hello marcel, hello joseph,

please test again with version 6.30.223.248. i've experienced similar
symptoms with 6.30.223.30, and they went away with 6.30.223.248.


for the record, my issues showed up with different vendors' routers. the
first had no wifi security; there, the device sent a dhcp request,
received an offer, and the accept was logged in wireshark but not
detected by any other device on the same wifi.

in the other wifi, there was wireless security. i switched my hostapd to
verbose, and the logs from different clients were equal to this point:

> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx MLME: 
> MLME-DELETEKEYS.request(00:90:a2:cb:xx:xx)
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: event 1 notification
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: start authentication
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx IEEE 802.1X: unauthorizing 
> port
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 1/4 msg of 
> 4-Way Handshake

but while with a working device, what followed was 

> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: received EAPOL-Key 
> frame (2/4 Pairwise)
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 3/4 msg of 
> 4-Way Handshake
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: received EAPOL-Key 
> frame (4/4 Pairwise)

, the affected defice produced

> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: EAPOL-Key timeout
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 1/4 msg of 
> 4-Way Handshake
> daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: EAPOL-Key timeout

. my assumption is that under certain conditions, the wifi card fails to
send unicast packages.

best regards
chrysn

Attachment: signature.asc
Description: Digital signature

Reply via email to