On Sat, Mar 09, 2019 at 04:56:08PM -0500, newsgroup@xxxxxxxxxxxxxxxxxxxx wrote: > I have isolated the problem down to one setting in the hostapd.conf file: > ieee80211w=1 > > When I comment out the line ieee80211w, thereby disabling this > functionality, I can get the wifi devices to connect. Is the protected > management frames capability interfering with the 4 way handshake? > *Syslog:* > > Mar 8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 IEEE 802.11: > associated > Mar 8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: sending > 1/4 msg of 4-Way Handshake > Mar 8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: received > EAPOL-Key frame (2/4 Pairwise) > Mar 8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: sending > 3/4 msg of 4-Way Handshake > Mar 8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 IEEE 802.11: > disassociated That seems to imply that the station device rejects this EAPOL-Key msg 3/4 for some reason. Which station did you test here? Would it be possible to get debug log from it? As far as the AP side is concerned, would you be able to send the hostapd debug log (-dd on the command line) instead of the minimal syslog entries? -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap