On Tue, Sep 1, 2020 at 11:52 PM Sugandh Huthanahally Mohan <sugandhgowda@xxxxxxxxx> wrote: > > Hi , > > I changed wpa_pairwise to CCMP and observed no change in terms of > connection between AP and STA. Okay. > I ran hostapd in debug mode and logs are below. Also -vv flag is > fetching only version. Sorry, it should be -dd. > > stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=178 > wlp3s0: Event RX_MGMT (18) received > mgmt::assoc_req > association request: STA=8c:c6:81:69:ac:80 capab_info=0x431 > listen_interval=10 seq_ctrl=0x80 > Validating WMM IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1 > QoS info 0x0 > new AID 1 > HT: STA 8c:c6:81:69:ac:80 HT Capabilities Info: 0x19e7 > update_sta_ht STA 8c:c6:81:69:ac:80 - no greenfield, num of non-gf stations 1 > hostapd_ht_operation_update current operation mode=0x0 > hostapd_ht_operation_update new operation mode=0x4 changes=1 > nl80211: Set beacon (beacon_set=1) > nl80211: Beacon head - hexdump(len=61): 80 00 00 00 ff ff ff ff ff ff > 8c c6 81 69 86 65 8c c6 81 69 86 65 00 00 00 00 00 00 00 00 00 00 64 > 00 11 04 00 0a 57 69 46 69 5f 41 58 32 30 30 01 08 82 84 8b 96 0c 12 > 18 24 03 01 06 > nl80211: Beacon tail - hexdump(len=193): 07 06 44 45 20 01 0d 16 2a 01 > 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 > 00 0f ac 02 0c 00 3b 02 51 00 2d 1a 85 18 17 ff ff 00 00 00 00 00 00 > 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 04 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 00 00 00 > 00 00 40 bf 0c 00 00 00 00 ff ff 00 00 ff ff 00 00 c0 05 00 01 00 fc > ff c3 02 00 2c ff 1a 23 01 78 08 12 40 08 06 20 02 80 ff 09 80 0c cf > f0 00 fa ff fa ff 61 1c c7 71 ff 07 24 f8 3f 00 01 fa ff dd 18 00 50 > f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 > nl80211: ifindex=3 > nl80211: beacon_int=100 > nl80211: beacon_rate=0 > nl80211: rate_type=0 > nl80211: dtim_period=2 > nl80211: ssid=WiFi_AX200 > * beacon_int=100 > * dtim_period=2 > nl80211: hidden SSID not in use > nl80211: privacy=1 > nl80211: auth_algs=0x1 > nl80211: wpa_version=0x2 > nl80211: key_mgmt_suites=0x2 > nl80211: pairwise_ciphers=0x10 > nl80211: group_cipher=0x10 > nl80211: SMPS mode - dynamic > nl80211: beacon_ies - hexdump(len=10): 7f 08 04 00 00 00 00 00 00 40 > nl80211: proberesp_ies - hexdump(len=10): 7f 08 04 00 00 00 00 00 00 40 > nl80211: assocresp_ies - hexdump(len=10): 7f 08 04 00 00 00 00 00 00 40 > nl80211: multicast to unicast disabled on interface wlp3s0 > wlp3s0: STA 8c:c6:81:69:ac:80 IEEE 802.11: association OK (aid 1) > Add associated STA 8c:c6:81:69:ac:80 (added_unassoc=1 auth_alg=0 > ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0) > nl80211: Set STA 8c:c6:81:69:ac:80 > * supported rates - hexdump(len=12): 02 04 0b 16 0c 12 18 24 30 48 60 6c > * capability=0x431 > * ht_capabilities - hexdump(len=26): 05 19 17 ff ff 00 00 00 00 00 > 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 > * aid=1 > * listen_interval=10 > * flags set=0xac mask=0xac > * qosinfo=0x0 Based on above flags as there is not "he_capab" as expected this isn't a HE connection. >From the code, the most likely possibility is the wrong IEs from the STA (either missing HE ies or malformed/invalid IEs). Can you share wpa_supplicant -dd logs as well? > nl80211: send_mlme - da= 8c:c6:81:69:ac:80 noack=0 freq=0 no_cck=0 > offchanok=0 wait_time=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3 > nl80211: send_mlme -> send_frame > nl80211: send_frame - Use bss->freq=2437 > nl80211: send_frame -> send_frame_cmd > nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlp3s0 > nl80211: Frame TX status event > wlp3s0: Event TX_STATUS (16) received > mgmt::assoc_resp cb > wlp3s0: STA 8c:c6:81:69:ac:80 IEEE 802.11: associated (aid 1) > wlp3s0: STA 8c:c6:81:69:ac:80 MLME: MLME-ASSOCIATE.indication(8c:c6:81:69:ac:80) <snip...> > wlp3s0: AP-STA-CONNECTED 8c:c6:81:69:ac:80 > nl80211: Set STA flags - ifname=wlp3s0 addr=8c:c6:81:69:ac:80 > total_flags=0x67 flags_or=0x1 flags_and=0xffffffff authorized=1 > wlp3s0: STA 8c:c6:81:69:ac:80 IEEE 802.1X: authorizing port > wlp3s0: STA 8c:c6:81:69:ac:80 RADIUS: starting accounting session > B46452FE1173F1AB > wlp3s0: STA 8c:c6:81:69:ac:80 WPA: pairwise key handshake completed (RSN) > On Tue, Sep 1, 2020 at 8:08 PM Krishna Chaitanya > <chaitanya.mgit@xxxxxxxxx> wrote: > > > > On Tue, Sep 1, 2020 at 11:31 PM Sugandh Huthanahally Mohan > > <sugandhgowda@xxxxxxxxx> wrote: > > > > > > Hi, > > > > > > Please find dmesg and version of hostapd below > > > > > > $ sudo wpa_supplicant -vv > > > wpa_supplicant v2.9 > > > Copyright (c) 2003-2019, Jouni Malinen <j@xxxxx> and contributors > > > > > > $ sudo ./hostapd -vv > > > hostapd v2.9 > > > User space daemon for IEEE 802.11 AP management, > > > IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator > > > Copyright (c) 2002-2019, Jouni Malinen <j@xxxxx> and contributors > > Please use bottom-posting. > > > > I was referring to the logs i.e., running hostapd and wpa_supplicant > > -vv and collecting the > > logs when you do a connection, depending on how you have compiled "-f" > > can be used to save > > logs in a file else just tee-it. > > > > > $ sudo dmesg > > > [ 0.000000] microcode: microcode updated early to revision 0xdc, > > > date = 2020-04-27 > > > [ 0.000000] Linux version 5.4.0-42-generic (buildd@lgw01-amd64-038) > > > (gcc version 9.3.0 (Ubuntu 9.3.0-10ubuntu2)) #46-Ubuntu SMP Fri Jul 10 > > > 00:24:02 UTC 2020 (Ubuntu 5.4.0-42.46-generic 5.4.44) > > <..snip> > > Nothing from dmesg. > > > > Ah never mind, I see you are using TKIP please change to CCMP, > > using TKIP will disable any non-11g/11a. > > > > wpa_pairwise=TKIP -- Thanks, Regards, Chaitanya T K. _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap