[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #139 from J.R. Oldroyd  ---
Would a wireshark or tcpdump with radiotap on to view the beacon management
frames be of any use here?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #140 from Cy Schubert  ---
No, tcpdump will dump no packets, even in monitor mode, during scan and
association.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #141 from J.R. Oldroyd  ---
(In reply to Cy Schubert from comment #140)

Won't the beacons be the same both before and after association as far as the
WPA IEs are concerned?

So dump the radiotap after association using the working wpa-supplicant and
have a look where these IEs are.  At least it would show what bssids the ap is
sending and their security setup.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #142 from Adrian Chadd  ---
So, the way this works is:

* during scan the net80211 stack just stores the beacons itself as scan results
* then it passes them up to wpa_supplicant via an ioctl
* then wpa_s uses the initial scan results to issue a "join this BSS as a
station" ioctl
* <--- this is where we know the IEs are wrong
* then net80211 will do the join request, either via directly asking the wifi
firmware to do the join, or by crafting auth/assoc frames and sending them to
the AP to do the joining

Now, the IE contents between beacon, auth and assoc can be different as
different subsets of info are required in each. But the only info used by wpa_s
when joining a network is the contents of the scan result entry.

Ok, so!

Some NICs, like the intel NICs, don't send up beacon frames. Instead, they
actually do the scanning /in firmware/, and then they send up scan results.
That way the firmware can do stuff like background scanning without the
driver/stack needing to buffer traffic - it's all done in firmware.

Other NICs, like rtwn, ath, etc - they're fully softmac NICs, and everything is
done in the driver/stack. When you do a scan, the driver/stack will change
channels, configure to receive beacon frames from all MACs, and listen for a
bit.

Ok, so given that!

* For iwn, iwm, etc - they're the smart ones, tcpdump won't get the beacons.
You only get what the firmware returns.
* For ath, rtwn, etc - they're softmac, tcpdump in 80211 monitor mode will see
beacons.

ok, so!! :-P

* For AR9285, rtwn, etc you can run tcpdump -ni wlan0 -y IEEE802_11_RADIO
during a scan, and it SHOULD show the beacons coming in as it does a scan. You
can try it, see what happens.
* For iwn, iwm, etc - tcpdump won't help, and we'll have to use driver
debugging to dump the scan results messages as they come in to see what's in
there.

(For this reason I keep atheros NICs around for doing monitor mode sniffing,
since sometimes firmware/drivers on smart / fullmac devices get things subtly
weirdly wrong. :-)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #143 from J.R. Oldroyd  ---
(In reply to Adrian Chadd from comment #142)

Very useful info, thanks.

Except, I would point out that at the moment, I am on:
  iwm0: 
and I can dump my beacons after association using tcpdump.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #144 from Adrian Chadd  ---
yup, once you've associated you can dump beacons on your current channel. :-)
You just can't get a dump of all the beacons on all the channels during scan!

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #145 from Bjoern A. Zeeb  ---
(In reply to Adrian Chadd from comment #144)

While diverting from the actual topic;  on Intel that still depends on what you
tell the firmware even after assoc (also depends on PS and other things). 
FW/driver way too clever ... and as it turns out sometimes stumbles over its
own feet.

But yes -- if you want to get radiotap with those, use a 3rd device the listen
to what you want/need which can get it to you unfiltered.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug 264238] wpa_supplicant fails to associate to open unprotected 802.11n

2022-06-23 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264238

--- Comment #146 from Cy Schubert  ---
Created attachment 234903
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=234903&action=edit
Proof of Concept solution

Please try this proof of concept solution. It's a bit of a hack but if it works
(it works on my buggy Netgear) @adrian, @bz and I can discuss how to make this
permanent).

Also make sure to apply
https://bugs.freebsd.org/bugzilla/attachment.cgi?id=234807&action=edit along
with it.

Let me know if this works for you too.

As I said, it's a bit of a hack until the root cause can be found but as a
proof of concept, if it works for you as it did for me, we'll know we're
heading in the right direction.

-- 
You are receiving this mail because:
You are on the CC list for the bug.