On Tue, 2 Jan 2018, Stefan Sperling wrote:
> > Is it perhaps a bug? Or perhaps only misconfiguration? > > There is no error in the logs you provided. > It's hard to guess what the problem is unless you can describe > the problem a bit better and show more data. I hope the following helps: # uname -a OpenBSD nc10.my.domain 6.2 GENERIC.MP#166 i386 BEFORE LOSING LINK # netstat -n -I run0 Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Colls run0 1500 <Link> 00:1f:1f:22:ce:d2 2905 6 364 0 0 run0 1500 192.168.0/2 192.168.0.12 2905 6 364 0 0 # netstat -W run0 ieee80211 on run0: 0 input packets with bad version 0 input packets too short 3158 input packets from wrong bssid 0 input packet duplicates discarded 0 input packets with wrong direction 3 input multicast echo packets discarded 0 input packets from unassociated station discarded 12 input encrypted packets without wep/wpa config discarded 7 input unencrypted packets with wep/wpa config discarded 0 input wep/wpa packets processing failed 0 input packet decapsulations failed 0 input management packets discarded 0 input control packets discarded 0 input packets with truncated rate set 0 input packets with missing elements 0 input packets with elements too big 0 input packets with elements too small 0 input packets with invalid channel 2 input packets with mismatched channel 0 node allocations failed 0 input packets with mismatched ssid 0 input packets with unsupported auth algorithm 0 input authentications failed 0 input associations from wrong bssid 0 input associations without authentication 0 input associations with mismatched capabilities 0 input associations without matching rates 0 input associations with bad rsn ie 0 input deauthentication packets 0 input disassociation packets 0 input packets with unknown subtype 0 input packets failed for lack of mbufs 0 input decryptions failed on crc 0 input ahdemo management packets discarded 0 input packets with bad auth request 2 input eapol-key packets 0 input eapol-key packets with bad mic 0 input eapol-key packets replayed 0 input packets with bad tkip mic 0 input tkip mic failure notifications 1 input packet on unauthenticated port 0 output packets failed for lack of mbufs 0 output packets failed for no nodes 0 output packets of unknown management type 0 output packets on unauthenticated port 1 active scan started 0 passive scans started 0 nodes timed out 0 failures with no memory for crypto ctx 0 ccmp decryption errors 0 ccmp replayed frames 0 cmac icv errors 0 cmac replayed frames 0 tkip icv errors 0 tkip replays 0 pbac errors 0 HT negotiation failures because peer does not support MCS 0-7 0 HT negotiation failures because we do not support basic MCS set 0 HT negotiation failures because peer uses bad crypto 0 HT protection changes 0 new input block ack agreements 0 new output block ack agreements 0 input frames below block ack window start 0 input frames above block ack window end 0 input block ack window slides 0 input block ack window jumps 0 duplicate input block ack frames 0 expected input block ack frames never arrived 0 input block ack window gaps timed out 0 input block ack agreements timed out 0 output block ack agreements timed out # tcpdump -n -i run0 15:03:42.788935 arp who-has 192.168.0.94 tell 192.168.0.1 15:03:43.819179 192.168.0.12.2088 > 200.1.19.17.123: v4 client strat 0 poll 0 prec 0 [tos 0x10] 15:03:43.832405 200.1.19.17.123 > 192.168.0.12.2088: v4 server strat 2 poll 3 prec -23 (DF) 15:03:47.929162 192.168.0.12.17331 > 64.233.190.108.993: P 3276235917:3276235953(36) ack 912426522 win 256 <nop,nop,timestamp 1174077249 3207266542> (DF) 15:03:47.942544 64.233.190.108.993 > 192.168.0.12.17331: . ack 36 win 225 <nop,nop,timestamp 3207418732 1174077249> 15:03:48.148291 64.233.190.108.993 > 192.168.0.12.17331: P 1:43(42) ack 36 win 225 <nop,nop,timestamp 3207418939 1174077249> 15:03:48.339025 192.168.0.12.17331 > 64.233.190.108.993: . ack 43 win 256 <nop,nop,timestamp 1174077250 3207418939> (DF) 15:03:48.879039 192.168.0.12.12287 > 200.1.19.4.123: v4 client strat 0 poll 0 prec 0 [tos 0x10] 15:03:48.893012 200.1.19.4.123 > 192.168.0.12.12287: v4 server strat 2 poll 3 prec -23 (DF) # tcpdump -n -i run0 -y IEEE802_11_RADIO 15:07:10.067739 802.11: beacon, ssid (VTR-5317427), rates, ds, tim, country, erp, xrates, htcaps, htop, <radiotap v0, chan 1, 11g, sig -60dBm, signal 58dB> 15:07:10.084489 802.11: beacon, ssid (ARRIS-9262), rates, ds, xrates, country, 51:8, 51:8, tim, rsn, erp, <radiotap v0, chan 1, 11g, sig -62dBm, signal 60dB> 15:07:10.116488 802.11: beacon, ssid (rna903295), rates, ds, tim, erp, 47:1, rsn, 2 stations, 12% utilization, admission capacity 0us/s, 127:8, vendor, <radiotap v0, chan 1, 11g, sig -23dBm, signal 21dB> --------------------------------------------- After losing Link # netstat netstat -n -I run0 >> tmp-netstat1 netstat: interval is invalid # netstat -W run0 ieee80211 on run0: 0 input packets with bad version 0 input packets too short 6904 input packets from wrong bssid 0 input packet duplicates discarded 0 input packets with wrong direction 3 input multicast echo packets discarded 0 input packets from unassociated station discarded 12 input encrypted packets without wep/wpa config discarded 10 input unencrypted packets with wep/wpa config discarded 0 input wep/wpa packets processing failed 0 input packet decapsulations failed 0 input management packets discarded 0 input control packets discarded 0 input packets with truncated rate set 0 input packets with missing elements 0 input packets with elements too big 0 input packets with elements too small 0 input packets with invalid channel 7 input packets with mismatched channel 0 node allocations failed 0 input packets with mismatched ssid 0 input packets with unsupported auth algorithm 0 input authentications failed 0 input associations from wrong bssid 0 input associations without authentication 0 input associations with mismatched capabilities 0 input associations without matching rates 0 input associations with bad rsn ie 0 input deauthentication packets 0 input disassociation packets 0 input packets with unknown subtype 0 input packets failed for lack of mbufs 0 input decryptions failed on crc 0 input ahdemo management packets discarded 0 input packets with bad auth request 2 input eapol-key packets 0 input eapol-key packets with bad mic 0 input eapol-key packets replayed 0 input packets with bad tkip mic 0 input tkip mic failure notifications 1 input packet on unauthenticated port 0 output packets failed for lack of mbufs 0 output packets failed for no nodes 0 output packets of unknown management type 0 output packets on unauthenticated port 1 active scan started 0 passive scans started 0 nodes timed out 0 failures with no memory for crypto ctx 0 ccmp decryption errors 0 ccmp replayed frames 0 cmac icv errors 0 cmac replayed frames 0 tkip icv errors 0 tkip replays 0 pbac errors 0 HT negotiation failures because peer does not support MCS 0-7 0 HT negotiation failures because we do not support basic MCS set 0 HT negotiation failures because peer uses bad crypto 0 HT protection changes 0 new input block ack agreements 0 new output block ack agreements 0 input frames below block ack window start 0 input frames above block ack window end 0 input block ack window slides 0 input block ack window jumps 0 duplicate input block ack frames 0 expected input block ack frames never arrived 0 input block ack window gaps timed out 0 input block ack agreements timed out 0 output block ack agreements timed out # tcpdump -n -i run0 tcpdump: listening on run0, link-type EN10MB ^C 0 packets received by filter 0 packets dropped by kernel # tcpdump -n -i run0 -y IEEE802_11_RADIO tcpdump: listening on run0, link-type IEEE802_11_RADIO 15:29:37.475139 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: FP 3160548212:3160548235(23) ack 3357202105 win 256 <nop,nop,timestamp 4270344605 658810306>, <radiotap v0, chan 1, 11g> 15:29:45.974910 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: FP 1359026660:1359026696(36) ack 2175423745 win 256 <nop,nop,timestamp 964805565 1626745330> (DF), <radiotap v0, chan 1, 11g> 15:30:41.473291 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: R 24:24(0) ack 1 win 0, <radiotap v0, chan 1, 11g> 15:30:49.973049 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: R 37:37(0) ack 1 win 0 (DF), <radiotap v0, chan 1, 11g> 15:31:28.692024 802.11: data: 192.168.0.12.4130 > 200.1.19.17.123: v4 client strat 0 poll 0 prec 0 [tos 0x10], <radiotap v0, chan 1, 11g> 15:33:43.018220 8 # ifconfig run0 run0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:1f:1f:22:ce:d2 index 5 priority 4 llprio 3 groups: wlan egress media: IEEE802.11 autoselect (DS1 mode 11g) status: active ieee80211: nwid rna903295 chan 1 bssid 7c:05:07:f7:6f:4c -21dBm wpakey 0x61d88ace2e7cdf45bb701e9850f3824c95b4ccb33dc860a403edaf9fdefaf7f1 wpaprotos wpa2 wpaakms psk wpaciphers ccmp wpagroupcipher ccmp inet 192.168.0.12 netmask 0xffffff00 broadcast 192.168.0.255 -----------------------------