Date: Fri, 26 Sep 2008 10:46:30 -0700 From: Sam Leffler <sam@freebsd.org> To: Wayne Hendricks <waynehendricks@gmail.com> Cc: freebsd-net@freebsd.org Subject: Re: Hostapd network issue Message-ID: <48DD1FF6.6010608@freebsd.org> In-Reply-To: <3b965dec0809252258t15722eecn29494431bced3061@mail.gmail.com> References: <3b965dec0809252258t15722eecn29494431bced3061@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Wayne Hendricks wrote: > I have been trying to make hostapd work with wifi card in my gateway box. > WPA stays working for only a short time before hostapd locks up and needs to > be restarted. I believe the hosapd config is fine, shows no errors. > Running 7.0-RELEASE-p4 amd64 with mini-pci Atheros 5212 chipset. I have > included the hostapd debug output below. What is this ioctl[SIOCS80211] > weirdness? > > Configuration file: /etc/hostapd.conf > ctrl_interface_group=0 (from group name 'wheel') > bsd_set_iface_flags: dev_up=0 > BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits) > ath0: IEEE 802.11 Fetching hardware channel/rate support not supported. > Flushing old station entries > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3 > Deauthenticate all stations > bsd_set_privacy: enabled=0 > Mode: IEEE 802.11g Channel: 11 Frequency: 0 MHz > bsd_del_key: addr=00:00:00:00:00:00 key_idx=0 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=1 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=2 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=3 > bsd_get_ssid: ssid="bsdap" > Using interface ath0 with hwaddr 00:90:96:6b:0f:c6 and ssid 'bsdap' > SSID - hexdump_ascii(len=9): > 52 4e 73 65 63 75 72 65 47 bsdap > PSK (ASCII passphrase) - hexdump_ascii(len=12): > 65 74 68 65 72 61 70 65 31 31 31 36 mypassphrase > PSK (from passphrase) - hexdump(len=32): 17 ae 54 6a a7 c4 fc ce e2 d4 2e 07 > 0d 08 09 56 41 d3 a4 6a d2 18 26 d1 36 22 56 fe a0 > af 26 43 > bsd_set_ieee8021x: enabled=1 > bsd_configure_wpa: group key cipher=TKIP (1) > bsd_configure_wpa: pairwise key ciphers=0xa > bsd_configure_wpa: key management algorithms=0x2 > bsd_configure_wpa: rsn capabilities=0x0 > bsd_configure_wpa: enable WPA= 0x1 > bsd_set_iface_flags: dev_up=1 > WPA: group state machine entering state GTK_INIT (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > bsd_set_privacy: enabled=1 > ath0: Setup of interface done. > ath0: STA 00:1e:c2:bf:74:60 IEEE 802.11: associated > New STA > ath0: STA 00:1e:c2:bf:74:60 WPA: event 1 notification > bsd_del_key: addr=00:1e:c2:bf:74:60 key_idx=0 > ath0: STA 00:1e:c2:bf:74:60 WPA: start authentication > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:1e:c2:bf:74:60 key_idx=0 > bsd_set_sta_authorized: addr=00:1e:c2:bf:74:60 authorized=0 > ath0: STA 00:1e:c2:bf:74:60 IEEE 802.1X: unauthorizing port > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state AUTHENTICATION > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state INITPSK > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state PTKSTART > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 > encr=0) > TX EAPOL - hexdump(len=113): 00 1e c2 bf 74 60 00 90 96 6b 0f c6 88 8e 02 03 > 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 9f 2b fa 4e 6e 00 d2 a0 fd > 9e f0 c1 fd be 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 > IEEE 802.1X: 123 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=119 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state PTKCALCNEGOTIATING > PMK - hexdump(len=32): [REMOVED] > PTK - hexdump(len=64): [REMOVED] > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=28 > keyidx=0 encr=0) > TX EAPOL - hexdump(len=141): 00 1e c2 bf 74 60 00 00 96 6b 0f c6 88 8e 02 03 > 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd be 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf 86 6a 87 74 59 > 72 dc 2f 01 f9 8b b4 20 51 1f 00 1c dd 1a 00 50 f2 0 > 1 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 > IEEE 802.1X: 99 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=CCMP addr=00:1e:c2:bf:74:60 key_idx=0 > bsd_set_sta_authorized: addr=00:1e:c2:bf:74:60 authorized=1 > ath0: STA 00:1e:c2:bf:74:60 IEEE 802.1X: authorizing port > bsd_sta_clear_stats: addr=00:1e:c2:bf:74:60 > ath0: STA 00:1e:c2:bf:74:60 WPA: pairwise key handshake completed (WPA) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 3b 0f c6 88 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bd 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 d8 ba b9 34 15 > fd ae 04 7c 59 05 d4 08 70 4c 00 28 36 25 48 ae 3c 8 > d ad 9b 27 20 45 68 36 d7 57 ba 57 49 0f 7d e9 2b 1d 6b b5 21 c1 a4 e5 77 fc > 57 fd 57 c1 90 be a2 50 a4 > ath0: STA 00:1e:c2:bf:74:60 WPA: EAPOL-Key timeout > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 46 6b 0f c6 88 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 04 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bd 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 3a d0 8a fd 74 > 2d 9a cf ba eb 75 56 26 71 63 00 28 36 25 48 ae 3c 8 > d ad 9b 27 20 45 68 36 d7 57 ba 57 49 0f 7d e9 2b 1d 6b b5 21 c1 a4 e5 77 fc > 37 fd 57 c1 00 be a2 50 a4 > IEEE 802.1X: 99 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:1e:c2:bf:74:60 WPA: group key handshake completed (WPA) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.11: associated > New STA > ath0: STA 00:21:e9:6e:98:d0 WPA: event 1 notification > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > ath0: STA 00:21:e9:6e:98:d0 WPA: start authentication > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=0 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: unauthorizing port > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state IDLE > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state AUTHENTICATION > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITPSK > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKSTART > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 > encr=0) > TX EAPOL - hexdump(len=113): 00 21 e9 6e 68 d0 00 90 96 6b 0f c6 58 8e 02 03 > 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bf 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 > IEEE 802.1X: 123 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=119 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKCALCNEGOTIATING > PMK - hexdump(len=32): [REMOVED] > PTK - hexdump(len=64): [REMOVED] > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=28 > keyidx=0 encr=0) > TX EAPOL - hexdump(len=141): 00 21 e9 6e 98 d0 00 90 96 6b 0f c5 88 8e 02 03 > 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bf 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 55 c7 5a e3 2d > 7a 54 f2 6d f0 7b 9f cc ca b3 00 1c dd 1a 00 50 f2 0 > 1 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 > IEEE 802.1X: 99 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=CCMP addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=1 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: authorizing port > bsd_sta_clear_stats: addr=00:21:e9:6e:98:d0 > ath0: STA 00:21:e9:6e:98:d0 WPA: pairwise key handshake completed (WPA) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state REKEYNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 21 e9 6e 98 d0 00 90 96 6b 0f c6 68 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bd 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 76 69 1b 31 76 > d5 81 87 d1 fb f5 ac 85 f1 d7 00 28 f6 9f 0d ca 6e 4 > b 9c 54 56 98 09 75 79 a1 35 b0 90 a2 77 33 48 3e 5c 5d 03 cc 8e 6b 1c 10 cd > af a5 66 58 5f d2 fb 3d 48 > ath0: STA 00:21:e9:6e:98:d0 WPA: EAPOL-Key timeout > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state REKEYNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 21 e9 6e 98 d0 00 90 96 6b 0f c6 88 8e 02 03 > 00 47 fe 03 92 00 20 00 00 00 00 00 00 00 04 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd bd 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 85 4f 9e d0 f7 > 89 9c a5 aa da f7 94 32 96 1b 00 28 f6 9f 0d ca 6e 4 > b 9c 54 56 98 09 75 79 a1 35 b0 90 a2 77 33 48 3e 5c 5d 03 cc 3e 6b 1c 10 cd > af a5 96 58 5f d2 fb 3d 48 > IEEE 802.1X: 99 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:21:e9:6e:98:d0 WPA: group key handshake completed (WPA) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state IDLE > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.11: deassociated > ath0: STA 00:21:e9:6e:98:d0 WPA: event 2 notification > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state DISCONNECTED > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=0 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: unauthorizing port > Could not set station 00:21:e9:6e:98:d0 flags for kernel driver (errno=22). > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=2 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 3b 0f c6 88 8e 02 03 > 00 87 fe 03 a2 00 20 00 00 00 00 00 00 00 05 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 21 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c0 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 4a 9b 73 a4 2a > 85 58 43 ea 4b 26 39 52 da 0b 00 28 97 d8 b5 38 1a 9 > 9 dc 43 65 b5 bd ac 8c 7e 35 2c 12 7c 55 d4 79 0a 54 68 4c 5c 59 36 5b f6 69 > 31 ad 4a 90 ff 81 be c6 4f > IEEE 802.1X: 99 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:1e:c2:bf:74:60 WPA: group key handshake completed (WPA) > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=2 > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 76 6b 0f c6 88 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 06 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c1 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 16 82 a2 6d > 95 4d 6b 3c ce 5b 05 47 76 55 00 28 7a a2 9a 85 ef a > f a9 be 86 56 94 45 a3 ab b8 a5 b3 d5 44 3b a4 d3 9f 7b 3d ea 97 e6 c3 ed 9e > 42 da 4b 91 2d fd 7f 1e 8d > IEEE 802.1X: 99 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:1e:c2:bf:74:60 WPA: group key handshake completed (WPA) > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.11: associated > New STA > ath0: STA 00:21:e9:6e:98:d0 WPA: event 1 notification > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > ath0: STA 00:21:e9:6e:98:d0 WPA: start authentication > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=0 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: unauthorizing port > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state IDLE > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state AUTHENTICATION > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITPSK > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKSTART > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 > encr=0) > TX EAPOL - hexdump(len=113): 00 21 e9 6e 98 d0 00 30 96 6b 0f c6 88 8e 02 03 > 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 3b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c2 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 > IEEE 802.1X: 123 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=119 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKCALCNEGOTIATING > PMK - hexdump(len=32): [REMOVED] > PTK - hexdump(len=64): [REMOVED] > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=28 > keyidx=0 encr=0) > TX EAPOL - hexdump(len=141): 00 21 e9 6e 78 d0 00 90 96 6b 0f c6 88 8e 02 03 > 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c2 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 95 a0 4e 64 c6 > 43 6c e9 8c 02 ef 75 27 f9 e5 00 1c dd 1a 00 50 f2 0 > 1 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 40 f2 02 > IEEE 802.1X: 99 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=CCMP addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=1 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: authorizing port > bsd_sta_clear_stats: addr=00:21:e9:6e:98:d0 > ath0: STA 00:21:e9:6e:98:d0 WPA: pairwise key handshake completed (WPA) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state REKEYNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > ath0: STA 00:21:e9:6e:98:d0 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 21 e9 6e 08 d0 00 90 96 6b 0f c6 88 5e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c1 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 dc 19 fc 24 e2 > 56 37 16 14 5a 0b 00 25 c2 47 00 28 78 92 48 df 3b e > f 3c d7 25 82 34 d2 32 7d 1f cc 12 d1 4e c0 89 dc 29 80 88 45 95 27 13 49 b0 > da ef f9 c9 fd f0 52 a9 b5 > IEEE 802.1X: 99 bytes from 00:21:e9:6e:98:d0 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:21:e9:6e:98:d0 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:21:e9:6e:98:d0 WPA: group key handshake completed (WPA) > WPA: 00:21:e9:6e:98:d0 WPA_PTK_GROUP entering state IDLE > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.11: deassociated > ath0: STA 00:21:e9:6e:98:d0 WPA: event 2 notification > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state DISCONNECTED > WPA: 00:21:e9:6e:98:d0 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:21:e9:6e:98:d0 key_idx=0 > bsd_set_sta_authorized: addr=00:21:e9:6e:98:d0 authorized=0 > ath0: STA 00:21:e9:6e:98:d0 IEEE 802.1X: unauthorizing port > Could not set station 00:21:e9:6e:98:d0 flags for kernel driver (errno=22). > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=2 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 6b 0f c6 78 8e 02 03 > 00 87 fe 03 a2 00 20 00 00 00 00 00 00 00 07 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c3 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 be eb 48 36 > b5 ad 1f 17 bc 64 ca 6b c8 ca 00 28 8a 2b 24 9f ee 4 > 4 0f e7 4a ad a8 55 62 cd b9 d0 69 cc af e4 94 01 aa d8 e9 cf cc a7 ed 6e e0 > 90 b5 3c 35 1a ae 2e 32 d7 > IEEE 802.1X: 99 bytes from 00:1e:c2:bf:74:60 > IEEE 802.1X: version=1 type=3 length=95 > ath0: STA 00:1e:c2:bf:74:60 WPA: received EAPOL-Key frame (2/2 Group) > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYESTABLISHED > ath0: STA 00:1e:c2:bf:74:60 WPA: group key handshake completed (WPA) > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=2 > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > Checking STA 00:1e:c2:bf:74:60 inactivity: > Station has been active > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 40 00 90 96 6b 0f c6 88 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 08 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c4 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 50 c3 fa 32 83 > f8 05 c4 c3 78 e5 cf 48 25 79 00 28 10 4a c3 91 12 2 > f 91 69 e3 84 e2 61 25 ce e9 b8 38 53 7f 8d f8 53 ec ac 90 43 41 5c b9 ec 97 > 54 a3 60 a9 d7 73 20 6d f1 > ath0: STA 00:1e:c2:bf:74:60 WPA: EAPOL-Key timeout > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 6b 0f c6 88 8e 02 03 > 00 87 fe 03 92 00 10 00 00 00 00 00 00 00 09 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c4 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 b1 39 72 aa d0 > 25 02 a4 5b 01 55 a9 c6 5b cf 00 28 10 4a c3 91 12 2 > f 91 69 e3 84 e2 61 25 ce e9 b8 38 53 7f 8d f8 53 ec ac 90 43 41 5c b9 ec 57 > 54 a3 60 a9 d7 73 20 6d f1 > ath0: STA 00:1e:c2:bf:74:60 WPA: EAPOL-Key timeout > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 6b 0f c6 98 8e 02 03 > 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 0a 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c4 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 79 9c 20 34 dd > 26 28 c7 c2 6f a3 1c a4 03 44 00 28 10 4a c3 91 12 2 > f 91 69 e3 84 e2 61 25 ce e9 b8 38 53 7f 8d f8 53 ec ac 90 43 41 5c b9 ec 57 > 54 a3 60 a9 d7 73 20 6d f1 > ath0: STA 00:1e:c2:bf:74:60 WPA: EAPOL-Key timeout > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state REKEYNEGOTIATING > ath0: STA 00:1e:c2:bf:74:60 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=32 > keyidx=1 encr=1) > Plaintext EAPOL-Key Key Data - hexdump(len=40): [REMOVED] > TX EAPOL - hexdump(len=153): 00 1e c2 bf 74 60 00 90 96 6b 0f c6 88 8e 02 03 > 00 87 fe 03 02 00 20 00 00 00 00 00 00 00 0b 1c c4 > 37 85 45 86 e9 2a 99 5c 65 8c 8b d0 b8 63 31 04 1f 2b fa 4e 8e 00 d2 a0 fd > 9e f0 c1 fd c4 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 86 ea b0 4b 7f > c5 2b 2c 9c b2 94 67 d4 e6 14 00 28 10 4a c3 91 12 2 > f 91 69 e3 84 e2 61 25 ce e9 b8 38 53 7f 8d f8 53 ec ac 90 43 41 5c b9 ec 57 > 54 a3 60 a8 d7 73 20 6d f1 > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state KEYERROR > The sta didn't complete the group key handshake. I don't see a timeout msg so not sure exactly why. > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state DISCONNECT > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA > 00:1e:c2:bf:74:60 reason 2 > bsd_sta_deauth: addr=00:1e:c2:bf:74:60 reason_code=2 > hostapd dropped the station. > WPA: 00:1e:c2:bf:74:60 WPA_PTK_GROUP entering state IDLE > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state DISCONNECTED > WPA: 00:1e:c2:bf:74:60 WPA_PTK entering state INITIALIZE > bsd_del_key: addr=00:1e:c2:bf:74:60 key_idx=0 > bsd_set_sta_authorized: addr=00:1e:c2:bf:74:60 authorized=0 > ath0: STA 00:1e:c2:bf:74:60 IEEE 802.1X: unauthorizing port > Could not set station 00:1e:c2:bf:74:60 flags for kernel driver (errno=22). > ath0: STA 00:1e:c2:bf:74:60 IEEE 802.11: deauthenticated due to local deauth > request > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=2 > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=2 > ath0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > GMK - hexdump(len=32): [REMOVED] > GTK - hexdump(len=32): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1 > ioctl[SIOCS80211]: No such file or directory > ioctl[SIOCS80211]: No such file or directory > ioctl[SIOCS80211]: Invalid argument > ioctl[SIOCS80211]: No such file or directory > ioctl[SIOCS80211]: No such file or directory > ioctl[SIOCS80211]: Invalid argument > ioctl[SIOCS80211]: No such file or directory > ioctl[SIOCS80211]: Invalid argument > hostapd was notified by net80211 the station went away so it tried to purge any keys but state was already gone. This is normal and the msgs can be ignored. > Signal 2 received - terminating > You hit ^C and stopped hostapd. > Flushing old station entries > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3 > Deauthenticate all stations > bsd_set_privacy: enabled=0 > bsd_set_ieee8021x: enabled=0 > bsd_set_iface_flags: dev_up=0 > _______________________________________________ > There is nothing unusual in the log. Your problems are likely lower; e.g. loss of communication between the ap and sta. Sam
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48DD1FF6.6010608>