Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 May 2013 22:04:45 GMT
From:      adrian chadd <adrian@FreeBSD.org>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   misc/178379: [net80211] [ath] WPA rekey on the STA side fails when transmitting lots of UDP traffic
Message-ID:  <201305062204.r46M4j3v075262@oldred.FreeBSD.org>
Resent-Message-ID: <201305062210.r46MA0pL055164@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         178379
>Category:       misc
>Synopsis:       [net80211] [ath] WPA rekey on the STA side fails when transmitting lots of UDP traffic
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon May 06 22:10:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator:     adrian chadd
>Release:        
>Organization:
>Environment:
>Description:
When UDP iperf transmit is going on, a WPA group rekey fails and the AP ditches the station.

What's going on:

* FreeBSD AP -> FreeBSD STA (both ath)
* AP sends a WPA rekey EAPOL message to the STA
* STA updates the key, sends an EAPOL message back
* AP doesn't get it, so it eventually disconnects the station.

What's breaking:

* The STA gets the EAPOL group rekey frame
* the STA updates the keycache entry
* The STA sends the EAPOL response
* .. but it doesn't actually send the frame, it gets dropped by ath_start() because the buffers are all allocated.

I'll dig into it some more.
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305062204.r46M4j3v075262>