From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 06:58:03 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6ECC11EB for ; Sun, 10 May 2015 06:58:03 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 58ED517A0 for ; Sun, 10 May 2015 06:58:03 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4A6w3bW007663 for ; Sun, 10 May 2015 06:58:03 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 176201] [net80211] [patch] 11n station includes unrelated ht params into ASSOC_REQ packet Date: Sun, 10 May 2015 06:58:02 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 9.1-PRERELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 06:58:03 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=176201 --- Comment #3 from commit-hook@freebsd.org --- A commit references this bug: Author: adrian Date: Sun May 10 06:57:53 UTC 2015 New revision: 282704 URL: https://svnweb.freebsd.org/changeset/base/282704 Log: Attempt to address Bug #176201 - don't advertise what the AP announced to us. Instead, advertise what we can do based on what the AP says and what we're capped at by the VAP settings. For non-STA modes we still advertise what our VAP settings are. It may be that I've over-complicated this and instead of capping things we can just always announce what we're capable of. But this should at least stop the blatantly wrong handling of A-MPDU parameters. (I'll happily simplify things if someone can dig up a replacement, better compliant behaviour.) PR: kern/176201 Changes: head/sys/net80211/ieee80211_ht.c -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 06:59:52 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id ECB3F350 for ; Sun, 10 May 2015 06:59:52 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D694A17AE for ; Sun, 10 May 2015 06:59:52 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4A6xqfe008192 for ; Sun, 10 May 2015 06:59:52 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 176201] [net80211] [patch] 11n station includes unrelated ht params into ASSOC_REQ packet Date: Sun, 10 May 2015 06:59:52 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 9.1-PRERELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: adrian@freebsd.org X-Bugzilla-Status: Closed X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 06:59:53 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=176201 Adrian Chadd changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|In Progress |Closed -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 16:49:01 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 78A479AA for ; Sun, 10 May 2015 16:49:01 +0000 (UTC) Received: from st11p00im-asmtp003.me.com (st11p00im-asmtp003.me.com [17.172.80.97]) (using TLSv1.2 with cipher DHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 549C41146 for ; Sun, 10 May 2015 16:49:00 +0000 (UTC) Received: from akita.localnet (c-73-162-13-215.hsd1.ca.comcast.net [73.162.13.215]) by st11p00im-asmtp003.me.com (Oracle Communications Messaging Server 7.0.5.35.0 64bit (built Dec 4 2014)) with ESMTPSA id <0NO500FOB81G6U20@st11p00im-asmtp003.me.com> for freebsd-wireless@freebsd.org; Sun, 10 May 2015 16:48:54 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151,1.0.33,0.0.0000 definitions=2015-05-10_03:2015-05-09,2015-05-10,1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=3 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1412110000 definitions=main-1505100227 From: Rui Paulo To: freebsd-wireless@freebsd.org Subject: Intel 3160/7260/7265 driver Date: Sun, 10 May 2015 09:48:51 -0700 Message-id: <8423530.QNK4YV6xft@akita> User-Agent: KMail/4.14.3 (FreeBSD/11.0-CURRENT; KDE/4.14.3; amd64; ; ) MIME-version: 1.0 Content-transfer-encoding: 7Bit Content-type: text/plain; charset=us-ascii X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 16:49:01 -0000 Hi, I've ported the OpenBSD iwm driver and it's sort of working now: https://github.com/rpaulo/iwm Some issues: - scanning is sort of broken now, so you must set the channel with ifconfig - ultra debugging mode is activated, so expect a lot of logs. This still needs quite a bit of work before it can be part of FreeBSD, but this email is being sent over iwm. :-) I only have a 7265, so I'd like people with 3160 or 7260 to try it out. Regards, -- Rui Paulo From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 18:33:03 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from hub.FreeBSD.org (hub.freebsd.org [IPv6:2001:1900:2254:206c::16:88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1A6FED34; Sun, 10 May 2015 18:33:01 +0000 (UTC) Date: Sun, 10 May 2015 18:32:57 +0000 From: Glen Barber To: Rui Paulo Cc: freebsd-wireless@freebsd.org Subject: Re: Intel 3160/7260/7265 driver Message-ID: <20150510183257.GA2018@hub.FreeBSD.org> References: <8423530.QNK4YV6xft@akita> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="fUYQa+Pmc3FrFX/N" Content-Disposition: inline In-Reply-To: <8423530.QNK4YV6xft@akita> X-Operating-System: FreeBSD 11.0-CURRENT amd64 X-SCUD-Definition: Sudden Completely Unexpected Dataloss X-SULE-Definition: Sudden Unexpected Learning Event User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 18:33:03 -0000 --fUYQa+Pmc3FrFX/N Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, May 10, 2015 at 09:48:51AM -0700, Rui Paulo wrote: > I've ported the OpenBSD iwm driver and it's sort of working now: >=20 > https://github.com/rpaulo/iwm >=20 > Some issues: > - scanning is sort of broken now, so you must set the channel with ifconf= ig > - ultra debugging mode is activated, so expect a lot of logs. >=20 > This still needs quite a bit of work before it can be part of FreeBSD, bu= t=20 > this email is being sent over iwm. :-) >=20 > I only have a 7265, so I'd like people with 3160 or 7260 to try it out. >=20 Thank you for working on this. The driver fails to attach on my system. pciconf(8) shows: iwm0@pci0:4:0:0: class=3D0x028000 card=3D0xc2708086 chip=3D0x08b28086= rev=3D0x83 hdr=3D0x00 vendor =3D 'Intel Corporation' class =3D network Unloading iwm(4) crashes the system (but unfortunately did not leave a crash dump). dmesg(8) output follows: wlan0: link state changed to UP iwm0: mem 0xe0400000-0xe0401fff irq 17= at device 0.0 on pci4 ->iwm_prepare_card_hw <-iwm_prepare_card_hw iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x9305a000 len 0x30000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x1ddff000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x111fe000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x9308a000 len 0x3200 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x9308e000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x93096000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x931a2000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x931aa000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x116bf000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x116c7000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x117dc000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x117e4000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x118f9000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11901000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11a16000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11a1e000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11b33000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11b3b000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11c50000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11c58000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11d6d000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11d75000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11e8a000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11e92000 len 0x14400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fa7000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11faf000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fb7000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fbf000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fc7000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fcf000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fd7000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fdf000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fe7000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11fef000 len 0x8000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11ff7000 len 0x400 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11ff8000 len 0xc iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x91fd2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x106e7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x170c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x170e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x91fb7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x170f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x106e8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x106e9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ca000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2cc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ce000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2cf000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2cb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2c1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x106bb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2d9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2db000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2dc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2dd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2de000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2df000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2eb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ec000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ed000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ef000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2ea000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2e0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2da000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x170d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2cd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2f8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2fa000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2fc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2fd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf2fe000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf300000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf302000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf303000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf304000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf306000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf308000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf30a000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf30b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf30d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf30f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf310000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf312000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf314000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf316000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf317000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf318000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf31a000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf31c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf31d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf31e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf320000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf322000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf323000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf325000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf326000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf327000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf328000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf329000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf330000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf331000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf333000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf335000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf337000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf338000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf339000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf341000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf33a000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf334000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf332000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf32a000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf324000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf342000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf344000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf345000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf346000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf347000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf348000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf34a000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf34c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf34e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf34f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf350000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf352000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf354000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf355000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf356000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf358000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf353000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf351000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf34b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf349000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf343000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf321000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf336000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf359000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf35b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf35c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf35d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf35e000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf35f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf361000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf363000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf365000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf366000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf367000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf369000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf36b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf36c000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf36d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf36f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf371000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf373000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf374000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf376000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf378000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf379000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf37b000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf37d000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf37f000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf380000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf381000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf383000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf385000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf386000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf387000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf389000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x111ff000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf3fe000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0xf3ff000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11200000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11201000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x11202000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x115fd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x115fe000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x115ff000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ab000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ac000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ad000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ae000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930af000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930b9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ba000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930bb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930bc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930bd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930be000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930bf000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930c9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ca000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930cb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930cc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930cd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ce000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930cf000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930d9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930da000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930db000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930dc000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930dd000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930de000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930df000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e5000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e6000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e7000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e8000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930e9000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ea000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930eb000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ec000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ed000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ee000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930ef000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f0000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f1000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f2000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f3000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f4000 len 0x1000 iwm_dma_map_addr error=3D0 nsegs=3D1 iwm_dma_map_addr addr 0x930f5000 len 0x1000 ->iwm_preinit ->iwm_prepare_card_hw <-iwm_prepare_card_hw ->iwm_prepare_card_hw <-iwm_prepare_card_hw iwm apm start iwm apm start Radio type=3D0x0-0x2-0x1 loading ring 0 descriptors (0xfffffe045688e000) at 9308e0 loading ring 1 descriptors (0xfffffe04569a2000) at 931a20 loading ring 2 descriptors (0xfffffe0456abf000) at 116bf0 loading ring 3 descriptors (0xfffffe0456bdc000) at 117dc0 loading ring 4 descriptors (0xfffffe0456cf9000) at 118f90 loading ring 5 descriptors (0xfffffe0456e16000) at 11a160 loading ring 6 descriptors (0xfffffe0456f33000) at 11b330 loading ring 7 descriptors (0xfffffe0457050000) at 11c500 loading ring 8 descriptors (0xfffffe045716d000) at 11d6d0 loading ring 9 descriptors (0xfffffe045728a000) at 11e8a0 loading ring 10 descriptors (0xfffffe04573a7000) at 11fa70 loading ring 11 descriptors (0xfffffe04573af000) at 11faf0 loading ring 12 descriptors (0xfffffe04573b7000) at 11fb70 loading ring 13 descriptors (0xfffffe04573bf000) at 11fbf0 loading ring 14 descriptors (0xfffffe04573c7000) at 11fc70 loading ring 15 descriptors (0xfffffe04573cf000) at 11fcf0 loading ring 16 descriptors (0xfffffe04573d7000) at 11fd70 loading ring 17 descriptors (0xfffffe04573df000) at 11fdf0 loading ring 18 descriptors (0xfffffe04573e7000) at 11fe70 loading ring 19 descriptors (0xfffffe04573ef000) at 11fef0 shadow registers enabled LOAD FIRMWARE type 0 offset 8388608 len 81920 iwm_firmware_load_chunk() chunk 0 of 3 returned error 35 iwm apm stop iwm apm stop =20 =20 Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0x5c fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff807506ba stack pointer =3D 0x28:0xfffffe04562c6750 frame pointer =3D 0x28:0xfffffe04562c6770 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 1842 (kldunload) trap number =3D 12 panic: page fault cpuid =3D 2 KDB: stack backtrace: #0 0xffffffff8073d217 at kdb_backtrace+0x67 #1 0xffffffff806faec1 at panic+0x1c1 #2 0xffffffff80a46089 at trap_fatal+0x379 #3 0xffffffff80a463be at trap_pfault+0x31e #4 0xffffffff80a45a01 at trap+0x461 #5 0xffffffff80a29302 at calltrap+0x8 #6 0xffffffff80830e45 at ieee80211_waitfor_parent+0x15 #7 0xffffffff80804ec6 at ieee80211_ifdetach+0x36 #8 0xffffffff8197f45a at iwm_detach+0x8a #9 0xffffffff80731052 at device_detach+0x52 #10 0xffffffff8073083b at devclass_driver_deleted+0x6b #11 0xffffffff8073075d at devclass_delete_driver+0x7d #12 0xffffffff807353e4 at driver_module_handler+0x44 #13 0xffffffff806e12e3 at module_unload+0x73 #14 0xffffffff806d4a2a at linker_file_unload+0x40a #15 0xffffffff806d5e9c at kern_kldunload+0xec #16 0xffffffff80a46ac7 at amd64_syscall+0x3e7 #17 0xffffffff80a295eb at Xfast_syscall+0xfb Uptime: 5m20s =20 --fUYQa+Pmc3FrFX/N Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVT6RZAAoJEAMUWKVHj+KThGUP/i+nokAgj9tpJNCPaGuVYUBo J6BdsG1AG7B5CA3FlFiM4mMiuXznMQYO8HwqJMVfk7gRPEnKuZxFpqF1Fux9OiIz DfhvjxUMsjV60sxC/KB1W5hEsmTUCC7b9cJ7Zclsci3JiXSw2yoVplGcwFNbt0G1 5H9aYhFYCWuZqZiAEwZqLP5nhanf1MBu8i+5YCR3fAXUCjXkOZM/obPRqy/5xhpw 0rah4TbGhpCJoWqSLRiFbrWpKCaNAtGfsodTrX2GQDbd9VNYXxOLZ3XLCnh53sht 77gO4ORPFEdO/Fxm3ptKZJ15F503yc1OY2KyFLOvEwfYSVmZSnwB+lawB/ZAihhc 6Ro/aUCvZMU3lAhNjRu0vp78LDFDi8dSMkzKpYp7UlNgtgXhcAl7KSBfnXs6qZQC PW1SFJRI2F7x6vopp5lDhhssNNrHEOnfb8w3WjRnOPQNzIPNhEYJiC1KbFAE7DM6 wPkcdFxeqCsQDCB5VgMRLi8FgtW+elh70L4QhQ0VqAJ6PmC9cRIpGiz6yRXQ9TwJ r4V91tyvlzpQMkJVo527Y6TC5aZo7cqLi6Ko8b50pjqZ0pFZkA39R0ZTjzwxgCzU Mjk7c2BGTTBMfc4DOrYfV7DvZHXGHJfGckgccRy+tWl1gYyh37dhhpLOd6Ma+rCa LGYRH2EO65qRkoc/d0S2 =5nQc -----END PGP SIGNATURE----- --fUYQa+Pmc3FrFX/N-- From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 20:47:07 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6ECEA762 for ; Sun, 10 May 2015 20:47:07 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 587C0190F for ; Sun, 10 May 2015 20:47:07 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4AKl7gs060859 for ; Sun, 10 May 2015 20:47:07 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 199632] [net80211] [patch]: Fix IBSS merge after entering the RUN state (was broken in r178354). Date: Sun, 10 May 2015 20:47:07 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: Closed X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 20:47:07 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199632 --- Comment #3 from Andriy Voskoboinyk --- Created attachment 156623 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156623&action=edit Fix a typo introduced in the previous change -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 21:00:15 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id F39A8994 for ; Sun, 10 May 2015 21:00:15 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E1D6B1A84 for ; Sun, 10 May 2015 21:00:15 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4AL0FtC075778 for ; Sun, 10 May 2015 21:00:15 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <201505102100.t4AL0FtC075778@kenobi.freebsd.org> From: bugzilla-noreply@FreeBSD.org To: freebsd-wireless@FreeBSD.org Subject: Problem reports for freebsd-wireless@FreeBSD.org that need special attention X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 Date: Sun, 10 May 2015 21:00:15 +0000 Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 21:00:16 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- Open | 154598 | [ath] Atheros 5424/2424 can't connect to WPA netw Open | 163312 | [panic] [ath] kernel panic: page fault with ath0 Open | 166190 | [ath] TX hangs and frames stuck in TX queue Open | 166357 | [ath] 802.11n TX stall when the first frame in th Open | 169362 | [ath] AR5416: radar pulse PHY errors sometimes in 5 problems total for which you should take action. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 21:01:50 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 654CDC9B for ; Sun, 10 May 2015 21:01:50 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4E6A91C08 for ; Sun, 10 May 2015 21:01:50 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4AL1olC004783 for ; Sun, 10 May 2015 21:01:50 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 199632] [net80211] [patch]: Fix IBSS merge after entering the RUN state (was broken in r178354). Date: Sun, 10 May 2015 21:01:50 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: Open X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status resolution Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 21:01:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199632 Andriy Voskoboinyk changed: What |Removed |Added ---------------------------------------------------------------------------- Status|Closed |Open Resolution|FIXED |--- --- Comment #4 from Andriy Voskoboinyk --- Temporary reopen the bug. -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 21:06:22 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6A5B4EB1 for ; Sun, 10 May 2015 21:06:22 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5405D1C32 for ; Sun, 10 May 2015 21:06:22 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4AL6M7O095624 for ; Sun, 10 May 2015 21:06:22 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 199632] [net80211] [patch]: Fix IBSS merge after entering the RUN state (was broken in r178354). Date: Sun, 10 May 2015 21:06:22 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 21:06:22 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199632 --- Comment #5 from commit-hook@freebsd.org --- A commit references this bug: Author: adrian Date: Sun May 10 21:05:32 UTC 2015 New revision: 282735 URL: https://svnweb.freebsd.org/changeset/base/282735 Log: Fix typo introduced in previous commit. PR: kern/199632 Submitted by: Andriy Voskoboinyk Changes: head/sys/net80211/ieee80211_adhoc.c -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sun May 10 22:39:59 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CFB31501 for ; Sun, 10 May 2015 22:39:59 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B9C1B14D0 for ; Sun, 10 May 2015 22:39:59 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4AMdxG2068043 for ; Sun, 10 May 2015 22:39:59 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 199632] [net80211] [patch]: Fix IBSS merge after entering the RUN state (was broken in r178354). Date: Sun, 10 May 2015 22:40:00 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: Closed X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 10 May 2015 22:39:59 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199632 Andriy Voskoboinyk changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|Open |Closed -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Mon May 11 11:37:39 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3F1014ED for ; Mon, 11 May 2015 11:37:39 +0000 (UTC) Received: from heemeyer.club (heemeyer.club [IPv6:2001:19f0:6400:80a1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "heemeyer.club", Issuer "heemeyer.club" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 127CC14D1 for ; Mon, 11 May 2015 11:37:38 +0000 (UTC) Received: from dchagin.static.corbina.net ([195.16.110.82]) by heemeyer.club (8.15.1/8.15.1) with ESMTPS id t4BBbW1o068103 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 May 2015 11:37:35 GMT (envelope-from dchagin@dchagin.static.corbina.net) X-Authentication-Warning: heemeyer.club: Host [195.16.110.82] claimed to be dchagin.static.corbina.net Received: from dchagin.static.corbina.net (localhost [127.0.0.1]) by dchagin.static.corbina.net (8.15.1/8.15.1) with ESMTPS id t4BBbVnq002941 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 11 May 2015 14:37:31 +0300 (MSK) (envelope-from dchagin@dchagin.static.corbina.net) Received: (from dchagin@localhost) by dchagin.static.corbina.net (8.15.1/8.15.1/Submit) id t4BBbVWb002940; Mon, 11 May 2015 14:37:31 +0300 (MSK) (envelope-from dchagin) Date: Mon, 11 May 2015 14:37:30 +0300 From: Chagin Dmitry To: Rui Paulo Cc: freebsd-wireless@freebsd.org Subject: Re: Intel 3160/7260/7265 driver Message-ID: <20150511113730.GA2918@dchagin.static.corbina.net> References: <8423530.QNK4YV6xft@akita> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8423530.QNK4YV6xft@akita> User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 May 2015 11:37:39 -0000 On Sun, May 10, 2015 at 09:48:51AM -0700, Rui Paulo wrote: > Hi, > > I've ported the OpenBSD iwm driver and it's sort of working now: > > https://github.com/rpaulo/iwm > > Some issues: > - scanning is sort of broken now, so you must set the channel with ifconfig > - ultra debugging mode is activated, so expect a lot of logs. > > This still needs quite a bit of work before it can be part of FreeBSD, but > this email is being sent over iwm. :-) > > I only have a 7265, so I'd like people with 3160 or 7260 to try it out. > 7260 here: iwm0@pci0:4:0:0: class=0x028000 card=0xc2628086 chip=0x08b28086 rev=0x6b hdr=0x00 vendor = 'Intel Corporation' class = network dchagin@dchagin:~ % uname -a FreeBSD dchagin.static.corbina.net 11.0-CURRENT FreeBSD 11.0-CURRENT #54 r282747+dac2479(lemul): Mon May 11 14:15:37 MSK 2015 root@dchagin.static.corbina.net:/home/rootobj/home/git/head/sys/YOY amd64 dchagin@dchagin:~ % works, thank you!! -- Have fun! chd From owner-freebsd-wireless@FreeBSD.ORG Mon May 11 13:00:46 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D4799D4B for ; Mon, 11 May 2015 13:00:46 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BE2551EFC for ; Mon, 11 May 2015 13:00:46 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4BD0kQH082078 for ; Mon, 11 May 2015 13:00:46 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 200128] [net80211] [patch]: exclude QoS Null frames from sequence number checking Date: Mon, 11 May 2015 13:00:46 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 May 2015 13:00:46 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200128 Bug ID: 200128 Summary: [net80211] [patch]: exclude QoS Null frames from sequence number checking Product: Base System Version: 11.0-CURRENT Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Only Me Priority: --- Component: wireless Assignee: freebsd-wireless@FreeBSD.org Reporter: s3erios@gmail.com Keywords: patch Created attachment 156655 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156655&action=edit Do not check sequence number for QoS Null frames; set it for generated QoS Null frames to 0 >From IEEE Std. 802.11-2012, 8.3.2.1 "Data frame format", p. 415 (513): "The Sequence Control field for QoS (+)Null frames is ignored by the receiver upon reception." At this moment, any _input() function interprets them as regular QoS data frames with TID = 0. As a result, stations, that use another TX sequence for QoS Null frames (e.g. wpi(4), where (QoS) Null frames are generated by the firmware), may experience significant packet loss with any other NIC in hostap mode. -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Mon May 11 20:27:48 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CD0BFF34 for ; Mon, 11 May 2015 20:27:48 +0000 (UTC) Received: from heemeyer.club (heemeyer.club [IPv6:2001:19f0:6400:80a1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "heemeyer.club", Issuer "heemeyer.club" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id AA55F1767 for ; Mon, 11 May 2015 20:27:48 +0000 (UTC) Received: from dchagin.static.corbina.net (dchagin.static.corbina.ru [78.107.232.239]) by heemeyer.club (8.15.1/8.15.1) with ESMTPS id t4BKRcMZ069826 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 May 2015 20:27:42 GMT (envelope-from dchagin@dchagin.static.corbina.net) X-Authentication-Warning: heemeyer.club: Host dchagin.static.corbina.ru [78.107.232.239] claimed to be dchagin.static.corbina.net Received: from dchagin.static.corbina.net (localhost [127.0.0.1]) by dchagin.static.corbina.net (8.15.1/8.15.1) with ESMTPS id t4BKRWfM001566 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 11 May 2015 23:27:32 +0300 (MSK) (envelope-from dchagin@dchagin.static.corbina.net) Received: (from dchagin@localhost) by dchagin.static.corbina.net (8.15.1/8.15.1/Submit) id t4BKRWj2001565; Mon, 11 May 2015 23:27:32 +0300 (MSK) (envelope-from dchagin) Date: Mon, 11 May 2015 23:27:32 +0300 From: Chagin Dmitry To: Rui Paulo Cc: freebsd-wireless@freebsd.org Subject: Re: Intel 3160/7260/7265 driver Message-ID: <20150511202732.GA1541@dchagin.static.corbina.net> References: <8423530.QNK4YV6xft@akita> <20150511113730.GA2918@dchagin.static.corbina.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20150511113730.GA2918@dchagin.static.corbina.net> User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 May 2015 20:27:48 -0000 On Mon, May 11, 2015 at 02:37:30PM +0300, Chagin Dmitry wrote: > On Sun, May 10, 2015 at 09:48:51AM -0700, Rui Paulo wrote: > > Hi, > > > > I've ported the OpenBSD iwm driver and it's sort of working now: > > > > https://github.com/rpaulo/iwm > > > > Some issues: > > - scanning is sort of broken now, so you must set the channel with ifconfig > > - ultra debugging mode is activated, so expect a lot of logs. > > > > This still needs quite a bit of work before it can be part of FreeBSD, but > > this email is being sent over iwm. :-) > > > > I only have a 7265, so I'd like people with 3160 or 7260 to try it out. > > > 7260 here: > > iwm0@pci0:4:0:0: class=0x028000 card=0xc2628086 chip=0x08b28086 rev=0x6b hdr=0x00 > vendor = 'Intel Corporation' > class = network > > dchagin@dchagin:~ % uname -a > FreeBSD dchagin.static.corbina.net 11.0-CURRENT FreeBSD 11.0-CURRENT #54 r282747+dac2479(lemul): Mon May 11 14:15:37 MSK 2015 > root@dchagin.static.corbina.net:/home/rootobj/home/git/head/sys/YOY amd64 > dchagin@dchagin:~ % > > works, thank you!! > got a panic: #13 0xffffffff8075ddc0 in panic (fmt=0xffffffff80ded781 "sleeping thread") at /home/git/head/sys/kern/kern_shutdown.c:675 #14 0xffffffff807eb109 in propagate_priority (td=0xfffff8017a084000) at /home/git/head/sys/kern/subr_turnstile.c:226 #15 0xffffffff807ec7c8 in turnstile_wait (ts=0xfffff80009eca240, owner=0xfffff8017a084000, queue=0x0) at /home/git/head/sys/kern/subr_turnstile.c:742 #16 0xffffffff80736451 in __mtx_lock_sleep (c=0xfffffe00034e0030, tid=0xfffff80009ec34d0, opts=0x0, file=0xffffffff80e07320 "/home/git/head/sys/net80211/ieee80211_ioctl.c", line=0x94e) at /home/git/head/sys/kern/kern_mutex.c:514 #17 0xffffffff80735992 in __mtx_lock_flags (c=0xfffffe00034e0030, opts=0x0, file=0xffffffff80e07320 "/home/git/head/sys/net80211/ieee80211_ioctl.c", line=0x94e) at /home/git/head/sys/kern/kern_mutex.c:222 #18 0xffffffff80950748 in ieee80211_ioctl_setappie (vap=0xfffff8017a36b000, ireq=0xfffffe033bfcd7e8) at /home/git/head/sys/net80211/ieee80211_ioctl.c:2382 #19 0xffffffff8094e19d in ieee80211_ioctl_set80211 (vap=0xfffff8017a36b000, cmd=0x802069ea, ireq=0xfffffe033bfcd7e8) at /home/git/head/sys/net80211/ieee80211_ioctl.c:3193 #20 0xffffffff8094b074 in ieee80211_ioctl (ifp=0xfffff80010efe000, cmd=0x802069ea, data=0xfffffe033bfcd7e8 "wlan0") at /home/git/head/sys/net80211/ieee80211_ioctl.c:3383 #21 0xffffffff809ef48c in in_control (so=0xfffff80010290ba0, cmd=0x802069ea, data=0xfffffe033bfcd7e8 "wlan0", ifp=0xfffff80010efe000, td=0xfffff80009ec34d0) at /home/git/head/sys/netinet/in.c:261 #22 0xffffffff808dca1e in ifioctl (so=0xfffff80010290ba0, cmd=0x802069ea, data=0xfffffe033bfcd7e8 "wlan0", td=0xfffff80009ec34d0) at /home/git/head/sys/net/if.c:2761 #23 0xffffffff8080fe74 in soo_ioctl (fp=0xfffff80009eff410, cmd=0x802069ea, data=0xfffffe033bfcd7e8, active_cred=0xfffff8017a01ce00, td=0xfffff80009ec34d0) at /home/git/head/sys/kern/sys_sock #24 0xffffffff8080281c in fo_ioctl (fp=0xfffff80009eff410, com=0x802069ea, data=0xfffffe033bfcd7e8, active_cred=0xfffff8017a01ce00, td=0xfffff80009ec34d0) at file.h:321 #25 0xffffffff808026a6 in kern_ioctl (td=0xfffff80009ec34d0, fd=0x3, com=0x802069ea, data=0xfffffe033bfcd7e8 "wlan0") at /home/git/head/sys/kern/sys_generic.c:813 #26 0xffffffff80802269 in sys_ioctl (td=0xfffff80009ec34d0, uap=0xfffffe033bfcda58) at /home/git/head/sys/kern/sys_generic.c:722 #27 0xffffffff80ca135a in syscallenter (td=0xfffff80009ec34d0, sa=0xfffffe033bfcda48) at subr_syscall.c:133 #28 0xffffffff80ca0c1a in amd64_syscall (td=0xfffff80009ec34d0, traced=0x0) at /home/git/head/sys/amd64/amd64/trap.c:984 #29 0xffffffff80c77adb in Xfast_syscall () at /home/git/head/sys/amd64/amd64/exception.S:395 #30 0x00000008014d238a in ?? () (kgdb) -- Have fun! chd From owner-freebsd-wireless@FreeBSD.ORG Tue May 12 00:28:50 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 61CA2A33 for ; Tue, 12 May 2015 00:28:50 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C59B12D3 for ; Tue, 12 May 2015 00:28:50 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4C0Sosu081386 for ; Tue, 12 May 2015 00:28:50 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 200136] [rum] [patch]: add IBSS merge support Date: Tue, 12 May 2015 00:28:47 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2015 00:28:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200136 Bug ID: 200136 Summary: [rum] [patch]: add IBSS merge support Product: Base System Version: 11.0-CURRENT Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Only Me Priority: --- Component: wireless Assignee: freebsd-wireless@FreeBSD.org Reporter: s3erios@gmail.com Keywords: patch Created attachment 156671 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156671&action=edit Add TSF field into radiotap Tested with WUSB54GC (not sure about other devices). -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Tue May 12 00:30:02 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 07F94AF9 for ; Tue, 12 May 2015 00:30:02 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E676C12E3 for ; Tue, 12 May 2015 00:30:01 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4C0U1Gs082014 for ; Tue, 12 May 2015 00:30:01 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 200136] [rum] [patch]: add IBSS merge support Date: Tue, 12 May 2015 00:30:02 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2015 00:30:02 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200136 --- Comment #1 from Andriy Voskoboinyk --- Created attachment 156672 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156672&action=edit Add IBSS merge support -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Tue May 12 16:56:41 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 51D5E64A for ; Tue, 12 May 2015 16:56:41 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3B71A17DB for ; Tue, 12 May 2015 16:56:41 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4CGufZi079233 for ; Tue, 12 May 2015 16:56:41 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 200128] [net80211] [patch]: exclude QoS Null frames from sequence number checking Date: Tue, 12 May 2015 16:56:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2015 16:56:41 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200128 --- Comment #1 from commit-hook@freebsd.org --- A commit references this bug: Author: adrian Date: Tue May 12 16:55:52 UTC 2015 New revision: 282820 URL: https://svnweb.freebsd.org/changeset/base/282820 Log: Do not check sequence number for QoS Null frames; set it for generated QoS Null frames to 0 From IEEE Std. 802.11-2012, 8.3.2.1 "Data frame format", p. 415 (513): "The Sequence Control field for QoS (+)Null frames is ignored by the receiver upon reception." At this moment, any _input() function interprets them as regular QoS data frames with TID = 0. As a result, stations, that use another TX sequence for QoS Null frames (e.g. wpi(4), where (QoS) Null frames are generated by the firmware), may experience significant packet loss with any other NIC in hostap mode. Tested: * wpi(4) (author) * iwn(4) - Intel 5100, STA mode (me) PR: kern/200128 Submitted by: Andriy Voskoboinyk Changes: head/sys/net80211/ieee80211.h head/sys/net80211/ieee80211_adhoc.c head/sys/net80211/ieee80211_hostap.c head/sys/net80211/ieee80211_input.h head/sys/net80211/ieee80211_output.c head/sys/net80211/ieee80211_sta.c head/sys/net80211/ieee80211_wds.c -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Tue May 12 20:45:48 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 09F4EECD for ; Tue, 12 May 2015 20:45:48 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E8A2614DC for ; Tue, 12 May 2015 20:45:47 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4CKjlU2036204 for ; Tue, 12 May 2015 20:45:47 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 196264] [iwn] [patch]: few minor fixes Date: Tue, 12 May 2015 20:45:48 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.isobsolete attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2015 20:45:48 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196264 Andriy Voskoboinyk changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #153996|0 |1 is obsolete| | --- Comment #4 from Andriy Voskoboinyk --- Created attachment 156730 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156730&action=edit Patch-v3.diff (untested) - Pass control frames to host. - Do not set TX timer on error. - Free node references for unsent frames on device stop. -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 01:16:33 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 973A466B for ; Wed, 13 May 2015 01:16:33 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 81772119F for ; Wed, 13 May 2015 01:16:33 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4D1GXiT047785 for ; Wed, 13 May 2015 01:16:33 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 196264] [iwn] [patch]: few minor fixes Date: Wed, 13 May 2015 01:16:33 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: adrian@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 01:16:33 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196264 Adrian Chadd changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |adrian@freebsd.org --- Comment #5 from Adrian Chadd --- Hi, Do you not have anything with iwn(4) hardware in it? -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 06:40:34 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1CC86BFD for ; Wed, 13 May 2015 06:40:34 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 074BF14F1 for ; Wed, 13 May 2015 06:40:34 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4D6eXHJ013013 for ; Wed, 13 May 2015 06:40:33 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 200128] [net80211] [patch]: exclude QoS Null frames from sequence number checking Date: Wed, 13 May 2015 06:40:34 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: adrian@freebsd.org X-Bugzilla-Status: Closed X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution bug_status cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 06:40:34 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200128 Adrian Chadd changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|New |Closed CC| |adrian@freebsd.org -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 12:11:56 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 839F21F4 for ; Wed, 13 May 2015 12:11:56 +0000 (UTC) Received: from mail-la0-x232.google.com (mail-la0-x232.google.com [IPv6:2a00:1450:4010:c03::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 764A51ED9 for ; Wed, 13 May 2015 12:11:55 +0000 (UTC) Received: by labbd9 with SMTP id bd9so27737532lab.2 for ; Wed, 13 May 2015 05:11:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:subject:date:message-id:mime-version:content-type :thread-index:content-language; bh=O+mkNl3v63X0q8VdfBrb0douUTHf9b8COqsw789uF4M=; b=zYaGug9+fLaZmOTMwOJnmwE1HgIN92zG5vv4lGpEU4VRXtCNLCutxLklECeq6AOGuZ NERkenwGk/5jphACpWxX2lWXPO590nk4Qo7KJunljkudus+hEcck68UzRl2eeSuU1reH GjgM3tmetohEg9P0tpv6qYE61gNpxqYj5tAO/2nHQW1Cuz3LmGJjVoEO08ZNXbmUjMiX eiNxnJVjxzy4PBX1jcCoKiRL7bH37a3tEYurbEod5gGCIn+x1IOjvk8hlzZPuyp6hr/z BqaB8Erb/mTcQGq0Z0vl6fTO8CeST8mFR3GyjTwkmgYjQUlqt9b/CZgM5yWpnedzFPhT xGEw== X-Received: by 10.152.5.164 with SMTP id t4mr15640747lat.16.1431519113490; Wed, 13 May 2015 05:11:53 -0700 (PDT) Received: from botmachine (muszelka.nat.student.pw.edu.pl. [194.29.137.5]) by mx.google.com with ESMTPSA id ln6sm4920480lac.45.2015.05.13.05.11.51 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 13 May 2015 05:11:52 -0700 (PDT) From: "Marcin Michta" To: Subject: hostapd + freeradius can't connect Date: Wed, 13 May 2015 14:11:49 +0200 Message-ID: <01e701d08d75$fed02bd0$fc708370$@gmail.com> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdCNddo0bI4eTSnSRT2Y2UKW2g9RWA== Content-Language: pl Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 12:11:56 -0000 Hi all, So I'm trying configure hostapd to work (peap + mschapv2). I tried connect by wpa_suplicant on FreeBSD, and Ubuntu with gui, but without success. Freeradius allow to connect, but connections are failed - every time get: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:24:d7:6f:eb:c4 reason 2 Where is mistake/bug? Or what is wrong? log: 1431101834.596845: Configuration file: hostapd.conf 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable is not used anymore 1431101834.626788: ctrl_interface_group=0 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) 1431101834.627098: Completing interface initialization 1431101834.627101: Flushing old station entries 1431101834.627109: Deauthenticate all stations 1431101834.627113: bsd_set_privacy: enabled=0 1431101834.627117: bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0 1431101834.627120: bsd_del_key: key_idx=0 1431101834.627124: bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1431101834.627127: bsd_del_key: key_idx=1 1431101834.627130: bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1431101834.627133: bsd_del_key: key_idx=2 1431101834.627136: bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1431101834.627139: bsd_del_key: key_idx=3 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 and ssid 'RADIUS' 1431101834.627155: wlan0: RADIUS Authentication server 10.146.20.137:1812 1431101834.627257: RADIUS local address: 10.146.103.7:14137 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813 1431101834.627288: RADIUS local address: 10.146.103.7:14773 1431101834.627294: bsd_set_ieee8021x: enabled=1 1431101834.627296: bsd_configure_wpa: enable WPA= 0x1 1431101834.627514: WPA: group state machine entering state GTK_INIT (VLAN-ID 0) 1431101834.627527: GMK - hexdump(len=32): [REMOVED] 1431101834.627530: GTK - hexdump(len=32): [REMOVED] 1431101834.627532: WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) 1431101834.627535: bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32 1431101834.632173: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not configured 1431101834.632194: bsd_set_privacy: enabled=1 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24) 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting server 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101834.702842: wlan0: Setup of interface done. 1431101834.702886: Discard routing message to if#0 (not for us 8) 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server 1431101834.702914: wlan0: RADIUS Received RADIUS message 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.07 sec 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: associated 1431101867.876215: STA included WPA IE in (Re)AssocReq 1431101867.876220: New STA 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1 notification 1431101867.876243: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=0 1431101867.876248: bsd_del_key: addr=00:24:d7:6f:eb:c4 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start authentication 1431101867.876270: EAP: Server state machine created 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state IDLE 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering state FORCE_BOTH 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start authentication 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITIALIZE 1431101867.876307: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=0 1431101867.876310: bsd_del_key: addr=00:24:d7:6f:eb:c4 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state IDLE 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state AUTHENTICATION 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state AUTHENTICATION2 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state DISCONNECTED 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: unauthorizing port 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state RESTART 1431101867.876354: EAP: EAP entering state INITIALIZE 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4 1431101867.876360: EAP: EAP entering state SELECT_ACTION 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD 1431101867.876366: EAP: getNextMethod: vendor 0 type 1 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 1431101867.876371: EAP: EAP entering state METHOD_REQUEST 1431101867.876374: EAP: building EAP-Request: Identifier 77 1431101867.876377: EAP: EAP entering state SEND_REQUEST 1431101867.876379: EAP: EAP entering state IDLE 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state CONNECTING 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state AUTHENTICATING 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 77) 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4 1431101867.880294: IEEE 802.1X: version=1 type=0 length=10 1431101867.880298: EAP: code=2 identifier=77 length=10 1431101867.880300: (response) 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=77 len=10) from STA: EAP Response-Identity (1) 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.880326: EAP: EAP entering state RECEIVED 1431101867.880328: EAP: parseEapResp: rxResp=1 respId=77 respMethod=1 respVendor=0 respVendorMethod=0 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE 1431101867.880335: EAP-Identity: Peer identity - hexdump_ascii(len=5): 7a 65 6e 6f 6e zenon 1431101867.880341: EAP: EAP entering state SELECT_ACTION 1431101867.880343: EAP: getDecision: -> PASSTHROUGH 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH 1431101867.880347: EAP: EAP entering state AAA_REQUEST 1431101867.880348: EAP: EAP entering state AAA_IDLE 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA identity 'zenon' 1431101867.880363: Encapsulating EAP message into a RADIUS packet 1431101867.880379: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server 1431101867.882237: wlan0: RADIUS Received RADIUS message 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.882272: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=78 len=6) from RADIUS server: EAP-Request-PEAP (25) 1431101867.882305: EAP: EAP entering state AAA_RESPONSE 1431101867.882308: EAP: getId: id=78 1431101867.882311: EAP: EAP entering state SEND_REQUEST2 1431101867.882313: EAP: EAP entering state IDLE2 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 78) 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4 1431101867.883907: IEEE 802.1X: version=1 type=0 length=118 1431101867.883923: EAP: code=2 identifier=78 length=118 1431101867.883925: (response) 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=78 len=118) from STA: EAP Response-PEAP (25) 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.883952: EAP: EAP entering state RECEIVED2 1431101867.883954: EAP: parseEapResp: rxResp=1 respId=78 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.883956: EAP: EAP entering state AAA_REQUEST 1431101867.883959: EAP: EAP entering state AAA_IDLE 1431101867.883961: Encapsulating EAP message into a RADIUS packet 1431101867.883969: Copied RADIUS State Attribute 1431101867.883975: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS server 1431101867.890413: wlan0: RADIUS Received RADIUS message 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.890450: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=79 len=1004) from RADIUS server: EAP-Request-PEAP (25) 1431101867.890483: EAP: EAP entering state AAA_RESPONSE 1431101867.890486: EAP: getId: id=79 1431101867.890489: EAP: EAP entering state SEND_REQUEST2 1431101867.890491: EAP: EAP entering state IDLE2 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 79) 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 1431101867.892408: IEEE 802.1X: version=1 type=0 length=6 1431101867.892423: EAP: code=2 identifier=79 length=6 1431101867.892426: (response) 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=79 len=6) from STA: EAP Response-PEAP (25) 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.892454: EAP: EAP entering state RECEIVED2 1431101867.892456: EAP: parseEapResp: rxResp=1 respId=79 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.892459: EAP: EAP entering state AAA_REQUEST 1431101867.892461: EAP: EAP entering state AAA_IDLE 1431101867.892463: Encapsulating EAP message into a RADIUS packet 1431101867.892471: Copied RADIUS State Attribute 1431101867.892477: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS server 1431101867.893185: wlan0: RADIUS Received RADIUS message 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.893222: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=80 len=1000) from RADIUS server: EAP-Request-PEAP (25) 1431101867.893245: EAP: EAP entering state AAA_RESPONSE 1431101867.893249: EAP: getId: id=80 1431101867.893251: EAP: EAP entering state SEND_REQUEST2 1431101867.893253: EAP: EAP entering state IDLE2 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 80) 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 1431101867.894043: IEEE 802.1X: version=1 type=0 length=6 1431101867.894047: EAP: code=2 identifier=80 length=6 1431101867.894049: (response) 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=80 len=6) from STA: EAP Response-PEAP (25) 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.894078: EAP: EAP entering state RECEIVED2 1431101867.894080: EAP: parseEapResp: rxResp=1 respId=80 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.894083: EAP: EAP entering state AAA_REQUEST 1431101867.894085: EAP: EAP entering state AAA_IDLE 1431101867.894087: Encapsulating EAP message into a RADIUS packet 1431101867.894095: Copied RADIUS State Attribute 1431101867.894101: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server 1431101867.894777: wlan0: RADIUS Received RADIUS message 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.894814: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=81 len=904) from RADIUS server: EAP-Request-PEAP (25) 1431101867.894847: EAP: EAP entering state AAA_RESPONSE 1431101867.894851: EAP: getId: id=81 1431101867.894853: EAP: EAP entering state SEND_REQUEST2 1431101867.894855: EAP: EAP entering state IDLE2 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 81) 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4 1431101867.902157: IEEE 802.1X: version=1 type=0 length=208 1431101867.902173: EAP: code=2 identifier=81 length=208 1431101867.902175: (response) 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=81 len=208) from STA: EAP Response-PEAP (25) 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.902203: EAP: EAP entering state RECEIVED2 1431101867.902205: EAP: parseEapResp: rxResp=1 respId=81 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.902207: EAP: EAP entering state AAA_REQUEST 1431101867.902209: EAP: EAP entering state AAA_IDLE 1431101867.902211: Encapsulating EAP message into a RADIUS packet 1431101867.902219: Copied RADIUS State Attribute 1431101867.902225: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server 1431101867.905067: wlan0: RADIUS Received RADIUS message 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.905090: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=82 len=65) from RADIUS server: EAP-Request-PEAP (25) 1431101867.905114: EAP: EAP entering state AAA_RESPONSE 1431101867.905118: EAP: getId: id=82 1431101867.905120: EAP: EAP entering state SEND_REQUEST2 1431101867.905122: EAP: EAP entering state IDLE2 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 82) 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 1431101867.905794: IEEE 802.1X: version=1 type=0 length=6 1431101867.905797: EAP: code=2 identifier=82 length=6 1431101867.905799: (response) 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=82 len=6) from STA: EAP Response-PEAP (25) 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.905826: EAP: EAP entering state RECEIVED2 1431101867.905828: EAP: parseEapResp: rxResp=1 respId=82 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.905831: EAP: EAP entering state AAA_REQUEST 1431101867.905833: EAP: EAP entering state AAA_IDLE 1431101867.905835: Encapsulating EAP message into a RADIUS packet 1431101867.905843: Copied RADIUS State Attribute 1431101867.905848: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server 1431101867.906501: wlan0: RADIUS Received RADIUS message 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.906523: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=83 len=43) from RADIUS server: EAP-Request-PEAP (25) 1431101867.906541: EAP: EAP entering state AAA_RESPONSE 1431101867.906544: EAP: getId: id=83 1431101867.906546: EAP: EAP entering state SEND_REQUEST2 1431101867.906548: EAP: EAP entering state IDLE2 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 83) 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 1431101867.907155: IEEE 802.1X: version=1 type=0 length=80 1431101867.907172: EAP: code=2 identifier=83 length=80 1431101867.907174: (response) 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=83 len=80) from STA: EAP Response-PEAP (25) 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.907200: EAP: EAP entering state RECEIVED2 1431101867.907202: EAP: parseEapResp: rxResp=1 respId=83 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.907204: EAP: EAP entering state AAA_REQUEST 1431101867.907206: EAP: EAP entering state AAA_IDLE 1431101867.907208: Encapsulating EAP message into a RADIUS packet 1431101867.907216: Copied RADIUS State Attribute 1431101867.907221: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server 1431101867.908012: wlan0: RADIUS Received RADIUS message 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.908046: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=84 len=75) from RADIUS server: EAP-Request-PEAP (25) 1431101867.908077: EAP: EAP entering state AAA_RESPONSE 1431101867.908080: EAP: getId: id=84 1431101867.908082: EAP: EAP entering state SEND_REQUEST2 1431101867.908085: EAP: EAP entering state IDLE2 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 84) 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4 1431101867.909670: IEEE 802.1X: version=1 type=0 length=144 1431101867.909674: EAP: code=2 identifier=84 length=144 1431101867.909677: (response) 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=84 len=144) from STA: EAP Response-PEAP (25) 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.909716: EAP: EAP entering state RECEIVED2 1431101867.909719: EAP: parseEapResp: rxResp=1 respId=84 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.909724: EAP: EAP entering state AAA_REQUEST 1431101867.909728: EAP: EAP entering state AAA_IDLE 1431101867.909732: Encapsulating EAP message into a RADIUS packet 1431101867.909743: Copied RADIUS State Attribute 1431101867.909753: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server 1431101867.920907: wlan0: RADIUS Received RADIUS message 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.01 sec 1431101867.920942: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=85 len=91) from RADIUS server: EAP-Request-PEAP (25) 1431101867.920972: EAP: EAP entering state AAA_RESPONSE 1431101867.920976: EAP: getId: id=85 1431101867.920977: EAP: EAP entering state SEND_REQUEST2 1431101867.920979: EAP: EAP entering state IDLE2 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 85) 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 1431101867.922782: IEEE 802.1X: version=1 type=0 length=80 1431101867.922798: EAP: code=2 identifier=85 length=80 1431101867.922800: (response) 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=85 len=80) from STA: EAP Response-PEAP (25) 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.922827: EAP: EAP entering state RECEIVED2 1431101867.922829: EAP: parseEapResp: rxResp=1 respId=85 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.922832: EAP: EAP entering state AAA_REQUEST 1431101867.922834: EAP: EAP entering state AAA_IDLE 1431101867.922837: Encapsulating EAP message into a RADIUS packet 1431101867.922844: Copied RADIUS State Attribute 1431101867.922850: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server 1431101867.962130: wlan0: RADIUS Received RADIUS message 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.03 sec 1431101867.962152: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=86 len=43) from RADIUS server: EAP-Request-PEAP (25) 1431101867.962171: EAP: EAP entering state AAA_RESPONSE 1431101867.962174: EAP: getId: id=86 1431101867.962176: EAP: EAP entering state SEND_REQUEST2 1431101867.962178: EAP: EAP entering state IDLE2 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 86) 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 1431101867.970403: IEEE 802.1X: version=1 type=0 length=80 1431101867.970419: EAP: code=2 identifier=86 length=80 1431101867.970421: (response) 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=86 len=80) from STA: EAP Response-PEAP (25) 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE 1431101867.970450: EAP: EAP entering state RECEIVED2 1431101867.970452: EAP: parseEapResp: rxResp=1 respId=86 respMethod=25 respVendor=0 respVendorMethod=0 1431101867.970455: EAP: EAP entering state AAA_REQUEST 1431101867.970457: EAP: EAP entering state AAA_IDLE 1431101867.970459: Encapsulating EAP message into a RADIUS packet 1431101867.970467: Copied RADIUS State Attribute 1431101867.970473: wlan0: RADIUS Sending RADIUS message to authentication server 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server 1431101867.971473: wlan0: RADIUS Received RADIUS message 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec 1431101867.971507: RADIUS packet matching with station 00:24:d7:6f:eb:c4 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old identity 'zenon' updated with User-Name from Access-Accept 'zenon' 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=3 id=86 len=4) from RADIUS server: EAP Success 1431101867.971558: EAP: EAP entering state SUCCESS2 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state SUCCESS 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 86) 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state IDLE 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITPMK 1431101867.971600: WPA: PMK from EAPOL state machine (len=64) 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKSTART 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg of 4-Way Handshake 1431101867.971618: WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4 1431101867.986164: IEEE 802.1X: version=1 type=3 length=119 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key frame (2/4 Pairwise) 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKCALCNEGOTIATING 1431101867.986213: WPA: PTK derivation - A1=00:0e:2e:c4:2f:e7 A2=00:24:d7:6f:eb:c4 1431101867.986220: WPA: PMK - hexdump(len=32): [REMOVED] 1431101867.986224: WPA: PTK - hexdump(len=64): [REMOVED] 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKCALCNEGOTIATING2 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITNEGOTIATING 1431101867.986243: bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg of 4-Way Handshake 1431101867.986272: WPA: Send EAPOL(version=1 secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=24 keyidx=0 encr=0) 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4 1431101867.986779: IEEE 802.1X: version=1 type=3 length=95 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key frame (4/4 Pairwise) 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITDONE 1431101867.986818: bsd_set_key: alg=2 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=32 1431101867.986868: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not configured 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:24:d7:6f:eb:c4 reason 2 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: deauthenticated due to local deauth request 1431101867.986919: EAP: Server state machine removed 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: disassociated 1431101867.986936: Disassociation notification for unknown STA 00:24:d7:6f:eb:c4 ^C1431101872.085020: Signal 2 received - terminating 1431101872.085031: Flushing old station entries 1431101872.085040: Deauthenticate all stations 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting server 1431101872.085149: bsd_set_privacy: enabled=0 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0) 1431101872.085166: bsd_set_ieee8021x: enabled=0 hostapd.conf: interface=wlan0 driver=bsd logger_syslog=-1 logger_syslog_level=0 debug=2 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=0 ssid=RADIUS hw_mode=g own_ip_addr=127.0.0.1 ieee8021x=1 nas_identifier=app-k7 auth_server_addr=10.146.20.137 auth_server_port=1812 auth_server_shared_secret=azxswqtgbnhyt acct_server_addr=10.146.20.137 acct_server_port=1813 acct_server_shared_secret=azxswqtgbnhyt radius_retry_primary_interval=600 radius_acct_interim_interval=900 wpa=1 wpa_key_mgmt=WPA-EAP Best regards Marcin Michta From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 13:58:03 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8FD112D2 for ; Wed, 13 May 2015 13:58:03 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7A9921D00 for ; Wed, 13 May 2015 13:58:03 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4DDw3QL065727 for ; Wed, 13 May 2015 13:58:03 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 196264] [iwn] [patch]: few minor fixes Date: Wed, 13 May 2015 13:58:03 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: s3erios@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 13:58:03 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196264 --- Comment #6 from Andriy Voskoboinyk --- (In reply to Adrian Chadd from comment #5) No, I don't have such devices. -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 15:05:40 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id EDD1AF97 for ; Wed, 13 May 2015 15:05:40 +0000 (UTC) Received: from cpsmtpb-ews07.kpnxchange.com (cpsmtpb-ews07.kpnxchange.com [213.75.39.10]) by mx1.freebsd.org (Postfix) with ESMTP id 831B01783 for ; Wed, 13 May 2015 15:05:37 +0000 (UTC) Received: from cpsps-ews04.kpnxchange.com ([10.94.84.171]) by cpsmtpb-ews07.kpnxchange.com with Microsoft SMTPSVC(7.5.7601.17514); Wed, 13 May 2015 17:04:24 +0200 Received: from CPSMTPM-CMT106.kpnxchange.com ([195.121.3.22]) by cpsps-ews04.kpnxchange.com with Microsoft SMTPSVC(7.5.7601.17514); Wed, 13 May 2015 17:04:24 +0200 Received: from donald.offrom.nl ([77.170.60.162]) by CPSMTPM-CMT106.kpnxchange.com over TLS secured channel with Microsoft SMTPSVC(7.0.6002.18264); Wed, 13 May 2015 17:04:23 +0200 Received: from squid (squid.vpn.offrom.nl [10.168.0.72]) by donald.offrom.nl (8.14.9/8.14.9) with ESMTP id t4DF4DGf094838 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Wed, 13 May 2015 17:04:14 +0200 (CEST) (envelope-from Willem@Offermans.Rompen.nl) Received: from willy by squid with local (Exim 4.80) (envelope-from ) id 1YsYCe-0000vR-AY for freebsd-wireless@FreeBSD.org; Wed, 13 May 2015 17:04:08 +0200 Date: Wed, 13 May 2015 17:04:08 +0200 From: Willem Offermans To: freebsd-wireless@FreeBSD.org Subject: captive portal recommendation Message-ID: <20150513150407.GJ30507@vpn.offrom.nl> Reply-To: Willem@Offermans.Rompen.nl MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on donald.offrom.nl X-OriginalArrivalTime: 13 May 2015 15:04:24.0056 (UTC) FILETIME=[19265780:01D08D8E] X-RcptDomain: FreeBSD.org X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 15:05:41 -0000 Dear FreeBSD friends, I like to install a ``captive portal'' system (https://en.wikipedia.org/wiki/Captive_portal) on my running FreeBSD server. I like to connect possible authentication with a ticket system, where possible users need to obtain a ticket for web access. The ticket should be valid for a limited amount of time. Can anyone recommend such a system? -- Met vriendelijke groeten, With kind regards, Mit freundlichen Gruessen, De jrus wah, Wiel ************************************* W.K. Offermans e-mail: Willem@Offermans.Rompen.nl Powered by .... (__) \\\'',) \/ \ ^ .\._/_) www.FreeBSD.org From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 16:27:41 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 310EA312 for ; Wed, 13 May 2015 16:27:41 +0000 (UTC) Received: from mail-ie0-x233.google.com (mail-ie0-x233.google.com [IPv6:2607:f8b0:4001:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EE7981443 for ; Wed, 13 May 2015 16:27:40 +0000 (UTC) Received: by iebgx4 with SMTP id gx4so36871074ieb.0 for ; Wed, 13 May 2015 09:27:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=Ug6YSyHnHLdcUgSGp3VWM5oyQJfApatUIZVppZ24lE0=; b=Gwvp5iy6/gv1HeIh2nchv1rz/8/p8r/Ra/9EGDem4QKRfLDzA2KHtGPKDpTHg0JIlI tViMJ4NZQFrxfscld+0brZsX6t/yTB8rI4zz6y2iZaTcUgjeZigQXAtilF99yxqrmbE6 6MHkOmSb0wH0ZUYBiUNuigIsJWEm8qe1puM8qAGhi7245d62egst2zGUFs8QDe+Vuxpx c3gOyy1LNNMD4D07fVHBhQrzjrG7oZGWM/8W5PRDhuBsFcc1RJY1I+ehJq+k9e62YMWM SAddHcNAqBLr3uxD5VCMoYT0Lo3LyiIylFF6wMVEYs7/vtjklkhq5iaKI8+v0GUBj/HP kgpA== MIME-Version: 1.0 X-Received: by 10.43.163.129 with SMTP id mo1mr9672464icc.61.1431534460263; Wed, 13 May 2015 09:27:40 -0700 (PDT) Sender: adrian.chadd@gmail.com Received: by 10.36.38.133 with HTTP; Wed, 13 May 2015 09:27:40 -0700 (PDT) In-Reply-To: <01e701d08d75$fed02bd0$fc708370$@gmail.com> References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> Date: Wed, 13 May 2015 09:27:40 -0700 X-Google-Sender-Auth: LwpgWXR5fqZNfmxRtsaPMY5r0_s Message-ID: Subject: Re: hostapd + freeradius can't connect From: Adrian Chadd To: Marcin Michta Cc: "freebsd-wireless@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 16:27:41 -0000 Hi! I haven't tested radius+wpa before; what's your radius config look like? (It'd be good to document how to do this in the wiki/handbook.) -a On 13 May 2015 at 05:11, Marcin Michta wrote: > Hi all, > So I'm trying configure hostapd to work (peap + mschapv2). I tried connect > by wpa_suplicant on FreeBSD, and Ubuntu with gui, but without success. > Freeradius allow to connect, but connections are failed - every time get: > > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA > 00:24:d7:6f:eb:c4 reason 2 > > > > Where is mistake/bug? Or what is wrong? > log: > > 1431101834.596845: Configuration file: hostapd.conf > > 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable is > not used anymore > > 1431101834.626788: ctrl_interface_group=0 > > 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > > 1431101834.627098: Completing interface initialization > > 1431101834.627101: Flushing old station entries > > 1431101834.627109: Deauthenticate all stations > > 1431101834.627113: bsd_set_privacy: enabled=0 > > 1431101834.627117: bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 > key_len=0 > > 1431101834.627120: bsd_del_key: key_idx=0 > > 1431101834.627124: bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627127: bsd_del_key: key_idx=1 > > 1431101834.627130: bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627133: bsd_del_key: key_idx=2 > > 1431101834.627136: bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627139: bsd_del_key: key_idx=3 > > 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 and > ssid 'RADIUS' > > 1431101834.627155: wlan0: RADIUS Authentication server 10.146.20.137:1812 > > 1431101834.627257: RADIUS local address: 10.146.103.7:14137 > > 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813 > > 1431101834.627288: RADIUS local address: 10.146.103.7:14773 > > 1431101834.627294: bsd_set_ieee8021x: enabled=1 > > 1431101834.627296: bsd_configure_wpa: enable WPA= 0x1 > > 1431101834.627514: WPA: group state machine entering state GTK_INIT (VLAN-ID > 0) > > 1431101834.627527: GMK - hexdump(len=32): [REMOVED] > > 1431101834.627530: GTK - hexdump(len=32): [REMOVED] > > 1431101834.627532: WPA: group state machine entering state SETKEYSDONE > (VLAN-ID 0) > > 1431101834.627535: bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 > key_len=32 > > 1431101834.632173: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not > configured > > 1431101834.632194: bsd_set_privacy: enabled=1 > > 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24) > > 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting server > > 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101834.702842: wlan0: Setup of interface done. > > 1431101834.702886: Discard routing message to if#0 (not for us 8) > > > > 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server > > 1431101834.702914: wlan0: RADIUS Received RADIUS message > > 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.07 sec > > 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: associated > > 1431101867.876215: STA included WPA IE in (Re)AssocReq > > 1431101867.876220: New STA > > 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1 notification > > 1431101867.876243: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=0 > > 1431101867.876248: bsd_del_key: addr=00:24:d7:6f:eb:c4 > > 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start > authentication > > 1431101867.876270: EAP: Server state machine created > > 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > IDLE > > 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering state > FORCE_BOTH > > 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start authentication > > 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITIALIZE > > 1431101867.876307: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=0 > > 1431101867.876310: bsd_del_key: addr=00:24:d7:6f:eb:c4 > > 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state IDLE > > 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > AUTHENTICATION > > 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > AUTHENTICATION2 > > 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > DISCONNECTED > > 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: unauthorizing > port > > 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > RESTART > > 1431101867.876354: EAP: EAP entering state INITIALIZE > > 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4 > > 1431101867.876360: EAP: EAP entering state SELECT_ACTION > > 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE > > 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD > > 1431101867.876366: EAP: getNextMethod: vendor 0 type 1 > > 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 > > 1431101867.876371: EAP: EAP entering state METHOD_REQUEST > > 1431101867.876374: EAP: building EAP-Request: Identifier 77 > > 1431101867.876377: EAP: EAP entering state SEND_REQUEST > > 1431101867.876379: EAP: EAP entering state IDLE > > 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > CONNECTING > > 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > AUTHENTICATING > > 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 77) > > 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.880294: IEEE 802.1X: version=1 type=0 length=10 > > 1431101867.880298: EAP: code=2 identifier=77 length=10 > > 1431101867.880300: (response) > > 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=77 len=10) from STA: EAP Response-Identity (1) > > 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.880326: EAP: EAP entering state RECEIVED > > 1431101867.880328: EAP: parseEapResp: rxResp=1 respId=77 respMethod=1 > respVendor=0 respVendorMethod=0 > > 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK > > 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE > > 1431101867.880335: EAP-Identity: Peer identity - hexdump_ascii(len=5): > > 7a 65 6e 6f 6e zenon > > 1431101867.880341: EAP: EAP entering state SELECT_ACTION > > 1431101867.880343: EAP: getDecision: -> PASSTHROUGH > > 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH > > 1431101867.880347: EAP: EAP entering state AAA_REQUEST > > 1431101867.880348: EAP: EAP entering state AAA_IDLE > > 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA identity > 'zenon' > > 1431101867.880363: Encapsulating EAP message into a RADIUS packet > > 1431101867.880379: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server > > 1431101867.882237: wlan0: RADIUS Received RADIUS message > > 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.882272: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=78 len=6) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.882305: EAP: EAP entering state AAA_RESPONSE > > 1431101867.882308: EAP: getId: id=78 > > 1431101867.882311: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.882313: EAP: EAP entering state IDLE2 > > 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 78) > > 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.883907: IEEE 802.1X: version=1 type=0 length=118 > > 1431101867.883923: EAP: code=2 identifier=78 length=118 > > 1431101867.883925: (response) > > 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=78 len=118) from STA: EAP Response-PEAP (25) > > 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.883952: EAP: EAP entering state RECEIVED2 > > 1431101867.883954: EAP: parseEapResp: rxResp=1 respId=78 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.883956: EAP: EAP entering state AAA_REQUEST > > 1431101867.883959: EAP: EAP entering state AAA_IDLE > > 1431101867.883961: Encapsulating EAP message into a RADIUS packet > > 1431101867.883969: Copied RADIUS State Attribute > > 1431101867.883975: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS server > > 1431101867.890413: wlan0: RADIUS Received RADIUS message > > 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.890450: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=79 len=1004) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.890483: EAP: EAP entering state AAA_RESPONSE > > 1431101867.890486: EAP: getId: id=79 > > 1431101867.890489: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.890491: EAP: EAP entering state IDLE2 > > 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 79) > > 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.892408: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.892423: EAP: code=2 identifier=79 length=6 > > 1431101867.892426: (response) > > 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=79 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.892454: EAP: EAP entering state RECEIVED2 > > 1431101867.892456: EAP: parseEapResp: rxResp=1 respId=79 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.892459: EAP: EAP entering state AAA_REQUEST > > 1431101867.892461: EAP: EAP entering state AAA_IDLE > > 1431101867.892463: Encapsulating EAP message into a RADIUS packet > > 1431101867.892471: Copied RADIUS State Attribute > > 1431101867.892477: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS server > > 1431101867.893185: wlan0: RADIUS Received RADIUS message > > 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.893222: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=80 len=1000) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.893245: EAP: EAP entering state AAA_RESPONSE > > 1431101867.893249: EAP: getId: id=80 > > 1431101867.893251: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.893253: EAP: EAP entering state IDLE2 > > 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 80) > > 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.894043: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.894047: EAP: code=2 identifier=80 length=6 > > 1431101867.894049: (response) > > 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=80 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.894078: EAP: EAP entering state RECEIVED2 > > 1431101867.894080: EAP: parseEapResp: rxResp=1 respId=80 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.894083: EAP: EAP entering state AAA_REQUEST > > 1431101867.894085: EAP: EAP entering state AAA_IDLE > > 1431101867.894087: Encapsulating EAP message into a RADIUS packet > > 1431101867.894095: Copied RADIUS State Attribute > > 1431101867.894101: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server > > 1431101867.894777: wlan0: RADIUS Received RADIUS message > > 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.894814: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=81 len=904) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.894847: EAP: EAP entering state AAA_RESPONSE > > 1431101867.894851: EAP: getId: id=81 > > 1431101867.894853: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.894855: EAP: EAP entering state IDLE2 > > 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 81) > > 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.902157: IEEE 802.1X: version=1 type=0 length=208 > > 1431101867.902173: EAP: code=2 identifier=81 length=208 > > 1431101867.902175: (response) > > 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=81 len=208) from STA: EAP Response-PEAP (25) > > 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.902203: EAP: EAP entering state RECEIVED2 > > 1431101867.902205: EAP: parseEapResp: rxResp=1 respId=81 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.902207: EAP: EAP entering state AAA_REQUEST > > 1431101867.902209: EAP: EAP entering state AAA_IDLE > > 1431101867.902211: Encapsulating EAP message into a RADIUS packet > > 1431101867.902219: Copied RADIUS State Attribute > > 1431101867.902225: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server > > 1431101867.905067: wlan0: RADIUS Received RADIUS message > > 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.905090: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=82 len=65) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.905114: EAP: EAP entering state AAA_RESPONSE > > 1431101867.905118: EAP: getId: id=82 > > 1431101867.905120: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.905122: EAP: EAP entering state IDLE2 > > 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 82) > > 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.905794: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.905797: EAP: code=2 identifier=82 length=6 > > 1431101867.905799: (response) > > 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=82 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.905826: EAP: EAP entering state RECEIVED2 > > 1431101867.905828: EAP: parseEapResp: rxResp=1 respId=82 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.905831: EAP: EAP entering state AAA_REQUEST > > 1431101867.905833: EAP: EAP entering state AAA_IDLE > > 1431101867.905835: Encapsulating EAP message into a RADIUS packet > > 1431101867.905843: Copied RADIUS State Attribute > > 1431101867.905848: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.906501: wlan0: RADIUS Received RADIUS message > > 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.906523: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=83 len=43) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.906541: EAP: EAP entering state AAA_RESPONSE > > 1431101867.906544: EAP: getId: id=83 > > 1431101867.906546: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.906548: EAP: EAP entering state IDLE2 > > 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 83) > > 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.907155: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.907172: EAP: code=2 identifier=83 length=80 > > 1431101867.907174: (response) > > 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=83 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.907200: EAP: EAP entering state RECEIVED2 > > 1431101867.907202: EAP: parseEapResp: rxResp=1 respId=83 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.907204: EAP: EAP entering state AAA_REQUEST > > 1431101867.907206: EAP: EAP entering state AAA_IDLE > > 1431101867.907208: Encapsulating EAP message into a RADIUS packet > > 1431101867.907216: Copied RADIUS State Attribute > > 1431101867.907221: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server > > 1431101867.908012: wlan0: RADIUS Received RADIUS message > > 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.908046: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=84 len=75) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.908077: EAP: EAP entering state AAA_RESPONSE > > 1431101867.908080: EAP: getId: id=84 > > 1431101867.908082: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.908085: EAP: EAP entering state IDLE2 > > 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 84) > > 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.909670: IEEE 802.1X: version=1 type=0 length=144 > > 1431101867.909674: EAP: code=2 identifier=84 length=144 > > 1431101867.909677: (response) > > 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=84 len=144) from STA: EAP Response-PEAP (25) > > 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.909716: EAP: EAP entering state RECEIVED2 > > 1431101867.909719: EAP: parseEapResp: rxResp=1 respId=84 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.909724: EAP: EAP entering state AAA_REQUEST > > 1431101867.909728: EAP: EAP entering state AAA_IDLE > > 1431101867.909732: Encapsulating EAP message into a RADIUS packet > > 1431101867.909743: Copied RADIUS State Attribute > > 1431101867.909753: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server > > 1431101867.920907: wlan0: RADIUS Received RADIUS message > > 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.01 sec > > 1431101867.920942: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=85 len=91) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.920972: EAP: EAP entering state AAA_RESPONSE > > 1431101867.920976: EAP: getId: id=85 > > 1431101867.920977: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.920979: EAP: EAP entering state IDLE2 > > 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 85) > > 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.922782: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.922798: EAP: code=2 identifier=85 length=80 > > 1431101867.922800: (response) > > 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=85 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.922827: EAP: EAP entering state RECEIVED2 > > 1431101867.922829: EAP: parseEapResp: rxResp=1 respId=85 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.922832: EAP: EAP entering state AAA_REQUEST > > 1431101867.922834: EAP: EAP entering state AAA_IDLE > > 1431101867.922837: Encapsulating EAP message into a RADIUS packet > > 1431101867.922844: Copied RADIUS State Attribute > > 1431101867.922850: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.962130: wlan0: RADIUS Received RADIUS message > > 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.03 sec > > 1431101867.962152: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=86 len=43) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.962171: EAP: EAP entering state AAA_RESPONSE > > 1431101867.962174: EAP: getId: id=86 > > 1431101867.962176: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.962178: EAP: EAP entering state IDLE2 > > 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 86) > > 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.970403: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.970419: EAP: code=2 identifier=86 length=80 > > 1431101867.970421: (response) > > 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=86 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.970450: EAP: EAP entering state RECEIVED2 > > 1431101867.970452: EAP: parseEapResp: rxResp=1 respId=86 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.970455: EAP: EAP entering state AAA_REQUEST > > 1431101867.970457: EAP: EAP entering state AAA_IDLE > > 1431101867.970459: Encapsulating EAP message into a RADIUS packet > > 1431101867.970467: Copied RADIUS State Attribute > > 1431101867.970473: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server > > 1431101867.971473: wlan0: RADIUS Received RADIUS message > > 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.971507: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] > > 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] > > 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old identity > 'zenon' updated with User-Name from Access-Accept 'zenon' > > 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=3 id=86 len=4) from RADIUS server: EAP Success > > 1431101867.971558: EAP: EAP entering state SUCCESS2 > > 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > SUCCESS > > 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 86) > > 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > IDLE > > 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITPMK > > 1431101867.971600: WPA: PMK from EAPOL state machine (len=64) > > 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKSTART > > 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg of > 4-Way Handshake > > 1431101867.971618: WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 > pairwise=8 kde_len=0 keyidx=0 encr=0) > > 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986164: IEEE 802.1X: version=1 type=3 length=119 > > 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key > frame (2/4 Pairwise) > > 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKCALCNEGOTIATING > > 1431101867.986213: WPA: PTK derivation - A1=00:0e:2e:c4:2f:e7 > A2=00:24:d7:6f:eb:c4 > > 1431101867.986220: WPA: PMK - hexdump(len=32): [REMOVED] > > 1431101867.986224: WPA: PTK - hexdump(len=64): [REMOVED] > > 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKCALCNEGOTIATING2 > > 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKINITNEGOTIATING > > 1431101867.986243: bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > > 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg of > 4-Way Handshake > > 1431101867.986272: WPA: Send EAPOL(version=1 secure=0 mic=1 ack=1 install=1 > pairwise=8 kde_len=24 keyidx=0 encr=0) > > 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986779: IEEE 802.1X: version=1 type=3 length=95 > > 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key > frame (4/4 Pairwise) > > 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITDONE > > 1431101867.986818: bsd_set_key: alg=2 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=32 > > 1431101867.986868: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not > configured > > 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator requests > disconnect: STA 00:24:d7:6f:eb:c4 reason 2 > > 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: deauthenticated > due to local deauth request > > 1431101867.986919: EAP: Server state machine removed > > 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: disassociated > > 1431101867.986936: Disassociation notification for unknown STA > 00:24:d7:6f:eb:c4 > > ^C1431101872.085020: Signal 2 received - terminating > > 1431101872.085031: Flushing old station entries > > 1431101872.085040: Deauthenticate all stations > > 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting server > > 1431101872.085149: bsd_set_privacy: enabled=0 > > 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0) > > 1431101872.085166: bsd_set_ieee8021x: enabled=0 > > > > hostapd.conf: > > interface=wlan0 > > driver=bsd > > logger_syslog=-1 > > logger_syslog_level=0 > > debug=2 > > dump_file=/tmp/hostapd.dump > > ctrl_interface=/var/run/hostapd > > ctrl_interface_group=0 > > ssid=RADIUS > > hw_mode=g > > own_ip_addr=127.0.0.1 > > ieee8021x=1 > > nas_identifier=app-k7 > > auth_server_addr=10.146.20.137 > > auth_server_port=1812 > > auth_server_shared_secret=azxswqtgbnhyt > > acct_server_addr=10.146.20.137 > > acct_server_port=1813 > > acct_server_shared_secret=azxswqtgbnhyt > > radius_retry_primary_interval=600 > > radius_acct_interim_interval=900 > > wpa=1 > > wpa_key_mgmt=WPA-EAP > > > > Best regards > > Marcin Michta > > _______________________________________________ > freebsd-wireless@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-wireless > To unsubscribe, send any mail to "freebsd-wireless-unsubscribe@freebsd.org" From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 17:22:13 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E9126155; Wed, 13 May 2015 17:22:12 +0000 (UTC) Received: from mail-pd0-x231.google.com (mail-pd0-x231.google.com [IPv6:2607:f8b0:400e:c02::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B4D971B82; Wed, 13 May 2015 17:22:12 +0000 (UTC) Received: by pdbnk13 with SMTP id nk13so57844697pdb.0; Wed, 13 May 2015 10:22:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version:content-type; bh=3PTs6psSY8TZw15vNaS0OANU9dPWw489l9ur4GyjPIg=; b=ICywO0Igj7o8fQpAZLbguqg6Bv2YTdnxkJnbP2zSGmteYvrB5nmLRW9KhsBNKov0TQ pFs2U3Fu5CzHN5aF25UCQCgHqRuXX9j8qb6UoLuX8Vdce97VVyaOGocwMOQqgkPhcqxi N8rSxXusATGEcVgLEOXjiJE5iJsuciA+426iWudCML+vXNS8TQMpx4IqUPwhJifn2gPe xfB2xMfs9OyoY1M5eljjCQSU2Xuyv33ncCkq7oDYs5T5D+ByA1/Www6AnPx9efg+jY9C oemA9XOwQXXSHNkPxTHBLkYa3MMgcsrW3Pmveruw+r8x0v9paiLmWHqmDp0PzTABJsrD v5EA== X-Received: by 10.70.90.129 with SMTP id bw1mr39513145pdb.85.1431537732376; Wed, 13 May 2015 10:22:12 -0700 (PDT) Received: from mail.outlook.com (ec2-54-191-230-187.us-west-2.compute.amazonaws.com. [54.191.230.187]) by mx.google.com with ESMTPSA id ht10sm19912294pdb.41.2015.05.13.10.22.08 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 13 May 2015 10:22:08 -0700 (PDT) Date: Wed, 13 May 2015 17:22:07 +0000 (UTC) From: To: adrian@freebsd.org Cc: freebsd-wireless@freebsd.org Message-ID: In-Reply-To: References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> Subject: Re: hostapd + freeradius can't connect MIME-Version: 1.0 X-Mailer: Outlook for iOS and Android Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 17:22:13 -0000 Pozdrawiam, Marcin Michta On Wed, May 13, 2015 at 9:27 AM -0700, "Adrian Chadd" wrote: Hi! I haven't tested radius+wpa before; what's your radius config look like? (It'd be good to document how to do this in the wiki/handbook.) -a On 13 May 2015 at 05:11, Marcin Michta wrote: > Hi all, > So I'm trying configure hostapd to work (peap + mschapv2). I tried connect > by wpa_suplicant on FreeBSD, and Ubuntu with gui, but without success. > Freeradius allow to connect, but connections are failed - every time get: > > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA > 00:24:d7:6f:eb:c4 reason 2 > > > > Where is mistake/bug? Or what is wrong? > log: > > 1431101834.596845: Configuration file: hostapd.conf > > 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable is > not used anymore > > 1431101834.626788: ctrl_interface_group=0 > > 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > > 1431101834.627098: Completing interface initialization > > 1431101834.627101: Flushing old station entries > > 1431101834.627109: Deauthenticate all stations > > 1431101834.627113: bsd_set_privacy: enabled=0 > > 1431101834.627117: bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 > key_len=0 > > 1431101834.627120: bsd_del_key: key_idx=0 > > 1431101834.627124: bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627127: bsd_del_key: key_idx=1 > > 1431101834.627130: bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627133: bsd_del_key: key_idx=2 > > 1431101834.627136: bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 > key_len=0 > > 1431101834.627139: bsd_del_key: key_idx=3 > > 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 and > ssid 'RADIUS' > > 1431101834.627155: wlan0: RADIUS Authentication server 10.146.20.137:1812 > > 1431101834.627257: RADIUS local address: 10.146.103.7:14137 > > 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813 > > 1431101834.627288: RADIUS local address: 10.146.103.7:14773 > > 1431101834.627294: bsd_set_ieee8021x: enabled=1 > > 1431101834.627296: bsd_configure_wpa: enable WPA= 0x1 > > 1431101834.627514: WPA: group state machine entering state GTK_INIT (VLAN-ID > 0) > > 1431101834.627527: GMK - hexdump(len=32): [REMOVED] > > 1431101834.627530: GTK - hexdump(len=32): [REMOVED] > > 1431101834.627532: WPA: group state machine entering state SETKEYSDONE > (VLAN-ID 0) > > 1431101834.627535: bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 > key_len=32 > > 1431101834.632173: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not > configured > > 1431101834.632194: bsd_set_privacy: enabled=1 > > 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24) > > 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting server > > 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101834.702842: wlan0: Setup of interface done. > > 1431101834.702886: Discard routing message to if#0 (not for us 8) > > > > 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server > > 1431101834.702914: wlan0: RADIUS Received RADIUS message > > 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.07 sec > > 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: associated > > 1431101867.876215: STA included WPA IE in (Re)AssocReq > > 1431101867.876220: New STA > > 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1 notification > > 1431101867.876243: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=0 > > 1431101867.876248: bsd_del_key: addr=00:24:d7:6f:eb:c4 > > 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start > authentication > > 1431101867.876270: EAP: Server state machine created > > 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > IDLE > > 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering state > FORCE_BOTH > > 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start authentication > > 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITIALIZE > > 1431101867.876307: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=0 > > 1431101867.876310: bsd_del_key: addr=00:24:d7:6f:eb:c4 > > 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state IDLE > > 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > AUTHENTICATION > > 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > AUTHENTICATION2 > > 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > DISCONNECTED > > 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: unauthorizing > port > > 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > RESTART > > 1431101867.876354: EAP: EAP entering state INITIALIZE > > 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4 > > 1431101867.876360: EAP: EAP entering state SELECT_ACTION > > 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE > > 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD > > 1431101867.876366: EAP: getNextMethod: vendor 0 type 1 > > 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 > > 1431101867.876371: EAP: EAP entering state METHOD_REQUEST > > 1431101867.876374: EAP: building EAP-Request: Identifier 77 > > 1431101867.876377: EAP: EAP entering state SEND_REQUEST > > 1431101867.876379: EAP: EAP entering state IDLE > > 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > CONNECTING > > 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state > AUTHENTICATING > > 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 77) > > 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.880294: IEEE 802.1X: version=1 type=0 length=10 > > 1431101867.880298: EAP: code=2 identifier=77 length=10 > > 1431101867.880300: (response) > > 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=77 len=10) from STA: EAP Response-Identity (1) > > 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.880326: EAP: EAP entering state RECEIVED > > 1431101867.880328: EAP: parseEapResp: rxResp=1 respId=77 respMethod=1 > respVendor=0 respVendorMethod=0 > > 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK > > 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE > > 1431101867.880335: EAP-Identity: Peer identity - hexdump_ascii(len=5): > > 7a 65 6e 6f 6e zenon > > 1431101867.880341: EAP: EAP entering state SELECT_ACTION > > 1431101867.880343: EAP: getDecision: -> PASSTHROUGH > > 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH > > 1431101867.880347: EAP: EAP entering state AAA_REQUEST > > 1431101867.880348: EAP: EAP entering state AAA_IDLE > > 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA identity > 'zenon' > > 1431101867.880363: Encapsulating EAP message into a RADIUS packet > > 1431101867.880379: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server > > 1431101867.882237: wlan0: RADIUS Received RADIUS message > > 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.882272: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=78 len=6) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.882305: EAP: EAP entering state AAA_RESPONSE > > 1431101867.882308: EAP: getId: id=78 > > 1431101867.882311: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.882313: EAP: EAP entering state IDLE2 > > 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 78) > > 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.883907: IEEE 802.1X: version=1 type=0 length=118 > > 1431101867.883923: EAP: code=2 identifier=78 length=118 > > 1431101867.883925: (response) > > 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=78 len=118) from STA: EAP Response-PEAP (25) > > 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.883952: EAP: EAP entering state RECEIVED2 > > 1431101867.883954: EAP: parseEapResp: rxResp=1 respId=78 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.883956: EAP: EAP entering state AAA_REQUEST > > 1431101867.883959: EAP: EAP entering state AAA_IDLE > > 1431101867.883961: Encapsulating EAP message into a RADIUS packet > > 1431101867.883969: Copied RADIUS State Attribute > > 1431101867.883975: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS server > > 1431101867.890413: wlan0: RADIUS Received RADIUS message > > 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.890450: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=79 len=1004) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.890483: EAP: EAP entering state AAA_RESPONSE > > 1431101867.890486: EAP: getId: id=79 > > 1431101867.890489: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.890491: EAP: EAP entering state IDLE2 > > 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 79) > > 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.892408: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.892423: EAP: code=2 identifier=79 length=6 > > 1431101867.892426: (response) > > 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=79 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.892454: EAP: EAP entering state RECEIVED2 > > 1431101867.892456: EAP: parseEapResp: rxResp=1 respId=79 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.892459: EAP: EAP entering state AAA_REQUEST > > 1431101867.892461: EAP: EAP entering state AAA_IDLE > > 1431101867.892463: Encapsulating EAP message into a RADIUS packet > > 1431101867.892471: Copied RADIUS State Attribute > > 1431101867.892477: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS server > > 1431101867.893185: wlan0: RADIUS Received RADIUS message > > 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.893222: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=80 len=1000) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.893245: EAP: EAP entering state AAA_RESPONSE > > 1431101867.893249: EAP: getId: id=80 > > 1431101867.893251: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.893253: EAP: EAP entering state IDLE2 > > 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 80) > > 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.894043: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.894047: EAP: code=2 identifier=80 length=6 > > 1431101867.894049: (response) > > 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=80 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.894078: EAP: EAP entering state RECEIVED2 > > 1431101867.894080: EAP: parseEapResp: rxResp=1 respId=80 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.894083: EAP: EAP entering state AAA_REQUEST > > 1431101867.894085: EAP: EAP entering state AAA_IDLE > > 1431101867.894087: Encapsulating EAP message into a RADIUS packet > > 1431101867.894095: Copied RADIUS State Attribute > > 1431101867.894101: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server > > 1431101867.894777: wlan0: RADIUS Received RADIUS message > > 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.894814: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=81 len=904) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.894847: EAP: EAP entering state AAA_RESPONSE > > 1431101867.894851: EAP: getId: id=81 > > 1431101867.894853: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.894855: EAP: EAP entering state IDLE2 > > 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 81) > > 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.902157: IEEE 802.1X: version=1 type=0 length=208 > > 1431101867.902173: EAP: code=2 identifier=81 length=208 > > 1431101867.902175: (response) > > 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=81 len=208) from STA: EAP Response-PEAP (25) > > 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.902203: EAP: EAP entering state RECEIVED2 > > 1431101867.902205: EAP: parseEapResp: rxResp=1 respId=81 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.902207: EAP: EAP entering state AAA_REQUEST > > 1431101867.902209: EAP: EAP entering state AAA_IDLE > > 1431101867.902211: Encapsulating EAP message into a RADIUS packet > > 1431101867.902219: Copied RADIUS State Attribute > > 1431101867.902225: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server > > 1431101867.905067: wlan0: RADIUS Received RADIUS message > > 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.905090: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=82 len=65) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.905114: EAP: EAP entering state AAA_RESPONSE > > 1431101867.905118: EAP: getId: id=82 > > 1431101867.905120: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.905122: EAP: EAP entering state IDLE2 > > 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 82) > > 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.905794: IEEE 802.1X: version=1 type=0 length=6 > > 1431101867.905797: EAP: code=2 identifier=82 length=6 > > 1431101867.905799: (response) > > 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=82 len=6) from STA: EAP Response-PEAP (25) > > 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.905826: EAP: EAP entering state RECEIVED2 > > 1431101867.905828: EAP: parseEapResp: rxResp=1 respId=82 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.905831: EAP: EAP entering state AAA_REQUEST > > 1431101867.905833: EAP: EAP entering state AAA_IDLE > > 1431101867.905835: Encapsulating EAP message into a RADIUS packet > > 1431101867.905843: Copied RADIUS State Attribute > > 1431101867.905848: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.906501: wlan0: RADIUS Received RADIUS message > > 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.906523: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=83 len=43) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.906541: EAP: EAP entering state AAA_RESPONSE > > 1431101867.906544: EAP: getId: id=83 > > 1431101867.906546: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.906548: EAP: EAP entering state IDLE2 > > 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 83) > > 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.907155: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.907172: EAP: code=2 identifier=83 length=80 > > 1431101867.907174: (response) > > 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=83 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.907200: EAP: EAP entering state RECEIVED2 > > 1431101867.907202: EAP: parseEapResp: rxResp=1 respId=83 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.907204: EAP: EAP entering state AAA_REQUEST > > 1431101867.907206: EAP: EAP entering state AAA_IDLE > > 1431101867.907208: Encapsulating EAP message into a RADIUS packet > > 1431101867.907216: Copied RADIUS State Attribute > > 1431101867.907221: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server > > 1431101867.908012: wlan0: RADIUS Received RADIUS message > > 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.908046: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=84 len=75) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.908077: EAP: EAP entering state AAA_RESPONSE > > 1431101867.908080: EAP: getId: id=84 > > 1431101867.908082: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.908085: EAP: EAP entering state IDLE2 > > 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 84) > > 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.909670: IEEE 802.1X: version=1 type=0 length=144 > > 1431101867.909674: EAP: code=2 identifier=84 length=144 > > 1431101867.909677: (response) > > 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=84 len=144) from STA: EAP Response-PEAP (25) > > 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.909716: EAP: EAP entering state RECEIVED2 > > 1431101867.909719: EAP: parseEapResp: rxResp=1 respId=84 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.909724: EAP: EAP entering state AAA_REQUEST > > 1431101867.909728: EAP: EAP entering state AAA_IDLE > > 1431101867.909732: Encapsulating EAP message into a RADIUS packet > > 1431101867.909743: Copied RADIUS State Attribute > > 1431101867.909753: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server > > 1431101867.920907: wlan0: RADIUS Received RADIUS message > > 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.01 sec > > 1431101867.920942: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=85 len=91) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.920972: EAP: EAP entering state AAA_RESPONSE > > 1431101867.920976: EAP: getId: id=85 > > 1431101867.920977: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.920979: EAP: EAP entering state IDLE2 > > 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 85) > > 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.922782: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.922798: EAP: code=2 identifier=85 length=80 > > 1431101867.922800: (response) > > 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=85 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.922827: EAP: EAP entering state RECEIVED2 > > 1431101867.922829: EAP: parseEapResp: rxResp=1 respId=85 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.922832: EAP: EAP entering state AAA_REQUEST > > 1431101867.922834: EAP: EAP entering state AAA_IDLE > > 1431101867.922837: Encapsulating EAP message into a RADIUS packet > > 1431101867.922844: Copied RADIUS State Attribute > > 1431101867.922850: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.962130: wlan0: RADIUS Received RADIUS message > > 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.03 sec > > 1431101867.962152: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=1 id=86 len=43) from RADIUS server: EAP-Request-PEAP (25) > > 1431101867.962171: EAP: EAP entering state AAA_RESPONSE > > 1431101867.962174: EAP: getId: id=86 > > 1431101867.962176: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.962178: EAP: EAP entering state IDLE2 > > 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic back off; > retransCount=0) > > 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > REQUEST > > 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 86) > > 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.970403: IEEE 802.1X: version=1 type=0 length=80 > > 1431101867.970419: EAP: code=2 identifier=86 length=80 > > 1431101867.970421: (response) > > 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP > packet (code=2 id=86 len=80) from STA: EAP Response-PEAP (25) > > 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > RESPONSE > > 1431101867.970450: EAP: EAP entering state RECEIVED2 > > 1431101867.970452: EAP: parseEapResp: rxResp=1 respId=86 respMethod=25 > respVendor=0 respVendorMethod=0 > > 1431101867.970455: EAP: EAP entering state AAA_REQUEST > > 1431101867.970457: EAP: EAP entering state AAA_IDLE > > 1431101867.970459: Encapsulating EAP message into a RADIUS packet > > 1431101867.970467: Copied RADIUS State Attribute > > 1431101867.970473: wlan0: RADIUS Sending RADIUS message to authentication > server > > 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds > > > > 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server > > 1431101867.971473: wlan0: RADIUS Received RADIUS message > > 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS > packet matched with a pending request, round trip time 0.00 sec > > 1431101867.971507: RADIUS packet matching with station 00:24:d7:6f:eb:c4 > > 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] > > 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] > > 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old identity > 'zenon' updated with User-Name from Access-Accept 'zenon' > > 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated > EAP packet (code=3 id=86 len=4) from RADIUS server: EAP Success > > 1431101867.971558: EAP: EAP entering state SUCCESS2 > > 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > SUCCESS > > 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP > Packet (identifier 86) > > 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state > IDLE > > 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITPMK > > 1431101867.971600: WPA: PMK from EAPOL state machine (len=64) > > 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKSTART > > 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg of > 4-Way Handshake > > 1431101867.971618: WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 > pairwise=8 kde_len=0 keyidx=0 encr=0) > > 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986164: IEEE 802.1X: version=1 type=3 length=119 > > 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key > frame (2/4 Pairwise) > > 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKCALCNEGOTIATING > > 1431101867.986213: WPA: PTK derivation - A1=00:0e:2e:c4:2f:e7 > A2=00:24:d7:6f:eb:c4 > > 1431101867.986220: WPA: PMK - hexdump(len=32): [REMOVED] > > 1431101867.986224: WPA: PTK - hexdump(len=64): [REMOVED] > > 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKCALCNEGOTIATING2 > > 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKINITNEGOTIATING > > 1431101867.986243: bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > > 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg of > 4-Way Handshake > > 1431101867.986272: WPA: Send EAPOL(version=1 secure=0 mic=1 ack=1 install=1 > pairwise=8 kde_len=24 keyidx=0 encr=0) > > 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986779: IEEE 802.1X: version=1 type=3 length=95 > > 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key > frame (4/4 Pairwise) > > 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITDONE > > 1431101867.986818: bsd_set_key: alg=2 addr=0x8014908d0 key_idx=0 set_tx=1 > seq_len=0 key_len=32 > > 1431101867.986868: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not > configured > > 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator requests > disconnect: STA 00:24:d7:6f:eb:c4 reason 2 > > 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: deauthenticated > due to local deauth request > > 1431101867.986919: EAP: Server state machine removed > > 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: disassociated > > 1431101867.986936: Disassociation notification for unknown STA > 00:24:d7:6f:eb:c4 > > ^C1431101872.085020: Signal 2 received - terminating > > 1431101872.085031: Flushing old station entries > > 1431101872.085040: Deauthenticate all stations > > 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting server > > 1431101872.085149: bsd_set_privacy: enabled=0 > > 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0) > > 1431101872.085166: bsd_set_ieee8021x: enabled=0 > > > > hostapd.conf: > > interface=wlan0 > > driver=bsd > > logger_syslog=-1 > > logger_syslog_level=0 > > debug=2 > > dump_file=/tmp/hostapd.dump > > ctrl_interface=/var/run/hostapd > > ctrl_interface_group=0 > > ssid=RADIUS > > hw_mode=g > > own_ip_addr=127.0.0.1 > > ieee8021x=1 > > nas_identifier=app-k7 > > auth_server_addr=10.146.20.137 > > auth_server_port=1812 > > auth_server_shared_secret=azxswqtgbnhyt > > acct_server_addr=10.146.20.137 > > acct_server_port=1813 > > acct_server_shared_secret=azxswqtgbnhyt > > radius_retry_primary_interval=600 > > radius_acct_interim_interval=900 > > wpa=1 > > wpa_key_mgmt=WPA-EAP > > > > Best regards > > Marcin Michta > > _______________________________________________ > freebsd-wireless@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-wireless > To unsubscribe, send any mail to "freebsd-wireless-unsubscribe@freebsd.org" From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 20:50:02 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id EE37A627; Wed, 13 May 2015 20:50:01 +0000 (UTC) Received: from mail-wg0-x233.google.com (mail-wg0-x233.google.com [IPv6:2a00:1450:400c:c00::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6853C13AB; Wed, 13 May 2015 20:50:01 +0000 (UTC) Received: by wgbhc8 with SMTP id hc8so21961832wgb.3; Wed, 13 May 2015 13:49:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type:content-transfer-encoding:thread-index :content-language; bh=jh2GtkzeIsn2IHlh5bPLxKSIIAXuPz8Ri4JfPCUQwT4=; b=Rajx5PFqzpYi2wxiojyjSda3vEnLTFzXqxlWIS/kqpPVVsTG8lXG9TGOKbfOcck5GG p2FnkAGg76hAYpHKkL1dsHC3RqGbnIDtFtOmHLqL8g/PwCPBspWNsc05oM0GuA4beC7S Bf4vI21zHACTBdpDwUsm870eJZ2TQt1W4HMRpUfzRIowwiSAEErNvPA3PnAcX4cht5b1 Q8U7dY3XOVPd4e9Tqnm0EJfUsH/vpuaLbFnwJLc1DCENfx7atabDvNjjnnq4vA4UUHn8 kAmhlC/MnOIF8j7pQZBHl69iAXakOa/F+E/MLOGnZqy/eS4TVn5jHuRxguquuqC/8A9f whTA== X-Received: by 10.180.77.83 with SMTP id q19mr41648774wiw.89.1431550199773; Wed, 13 May 2015 13:49:59 -0700 (PDT) Received: from botmachine (muszelka.nat.student.pw.edu.pl. [194.29.137.5]) by mx.google.com with ESMTPSA id mc20sm9828841wic.15.2015.05.13.13.49.57 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 13 May 2015 13:49:59 -0700 (PDT) From: "Marcin Michta" To: "'Adrian Chadd'" Cc: References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> In-Reply-To: Subject: RE: hostapd + freeradius can't connect Date: Wed, 13 May 2015 22:49:56 +0200 Message-ID: <003c01d08dbe$6018b900$204a2b00$@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQLmW7Myy37hx44G94iEUPVz4fJerwJvc76jmztEOJA= Content-Language: pl X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 20:50:02 -0000 When I set on Cisco AP my freeradius server all works fine. All devices can connect to network. So I guess that is not freeradius's = fault My radius configs: radiusd.conf: prefix =3D /usr/local exec_prefix =3D ${prefix} sysconfdir =3D ${prefix}/etc localstatedir =3D /var sbindir =3D ${exec_prefix}/sbin logdir =3D /var/log raddbdir =3D ${sysconfdir}/raddb radacctdir =3D ${logdir}/radacct name =3D radiusd confdir =3D ${raddbdir} modconfdir =3D ${confdir}/mods-config certdir =3D ${confdir}/certs cadir =3D ${confdir}/certs run_dir =3D ${localstatedir}/run/${name} db_dir =3D ${raddbdir} libdir =3D /usr/local/lib/freeradius-3.0.8 pidfile =3D ${run_dir}/${name}.pid correct_escapes =3D true max_request_time =3D 30 cleanup_delay =3D 5 max_requests =3D 1024 hostname_lookups =3D no log { destination =3D files colourise =3D yes file =3D ${logdir}/radiusd syslog_facility =3D daemon stripped_names =3D no auth =3D yes msg_denied =3D "You are already logged in - access denied" } checkrad =3D ${sbindir}/checkrad security { user =3D freeradius group =3D freeradius allow_core_dumps =3D no max_attributes =3D 200 reject_delay =3D 1 status_server =3D yes allow_vulnerable_openssl =3D no } proxy_requests =3D yes $INCLUDE proxy.conf $INCLUDE clients.conf thread pool { start_servers =3D 5 max_servers =3D 32 min_spare_servers =3D 3 max_spare_servers =3D 10 max_requests_per_server =3D 0 auto_limit_acct =3D no } modules { $INCLUDE mods-enabled/ } instantiate { } policy { $INCLUDE policy.d/ } $INCLUDE sites-enabled/ ######################## sites-enabled/default: server default { listen { type =3D auth ipaddr =3D * port =3D 0 limit { max_connections =3D 16 lifetime =3D 0 idle_timeout =3D 30 } } listen { ipaddr =3D * port =3D 0 type =3D acct limit { } } listen { type =3D auth port =3D 0 limit { max_connections =3D 16 lifetime =3D 0 idle_timeout =3D 30 } } listen { ipv6addr =3D :: port =3D 0 type =3D acct limit { } } authorize { filter_username preprocess digest suffix eap { ok =3D return } expiration logintime } authenticate { digest eap } preacct { preprocess acct_unique suffix files } accounting { detail unix exec attr_filter.accounting_response } session { } post-auth { update { &reply: +=3D &session-state: } exec remove_reply_message_if_eap Post-Auth-Type REJECT { attr_filter.access_reject eap remove_reply_message_if_eap } } pre-proxy { } post-proxy { eap } } ######################## sites-enabled/inner-tunnel: server inner-tunnel { listen { ipaddr =3D 127.0.0.1 port =3D 18120 type =3D auth } authorize { chap mschap suffix update control { &Proxy-To-Realm :=3D LOCAL } eap { ok =3D return } files ldap expiration logintime pap } authenticate { Auth-Type PAP { ldap } chap Auth-Type MS-CHAP { mschap } eap } session { radutmp } post-auth { reply_log ldap Post-Auth-Type REJECT { attr_filter.access_reject update outer.session-state { &Module-Failure-Message :=3D = &request:Module-Failure-Message } } } pre-proxy { } post-proxy { eap } ######################## mods-enabled/eap: eap { default_eap_type =3D peap timer_expire =3D 60 ignore_unknown_eap_types =3D no cisco_accounting_username_bug =3D no max_sessions =3D ${max_requests} gtc { auth_type =3D PAP } tls-config tls-common { private_key_password =3D whatever private_key_file =3D ${certdir}/server.pem certificate_file =3D ${certdir}/server.pem ca_file =3D ${cadir}/ca.pem dh_file =3D ${certdir}/dh ca_path =3D ${cadir} cipher_list =3D "DEFAULT" ecdh_curve =3D "prime256v1" cache { enable =3D yes max_entries =3D 255 } verify { } ocsp { enable =3D no override_cert_url =3D yes url =3D "http://127.0.0.1/ocsp/" } } tls { tls =3D tls-common } ttls { tls =3D tls-common default_eap_type =3D mschapv2 copy_request_to_tunnel =3D no use_tunneled_reply =3D no virtual_server =3D "inner-tunnel" } peap { tls =3D tls-common default_eap_type =3D mschapv2 copy_request_to_tunnel =3D no use_tunneled_reply =3D no virtual_server =3D "inner-tunnel" } mschapv2 { } } > Hi! > > I haven't tested radius+wpa before; what's your radius config look = like? >=20 > (It'd be good to document how to do this in the wiki/handbook.) > > > > -a On 13 May 2015 at 05:11, Marcin Michta wrote: > Hi all, > So I'm trying configure hostapd to work (peap + mschapv2). I tried=20 > connect by wpa_suplicant on FreeBSD, and Ubuntu with gui, but without = success. > Freeradius allow to connect, but connections are failed - every time = get: > > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect:=20 > STA > 00:24:d7:6f:eb:c4 reason 2 > > > > Where is mistake/bug? Or what is wrong? > log: > > 1431101834.596845: Configuration file: hostapd.conf > > 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable = > is not used anymore > > 1431101834.626788: ctrl_interface_group=3D0 > > 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > > 1431101834.627098: Completing interface initialization > > 1431101834.627101: Flushing old station entries > > 1431101834.627109: Deauthenticate all stations > > 1431101834.627113: bsd_set_privacy: enabled=3D0 > > 1431101834.627117: bsd_set_key: alg=3D0 addr=3D0x0 key_idx=3D0 = set_tx=3D1=20 > seq_len=3D0 > key_len=3D0 > > 1431101834.627120: bsd_del_key: key_idx=3D0 > > 1431101834.627124: bsd_set_key: alg=3D0 addr=3D0x0 key_idx=3D1 = set_tx=3D0=20 > seq_len=3D0 > key_len=3D0 > > 1431101834.627127: bsd_del_key: key_idx=3D1 > > 1431101834.627130: bsd_set_key: alg=3D0 addr=3D0x0 key_idx=3D2 = set_tx=3D0=20 > seq_len=3D0 > key_len=3D0 > > 1431101834.627133: bsd_del_key: key_idx=3D2 > > 1431101834.627136: bsd_set_key: alg=3D0 addr=3D0x0 key_idx=3D3 = set_tx=3D0=20 > seq_len=3D0 > key_len=3D0 > > 1431101834.627139: bsd_del_key: key_idx=3D3 > > 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 = > and ssid 'RADIUS' > > 1431101834.627155: wlan0: RADIUS Authentication server=20 > 10.146.20.137:1812 > > 1431101834.627257: RADIUS local address: 10.146.103.7:14137 > > 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813 > > 1431101834.627288: RADIUS local address: 10.146.103.7:14773 > > 1431101834.627294: bsd_set_ieee8021x: enabled=3D1 > > 1431101834.627296: bsd_configure_wpa: enable WPA=3D 0x1 > > 1431101834.627514: WPA: group state machine entering state GTK_INIT=20 > (VLAN-ID > 0) > > 1431101834.627527: GMK - hexdump(len=3D32): [REMOVED] > > 1431101834.627530: GTK - hexdump(len=3D32): [REMOVED] > > 1431101834.627532: WPA: group state machine entering state SETKEYSDONE = > (VLAN-ID 0) > > 1431101834.627535: bsd_set_key: alg=3D2 addr=3D0x0 key_idx=3D1 = set_tx=3D1=20 > seq_len=3D0 > key_len=3D32 > > 1431101834.632173: ioctl[SIOCS80211, op=3D19, val=3D0, arg_len=3D64]: = Device=20 > not configured > > 1431101834.632194: bsd_set_privacy: enabled=3D1 > > 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24) > > 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting=20 > server > > 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101834.702842: wlan0: Setup of interface done. > > 1431101834.702886: Discard routing message to if#0 (not for us 8) > > > > 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server > > 1431101834.702914: wlan0: RADIUS Received RADIUS message > > 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.07 sec > > 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11:=20 > associated > > 1431101867.876215: STA included WPA IE in (Re)AssocReq > > 1431101867.876220: New STA > > 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1=20 > notification > > 1431101867.876243: bsd_set_key: alg=3D0 addr=3D0x8014908d0 key_idx=3D0 = > set_tx=3D1 > seq_len=3D0 key_len=3D0 > > 1431101867.876248: bsd_del_key: addr=3D00:24:d7:6f:eb:c4 > > 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start=20 > authentication > > 1431101867.876270: EAP: Server state machine created > > 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state IDLE > > 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering=20 > state FORCE_BOTH > > 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start=20 > authentication > > 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > INITIALIZE > > 1431101867.876307: bsd_set_key: alg=3D0 addr=3D0x8014908d0 key_idx=3D0 = > set_tx=3D1 > seq_len=3D0 key_len=3D0 > > 1431101867.876310: bsd_del_key: addr=3D00:24:d7:6f:eb:c4 > > 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state = > IDLE > > 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > AUTHENTICATION > > 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > AUTHENTICATION2 > > 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering=20 > state DISCONNECTED > > 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > unauthorizing port > > 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering=20 > state RESTART > > 1431101867.876354: EAP: EAP entering state INITIALIZE > > 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4 > > 1431101867.876360: EAP: EAP entering state SELECT_ACTION > > 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE > > 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD > > 1431101867.876366: EAP: getNextMethod: vendor 0 type 1 > > 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=3D0 = method=3D1 > > 1431101867.876371: EAP: EAP entering state METHOD_REQUEST > > 1431101867.876374: EAP: building EAP-Request: Identifier 77 > > 1431101867.876377: EAP: EAP entering state SEND_REQUEST > > 1431101867.876379: EAP: EAP entering state IDLE > > 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering=20 > state CONNECTING > > 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering=20 > state AUTHENTICATING > > 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 77) > > 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.880294: IEEE 802.1X: version=3D1 type=3D0 length=3D10 > > 1431101867.880298: EAP: code=3D2 identifier=3D77 length=3D10 > > 1431101867.880300: (response) > > 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D77 len=3D10) from STA: EAP Response-Identity = (1) > > 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.880326: EAP: EAP entering state RECEIVED > > 1431101867.880328: EAP: parseEapResp: rxResp=3D1 respId=3D77 = respMethod=3D1 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK > > 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE > > 1431101867.880335: EAP-Identity: Peer identity - = hexdump_ascii(len=3D5): > > 7a 65 6e 6f 6e zenon > > 1431101867.880341: EAP: EAP entering state SELECT_ACTION > > 1431101867.880343: EAP: getDecision: -> PASSTHROUGH > > 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH > > 1431101867.880347: EAP: EAP entering state AAA_REQUEST > > 1431101867.880348: EAP: EAP entering state AAA_IDLE > > 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA=20 > identity 'zenon' > > 1431101867.880363: Encapsulating EAP message into a RADIUS packet > > 1431101867.880379: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server > > 1431101867.882237: wlan0: RADIUS Received RADIUS message > > 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.882272: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D78 len=3D6) from RADIUS server: = > EAP-Request-PEAP (25) > > 1431101867.882305: EAP: EAP entering state AAA_RESPONSE > > 1431101867.882308: EAP: getId: id=3D78 > > 1431101867.882311: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.882313: EAP: EAP entering state IDLE2 > > 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 78) > > 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.883907: IEEE 802.1X: version=3D1 type=3D0 length=3D118 > > 1431101867.883923: EAP: code=3D2 identifier=3D78 length=3D118 > > 1431101867.883925: (response) > > 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D78 len=3D118) from STA: EAP Response-PEAP = (25) > > 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.883952: EAP: EAP entering state RECEIVED2 > > 1431101867.883954: EAP: parseEapResp: rxResp=3D1 respId=3D78 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.883956: EAP: EAP entering state AAA_REQUEST > > 1431101867.883959: EAP: EAP entering state AAA_IDLE > > 1431101867.883961: Encapsulating EAP message into a RADIUS packet > > 1431101867.883969: Copied RADIUS State Attribute > > 1431101867.883975: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS=20 > server > > 1431101867.890413: wlan0: RADIUS Received RADIUS message > > 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.890450: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D79 len=3D1004) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.890483: EAP: EAP entering state AAA_RESPONSE > > 1431101867.890486: EAP: getId: id=3D79 > > 1431101867.890489: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.890491: EAP: EAP entering state IDLE2 > > 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 79) > > 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.892408: IEEE 802.1X: version=3D1 type=3D0 length=3D6 > > 1431101867.892423: EAP: code=3D2 identifier=3D79 length=3D6 > > 1431101867.892426: (response) > > 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D79 len=3D6) from STA: EAP Response-PEAP (25) > > 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.892454: EAP: EAP entering state RECEIVED2 > > 1431101867.892456: EAP: parseEapResp: rxResp=3D1 respId=3D79 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.892459: EAP: EAP entering state AAA_REQUEST > > 1431101867.892461: EAP: EAP entering state AAA_IDLE > > 1431101867.892463: Encapsulating EAP message into a RADIUS packet > > 1431101867.892471: Copied RADIUS State Attribute > > 1431101867.892477: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS=20 > server > > 1431101867.893185: wlan0: RADIUS Received RADIUS message > > 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.893222: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D80 len=3D1000) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.893245: EAP: EAP entering state AAA_RESPONSE > > 1431101867.893249: EAP: getId: id=3D80 > > 1431101867.893251: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.893253: EAP: EAP entering state IDLE2 > > 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 80) > > 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.894043: IEEE 802.1X: version=3D1 type=3D0 length=3D6 > > 1431101867.894047: EAP: code=3D2 identifier=3D80 length=3D6 > > 1431101867.894049: (response) > > 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D80 len=3D6) from STA: EAP Response-PEAP (25) > > 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.894078: EAP: EAP entering state RECEIVED2 > > 1431101867.894080: EAP: parseEapResp: rxResp=3D1 respId=3D80 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.894083: EAP: EAP entering state AAA_REQUEST > > 1431101867.894085: EAP: EAP entering state AAA_IDLE > > 1431101867.894087: Encapsulating EAP message into a RADIUS packet > > 1431101867.894095: Copied RADIUS State Attribute > > 1431101867.894101: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server > > 1431101867.894777: wlan0: RADIUS Received RADIUS message > > 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.894814: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D81 len=3D904) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.894847: EAP: EAP entering state AAA_RESPONSE > > 1431101867.894851: EAP: getId: id=3D81 > > 1431101867.894853: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.894855: EAP: EAP entering state IDLE2 > > 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 81) > > 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.902157: IEEE 802.1X: version=3D1 type=3D0 length=3D208 > > 1431101867.902173: EAP: code=3D2 identifier=3D81 length=3D208 > > 1431101867.902175: (response) > > 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D81 len=3D208) from STA: EAP Response-PEAP = (25) > > 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.902203: EAP: EAP entering state RECEIVED2 > > 1431101867.902205: EAP: parseEapResp: rxResp=3D1 respId=3D81 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.902207: EAP: EAP entering state AAA_REQUEST > > 1431101867.902209: EAP: EAP entering state AAA_IDLE > > 1431101867.902211: Encapsulating EAP message into a RADIUS packet > > 1431101867.902219: Copied RADIUS State Attribute > > 1431101867.902225: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server > > 1431101867.905067: wlan0: RADIUS Received RADIUS message > > 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.905090: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D82 len=3D65) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.905114: EAP: EAP entering state AAA_RESPONSE > > 1431101867.905118: EAP: getId: id=3D82 > > 1431101867.905120: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.905122: EAP: EAP entering state IDLE2 > > 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 82) > > 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.905794: IEEE 802.1X: version=3D1 type=3D0 length=3D6 > > 1431101867.905797: EAP: code=3D2 identifier=3D82 length=3D6 > > 1431101867.905799: (response) > > 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D82 len=3D6) from STA: EAP Response-PEAP (25) > > 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.905826: EAP: EAP entering state RECEIVED2 > > 1431101867.905828: EAP: parseEapResp: rxResp=3D1 respId=3D82 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.905831: EAP: EAP entering state AAA_REQUEST > > 1431101867.905833: EAP: EAP entering state AAA_IDLE > > 1431101867.905835: Encapsulating EAP message into a RADIUS packet > > 1431101867.905843: Copied RADIUS State Attribute > > 1431101867.905848: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.906501: wlan0: RADIUS Received RADIUS message > > 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.906523: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D83 len=3D43) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.906541: EAP: EAP entering state AAA_RESPONSE > > 1431101867.906544: EAP: getId: id=3D83 > > 1431101867.906546: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.906548: EAP: EAP entering state IDLE2 > > 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 83) > > 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.907155: IEEE 802.1X: version=3D1 type=3D0 length=3D80 > > 1431101867.907172: EAP: code=3D2 identifier=3D83 length=3D80 > > 1431101867.907174: (response) > > 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D83 len=3D80) from STA: EAP Response-PEAP = (25) > > 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.907200: EAP: EAP entering state RECEIVED2 > > 1431101867.907202: EAP: parseEapResp: rxResp=3D1 respId=3D83 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.907204: EAP: EAP entering state AAA_REQUEST > > 1431101867.907206: EAP: EAP entering state AAA_IDLE > > 1431101867.907208: Encapsulating EAP message into a RADIUS packet > > 1431101867.907216: Copied RADIUS State Attribute > > 1431101867.907221: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server > > 1431101867.908012: wlan0: RADIUS Received RADIUS message > > 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.908046: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D84 len=3D75) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.908077: EAP: EAP entering state AAA_RESPONSE > > 1431101867.908080: EAP: getId: id=3D84 > > 1431101867.908082: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.908085: EAP: EAP entering state IDLE2 > > 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 84) > > 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.909670: IEEE 802.1X: version=3D1 type=3D0 length=3D144 > > 1431101867.909674: EAP: code=3D2 identifier=3D84 length=3D144 > > 1431101867.909677: (response) > > 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D84 len=3D144) from STA: EAP Response-PEAP = (25) > > 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.909716: EAP: EAP entering state RECEIVED2 > > 1431101867.909719: EAP: parseEapResp: rxResp=3D1 respId=3D84 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.909724: EAP: EAP entering state AAA_REQUEST > > 1431101867.909728: EAP: EAP entering state AAA_IDLE > > 1431101867.909732: Encapsulating EAP message into a RADIUS packet > > 1431101867.909743: Copied RADIUS State Attribute > > 1431101867.909753: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server > > 1431101867.920907: wlan0: RADIUS Received RADIUS message > > 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.01 sec > > 1431101867.920942: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D85 len=3D91) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.920972: EAP: EAP entering state AAA_RESPONSE > > 1431101867.920976: EAP: getId: id=3D85 > > 1431101867.920977: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.920979: EAP: EAP entering state IDLE2 > > 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 85) > > 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.922782: IEEE 802.1X: version=3D1 type=3D0 length=3D80 > > 1431101867.922798: EAP: code=3D2 identifier=3D85 length=3D80 > > 1431101867.922800: (response) > > 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D85 len=3D80) from STA: EAP Response-PEAP = (25) > > 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.922827: EAP: EAP entering state RECEIVED2 > > 1431101867.922829: EAP: parseEapResp: rxResp=3D1 respId=3D85 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.922832: EAP: EAP entering state AAA_REQUEST > > 1431101867.922834: EAP: EAP entering state AAA_IDLE > > 1431101867.922837: Encapsulating EAP message into a RADIUS packet > > 1431101867.922844: Copied RADIUS State Attribute > > 1431101867.922850: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server > > 1431101867.962130: wlan0: RADIUS Received RADIUS message > > 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.03 sec > > 1431101867.962152: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D1 id=3D86 len=3D43) from RADIUS = server:=20 > EAP-Request-PEAP (25) > > 1431101867.962171: EAP: EAP entering state AAA_RESPONSE > > 1431101867.962174: EAP: getId: id=3D86 > > 1431101867.962176: EAP: EAP entering state SEND_REQUEST2 > > 1431101867.962178: EAP: EAP entering state IDLE2 > > 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic=20 > back off; > retransCount=3D0) > > 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state REQUEST > > 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 86) > > 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.970403: IEEE 802.1X: version=3D1 type=3D0 length=3D80 > > 1431101867.970419: EAP: code=3D2 identifier=3D86 length=3D80 > > 1431101867.970421: (response) > > 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received=20 > EAP packet (code=3D2 id=3D86 len=3D80) from STA: EAP Response-PEAP = (25) > > 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state RESPONSE > > 1431101867.970450: EAP: EAP entering state RECEIVED2 > > 1431101867.970452: EAP: parseEapResp: rxResp=3D1 respId=3D86 = respMethod=3D25 > respVendor=3D0 respVendorMethod=3D0 > > 1431101867.970455: EAP: EAP entering state AAA_REQUEST > > 1431101867.970457: EAP: EAP entering state AAA_IDLE > > 1431101867.970459: Encapsulating EAP message into a RADIUS packet > > 1431101867.970467: Copied RADIUS State Attribute > > 1431101867.970473: wlan0: RADIUS Sending RADIUS message to=20 > authentication server > > 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3=20 > seconds > > > > 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server > > 1431101867.971473: wlan0: RADIUS Received RADIUS message > > 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received=20 > RADIUS packet matched with a pending request, round trip time 0.00 sec > > 1431101867.971507: RADIUS packet matching with station=20 > 00:24:d7:6f:eb:c4 > > 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=3D32): [REMOVED] > > 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=3D32): [REMOVED] > > 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old=20 > identity 'zenon' updated with User-Name from Access-Accept 'zenon' > > 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X:=20 > decapsulated EAP packet (code=3D3 id=3D86 len=3D4) from RADIUS server: = EAP=20 > Success > > 1431101867.971558: EAP: EAP entering state SUCCESS2 > > 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state SUCCESS > > 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending=20 > EAP Packet (identifier 86) > > 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering=20 > state IDLE > > 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > INITPMK > > 1431101867.971600: WPA: PMK from EAPOL state machine (len=3D64) > > 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > PTKSTART > > 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg=20 > of 4-Way Handshake > > 1431101867.971618: WPA: Send EAPOL(version=3D1 secure=3D0 mic=3D0 = ack=3D1=20 > install=3D0 > pairwise=3D8 kde_len=3D0 keyidx=3D0 encr=3D0) > > 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986164: IEEE 802.1X: version=3D1 type=3D3 length=3D119 > > 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received=20 > EAPOL-Key frame (2/4 Pairwise) > > 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > PTKCALCNEGOTIATING > > 1431101867.986213: WPA: PTK derivation - A1=3D00:0e:2e:c4:2f:e7 > A2=3D00:24:d7:6f:eb:c4 > > 1431101867.986220: WPA: PMK - hexdump(len=3D32): [REMOVED] > > 1431101867.986224: WPA: PTK - hexdump(len=3D64): [REMOVED] > > 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state > PTKCALCNEGOTIATING2 > > 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > PTKINITNEGOTIATING > > 1431101867.986243: bsd_get_seqnum: addr=3D00:00:00:00:00:00 idx=3D1 > > 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg=20 > of 4-Way Handshake > > 1431101867.986272: WPA: Send EAPOL(version=3D1 secure=3D0 mic=3D1 = ack=3D1=20 > install=3D1 > pairwise=3D8 kde_len=3D24 keyidx=3D0 encr=3D0) > > 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4 > > 1431101867.986779: IEEE 802.1X: version=3D1 type=3D3 length=3D95 > > 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received=20 > EAPOL-Key frame (4/4 Pairwise) > > 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state=20 > PTKINITDONE > > 1431101867.986818: bsd_set_key: alg=3D2 addr=3D0x8014908d0 key_idx=3D0 = > set_tx=3D1 > seq_len=3D0 key_len=3D32 > > 1431101867.986868: ioctl[SIOCS80211, op=3D19, val=3D0, arg_len=3D64]: = Device=20 > not configured > > 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator=20 > requests > disconnect: STA 00:24:d7:6f:eb:c4 reason 2 > > 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11:=20 > deauthenticated due to local deauth request > > 1431101867.986919: EAP: Server state machine removed > > 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11:=20 > disassociated > > 1431101867.986936: Disassociation notification for unknown STA > 00:24:d7:6f:eb:c4 > > ^C1431101872.085020: Signal 2 received - terminating > > 1431101872.085031: Flushing old station entries > > 1431101872.085040: Deauthenticate all stations > > 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting=20 > server > > 1431101872.085149: bsd_set_privacy: enabled=3D0 > > 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0) > > 1431101872.085166: bsd_set_ieee8021x: enabled=3D0 > > > > hostapd.conf: > > interface=3Dwlan0 > > driver=3Dbsd > > logger_syslog=3D-1 > > logger_syslog_level=3D0 > > debug=3D2 > > dump_file=3D/tmp/hostapd.dump > > ctrl_interface=3D/var/run/hostapd > > ctrl_interface_group=3D0 > > ssid=3DRADIUS > > hw_mode=3Dg > > own_ip_addr=3D127.0.0.1 > > ieee8021x=3D1 > > nas_identifier=3Dapp-k7 > > auth_server_addr=3D10.146.20.137 > > auth_server_port=3D1812 > > auth_server_shared_secret=3Dazxswqtgbnhyt > > acct_server_addr=3D10.146.20.137 > > acct_server_port=3D1813 > > acct_server_shared_secret=3Dazxswqtgbnhyt > > radius_retry_primary_interval=3D600 > > radius_acct_interim_interval=3D900 > > wpa=3D1 > > wpa_key_mgmt=3DWPA-EAP > > > > Best regards > > Marcin Michta > > _______________________________________________ > freebsd-wireless@freebsd.org mailing list=20 > http://lists.freebsd.org/mailman/listinfo/freebsd-wireless > To unsubscribe, send any mail to = "freebsd-wireless-unsubscribe@freebsd.org" From owner-freebsd-wireless@FreeBSD.ORG Wed May 13 22:47:45 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E2894749 for ; Wed, 13 May 2015 22:47:45 +0000 (UTC) Received: from mail-ig0-x235.google.com (mail-ig0-x235.google.com [IPv6:2607:f8b0:4001:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C107D117E for ; Wed, 13 May 2015 22:47:45 +0000 (UTC) Received: by igbyr2 with SMTP id yr2so152537845igb.0 for ; Wed, 13 May 2015 15:47:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=VVu58Jm2cU4tvwJkqcmhQpzjp+WT0wWmT1+1kGecwFg=; b=JnfOmWdf+ReYBX+4Cr91/sCtF+FGRjLBgctZIuOcpzXQBoWHnUV3U0lzd69V/6P1xI iYeuXr3dlxkoo8TRSH3P0Qn0u1+Ig+1bfKhhBNlPUDDgaYMD253g0H62/Pvhm/T1bmmb r3How70lDoYWaze6VJBUaWrb10ZdB4myfMx0IQCP7gTaf6vJGDzmC1gVWVkqTRxHi4nt Edb4Awxmc8rviXfFSjynXWWxvGOR68v1UIGMHNo+vPJDMw31kyBbnvypBtuez7m8pQr8 AVbwAKS1Z7rkGQsCcG2lxpsPRbtSWbaynzUn4wA5bP9dkYOptULfERAllGL/F4l5kG0u ZUIw== MIME-Version: 1.0 X-Received: by 10.50.30.69 with SMTP id q5mr2524997igh.11.1431557264802; Wed, 13 May 2015 15:47:44 -0700 (PDT) Received: by 10.107.190.7 with HTTP; Wed, 13 May 2015 15:47:44 -0700 (PDT) In-Reply-To: <20150513150407.GJ30507@vpn.offrom.nl> References: <20150513150407.GJ30507@vpn.offrom.nl> Date: Wed, 13 May 2015 18:47:44 -0400 Message-ID: Subject: Re: captive portal recommendation From: Peter Lai To: Willem@offermans.rompen.nl Cc: freebsd-wireless@freebsd.org Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 22:47:46 -0000 I've always hacked up NetReg (http://netreg.sourceforge.net/) to do this (it's written in perl). It lets you authenticate against ldap and you should be able to hack in having registrations autoexpire (it may already support that, I don't remember). You will have to setup dhcpd and unbind on your own though - netreg basically is a frontend that updates dhcpd.conf to assign registered mac addresses to a separate dhcp IP pool and rehups dhcpd; the dhcpd config sets the default/unregistered pool's nameserver attribute to a resolver which will always resolves to the captive portal when the mac address is unregistered; the registered dhcp pool provisions a nameserver that does the proper resolution. Then add firewall rules to only allow the registered block access to the outside. On Wed, May 13, 2015 at 11:04 AM, Willem Offermans wrote: > Dear FreeBSD friends, > > I like to install a ``captive portal'' system > (https://en.wikipedia.org/wiki/Captive_portal) on my running FreeBSD > server. I like to connect possible authentication with a ticket system, > where possible users need to obtain a ticket for web access. The ticket > should be valid for a limited amount of time. > > Can anyone recommend such a system? > > -- > Met vriendelijke groeten, > With kind regards, > Mit freundlichen Gruessen, > De jrus wah, > > Wiel > > ************************************* > W.K. Offermans > e-mail: Willem@Offermans.Rompen.nl > > Powered by .... > > (__) > \\\'',) > \/ \ ^ > .\._/_) > > www.FreeBSD.org > _______________________________________________ > freebsd-wireless@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-wireless > To unsubscribe, send any mail to "freebsd-wireless-unsubscribe@freebsd.org" From owner-freebsd-wireless@FreeBSD.ORG Thu May 14 22:59:27 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9A2AD4D3 for ; Thu, 14 May 2015 22:59:27 +0000 (UTC) Received: from mail-wg0-x22f.google.com (mail-wg0-x22f.google.com [IPv6:2a00:1450:400c:c00::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 351B01F3F for ; Thu, 14 May 2015 22:59:27 +0000 (UTC) Received: by wgbhc8 with SMTP id hc8so58569199wgb.3 for ; Thu, 14 May 2015 15:59:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=uF28b3cgrdwldzwkGnjhKRwMKs9HpSa0ATwL5rHp/0s=; b=DIaehjqX8UmBdwjHKJi7GpIfS3VNl6qGO+jx8VVbhMpZB0jmWt3FmL1k9v7c2CZUri uY2btxYPglQI/QD0AyHppprRy0RbRTUmx+23/h2ICPff0SV4KsWMmqvcAiDZzLjPrRZq fp4hK8X5vwl1qnVdLYvDyQtAfAVMmjCTmtZRg3pMHlL32qjYGLII2X5zCxOjW2r5pMYF BADwEn/TVD5exAG7oCe5zaJMhBZz8RfQgIV9578aoKIzJGs8YvaTba5hg9NmmHGe8lgs rISsIdR9Np2T57+Iocg31dGJWMESjNDllwkGGJwfIt4G6l5MIRr6eQdpyCC0g1XHcZu+ WIgw== MIME-Version: 1.0 X-Received: by 10.180.82.97 with SMTP id h1mr28298653wiy.26.1431644365556; Thu, 14 May 2015 15:59:25 -0700 (PDT) Received: by 10.194.88.165 with HTTP; Thu, 14 May 2015 15:59:25 -0700 (PDT) In-Reply-To: <20150513150407.GJ30507@vpn.offrom.nl> References: <20150513150407.GJ30507@vpn.offrom.nl> Date: Thu, 14 May 2015 23:59:25 +0100 Message-ID: Subject: Re: captive portal recommendation From: "Sevan / Venture37" To: "freebsd-wireless@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 14 May 2015 22:59:27 -0000 On 13 May 2015 at 16:04, Willem Offermans wrote: > Dear FreeBSD friends, > > I like to install a ``captive portal'' system > (https://en.wikipedia.org/wiki/Captive_portal) on my running FreeBSD > server. I like to connect possible authentication with a ticket system, > where possible users need to obtain a ticket for web access. The ticket > should be valid for a limited amount of time. > > Can anyone recommend such a system? Have you looked at net-mgmt/chillisport or net-mgmt/coova ? Coova is actively "maintained" but the version in our ports tree is pretty old (because I'm still working on fixing functionality in the upstream repo). Should work fine on a system running FreeBSD 9.x and prior and do what you require. Sevan / Venture37 From owner-freebsd-wireless@FreeBSD.ORG Fri May 15 02:29:22 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D4823E02 for ; Fri, 15 May 2015 02:29:22 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BF2F11382 for ; Fri, 15 May 2015 02:29:22 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4F2TMKi039929 for ; Fri, 15 May 2015 02:29:22 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 196264] [iwn] [patch]: few minor fixes Date: Fri, 15 May 2015 02:29:23 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: adrian@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 15 May 2015 02:29:22 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196264 --- Comment #7 from Adrian Chadd --- Would you like a thinkpad with one in it? -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sat May 16 05:59:31 2015 Return-Path: Delivered-To: freebsd-wireless@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 152F9F73 for ; Sat, 16 May 2015 05:59:31 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 002011B13 for ; Sat, 16 May 2015 05:59:30 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t4G5xUAl022329 for ; Sat, 16 May 2015 05:59:30 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-wireless@FreeBSD.org Subject: [Bug 196264] [iwn] [patch]: few minor fixes Date: Sat, 16 May 2015 05:59:30 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: wireless X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-wireless@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 May 2015 05:59:31 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196264 --- Comment #8 from commit-hook@freebsd.org --- A commit references this bug: Author: adrian Date: Sat May 16 05:59:26 UTC 2015 New revision: 282999 URL: https://svnweb.freebsd.org/changeset/base/282999 Log: Various iwn(4) fixes. * simplify channel logic for determining RF gain setting in scan setup * don't set TX timer on error * free node references for unsent frames on device stop * set maxfrags to IWN_MAX_SCATTER-1 (first segment is used by TX command) * add missing IWN_UNLOCK() from interrupt path when the hardware disappears. * pass control frames to host * nitems() instead of local macro Tested: * Intel 5100, STA mode PR: kern/196264 Submitted by: Andriy Voskoboinyk Changes: head/sys/dev/iwn/if_iwn.c -- You are receiving this mail because: You are the assignee for the bug. From owner-freebsd-wireless@FreeBSD.ORG Sat May 16 06:03:36 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A9FD6FB6 for ; Sat, 16 May 2015 06:03:36 +0000 (UTC) Received: from mail-ig0-x232.google.com (mail-ig0-x232.google.com [IPv6:2607:f8b0:4001:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 72F411BEB for ; Sat, 16 May 2015 06:03:36 +0000 (UTC) Received: by igcau1 with SMTP id au1so14102894igc.1 for ; Fri, 15 May 2015 23:03:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=8qoSTb/DTXuSqYS9beJJKIIUmXgxYjiBhQ6mDqI1180=; b=PmoslF7TB2L04d17lk+jCMOVbcdQzkyvdQZuLNjfCABlYP0+omfILrb+g8nIxpxdS9 wRX0tt5uPtLGHV/9UxFqbXCX8zt7aZReRJEo9X7+J7Ppxk04PWJ4AuAXWpm1tlzu8EgE 5i7pc2txuOLvS5G/28N1eJspZDJ32nBjbPIp7fKE+DnkS4/2fJAT75TDCGO2RHv+HCtU k3c9A68QTy/MIzLSIakOWfCIT1VysLg/c9OI1CMf6xpqgrOkNCcY+gi1qkyFlwFEJZBP CeN8CIw8rahUBH2pBl58DK5IgR/RpAROViGVDAzEsMSCF9jd7rdsPRU/Ck41LRBRzyrX yCRQ== MIME-Version: 1.0 X-Received: by 10.43.58.201 with SMTP id wl9mr24783427icb.37.1431756215548; Fri, 15 May 2015 23:03:35 -0700 (PDT) Sender: adrian.chadd@gmail.com Received: by 10.36.38.133 with HTTP; Fri, 15 May 2015 23:03:35 -0700 (PDT) In-Reply-To: <003c01d08dbe$6018b900$204a2b00$@gmail.com> References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> <003c01d08dbe$6018b900$204a2b00$@gmail.com> Date: Fri, 15 May 2015 23:03:35 -0700 X-Google-Sender-Auth: dJgBT1HvNUzhTx-wkl2cDCgOots Message-ID: Subject: Re: hostapd + freeradius can't connect From: Adrian Chadd To: Marcin Michta Cc: "freebsd-wireless@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 May 2015 06:03:36 -0000 Hi, Has this ever worked? Someone had issues as well, and it turned out to be large UDP frames (from freeradius) being dropped by an intermediary (in this instance, openvpn.) I wonder if you're seeing the same issue. Unfortunately I don't have an 802.3x + wifi/EAP setup here to test with. I'll try to set something up soon, but no promises. What's the wpa_supplicant.conf look like on the client? Thanks! -adrian On 13 May 2015 at 13:49, Marcin Michta wrote: > When I set on Cisco AP my freeradius server all works fine. > All devices can connect to network. So I guess that is not freeradius's fault > My radius configs: > > radiusd.conf: > prefix = /usr/local > exec_prefix = ${prefix} > sysconfdir = ${prefix}/etc > localstatedir = /var > sbindir = ${exec_prefix}/sbin > logdir = /var/log > raddbdir = ${sysconfdir}/raddb > radacctdir = ${logdir}/radacct > name = radiusd > confdir = ${raddbdir} > modconfdir = ${confdir}/mods-config > certdir = ${confdir}/certs > cadir = ${confdir}/certs > run_dir = ${localstatedir}/run/${name} > db_dir = ${raddbdir} > libdir = /usr/local/lib/freeradius-3.0.8 > pidfile = ${run_dir}/${name}.pid > correct_escapes = true > max_request_time = 30 > cleanup_delay = 5 > max_requests = 1024 > hostname_lookups = no > log { > destination = files > colourise = yes > file = ${logdir}/radiusd > syslog_facility = daemon > stripped_names = no > auth = yes > msg_denied = "You are already logged in - access denied" > } > checkrad = ${sbindir}/checkrad > security { > user = freeradius > group = freeradius > allow_core_dumps = no > max_attributes = 200 > reject_delay = 1 > status_server = yes > allow_vulnerable_openssl = no > } > proxy_requests = yes > $INCLUDE proxy.conf > $INCLUDE clients.conf > thread pool { > start_servers = 5 > max_servers = 32 > min_spare_servers = 3 > max_spare_servers = 10 > max_requests_per_server = 0 > auto_limit_acct = no > } > modules { > $INCLUDE mods-enabled/ > } > instantiate { > } > policy { > $INCLUDE policy.d/ > } > $INCLUDE sites-enabled/ > ######################## > sites-enabled/default: > server default { > listen { > type = auth > ipaddr = * > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > ipaddr = * > port = 0 > type = acct > limit { > } > } > listen { > type = auth > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > ipv6addr = :: > port = 0 > type = acct > limit { > } > } > authorize { > filter_username > preprocess > digest > suffix > eap { > ok = return > } > expiration > logintime > } > authenticate { > digest > eap > } > preacct { > preprocess > acct_unique > suffix > files > } > accounting { > detail > unix > exec > attr_filter.accounting_response > } > session { > } > post-auth { > update { > &reply: += &session-state: > } > exec > remove_reply_message_if_eap > Post-Auth-Type REJECT { > attr_filter.access_reject > eap > remove_reply_message_if_eap > } > } > pre-proxy { > } > post-proxy { > eap > } > } > ######################## > sites-enabled/inner-tunnel: > server inner-tunnel { > listen { > ipaddr = 127.0.0.1 > port = 18120 > type = auth > } > authorize { > chap > mschap > suffix > update control { > &Proxy-To-Realm := LOCAL > } > eap { > ok = return > } > files > ldap > expiration > logintime > pap > } > authenticate { > Auth-Type PAP { > ldap > } > chap > Auth-Type MS-CHAP { > mschap > } > eap > } > session { > radutmp > } > post-auth { > reply_log > ldap > Post-Auth-Type REJECT { > attr_filter.access_reject > update outer.session-state { > &Module-Failure-Message := &request:Module-Failure-Message > } > } > } > pre-proxy { > } > post-proxy { > eap > } > ######################## > mods-enabled/eap: > eap { > default_eap_type = peap > timer_expire = 60 > ignore_unknown_eap_types = no > cisco_accounting_username_bug = no > max_sessions = ${max_requests} > gtc { > auth_type = PAP > } > tls-config tls-common { > private_key_password = whatever > private_key_file = ${certdir}/server.pem > certificate_file = ${certdir}/server.pem > ca_file = ${cadir}/ca.pem > dh_file = ${certdir}/dh > ca_path = ${cadir} > cipher_list = "DEFAULT" > ecdh_curve = "prime256v1" > cache { > enable = yes > max_entries = 255 > } > verify { > } > ocsp { > enable = no > override_cert_url = yes > url = "http://127.0.0.1/ocsp/" > } > } > tls { > tls = tls-common > } > ttls { > tls = tls-common > default_eap_type = mschapv2 > copy_request_to_tunnel = no > use_tunneled_reply = no > virtual_server = "inner-tunnel" > } > peap { > tls = tls-common > default_eap_type = mschapv2 > copy_request_to_tunnel = no > use_tunneled_reply = no > virtual_server = "inner-tunnel" > } > mschapv2 { > } > } > > > >> Hi! >> >> I haven't tested radius+wpa before; what's your radius config look like? >> >> (It'd be good to document how to do this in the wiki/handbook.) >> >> >> >> -a > > > On 13 May 2015 at 05:11, Marcin Michta wrote: >> Hi all, >> So I'm trying configure hostapd to work (peap + mschapv2). I tried >> connect by wpa_suplicant on FreeBSD, and Ubuntu with gui, but without success. >> Freeradius allow to connect, but connections are failed - every time get: >> >> hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: >> STA >> 00:24:d7:6f:eb:c4 reason 2 >> >> >> >> Where is mistake/bug? Or what is wrong? >> log: >> >> 1431101834.596845: Configuration file: hostapd.conf >> >> 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable >> is not used anymore >> >> 1431101834.626788: ctrl_interface_group=0 >> >> 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) >> >> 1431101834.627098: Completing interface initialization >> >> 1431101834.627101: Flushing old station entries >> >> 1431101834.627109: Deauthenticate all stations >> >> 1431101834.627113: bsd_set_privacy: enabled=0 >> >> 1431101834.627117: bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 >> seq_len=0 >> key_len=0 >> >> 1431101834.627120: bsd_del_key: key_idx=0 >> >> 1431101834.627124: bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 >> seq_len=0 >> key_len=0 >> >> 1431101834.627127: bsd_del_key: key_idx=1 >> >> 1431101834.627130: bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 >> seq_len=0 >> key_len=0 >> >> 1431101834.627133: bsd_del_key: key_idx=2 >> >> 1431101834.627136: bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 >> seq_len=0 >> key_len=0 >> >> 1431101834.627139: bsd_del_key: key_idx=3 >> >> 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 >> and ssid 'RADIUS' >> >> 1431101834.627155: wlan0: RADIUS Authentication server >> 10.146.20.137:1812 >> >> 1431101834.627257: RADIUS local address: 10.146.103.7:14137 >> >> 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813 >> >> 1431101834.627288: RADIUS local address: 10.146.103.7:14773 >> >> 1431101834.627294: bsd_set_ieee8021x: enabled=1 >> >> 1431101834.627296: bsd_configure_wpa: enable WPA= 0x1 >> >> 1431101834.627514: WPA: group state machine entering state GTK_INIT >> (VLAN-ID >> 0) >> >> 1431101834.627527: GMK - hexdump(len=32): [REMOVED] >> >> 1431101834.627530: GTK - hexdump(len=32): [REMOVED] >> >> 1431101834.627532: WPA: group state machine entering state SETKEYSDONE >> (VLAN-ID 0) >> >> 1431101834.627535: bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 >> seq_len=0 >> key_len=32 >> >> 1431101834.632173: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device >> not configured >> >> 1431101834.632194: bsd_set_privacy: enabled=1 >> >> 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24) >> >> 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting >> server >> >> 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101834.702842: wlan0: Setup of interface done. >> >> 1431101834.702886: Discard routing message to if#0 (not for us 8) >> >> >> >> 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server >> >> 1431101834.702914: wlan0: RADIUS Received RADIUS message >> >> 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.07 sec >> >> 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: >> associated >> >> 1431101867.876215: STA included WPA IE in (Re)AssocReq >> >> 1431101867.876220: New STA >> >> 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1 >> notification >> >> 1431101867.876243: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 >> set_tx=1 >> seq_len=0 key_len=0 >> >> 1431101867.876248: bsd_del_key: addr=00:24:d7:6f:eb:c4 >> >> 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start >> authentication >> >> 1431101867.876270: EAP: Server state machine created >> >> 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state IDLE >> >> 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering >> state FORCE_BOTH >> >> 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start >> authentication >> >> 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> INITIALIZE >> >> 1431101867.876307: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 >> set_tx=1 >> seq_len=0 key_len=0 >> >> 1431101867.876310: bsd_del_key: addr=00:24:d7:6f:eb:c4 >> >> 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state >> IDLE >> >> 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> AUTHENTICATION >> >> 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> AUTHENTICATION2 >> >> 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering >> state DISCONNECTED >> >> 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> unauthorizing port >> >> 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering >> state RESTART >> >> 1431101867.876354: EAP: EAP entering state INITIALIZE >> >> 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4 >> >> 1431101867.876360: EAP: EAP entering state SELECT_ACTION >> >> 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE >> >> 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD >> >> 1431101867.876366: EAP: getNextMethod: vendor 0 type 1 >> >> 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 >> >> 1431101867.876371: EAP: EAP entering state METHOD_REQUEST >> >> 1431101867.876374: EAP: building EAP-Request: Identifier 77 >> >> 1431101867.876377: EAP: EAP entering state SEND_REQUEST >> >> 1431101867.876379: EAP: EAP entering state IDLE >> >> 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering >> state CONNECTING >> >> 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering >> state AUTHENTICATING >> >> 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 77) >> >> 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.880294: IEEE 802.1X: version=1 type=0 length=10 >> >> 1431101867.880298: EAP: code=2 identifier=77 length=10 >> >> 1431101867.880300: (response) >> >> 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=77 len=10) from STA: EAP Response-Identity (1) >> >> 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.880326: EAP: EAP entering state RECEIVED >> >> 1431101867.880328: EAP: parseEapResp: rxResp=1 respId=77 respMethod=1 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK >> >> 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE >> >> 1431101867.880335: EAP-Identity: Peer identity - hexdump_ascii(len=5): >> >> 7a 65 6e 6f 6e zenon >> >> 1431101867.880341: EAP: EAP entering state SELECT_ACTION >> >> 1431101867.880343: EAP: getDecision: -> PASSTHROUGH >> >> 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH >> >> 1431101867.880347: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.880348: EAP: EAP entering state AAA_IDLE >> >> 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA >> identity 'zenon' >> >> 1431101867.880363: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.880379: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server >> >> 1431101867.882237: wlan0: RADIUS Received RADIUS message >> >> 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.882272: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=78 len=6) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.882305: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.882308: EAP: getId: id=78 >> >> 1431101867.882311: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.882313: EAP: EAP entering state IDLE2 >> >> 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 78) >> >> 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.883907: IEEE 802.1X: version=1 type=0 length=118 >> >> 1431101867.883923: EAP: code=2 identifier=78 length=118 >> >> 1431101867.883925: (response) >> >> 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=78 len=118) from STA: EAP Response-PEAP (25) >> >> 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.883952: EAP: EAP entering state RECEIVED2 >> >> 1431101867.883954: EAP: parseEapResp: rxResp=1 respId=78 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.883956: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.883959: EAP: EAP entering state AAA_IDLE >> >> 1431101867.883961: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.883969: Copied RADIUS State Attribute >> >> 1431101867.883975: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS >> server >> >> 1431101867.890413: wlan0: RADIUS Received RADIUS message >> >> 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.890450: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=79 len=1004) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.890483: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.890486: EAP: getId: id=79 >> >> 1431101867.890489: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.890491: EAP: EAP entering state IDLE2 >> >> 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 79) >> >> 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.892408: IEEE 802.1X: version=1 type=0 length=6 >> >> 1431101867.892423: EAP: code=2 identifier=79 length=6 >> >> 1431101867.892426: (response) >> >> 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=79 len=6) from STA: EAP Response-PEAP (25) >> >> 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.892454: EAP: EAP entering state RECEIVED2 >> >> 1431101867.892456: EAP: parseEapResp: rxResp=1 respId=79 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.892459: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.892461: EAP: EAP entering state AAA_IDLE >> >> 1431101867.892463: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.892471: Copied RADIUS State Attribute >> >> 1431101867.892477: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS >> server >> >> 1431101867.893185: wlan0: RADIUS Received RADIUS message >> >> 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.893222: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=80 len=1000) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.893245: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.893249: EAP: getId: id=80 >> >> 1431101867.893251: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.893253: EAP: EAP entering state IDLE2 >> >> 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 80) >> >> 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.894043: IEEE 802.1X: version=1 type=0 length=6 >> >> 1431101867.894047: EAP: code=2 identifier=80 length=6 >> >> 1431101867.894049: (response) >> >> 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=80 len=6) from STA: EAP Response-PEAP (25) >> >> 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.894078: EAP: EAP entering state RECEIVED2 >> >> 1431101867.894080: EAP: parseEapResp: rxResp=1 respId=80 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.894083: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.894085: EAP: EAP entering state AAA_IDLE >> >> 1431101867.894087: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.894095: Copied RADIUS State Attribute >> >> 1431101867.894101: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server >> >> 1431101867.894777: wlan0: RADIUS Received RADIUS message >> >> 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.894814: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=81 len=904) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.894847: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.894851: EAP: getId: id=81 >> >> 1431101867.894853: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.894855: EAP: EAP entering state IDLE2 >> >> 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 81) >> >> 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.902157: IEEE 802.1X: version=1 type=0 length=208 >> >> 1431101867.902173: EAP: code=2 identifier=81 length=208 >> >> 1431101867.902175: (response) >> >> 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=81 len=208) from STA: EAP Response-PEAP (25) >> >> 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.902203: EAP: EAP entering state RECEIVED2 >> >> 1431101867.902205: EAP: parseEapResp: rxResp=1 respId=81 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.902207: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.902209: EAP: EAP entering state AAA_IDLE >> >> 1431101867.902211: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.902219: Copied RADIUS State Attribute >> >> 1431101867.902225: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server >> >> 1431101867.905067: wlan0: RADIUS Received RADIUS message >> >> 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.905090: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=82 len=65) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.905114: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.905118: EAP: getId: id=82 >> >> 1431101867.905120: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.905122: EAP: EAP entering state IDLE2 >> >> 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 82) >> >> 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.905794: IEEE 802.1X: version=1 type=0 length=6 >> >> 1431101867.905797: EAP: code=2 identifier=82 length=6 >> >> 1431101867.905799: (response) >> >> 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=82 len=6) from STA: EAP Response-PEAP (25) >> >> 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.905826: EAP: EAP entering state RECEIVED2 >> >> 1431101867.905828: EAP: parseEapResp: rxResp=1 respId=82 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.905831: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.905833: EAP: EAP entering state AAA_IDLE >> >> 1431101867.905835: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.905843: Copied RADIUS State Attribute >> >> 1431101867.905848: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server >> >> 1431101867.906501: wlan0: RADIUS Received RADIUS message >> >> 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.906523: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=83 len=43) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.906541: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.906544: EAP: getId: id=83 >> >> 1431101867.906546: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.906548: EAP: EAP entering state IDLE2 >> >> 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 83) >> >> 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.907155: IEEE 802.1X: version=1 type=0 length=80 >> >> 1431101867.907172: EAP: code=2 identifier=83 length=80 >> >> 1431101867.907174: (response) >> >> 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=83 len=80) from STA: EAP Response-PEAP (25) >> >> 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.907200: EAP: EAP entering state RECEIVED2 >> >> 1431101867.907202: EAP: parseEapResp: rxResp=1 respId=83 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.907204: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.907206: EAP: EAP entering state AAA_IDLE >> >> 1431101867.907208: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.907216: Copied RADIUS State Attribute >> >> 1431101867.907221: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server >> >> 1431101867.908012: wlan0: RADIUS Received RADIUS message >> >> 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.908046: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=84 len=75) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.908077: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.908080: EAP: getId: id=84 >> >> 1431101867.908082: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.908085: EAP: EAP entering state IDLE2 >> >> 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 84) >> >> 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.909670: IEEE 802.1X: version=1 type=0 length=144 >> >> 1431101867.909674: EAP: code=2 identifier=84 length=144 >> >> 1431101867.909677: (response) >> >> 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=84 len=144) from STA: EAP Response-PEAP (25) >> >> 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.909716: EAP: EAP entering state RECEIVED2 >> >> 1431101867.909719: EAP: parseEapResp: rxResp=1 respId=84 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.909724: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.909728: EAP: EAP entering state AAA_IDLE >> >> 1431101867.909732: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.909743: Copied RADIUS State Attribute >> >> 1431101867.909753: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server >> >> 1431101867.920907: wlan0: RADIUS Received RADIUS message >> >> 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.01 sec >> >> 1431101867.920942: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=85 len=91) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.920972: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.920976: EAP: getId: id=85 >> >> 1431101867.920977: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.920979: EAP: EAP entering state IDLE2 >> >> 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 85) >> >> 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.922782: IEEE 802.1X: version=1 type=0 length=80 >> >> 1431101867.922798: EAP: code=2 identifier=85 length=80 >> >> 1431101867.922800: (response) >> >> 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=85 len=80) from STA: EAP Response-PEAP (25) >> >> 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.922827: EAP: EAP entering state RECEIVED2 >> >> 1431101867.922829: EAP: parseEapResp: rxResp=1 respId=85 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.922832: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.922834: EAP: EAP entering state AAA_IDLE >> >> 1431101867.922837: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.922844: Copied RADIUS State Attribute >> >> 1431101867.922850: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server >> >> 1431101867.962130: wlan0: RADIUS Received RADIUS message >> >> 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.03 sec >> >> 1431101867.962152: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=1 id=86 len=43) from RADIUS server: >> EAP-Request-PEAP (25) >> >> 1431101867.962171: EAP: EAP entering state AAA_RESPONSE >> >> 1431101867.962174: EAP: getId: id=86 >> >> 1431101867.962176: EAP: EAP entering state SEND_REQUEST2 >> >> 1431101867.962178: EAP: EAP entering state IDLE2 >> >> 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic >> back off; >> retransCount=0) >> >> 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state REQUEST >> >> 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 86) >> >> 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.970403: IEEE 802.1X: version=1 type=0 length=80 >> >> 1431101867.970419: EAP: code=2 identifier=86 length=80 >> >> 1431101867.970421: (response) >> >> 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received >> EAP packet (code=2 id=86 len=80) from STA: EAP Response-PEAP (25) >> >> 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state RESPONSE >> >> 1431101867.970450: EAP: EAP entering state RECEIVED2 >> >> 1431101867.970452: EAP: parseEapResp: rxResp=1 respId=86 respMethod=25 >> respVendor=0 respVendorMethod=0 >> >> 1431101867.970455: EAP: EAP entering state AAA_REQUEST >> >> 1431101867.970457: EAP: EAP entering state AAA_IDLE >> >> 1431101867.970459: Encapsulating EAP message into a RADIUS packet >> >> 1431101867.970467: Copied RADIUS State Attribute >> >> 1431101867.970473: wlan0: RADIUS Sending RADIUS message to >> authentication server >> >> 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3 >> seconds >> >> >> >> 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server >> >> 1431101867.971473: wlan0: RADIUS Received RADIUS message >> >> 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received >> RADIUS packet matched with a pending request, round trip time 0.00 sec >> >> 1431101867.971507: RADIUS packet matching with station >> 00:24:d7:6f:eb:c4 >> >> 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] >> >> 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] >> >> 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old >> identity 'zenon' updated with User-Name from Access-Accept 'zenon' >> >> 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: >> decapsulated EAP packet (code=3 id=86 len=4) from RADIUS server: EAP >> Success >> >> 1431101867.971558: EAP: EAP entering state SUCCESS2 >> >> 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state SUCCESS >> >> 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending >> EAP Packet (identifier 86) >> >> 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering >> state IDLE >> >> 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> INITPMK >> >> 1431101867.971600: WPA: PMK from EAPOL state machine (len=64) >> >> 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> PTKSTART >> >> 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg >> of 4-Way Handshake >> >> 1431101867.971618: WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 >> install=0 >> pairwise=8 kde_len=0 keyidx=0 encr=0) >> >> 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.986164: IEEE 802.1X: version=1 type=3 length=119 >> >> 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received >> EAPOL-Key frame (2/4 Pairwise) >> >> 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> PTKCALCNEGOTIATING >> >> 1431101867.986213: WPA: PTK derivation - A1=00:0e:2e:c4:2f:e7 >> A2=00:24:d7:6f:eb:c4 >> >> 1431101867.986220: WPA: PMK - hexdump(len=32): [REMOVED] >> >> 1431101867.986224: WPA: PTK - hexdump(len=64): [REMOVED] >> >> 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> PTKCALCNEGOTIATING2 >> >> 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> PTKINITNEGOTIATING >> >> 1431101867.986243: bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 >> >> 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg >> of 4-Way Handshake >> >> 1431101867.986272: WPA: Send EAPOL(version=1 secure=0 mic=1 ack=1 >> install=1 >> pairwise=8 kde_len=24 keyidx=0 encr=0) >> >> 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4 >> >> 1431101867.986779: IEEE 802.1X: version=1 type=3 length=95 >> >> 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received >> EAPOL-Key frame (4/4 Pairwise) >> >> 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state >> PTKINITDONE >> >> 1431101867.986818: bsd_set_key: alg=2 addr=0x8014908d0 key_idx=0 >> set_tx=1 >> seq_len=0 key_len=32 >> >> 1431101867.986868: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device >> not configured >> >> 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator >> requests >> disconnect: STA 00:24:d7:6f:eb:c4 reason 2 >> >> 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: >> deauthenticated due to local deauth request >> >> 1431101867.986919: EAP: Server state machine removed >> >> 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: >> disassociated >> >> 1431101867.986936: Disassociation notification for unknown STA >> 00:24:d7:6f:eb:c4 >> >> ^C1431101872.085020: Signal 2 received - terminating >> >> 1431101872.085031: Flushing old station entries >> >> 1431101872.085040: Deauthenticate all stations >> >> 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting >> server >> >> 1431101872.085149: bsd_set_privacy: enabled=0 >> >> 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0) >> >> 1431101872.085166: bsd_set_ieee8021x: enabled=0 >> >> >> >> hostapd.conf: >> >> interface=wlan0 >> >> driver=bsd >> >> logger_syslog=-1 >> >> logger_syslog_level=0 >> >> debug=2 >> >> dump_file=/tmp/hostapd.dump >> >> ctrl_interface=/var/run/hostapd >> >> ctrl_interface_group=0 >> >> ssid=RADIUS >> >> hw_mode=g >> >> own_ip_addr=127.0.0.1 >> >> ieee8021x=1 >> >> nas_identifier=app-k7 >> >> auth_server_addr=10.146.20.137 >> >> auth_server_port=1812 >> >> auth_server_shared_secret=azxswqtgbnhyt >> >> acct_server_addr=10.146.20.137 >> >> acct_server_port=1813 >> >> acct_server_shared_secret=azxswqtgbnhyt >> >> radius_retry_primary_interval=600 >> >> radius_acct_interim_interval=900 >> >> wpa=1 >> >> wpa_key_mgmt=WPA-EAP >> >> >> >> Best regards >> >> Marcin Michta >> >> _______________________________________________ >> freebsd-wireless@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-wireless >> To unsubscribe, send any mail to "freebsd-wireless-unsubscribe@freebsd.org" > From owner-freebsd-wireless@FreeBSD.ORG Sat May 16 06:04:06 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 84295FD0 for ; Sat, 16 May 2015 06:04:06 +0000 (UTC) Received: from mail-ig0-x236.google.com (mail-ig0-x236.google.com [IPv6:2607:f8b0:4001:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4D0361BEE for ; Sat, 16 May 2015 06:04:06 +0000 (UTC) Received: by igblo3 with SMTP id lo3so54233275igb.1 for ; Fri, 15 May 2015 23:04:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=bUo0wP1EIUrytJoDuIrbkPCYAIuSA1O6jSrmitOlyqM=; b=nltrH6Qj6jn25Cn8Uc1jKsfeopOR1vvxlKGrA5Mo7UWb2H5qsm53Prom6JPZwgVlLw BivV2toiFwDlnzBRb+kyJVH+AXxeLikGC5Dj4mQpTxbeIJiDVtRsUn8eG0VpcHlqRO6c DqdlScFLFO+wfSs6xjPkzQqoRFq7yNoXndo8oB3D2+7s4jUVTWszFVPSoAR94O9oOPxC TgjpdRfNbgakBLdkSXHgJtnfaRaAFxme3Jfw2gq1eGo8da1dIfqAJql7McNK8HtzPR7I J+yz8Yx1H8PBAhDy/CMTG2+DwnpeKHPXDXONWUqfBD/Mm9dCQGH4fmf3qzTmkDS72dNM Bsxg== MIME-Version: 1.0 X-Received: by 10.50.79.232 with SMTP id m8mr2628683igx.6.1431756245766; Fri, 15 May 2015 23:04:05 -0700 (PDT) Sender: adrian.chadd@gmail.com Received: by 10.36.38.133 with HTTP; Fri, 15 May 2015 23:04:05 -0700 (PDT) In-Reply-To: References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> <003c01d08dbe$6018b900$204a2b00$@gmail.com> Date: Fri, 15 May 2015 23:04:05 -0700 X-Google-Sender-Auth: Lc6LTzZVPRh5yDanKEQFEgRPcLg Message-ID: Subject: Re: hostapd + freeradius can't connect From: Adrian Chadd To: Marcin Michta Cc: "freebsd-wireless@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 May 2015 06:04:06 -0000 (and since it's been almost 15 years since I touched radius - what are you using to store user/pass in? How do I add a valid test user to the radius server?) Thanks! -a From owner-freebsd-wireless@FreeBSD.ORG Sat May 16 11:39:05 2015 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 317ABA4A; Sat, 16 May 2015 11:39:05 +0000 (UTC) Received: from mail-wg0-x22d.google.com (mail-wg0-x22d.google.com [IPv6:2a00:1450:400c:c00::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BBB311BAC; Sat, 16 May 2015 11:39:04 +0000 (UTC) Received: by wgbhc8 with SMTP id hc8so107470919wgb.3; Sat, 16 May 2015 04:39:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type:content-transfer-encoding :content-language:thread-index; bh=YGsbdt09lKM0HobfeH92L8DB5kSfxUEWsAdZfNZPvq4=; b=q4BiOXqwjI/38SitVMRml4BvYBX/7K1AmLtMEtWvEXQqyoDEb6moJsuMLUPwDmwJqX isGJXPcCtofHKlfG+kR01OIFf96ZVbqDPxDEkC+fCXt3R5AEAoEmYTK/GBtQfIJi/H3I xVN2+EwYi+fmZlYpLEwLokgHr6QPZYUXlZtaACZ6WkL+9dKkGxYTV7fOeWAIdkoJXMVt X5EVtffuYDn4Um7Wj2QZzvHNXaCONkaGXU0vLAaTwfqj06NH6p7ZrbBB2NPZbQt577sK KwjsD2B2bSSXBq1K3qIArlIooJcfryHrsL/b8rUEp2C3DuSvvZ4votHkghQUipwcrQGO Jf+A== X-Received: by 10.180.107.38 with SMTP id gz6mr5420781wib.63.1431776341935; Sat, 16 May 2015 04:39:01 -0700 (PDT) Received: from botmachine (muszelka.nat.student.pw.edu.pl. [194.29.137.5]) by mx.google.com with ESMTPSA id z12sm6928655wjw.39.2015.05.16.04.39.00 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sat, 16 May 2015 04:39:01 -0700 (PDT) From: "Marcin Michta" To: "'Adrian Chadd'" Cc: References: <01e701d08d75$fed02bd0$fc708370$@gmail.com> <003c01d08dbe$6018b900$204a2b00$@gmail.com> In-Reply-To: Subject: RE: hostapd + freeradius can't connect Date: Sat, 16 May 2015 13:39:05 +0200 Message-ID: <008b01d08fcc$eae23ce0$c0a6b6a0$@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 14.0 Content-language: pl Thread-index: AQLmW7Myy37hx44G94iEUPVz4fJerwJvc76jAXcwUTACKmvruZsiUDFA X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 May 2015 11:39:05 -0000 > Hi, >=20 > Has this ever worked? > > Someone had issues as well, and it turned out to be large UDP frames = (from freeradius) being dropped by an intermediary (in this instance, > openvpn.) >=20 > I wonder if you're seeing the same issue. > > Unfortunately I don't have an 802.3x + wifi/EAP setup here to test = with. I'll try to set something up soon, but no promises. > > What's the wpa_supplicant.conf look like on the client? > > Thanks! > > (and since it's been almost 15 years since I touched radius - what are = you using to store user/pass in? How do I add a valid test user to the = radius server?) No, because I trying to do it first time. Like I said - when I set Cisco = AP to use the same freeradius server, everything works fine. I'll be grateful if you try. My wpa.conf: ctrl_interface=3D/var/run/wpa_supplicant ctrl_interface_group=3Dwheel network=3D{ ssid=3D"RADIUS" scan_ssid=3D1 key_mgmt=3DWPA-EAP eap=3DPEAP identity=3D"ztest" anonymous_identity=3D" anonymous" password=3D"password" phase2=3D"auth=3DMSCHAPV2" } I have ldap server to store users accounts. Simplest way to add test user is add it to "users" file - symbolic link = of "mods-config/files/authorize": https://github.com/FreeRADIUS/freeradius-server/blob/v3.0.x/raddb/mods-co= nfig/files/authorize - Martin