+ freebsd-wireless can you post a 'dmesg' output? That way we can see which urtwn NIC it is and whether it logged anything.
-a On 3 October 2016 at 11:38, peter garshtja <peter.garsh...@ambient-md.com> wrote: > Greetings, > > im running freebsd 11 on rpi2 where i configured urtwn(wifi dongle) and > ether interfaces to work in bridge mode. > I built an AP and im experiencing weird issue - all stations that are > connected to AP after a while start loosing the connection and are not able > to reconnect anymore and only rebooting the rpi2 solves the issue. > > here is my hostapd.conf > > interface=wlan0 > ctrl_interface=/var/run/hostapd > ctrl_interface_group=wheel > ssid=testap > wpa=2 > wpa_psk_file=/etc/hostapd.wpa_psk > wpa_key_mgmt=WPA-PSK > wpa_pairwise=CCMP > > also here is hostapd logs running in debug mode > > Configuration file: /etc/hostapd.conf > ctrl_interface_group=0 (from group name 'wheel') > BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > Completing interface initialization > hostapd_setup_bss(hapd=0x20863000 (wlan0), first=1) > wlan0: Flushing old station entries > wlan0: Deauthenticate all stations > bsd_set_privacy: enabled=0 > bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=0 > bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=1 > bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=2 > bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: key_idx=3 > Using interface wlan0 with hwaddr 00:c6:d2:21:c9:34 and ssid "testap" > bsd_set_ieee8021x: enabled=1 > bsd_configure_wpa: enable WPA= 0x2 > Get randomness: len=32 entropy=0 > GMK - hexdump(len=32): [REMOVED] > Get randomness: len=32 entropy=0 > Key Counter - hexdump(len=32): [REMOVED] > WPA: Delay group state machine start until Beacon frames have been > configured > bsd_set_privacy: enabled=1 > bsd_set_opt_ie: set WPA+RSN ie (len 22) > WPA: Start group state machine to set initial keys > WPA: group state machine entering state GTK_INIT (VLAN-ID 0) > Get randomness: len=16 entropy=0 > GTK - hexdump(len=16): [REMOVED] > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=3 addr=0x80be3 key_idx=1 set_tx=1 seq_len=0 key_len=16 > wlan0: interface state UNINITIALIZED->ENABLED > wlan0: AP-ENABLED > wlan0: Setup of interface done. > ctrl_iface not configured! > wlan0: Event ASSOC (0) received > wlan0: STA 00:13:ef:66:18:49 IEEE 802.11: associated > STA included RSN IE in (Re)AssocReq > New STA > ap_sta_add: register ap_handle_timer timeout for 00:13:ef:66:18:49 (300 > seconds - ap_max_inactivity) > wlan0: STA 00:13:ef:66:18:49 WPA: event 1 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS > wlan0: STA 00:13:ef:66:18:49 WPA: start authentication > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state IDLE > WPA: 00:13:ef:66:18:49 WPA_PTK entering state AUTHENTICATION > WPA: 00:13:ef:66:18:49 WPA_PTK entering state AUTHENTICATION2 > WPA: Re-initialize GMK/Counter on first station > Get randomness: len=32 entropy=1 > GMK - hexdump(len=32): [REMOVED] > Get randomness: len=32 entropy=0 > Key Counter - hexdump(len=32): [REMOVED] > Get randomness: len=16 entropy=0 > GTK - hexdump(len=16): [REMOVED] > bsd_set_key: alg=3 addr=0x80be3 key_idx=1 set_tx=1 seq_len=0 key_len=16 > Get randomness: len=32 entropy=0 > WPA: Assign ANonce - hexdump(len=32): 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd > ab ea 2f b8 fb ac 1e ce 89 b4 8f 7f d0 74 9a a2 32 d2 3a 9f > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITPSK > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKSTART > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 > kde_len=0 keyidx=0 encr=0) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 > 01 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f b8 fb ac 1e ce 89 b4 8f 7f > d0 74 9a a2 32 d2 3a 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for > 00:13:ef:66:18:49 (300 seconds - ap_max_inactivity) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 121 bytes from 00:13:ef:66:18:49 > IEEE 802.1X: version=1 type=3 length=117 > WPA: Received EAPOL-Key from 00:13:ef:66:18:49 key_info=0x10a type=2 > key_data_length=22 > WPA: Received Key Nonce - hexdump(len=32): 9a 00 4b 91 0d 6d 86 0b 85 8d 05 > ab 76 72 94 b2 8b ff 2b ee 7a b4 e9 db de af be 3f 17 99 ca c5 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > wlan0: STA 00:13:ef:66:18:49 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKCALCNEGOTIATING > Searching a PSK for 00:13:ef:66:18:49 prev_psk=0x0 > WPA: PTK derivation - A1=00:c6:d2:21:c9:34 A2=00:13:ef:66:18:49 > WPA: Nonce1 - hexdump(len=32): 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f > b8 fb ac 1e ce 89 b4 8f 7f d0 74 9a a2 32 d2 3a 9f > WPA: Nonce2 - hexdump(len=32): 9a 00 4b 91 0d 6d 86 0b 85 8d 05 ab 76 72 94 > b2 8b ff 2b ee 7a b4 e9 db de af be 3f 17 99 ca c5 > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > wlan0: STA 00:13:ef:66:18:49 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 > kde_len=46 keyidx=1 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] > TX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 > 00 02 8a 5f 94 56 ac e3 d8 80 30 ae e6 fd ab ea 2f b8 fb ac 1e ce 89 b4 8f > 7f d0 74 9a a2 32 d2 3a 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 9e 4e 4f 11 14 fd 90 c0 > 03 67 44 ef 3e 93 d3 00 38 d4 5a b4 e2 92 da 2f b6 9b be 78 99 f7 8a 80 65 > f3 f0 7f bf 62 f5 1c 8c d0 af eb b6 e2 33 d1 8d b1 c1 c4 d9 d9 8b b2 f3 17 > 4f 3d 22 26 48 99 25 75 67 b6 96 4c 06 e5 ec > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 99 bytes from 00:13:ef:66:18:49 > IEEE 802.1X: version=1 type=3 length=95 > WPA: Received EAPOL-Key from 00:13:ef:66:18:49 key_info=0x30a type=2 > key_data_length=0 > WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > wlan0: STA 00:13:ef:66:18:49 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 00:13:ef:66:18:49 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=3 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=16 > wlan0: AP-STA-CONNECTED 00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: authorizing port > wlan0: STA 00:13:ef:66:18:49 RADIUS: starting accounting session > 27FA1003-00000000 > wlan0: STA 00:13:ef:66:18:49 WPA: pairwise key handshake completed (RSN) > > wlan0: Event ASSOC (0) received > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.11: associated > STA included RSN IE in (Re)AssocReq > New STA > ap_sta_add: register ap_handle_timer timeout for 50:55:27:ff:dc:04 (300 > seconds - ap_max_inactivity) > wlan0: STA 50:55:27:ff:dc:04 WPA: event 1 notification > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS > wlan0: STA 50:55:27:ff:dc:04 WPA: start authentication > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: unauthorizing port > WPA: 50:55:27:ff:dc:04 WPA_PTK_GROUP entering state IDLE > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state AUTHENTICATION > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state AUTHENTICATION2 > Get randomness: len=32 entropy=2 > WPA: Assign ANonce - hexdump(len=32): b5 18 65 7c 00 3b ef 61 e1 21 fc 93 > f1 10 81 d5 2e 54 2c 24 d7 c2 24 07 b7 40 83 39 35 d9 ca 85 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITPSK > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKSTART > wlan0: STA 50:55:27:ff:dc:04 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 > kde_len=0 keyidx=0 encr=0) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > TX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 > 01 b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 d5 2e 54 2c 24 d7 c2 24 07 > b7 40 83 39 35 d9 ca 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for > 50:55:27:ff:dc:04 (300 seconds - ap_max_inactivity) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 121 bytes from 50:55:27:ff:dc:04 > IEEE 802.1X: version=1 type=3 length=117 > WPA: Received EAPOL-Key from 50:55:27:ff:dc:04 key_info=0x10a type=2 > key_data_length=22 > WPA: Received Key Nonce - hexdump(len=32): 98 b8 fd 85 aa b9 9e 71 ed 30 bc > a1 67 9a 7e 3f 08 10 16 3a a2 8a 68 e7 84 52 df 69 74 65 f4 cc > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > wlan0: STA 50:55:27:ff:dc:04 WPA: received EAPOL-Key frame (2/4 Pairwise) > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKCALCNEGOTIATING > Searching a PSK for 50:55:27:ff:dc:04 prev_psk=0x0 > WPA: PTK derivation - A1=00:c6:d2:21:c9:34 A2=50:55:27:ff:dc:04 > WPA: Nonce1 - hexdump(len=32): b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 > d5 2e 54 2c 24 d7 c2 24 07 b7 40 83 39 35 d9 ca 85 > WPA: Nonce2 - hexdump(len=32): 98 b8 fd 85 aa b9 9e 71 ed 30 bc a1 67 9a 7e > 3f 08 10 16 3a a2 8a 68 e7 84 52 df 69 74 65 f4 cc > WPA: PMK - hexdump(len=32): [REMOVED] > WPA: PTK - hexdump(len=48): [REMOVED] > WPA: KCK - hexdump(len=16): [REMOVED] > WPA: KEK - hexdump(len=16): [REMOVED] > WPA: TK - hexdump(len=16): [REMOVED] > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKCALCNEGOTIATING2 > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKINITNEGOTIATING > bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1 > wlan0: STA 50:55:27:ff:dc:04 WPA: sending 3/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 > kde_len=46 keyidx=1 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] > TX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 > 00 02 b5 18 65 7c 00 3b ef 61 e1 21 fc 93 f1 10 81 d5 2e 54 2c 24 d7 c2 24 > 07 b7 40 83 39 35 d9 ca 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > c4 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 9f 82 19 14 e2 41 db 78 > 34 4d 67 73 0f 2d 98 00 38 36 24 6d a8 10 de 8c ce a9 6d f0 70 32 52 d9 e3 > 39 c4 a7 8e 5f de 51 7c 41 b0 37 6f e9 a7 14 be 1c 74 d4 06 e0 2d f9 b0 f2 > 09 86 cd 6c 79 57 24 fb 68 8b 61 46 20 ef a8 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wlan0: Event EAPOL_RX (24) received > IEEE 802.1X: 99 bytes from 50:55:27:ff:dc:04 > IEEE 802.1X: version=1 type=3 length=95 > WPA: Received EAPOL-Key from 50:55:27:ff:dc:04 key_info=0x30a type=2 > key_data_length=0 > WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > wlan0: STA 50:55:27:ff:dc:04 WPA: received EAPOL-Key frame (4/4 Pairwise) > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state PTKINITDONE > bsd_set_key: alg=3 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=16 > wlan0: AP-STA-CONNECTED 50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: authorizing port > wlan0: STA 50:55:27:ff:dc:04 RADIUS: starting accounting session > 27FA1003-00000001 > wlan0: STA 50:55:27:ff:dc:04 WPA: pairwise key handshake completed (RSN) > ap_handle_timer: 00:13:ef:66:18:49 flags=0x23 timeout_next=0 > wlan0: Station 00:13:ef:66:18:49 has been active 0s ago > ap_handle_timer: register ap_handle_timer timeout for 00:13:ef:66:18:49 > (311 seconds) > > wlan0: Event DISASSOC (1) received > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.11: disassociated > wlan0: AP-STA-DISCONNECTED 50:55:27:ff:dc:04 > wlan0: STA 50:55:27:ff:dc:04 WPA: event 2 notification > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state DISCONNECTED > WPA: 50:55:27:ff:dc:04 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847208 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=50:55:27:ff:dc:04 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 50:55:27:ff:dc:04 IEEE 802.1X: unauthorizing port > ap_free_sta: cancel ap_handle_timer for 50:55:27:ff:dc:04 > > wlan0: WPA rekeying GTK > WPA: group state machine entering state SETKEYS (VLAN-ID 0) > Get randomness: len=16 entropy=1 > GTK - hexdump(len=16): [REMOVED] > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 03 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af dd 11 ab e2 ed 9a a2 17 > db 92 63 8a 84 6e 42 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) > wpa_group_setkeys: GKeyDoneStations=1 > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 04 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 e1 ab 2c 2a 89 e4 5c cc > 9a 7a f4 2f 17 c6 ce 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 05 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 5d e8 3f 6b bf 64 aa e2 > 59 b4 0a 1b a7 82 06 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > wlan0: STA 00:13:ef:66:18:49 WPA: sending 1/2 msg of Group Key Handshake > WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 > kde_len=24 keyidx=2 encr=1) > WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED] > TX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 > 00 06 33 ad e3 a9 95 d4 6b 93 4d df bd 96 90 a5 3f fe 58 7f 01 3e 53 1f 8e > 23 3d c0 ef 35 a2 f4 5a df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 5b f0 e9 64 c8 48 f9 98 > 3b f8 bc df 84 ad 99 00 20 91 7f ca 02 21 28 c9 0d 9f 00 c4 09 da e8 73 88 > 07 0c 8d 5c 5b 30 64 b7 dd 02 35 a2 37 a1 63 e9 > WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4) > wlan0: STA 00:13:ef:66:18:49 WPA: EAPOL-Key timeout > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state REKEYNEGOTIATING > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state KEYERROR > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=3 addr=0x80be3 key_idx=2 set_tx=1 seq_len=0 key_len=16 > wlan0: STA 00:13:ef:66:18:49 WPA: WPA_PTK: sm->Disconnect > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECT > wpa_sta_disconnect STA 00:13:ef:66:18:49 > hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA > 00:13:ef:66:18:49 reason 2 > wlan0: AP-STA-DISCONNECTED 00:13:ef:66:18:49 > wlan0: STA 00:13:ef:66:18:49 WPA: event 3 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ap_sta_disconnect: reschedule ap_handle_timer timeout for 00:13:ef:66:18:49 > (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH) > WPA: 00:13:ef:66:18:49 WPA_PTK_GROUP entering state IDLE > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECTED > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > Removing STA 00:13:ef:66:18:49 from kernel driver > wlan0: STA 00:13:ef:66:18:49 MLME: > MLME-DEAUTHENTICATE.indication(00:13:ef:66:18:49, 2) > wlan0: STA 00:13:ef:66:18:49 MLME: > MLME-DELETEKEYS.request(00:13:ef:66:18:49) > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > wlan0: Event DISASSOC (1) received > wlan0: STA 00:13:ef:66:18:49 IEEE 802.11: disassociated > wlan0: STA 00:13:ef:66:18:49 WPA: event 2 notification > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > WPA: 00:13:ef:66:18:49 WPA_PTK entering state DISCONNECTED > WPA: 00:13:ef:66:18:49 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x20847008 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:13:ef:66:18:49 > ioctl[SIOCS80211, op=20, val=0, arg_len=7]: No such file or directory > ioctl[SIOCS80211, op=21, val=0, arg_len=42]: No such file or directory > wlan0: STA 00:13:ef:66:18:49 IEEE 802.1X: unauthorizing port > ap_free_sta: cancel ap_handle_timer for 00:13:ef:66:18:49 > > > thanks, > peter > _______________________________________________ > freebsd-...@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-arm > To unsubscribe, send any mail to "freebsd-arm-unsubscr...@freebsd.org" _______________________________________________ freebsd-wireless@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-wireless To unsubscribe, send any mail to "freebsd-wireless-unsubscr...@freebsd.org"