WPA Supplicant on Bridge Disconnect event every 5 seconds

Joel Lindsay joel at waveteq.com
Wed May 16 20:17:07 EDT 2007


Hi,

I seem to be authenticating with wpa_psk properly, but every 5 seconds it 
seems as though a control event is sent to disconnect.  I am using the 
latest version of wpa_supplicant.

The interface is on a bridge and I am starting it with

wpa_supplicant -Dmadwifi -iath0 -bbr0 -c/wpa_supplicant.cfg

My log looks like this.

[WaveteqCPE /]# cat /var/log/messages
<30>Jan  1 00:05:40 wpa_supplicant[220]: CTRL-EVENT-CONNECTED - Connection 
to 00
:0b:6b:36:b7:df completed (reauth) [id=0 id_str=]
<30>Jan  1 00:05:43 wpa_supplicant[220]: CTRL-EVENT-DISCONNECTED - 
Disconnect ev
ent - remove keys
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: RUN -> AUTH
<14>Jan  1 00:05:43 kernel: br0: port 2(ath0) entering disabled state
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan  1 00:05:43 last message repeated 7 time(s)
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan  1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie: 
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: ASSOC -> AUTH
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan  1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie: 
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan  1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] assoc success: short 
pream
ble, short slot time, fast-frames
<12>Jan  1 00:05:43 kernel: ath0: __ieee80211_newstate: ASSOC -> RUN
<30>Jan  1 00:05:43 wpa_supplicant[220]: Associated with 00:0b:6b:36:b7:df
<14>Jan  1 00:05:44 kernel: br0: port 2(ath0) entering learning state
<14>Jan  1 00:05:44 kernel: br0: topology change detected, propagating
<14>Jan  1 00:05:44 kernel: br0: port 2(ath0) entering forwarding state
<30>Jan  1 00:05:44 wpa_supplicant[220]: WPA: Key negotiation completed with 
00:
0b:6b:36:b7:df [PTK=TKIP GTK=TKIP]
<30>Jan  1 00:05:44 wpa_supplicant[220]: CTRL-EVENT-CONNECTED - Connection 
to 00
:0b:6b:36:b7:df completed (reauth) [id=0 id_str=]
<30>Jan  1 00:05:49 wpa_supplicant[220]: CTRL-EVENT-DISCONNECTED - 
Disconnect ev
ent - remove keys
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: RUN -> AUTH
<14>Jan  1 00:05:49 kernel: br0: port 2(ath0) entering disabled state
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan  1 00:05:49 last message repeated 13 time(s)
<30>Jan  1 00:05:49 wpa_supplicant[220]: Associated with 00:0b:6b:36:b7:df
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan  1 00:05:49 last message repeated 8 time(s)
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan  1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie: 
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: ASSOC -> AUTH
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan  1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie: 
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan  1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] assoc success: short 
pream
ble, short slot time, fast-frames
<12>Jan  1 00:05:49 kernel: ath0: __ieee80211_newstate: ASSOC -> RUN
<14>Jan  1 00:05:50 kernel: br0: port 2(ath0) entering learning state
<14>Jan  1 00:05:50 kernel: br0: topology change detected, propagating
<14>Jan  1 00:05:50 kernel: br0: port 2(ath0) entering forwarding state

Any help appreciated.


Joel Lindsay, B.Eng
Project Engineer
WaveTeq Communications
(250) 766-9229 




More information about the HostAP mailing list