> -----Original Message-----
> From: Dan Williams [mailto:[email protected]]
> Sent: Thursday, May 18, 2017 1:31 PM
> To: Matthew Starr; [email protected]
> Subject: Re: Network Manager 1.0.X Wi-Fi Autoconnect Issues
>
> On Thu, 2017-05-18 at 15:54 +0000, Matthew Starr wrote:
> > I have tried using NetworkManager 1.0.0 and 1.0.12 on an embedded
> > device built with buildroot that has Ethernet (eth0), Wi-Fi client
> > (mlan0), Wi-Fi Access Point (uap0), and Cellular interfaces (ttyACM0
> > and ppp0). The Wi-Fi AP (uap0) interface is ignored by Network
> > Manager based on my NetworkManager.conf file. I am able to boot the
> > device and Network Manager will automatically configure and connect
> > with Ethernet, Wi-Fi Client, and Cellular interfaces every time.
> >
> > If I move out of range of the Wi-Fi access point the device will
> > disconnect and if I move back into range in under an hour,
> > NetworkManager will reestablish the connection. If I wait multiple
> > hours before moving back into range of the Wi-Fi access point, Network
> > Manager will not reestablish a connection automatically with the
> > access point (I waited hours with the AP within range and visible in
> > Wi-Fi scan results). When Network Manager is not automatically
> > reestablishing a connection to the access point I can use nmcli to
> > bring up the profile associated with the access point and it connects
> > immediately.
> >
> > Why is Network Manager not able to auto connect to a Wi-Fi AP after a
> > longer period of time of not seeing the AP? Is there a timeout within
> > Network Manager? Is this a bug?
>
> Like you say, it does look like NM is trying to auto-activate the connection,
> but it's not doing it correctly. The most likely thing happening is that it
> does
> try to activate, but it's not able to find the "best" connection for the
> device.
> Somehow the existing WiFi connection profile isn't matching.
>
> Can you run 'nmcli con show <name of connection you expect to start>'?
Dan,
This issue has occurred on several different access point I have attempted to
connect to all from different vendors (Linksys, Ubiquiti, D-link).
Here is the output for my connection profile for one of them:
# nmcli con show linksys-hed-test
connection.id: linksys-hed-test
connection.uuid: 3a3fdd49-c624-42a3-acbd-135f728c9621
connection.interface-name: mlan0
connection.type: 802-11-wireless
connection.autoconnect: yes
connection.autoconnect-priority: 0
connection.timestamp: 1495132442
connection.read-only: no
connection.permissions:
connection.zone: --
connection.master: --
connection.slave-type: --
connection.secondaries:
connection.gateway-ping-timeout: 0
802-11-wireless.ssid: linksys-hed-test
802-11-wireless.mode: --
802-11-wireless.band: --
802-11-wireless.channel: 0
802-11-wireless.bssid: --
802-11-wireless.rate: 0
802-11-wireless.tx-power: 0
802-11-wireless.mac-address: --
802-11-wireless.cloned-mac-address: --
802-11-wireless.mac-address-blacklist:
802-11-wireless.mtu: auto
802-11-wireless.seen-bssids:
802-11-wireless.hidden: no
802-11-wireless-security.key-mgmt: wpa-psk
802-11-wireless-security.wep-tx-keyidx: 0
802-11-wireless-security.auth-alg: --
802-11-wireless-security.proto:
802-11-wireless-security.pairwise:
802-11-wireless-security.group:
802-11-wireless-security.leap-username: --
802-11-wireless-security.wep-key0: <hidden>
802-11-wireless-security.wep-key1: <hidden>
802-11-wireless-security.wep-key2: <hidden>
802-11-wireless-security.wep-key3: <hidden>
802-11-wireless-security.wep-key-flags: 0 (none)
802-11-wireless-security.wep-key-type: 0 (unknown)
802-11-wireless-security.psk: <hidden>
802-11-wireless-security.psk-flags: 0 (none)
802-11-wireless-security.leap-password: <hidden>
802-11-wireless-security.leap-password-flags:0 (none)
ipv4.method: auto
ipv4.dns:
ipv4.dns-search:
ipv4.addresses:
ipv4.gateway: --
ipv4.routes:
ipv4.route-metric: -1
ipv4.ignore-auto-routes: no
ipv4.ignore-auto-dns: no
ipv4.dhcp-client-id: --
ipv4.dhcp-send-hostname: yes
ipv4.dhcp-hostname: --
ipv4.never-default: no
ipv4.may-fail: yes
ipv6.method: auto
ipv6.dns:
ipv6.dns-search:
ipv6.addresses:
ipv6.gateway: --
ipv6.routes:
ipv6.route-metric: -1
ipv6.ignore-auto-routes: no
ipv6.ignore-auto-dns: no
ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
GENERAL.NAME: linksys-hed-test
GENERAL.UUID: 3a3fdd49-c624-42a3-acbd-135f728c9621
GENERAL.DEVICES: mlan0
GENERAL.STATE: activated
GENERAL.DEFAULT: yes
GENERAL.DEFAULT6: no
GENERAL.VPN: no
GENERAL.ZONE: --
GENERAL.DBUS-PATH:
/org/freedesktop/NetworkManager/ActiveConnection/14
GENERAL.CON-PATH:
/org/freedesktop/NetworkManager/Settings/8
GENERAL.SPEC-OBJECT:
/org/freedesktop/NetworkManager/AccessPoint/6717
GENERAL.MASTER-PATH: --
IP4.ADDRESS[1]: 192.168.20.103/24
IP4.GATEWAY: 192.168.20.1
IP4.DNS[1]: 192.168.1.2
DHCP4.OPTION[1]: network_number = 192.168.20.0
DHCP4.OPTION[2]: dhcp_server_identifier = 192.168.20.1
DHCP4.OPTION[3]: ifmtu = 1500
DHCP4.OPTION[4]: skip_hooks = lookup-hostname
DHCP4.OPTION[5]: if_up = true
DHCP4.OPTION[6]: subnet_cidr = 24
DHCP4.OPTION[7]: ifcarrier = up
DHCP4.OPTION[8]: broadcast_address = 255.255.255.255
DHCP4.OPTION[9]: ifmetric = 306
DHCP4.OPTION[10]: dhcp_message_type = 5
DHCP4.OPTION[11]: ifwireless = 1
DHCP4.OPTION[12]: dhcp_lease_time = 86400
DHCP4.OPTION[13]: ip_address = 192.168.20.103
DHCP4.OPTION[14]: routers = 192.168.20.1
DHCP4.OPTION[15]: subnet_mask = 255.255.255.0
DHCP4.OPTION[16]: domain_name_servers = 192.168.1.2
DHCP4.OPTION[17]: ifssid = linksys-hed-test
DHCP4.OPTION[18]: interface_order = mlan0
DHCP4.OPTION[19]: if_oneup = true
DHCP4.OPTION[20]: if_ipwaited = true
DHCP4.OPTION[21]: ifflags = 4163
DHCP4.OPTION[22]: if_down = false
IP6.ADDRESS[1]: fe80::d6ca:6eff:fe33:25e5/64
IP6.GATEWAY:
>
> Also, 'iw dev mlan0 scan dump', find the block for the expected AP, and
> report that. Feel free to replace the BSSID with xs or something if you want
> to hide it.
Here are two of the access points I have used for testing:
BSS 00:25:9c:53:2f:9e(on mlan0) -- associated
TSF: 2339114597780 usec (27d, 01:45:14)
freq: 2437
beacon interval: 100 TUs
capability: ESS Privacy ShortPreamble ShortSlotTime (0x0431)
signal: -40.00 dBm
last seen: 390 ms ago
SSID: linksys-hed-test
Supported rates: 1.0* 2.0* 5.5* 11.0* 6.0 9.0 12.0 18.0
DS Parameter set: channel 6
RSN: * Version: 1
* Group cipher: CCMP
* Pairwise ciphers: CCMP
* Authentication suites: PSK
* Capabilities: 1-PTKSA-RC 1-GTKSA-RC (0x0000)
ERP: <no flags>
Extended supported rates: 24.0 36.0 48.0 54.0
WPS: * Version: 1.0
* Wi-Fi Protected Setup State: 2 (Configured)
* Response Type: 3 (AP)
* UUID: 00000000-0000-1000-0000-00259c532f9e
* Manufacturer: Linksys Inc.
* Model: WRT54G2
* Model Number: v1.5.01
* Serial Number: 0
* Primary Device Type: 6-0050f204-1
* Device name: WRT54G2
* Config methods: Label, PBC
* RF Bands: 0x1
BSS 24:a4:3c:55:76:60(on mlan0)
TSF: 2339114597752 usec (27d, 01:45:14)
freq: 2412
beacon interval: 100 TUs
capability: ESS Privacy ShortPreamble ShortSlotTime (0x0431)
signal: -71.00 dBm
last seen: 390 ms ago
SSID: TEST-WIFI
Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0* 36.0 54.0
DS Parameter set: channel 1
ERP: <no flags>
ERP D4.0: <no flags>
RSN: * Version: 1
* Group cipher: CCMP
* Pairwise ciphers: CCMP
* Authentication suites: PSK
* Capabilities: 16-PTKSA-RC 1-GTKSA-RC (0x000c)
Extended supported rates: 6.0* 9.0 12.0* 48.0
HT capabilities:
Capabilities: 0x19ad
RX LDPC
HT20
SM Power Save disabled
RX HT20 SGI
TX STBC
RX STBC 1-stream
Max AMSDU length: 7935 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 4 usec (0x05)
HT RX MCS rate indexes supported: 0-23
HT TX MCS rate indexes are undefined
HT operation:
* primary channel: 1
* secondary channel offset: no secondary
* STA channel width: 20 MHz
* RIFS: 1
* HT protection: no
* non-GF present: 1
* OBSS non-GF present: 0
* dual beacon: 0
* dual CTS protection: 0
* STBC beacon: 0
* L-SIG TXOP Prot: 0
* PCO active: 0
* PCO phase: 0
Extended capabilities: Extended Channel Switching, 6
WPA: * Version: 1
* Group cipher: CCMP
* Pairwise ciphers: CCMP
* Authentication suites: PSK
WMM: * Parameter version 1
* BE: CW 15-1023, AIFSN 3
* BK: CW 15-1023, AIFSN 7
* VI: CW 7-15, AIFSN 2, TXOP 3008 usec
* VO: CW 3-7, AIFSN 2, TXOP 1504 usec
>
> My best guess is a mismatch between the AP's beacon/properties and the
> connection somehow.
>
> Dan
>
_______________________________________________
networkmanager-list mailing list
[email protected]
https://mail.gnome.org/mailman/listinfo/networkmanager-list