Closed MartB closed 4 years ago
Can you run hostapd with verbose logging enabled and also attached 'dmesg' output from when this problem happens?
We've tested .11r in AP and STA mode with ath10k-ct and it has worked well, so I'm not sure what problem you are hitting.
Thanks, Ben
-- Ben Greear greearb@candelatech.com Candela Technologies Inc http://www.candelatech.com
@greearb In order to reproduce this i need to walk around the house which is gonna be an issue right now. I will tackle this tomorrow and provide all the output you requested.
Is there any additional step required besides setting the hostapd log_level to 0 for it to output verbose?
Edit: one thing i can answer is that the dmesg output was empty.
Edit2: this seems related https://svn.dd-wrt.com/ticket/6655 + https://forum.openwrt.org/t/rekeying-issue-driver-cant-safely-do-that/49606
Edit3: this seems like something hostapd has to figure out, as both cant be defined together https://github.com/torvalds/linux/blob/386403a115f95997c2715691226e11a7b5cffcfd/net/mac80211/main.c#L521
Just to clarify, do you have 802.11w enabled at the same time as 802.11r?
Have you also tried testing FT-over-the-Air instead of FT-over-the-DS?
@jeolives 802.11w is enabled as optional, just like in the (dd-wrt) issue i linked, im trying to find a fix for this. Im tried both FTA and FTDS, both result in the same behavior.
Edit: As this is not the drivers fault, i wrote an email to the hostapd mailing list, lets see what they come up with. I would like to leave this open for now until i get some sort of feedback from them on how to handle this.
There seems to be a few fixes with 802.11r FT + 802.11w PMF that didn't make it into the v2.9 tag...
However, I think it's only for when 802.11w is set to required.
https://w1.fi/cgit/hostap/commit/?id=ded56f2fafb00090118f82a135aa63b393cc66cf https://w1.fi/cgit/hostap/commit/?id=528f263c4a4bc0255a429e502336534b0a52fe35
But you should still wait for Jouni Malinen or someone else for their input.
In case its relevant it happened again, but this time its completely unrelated to 802.11r and ath10k because this happened on an ath9k interface.
Wed Dec 4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec 4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec 4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec 4 16:01:24 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec 4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 1
Wed Dec 4 16:01:24 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 2
Wed Dec 4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 3
Wed Dec 4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 4
Wed Dec 4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query attempt 5
Wed Dec 4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association SA Query timed out
Wed Dec 4 16:01:25 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:25 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec 4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec 4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec 4 16:01:28 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec 4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:28 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:28 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:28 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:29 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:29 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec 4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec 4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec 4 16:01:32 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec 4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:32 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:32 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:32 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:33 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:33 2019 daemon.notice hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: Could not set STA to kernel driver
Wed Dec 4 16:01:40 2019 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 90:2b:d2:XX:XX:XX
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:40 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:40 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: associated (aid 1)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-ASSOCIATE.indication(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 1 notification
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: start authentication
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: WPA_PTK: sm->Disconnect
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 3 notification
Wed Dec 4 16:01:40 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 90:2b:d2:XX:XX:XX
Wed Dec 4 16:01:40 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 1)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DEAUTHENTICATE.indication(90:2b:d2:XX:XX:XX, 2)
Wed Dec 4 16:01:40 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authentication OK (open system)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 0 notification
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-AUTHENTICATE.indication(90:2b:d2:XX:XX:XX, OPEN_SYSTEM)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: authenticated
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: association OK (aid 1)
Wed Dec 4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: associated (aid 1)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-ASSOCIATE.indication(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX MLME: MLME-DELETEKEYS.request(90:2b:d2:XX:XX:XX)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: event 1 notification
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: unauthorizing port
Wed Dec 4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 90:2b:d2:XX:XX:XX
Wed Dec 4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 22)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=22 len=17) from STA: EAP Response-Identity (1)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: STA identity 'radius-identity'
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 80 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=23 len=22) from RADIUS server: EAP-Request-MD5 (4)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 23)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=23 len=6) from STA: EAP Response-unknown (3)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 64 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=24 len=6) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 24)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=24 len=141) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 1068 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=25 len=1004) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=25 len=6) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 1064 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=26 len=1000) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 26)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=26 len=6) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 779 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=27 len=717) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 27)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=27 len=136) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 115 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=28 len=57) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 28)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=28 len=6) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 98 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=29 len=40) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 29)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=29 len=48) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 132 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=30 len=74) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 30)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=30 len=102) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 140 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=31 len=82) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 31)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=31 len=37) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 104 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=1 id=32 len=46) from RADIUS server: EAP-Request-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 32)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: received EAP packet (code=2 id=32 len=46) from STA: EAP Response-PEAP (25)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Sending RADIUS message to authentication server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Next RADIUS client retransmit in 3 seconds
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received 174 bytes from RADIUS server
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: RADIUS Received RADIUS message
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.11: binding station to interface 'wlan1'
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: old identity 'radius-identity' updated with User-Name from Access-Accept 'radius-identity'
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: decapsulated EAP packet (code=3 id=32 len=4) from RADIUS server: EAP Success
Wed Dec 4 16:01:45 2019 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 90:2b:d2:XX:XX:XX
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: Sending EAP Packet (identifier 32)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: sending 1/4 msg of 4-Way Handshake
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: received EAPOL-Key frame (2/4 Pairwise)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: sending 3/4 msg of 4-Way Handshake
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: received EAPOL-Key frame (4/4 Pairwise)
Wed Dec 4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Wed Dec 4 16:01:45 2019 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 90:2b:d2:XX:XX:XX
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: authorizing port
Wed Dec 4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX RADIUS: starting accounting session XXXXXXXXXXXXXX
Wed Dec 4 16:01:45 2019 daemon.info hostapd: wlan1: STA 90:2b:d2:XX:XX:XX IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Wed Dec 4 16:01:45 2019 daemon.debug hostapd: wlan1: STA 90:2b:d2:XX:XX:XX WPA: Added PMKSA cache entry (IEEE 802.1X)
If this is not specific to ath10k, please report the bug elsewhere so it has better chance of being fixed.
If this is not specific to ath10k, please report the bug elsewhere so it has better chance of being fixed.
yeah i already wrote to the hostapd mailing list, waiting for the reply will close this for now.
The ath10k-ct driver is currently missing the
.sta_add
implementation, this is needed to get 802.11r (FT) working as hostapd uses it.for reference see ath9k with exposed support: https://github.com/kvalo/ath10k/blob/master/drivers/net/wireless/ath/ath9k/main.c#L2362
PS: Im new to wireless stuff in the linux kernel so if this report is invalid please tell me where i went wrong please.
Im running openwrt-master branch with this patch series: https://patchwork.ozlabs.org/project/openwrt/list/?series=141862