 2462 MHz
nl80211: Set freq 2462 (ht_enabled=0 sec_channel_offset=0)
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Flushing old station entries
Deauthenticate all stations
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
Using interface wlan0 with hwaddr 00:25:9c:08:75:25 and ssid 'WIFI'
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=4):

57 49 46 49 WIFI

PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 bytes from /dev/random
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 alg=2 addr=0x80979d6 key_idx=1 set_tx=1 seq_len=0 key_len=32

broadcast key

wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
wlan0: Setup of interface done.
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
nl80211: Ignore interface down event since interface wlan0 is up
RTM_NEWLINK: operstate=1 ifi_flags=0x1002 ()
nl80211: Ignore interface down event since interface mon.wlan0 is up
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP])
netlink: Operstate: linkmode=-1, operstate=6
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Unknown event 5
Add randomness: count=1 entropy=0
Add randomness: count=2 entropy=1
Add randomness: count=3 entropy=2
Add randomness: count=4 entropy=3
Add randomness: count=5 entropy=4
Add randomness: count=6 entropy=5
Add randomness: count=7 entropy=6
Add randomness: count=8 entropy=7
Add randomness: count=9 entropy=8
Add randomness: count=10 entropy=9
Add randomness: count=11 entropy=10
mgmt::deauth cb
Add randomness: count=12 entropy=11
Add randomness: count=13 entropy=12
Add randomness: count=14 entropy=13
Add randomness: count=15 entropy=14
Add randomness: count=16 entropy=15
Add randomness: count=17 entropy=16
Add randomness: count=18 entropy=17
Add randomness: count=19 entropy=18
Add randomness: count=20 entropy=19
Add randomness: count=21 entropy=20
Add randomness: count=22 entropy=21
Add randomness: count=23 entropy=22
Add randomness: count=24 entropy=23
Add randomness: count=25 entropy=24
Add randomness: count=26 entropy=25
Add randomness: count=27 entropy=26
Add randomness: count=28 entropy=27
Add randomness: count=29 entropy=28
Add randomness: count=30 entropy=29
Add randomness: count=31 entropy=30
Add randomness: count=32 entropy=31
Add randomness: count=33 entropy=32
Add randomness: count=34 entropy=33
Add randomness: count=35 entropy=34
Add randomness: count=36 entropy=35
Add randomness: count=37 entropy=36
Add randomness: count=38 entropy=37
Add randomness: count=39 entropy=38
Add randomness: count=40 entropy=39
Add randomness: count=41 entropy=40
Add randomness: count=42 entropy=41
Add randomness: count=43 entropy=42
Add randomness: count=44 entropy=43
Add randomness: count=45 entropy=44
Add randomness: count=46 entropy=45
Add randomness: count=47 entropy=46
Add randomness: count=48 entropy=47
Add randomness: count=49 entropy=48
Add randomness: count=50 entropy=49
Add randomness: count=51 entropy=50
Add randomness: count=52 entropy=51
Add randomness: count=53 entropy=52
Add randomness: count=54 entropy=53
Add randomness: count=55 entropy=54
Add randomness: count=56 entropy=55
Add randomness: count=57 entropy=56
Add randomness: count=58 entropy=57
Add randomness: count=59 entropy=58
Add randomness: count=60 entropy=59
Add randomness: count=61 entropy=60
Add randomness: count=62 entropy=61
Add randomness: count=63 entropy=62
Add randomness: count=64 entropy=63
Add randomness: count=65 entropy=64
Add randomness: count=66 entropy=65
Add randomness: count=67 entropy=66
Add randomness: count=68 entropy=67
Add randomness: count=69 entropy=68
Add randomness: count=70 entropy=69
Add randomness: count=71 entropy=70
Add randomness: count=72 entropy=71
Add randomness: count=73 entropy=72
Add randomness: count=74 entropy=73
Add randomness: count=75 entropy=74
Add randomness: count=76 entropy=75
Add randomness: count=77 entropy=76
Add randomness: count=78 entropy=77
Add randomness: count=79 entropy=78
Add randomness: count=80 entropy=79
Add randomness: count=81 entropy=80
Add randomness: count=82 entropy=81
Add randomness: count=83 entropy=82
Add randomness: count=84 entropy=83
Add randomness: count=85 entropy=84
Add randomness: count=86 entropy=85
Add randomness: count=87 entropy=86
Add randomness: count=88 entropy=87

just did a 'git pull' about 10mins ago
uname -r = 3.0.0-1-686-pae
RT3572 chipset
0.33 ralink firmware 2870.bin

note this was working with 0.7.3 (wheezy repo)

any help would be great

comment:97 Changed 6 years ago by anonymous

omg
i just realized this is for openwrt

ignore my post above
mine if for debian wheezy on i386
sorry

comment:98 Changed 6 years ago by mlealbr

nbd,
at first I was thinking that I forgot something like to put my wifi interface into monitor mode, but after tried a lot with my notebook, I've to told you that I don't known how to capture the exchange between the STB and the AP, like you said.
please teach me on how to do this. I would like to track this issue into my case, possibly helping others.

comment:99 Changed 6 years ago by nbd

please try the latest version to see if it's more stable

comment:100 Changed 6 years ago by mlealbr

I'm experiencing the same problem.

Changed 6 years ago by mlealbr

hostapd-wifi_debug-mlealbr

comment:101 Changed 6 years ago by mlealbr@…

see the attached log files from hostapd with PC(ok) and STB(failed).
and some dumps that show the PC and STB connecting to the Linksys and OpenWrt firmwares.
remembering that the STB connects Ok with the Linksys firmware using the same WPA2+AES.
if i can help with more infos, please let me know.

comment:102 Changed 6 years ago by mlealbr@…

hi nbd,
did you see my last post? can you help me with this problem. At least look like very similar to the AndreZ' problem.

comment:103 Changed 6 years ago by nbd

please try latest trunk or backfire svn

comment:104 Changed 6 years ago by mlealbr@…

tested with r29697.
the problem persists.

comment:105 Changed 6 years ago by anonymous

i think the problems i encounter with the ath5k driver is related here /ticket/10775.html

in client mode-sta as soon as heavy traffic passes it disconnect and wifi up has to be done to reconnect.......

comment:106 Changed 6 years ago by anonymous

i have the same constant deauth/reauth issue with ath5k driver in latest backfire and trunk ......

comment:107 Changed 6 years ago by anonymous

here is the log from latest backfire branch with ath5k driver...

wlan0: associate with (mac address) (try 1)
wlan0: RX ReassocResp from (mac address) (capab=0x431 status=0 aid=1)
wlan0: associated
wlan0: authenticate with (mac address) (try 1)
wlan0: authenticated
wlan0: associate with (mac address) (try 1)
wlan0: RX ReassocResp from (mac address) (capab=0x431 status=0 aid=1)
wlan0: associated
wlan0: authenticate with (mac address) (try 1)
wlan0: authenticated

hope i could help

comment:108 Changed 6 years ago by nbd

please try trunk r29876 and see if it fixes the issue.

comment:109 Changed 6 years ago by mlealbr@…

sorry for the long delay, but now I've good news.
As the time passed, I downloaded the latest trunk today r29903 directly from the router (WRT160NL).
The final results is that now I can connect my STB with the wireless network.
Please, let me know if you need any futher information.
AndreZ, you should try this release!

Thanks.

comment:110 Changed 6 years ago by AndreZ

Will do.

Andre

comment:111 Changed 6 years ago by AndreZ

OMG, it works! Thanks a lot!

Andre

comment:112 Changed 6 years ago by nbd

  • Resolution set to fixed
  • Status changed from reopened to closed

comment:113 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.