On Tue, 2 Jan 2018, Stefan Sperling wrote:

> > Is it perhaps a bug? Or perhaps only misconfiguration?
> 
> There is no error in the logs you provided.
> It's hard to guess what the problem is unless you can describe
> the problem a bit better and show more data.

I hope the following helps:

# uname -a
OpenBSD nc10.my.domain 6.2 GENERIC.MP#166 i386

BEFORE LOSING LINK

# netstat -n -I run0

Name    Mtu   Network     Address              Ipkts Ierrs    Opkts Oerrs Colls
run0    1500  <Link>      00:1f:1f:22:ce:d2     2905     6      364     0     0
run0    1500  192.168.0/2 192.168.0.12          2905     6      364     0     0

# netstat -W run0

ieee80211 on run0:
        0 input packets with bad version
        0 input packets too short
        3158 input packets from wrong bssid
        0 input packet duplicates discarded
        0 input packets with wrong direction
        3 input multicast echo packets discarded
        0 input packets from unassociated station discarded
        12 input encrypted packets without wep/wpa config discarded
        7 input unencrypted packets with wep/wpa config discarded
        0 input wep/wpa packets processing failed
        0 input packet decapsulations failed
        0 input management packets discarded
        0 input control packets discarded
        0 input packets with truncated rate set
        0 input packets with missing elements
        0 input packets with elements too big
        0 input packets with elements too small
        0 input packets with invalid channel
        2 input packets with mismatched channel
        0 node allocations failed
        0 input packets with mismatched ssid
        0 input packets with unsupported auth algorithm
        0 input authentications failed
        0 input associations from wrong bssid
        0 input associations without authentication
        0 input associations with mismatched capabilities
        0 input associations without matching rates
        0 input associations with bad rsn ie
        0 input deauthentication packets
        0 input disassociation packets
        0 input packets with unknown subtype
        0 input packets failed for lack of mbufs
        0 input decryptions failed on crc
        0 input ahdemo management packets discarded
        0 input packets with bad auth request
        2 input eapol-key packets
        0 input eapol-key packets with bad mic
        0 input eapol-key packets replayed
        0 input packets with bad tkip mic
        0 input tkip mic failure notifications
        1 input packet on unauthenticated port
        0 output packets failed for lack of mbufs
        0 output packets failed for no nodes
        0 output packets of unknown management type
        0 output packets on unauthenticated port
        1 active scan started
        0 passive scans started
        0 nodes timed out
        0 failures with no memory for crypto ctx
        0 ccmp decryption errors
        0 ccmp replayed frames 
        0 cmac icv errors
        0 cmac replayed frames
        0 tkip icv errors
        0 tkip replays
        0 pbac errors
        0 HT negotiation failures because peer does not support MCS 0-7
        0 HT negotiation failures because we do not support basic MCS set
        0 HT negotiation failures because peer uses bad crypto
        0 HT protection changes
        0 new input block ack agreements
        0 new output block ack agreements
        0 input frames below block ack window start
        0 input frames above block ack window end
        0 input block ack window slides
        0 input block ack window jumps
        0 duplicate input block ack frames
        0 expected input block ack frames never arrived
        0 input block ack window gaps timed out
        0 input block ack agreements timed out
        0 output block ack agreements timed out

# tcpdump -n -i run0

15:03:42.788935 arp who-has 192.168.0.94 tell 192.168.0.1
15:03:43.819179 192.168.0.12.2088 > 200.1.19.17.123: v4 client strat 0 poll 0 
prec 0 [tos 0x10]
15:03:43.832405 200.1.19.17.123 > 192.168.0.12.2088: v4 server strat 2 poll 3 
prec -23 (DF)
15:03:47.929162 192.168.0.12.17331 > 64.233.190.108.993: P 
3276235917:3276235953(36) ack 912426522 win 256 <nop,nop,timestamp 1174077249 
3207266542> (DF)
15:03:47.942544 64.233.190.108.993 > 192.168.0.12.17331: . ack 36 win 225 
<nop,nop,timestamp 3207418732 1174077249>
15:03:48.148291 64.233.190.108.993 > 192.168.0.12.17331: P 1:43(42) ack 36 win 
225 <nop,nop,timestamp 3207418939 1174077249>
15:03:48.339025 192.168.0.12.17331 > 64.233.190.108.993: . ack 43 win 256 
<nop,nop,timestamp 1174077250 3207418939> (DF)
15:03:48.879039 192.168.0.12.12287 > 200.1.19.4.123: v4 client strat 0 poll 0 
prec 0 [tos 0x10]
15:03:48.893012 200.1.19.4.123 > 192.168.0.12.12287: v4 server strat 2 poll 3 
prec -23 (DF)

# tcpdump -n -i run0 -y IEEE802_11_RADIO 

15:07:10.067739 802.11: beacon, ssid (VTR-5317427), rates, ds, tim, country, 
erp, xrates, htcaps, htop, <radiotap v0, chan 1, 11g, sig -60dBm, signal 58dB>
15:07:10.084489 802.11: beacon, ssid (ARRIS-9262), rates, ds, xrates, country, 
51:8, 51:8, tim, rsn, erp, <radiotap v0, chan 1, 11g, sig -62dBm, signal 60dB>
15:07:10.116488 802.11: beacon, ssid (rna903295), rates, ds, tim, erp, 47:1, 
rsn, 2 stations, 12% utilization, admission capacity 0us/s, 127:8, vendor, 
<radiotap v0, chan 1, 11g, sig -23dBm, signal 21dB>

---------------------------------------------

After losing Link

# netstat netstat -n -I run0 >> tmp-netstat1
netstat: interval is invalid

# netstat -W run0

ieee80211 on run0:
        0 input packets with bad version
        0 input packets too short
        6904 input packets from wrong bssid
        0 input packet duplicates discarded
        0 input packets with wrong direction
        3 input multicast echo packets discarded
        0 input packets from unassociated station discarded
        12 input encrypted packets without wep/wpa config discarded
        10 input unencrypted packets with wep/wpa config discarded
        0 input wep/wpa packets processing failed
        0 input packet decapsulations failed
        0 input management packets discarded
        0 input control packets discarded
        0 input packets with truncated rate set
        0 input packets with missing elements
        0 input packets with elements too big
        0 input packets with elements too small
        0 input packets with invalid channel
        7 input packets with mismatched channel
        0 node allocations failed
        0 input packets with mismatched ssid
        0 input packets with unsupported auth algorithm
        0 input authentications failed
        0 input associations from wrong bssid
        0 input associations without authentication
        0 input associations with mismatched capabilities
        0 input associations without matching rates
        0 input associations with bad rsn ie
        0 input deauthentication packets
        0 input disassociation packets
        0 input packets with unknown subtype
        0 input packets failed for lack of mbufs
        0 input decryptions failed on crc
        0 input ahdemo management packets discarded
        0 input packets with bad auth request
        2 input eapol-key packets
        0 input eapol-key packets with bad mic
        0 input eapol-key packets replayed
        0 input packets with bad tkip mic
        0 input tkip mic failure notifications
        1 input packet on unauthenticated port
        0 output packets failed for lack of mbufs
        0 output packets failed for no nodes
        0 output packets of unknown management type
        0 output packets on unauthenticated port
        1 active scan started
        0 passive scans started
        0 nodes timed out
        0 failures with no memory for crypto ctx
        0 ccmp decryption errors
        0 ccmp replayed frames 
        0 cmac icv errors
        0 cmac replayed frames
        0 tkip icv errors
        0 tkip replays
        0 pbac errors
        0 HT negotiation failures because peer does not support MCS 0-7
        0 HT negotiation failures because we do not support basic MCS set
        0 HT negotiation failures because peer uses bad crypto
        0 HT protection changes
        0 new input block ack agreements
        0 new output block ack agreements
        0 input frames below block ack window start
        0 input frames above block ack window end
        0 input block ack window slides
        0 input block ack window jumps
        0 duplicate input block ack frames
        0 expected input block ack frames never arrived
        0 input block ack window gaps timed out
        0 input block ack agreements timed out
        0 output block ack agreements timed out


# tcpdump -n -i run0
tcpdump: listening on run0, link-type EN10MB
^C
0 packets received by filter
0 packets dropped by kernel

# tcpdump -n -i run0 -y IEEE802_11_RADIO
tcpdump: listening on run0, link-type IEEE802_11_RADIO
15:29:37.475139 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: FP 
3160548212:3160548235(23) ack 3357202105 win 256 <nop,nop,timestamp 4270344605 
658810306>, <radiotap v0, chan 1, 11g>
15:29:45.974910 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: FP 
1359026660:1359026696(36) ack 2175423745 win 256 <nop,nop,timestamp 964805565 
1626745330> (DF), <radiotap v0, chan 1, 11g>
15:30:41.473291 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: R 
24:24(0) ack 1 win 0, <radiotap v0, chan 1, 11g>
15:30:49.973049 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: R 
37:37(0) ack 1 win 0 (DF), <radiotap v0, chan 1, 11g>
15:31:28.692024 802.11: data: 192.168.0.12.4130 > 200.1.19.17.123: v4 client 
strat 0 poll 0 prec 0 [tos 0x10], <radiotap v0, chan 1, 11g>
15:33:43.018220 8

# ifconfig run0
run0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        lladdr 00:1f:1f:22:ce:d2
                index 5 priority 4 llprio 3
                        groups: wlan egress
                                media: IEEE802.11 autoselect (DS1 mode 11g)
                                        status: active
                                                ieee80211: nwid rna903295 chan 
1 bssid 7c:05:07:f7:6f:4c -21dBm wpakey 
0x61d88ace2e7cdf45bb701e9850f3824c95b4ccb33dc860a403edaf9fdefaf7f1 wpaprotos 
wpa2 wpaakms psk wpaciphers ccmp wpagroupcipher ccmp
                                                        inet 192.168.0.12 
netmask 0xffffff00 broadcast 192.168.0.255

-----------------------------

Reply via email to