Re: request for MFC of em/igb drivers
On Tue, Nov 23, 2010 at 09:41:49AM +0100, Fabien Thomas wrote: > That fix on ixgbe would also be great to commit on ixgbe before release. > This fix a crash on high packet load with bpf (mbuf freed behind bpf > analysis). > A fix to ixgbe to fix ipv6 routing would also be great! :-) John > Fabien > > > > > > On 17.11.2010 23:39, Jack Vogel wrote: > >> Yes, everyone, I plan on updating all the drivers, there has been no > >> activity > >> because I've tracking down a couple bugs that are tough, involving days > >> of testing to reproduce. I know we're getting close and I appreciate any > >> reports like this before. > >> > >> Stay tuned > >> > >> Jack > > > > Thanks for response. Do you play to MFC fixes before 8.2-RELEASE? > > We are in PRERELEASE state already :-) > > ___ > > freebsd-net@freebsd.org mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-net > > To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org" ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
Jail source address selection in 8.1-RELEASE
Hi, There appears to be a loosely documented sysctl 'security.jail.param.ip4.saddrsel' which should limit source IP selection of jails to their primary jail interface/IP. The sysctl does not appear to do anything, however: # sysctl security.jail.param.ip4.saddrsel=0 -> # echo $? 0 # sysctl security.jail.param.ip4.saddrsel # # sysctl -d security.jail.param.ip4.saddrsel security.jail.param.ip4.saddrsel: Do (not) use IPv4 source address selection rather than the primary jail IPv4 address. Is this tunable only available when VIMAGE jails are built? The 8.1-RELEASE Release Notes suggest it is for VIMAGE jail(8) containers, while 7.3-RELEASE Release Notes suggest that it is available for the entire jail(8) subsystem as 'security.jail.ip4_saddrsel', a different OID. FreeBSD 8.1-RELEASE FreeBSD 8.1-RELEASE #0: Tue Aug 3 16:24:09 EDT 2010 r...@:/usr/obj/usr/src/sys/GENERIC amd64 ___ freebsd-net@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"
problem with hostapd
Hi, Today I updated a 9.0-CURRENT system acting as an access point and it stopped working. From a Windows 7 machine it complains that there is a network key mismatch. I've checked it, changed it, and still no dice. I took the debug output from hostapd and find two odd things: first there is a "frame too short for this IEEE 802.1X packet" message, and then I see "ioctl[SIOCS80211]: No such file or directory" messages. The rc.conf and hostapd.conf are copied direct from a similar device compiled in February which works fine. I also used the same wlan_* options from the earlier working version. Any ideas on what might have changed or how I can further debug? thanks, dave c hostapd.conf: interface=wlan0 driver=bsd logger_syslog=-1 logger_syslog_level=0 logger_stdout=-1 logger_stdout_level=0 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=wheel ssid=evilthings wpa=1 wpa_passphrase=goodthings wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP output from hostapd: [r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid /etc/hostapd.conf Configuration file: /etc/hostapd.conf ctrl_interface_group=0 (from group name 'wheel') bsd_set_iface_flags: flags=0x BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) Completing interface initialization Flushing old station entries bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3 Deauthenticate all stations bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2 bsd_set_privacy: enabled=0 bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0 bsd_del_key: addr=00:00:00:00:00:00 key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: addr=00:00:00:00:00:00 key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: addr=00:00:00:00:00:00 key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: addr=00:00:00:00:00:00 key_idx=3 bsd_get_ssid: ssid="evilthings" Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings' Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=10): 65 76 69 6c 74 68 69 6e 67 73 evilthings PSK (ASCII passphrase) - hexdump_ascii(len=10): 67 6f 6f 64 74 68 69 6e 67 73 goodthings PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8 c1 d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6 bsd_set_ieee8021x: enabled=1 WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04 04 98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30 GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f fd 09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40 WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32 bsd_set_privacy: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 24) bsd_set_iface_flags: flags=0x1 wlan0: Setup of interface done. Discard routing message to if#0 (not for us 9) wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated STA included WPA IE in (Re)AssocReq New STA wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0 wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2 WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54 b9 da 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 6e 23 b1 b1 69 6f bc 93 4a b6 61 b5 89 88 29 22 36 da 56 cb 5f b1 7e 94 91 50 be 8b ba ba c1 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X: 139 bytes from 00:21:6a:a9:5e:90 IEEE 802.1X: version=0 type=128 length=18516 frame too short for this IEEE 802.1X packet wlan0: STA 00:21:6a:a9:5e:90 WPA: EAPOL-Key timeout WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54
Re: problem with hostapd
Hi, Would you please try -head just before rui committed his wpa/hostapd update and report back to -net and Rui directly? I saw some hostapd broken-ness when I tried -head last week but i haven't had time to dig up details for Rui. It seems you just have. :-) Thanks! ADrian On 25 November 2010 07:57, David Cornejo wrote: > Hi, > > Today I updated a 9.0-CURRENT system acting as an access point and it > stopped working. From a Windows 7 machine it complains that there is a > network key mismatch. I've checked it, changed it, and still no dice. I > took the debug output from hostapd and find two odd things: first there is > a "frame too short for this IEEE 802.1X packet" message, and then I see > "ioctl[SIOCS80211]: No such file or directory" messages. The rc.conf and > hostapd.conf are copied direct from a similar device compiled in February > which works fine. I also used the same wlan_* options from the earlier > working version. > > Any ideas on what might have changed or how I can further debug? > > thanks, > dave c > > > hostapd.conf: > > interface=wlan0 > driver=bsd > logger_syslog=-1 > logger_syslog_level=0 > logger_stdout=-1 > logger_stdout_level=0 > dump_file=/tmp/hostapd.dump > ctrl_interface=/var/run/hostapd > ctrl_interface_group=wheel > ssid=evilthings > wpa=1 > wpa_passphrase=goodthings > wpa_key_mgmt=WPA-PSK > wpa_pairwise=TKIP > > output from hostapd: > > [r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid /etc/hostapd.conf > Configuration file: /etc/hostapd.conf > ctrl_interface_group=0 (from group name 'wheel') > bsd_set_iface_flags: flags=0x > > BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > Completing interface initialization > Flushing old station entries > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3 > > Deauthenticate all stations > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2 > > bsd_set_privacy: enabled=0 > > bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=0 > > bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=1 > > bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=2 > > bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 > bsd_del_key: addr=00:00:00:00:00:00 key_idx=3 > > bsd_get_ssid: ssid="evilthings" > > Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings' > Deriving WPA PSK based on passphrase > SSID - hexdump_ascii(len=10): > 65 76 69 6c 74 68 69 6e 67 73 evilthings > PSK (ASCII passphrase) - hexdump_ascii(len=10): > 67 6f 6f 64 74 68 69 6e 67 73 goodthings > PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8 c1 > d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6 > bsd_set_ieee8021x: enabled=1 > > WPA: group state machine entering state GTK_INIT (VLAN-ID 0) > GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04 04 > 98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30 > GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f fd > 09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40 > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32 > bsd_set_privacy: enabled=1 > > bsd_set_opt_ie: set WPA+RSN ie (len 24) > > bsd_set_iface_flags: flags=0x1 > > wlan0: Setup of interface done. > Discard routing message to if#0 (not for us 9) > > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated > STA included WPA IE in (Re)AssocReq > New STA > wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 > > wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 > > bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0 > > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port > WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2 > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART > wlan0: STA 00:21:6a:a9:5e:90 WPA: sending 1/4 msg of 4-Way Handshake > WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 > kde_len=0 keyidx=0 encr=0) > TX EAPOL - hexdump(len=113): 00 21 6a a9 5e 90 00 80 48 54 b9 da 88 8e 02 03 > 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 6e 23 b1 b1 69 6f bc 93 4a b6 > 61 b5 89 88 29 22 36 da 56 cb 5f b1 7e 94 91 50 be 8b ba ba c1 f5 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Re: problem with hostapd
are you referring to rev 214734 on Nov 3rd? may not be able to get to the hardware to test until Monday though thanks! On Wed, Nov 24, 2010 at 5:20 PM, Adrian Chadd wrote: > Hi, > > Would you please try -head just before rui committed his wpa/hostapd > update and report back to -net and Rui directly? > > I saw some hostapd broken-ness when I tried -head last week but i > haven't had time to dig up details for Rui. It seems you just have. > :-) > > Thanks! > > > ADrian > > > > On 25 November 2010 07:57, David Cornejo wrote: > > Hi, > > > > Today I updated a 9.0-CURRENT system acting as an access point and it > > stopped working. From a Windows 7 machine it complains that there is a > > network key mismatch. I've checked it, changed it, and still no dice. I > > took the debug output from hostapd and find two odd things: first there > is > > a "frame too short for this IEEE 802.1X packet" message, and then I see > > "ioctl[SIOCS80211]: No such file or directory" messages. The rc.conf and > > hostapd.conf are copied direct from a similar device compiled in February > > which works fine. I also used the same wlan_* options from the earlier > > working version. > > > > Any ideas on what might have changed or how I can further debug? > > > > thanks, > > dave c > > > > > > hostapd.conf: > > > > interface=wlan0 > > driver=bsd > > logger_syslog=-1 > > logger_syslog_level=0 > > logger_stdout=-1 > > logger_stdout_level=0 > > dump_file=/tmp/hostapd.dump > > ctrl_interface=/var/run/hostapd > > ctrl_interface_group=wheel > > ssid=evilthings > > wpa=1 > > wpa_passphrase=goodthings > > wpa_key_mgmt=WPA-PSK > > wpa_pairwise=TKIP > > > > output from hostapd: > > > > [r...@charlie] 133% hostapd -Kdd -P /var/run/hostapd.pid > /etc/hostapd.conf > > Configuration file: /etc/hostapd.conf > > ctrl_interface_group=0 (from group name 'wheel') > > bsd_set_iface_flags: flags=0x > > > > BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) > > Completing interface initialization > > Flushing old station entries > > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3 > > > > Deauthenticate all stations > > bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2 > > > > bsd_set_privacy: enabled=0 > > > > bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0 > > bsd_del_key: addr=00:00:00:00:00:00 key_idx=0 > > > > bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 > > bsd_del_key: addr=00:00:00:00:00:00 key_idx=1 > > > > bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 > > bsd_del_key: addr=00:00:00:00:00:00 key_idx=2 > > > > bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 > > bsd_del_key: addr=00:00:00:00:00:00 key_idx=3 > > > > bsd_get_ssid: ssid="evilthings" > > > > Using interface wlan0 with hwaddr 00:80:48:54:b9:da and ssid 'evilthings' > > Deriving WPA PSK based on passphrase > > SSID - hexdump_ascii(len=10): > > 65 76 69 6c 74 68 69 6e 67 73 evilthings > > PSK (ASCII passphrase) - hexdump_ascii(len=10): > > 67 6f 6f 64 74 68 69 6e 67 73 goodthings > > PSK (from passphrase) - hexdump(len=32): 83 db fa 65 f8 ed 74 40 a6 79 b8 > c1 > > d7 6d a5 a7 07 4d b4 71 44 c5 e2 3e c5 bc 76 63 79 ab 13 d6 > > bsd_set_ieee8021x: enabled=1 > > > > WPA: group state machine entering state GTK_INIT (VLAN-ID 0) > > GMK - hexdump(len=32): 32 78 22 93 ba 57 ca 6d fb e1 6f dd 30 9c 8d 7e 04 > 04 > > 98 bb 27 7d db 17 47 a8 d7 1b 86 11 7b 30 > > GTK - hexdump(len=32): fa 33 d0 55 64 e2 00 e5 56 4c 36 0a 94 61 4d 96 0f > fd > > 09 ba ac 96 0c 1d 1f 3a 9b 12 ed db 65 40 > > WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) > > bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32 > > bsd_set_privacy: enabled=1 > > > > bsd_set_opt_ie: set WPA+RSN ie (len 24) > > > > bsd_set_iface_flags: flags=0x1 > > > > wlan0: Setup of interface done. > > Discard routing message to if#0 (not for us 9) > > > > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.11: associated > > STA included WPA IE in (Re)AssocReq > > New STA > > wlan0: STA 00:21:6a:a9:5e:90 WPA: event 1 notification > > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 > > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 > > > > wlan0: STA 00:21:6a:a9:5e:90 WPA: start authentication > > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITIALIZE > > bsd_set_key: alg=0 addr=0x2845b308 key_idx=0 set_tx=1 seq_len=0 key_len=0 > > bsd_del_key: addr=00:21:6a:a9:5e:90 key_idx=0 > > > > bsd_set_sta_authorized: addr=00:21:6a:a9:5e:90 authorized=0 > > > > wlan0: STA 00:21:6a:a9:5e:90 IEEE 802.1X: unauthorizing port > > WPA: 00:21:6a:a9:5e:90 WPA_PTK_GROUP entering state IDLE > > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION > > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state AUTHENTICATION2 > > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state INITPSK > > WPA: 00:21:6a:a9:5e:90 WPA_PTK entering state PTKSTART > > wlan0: STA 00:21:6a:a9:5e:90 WPA: