hostap works with 2:2.4-1+deb9u2 but not 2:2.6-21~bpo9~rpt1

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Trace using -dd.  Note that this is the build-in Wifi adapter that comes with the Raspberry Pi running Raspian Stretch with all current stable maintenance applied.

random: Trying to read entropy from /dev/random
Configuration file: /etc/hostapd/hostapd5.conf
ctrl_interface_group=0
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=0 use_monitor=1
nl80211: Create interface iftype 6 (MONITOR)
Failed to create interface mon.wlan0: -95 (Operation not supported)
nl80211: Driver does not support monitor interface type - try to run without it
nl80211: Enable Probe Request reporting nl_preq=0x17d8b70
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x17d8b70 match=
nl80211: Register frame command failed (type=64): ret=-22 (Invalid argument)
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Failed to enable Probe Request frame reporting in AP mode
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Previous country code US, new country code US
nl80211: Regulatory information - country=US (DFS-FCC)
nl80211: 2402-2472 @ 40 MHz 30 mBm
nl80211: 5170-5250 @ 80 MHz 23 mBm
nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
nl80211: 5735-5835 @ 80 MHz 30 mBm
nl80211: 57240-63720 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=30 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=30 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=108 freq=5540 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=112 freq=5560 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=116 freq=5580 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=120 freq=5600 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=124 freq=5620 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=128 freq=5640 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=132 freq=5660 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=136 freq=5680 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=140 freq=5700 MHz max_tx_power=23 dBm (DFS state = usable) Allowed channel: mode=2 chan=144 freq=5720 MHz max_tx_power=23 dBm (DFS state = usable)
Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=30 dBm
Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=30 dBm
Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=30 dBm
Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=30 dBm
Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=30 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=30 dBm
hw vht capab: 0x1020, conf vht capab: 0x0
wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Scan for neighboring BSSes prior to enabling 40 MHz channel
40 MHz affected channel range: [5775,5815] MHz
wlan0: nl80211: scan request
nl80211: Passive scan requested
nl80211: Scan frequency 5785 MHz
nl80211: Scan frequency 5805 MHz
Scan requested (ret=0) - scan timeout 10 seconds
Interface initialization will be completed in a callback
ctrl_iface not configured!
random: Got 20/20 bytes from /dev/random
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
wlan0: nl80211: Scan trigger
wlan0: Event SCAN_STARTED (48) received
Unknown event 48
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
wlan0: nl80211: New scan results available
nl80211: Scan included frequencies: 5785 5805
wlan0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (0 BSSes)
HT40: control channel: 157  secondary channel: 161
Completing interface initialization
Mode: IEEE 802.11a  Channel: 157  Frequency: 5785 MHz
DFS 0 channels required radar detection
nl80211: Set freq 5785 (ht_enabled=1, vht_enabled=1, bandwidth=40 MHz, cf1=5795 MHz, cf2=0 MHz)
  * freq=5785
  * vht_enabled=1
  * ht_enabled=1
  * bandwidth=40
  * channel_width=2
  * center_freq1=5795
  * center_freq2=0
RATE[0] rate=60 flags=0x1
RATE[1] rate=90 flags=0x0
RATE[2] rate=120 flags=0x1
RATE[3] rate=180 flags=0x0
RATE[4] rate=240 flags=0x1
RATE[5] rate=360 flags=0x0
RATE[6] rate=480 flags=0x0
RATE[7] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x17d68a8 (wlan0), first=1)
wlan0: Flushing old station entries
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
wlan0: Could not connect to kernel driver
wlan0: Deauthenticate all stations
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
nl80211: set_key failed; err=-22 Invalid argument)
Failed to clear default encryption keys (ifname=wlan0 keyidx=0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
nl80211: set_key failed; err=-22 Invalid argument)
Failed to clear default encryption keys (ifname=wlan0 keyidx=3)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
nl80211: set_key failed; err=-22 Invalid argument)
Failed to clear default mgmt encryption keys (ifname=wlan0 keyidx=5)
Using interface wlan0 with hwaddr b8:27:eb:95:ba:5e and ssid "testplat"
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=66): 80 00 00 00 ff ff ff ff ff ff b8 27 eb 95 ba 5e b8 27 eb 95 ba 5e 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 0f 41 70 70 6c 65 20 50 69 65 20 35 20 47 68 7a 01 08 8c 12 98 24 b0 48 60 6c 03 01 9d nl80211: Beacon tail - hexdump(len=146): 07 0c 55 53 20 24 08 17 64 0c 17 95 05 1e 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 2d 1a 0e 00 1f ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 9d 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 00 00 00 02 bf 0c 00 00 00 00 fe ff 00 00 fe ff 00 00 c0 05 00 00 00 fc ff c3 03 01 3c 3c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: dtim_period=2
nl80211: ssid - hexdump_ascii(len=15):
     41 70 70 6c 65 20 50 69 65 20 35 20 47 68 7a      testplat
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=1
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x2
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: SMPS mode - off
nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xd4108 key_idx=1 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0xd4108 key_idx=4 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
Failed to set TX queue parameters for queue 0.
Failed to set TX queue parameters for queue 1.
Failed to set TX queue parameters for queue 2.
Failed to set TX queue parameters for queue 3.
wlan0: interface state HT_SCAN->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station dd:0d:5c:e7:54:83
nl80211: Assoc Req IEs - hexdump(len=163): 00 0f 41 70 70 6c 65 20 50 69 65 20 35 20 47 68 7a 01 08 8c 12 98 24 b0 48 60 6c 21 02 f9 13 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 2d 1a 6f 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 03 00 00 08 dd 0b 00 17 f2 0a 00 01 04 00 00 00 00 dd 1e 00 90 4c 33 6f 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00
wlan0: Event ASSOC (0) received
wlan0: STA dd:0d:5c:e7:54:83 IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for dd:0d:5c:e7:54:83 (300 seconds - ap_max_inactivity) nl80211: Set STA flags - ifname=wlan0 addr=dd:0d:5c:e7:54:83 total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
wlan0: STA dd:0d:5c:e7:54:83 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x17ddd58 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=dd:0d:5c:e7:54:83
nl80211: set_key failed; err=-22 Invalid argument)
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA dd:0d:5c:e7:54:83 WPA: start authentication
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x17ddd58 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=dd:0d:5c:e7:54:83
nl80211: set_key failed; err=-22 Invalid argument)
nl80211: Set STA flags - ifname=wlan0 addr=dd:0d:5c:e7:54:83 total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dd:0d:5c:e7:54:83 IEEE 802.1X: unauthorizing port
WPA: dd:0d:5c:e7:54:83 WPA_PTK_GROUP entering state IDLE
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state AUTHENTICATION
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
Get randomness: len=16 entropy=0
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xd4108 key_idx=1 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=4 addr=0xd4108 key_idx=4 set_tx=1 seq_len=0 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): 22 63 6a cf 8e 24 de 5c 87 2b 3b 82 fc ea 18 e0 e7 16 dc 57 96 51 51 5c 37 48 7b 1a f2 05 8a 4b
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state INITPSK
Searching a PSK for dd:0d:5c:e7:54:83 prev_psk=(nil)
Searching a PSK for dd:0d:5c:e7:54:83 prev_psk=(nil)
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state PTKSTART
wlan0: STA dd:0d:5c:e7:54:83 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for dd:0d:5c:e7:54:83 (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (24) received
IEEE 802.1X: 121 bytes from dd:0d:5c:e7:54:83
   IEEE 802.1X: version=2 type=3 length=117
WPA: Received EAPOL-Key from dd:0d:5c:e7:54:83 key_info=0x10a type=2 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 3b 7b ed ee b7 b9 de e5 f7 28 dc a1 8d 7a 94 2b af 51 42 b8 0a e3 d4 71 51 c5 b8 ea 38 a9 1d 59
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA dd:0d:5c:e7:54:83 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for dd:0d:5c:e7:54:83 prev_psk=(nil)
WPA: PTK derivation - A1=b8:27:eb:95:ba:5e A2=dd:0d:5c:e7:54:83
WPA: Nonce1 - hexdump(len=32): 22 63 6a cf 8e 24 de 5c 87 2b 3b 82 fc ea 18 e0 e7 16 dc 57 96 51 51 5c 37 48 7b 1a f2 05 8a 4b WPA: Nonce2 - hexdump(len=32): 3b 7b ed ee b7 b9 de e5 f7 28 dc a1 8d 7a 94 2b af 51 42 b8 0a e3 d4 71 51 c5 b8 ea 38 a9 1d 59
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA dd:0d:5c:e7:54:83 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=76 keyidx=1 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=88): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dd:0d:5c:e7:54:83
wlan0: Event DISASSOC (1) received
wlan0: STA dd:0d:5c:e7:54:83 IEEE 802.11: disassociated
wlan0: STA dd:0d:5c:e7:54:83 WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x17ddd58 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=dd:0d:5c:e7:54:83
nl80211: set_key failed; err=-22 Invalid argument)
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state DISCONNECTED
WPA: dd:0d:5c:e7:54:83 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x17ddd58 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=dd:0d:5c:e7:54:83
nl80211: set_key failed; err=-22 Invalid argument)
nl80211: Set STA flags - ifname=wlan0 addr=dd:0d:5c:e7:54:83 total_flags=0x8 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA dd:0d:5c:e7:54:83 IEEE 802.1X: unauthorizing port
nl80211: sta_remove -> DEL_STATION wlan0 dd:0d:5c:e7:54:83 --> 0 (Success)
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x0 changes=0
ap_free_sta: cancel ap_handle_timer for dd:0d:5c:e7:54:83
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station dd:0d:5c:e7:54:83
wlan0: Event DISASSOC (1) received
wlan0: STA dd:0d:5c:e7:54:83 IEEE 802.11: disassociated
Disassociation notification for unknown STA dd:0d:5c:e7:54:83
Signal 2 received - terminating
hostapd_interface_deinit_free(0x17d48f0)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x17d48f0)
wlan0: interface state ENABLED->DISABLED
hostapd_bss_deinit: deinit bss wlan0
wlan0: Deauthenticate all stations
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
wlan0: AP-DISABLED
hostapd_cleanup(hapd=0x17d68a8 (wlan0))
hostapd_free_hapd_data(wlan0)
hostapd_interface_deinit_free: driver=0xe7448 drv_priv=0x17d8a48 -> hapd_deinit
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=3)
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Teardown AP(wlan0) - device_ap_sme=1 use_monitor=1
hostapd_interface_free(0x17d48f0)
hostapd_interface_free: free hapd 0x17d68a8
hostapd_cleanup_iface(0x17d48f0)
hostapd_cleanup_iface_partial(0x17d48f0)
hostapd_cleanup_iface: free iface=0x17d48f0


On 3/10/2019 5:49 AM, Jouni Malinen wrote:
On Sat, Mar 09, 2019 at 04:56:08PM -0500, newsgroup@xxxxxxxxxxxxxxxxxxxx wrote:
I have isolated the problem down to one setting in the hostapd.conf file:
ieee80211w=1

When I comment out the line ieee80211w, thereby disabling this
functionality, I can get the wifi devices to connect.  Is the protected
management frames capability interfering with the 4 way handshake?
*Syslog:*

Mar  8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 IEEE 802.11:
associated
Mar  8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: sending
1/4 msg of 4-Way Handshake
Mar  8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: received
EAPOL-Key frame (2/4 Pairwise)
Mar  8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 WPA: sending
3/4 msg of 4-Way Handshake
Mar  8 19:44:44 testplat hostapd: wlan0: STA dc:0d:5c:e4:54:83 IEEE 802.11:
disassociated
That seems to imply that the station device rejects this EAPOL-Key msg
3/4 for some reason. Which station did you test here? Would it be
possible to get debug log from it?

As far as the AP side is concerned, would you be able to send the
hostapd debug log (-dd on the command line) instead of the minimal
syslog entries?


_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap




[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux