hostapd and bridging -> connection interrupt

Oliver Sorge hostap at tyrant.de
Wed Apr 5 15:47:34 EDT 2006


Hi,

On Tue, 4 Apr 2006 19:35:09 -0700
Jouni Malinen <jkmaline at cc.hut.fi> wrote:

> Can you please give more details of your configuration (hostapd.conf,
> bridge configuration) and 'dmesg' output showing these errors? Which
> kernel version are you using?

sure. 

##### bridge

iface br0 inet static
        address 10.10.11.100
        network 10.10.0.0
        netmask 255.255.0.0
        broadcast 10.10.255.255
        gateway 10.10.11.100
        bridge_ports eth0 ath0

##### hostapd.conf

interface=ath0
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=4
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=outworld
macaddr_acl=0
auth_algs=1
eapol_key_index_workaround=0
eap_server=0
own_ip_addr=127.0.0.1
wpa=1
wpa_passphrase=mortalKOMBAT
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP

##### hostapd

Configuration file: /etc/hostapd/hostapd.conf
ctrl_interface_group=0
Configure bridge br0 for EAPOL traffic.
madwifi_set_iface_flags: dev_up=0
Using interface ath0 with hwaddr 00:11:95:f2:2c:79 and ssid 'outworld'
SSID - hexdump_ascii(len=8):
     6f 75 74 77 6f 72 6c 64                           outworld
PSK (ASCII passphrase) - hexdump_ascii(len=12):
     6d 6f 72 74 61 6c 4b 4f 4d 42 41 54               mortalKOMBAT
PSK (from passphrase) - hexdump(len=32): 06 15 e0 a3 ac 07 57 24 03 9c 79 68 c6 27 da b9 7d 3d 2a df d5 5a 4e 41 9b 32 dd ef 52 11 34 73
madwifi_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=1
madwifi_configure_wpa: pairwise key ciphers=0x2
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA= 0x1
madwifi_set_iface_flags: dev_up=1
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=32): [REMOVED]
WPA: group state machine entering state SETKEYSDONE
madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
SIOCGIWRANGE: WE(compiled)=20 WE(source)=13 enc_capa=0xf
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
Failed to get HW features.
ath0: IEEE 802.11 Failed to get HW features.
Could not read hardware feature info from the kernel driver.
l2_packet_receive - recvfrom: Network is down
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:30:05:b3:57:42 IEEE 802.11: associated
  New STA
ath0: STA 00:30:05:b3:57:42 WPA: event 1 notification
madwifi_del_key: addr=00:30:05:b3:57:42 key_idx=0
ath0: STA 00:30:05:b3:57:42 WPA: start authentication
WPA: 00:30:05:b3:57:42 WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:30:05:b3:57:42 key_idx=0
ath0: STA 00:30:05:b3:57:42 IEEE 802.1X: unauthorizing port
WPA: 00:30:05:b3:57:42 WPA_PTK_GROUP entering state IDLE
WPA: 00:30:05:b3:57:42 WPA_PTK entering state AUTHENTICATION
WPA: 00:30:05:b3:57:42 WPA_PTK entering state AUTHENTICATION2
WPA: 00:30:05:b3:57:42 WPA_PTK entering state INITPSK
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKSTART
ath0: STA 00:30:05:b3:57:42 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 30 05 b3 57 42 00 11 95 f2 2c 79 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 19 1e 1d 31 00 46 5c fe 33 a9 79 d4 d4 5b 7c 5d 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ath0: STA 00:30:05:b3:57:42 WPA: EAPOL-Key timeout
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKSTART
ath0: STA 00:30:05:b3:57:42 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=0 ack=1 install=0 pairwise=1 ie_len=0 gtk_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 30 05 b3 57 42 00 11 95 f2 2c 79 88 8e 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 19 1e 1d 31 00 46 5c fe 33 a9 79 d4 d4 5b 7c 5d 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 123 bytes from 00:30:05:b3:57:42
   IEEE 802.1X: version=1 type=3 length=119
ath0: STA 00:30:05:b3:57:42 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32): [REMOVED]
PTK - hexdump(len=64): [REMOVED]
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:30:05:b3:57:42 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(secure=0 mic=1 ack=1 install=1 pairwise=1 ie_len=24 gtk_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=137): 00 30 05 b3 57 42 00 11 95 f2 2c 79 88 8e 02 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 03 19 1e 1d 31 00 46 5c fe 33 a9 79 d4 d4 5b 7c 5d 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea 9d 76 f2 d5 97 dd e9 01 81 dd aa be 81 be 1f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X: 99 bytes from 00:30:05:b3:57:42
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:30:05:b3:57:42 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:30:05:b3:57:42 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=TKIP addr=00:30:05:b3:57:42 key_idx=0
madwifi_set_sta_authorized: addr=00:30:05:b3:57:42 authorized=1
ath0: STA 00:30:05:b3:57:42 IEEE 802.1X: authorizing port
madwifi_sta_clear_stats: addr=00:30:05:b3:57:42
ath0: STA 00:30:05:b3:57:42 WPA: pairwise key handshake completed (WPA)
WPA: 00:30:05:b3:57:42 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:30:05:b3:57:42 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 ie_len=0 gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
TX EAPOL - hexdump(len=145): 00 30 05 b3 57 42 00 11 95 f2 2c 79 88 8e 02 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 19 1e 1d 31 00 46 5c fe 33 a9 79 d4 d4 5b 7c 5d 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4a 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 13 18 83 2f a7 d2 53 64 d1 ff df 59 be e4 06 00 20 d3 d8 09 c7 8a 2d be 2e d2 6b 8b 0f c7 ca a0 22 d2 56 49 b1 30 e9 07 77 dd 05 24 eb 32 49 af b4
ath0: STA 00:30:05:b3:57:42 WPA: EAPOL-Key timeout
WPA: 00:30:05:b3:57:42 WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:30:05:b3:57:42 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(secure=1 mic=1 ack=1 install=0 pairwise=0 ie_len=0 gtk_len=32 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=32): [REMOVED]
TX EAPOL - hexdump(len=145): 00 30 05 b3 57 42 00 11 95 f2 2c 79 88 8e 02 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 19 1e 1d 31 00 46 5c fe 33 a9 79 d4 d4 5b 7c 5d 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4a 8c 70 2f 27 c7 b8 b7 6d d5 13 ae fc 73 df 5e 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2a f4 b5 42 1e 1f b2 ea 9f cd 78 39 cb 71 a4 30 00 20 cb fe 39 ba 58 60 00 ac fe e0 0d ac 93 bb 09 ec 03 b2 f4 e9 31 3b d3 70 77 48 49 47 6a 64 18 2d
IEEE 802.1X: 99 bytes from 00:30:05:b3:57:42
   IEEE 802.1X: version=1 type=3 length=95
ath0: STA 00:30:05:b3:57:42 WPA: received EAPOL-Key frame (2/2 Group)
WPA: 00:30:05:b3:57:42 WPA_PTK_GROUP entering state REKEYESTABLISHED
ath0: STA 00:30:05:b3:57:42 WPA: group key handshake completed (WPA)
WPA: 00:30:05:b3:57:42 WPA_PTK_GROUP entering state IDLE
Checking STA 00:30:05:b3:57:42 inactivity:
  Station has been active


##### daemon.log

Apr  4 21:01:45 rayden hostapd: ath0: STA 00:30:05:b3:57:42 IEEE 802.11: associated
Apr  4 21:01:46 rayden hostapd: ath0: STA 00:30:05:b3:57:42 WPA: pairwise key handshake completed (WPA)
Apr  4 21:01:47 rayden hostapd: ath0: STA 00:30:05:b3:57:42 WPA: group key handshake completed (WPA)
Apr  4 21:01:47 rayden dhcpd: DHCPREQUEST for 10.10.10.40 from 00:30:05:b3:57:42 via br0
Apr  4 21:01:47 rayden dhcpd: DHCPACK on 10.10.10.40 to 00:30:05:b3:57:42 via br0


##### ping

tyrant at rayden:~$ ping 10.10.10.40
PING 10.10.10.40 (10.10.10.40) 56(84) bytes of data.
64 bytes from 10.10.10.40: icmp_seq=1 ttl=128 time=5.80 ms
64 bytes from 10.10.10.40: icmp_seq=2 ttl=128 time=2.99 ms
64 bytes from 10.10.10.40: icmp_seq=3 ttl=128 time=3.21 ms
64 bytes from 10.10.10.40: icmp_seq=4 ttl=128 time=8.80 ms
64 bytes from 10.10.10.40: icmp_seq=5 ttl=128 time=5.60 ms
64 bytes from 10.10.10.40: icmp_seq=6 ttl=128 time=5.46 ms
64 bytes from 10.10.10.40: icmp_seq=7 ttl=128 time=5.43 ms
64 bytes from 10.10.10.40: icmp_seq=8 ttl=128 time=5.56 ms
64 bytes from 10.10.10.40: icmp_seq=9 ttl=128 time=5.50 ms
64 bytes from 10.10.10.40: icmp_seq=10 ttl=128 time=5.88 ms
64 bytes from 10.10.10.40: icmp_seq=11 ttl=128 time=5.54 ms
64 bytes from 10.10.10.40: icmp_seq=12 ttl=128 time=5.55 ms
64 bytes from 10.10.10.40: icmp_seq=13 ttl=128 time=5.51 ms
64 bytes from 10.10.10.40: icmp_seq=15 ttl=128 time=5.36 ms
64 bytes from 10.10.10.40: icmp_seq=16 ttl=128 time=5.51 ms
64 bytes from 10.10.10.40: icmp_seq=17 ttl=128 time=5.76 ms
64 bytes from 10.10.10.40: icmp_seq=18 ttl=128 time=5.65 ms
64 bytes from 10.10.10.40: icmp_seq=19 ttl=128 time=5.55 ms
64 bytes from 10.10.10.40: icmp_seq=20 ttl=128 time=5.87 ms
64 bytes from 10.10.10.40: icmp_seq=105 ttl=128 time=16.3 ms
64 bytes from 10.10.10.40: icmp_seq=185 ttl=128 time=7.97 ms
64 bytes from 10.10.10.40: icmp_seq=206 ttl=128 time=18.8 ms
64 bytes from 10.10.10.40: icmp_seq=223 ttl=128 time=24.6 ms
64 bytes from 10.10.10.40: icmp_seq=549 ttl=128 time=18.6 ms
64 bytes from 10.10.10.40: icmp_seq=582 ttl=128 time=16.4 ms
64 bytes from 10.10.10.40: icmp_seq=592 ttl=128 time=7.44 ms
64 bytes from 10.10.10.40: icmp_seq=593 ttl=128 time=5.64 ms
64 bytes from 10.10.10.40: icmp_seq=594 ttl=128 time=5.52 ms
64 bytes from 10.10.10.40: icmp_seq=595 ttl=128 time=3.31 ms
64 bytes from 10.10.10.40: icmp_seq=596 ttl=128 time=3.01 ms
64 bytes from 10.10.10.40: icmp_seq=597 ttl=128 time=3.25 ms
64 bytes from 10.10.10.40: icmp_seq=598 ttl=128 time=5.80 ms
64 bytes from 10.10.10.40: icmp_seq=599 ttl=128 time=6.40 ms
64 bytes from 10.10.10.40: icmp_seq=600 ttl=128 time=5.42 ms
64 bytes from 10.10.10.40: icmp_seq=601 ttl=128 time=5.37 ms
64 bytes from 10.10.10.40: icmp_seq=602 ttl=128 time=5.42 ms
64 bytes from 10.10.10.40: icmp_seq=603 ttl=128 time=5.53 ms
64 bytes from 10.10.10.40: icmp_seq=604 ttl=128 time=5.45 ms
64 bytes from 10.10.10.40: icmp_seq=605 ttl=128 time=5.40 ms
64 bytes from 10.10.10.40: icmp_seq=606 ttl=128 time=5.66 ms
64 bytes from 10.10.10.40: icmp_seq=608 ttl=128 time=5.51 ms
64 bytes from 10.10.10.40: icmp_seq=609 ttl=128 time=5.99 ms
64 bytes from 10.10.10.40: icmp_seq=610 ttl=128 time=5.44 ms
64 bytes from 10.10.10.40: icmp_seq=611 ttl=128 time=5.49 ms
64 bytes from 10.10.10.40: icmp_seq=612 ttl=128 time=6.42 ms
64 bytes from 10.10.10.40: icmp_seq=613 ttl=128 time=5.49 ms
64 bytes from 10.10.10.40: icmp_seq=614 ttl=128 time=5.94 ms
64 bytes from 10.10.10.40: icmp_seq=615 ttl=128 time=5.71 ms
64 bytes from 10.10.10.40: icmp_seq=616 ttl=128 time=11.5 ms
64 bytes from 10.10.10.40: icmp_seq=662 ttl=128 time=12.4 ms
64 bytes from 10.10.10.40: icmp_seq=670 ttl=128 time=9.44 ms

--- 10.10.10.40 ping statistics ---
678 packets transmitted, 51 received, 92% packet loss, time 678222ms
rtt min/avg/max/mdev = 2.994/7.172/24.661/4.356 ms

-- 
 .''`.     Oliver Sorge <oliver at dediziert.org>
: :'  :    proud Debian admin and user since 2001
`. `'`
  `-  Debian - when you have better things to do than fix a system



More information about the HostAP mailing list