From owner-freebsd-current@FreeBSD.ORG Wed Apr 30 02:25:38 2008 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BA5D6106564A for ; Wed, 30 Apr 2008 02:25:38 +0000 (UTC) (envelope-from dcornejo@gmail.com) Received: from fk-out-0910.google.com (fk-out-0910.google.com [209.85.128.190]) by mx1.freebsd.org (Postfix) with ESMTP id 3299D8FC1A for ; Wed, 30 Apr 2008 02:25:37 +0000 (UTC) (envelope-from dcornejo@gmail.com) Received: by fk-out-0910.google.com with SMTP id k31so134130fkk.11 for ; Tue, 29 Apr 2008 19:25:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; bh=iyJrs1waBzdGr5qDfzAemKNNvSApU5n6fKqlhOr2Wl0=; b=sdZhLFaDnqpAs9ZVMvFImg0NSQmeT1IZSyoi/bsVO9505Ed15pGNMW0etLK74lCKJPZbrxAaIAWgHFY5IEnD3TLPQfLC3bB4gNv0ZS3p+JkGfx/wNmNFlgPai9DYMHShYJmG1a8YLz5v8DZMFlT2EXSUAFmE0aSFwKt0N4GqQNw= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=xGlC1yzBAkvwVbUMGeLBKgjZuzDpWiLp13UcQDcJLeIsFO5HYimFgFl/TDT12WsG9lhCD5kxWh/CY/agCfIRrkSgg28R/fc2ktMhJBugVJFuoo/Je2rg+Ww7h6ky6ijgq0D8Vjekw5o6gVxt69khdixcvW6/k7inwfBcv9sd+ug= Received: by 10.78.184.2 with SMTP id h2mr196631huf.14.1209520829618; Tue, 29 Apr 2008 19:00:29 -0700 (PDT) Received: by 10.78.196.20 with HTTP; Tue, 29 Apr 2008 19:00:29 -0700 (PDT) Message-ID: <6b8e8f4f0804291900v521cde5cw1ad4eaba70244e9c@mail.gmail.com> Date: Tue, 29 Apr 2008 16:00:29 -1000 From: "David Cornejo" To: freebsd-current@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline Subject: problems making an access point w/current X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2008 02:25:38 -0000 Hi, I am trying to build an access point out of a Soekris 4801 - I have built two images from the CURRENT source, one on March 28, 2008 (pre-VAPS) and one from today April 29th, 2008. The 3/28 one works beautifully, the 4/29 one has authorization problems. I converted the rc.conf to the new wlan_* things. Is there something wrong with my configurations? thanks, dave c good old config, kernel & world built march 28th sources. === rc.conf === hostname="ap1.dogwood.com" hostapd_enable="YES" ifconfig_sis0="up" ifconfig_sis1="up" ifconfig_sis2="up" ifconfig_ath0="mode 11a mediaopt hostap dturbo" cloned_interfaces="bridge0" ifconfig_bridge0="ether 92:74:fd:88:12:f3 addm sis0 addm sis1 addm sis2 addm ath0 stp sis0 stp sis1 stp sis2 stp ath0 DHCP" ntpdate_enable="YES" ntpdate_flags="pool.ntp.org" sendmail_enable="NONE" sshd_enable="YES" syslogd_flags="-ss" rwhod_enable="YES" smartd_enable="YES" ntpd_enable="YES" === hostapd.conf interface=ath0 driver=bsd logger_syslog=-1 logger_syslog_level=0 logger_stdout=-1 logger_stdout_level=0 debug=4 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=wheel ssid=hoana-a wpa=1 wpa_passphrase=v1g1lance wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP === log output Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.11: associated Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: event 1 notification Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: start authentication Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: unauthorizing port Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending 1/4 msg of 4-Way Handshake Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/4 Pairwise) Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending 3/4 msg of 4-Way Handshake Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (4/4 Pairwise) Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d IEEE 802.1X: authorizing port Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: pairwise key handshake completed (WPA) Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: sending 1/2 msg of Group Key Handshake Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/2 Group) Apr 29 15:22:37 ap1 hostapd: ath0: STA 00:13:e8:30:a7:6d WPA: group key handshake completed (WPA) ========== bad new config, kernel & world built from april 29 sources === rc.conf === hostname="ap2.dogwood.com" ifconfig_sis0="up" ifconfig_sis1="up" ifconfig_sis2="up" ifconfig_wlan0="mode 11a" wlans_ath0="wlan0" create_args_wlan0="wlanmode ap" cloned_interfaces="bridge0" ifconfig_bridge0="ether 00:40:96:01:01:01 addm sis0 addm sis1 addm sis2 addm wlan0 stp sis0 stp sis1 stp sis2 stp wlan0 DHCP" hostapd_enable="YES" ntpdate_enable="YES" ntpdate_flags="pool.ntp.org" ntpd_enable="YES" sendmail_enable="NONE" sshd_enable="YES" syslogd_flags="-ss" rwhod_enable="YES" # HARDWARE SPECIFIC smartd_enable="YES" dumpdev="NO" === hostapd.conf === interface=wlan0 driver=bsd logger_syslog=-1 logger_syslog_level=0 logger_stdout=-1 logger_stdout_level=0 debug=4 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=wheel ssid=hmiln wpa=1 wpa_passphrase=v1g1lance wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP === log output Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: associated Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 1 notification Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: start authentication Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: unauthorizing port Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 1/4 msg of 4-Way Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/4 Pairwise) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 3/4 msg of 4-Way Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (4/4 Pairwise) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: authorizing port Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: pairwise key handshake completed (WPA) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 1/2 msg of Group Key Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/2 Group) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group key handshake completed (WPA) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (Request) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key Error Request (STA detected Michael MIC failure) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 1/4 msg of 4-Way Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/4 Pairwise) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 3/4 msg of 4-Way Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (4/4 Pairwise) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: authorizing port Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: pairwise key handshake completed (WPA) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 1/2 msg of Group Key Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (2/2 Group) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: group key handshake completed (WPA) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key frame (Request) Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: received EAPOL-Key Error Request (STA detected Michael MIC failure) Apr 29 15:20:56 ap2 hostapd: wlan0: IEEE 802.11 TKIP countermeasures initiated Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: sending 1/4 msg of 4-Way Handshake Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.11: deassociated Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d WPA: event 2 notification Apr 29 15:20:56 ap2 hostapd: wlan0: STA 00:13:e8:30:a7:6d IEEE 802.1X: unauthorizing port