From owner-freebsd-wireless@freebsd.org Fri Oct 7 20:37:03 2016 Return-Path: Delivered-To: freebsd-wireless@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 16FC9BED52B; Fri, 7 Oct 2016 20:37:03 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E741AA66; Fri, 7 Oct 2016 20:37:02 +0000 (UTC) (envelope-from adrian.chadd@gmail.com) Received: by mail-io0-x233.google.com with SMTP id j37so58769366ioo.3; Fri, 07 Oct 2016 13:37:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=7X8mpQ+mv9yBH8TNRouWfVp2FTG8cZgIBTQ5dW18PzQ=; b=TpDVsV+++60kSbMZhyAIdwpiKIcBzi6zPoQxt1fEZYD+erQCW3l7nfOt1L43tUYx5N UdUQOw779Eop7ef2ip4k0ZOE5G2JTQa5i9gqvLsqCHP9mQj5O3Do0aiMnSkOh5/vCaUp P9vIu1Z0zeqsuUFxDbDZTGCYoBfyZ8yFJ8/RZQbDhd4+mMA/VBZ6Q+S4SSxdrGp7Szwh OyJ+tHiPzbY71FsneYmZYbJnFB4FrKPL8uOUdTrvhfsXZhaxyoSTVLptHICnyz/+CmS4 pIYiYXnse1sYgOdvCDlrtbgSlU++E0Gz5Kj0z+8j2HVggA0rF4SpJY5rTsrsKFGhr5bl G3Hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=7X8mpQ+mv9yBH8TNRouWfVp2FTG8cZgIBTQ5dW18PzQ=; b=i3k1T8w5xvXbGFP/+44PCVFOVcAo2w5AP+hmWIFQyXfDPfN1AfsnbxriKsEpw3nz4z 0V5W5TFbArHpT4HsEtRcUwU+tABdknBWcm5E/udHAxazrXM6WoqXUkoTs6KuSM+bYgjP exB6F7/3HMiPGx2/D9FsXSguCQjBewSxGNKaBP90bgjgGMSHqHArkcFxB1+FJnyhj51d wAKWXBWf7dCOrnZZcpQuyV+GBr688qtTSiGs6SKUX6V05J+4RkczVO/7vaMAhRz/qgnV /TCFy5W3/VWT6aCJb/ejh1uFcn2Prtvp2Y/kUX2GCIAogEy5/VMx/nW0hq4CXOQEsawK IIhQ== X-Gm-Message-State: AA6/9RkL+d/qGTWZUopvH/jPAlgb/7Odn0BRRiTCIbRo9W/tNza3jGugVK+ievnx2pnqhQLWU2sBiJow3CD2wA== X-Received: by 10.107.181.211 with SMTP id e202mr21373797iof.99.1475872571184; Fri, 07 Oct 2016 13:36:11 -0700 (PDT) MIME-Version: 1.0 Sender: adrian.chadd@gmail.com Received: by 10.36.141.129 with HTTP; Fri, 7 Oct 2016 13:36:09 -0700 (PDT) In-Reply-To: References: From: Adrian Chadd Date: Fri, 7 Oct 2016 13:36:09 -0700 X-Google-Sender-Auth: oVtOM_NbgbFnqaTIy7vx-Zc3HPk Message-ID: Subject: Re: RPI2 AP To: peter garshtja Cc: "freebsd-arm@freebsd.org" , "freebsd-wireless@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Oct 2016 20:37:03 -0000 + freebsd-wireless can you post a 'dmesg' output? That way we can see which urtwn NIC it is and whether it logged anything. -a On 3 October 2016 at 11:38, peter garshtja wrote: > Greetings, > > im running freebsd 11 on rpi2 where i configured urtwn(wifi dongle) and > ether interfaces to work in bridge mode. > I built an AP and im experiencing weird issue - all stations that are > connected to AP after a while start loosing the connection and are not able > to reconnect anymore and only rebooting the rpi2 solves the issue. > > here is my hostapd.conf > > interface=wlan0 > ctrl_interface=/var/run/hostapd > ctrl_interface_group=wheel > ssid=testap > wpa=2 > wpa_psk_file=/etc/hostapd.wpa_psk > wpa_key_mgmt=WPA-PSK > wpa_pairwise=CCMP > > also here is hostapd logs running in debug mode > > Configuration file: /etc/hostapd.conf > ctrl_interface_group=0 (from group name 'wheel') > BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > Completing interface initialization > hostapd_setup_bss(hapd=0x20863000 (wlan0), first=1) > wlan0: Flushing old station entries > wlan0: Deauthenticate all stations > bsd_set_privacy: enabled=0 > bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=0 > bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=1 > bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=2 > bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=3 > Using interface wlan0 with hwaddr 00:c6:d2:21:c9:34 and ssid "testap" > bsd_set_ieee8021x: enabled=1 > bsd_configure_wpa: enable WPA= 0x2 > Get randomness: len=32 entropy=0 > GMK - hexdump(len=32): [REMOVED] > Get randomness: len=32 entropy=0 > Key Counter - hexdump(len=32): [REMOVED] > WPA: Delay group state machine start until Beacon frames have been > configured > bsd_set_privacy: enabled=1 > bsd_set_opt_ie: set WPA+RSN ie (len 22) > WPA: Start group state machine to set initial keys > WPA: group state machine entering state GTK_INIT (VLAN-ID 0) > Get randomness: len=16 entropy=0 > GTK - hexdump(len=16): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=3 addr=0x80be3 key_idx=1 set_tx=1 seq_len=0 key_len=16 > wlan0: interface state UNINITIALIZED->ENABLED > wlan0: AP-ENABLED > wlan0: Setup of interface done. > ctrl_iface not configured! > wlan0: Event ASSOC (0) received > wlan0: STA 00:13:ef:66:18:49 IEEE 802.11: associated > STA included RSN IE in (Re)AssocReq > New STA > ap_sta_add: register ap_handle_timer timeout for 00:13:ef:66:18:49 (300 > seconds - ap_max_inactivity) > wlan0: STA 00:13:ef:66:18:49 WPA: event 1 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS > wlan0: STA 00:13:ef:66:18:49 WPA: start authentication > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state IDLE > WPA: 00:13:ef:66:18:49 WPA_PTK entering state AUTHENTICATION > WPA: 00:13:ef:66:18:49 WPA_PTK entering state AUTHENTICATION2 > WPA: Re-initialize GMK/Counter on first station > Get randomness: len=32 entropy=1 > GMK - hexdump(len=32): [REMOVED] > Get randomness: len=32 entropy=0 > Key Counter - hexdump(len=32): [REMOVED] > Get randomness: len=16 entropy=0 > GTK - hexdump(len=16): [REMOVED] > bsd_set_key: alg=3 addr=0x80be3 key_idx=1 set_tx=1 seq_len=0 key_len=16 > Get randomness: len=32 entropy=0 > WPA: Assign ANonce - hexdump(len=32): 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd > ab ea 2f b8 fb ac 1e ce 89 b4 8f 7f d0 74 9a a2 32 d2 3a 9f > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITPSK > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKSTART > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 > kde_len=0 keyidx=0 encr=0) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 > 01 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f b8 fb ac 1e ce 89 b4 8f 7f > d0 74 9a a2 32 d2 3a 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for > 00:13:ef:66:18:49 (300 seconds - ap_max_inactivity) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 121 bytes from 00:13:ef:66:18:49 > IEEE 802.1X: version=1 type=3 length=117 > WPA: Received EAPOL-Key from 00:13:ef:66:18:49 key_info=0x10a type=2 > key_data_length=22 > WPA: Received Key Nonce - hexdump(len=32): 9a 00 4b 91 0d 6d 86 0b 85 8d 05 > ab 76 72 94 b2 8b ff 2b ee 7a b4 e9 db de af be 3f 17 99 ca c5 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > wlan0: STA 00:13:ef:66:18:49 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKCALCNEGOTIATING > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > WPA: PTK derivation - A1=00:c6:d2:21:c9:34 A2=00:13:ef:66:18:49 > WPA: Nonce1 - hexdump(len=32): 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f > b8 fb ac 1e ce 89 b4 8f 7f d0 74 9a a2 32 d2 3a 9f > WPA: Nonce2 - hexdump(len=32): 9a 00 4b 91 0d 6d 86 0b 85 8d 05 ab 76 72 94 > b2 8b ff 2b ee 7a b4 e9 db de af be 3f 17 99 ca c5 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > wlan0: STA 00:13:ef:66:18:49 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 > kde_len=46 keyidx=1 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] > TX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 > 00 02 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f b8 fb ac 1e ce 89 b4 8f > 7f d0 74 9a a2 32 d2 3a 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 9e 4e 4f 11 14 fd 90 c0 > 03 67 44 ef 3e 93 d3 00 38 d4 5a b4 e2 92 da 2f b6 9b be 78 99 f7 8a 80 65 > f3 f0 7f bf 62 f5 1c 8c d0 af eb b6 e2 33 d1 8d b1 c1 c4 d9 d9 8b b2 f3 17 > 4f 3d 22 26 48 99 25 75 67 b6 96 4c 06 e5 ec > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 99 bytes from 00:13:ef:66:18:49 > IEEE 802.1X: version=1 type=3 length=95 > WPA: Received EAPOL-Key from 00:13:ef:66:18:49 key_info=0x30a type=2 > key_data_length=0 > WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > wlan0: STA 00:13:ef:66:18:49 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=3 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=16 > wlan0: AP-STA-CONNECTED 00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: authorizing port > wlan0: STA 00:13:ef:66:18:49 RADIUS: starting accounting session > 27FA1003-00000000 > wlan0: STA 00:13:ef:66:18:49 WPA: pairwise key handshake completed (RSN) > > wlan0: Event ASSOC (0) received > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.11: associated > STA included RSN IE in (Re)AssocReq > New STA > ap_sta_add: register ap_handle_timer timeout for 50:55:27:ff:dc:04 (300 > seconds - ap_max_inactivity) > wlan0: STA 50:55:27:ff:dc:04 WPA: event 1 notification > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS > wlan0: STA 50:55:27:ff:dc:04 WPA: start authentication > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: unauthorizing port > WPA: 50:55:27:ff:dc:04 WPA_PTK_GROUP entering state IDLE > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state AUTHENTICATION > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state AUTHENTICATION2 > Get randomness: len=32 entropy=2 > WPA: Assign ANonce - hexdump(len=32): b5 18 65 7c 00 3b ef 61 e1 21 fc 93 > f1 10 81 d5 2e 54 2c 24 d7 c2 24 07 b7 40 83 39 35 d9 ca 85 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITPSK > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKSTART > wlan0: STA 50:55:27:ff:dc:04 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 > kde_len=0 keyidx=0 encr=0) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 > 01 b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 d5 2e 54 2c 24 d7 c2 24 07 > b7 40 83 39 35 d9 ca 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for > 50:55:27:ff:dc:04 (300 seconds - ap_max_inactivity) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 121 bytes from 50:55:27:ff:dc:04 > IEEE 802.1X: version=1 type=3 length=117 > WPA: Received EAPOL-Key from 50:55:27:ff:dc:04 key_info=0x10a type=2 > key_data_length=22 > WPA: Received Key Nonce - hexdump(len=32): 98 b8 fd 85 aa b9 9e 71 ed 30 bc > a1 67 9a 7e 3f 08 10 16 3a a2 8a 68 e7 84 52 df 69 74 65 f4 cc > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > wlan0: STA 50:55:27:ff:dc:04 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKCALCNEGOTIATING > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > WPA: PTK derivation - A1=00:c6:d2:21:c9:34 A2=50:55:27:ff:dc:04 > WPA: Nonce1 - hexdump(len=32): b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 > d5 2e 54 2c 24 d7 c2 24 07 b7 40 83 39 35 d9 ca 85 > WPA: Nonce2 - hexdump(len=32): 98 b8 fd 85 aa b9 9e 71 ed 30 bc a1 67 9a 7e > 3f 08 10 16 3a a2 8a 68 e7 84 52 df 69 74 65 f4 cc > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > wlan0: STA 50:55:27:ff:dc:04 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 > kde_len=46 keyidx=1 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] > TX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 > 00 02 b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 d5 2e 54 2c 24 d7 c2 24 > 07 b7 40 83 39 35 d9 ca 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > c4 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 9f 82 19 14 e2 41 db 78 > 34 4d 67 73 0f 2d 98 00 38 36 24 6d a8 10 de 8c ce a9 6d f0 70 32 52 d9 e3 > 39 c4 a7 8e 5f de 51 7c 41 b0 37 6f e9 a7 14 be 1c 74 d4 06 e0 2d f9 b0 f2 > 09 86 cd 6c 79 57 24 fb 68 8b 61 46 20 ef a8 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 99 bytes from 50:55:27:ff:dc:04 > IEEE 802.1X: version=1 type=3 length=95 > WPA: Received EAPOL-Key from 50:55:27:ff:dc:04 key_info=0x30a type=2 > key_data_length=0 > WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > wlan0: STA 50:55:27:ff:dc:04 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=3 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=16 > wlan0: AP-STA-CONNECTED 50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: authorizing port > wlan0: STA 50:55:27:ff:dc:04 RADIUS: starting accounting session > 27FA1003-00000001 > wlan0: STA 50:55:27:ff:dc:04 WPA: pairwise key handshake completed (RSN) > ap_handle_timer: 00:13:ef:66:18:49 flags=0x23 timeout_next=0 > wlan0: Station 00:13:ef:66:18:49 has been active 0s ago > ap_handle_timer: register ap_handle_timer timeout for 00:13:ef:66:18:49 > (311 seconds) > > wlan0: Event DISASSOC (1) received > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.11: disassociated > wlan0: AP-STA-DISCONNECTED 50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 WPA: event 2 notification > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state DISCONNECTED > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: unauthorizing port > ap_free_sta: cancel ap_handle_timer for 50:55:27:ff:dc:04 > > wlan0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > Get randomness: len=16 entropy=1 > GTK - hexdump(len=16): [REMOVED] > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 03 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af dd 11 ab e2 ed 9a a2 17 > db 92 63 8a 84 6e 42 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wpa_group_setkeys: GKeyDoneStations=1 > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 04 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 e1 ab 2c 2a 89 e4 5c cc > 9a 7a f4 2f 17 c6 ce 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 05 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 5d e8 3f 6b bf 64 aa e2 > 59 b4 0a 1b a7 82 06 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 06 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 5b f0 e9 64 c8 48 f9 98 > 3b f8 bc df 84 ad 99 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state KEYERROR > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=3 addr=0x80be3 key_idx=2 set_tx=1 seq_len=0 key_len=16 > wlan0: STA 00:13:ef:66:18:49 WPA: WPA_PTK: sm->Disconnect > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECT > wpa_sta_disconnect STA 00:13:ef:66:18:49 > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA > 00:13:ef:66:18:49 reason 2 > wlan0: AP-STA-DISCONNECTED 00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 WPA: event 3 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ap_sta_disconnect: reschedule ap_handle_timer timeout for 00:13:ef:66:18:49 > (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH) > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state IDLE > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECTED > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > Removing STA 00:13:ef:66:18:49 from kernel driver > wlan0: STA 00:13:ef:66:18:49 MLME: > MLME-DEAUTHENTICATE.indication(00:13:ef:66:18:49, 2) > wlan0: STA 00:13:ef:66:18:49 MLME: > MLME-DELETEKEYS.request(00:13:ef:66:18:49) > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > wlan0: Event DISASSOC (1) received > wlan0: STA 00:13:ef:66:18:49 IEEE 802.11: disassociated > wlan0: STA 00:13:ef:66:18:49 WPA: event 2 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECTED > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > ap_free_sta: cancel ap_handle_timer for 00:13:ef:66:18:49 > > > thanks, > peter > _______________________________________________ > freebsd-arm@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-arm > To unsubscribe, send any mail to "freebsd-arm-unsubscribe@freebsd.org"