> I have no idea what an "invalid group cipher 0x8" is and how to debug that. The message is printed because the Wi-Fi Access point is using TKIP as group cipher. Unfortunately Wi-Fi alliance does not recommends TKIP because it no longer provides sufficient security. https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Alliance_Technical_Note_TKIP_v1.0.pdf So we recommed to configure the Wi-Fi Accesss point not use TKIP for group cipher. Or, you can rebuild wpa_supplicant without CONFIG_NO_TKIP. Regards, Masashi Honma. 2022年3月31日(木) 4:21 Mathias <mathiaswe@xxxxxx>: > > Hello, > recently, the distribution I'm entrusting my Linux system to (Gentoo) > decided to no longer support wpa_supplicant 2.9, so I was forced to > switch to 2.10. However, 2.10 could no longer connect to my wifi (a > simple WPA2-PSK 5GHz found in almost every household these days). I > confirmed that switching back to 2.9 fixed the issue (took some > tinkering to make Gentoo behave). I will attach a the log files for the > broken 2.10 and working 2.9 (my interface is called "wifi" and my > network SSID is "lufthaufen_5Ghz"). In particular, observe that 2.10 > claims that a "parse failed": > > > wifi: 0: f4:6b:ef:6a:28:6f ssid='lufthaufen_5GHz' wpa_ie_len=26 rsn_ie_len=24 caps=0x1111 level=-69 freq=5200 wps > > wpa_parse_wpa_ie_rsn: invalid group cipher 0x8 (000fac02) > > wpa_parse_wpa_ie_rsn: invalid group cipher 0x8 (000fac02) > > wifi: skip RSN IE - parse failed > > wifi: skip WPA IE - GTK cipher mismatch > > wifi: reject due to mismatch with WPA/WPA2 > > While 2.9 manages to parse just fine: > > > wifi: Radio work 'scan'@0x55f363c95ca0 done in 3.293043 seconds > > wifi: radio_work_free('scan'@0x55f363c95ca0): num_active_works --> 0 > > wifi: Selecting BSS from priority group 0 > > wifi: 0: f4:6b:ef:6a:28:6f ssid='lufthaufen_5GHz' wpa_ie_len=26 rsn_ie_len=24 caps=0x1111 level=-61 freq=5200 wps > > wifi: selected based on RSN IE > > wifi: selected BSS f4:6b:ef:6a:28:6f ssid='lufthaufen_5GHz' > > I have no idea what an "invalid group cipher 0x8" is and how to debug > that. Might I take this opportunity and suggest printing more > informative error messages in the logs? :) > > thanks, cheers and best regards > -Mathias > > PS: my wifi board is and I am running kernel version 5.10 > > 07:00.0 Network controller [0280]: Intel Corporation Dual Band Wireless-AC 3165 Plus Bluetooth [8086:3166] (rev 99) > > Subsystem: Intel Corporation Dual Band Wireless-AC 3165 [8086:4210] > > Flags: bus master, fast devsel, latency 0, IRQ 143 > > Memory at a4300000 (64-bit, non-prefetchable) [size=8K] > > Capabilities: [c8] Power Management version 3 > > Capabilities: [d0] MSI: Enable+ Count=1/1 Maskable- 64bit+ > > Capabilities: [40] Express Endpoint, MSI 00 > > Capabilities: [100] Advanced Error Reporting > > Capabilities: [140] Device Serial Number 1c-1b-b5-ff-ff-91-45-ba > > Capabilities: [14c] Latency Tolerance Reporting > > Capabilities: [154] L1 PM Substates > > Kernel driver in use: iwlwifi > > Kernel modules: iwlwifi > > _______________________________________________ > Hostap mailing list > Hostap@xxxxxxxxxxxxxxxxxxx > http://lists.infradead.org/mailman/listinfo/hostap _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap