This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1718688

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1718688

Title:
  Can't connect to a Cisco AP with Wi-Fi Direct Client Policy enabled

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  There is a setting available on selected Cisco hardware named "Wi-Fi
  Direct Client Policy". One of the allowed option there is 'not-allow'.
  It's intention is to block WiFi P2P capable devices from connecting to
  it. If a device trying to associate with an AP with this setting
  enabled is identified as "P2P capable" it gets blacklisted (I believe
  for a preconfigured time). More info about the option available at [1]
  and [2].

  This leads to a situation that it is impossible to connect to certain
  APs using certain WiFi chips using iwlwifi driver. I was able to
  determine that this at least affects Intel 8260 chip.

  What's going on on the WiFi level is:
  The AP broadcasts beacon frames with P2P IE:
  Tag: Vendor Specific: Wi-FiAll: P2P
      Tag Number: Vendor Specific (221)
      Tag length: 8
      OUI: 50-6f-9a (Wi-FiAll)
      Vendor Specific OUI Type: 9
      P2P Manageability: Bitmap field 0x5
          Attribute Type: P2P Manageability (10)
          Attribute Length: 1
          Manageability Bitmap field: 0x05
          .... ...1 = P2P Device Management: 0x1
          .... ..0. = Cross Connection Permitted: 0x0
          .... .1.. = Coexistence Optional: 0x1

  The client then sends a Probe Request, also with a P2P IE in it:
  Tag: Vendor Specific: Wi-FiAll: P2P
      Tag Number: Vendor Specific (221)
      Tag length: 17
      OUI: 50-6f-9a (Wi-FiAll)
      Vendor Specific OUI Type: 9
      P2P Capability: Device 0x25  Group 0x0
          Attribute Type: P2P Capability (2)
          Attribute Length: 2
          Device Capability Bitmap: 0x25
          .... ...1 = Service Discovery: 0x1
          .... ..0. = P2P Client Discoverability: 0x0
          .... .1.. = Concurrent Operation: 0x1
          .... 0... = P2P Infrastructure Managed: 0x0
          ...0 .... = P2P Device Limit: 0x0
          ..1. .... = P2P Invitation Procedure: 0x1
          Group Capability Bitmap: 0x00
          .... ...0 = P2P Group Owner: 0x0
          .... ..0. = Persistent P2P Group: 0x0
          .... .0.. = P2P Group Limit: 0x0
          .... 0... = Intra-BSS Distribution: 0x0
          ...0 .... = Cross Connection: 0x0
          ..0. .... = Persistent Reconnect: 0x0
          .0.. .... = Group Formation: 0x0
      Listen Channel: Operating Class 81  Channel Number 1
          Attribute Type: Listen Channel (6)
          Attribute Length: 5
          Country String: XX\004
          Operating Class: 81
          Channel Number: 1

  The AP never replies to that Probe Request and blacklists the device
  for a given period of time from all communication.

  I was able to test a custom kernel with all P2P interfaces commented
  out from iwlwifi/mvm/mac80211.c - it was able to connect to the AP
  without any issues.

  For instance this issue does not affect bcm43224 device running with
  brcm80211 - in this case the client device sends a Probe Request
  without the P2P IE. Despite it's is actually P2P-capable the AP does
  not recognize it as such and allows it to connect.

  I have also started a mailing list thread about it [3].

  What I think could fix it is either:
  * making it behave more like the broadcom driver so it allows users to connect
  * provide an user-friendly option of disabling p2p capabilites (including 
transmitting probe reuqests without P2P IE)
  * as suggested on the ML [4] implement sections 3.4.3/3.4.4 of the WiFi 
Direct spec in the driver

  According to my knowledge it affects all currently supported releases:
  Trusty, Xenial, Zesty plus Artful.

  [1] 
https://supportforums.cisco.com/t5/security-and-network-management/wi-fi-direct-client-policy/td-p/2253033
  [2] 
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010111110.html
  [3] https://marc.info/?l=linux-wireless&m=150306048824814&w=2
  [4] https://marc.info/?l=linux-wireless&m=150461784431430&w=2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1718688/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to