From owner-freebsd-mips@freebsd.org Thu Oct 8 20:34:06 2015 Return-Path: Delivered-To: freebsd-mips@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C9B179D18D5 for ; Thu, 8 Oct 2015 20:34:06 +0000 (UTC) (envelope-from nalimegavas@zoho.com) Received: from sender153-mail.zoho.com (sender1.zohomail.com [74.201.84.158]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B5D90627 for ; Thu, 8 Oct 2015 20:34:06 +0000 (UTC) (envelope-from nalimegavas@zoho.com) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=zapps768; d=zoho.com; h=date:from:to:message-id:subject:mime-version:content-type:user-agent; b=Li7dIKtay4s+ORy/j+KtsAugnO5H6xIX4ALIROWSulpy9uaEXHPamuMhGME8/JZiUMBdOJHFtTFU d9z3yuerQZwykdSaeywcgNXeQPFkMSPkB+cB+TiT3A07arsEnPJQ Received: from mail.zoho.com by mx.zohomail.com with SMTP id 1444335531000703.0901893709076; Thu, 8 Oct 2015 13:18:51 -0700 (PDT) Received: from [92.231.38.250] by mail.zoho.com with HTTP;Thu, 8 Oct 2015 13:18:50 -0700 (PDT) Date: Thu, 08 Oct 2015 13:18:50 -0700 From: leschmidtson To: Message-ID: <150491b33c5.bdb31e1d17499.4552977509659408892@zoho.com> Subject: Unable to connect to AP on TL-WDR3600 MIME-Version: 1.0 X-Priority: Medium User-Agent: Zoho Mail X-Mailer: Zoho Mail Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-mips@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting FreeBSD to MIPS List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 20:34:07 -0000 Dear all, as per Wiki page the TL-WDR3600 should work fine under FreeBSD. So I gave it a try. Unfortunately there are some issues with my configuration. The painful one is with wireless: clients are unable to connect to AP on router. Tested with FreeBSD 10.2 and Windows7 clients. Currently r288948M is installed on router. The same problem was observed in few previous versions as well. In test hostapd was running on wlan0 only. (Problem persists with hostapd active on both wlan interfaces as well). ifconfig output: wlan0: flags=8902<BROADCAST,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500 ether e8:de:27:65:bc:8c media: IEEE 802.11 Wireless Ethernet autoselect <hostap> (autoselect <hostap>) status: no carrier ssid GGWL030 channel 4 (2427 MHz 11g ht/40+) country US ecm authmode AUTO privacy OFF deftxkey 2 txpower 27 scanvalid 60 protmode CTS ampdulimit 64k ampdudensity 8 shortgi wme burst dtimperiod 1 -dfs groups: wlan wlan1: flags=8902<BROADCAST,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500 ether e8:de:27:65:bc:8b media: IEEE 802.11 Wireless Ethernet autoselect <hostap> (autoselect <hostap>) status: no carrier ssid GGWL031 channel 52 (5260 MHz 11a ht/40+) country US ecm authmode WPA1+WPA2/802.11i privacy OFF deftxkey 2 TKIP 2:128-bit TKIP 3:128-bit txpower 23 mcastrate 6 mgmtrate 6 scanvalid 60 ampdulimit 64k ampdudensity 8 shortgi wme burst dtimperiod 1 -dfs groups: wlan hostapd.conf interface=wlan0 driver=bsd ssid=GGWL030 wpa=3 wpa_key_mgmt=WPA-PSK wpa_passphrase=abcd1234 wpa_pairwise=CCMP TKIP ctrl_interface=/var/svc/hostapd0/ctl Here is the relevant part of hostapd log 1444248053.841730: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state AUTHENTICATION2 1444248053.841776: Get randomness: len=32 entropy=1 1444248053.843475: WPA: Assign ANonce - hexdump(len=32): 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 1444248053.843647: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state INITPSK 1444248053.843694: Searching a PSK for a4:4e:31:b9:34:08 prev_psk=0x0 1444248053.843744: Searching a PSK for a4:4e:31:b9:34:08 prev_psk=0x0 1444248053.843790: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART 1444248053.843905: 1444248053.843919: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake 1444248053.843988: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) 1444248053.844063: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 1444248053.844150: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c 9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1444248053.877706: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) 1444248053.877832: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for a4:4e:31:b9:34:08 (300 seconds - ap_max_inactivity) 1444248054.899958: 1444248054.899977: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout 1444248054.900086: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART 1444248054.900228: 1444248054.900241: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake 1444248054.900315: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) 1444248054.900392: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 1444248054.900464: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c 9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1444248054.901103: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2) 1444248055.923954: 1444248055.923973: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout 1444248055.924083: WPA: a4:4e:31:b9:34:08 WPA_PTK entering state PTKSTART 1444248055.924223: 1444248055.924237: wlan0: STA a4:4e:31:b9:34:08 WPA: sending 1/4 msg of 4-Way Handshake 1444248055.924310: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) 1444248055.924401: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 1444248055.924474: TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 23 e5 60 0c 59 ae 1f 0b 3c b7 c7 a0 14 c 9 22 39 5a 5b 0b a5 5c 64 3d a1 ee eb b5 24 0f a8 69 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1444248055.925098: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3) 1444248056.947963: 1444248056.947982: wlan0: STA a4:4e:31:b9:34:08 WPA: EAPOL-Key timeout The last two lines imho indicate the problem. As per wpa_supplicant log the client is sending the EAPOL response (EAPOL: txStart line in the log), however it is interrupted by next EAPOL Key message from router (if I correctly read this log): wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from e8:de:27:65:bc:8c (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 0d 96 79 d6 82 7b 6d 06 bc 93 12 b5 64 7b 46 1b 36 92 7d 8e 90 82 85 ed c7 63 9f cf 52 b5 f8 8d WPA: PTK derivation - A1=a4:4e:31:b9:34:08 A2=e8:de:27:65:bc:8c WPA: Nonce1 - hexdump(len=32): 0d 96 79 d6 82 7b 6d 06 bc 93 12 b5 64 7b 46 1b 36 92 7d 8e 90 82 85 ed c7 63 9f cf 52 b5 f8 8d WPA: Nonce2 - hexdump(len=32): ba 52 4e b6 7a ee 46 3b 4e 19 8f b9 47 b8 1c a6 d0 aa 94 69 a6 ef 36 94 a1 3b ed c7 b5 d4 70 1b WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 89 1f b0 dc b0 aa dd c8 9d 13 1a 67 15 e2 fd a4 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) wlan0: RX EAPOL from e8:de:27:65:bc:8c The client is able problem free to connect to another AP. Appreciate your advice on what/where to look next? Thanks. Georg