WPA_supplicant trouble connecting client to AP

Francisco Cuesta ndarkness at gmail.com
Thu May 16 04:41:43 EDT 2013


2013/5/15 Dan Williams <dcbw at redhat.com>:
> On Wed, 2013-05-15 at 16:44 +0200, Francisco Cuesta wrote:
>> 2013/5/15 Dan Williams <dcbw at redhat.com>:
>> > On Wed, 2013-05-15 at 16:17 +0200, Francisco Cuesta wrote:
>> >> 2013/5/15 Dan Williams <dcbw at redhat.com>:
>> >> > On Wed, 2013-05-15 at 14:01 +0200, Francisco Cuesta wrote:
>> >> >> Hi Jouni,
>> >> >>
>> >> >> >Which wpa_supplicant are you using?
>> >> >>
>> >> >> I'm currently using wpa_supplicant v2.0-devel
>> >> >>
>> >> >> >What is this fixed_freq parameter? It sounds like this wpa_supplicant
>> >> >> >version has some changes that do not exist in hostap.git and as such, it
>> >> >> >is unclear how it behaves.
>> >> >>
>> >> >> This parameters I think represent that the frequency of the AP is
>> >> >> already fixed. This wpa_supplicant configuration file is parsed from a
>> >> >> generic wpa_supplicant configuration, this is done in this way in
>> >> >> OpenWRT; they launches hostapd which parses  this generic file and
>> >> >> calls wpa_supplicant with it.
>> >> >
>> >> > His point is that fixed_freq is *not* an option in the official
>> >> > hostap/wpa_supplicant sources, so whatever you're running, it's been
>> >> > modified by whoever you got it from.
>> >> >
>> >>
>> >>
>> >> >> >How do you know what it does after this? The -B option on the command
>> >> >> >line requests wpa_supplicant to move into the background and that stops
>> >> >> >the debug log to stdout. If you want to see after this, you would need
>> >> >> >to either direct the log to a file or syslog or remove the -B option.
>> >> >>
>> >> >> I've followed your advice, and I have disabled the -B option and now I
>> >> >> get more output once I launch wpa_supplicant, which is this one
>> >> >>
>> >> >> wlan1: State: DISCONNECTED -> SCANNING
>> >> >> Scan SSID - hexdump_ascii(len=18):
>> >> >>      69 72 74 2d 61 68 2d 69 6e 72 69 61 2d 73 69 65   X-X-X-X
>> >> >>      62 65                                             -X
>> >> >> wlan1: Starting AP scan for wildcard SSID
>> >> >> nl80211: Scan SSID - hexdump_ascii(len=18):
>> >> >>      69 72 74 2d 61 68 2d 69 6e 72 69 61 2d 73 69 65   X-X-X-X
>> >> >>      62 65                                             -X
>> >> >> nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
>> >> >> Scan requested (ret=0) - scan timeout 30 seconds
>> >> >> nl80211: Event message available
>> >> >> nl80211: Scan trigger
>> >> >> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> >> >> netlink: Operstate: linkmode=-1, operstate=6
>> >> >> The num-Xr of sent bytes  in netlink_send_oper_ifla are 37
>> >> >> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
>> >> >> nl80211: if_removed already cleared - ignore event
>> >> >> nl80211: Event message available
>> >> >> nl80211: New scan results available
>> >> >> wlan1: Event SCAN_RESULTS (3) received
>> >> >> nl80211: Received scan results (1 BSSes)
>> >> >> wlan1: BSS: Start scan result update 6
>> >> >> BSS: last_scan_res_used=1/32 last_scan_full=0
>> >> >> wlan1: New scan results available
>> >> >> wlan1: Selecting BSS from priority group 0
>> >> >> wlan1: 0: 64:70:02:3e:a7:82 ssid='X-X-X-X-X' wpa_ie_len=0 rsn_ie_len=0
>> >> >> caps=0x1 level=-70
>> >> >> A BSSID in blacklist is this: 4896660
>> >> >> The BSSID of blacklist selected is this: 4896660
>> >> >
>> >> > These messages are also not part of official hostap/wpa_supplicant, so
>> >> > your version has been patched by somebody, and that may be introducing
>> >> > new bugs.
>> >> >
>> >>
>> >> What messages do you refer to? The X-X-X... which appears there, I
>> >> have set it by myself, as well I have put some extra printf in the
>> >> code to see the running sequence
>> >
>> > I mean the "A BSSID in the blacklist" messages.  Are those your local
>> > modifications?
>> >
>>
>> Yes they're, I added a prinrf on the code.
>>
>> >> >> wlan1:    skip - blacklisted (count=1 limit=0)
>> >> >> wlan1: No APs found - clear blacklist and try again
>> >> >> Removed BSSID 64:70:02:3e:a7:82 from blacklist (clear)
>> >> >> wlan1: Selecting BSS from priority group 0
>> >> >> wlan1: 0: 64:70:02:3e:a7:82 ssid='X-X-X-X-X' wpa_ie_len=0 rsn_ie_len=0
>> >> >> caps=0x1 level=-70
>> >> >> wlan1:    allow in non-WPA/WPA2
>> >> >> The channel that wpa_s struct has got is 36
>> >> >> The frequency that wpa_s struct has got is 5180 MHz
>> >> >> The set channel on rate_match function is 2364476
>> >> >> The set frequency on rate_match function is 5180 MHz
>> >> >> The set frequency on rate_match function is 5180 MHz
>> >> >> The comparison freq == bss->freq is true
>> >> >> wlan1:    selected BSS 64:70:02:3e:a7:82 ssid='X-X-X-X-X'
>> >> >> wlan1: Request association: reassociate: 0  selected:
>> >> >> 64:70:02:3e:a7:82  bssid: 00:00:00:00:00:00  pending:
>> >> >> 00:00:00:00:00:00  wpa_state: SCANNING
>> >> >> wlan1: Automatic auth_alg selection: 0x1
>> >> >> wlan1: WPA: clearing AP WPA IE
>> >> >> wlan1: WPA: clearing AP RSN IE
>> >> >> wlan1: WPA: clearing own WPA/RSN IE
>> >> >> wlan1: Cancelling scan request
>> >> >> wlan1: SME: Trying to authenticate with 64:70:02:3e:a7:82
>> >> >> (SSID='X-X-X-X-X' freq=5180 MHz)
>> >> >> wlan1: No keys have -Xen configured - skip key clearing
>> >> >> wlan1: State: SCANNING -> AUTHENTICATING
>> >> >> nl80211: Authenticate (ifindex=33)
>> >> >>   * bssid=64:70:02:3e:a7:82
>> >> >>   * freq=5180
>> >> >>   * SSID - hexdump_ascii(len=18):
>> >> >>      69 72 74 2d 61 68 2d 69 6e 72 69 61 2d 73 69 65   X-X-X-X
>> >> >>      62 65                                             -X
>> >> >>   * IEs - hexdump(len=0): [NULL]
>> >> >>   * Auth Type 0
>> >> >> nl80211: Authentication request send successfully
>> >> >> wlan1: Checking for other virtual interfaces sharing same radio (phy1)
>> >> >> in event_scan_results
>> >> >> nl80211: Event message available
>> >> >> nl80211: New station 64:70:02:3e:a7:82
>> >> >> nl80211: Event message available
>> >> >> nl80211: Delete station 64:70:02:3e:a7:82
>> >> >> nl80211: Event message available
>> >> >> nl80211: MLME event 37; timeout with 64:70:02:3e:a7:82
>> >> >> wlan1: Event AUTH_TIMED_OUT (14) received
>> >> >> wlan1: SME: Authentication timed out
>> >> >
>> >> > This indicates that the kernel driver has not been able to authenticate
>> >> > with the AP, so the problem may be due to kernel driver issues.  Which
>> >> > kernel are you using and which wifi driver?
>> >> >
>> >>
>> >> I'm using a linux kernel which is 3.3.8. The wifi devices are an
>> >> atheros AR9341 (integrated
>> >> 2.4ghz) + AR9580 (5ghz) (onboard), both devices are managed with ath9k
>> >> driver plus compat wireless drivers called compat-wireless-2012-09-07.
>> >
>> > That kernel version is pretty old; are you able to try a newer one like
>> > 3.8.x or 3.9.x?  Plus you might want to update your compat-wireless as
>> > well; a lot happens in 8 months.  In any case, I'm not as familiar with
>> > the ath9k drivers as Jouni or others are so I'll let them answer about
>> > the state of compat-wireless from Sept 2012 and the 3.3.8 kernel.
>> >
>> I see, I'm afraid not, because that is the kernel that the latest
>> version of openwrt has, and I don't now how it might be updated.
>> Thanks for your replies, I'll wait for their replies in such a
>> matters.
>>
>>
>> >> Could you tell me where in the kernel driver are defined the channels
>> >> that might be authenticated with the AP?
>> >
>> > It's a state machine, so there aren't any channels.  The kernel driver
>> > and the kernel mac80211 stack do quite a few operations during the
>> > association process so if you're able to turn on kernel debugging, or if
>> > you have any kernel log messages from 'dmesg' that would be helpful.
>> >
>>  I have issued the dmesg command getting this
>>
>>  wlan1: authentication with 64:70:02:3e:a7:82 timed out
>> [  191.470000] wlan1: authenticate with 64:70:02:3e:a7:82
>> [  191.480000] wlan1: send auth to 64:70:02:3e:a7:82 (try 1/3)
>> [  191.700000] wlan1: send auth to 64:70:02:3e:a7:82 (try 2/3)
>> [  191.910000] wlan1: send auth to 64:70:02:3e:a7:82 (try 3/3)
>> [  192.120000] wlan1: authentication with 64:70:02:3e:a7:82 timed out
>> [  195.590000] wlan1: authenticate with 64:70:02:3e:a7:82
>> [  195.600000] wlan1: send auth to 64:70:02:3e:a7:82 (try 1/3)
>> [  195.820000] wlan1: send auth to 64:70:02:3e:a7:82 (try 2/3)
>> [  196.030000] wlan1: send auth to 64:70:02:3e:a7:82 (try 3/3)
>
> Yeah, this says that the driver doesn't see any response from the AP.
> The next thing you get to do is to sniff frames using a different
> machine to see if the AP actually does reply, which would indicate that
> the driver is busted.  But again, a driver/stack from Sept 2012 is
> pretty old, and if there was a bug, it may well have been fixed long
> since.
>

I see , another question, can this error be also due to the client
frequency is different from the AP one? I  say this, because I've seen
on the wpa supplicant debug

nl80211: Authenticate (ifindex=17)
  * bssid=64:70:02:3e:a7:82
  * freq=5180 <----------------------------------------THIS

But such a frequency is not the one in which the AP is working
in...I've read that wpa_supplicant wpa_ssid->frequency always starts
in the initial channel of the working band, so I guess that as the
possible reason for the above frequency, but I'm not sure since that
frequency is set in the driver (nl80211), isn't it?

Thanks

> Dan
>
>> ... and so on
>>
>> but I think that is not enough, so I'll need a way of enabling debug
>> mode on my system.
>>
>>
>>
>> > Dan
>> >
>> >> Ps: sorry for the triple post, but I didn't reply well to all the
>> >> members of the mail.
>> >>
>> >> > Dan
>> >> >
>> >> >> Added BSSID 64:70:02:3e:a7:82 into blacklist
>> >> >> wlan1: Setting scan request: 0 sec 100000 usec
>> >> >> wlan1: State: AUTHENTICATING -> DISCONNECTED
>> >> >> wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
>> >> >> The linkmode=-1 is set on wpa_driver_nl80211_set_operstate
>> >> >> netlink: Operstate: linkmode=-1, operstate=5
>> >> >> The num-Xr of sent bytes  in netlink_send_oper_ifla are 37
>> >> >> wlan1: State: DISCONNECTED -> SCANNING
>> >> >> _______________________________________________
>> >> >> HostAP mailing list
>> >> >> HostAP at lists.shmoo.com
>> >> >> http://lists.shmoo.com/mailman/listinfo/hostap
>> >> >
>> >> >
>> >
>> >
>
>


More information about the HostAP mailing list