Load the ath9k_htc with nohwcrypt=1 or use the ath9k_htc open source firmware.
---- Chun-Yeow On Apr 27, 2016 4:21 PM, "Steger, Marco via Devel" < [email protected]> wrote: > Hi, > > I have the same / similar problem. Wpa_supplicant without password/SAE > works but when I use a SAE and a PW I cannot ping my nodes anymore. > > >> psk="test" > I had to use a password with at least 8 chars. > > In both cases I see the nodes in my station dump: > > NONE: > Station e8:94:f6:09:7e:7e (on mesh) > inactive time: 30 ms > rx bytes: 2663 > rx packets: 58 > tx bytes: 845 > tx packets: 9 > tx retries: 0 > tx failed: 0 > signal: -35 [-35] dBm > signal avg: -37 [-37] dBm > Toffset: 83832280 us > tx bitrate: 54.0 MBit/s > rx bitrate: 54.0 MBit/s > mesh llid: 0 > mesh plid: 0 > mesh plink: ESTAB > mesh local PS mode: ACTIVE > mesh peer PS mode: ACTIVE > mesh non-peer PS mode: ACTIVE > authorized: yes > authenticated: yes > preamble: long > WMM/WME: yes > MFP: no > TDLS peer: no > > SAE: > Station e8:94:f6:09:7e:7e (on mesh) > inactive time: 430 ms > rx bytes: 112353 > rx packets: 2147 > tx bytes: 1434 > tx packets: 15 > tx retries: 0 > tx failed: 0 > signal: -38 [-38] dBm > signal avg: -39 [-39] dBm > Toffset: 7226586 us > tx bitrate: 54.0 MBit/s > rx bitrate: 54.0 MBit/s > mesh llid: 0 > mesh plid: 0 > mesh plink: ESTAB > mesh local PS mode: ACTIVE > mesh peer PS mode: ACTIVE > mesh non-peer PS mode: ACTIVE > authorized: yes > authenticated: yes > preamble: long > WMM/WME: yes > MFP: yes > TDLS peer: no > > > But I cannot ping the nodes when I use SAE. > > My setup: > * BeagleBone black running Debian (Linux arm 4.2.0-rc6-bone2) > * TL-WN722N Wi-Fi sticks (Atheros HTC9k) > * WPA_supplicant from cozybit repo > (51dc99ba38510381b10e1ed56a2cb8ac7ef5814d) > > > Would be great if you can give me a hint... > > Best regards, > Marco > > > > >-----Ursprüngliche Nachricht----- > >Von: Devel [mailto:[email protected]] Im Auftrag von > >Thomas Pedersen via Devel > >Gesendet: Donnerstag, 07. April 2016 20:16 > >An: [email protected] > >Cc: Thomas Pedersen; [email protected] > >Betreff: Re: wpa_supplicant mesh issue > > > >+ o11s list, so I didn't trim anything. Small observation below. > > > >On Fri, Oct 16, 2015, at 02:50, Francesco Zanella wrote: > >> Hi all, > >> I'm trying to use wpa_supplicant 2.4 to set up a secure mesh network. > >> I use: > >> - IMX6 based board; > >> - Kernel 3.0.35; > >> - backports-4.2-rc1-1; > >> - wireless 5GHz net iface mounting Atheros AR9280. > >> > >> I successfully set up an open mesh using this conf file: > >> > >> *********** wpa_supplicant_AS.conf ********* > >> > >> ctrl_interface=/var/run/wpa_supplicant > >> ctrl_interface_group=adm > >> > >> # mpm on userspace > >> user_mpm=1 > >> > >> p2p_listen_reg_class=115 > >> p2p_listen_channel=36 > >> p2p_oper_reg_class=115 > >> p2p_oper_channel=48 > >> > >> # open mesh network > >> network={ > >> ssid="AS_m" > >> mode=5 > >> frequency=5765 > >> key_mgmt=NONE > >> } > >> ********************************************* > >> (I had to add p2p options, else I got error "P2P: Failed to select > >> random social channel as listen channel" because working on 5GHz). > >> > >> and running: > >> wpa_supplicant -d -D nl80211 -i wlan0 -c /etc/wpa_supplicant_AS.conf > >> -B > >> > >> I can see "mesh plink: ESTAB" in iw wlan0 station dump and I can ping > >> each other my 2 nodes. > >> > >> But when trying to use SAE with this conf file: > >> > >> *********** wpa_supplicant_AS.conf ********* > >> > >> ctrl_interface=/var/run/wpa_supplicant > >> ctrl_interface_group=adm > >> > >> # mpm on userspace > >> user_mpm=1 > >> > >> p2p_listen_reg_class=115 > >> p2p_listen_channel=36 > >> p2p_oper_reg_class=115 > >> p2p_oper_channel=48 > >> > >> # open mesh network > >> network={ > >> ssid="AS_m" > >> mode=5 > >> frequency=5765 > >> key_mgmt=SAE > >> psk="test" > >> } > >> ********************************************* > >> > >> it doesn't work, "mesh plink: LISTEN" and after some time BLOCKED ... > >> > >> Logs show 2 errors: > >> -nl80211: Station flush failed: ret=-22 (Invalid argument) > >> -nl80211: Beacon set failed: -95 (Operation not supported) but they > >> are present also in case of no SAE, so I think they are not the cause > >> of the issue. > >> > >> After initialization logs show: > >> > >> *********************** > >> nl80211: Drv Event 72 (NL80211_CMD_NEW_PEER_CANDIDATE) received for > >> wlan0 > >> nl80211: New peer candidate04:f0:21:17:ff:f5 > >> wlan0: Event NEW_PEER_CANDIDATE (49) received > >> wlan0: new peer notification for 04:f0:21:17:ff:f5 > >> New STA > >> ap_sta_add: register ap_handle_timer timeout for 04:f0:21:17:ff:f5 > >> (300 seconds - ap_max_inactivity) > >> HT: STA 04:f0:21:17:ff:f5 HT Capabilities Info: 0x11ce update_sta_ht > >> STA 04:f0:21:17:ff:f5 - no greenfield, num of non-gf stations 1 > >> hostapd_ht_operation_update current operation mode=0x0 > >> hostapd_ht_operation_update new operation mode=0x4 changes=1 > >> nl80211: Set beacon (beacon_set=0) > >> nl80211: Beacon head - hexdump(len=51): 80 00 00 00 ff ff ff ff ff ff > >> 04 > >> f0 21 10 0f 63 04 f0 21 10 09 > >> nl80211: Beacon tail - hexdump(len=74): 30 14 01 00 00 0f ac 04 01 00 > >> 00 0f ac 04 01 00 00 0f ac 08 00 > >> nl80211: ifindex=4 > >> nl80211: beacon_int=100 > >> nl80211: dtim_period=2 > >> nl80211: ssid - hexdump_ascii(len=0): > >> * beacon_int=100 > >> nl80211: hidden SSID not in use > >> nl80211: privacy=1 > >> nl80211: auth_algs=0x3 > >> nl80211: wpa_version=0x3 > >> nl80211: key_mgmt_suites=0x400 > >> nl80211: pairwise_ciphers=0x8 > >> nl80211: group_cipher=0x8 > >> nl80211: SMPS mode - off > >> nl80211: Beacon set failed: -95 (Operation not supported) Failed to > >> set beacon parameters > >> nl80211: Add STA 04:f0:21:17:ff:f5 > >> * supported rates - hexdump(len=8): 8c 12 98 24 b0 48 60 6c > >> * capability=0x0 > >> * ht_capabilities - hexdump(len=26): ce 11 1b ff ff 00 00 00 00 00 > >> 00 > >> 00 00 00 00 01 00 00 00 00 000 > >> * aid=1 (TDLS workaround) > >> * listen_interval=100 > >> * flags set=0x18 mask=0x38 > >> * qosinfo=0x0 > >> > >> wlan0: SME: Selected SAE group 19 > >> SAE: password - hexdump_ascii(len=8): [REMOVED] > >> SAE: PWE derivation - addr1=04:f0:21:10:0f:63 addr2=04:f0:21:17:ff:f5 > >> SAE: counter = 1 > >> SAE: pwd-seed - hexdump(len=32): [REMOVED] > >> SAE: pwd-value - hexdump(len=32): [REMOVED] > >> SAE: PWE found > >> SAE: Use this PWE > >> SAE: counter = 2 > >> SAE: pwd-seed - hexdump(len=32): [REMOVED] > >> SAE: pwd-value - hexdump(len=32): [REMOVED] > >> SAE: PWE found > >> SAE: Ignore this PWE (one was already selected) > >> SAE: counter = 3 > >> SAE: pwd-seed - hexdump(len=32): [REMOVED] > >> SAE: pwd-value - hexdump(len=32): [REMOVED] > >> SAE: PWE found > >> SAE: Ignore this PWE (one was already selected) > >> wlan0: AUTH: started authentication with SAE peer: 04:f0:21:17:ff:f5 > >> wlan0: State: SCANNING -> AUTHENTICATING > >> SAE: own commit-scalar - hexdump(len=32): 94 8e 86 6b 43 de 13 07 e1 > >> 50 bb 02 5b 8e 7c f3 30 51 ed 9a6 > >> SAE: own commit-element(x) - hexdump(len=32): 76 9b d3 2e 77 5d b8 89 > >> fb 7f 28 ad 0c fc b1 17 92 a5 da > >> SAE: own commit-element(y) - hexdump(len=32): 71 f2 bf 4e 1a 80 30 4e > >> 15 > >> e9 e2 5e 67 54 b9 f0 4c 9b 2d > >> authentication reply: STA=04:f0:21:17:ff:f5 auth_alg=3 > >> auth_transaction=1 resp=0 (IE len=98) > >> nl80211: send_mlme - da= 04:f0:21:17:ff:f5 noack=0 freq=0 no_cck=0 > >> offchanok=0 wait_time=0 fc=0xb0 (W7 > >> nl80211: send_mlme -> send_frame > >> nl80211: send_frame - Use bss->freq=5765 > >> nl80211: send_frame(freq=5765 bss->freq=5765) -> send_monitor > >> nl80211: No monitor socket available for nl80211_send_monitor > >> send_auth_reply: send > >> nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0 > >> nl80211: New station 04:f0:21:17:ff:f5 > >> > >> > >> SAE: own commit-scalar - hexdump(len=32): 94 8e 86 6b 43 de 13 07 e1 > >> 50 bb 02 5b 8e 7c f3 30 51 ed 9a6 > >> SAE: own commit-element(x) - hexdump(len=32): 76 9b d3 2e 77 5d b8 89 > >> fb 7f 28 ad 0c fc b1 17 92 a5 da > >> SAE: own commit-element(y) - hexdump(len=32): 71 f2 bf 4e 1a 80 30 4e > >> 15 > >> e9 e2 5e 67 54 b9 f0 4c 9b 2d > >> authentication reply: STA=04:f0:21:17:ff:f5 auth_alg=3 > >> auth_transaction=1 resp=0 (IE len=98) > >> nl80211: send_mlme - da= 04:f0:21:17:ff:f5 noack=0 freq=0 no_cck=0 > >> offchanok=0 wait_time=0 fc=0xb0 (W7 > >> nl80211: send_mlme -> send_frame > >> nl80211: send_frame - Use bss->freq=5765 > >> nl80211: send_frame(freq=5765 bss->freq=5765) -> send_monitor > >> nl80211: No monitor socket available for nl80211_send_monitor > >> ********************** > > > >Looks like drv->use_monitor is set here, which doesn't seem right. It > errors > >out anyway? Do you have use_monitor=1 in your wpa_supplicant.conf? > > > >> and after that it repeats the last part some times and then after some > >> seconds: > >> > >> ********************** > >> random: Got 3/3 bytes from /dev/random > >> AUTH: Re-authenticate with 04:f0:21:17:ff:f5 (attempt 0) > >> wlan0: MESH-SAE-AUTH-FAILURE addr=04:f0:21:17:ff:f5 > >> ********************** > >> > >> and then repeats all from "wlan0: SME: Selected SAE group 19" > >> > >> It tries 3 attempts and finally: > >> > >> ********************** > >> AUTH: Re-authenticate with 04:f0:21:17:ff:f5 (attempt 3) > >> wlan0: MESH-SAE-AUTH-FAILURE addr=04:f0:21:17:ff:f5 > >> wlan0: MPM set 04:f0:21:17:ff:f5 into BLOCKED > >> nl80211: Set STA 04:f0:21:17:ff:f5 > >> * flags set=0x0 mask=0x0 > >> wlan0: MESH-SAE-AUTH-BLOCKED addr=04:f0:21:17:ff:f5 duration=60 > >> *********************** > >> > >> > >> Could someone help me to understand and solve the issue? > >> I can provide the full logs if you need. > >> > >> Thank you in advance, > >> > >> Francesco > >> _______________________________________________ > >> HostAP mailing list > >> [email protected] > >> http://lists.shmoo.com/mailman/listinfo/hostap > > > > > >-- > >thomas > >_______________________________________________ > >Devel mailing list > >[email protected] > >http://lists.open80211s.org/mailman/listinfo/devel > _______________________________________________ > Devel mailing list > [email protected] > http://lists.open80211s.org/mailman/listinfo/devel >
_______________________________________________ Devel mailing list [email protected] http://lists.open80211s.org/mailman/listinfo/devel
