Closed castillofrancodamian closed 5 months ago
Hi @castillofrancodamian
Sorry about the delay. I've been busy.
Let's start with making sure the driver is configured correctly:
go to the driver directory and:
$ sudo ./edit-options.sh
that will bring up the file called 8812au.conf . This file allows you to set module parameters and for a 80 MHz channel width in the 5 GHz band, you will need rtw_vht_enable=2
on the options line:
options 8812au rtw_switch_usb_mode=1 rtw_vht_enable=2 rtw_dfs_region_domain=1 rtw_country_code=US
8812au.conf is part of the documentation for the driver. Please read it all and let me know if you think it can be better.
@morrownr
@morrownr This is the configuration line in edit-options.sh
.
options 8812au rtw_switch_usb_mode=1 rtw_dfs_region_domain=1 rtw_country_code=AR rtw_vht_enable=2 rtw_power_mgnt=0
``` [franco@pc 8812au-20210820]$ git pull Username for 'https://github.com': castillofrancodamian Password for 'https://castillofrancodamian@github.com': remote: Enumerating objects: 7, done. remote: Counting objects: 100% (7/7), done. remote: Compressing objects: 100% (1/1), done. remote: Total 4 (delta 3), reused 4 (delta 3), pack-reused 0 Desempaquetando objetos: 100% (4/4), 613 bytes | 68.00 KiB/s, listo. Desde https://github.com/morrownr/8812au-20210820 ee0768d..41cc395 main -> origin/main Actualizando ee0768d..41cc395 Fast-forward install-driver.sh | 43 ++++++++++++++++++++++++------------------- remove-driver.sh | 22 +++++++++++----------- 2 files changed, 35 insertions(+), 30 deletions(-) [franco@pc 8812au-20210820]$ sudo ./install-driver.sh [sudo] contraseña para franco: : --------------------------- : install-driver.sh v20240222 : x86_64 (kernel architecture) : x86_64 (architecture to send to gcc) : 4/4 (in-use/total processing units) : 7817576 (total system memory) : 6.7.5-arch1-1 (kernel version) : gcc (version of gcc used to compile the kernel) : gcc (GCC) 13.2.1 20230801 : dkms-3.0.12 : mokutil not installed (Secure Boot status unknown) : --------------------------- Checking for previously installed drivers... Module rtl8812au-5.13.6-23 for kernel 6.7.5-arch1-1 (x86_64). Before uninstall, this module version was ACTIVE on this kernel. 8812au.ko.zst: - Uninstallation - Deleting from: /usr/lib/modules/6.7.5-arch1-1/updates/dkms/ - Original module - No original module was found for this module on this kernel. - Use the dkms install command to reinstall any previous module version. depmod.... Deleting module rtl8812au-5.13.6-23 completely from the DKMS tree. Removing 8812au.conf from /etc/modprobe.d Removing source files from /usr/src/rtl8812au-5.13.6-23 Finished checking for and removing previously installed drivers. : --------------------------- Starting installation. Installing 8812au.conf to /etc/modprobe.d The dkms installation routines are in use. Copying source files to /usr/src/rtl8812au-5.13.6-23 Creating symlink /var/lib/dkms/rtl8812au/5.13.6-23/source -> /usr/src/rtl8812au-5.13.6-23 The driver was added to dkms successfully. : --------------------------- Sign command: /usr/lib/modules/6.7.5-arch1-1/build/scripts/sign-file Signing key: /var/lib/dkms/mok.key Public certificate (MOK): /var/lib/dkms/mok.pub Building module: Cleaning build area... kernelver=6.7.5-arch1-1 ./dkms-make.sh.......................... Signing module /var/lib/dkms/rtl8812au/5.13.6-23/build/8812au.ko Cleaning build area... Compile time: 197.46 seconds The driver was built by dkms successfully. : --------------------------- 8812au.ko.zst: Running module version sanity check. - Original module - No original module exists within this kernel - Installation - Installing to /usr/lib/modules/6.7.5-arch1-1/updates/dkms/ depmod... The driver was installed by dkms successfully. : --------------------------- Info: Update this driver with the following commands as needed: $ git pull $ sudo sh install-driver.sh Note: Updates to this driver SHOULD be performed before distro upgrades such as Ubuntu 23.10 to 24.04. Note: Updates to this driver SHOULD be performed before major upgrades such as kernel 6.5 to 6.6. Note: Updates can be performed as often as you like. It is recommended to update at least every 3 months. Note: Work on this driver, like the Linux kernel, is continuous. ``` Enjoy!
Report?
Please post a copy of the hostapd.conf that you are using.
@morrownr This file contains the configuration that is included when installing the hostapd package. It has not been modified. What I wanted to know is if it is a configuration problem or the controller cannot output in 80 MHz.
What I wanted to know is if it is a configuration problem or the controller cannot output in 80 MHz.
It is a configuration problem. An adapter with a rtl8812au chipset and this driver most certainly can support 80 MHz channel width. Read the issue here where I have been posting about AP mode. Note the speeds I post about when using 5 GHz in AP mode.
This file contains the configuration that is included when installing the hostapd package. It has not been modified.
What file?
@morrownr
```
[franco@pc openwrt]$ sudo cat /etc/hostapd/hostapd.conf
##### hostapd configuration file ##############################################
# Empty lines and lines starting with # are ignored
# AP netdevice name (without 'ap' postfix, i.e., wlan0 uses wlan0ap for
# management frames with the Host AP driver); wlan0 with many nl80211 drivers
# Note: This attribute can be overridden by the values supplied with the '-i'
# command line parameter.
interface=wlan0
# In case of atheros and nl80211 driver interfaces, an additional
# configuration parameter, bridge, may be used to notify hostapd if the
# interface is included in a bridge. This parameter is not used with Host AP
# driver. If the bridge parameter is not set, the drivers will automatically
# figure out the bridge interface (assuming sysfs is enabled and mounted to
# /sys) and this parameter may not be needed.
#
# For nl80211, this parameter can be used to request the AP interface to be
# added to the bridge automatically (brctl may refuse to do this before hostapd
# has been started to change the interface mode). If needed, the bridge
# interface is also created.
#bridge=br0
# Driver interface type (hostap/wired/none/nl80211/bsd);
# default: hostap). nl80211 is used with all Linux mac80211 drivers.
# Use driver=none if building hostapd as a standalone RADIUS server that does
# not control any wireless/wired driver.
# driver=hostap
# Driver interface parameters (mainly for development testing use)
# driver_params=:
:
:
:
The hostapd.conf is the one you are using? If it is, we have work to do. You can't do 5 GHz, 80 MHz channel width with channel 1. I see a lot of problems in that file.
Let recommend this:
https://github.com/morrownr/USB-WiFi
That is the Main Menu for this site. Scroll down until menu item 9. That is the AP guide. In that file you will find example hostapd.conf files for both bands. Study it and get back to me.
@morrownr
@morrownr I have tried what the guide says but I cannot activate an AP in 5 GHz.
``` [franco@pc 8812au-20210820]$ uname -a Linux pc 6.7.6-arch1-1 #1 SMP PREEMPT_DYNAMIC Fri, 23 Feb 2024 16:31:48 +0000 x86_64 GNU/Linux ```
``` [franco@pc 8812au-20210820]$ cat /etc/hostapd/hostapd-WiFi5.conf # /etc/hostapd/hostapd-WiFi5.conf # Documentation: https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf # 2022-09-25 # SSID ssid=FDC # PASSPHRASE wpa_passphrase=1111111111 # Band: a = 5GHz & 6GHz (a/n/ac/ax), g = 2Ghz (b/g/n) hw_mode=a # Channel channel=36 # Channel width (0 = 40 MHz. 1 = 80 Mhz) vht_oper_chwidth=1 # VHT center channel (chan + 6) vht_oper_centr_freq_seg0_idx=42 # Country code country_code=AR # Advertises the country_code and the set of allowed channels and transmit power levels ieee80211d=1 # Enables support for 5GHz DFS channels (requires ieee80211d=1) ieee80211h=1 # Bridge interface bridge=br0 # WiFi interface interface=wlan0 # Set hostapd driver (nl80211 is used with all Linux mac80211 (in-kernel) and modern Realtek drivers) driver=nl80211 #ctrl_interface=/var/run/hostapd #ctrl_interface_group=0 # Various settings #beacon_int=100 #dtim_period=2 #max_num_sta=32 macaddr_acl=0 #rts_threshold=2347 #fragm_threshold=2346 #send_probe_response=1 # Security # auth_algs=3 is required for WPA3-SAE and WPA3-SAE Transition mode auth_algs=1 ignore_broadcast_ssid=0 # wpa=2 is required for WPA2 and WPA3 (read the docs) wpa=2 rsn_pairwise=CCMP # only one wpa_key_mgmt= line should be active. # wpa_key_mgmt=WPA-PSK is required for WPA2-AES wpa_key_mgmt=WPA-PSK # wpa_key_mgmt=SAE WPA-PSK is required for WPA3-SAE Transition mode #wpa_key_mgmt=SAE WPA-PSK # wpa_key_mgmt=SAE is required for WPA3-SAE #wpa_key_mgmt=SAE #wpa_group_rekey=1800 # ieee80211w=1 is required for WPA3-SAE Transition mode # ieee80211w=2 is required for WPA3-SAE #ieee80211w=1 # if parameter is not set, 19 is the default value. #sae_groups=19 20 21 25 26 # sae_require_mfp=1 is required for WPA3-SAE Transition mode #sae_require_mfp=1 # if parameter is not 9 set, 5 is the default value. #sae_anti_clogging_threshold=10 # Note: Capabilities can vary even between adapters with the same chipset. # # Note: Only one ht_capab= line and one vht_capab= should be active. The # content of these lines is determined by the capabilities of your adapter. # # IEEE 802.11n ieee80211n=1 wmm_enabled=1 # # generic setting ht_capab=[HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935] # # mediatek chipsets # mt7612u - mt7610u #ht_capab=[HT40+][HT40-][GF][SHORT-GI-20][SHORT-GI-40] # mt7921au ##ht_capab=[LDPC][HT40+][HT40-][GF][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935] # # realtek chipsets # rtl8812au - rtl8811au - rtl8811cu #ht_capab=[HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935] # rtl8812bu #ht_capab=[LDPC][HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935] # rtl8814au #ht_capab=[LDPC][HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935][DSSS_CCK-40] # # IEEE 802.11ac ieee80211ac=1 # # generic setting vht_capab=[MAX-MPDU-11454][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # # mt7610u #vht_capab=[SHORT-GI-80][MAX-A-MPDU-LEN-EXP3][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # mt7612u #vht_capab=[RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][MAX-A-MPDU-LEN-EXP3][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # mt7921au (VHT Cap. 339071b2) #vht_capab=[MAX-MPDU-11454][RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][SU-BEAMFORMEE][BF-ANTENNA-4][MAX-A-MPDU-LEN-EXP7][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # # rtl8812au - rtl8812bu #vht_capab=[MAX-MPDU-11454][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8814au #vht_capab=[MAX-MPDU-11454][RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8811au #vht_capab=[MAX-MPDU-11454][SHORT-GI-80][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8811cu #vht_capab=[MAX-MPDU-11454][SHORT-GI-80][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # # Note: [TX-STBC-2BY1] may cause problems with some Realtek drivers # end of hostapd-WiFi5.conf ```
``` [franco@pc 8812au-20210820]$ cat /etc/systemd/system/hostapd.service [Unit] Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator After=network.target [Service] ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF ExecReload=/bin/kill -HUP $MAINPID Environment=DAEMON_OPTS="-d -K -f /home/franco/hostapd.log" Environment=DAEMON_CONF="/etc/hostapd/hostapd-WiFi5.conf" [Install] WantedBy=multi-user.target ```
``` [franco@pc 8812au-20210820]$ cat /etc/systemd/network/30-config-bridge-br0.network [Match] Name=br0 [Network] DHCP=yes Address=192.168.20.100/24 Gateway=192.168.20.1 DNS=192.168.20.3 ```
```
[franco@pc 8812au-20210820]$ ip a
1: lo:
[franco@pc 8812au-20210820]$ sudo systemctl status hostapd
× hostapd.service - Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Loaded: loaded (/etc/systemd/system/hostapd.service; enabled; preset: disabled)
Active: failed (Result: exit-code) since Mon 2024-02-26 18:02:58 -03; 6s ago
Duration: 649ms
Process: 15071 ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF (code=exited, status=1/FAILURE)
Main PID: 15071 (code=exited, status=1/FAILURE)
CPU: 21ms
feb 26 18:02:58 pc hostapd[15071]: wlan0: CTRL-EVENT-TERMINATING
feb 26 18:02:58 pc hostapd[15071]: hostapd_free_hapd_data: Interface wlan0 wasn't started
feb 26 18:02:58 pc hostapd[15071]: hostapd_interface_deinit_free: driver=(nil) drv_priv=(nil) -> hapd_deinit
feb 26 18:02:58 pc hostapd[15071]: hostapd_interface_free(0x5df0a732ae40)
feb 26 18:02:58 pc hostapd[15071]: hostapd_interface_free: free hapd 0x5df0a732c2a0
feb 26 18:02:58 pc hostapd[15071]: hostapd_cleanup_iface(0x5df0a732ae40)
feb 26 18:02:58 pc hostapd[15071]: hostapd_cleanup_iface_partial(0x5df0a732ae40)
feb 26 18:02:58 pc hostapd[15071]: hostapd_cleanup_iface: free iface=0x5df0a732ae40
feb 26 18:02:58 pc systemd[1]: hostapd.service: Main process exited, code=exited, status=1/FAILURE
feb 26 18:02:58 pc systemd[1]: hostapd.service: Failed with result 'exit-code'.
I also see this after restarting the PC.
[franco@pc ~]$ sudo systemctl status hostapd
[sudo] contraseña para franco:
○ hostapd.service - Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Loaded: loaded (/etc/systemd/system/hostapd.service; enabled; preset: disabled)
Active: inactive (dead) since Mon 2024-02-26 18:13:18 -03; 38s ago
Duration: 443ms
Process: 362 ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF (code=exited, status=0/SUCCESS)
Main PID: 362 (code=exited, status=0/SUCCESS)
CPU: 65ms
feb 26 18:13:17 pc systemd[1]: Started Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator.
feb 26 18:13:18 pc systemd[1]: hostapd.service: Deactivated successfully.
Hmmm...
The main reason for setting up an AP like this with hostapd is to be able to get maximum performance. Unfortunately, it can be a little complicated. Think of the guide as something will work if everything is like in the guide. I think you mentioned using Arch on x86_64. That is different than a RasPi4B with RasPiOS.
What can matter? The networking. Did you shutdown Network Manager? If can work with NM still active but we need to exclude the interface that hostapd will be using. It could be timing. It could one little typo in the numerous text files. It appeared that getting an interface up was a problem... run iw dev
and let's check the interface.
I'm sure we can sort this out but patience will be required.
@morrownr
Another possibility is that your regd settings preclude transmission in the 5G band. Run the command 'iw dev' to see the device name. My system has the line "Interface wls1" and shows phy#2. Next get the settings for that device with 'iw phy2 info'. On my system, the 5G band has the following logged: Frequencies:
@morrownr @lwfinger I disabled NetworkManager.service
and enabled systemd-networkd.service
.
[franco@pc ~]$ sudo systemctl status NetworkManager
○ NetworkManager.service - Network Manager
Loaded: loaded (/usr/lib/systemd/system/NetworkManager.service; disabled; preset: disabled)
Active: inactive (dead)
Docs: man:NetworkManager(8)
[franco@pc ~]$ sudo systemctl status systemd-networkd
● systemd-networkd.service - Network Configuration
Loaded: loaded (/usr/lib/systemd/system/systemd-networkd.service; enabled; preset: enabled)
Active: active (running) since Mon 2024-02-26 18:13:16 -03; 5h 4min ago
TriggeredBy: ● systemd-networkd.socket
Docs: man:systemd-networkd.service(8)
man:org.freedesktop.network1(5)
Main PID: 253 (systemd-network)
Status: "Processing requests..."
Tasks: 1 (limit: 9133)
FD Store: 0 (limit: 512)
Memory: 1.1M (peak: 4.8M swap: 1.2M swap peak: 1.4M)
CPU: 162ms
CGroup: /system.slice/systemd-networkd.service
└─253 /usr/lib/systemd/systemd-networkd
feb 26 18:13:25 pc systemd-networkd[253]: vethf012816: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: vethebc3f7e: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: veth3a6f6c8: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: vethe4a98b9: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: veth943332e: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: veth2c9a4c9: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: veth17d664f: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: vetha63eb94: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: vethb4095d0: Gained IPv6LL
feb 26 18:13:26 pc systemd-networkd[253]: vethe057702: Gained IPv6LL
``` [franco@pc ~]$ iw dev phy#0 Interface wlan0 ifindex 4 wdev 0x1 addr 18:d6:c7:11:b3:6c type managed txpower -100.00 dBm [franco@pc ~]$ iw phy#0 info Wiphy phy0 wiphy index: 0 max # scan SSIDs: 9 max scan IEs length: 2304 bytes max # sched scan SSIDs: 0 max # match sets: 0 Retry short limit: 7 Retry long limit: 4 Coverage class: 0 (up to 0m) Device supports T-DLS. Supported Ciphers: * WEP40 (00-0f-ac:1) * WEP104 (00-0f-ac:5) * TKIP (00-0f-ac:2) * CCMP-128 (00-0f-ac:4) * CMAC (00-0f-ac:6) Available Antennas: TX 0 RX 0 Supported interface modes: * IBSS * managed * AP * P2P-client * P2P-GO Band 1: Capabilities: 0x1962 HT20/HT40 Static SM Power Save RX HT20 SGI RX HT40 SGI RX STBC 1-stream Max AMSDU length: 7935 bytes DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 16 usec (0x07) HT Max RX data rate: 300 Mbps HT TX/RX MCS rate indexes supported: 0-15 Bitrates (non-HT): * 1.0 Mbps * 2.0 Mbps * 5.5 Mbps * 11.0 Mbps * 6.0 Mbps * 9.0 Mbps * 12.0 Mbps * 18.0 Mbps * 24.0 Mbps * 36.0 Mbps * 48.0 Mbps * 54.0 Mbps Frequencies: * 2412.0 MHz [1] (17.0 dBm) * 2417.0 MHz [2] (17.0 dBm) * 2422.0 MHz [3] (17.0 dBm) * 2427.0 MHz [4] (17.0 dBm) * 2432.0 MHz [5] (17.0 dBm) * 2437.0 MHz [6] (17.0 dBm) * 2442.0 MHz [7] (17.0 dBm) * 2447.0 MHz [8] (17.0 dBm) * 2452.0 MHz [9] (17.0 dBm) * 2457.0 MHz [10] (17.0 dBm) * 2462.0 MHz [11] (17.0 dBm) * 2467.0 MHz [12] (17.0 dBm) (no IR) * 2472.0 MHz [13] (17.0 dBm) (no IR) * 2484.0 MHz [14] (disabled) Band 2: Capabilities: 0x862 HT20/HT40 Static SM Power Save RX HT20 SGI RX HT40 SGI No RX STBC Max AMSDU length: 7935 bytes No DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 16 usec (0x07) HT Max RX data rate: 300 Mbps HT TX/RX MCS rate indexes supported: 0-15 VHT Capabilities (0x03c031a2): Max MPDU length: 11454 Supported Channel Width: neither 160 nor 80+80 short GI (80 MHz) TX STBC SU Beamformee +HTC-VHT VHT RX MCS set: 1 streams: MCS 0-9 2 streams: MCS 0-9 3 streams: not supported 4 streams: not supported 5 streams: not supported 6 streams: not supported 7 streams: not supported 8 streams: not supported VHT RX highest supported: 867 Mbps VHT TX MCS set: 1 streams: MCS 0-9 2 streams: MCS 0-9 3 streams: not supported 4 streams: not supported 5 streams: not supported 6 streams: not supported 7 streams: not supported 8 streams: not supported VHT TX highest supported: 867 Mbps VHT extended NSS: not supported Bitrates (non-HT): * 6.0 Mbps * 9.0 Mbps * 12.0 Mbps * 18.0 Mbps * 24.0 Mbps * 36.0 Mbps * 48.0 Mbps * 54.0 Mbps Frequencies: * 5180.0 MHz [36] (15.0 dBm) * 5200.0 MHz [40] (15.0 dBm) * 5220.0 MHz [44] (15.0 dBm) * 5240.0 MHz [48] (15.0 dBm) * 5260.0 MHz [52] (15.0 dBm) * 5280.0 MHz [56] (15.0 dBm) * 5300.0 MHz [60] (15.0 dBm) * 5320.0 MHz [64] (15.0 dBm) * 5500.0 MHz [100] (15.0 dBm) * 5520.0 MHz [104] (15.0 dBm) * 5540.0 MHz [108] (15.0 dBm) * 5560.0 MHz [112] (15.0 dBm) * 5580.0 MHz [116] (15.0 dBm) * 5600.0 MHz [120] (15.0 dBm) * 5620.0 MHz [124] (15.0 dBm) * 5640.0 MHz [128] (15.0 dBm) * 5660.0 MHz [132] (15.0 dBm) * 5680.0 MHz [136] (15.0 dBm) * 5700.0 MHz [140] (15.0 dBm) * 5720.0 MHz [144] (disabled) * 5745.0 MHz [149] (15.0 dBm) * 5765.0 MHz [153] (15.0 dBm) * 5785.0 MHz [157] (15.0 dBm) * 5805.0 MHz [161] (15.0 dBm) * 5825.0 MHz [165] (15.0 dBm) * 5845.0 MHz [169] (disabled) * 5865.0 MHz [173] (disabled) * 5885.0 MHz [177] (disabled) Supported commands: * new_interface * set_interface * new_key * start_ap * new_station * set_bss * join_ibss * set_pmksa * del_pmksa * flush_pmksa * remain_on_channel * frame * set_channel * tdls_mgmt * tdls_oper * connect * disconnect WoWLAN support: * wake up on anything (device continues operating normally) software interface modes (can always be added): interface combinations are not supported Device supports SAE with AUTHENTICATE command Device supports scan flush. max # scan plans: 1 max scan plan interval: -1 max scan plan iterations: 0 Supported TX frame types: * IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 Supported RX frame types: * IBSS: 0xd0 * managed: 0x40 0xb0 0xd0 * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 * AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 * P2P-client: 0x40 0xd0 * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 Supported extended features: ```
Checking on you. Any progress.
@morrownr It seems hostapd
doesn't want to start.
[franco@pc ~]$ cat /etc/hostapd/hostapd-WiFi5.conf
ssid=FDC
wpa_passphrase=1111111111
hw_mode=a
channel=36
vht_oper_chwidth=1
vht_oper_centr_freq_seg0_idx=42
country_code=AR
ieee80211d=1
ieee80211h=1
bridge=br0
interface=wlan0
driver=nl80211
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
rsn_pairwise=CCMP
wpa_key_mgmt=WPA-PSK
ieee80211n=1
wmm_enabled=1
ht_capab=[HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935]
ieee80211ac=1
vht_capab=[MAX-MPDU-11454][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7]
[franco@pc ~]$ cat /etc/systemd/system/hostapd.service
[Unit]
Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
After=network.target
[Service]
ExecReload=/bin/kill -HUP $MAINPID
Environment=DAEMON_OPTS="-d -K -f /home/franco/hostapd.log"
Environment=DAEMON_CONF="/etc/hostapd/hostapd-WiFi5.conf"
ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF
[Install]
WantedBy=multi-user.target
[franco@pc ~]$ sudo systemctl status hostapd
○ hostapd.service - Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Loaded: loaded (/etc/systemd/system/hostapd.service; enabled; preset: disabled)
Active: inactive (dead) since Fri 2024-03-01 19:59:53 -03; 1min 47s ago
Duration: 401ms
Process: 8111 ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF (code=exited, status=0/SUCCESS)
Main PID: 8111 (code=exited, status=0/SUCCESS)
CPU: 61ms
mar 01 19:59:52 pc systemd[1]: Started Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator.
mar 01 19:59:53 pc systemd[1]: hostapd.service: Deactivated successfully.
[franco@pc ~]$ iw dev
phy#1
Interface wlan0
ifindex 33
wdev 0x100000001
addr 18:d6:c7:11:b3:6c
type managed
txpower -100.00 dBm
In the first message in this thread, there is a pic of a window after AP Configuration
. What am I looking at in that pic? That is not configuring hostapd.
It is the KDE plasma network manager that allows you to create access points. I still followed the steps in your guide to configure hostapd manually and it is not working.
I still followed the steps in your guide to configure hostapd manually and it is not working.
I understand. I have a rather limited knowledge of how the networking is handled in Arch so my ability to help further is rather limited. I appreciate you trying to help test AP mode.
@morrownr I was already able to make an 80 MHz access point on 5 GHz. The test was on a netbook with USB 2.0 and Debian 12.5.
``` franco@netbook:~$ uname -a Linux netbook 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64 GNU/Linux ```
```
franco@netbook:~/8812au-20210820$ git log -4
commit 04235daf2bdb46f72ff9ba9a139095c85c5d8fcc (HEAD -> main, origin/main, origin/HEAD)
Author: morrownr
``` root@netbook:/home/franco/8812au-20210820# ./install-driver.sh : --------------------------- : install-driver.sh v20240222 : x86_64 (kernel architecture) : x86_64 (architecture to send to gcc) : 4/4 (in-use/total processing units) : 1997008 (total system memory) : 6.1.0-18-amd64 (kernel version) : gcc-12 (version of gcc used to compile the kernel) : gcc (Debian 12.2.0-14) 12.2.0 : mokutil not installed (Secure Boot status unknown) : --------------------------- Checking for previously installed drivers... Finished checking for and removing previously installed drivers. : --------------------------- Starting installation. Installing 8812au.conf to /etc/modprobe.d The non-dkms installation routines are in use. make ARCH=x86_64 CROSS_COMPILE= -C /lib/modules/6.1.0-18-amd64/build M=/home/franco/8812au-20210820 modules make[1]: se entra en el directorio '/usr/src/linux-headers-6.1.0-18-amd64' CC [M] /home/franco/8812au-20210820/core/rtw_cmd.o CC [M] /home/franco/8812au-20210820/core/rtw_security.o CC [M] /home/franco/8812au-20210820/core/rtw_debug.o CC [M] /home/franco/8812au-20210820/core/rtw_io.o CC [M] /home/franco/8812au-20210820/core/rtw_ioctl_query.o CC [M] /home/franco/8812au-20210820/core/rtw_ioctl_set.o CC [M] /home/franco/8812au-20210820/core/rtw_ieee80211.o CC [M] /home/franco/8812au-20210820/core/rtw_mlme.o CC [M] /home/franco/8812au-20210820/core/rtw_mlme_ext.o CC [M] /home/franco/8812au-20210820/core/rtw_mi.o CC [M] /home/franco/8812au-20210820/core/rtw_wlan_util.o CC [M] /home/franco/8812au-20210820/core/rtw_vht.o CC [M] /home/franco/8812au-20210820/core/rtw_pwrctrl.o CC [M] /home/franco/8812au-20210820/core/rtw_rf.o CC [M] /home/franco/8812au-20210820/core/rtw_chplan.o CC [M] /home/franco/8812au-20210820/core/monitor/rtw_radiotap.o CC [M] /home/franco/8812au-20210820/core/rtw_recv.o CC [M] /home/franco/8812au-20210820/core/rtw_sta_mgt.o CC [M] /home/franco/8812au-20210820/core/rtw_ap.o CC [M] /home/franco/8812au-20210820/core/wds/rtw_wds.o CC [M] /home/franco/8812au-20210820/core/mesh/rtw_mesh.o CC [M] /home/franco/8812au-20210820/core/mesh/rtw_mesh_pathtbl.o CC [M] /home/franco/8812au-20210820/core/mesh/rtw_mesh_hwmp.o CC [M] /home/franco/8812au-20210820/core/rtw_xmit.o CC [M] /home/franco/8812au-20210820/core/rtw_p2p.o CC [M] /home/franco/8812au-20210820/core/rtw_rson.o CC [M] /home/franco/8812au-20210820/core/rtw_tdls.o CC [M] /home/franco/8812au-20210820/core/rtw_br_ext.o CC [M] /home/franco/8812au-20210820/core/rtw_iol.o CC [M] /home/franco/8812au-20210820/core/rtw_sreset.o CC [M] /home/franco/8812au-20210820/core/rtw_btcoex_wifionly.o CC [M] /home/franco/8812au-20210820/core/rtw_btcoex.o CC [M] /home/franco/8812au-20210820/core/rtw_beamforming.o CC [M] /home/franco/8812au-20210820/core/rtw_odm.o CC [M] /home/franco/8812au-20210820/core/rtw_rm.o CC [M] /home/franco/8812au-20210820/core/rtw_rm_fsm.o CC [M] /home/franco/8812au-20210820/core/rtw_ft.o CC [M] /home/franco/8812au-20210820/core/rtw_wnm.o CC [M] /home/franco/8812au-20210820/core/rtw_mbo.o CC [M] /home/franco/8812au-20210820/core/rtw_rm_util.o CC [M] /home/franco/8812au-20210820/core/efuse/rtw_efuse.o CC [M] /home/franco/8812au-20210820/core/rtw_roch.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-internal.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-internal-enc.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-gcm.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-ccm.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-omac1.o CC [M] /home/franco/8812au-20210820/core/crypto/ccmp.o CC [M] /home/franco/8812au-20210820/core/crypto/gcmp.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-siv.o CC [M] /home/franco/8812au-20210820/core/crypto/aes-ctr.o CC [M] /home/franco/8812au-20210820/core/crypto/sha256-internal.o CC [M] /home/franco/8812au-20210820/core/crypto/sha256.o CC [M] /home/franco/8812au-20210820/core/crypto/sha256-prf.o CC [M] /home/franco/8812au-20210820/core/crypto/rtw_crypto_wrap.o CC [M] /home/franco/8812au-20210820/core/rtw_swcrypto.o CC [M] /home/franco/8812au-20210820/os_dep/osdep_service.o CC [M] /home/franco/8812au-20210820/os_dep/linux/os_intfs.o CC [M] /home/franco/8812au-20210820/os_dep/linux/usb_intf.o CC [M] /home/franco/8812au-20210820/os_dep/linux/usb_ops_linux.o CC [M] /home/franco/8812au-20210820/os_dep/linux/ioctl_linux.o CC [M] /home/franco/8812au-20210820/os_dep/linux/xmit_linux.o CC [M] /home/franco/8812au-20210820/os_dep/linux/mlme_linux.o CC [M] /home/franco/8812au-20210820/os_dep/linux/recv_linux.o CC [M] /home/franco/8812au-20210820/os_dep/linux/ioctl_cfg80211.o CC [M] /home/franco/8812au-20210820/os_dep/linux/rtw_cfgvendor.o CC [M] /home/franco/8812au-20210820/os_dep/linux/wifi_regd.o CC [M] /home/franco/8812au-20210820/os_dep/linux/rtw_android.o CC [M] /home/franco/8812au-20210820/os_dep/linux/rtw_proc.o CC [M] /home/franco/8812au-20210820/os_dep/linux/nlrtw.o CC [M] /home/franco/8812au-20210820/os_dep/linux/rtw_rhashtable.o CC [M] /home/franco/8812au-20210820/hal/hal_intf.o CC [M] /home/franco/8812au-20210820/hal/hal_com.o CC [M] /home/franco/8812au-20210820/hal/hal_com_phycfg.o CC [M] /home/franco/8812au-20210820/hal/hal_phy.o CC [M] /home/franco/8812au-20210820/hal/hal_dm.o CC [M] /home/franco/8812au-20210820/hal/hal_dm_acs.o CC [M] /home/franco/8812au-20210820/hal/hal_btcoex_wifionly.o CC [M] /home/franco/8812au-20210820/hal/hal_btcoex.o CC [M] /home/franco/8812au-20210820/hal/hal_mp.o CC [M] /home/franco/8812au-20210820/hal/hal_mcc.o CC [M] /home/franco/8812au-20210820/hal/hal_hci/hal_usb.o CC [M] /home/franco/8812au-20210820/hal/led/hal_led.o CC [M] /home/franco/8812au-20210820/hal/led/hal_usb_led.o CC [M] /home/franco/8812au-20210820/hal/HalPwrSeqCmd.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/Hal8812PwrSeq.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/Hal8821APwrSeq.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_xmit.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_sreset.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_hal_init.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_phycfg.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_rf6052.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_dm.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_rxdesc.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/rtl8812a_cmd.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/usb/usb_halinit.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/usb/rtl8812au_led.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/usb/rtl8812au_xmit.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/usb/rtl8812au_recv.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/usb/usb_ops_linux.o CC [M] /home/franco/8812au-20210820/hal/efuse/rtl8812a/HalEfuseMask8812A_USB.o CC [M] /home/franco/8812au-20210820/hal/rtl8812a/hal8812a_fw.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_debug.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_antdiv.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_soml.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_smt_ant.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_antdect.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_interface.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_phystatus.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_hwconfig.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_dig.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_pathdiv.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_rainfo.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_dynamictxpower.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_adaptivity.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_cfotracking.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_noisemonitor.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_beamforming.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_direct_bf.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_dfs.o CC [M] /home/franco/8812au-20210820/hal/phydm/txbf/halcomtxbf.o CC [M] /home/franco/8812au-20210820/hal/phydm/txbf/haltxbfinterface.o CC [M] /home/franco/8812au-20210820/hal/phydm/txbf/phydm_hal_txbf_api.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_adc_sampling.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_ccx.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_psd.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_primary_cca.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_cck_pd.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_rssi_monitor.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_auto_dbg.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_math_lib.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_api.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_pow_train.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_lna_sat.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_pmac_tx_setting.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_mp.o CC [M] /home/franco/8812au-20210820/hal/phydm/phydm_cck_rx_pathdiv.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf_debug.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halphyrf_ce.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf_powertracking_ce.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf_powertracking.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf_kfree.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/halrf_psd.o CC [M] /home/franco/8812au-20210820/hal/phydm/rtl8812a/halhwimg8812a_mac.o CC [M] /home/franco/8812au-20210820/hal/phydm/rtl8812a/halhwimg8812a_bb.o CC [M] /home/franco/8812au-20210820/hal/phydm/rtl8812a/halhwimg8812a_rf.o CC [M] /home/franco/8812au-20210820/hal/phydm/halrf/rtl8812a/halrf_8812a_ce.o CC [M] /home/franco/8812au-20210820/hal/phydm/rtl8812a/phydm_regconfig8812a.o CC [M] /home/franco/8812au-20210820/hal/phydm/rtl8812a/phydm_rtl8812a.o CC [M] /home/franco/8812au-20210820/hal/phydm/txbf/haltxbfjaguar.o CC [M] /home/franco/8812au-20210820/platform/platform_ops.o LD [M] /home/franco/8812au-20210820/8812au.o MODPOST /home/franco/8812au-20210820/Module.symvers CC [M] /home/franco/8812au-20210820/8812au.mod.o LD [M] /home/franco/8812au-20210820/8812au.ko BTF [M] /home/franco/8812au-20210820/8812au.ko Skipping BTF generation for /home/franco/8812au-20210820/8812au.ko due to unavailability of vmlinux make[1]: se sale del directorio '/usr/src/linux-headers-6.1.0-18-amd64' install -p -m 644 8812au.ko /lib/modules/6.1.0-18-amd64/kernel/drivers/net/wireless/ /sbin/depmod -a 6.1.0-18-amd64 The driver was installed successfully. : --------------------------- Info: Update this driver with the following commands as needed: $ git pull $ sudo sh install-driver.sh Note: Updates to this driver SHOULD be performed before distro upgrades such as Ubuntu 23.10 to 24.04. Note: Updates to this driver SHOULD be performed before major upgrades such as kernel 6.5 to 6.6. Note: Updates can be performed as often as you like. It is recommended to update at least every 3 months. Note: Work on this driver, like the Linux kernel, is continuous. Enjoy! Unable to run $ rfkill unblock wlan Do you want to edit the driver options file now? (recommended) [Y/n] Do you want to apply the new options by rebooting now? (recommended) [Y/n] ```
`options 8812au rtw_switch_usb_mode=2 rtw_power_mgnt=0 rtw_dfs_region_domain=1 rtw_country_code=AR rtw_vht_enable=2`
``` franco@netbook:~/8812au-20210820$ lsusb -t /: Bus 05.Port 1: Dev 1, Class=root_hub, Driver=uhci_hcd/2p, 12M /: Bus 04.Port 1: Dev 1, Class=root_hub, Driver=uhci_hcd/2p, 12M /: Bus 03.Port 1: Dev 1, Class=root_hub, Driver=uhci_hcd/2p, 12M /: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=uhci_hcd/2p, 12M /: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci-pci/8p, 480M |__ Port 4: Dev 2, If 0, Class=Vendor Specific Class, Driver=rtl8812au, 480M |__ Port 8: Dev 3, If 0, Class=Mass Storage, Driver=ums-realtek, 480M ```
``` franco@netbook:~/8812au-20210820$ cat /etc/hostapd/hostapd-WiFi5.conf # /etc/hostapd/hostapd-WiFi5.conf # Documentation: https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf # 2022-09-25 # SSID ssid=FDC # PASSPHRASE wpa_passphrase=1111111111 # Band: a = 5GHz & 6GHz (a/n/ac/ax), g = 2Ghz (b/g/n) hw_mode=a # Channel channel=36 # Channel width (0 = 40 MHz. 1 = 80 Mhz) vht_oper_chwidth=1 # VHT center channel (chan + 6) vht_oper_centr_freq_seg0_idx=42 # Country code country_code=AR # Advertises the country_code and the set of allowed channels and transmit power levels ieee80211d=1 # Enables support for 5GHz DFS channels (requires ieee80211d=1) ieee80211h=1 # Bridge interface bridge=br0 # WiFi interface interface=wlx18d6c711b36c # Set hostapd driver (nl80211 is used with all Linux mac80211 (in-kernel) and modern Realtek drivers) driver=nl80211 #ctrl_interface=/var/run/hostapd #ctrl_interface_group=0 # Various settings #beacon_int=100 #dtim_period=2 #max_num_sta=32 macaddr_acl=0 #rts_threshold=2347 #fragm_threshold=2346 #send_probe_response=1 # Security # auth_algs=3 is required for WPA3-SAE and WPA3-SAE Transition mode auth_algs=1 ignore_broadcast_ssid=0 # wpa=2 is required for WPA2 and WPA3 (read the docs) wpa=2 rsn_pairwise=CCMP # only one wpa_key_mgmt= line should be active. # wpa_key_mgmt=WPA-PSK is required for WPA2-AES wpa_key_mgmt=WPA-PSK # wpa_key_mgmt=SAE WPA-PSK is required for WPA3-SAE Transition mode #wpa_key_mgmt=SAE WPA-PSK # wpa_key_mgmt=SAE is required for WPA3-SAE #wpa_key_mgmt=SAE #wpa_group_rekey=1800 # ieee80211w=1 is required for WPA3-SAE Transition mode # ieee80211w=2 is required for WPA3-SAE #ieee80211w=1 # if parameter is not set, 19 is the default value. #sae_groups=19 20 21 25 26 # sae_require_mfp=1 is required for WPA3-SAE Transition mode #sae_require_mfp=1 # if parameter is not 9 set, 5 is the default value. #sae_anti_clogging_threshold=10 # Note: Capabilities can vary even between adapters with the same chipset. # # Note: Only one ht_capab= line and one vht_capab= should be active. The # content of these lines is determined by the capabilities of your adapter. # # IEEE 802.11n ieee80211n=1 wmm_enabled=1 # # generic setting #ht_capab=[HT40+][HT40-][SHORT-GI-20][SHORT-GI-40] # # mediatek chipsets # mt7612u - mt7610u #ht_capab=[HT40+][HT40-][GF][SHORT-GI-20][SHORT-GI-40] # mt7921au ##ht_capab=[LDPC][HT40+][HT40-][GF][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935] # # realtek chipsets # rtl8812au - rtl8811au - rtl8811cu ht_capab=[HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935] # rtl8812bu #ht_capab=[LDPC][HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935] # rtl8814au #ht_capab=[LDPC][HT40+][HT40-][SHORT-GI-20][SHORT-GI-40][MAX-AMSDU-7935][DSSS_CCK-40] # # IEEE 802.11ac ieee80211ac=1 # # generic setting #vht_capab=[SHORT-GI-80] # # mt7610u #vht_capab=[SHORT-GI-80][MAX-A-MPDU-LEN-EXP3][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # mt7612u #vht_capab=[RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][MAX-A-MPDU-LEN-EXP3][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # mt7921au (VHT Cap. 339071b2) #vht_capab=[MAX-MPDU-11454][RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][SU-BEAMFORMEE][BF-ANTENNA-4][MAX-A-MPDU-LEN-EXP7][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN] # # rtl8812au - rtl8812bu vht_capab=[MAX-MPDU-11454][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8814au #vht_capab=[MAX-MPDU-11454][RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8811au #vht_capab=[MAX-MPDU-11454][SHORT-GI-80][RX-STBC-1][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # rtl8811cu #vht_capab=[MAX-MPDU-11454][SHORT-GI-80][HTC-VHT][MAX-A-MPDU-LEN-EXP7] # # Note: [TX-STBC-2BY1] may cause problems with some Realtek drivers # end of hostapd-WiFi5.conf ```
``` franco@netbook:~/8812au-20210820$ cat /etc/systemd/system/hostapd.service [Unit] Description=Access point and authentication server for Wi-Fi and Ethernet Documentation=man:hostapd(8) After=network.target #ConditionFileNotEmpty=/etc/hostapd/hostapd.conf [Service] Type=forking PIDFile=/run/hostapd.pid Restart=on-failure RestartSec=2 Environment=DAEMON_CONF=/etc/hostapd/hostapd.conf #EnvironmentFile=-/etc/default/hostapd #ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid $DAEMON_OPTS ${DAEMON_CONF} Environment=DAEMON_OPTS="-d -K -f /home/franco/hostapd.log" Environment=DAEMON_CONF="/etc/hostapd/hostapd-WiFi5.conf" ExecStart=/usr/sbin/hostapd -B -P /run/hostapd.pid -B $DAEMON_OPTS $DAEMON_CONF [Install] WantedBy=multi-user.target ```
``` franco@netbook:~/8812au-20210820$ sudo systemctl status systemd-networkd ● systemd-networkd.service - Network Configuration Loaded: loaded (/lib/systemd/system/systemd-networkd.service; enabled; preset: enabled) Active: active (running) since Thu 2024-03-07 00:33:59 -03; 17h ago TriggeredBy: ● systemd-networkd.socket Docs: man:systemd-networkd.service(8) man:org.freedesktop.network1(5) Main PID: 291 (systemd-network) Status: "Processing requests..." Tasks: 1 (limit: 2287) Memory: 3.4M CPU: 1.010s CGroup: /system.slice/systemd-networkd.service └─291 /lib/systemd/systemd-networkd mar 07 00:34:02 netbook systemd-networkd[291]: wlan0: Interface name change detected, renamed to wlp2s0. mar 07 00:34:03 netbook systemd-networkd[291]: enp1s0: Gained carrier mar 07 00:34:03 netbook systemd-networkd[291]: br0: Gained carrier mar 07 00:34:05 netbook systemd-networkd[291]: br0: Gained IPv6LL mar 07 00:34:07 netbook systemd-networkd[291]: wlan0: Interface name change detected, renamed to wlx18d6c711b36c. mar 07 00:34:07 netbook systemd-networkd[291]: br0: DHCPv4 address 192.168.40.2/24, gateway 192.168.40.1 acquired from 192.168.40.1 mar 07 00:34:09 netbook systemd-networkd[291]: Could not set hostname: Access denied mar 07 00:34:10 netbook systemd-networkd[291]: wlx18d6c711b36c: Link UP mar 07 00:34:11 netbook systemd-networkd[291]: wlx18d6c711b36c: Gained carrier mar 07 00:34:12 netbook systemd-networkd[291]: wlx18d6c711b36c: Gained IPv6LL ```
Screenshot of the OpenWrt network scanner. The test network is "FDC". Also wavemon from a client with mt7921au (Fenvi FU-AX1800).
Channel 52
channel=52
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=1
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=58
Channel 100
channel=100
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=1
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=106
Channel 116
channel=116
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=1
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=122
Channel 132 not work.
channel=132
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=1
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=138
Channel 149
channel=149
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=1
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=155
I tried to check if the 20 and 40 MHz bandwidths work and they don't work. It continues broadcasting at 80 MHz.
20 MHz not work.
channel=36
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
#vht_oper_chwidth=0
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=36
40 MHz. When scanning from OpenWrt it is seen that it transmits at 80 MHz.
channel=36
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=0
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=38
``` WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=18:d6:c7:11:b3:6c A2=90:de:80:fb:d7:89 WPA: Nonce1 - hexdump(len=32): 54 d4 a4 ec 77 96 0f 12 4b 6e b6 a9 7c eb 20 cb 15 aa 50 c5 60 42 7f c0 dc 19 fc 9b 67 db fe 80 WPA: Nonce2 - hexdump(len=32): b2 34 9e 28 ab b9 36 e2 ac 7a 17 b5 6f 23 a6 8b 31 de 38 b3 61 b2 44 27 e4 df fe 4c 04 fd 0a 1d WPA: PMK - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 WPA: PTK - hexdump(len=48): d7 5a ad 8a 78 d9 ae 08 c4 18 26 98 60 dd fc f7 ed c9 16 6d 81 08 4c f1 a9 0d d1 5b 66 73 97 e1 7f cf c3 74 c6 52 b2 74 5f 19 cd 38 8b 03 96 c4 WPA: KCK - hexdump(len=16): d7 5a ad 8a 78 d9 ae 08 c4 18 26 98 60 dd fc f7 WPA: KEK - hexdump(len=16): ed c9 16 6d 81 08 4c f1 a9 0d d1 5b 66 73 97 e1 WPA: TK - hexdump(len=16): 7f cf c3 74 c6 52 b2 74 5f 19 cd 38 8b 03 96 c4 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITNEGOTIATING wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=56): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 36 ca 97 91 f7 43 76 28 f7 88 f1 af ac 15 91 db dd 00 00 00 00 00 00 00 00 00 WPA: Encrypt Key Data using AES-WRAP (KEK length 16) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) wlx18d6c711b36c: Event EAPOL_RX (23) received IEEE 802.1X: 99 bytes from 90:de:80:fb:d7:89 IEEE 802.1X: version=1 type=3 length=95 WPA: Received EAPOL-Key from 90:de:80:fb:d7:89 key_info=0x30a type=2 mic_len=16 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x56306a498b80 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 7f cf c3 74 c6 52 b2 74 5f 19 cd 38 8b 03 96 c4 addr=90:de:80:fb:d7:89 pairwise key wlx18d6c711b36c: AP-STA-CONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: authorizing port wlx18d6c711b36c: STA 90:de:80:fb:d7:89 RADIUS: starting accounting session B98111DD1FD686B4 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: pairwise key handshake completed (RSN) wlx18d6c711b36c: EAPOL-4WAY-HS-COMPLETED 90:de:80:fb:d7:89 Signal 15 received - terminating hostapd_interface_deinit_free(0x56306a462630) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x56306a462630) wlx18d6c711b36c: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wlx18d6c711b36c wlx18d6c711b36c: STA 90:de:80:fb:d7:89 MLME: MLME-DEAUTHENTICATE.indication(90:de:80:fb:d7:89, 1) Removing station 90:de:80:fb:d7:89 wlx18d6c711b36c: AP-STA-DISCONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0 hostapd_ht_operation_update current operation mode=0x0 hostapd_ht_operation_update new operation mode=0x0 changes=0 ap_free_sta: cancel ap_handle_timer for 90:de:80:fb:d7:89 wlx18d6c711b36c: Deauthenticate all stations nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found wlx18d6c711b36c: AP-DISABLED hostapd_cleanup(hapd=0x56306a463fe0 (wlx18d6c711b36c)) wlx18d6c711b36c: CTRL-EVENT-TERMINATING hostapd_free_hapd_data(wlx18d6c711b36c) hostapd_interface_deinit_free: driver=0x5630695ff760 drv_priv=0x56306a465860 -> hapd_deinit nl80211: deinit ifname=wlx18d6c711b36c disabled_11b_rates=0 nl80211: Disable Probe Request reporting nl_preq=0x8888deb8e2ced539 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=5) netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 5 iftype 2 (STATION) nl80211: Teardown AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888deb8e2ce22b9 (AP teardown (dev SME)) hostapd_interface_free(0x56306a462630) hostapd_interface_free: free hapd 0x56306a463fe0 hostapd_cleanup_iface(0x56306a462630) hostapd_cleanup_iface_partial(0x56306a462630) hostapd_cleanup_iface: free iface=0x56306a462630 random: getrandom() support available Configuration file: /etc/hostapd/hostapd-WiFi5.conf nl80211: TDLS supported nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4106 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4107 nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0xa0858c0 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=9 nl80211: interface wlx18d6c711b36c in phy phy1 nl80211: Set mode ifindex 5 iftype 3 (AP) nl80211: Setup AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x563679ca7a30 (device SME) nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=12 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x563679ca7a30 match=7f multicast=0 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x563679ca7a30 match= multicast=0 nl80211: Enable Probe Request reporting nl_preq=0x563679ca2db0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x563679ca2db0 match= multicast=0 rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: if_indices[16]: 3(5) nl80211: Add own interface ifindex 5 (ifidx_reason -1) nl80211: if_indices[16]: 3(5) 5(-1) nl80211: Adding interface wlx18d6c711b36c into bridge br0 phy: phy1 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) wlx18d6c711b36c: interface state UNINITIALIZED->COUNTRY_UPDATE Previous country code AR, new country code AR nl80211: Regulatory information - country=AR (DFS-FCC) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 17 mBm nl80211: 5250-5330 @ 80 MHz 24 mBm (DFS) nl80211: 5490-5730 @ 160 MHz 24 mBm (DFS) nl80211: 5735-5835 @ 80 MHz 30 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720[DISABLED] 5745 5765 5785 5805 5825 5845[DISABLED] 5865[DISABLED] 5885[DISABLED] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] hw vht capab: 0x3c031a2, conf vht capab: 0x3c001a2 wlx18d6c711b36c: interface state COUNTRY_UPDATE->HT_SCAN Scan for neighboring BSSes prior to enabling 40 MHz channel 40 MHz affected channel range: [5170,5210] MHz wlx18d6c711b36c: nl80211: scan request nl80211: Passive scan requested Scan requested (ret=0) - scan timeout 10 seconds Interface initialization will be completed in a callback ctrl_iface not configured! RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=br0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) wlx18d6c711b36c: Event INTERFACE_STATUS (5) received Unknown event 5 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=2 ifi_family=7 ifi_flags=0x1003 ([UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: Scan trigger wlx18d6c711b36c: Event SCAN_STARTED (47) received Unknown event 47 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: New scan results available nl80211: Scan included frequencies: 5180 5200 wlx18d6c711b36c: Event SCAN_RESULTS (3) received nl80211: Received scan results (0 BSSes) HT40: control channel: 36 (5180 MHz), secondary channel: 40 (5200 MHz) Completing interface initialization Mode: IEEE 802.11a Channel: 36 Frequency: 5180 MHz DFS 0 channels required radar detection nl80211: Set freq 5180 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=40 MHz, cf1=5190 MHz, cf2=0 MHz) * freq=5180 * he_enabled=0 * vht_enabled=1 * ht_enabled=1 * bandwidth=40 * channel_width=2 * center_freq1=5190 * center_freq2=0 RATE[0] rate=60 flags=0x1 RATE[1] rate=90 flags=0x0 RATE[2] rate=120 flags=0x1 RATE[3] rate=180 flags=0x0 RATE[4] rate=240 flags=0x1 RATE[5] rate=360 flags=0x0 RATE[6] rate=480 flags=0x0 RATE[7] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x563679ca0fe0 (wlx18d6c711b36c), first=1) nl80211: flush -> DEL_STATION wlx18d6c711b36c (all) Using interface wlx18d6c711b36c with hwaddr 18:d6:c7:11:b3:6c and ssid "FDC" Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=3): 46 44 43 FDC PSK (ASCII passphrase) - hexdump_ascii(len=10): 31 31 31 31 31 31 31 31 31 31 1111111111 PSK (from passphrase) - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 random: Got 20/20 random bytes GMK - hexdump(len=32): d5 f1 e4 b9 d5 93 ac a0 35 16 84 df a9 6a 63 11 79 7b c9 ee f6 be 39 af ed a7 c3 06 fe 0d 47 ac Key Counter - hexdump(len=32): dd 41 5e 4d b5 a5 2d f0 51 c4 5a 1c d3 d7 10 98 02 d4 5c d9 89 ad ef ab f3 58 ef 4b 3e ef a6 b6 WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=54): 80 00 00 00 ff ff ff ff ff ff 18 d6 c7 11 b3 6c 18 d6 c7 11 b3 6c 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 03 46 44 43 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 nl80211: Beacon tail - hexdump(len=150): 07 10 41 52 20 24 04 11 34 04 18 64 0b 18 95 05 1e 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 6e 08 1f ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 00 00 00 02 bf 0c a2 01 c0 03 fa ff 63 03 fa ff 63 03 c0 05 00 26 00 fc ff c3 03 01 22 22 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: ifindex=5 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=FDC * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x2 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02 wlx18d6c711b36c: Deauthenticate all stations at BSS start nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): da 54 f1 43 6f cc 40 be 74 39 60 c2 c2 9f e9 0d WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x56367886affd key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): da 54 f1 43 6f cc 40 be 74 39 60 c2 c2 9f e9 0d broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wlx18d6c711b36c operstate 0->1 (UP) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 nl80211: Set Deny ACL (num_mac_acl=0) wlx18d6c711b36c: interface state HT_SCAN->ENABLED wlx18d6c711b36c: AP-ENABLED wlx18d6c711b36c: Setup of interface done. RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=6 linkmode=0 master=3 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlx18d6c711b36c nl80211: New station 90:de:80:fb:d7:89 nl80211: Assoc Req IEs - hexdump(len=124): 00 03 46 44 43 01 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 2d 1a ff 09 03 ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 0a 02 01 40 40 40 00 01 20 bf 0c b2 21 80 33 fa ff 00 00 fa ff 00 20 3b 15 80 51 52 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 dd 07 00 50 f2 02 00 01 00 wlx18d6c711b36c: Event ASSOC (0) received wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.11: associated STA included RSN IE in (Re)AssocReq New STA ap_sta_add: register ap_handle_timer timeout for 90:de:80:fb:d7:89 (300 seconds - ap_max_inactivity) nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x563679cd1d10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: start authentication WPA: 90:de:80:fb:d7:89 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x563679cd1d10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: unauthorizing port WPA: 90:de:80:fb:d7:89 WPA_PTK_GROUP entering state IDLE WPA: 90:de:80:fb:d7:89 WPA_PTK entering state AUTHENTICATION WPA: 90:de:80:fb:d7:89 WPA_PTK entering state AUTHENTICATION2 WPA: Re-initialize GMK/Counter on first station GMK - hexdump(len=32): 2a 77 de e1 8a b0 f8 46 0f 03 54 87 29 48 75 9d e5 e5 a6 67 90 3d 56 0b 53 c2 63 ff 1b ac 37 64 Key Counter - hexdump(len=32): 44 38 88 7f 78 39 db 76 7a 95 86 87 52 26 a9 45 54 b2 92 e4 50 46 8d 24 5f 6a 37 55 ac 25 7a 9d GTK - hexdump(len=16): 33 09 9c b5 cd e5 5d 4a 57 01 fb 7c cd b7 fd 75 wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x56367886affd key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 33 09 9c b5 cd e5 5d 4a 57 01 fb 7c cd b7 fd 75 broadcast key nl80211: NL80211_CMD_SET_KEY - default key WPA: Assign ANonce - hexdump(len=32): c3 0a 23 35 b6 cc 81 5f 29 71 e5 43 cc b7 57 de d9 ec cd 50 5b 62 a0 97 48 af 67 84 c7 7c 31 5c WPA: 90:de:80:fb:d7:89 WPA_PTK entering state INITPSK Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKSTART wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) wlx18d6c711b36c: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 90:de:80:fb:d7:89 (300 seconds - ap_max_inactivity) wlx18d6c711b36c: Event EAPOL_RX (23) received IEEE 802.1X: 121 bytes from 90:de:80:fb:d7:89 IEEE 802.1X: version=1 type=3 length=117 WPA: Received EAPOL-Key from 90:de:80:fb:d7:89 key_info=0x10a type=2 mic_len=16 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 97 5f 54 91 9a 8f 00 28 d3 96 3c ed 18 f0 f5 5f b5 3e 66 6f f2 42 c2 29 3e 23 46 72 4f 4b 69 52 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: received EAPOL-Key frame (2/4 Pairwise) WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKCALCNEGOTIATING Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=18:d6:c7:11:b3:6c A2=90:de:80:fb:d7:89 WPA: Nonce1 - hexdump(len=32): c3 0a 23 35 b6 cc 81 5f 29 71 e5 43 cc b7 57 de d9 ec cd 50 5b 62 a0 97 48 af 67 84 c7 7c 31 5c WPA: Nonce2 - hexdump(len=32): 97 5f 54 91 9a 8f 00 28 d3 96 3c ed 18 f0 f5 5f b5 3e 66 6f f2 42 c2 29 3e 23 46 72 4f 4b 69 52 WPA: PMK - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 WPA: PTK - hexdump(len=48): de cf 46 65 65 27 d4 fd fd 58 e8 4d 5d db 09 6f 58 0a a3 68 97 1b 27 a7 21 e3 45 f9 b1 48 78 60 9a 46 9d 84 cc ad 1a 49 c7 6b 68 51 28 36 97 1a WPA: KCK - hexdump(len=16): de cf 46 65 65 27 d4 fd fd 58 e8 4d 5d db 09 6f WPA: KEK - hexdump(len=16): 58 0a a3 68 97 1b 27 a7 21 e3 45 f9 b1 48 78 60 WPA: TK - hexdump(len=16): 9a 46 9d 84 cc ad 1a 49 c7 6b 68 51 28 36 97 1a WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITNEGOTIATING wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=56): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 33 09 9c b5 cd e5 5d 4a 57 01 fb 7c cd b7 fd 75 dd 00 00 00 00 00 00 00 00 00 WPA: Encrypt Key Data using AES-WRAP (KEK length 16) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) wlx18d6c711b36c: Event EAPOL_RX (23) received IEEE 802.1X: 99 bytes from 90:de:80:fb:d7:89 IEEE 802.1X: version=1 type=3 length=95 WPA: Received EAPOL-Key from 90:de:80:fb:d7:89 key_info=0x30a type=2 mic_len=16 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x563679cd1d10 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 9a 46 9d 84 cc ad 1a 49 c7 6b 68 51 28 36 97 1a addr=90:de:80:fb:d7:89 pairwise key wlx18d6c711b36c: AP-STA-CONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: authorizing port wlx18d6c711b36c: STA 90:de:80:fb:d7:89 RADIUS: starting accounting session A2581C99604340B9 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: pairwise key handshake completed (RSN) wlx18d6c711b36c: EAPOL-4WAY-HS-COMPLETED 90:de:80:fb:d7:89 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) wlx18d6c711b36c: ap_handle_timer: 90:de:80:fb:d7:89 flags=0x23 timeout_next=0 wlx18d6c711b36c: Station 90:de:80:fb:d7:89 has been active 1s ago ap_handle_timer: register ap_handle_timer timeout for 90:de:80:fb:d7:89 (299 seconds) Signal 15 received - terminating hostapd_interface_deinit_free(0x563679c9f630) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x563679c9f630) wlx18d6c711b36c: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wlx18d6c711b36c wlx18d6c711b36c: STA 90:de:80:fb:d7:89 MLME: MLME-DEAUTHENTICATE.indication(90:de:80:fb:d7:89, 1) Removing station 90:de:80:fb:d7:89 wlx18d6c711b36c: AP-STA-DISCONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0 hostapd_ht_operation_update current operation mode=0x0 hostapd_ht_operation_update new operation mode=0x0 changes=0 ap_free_sta: cancel ap_handle_timer for 90:de:80:fb:d7:89 wlx18d6c711b36c: Deauthenticate all stations nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found wlx18d6c711b36c: AP-DISABLED hostapd_cleanup(hapd=0x563679ca0fe0 (wlx18d6c711b36c)) wlx18d6c711b36c: CTRL-EVENT-TERMINATING hostapd_free_hapd_data(wlx18d6c711b36c) hostapd_interface_deinit_free: driver=0x563678900760 drv_priv=0x563679ca2860 -> hapd_deinit nl80211: deinit ifname=wlx18d6c711b36c disabled_11b_rates=0 nl80211: Disable Probe Request reporting nl_preq=0x8888debef142a539 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=5) netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 5 iftype 2 (STATION) nl80211: Teardown AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888debef142f2b9 (AP teardown (dev SME)) hostapd_interface_free(0x563679c9f630) hostapd_interface_free: free hapd 0x563679ca0fe0 hostapd_cleanup_iface(0x563679c9f630) hostapd_cleanup_iface_partial(0x563679c9f630) hostapd_cleanup_iface: free iface=0x563679c9f630 random: getrandom() support available Configuration file: /etc/hostapd/hostapd-WiFi5.conf nl80211: TDLS supported nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4106 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4107 nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0xa0858c0 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=9 nl80211: interface wlx18d6c711b36c in phy phy1 nl80211: Set mode ifindex 5 iftype 3 (AP) nl80211: Setup AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x557b113bca30 (device SME) nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=12 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x557b113bca30 match=7f multicast=0 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x557b113bca30 match= multicast=0 nl80211: Enable Probe Request reporting nl_preq=0x557b113b7db0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x557b113b7db0 match= multicast=0 rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: if_indices[16]: 3(5) nl80211: Add own interface ifindex 5 (ifidx_reason -1) nl80211: if_indices[16]: 3(5) 5(-1) nl80211: Adding interface wlx18d6c711b36c into bridge br0 phy: phy1 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) wlx18d6c711b36c: interface state UNINITIALIZED->COUNTRY_UPDATE Previous country code AR, new country code AR nl80211: Regulatory information - country=AR (DFS-FCC) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 17 mBm nl80211: 5250-5330 @ 80 MHz 24 mBm (DFS) nl80211: 5490-5730 @ 160 MHz 24 mBm (DFS) nl80211: 5735-5835 @ 80 MHz 30 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720[DISABLED] 5745 5765 5785 5805 5825 5845[DISABLED] 5865[DISABLED] 5885[DISABLED] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] hw vht capab: 0x3c031a2, conf vht capab: 0x3c001a2 wlx18d6c711b36c: interface state COUNTRY_UPDATE->HT_SCAN Scan for neighboring BSSes prior to enabling 40 MHz channel 40 MHz affected channel range: [5170,5210] MHz wlx18d6c711b36c: nl80211: scan request nl80211: Passive scan requested Scan requested (ret=0) - scan timeout 10 seconds Interface initialization will be completed in a callback ctrl_iface not configured! RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=br0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) wlx18d6c711b36c: Event INTERFACE_STATUS (5) received Unknown event 5 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=2 ifi_family=7 ifi_flags=0x1003 ([UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: Scan trigger wlx18d6c711b36c: Event SCAN_STARTED (47) received Unknown event 47 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: New scan results available nl80211: Scan included frequencies: 5180 5200 wlx18d6c711b36c: Event SCAN_RESULTS (3) received nl80211: Received scan results (0 BSSes) HT40: control channel: 36 (5180 MHz), secondary channel: 40 (5200 MHz) Completing interface initialization Mode: IEEE 802.11a Channel: 36 Frequency: 5180 MHz DFS 0 channels required radar detection 20/40 MHz: center segment 0 (=36) and center freq 1 (=5190) not in sync Could not set channel for kernel driver Interface initialization failed wlx18d6c711b36c: interface state HT_SCAN->DISABLED wlx18d6c711b36c: AP-DISABLED hostapd_interface_deinit_free(0x557b113b4630) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x557b113b4630) wlx18d6c711b36c: interface state DISABLED->DISABLED hostapd_bss_deinit: deinit bss wlx18d6c711b36c wlx18d6c711b36c: Deauthenticate all stations nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found wlx18d6c711b36c: AP-DISABLED hostapd_cleanup(hapd=0x557b113b5fe0 (wlx18d6c711b36c)) wlx18d6c711b36c: CTRL-EVENT-TERMINATING hostapd_free_hapd_data: Interface wlx18d6c711b36c wasn't started hostapd_interface_deinit_free: driver=0x557b1117f760 drv_priv=0x557b113b7860 -> hapd_deinit nl80211: deinit ifname=wlx18d6c711b36c disabled_11b_rates=0 nl80211: Disable Probe Request reporting nl_preq=0x8888ddf399b3f539 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=5) netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 5 iftype 2 (STATION) nl80211: Teardown AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888ddf399b342b9 (AP teardown (dev SME)) hostapd_interface_free(0x557b113b4630) hostapd_interface_free: free hapd 0x557b113b5fe0 hostapd_cleanup_iface(0x557b113b4630) hostapd_cleanup_iface_partial(0x557b113b4630) hostapd_cleanup_iface: free iface=0x557b113b4630 random: getrandom() support available Configuration file: /etc/hostapd/hostapd-WiFi5.conf nl80211: TDLS supported nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4106 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4107 nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0xa0858c0 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=9 nl80211: interface wlx18d6c711b36c in phy phy1 nl80211: Set mode ifindex 5 iftype 3 (AP) nl80211: Setup AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x55d786c45a30 (device SME) nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=12 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d786c45a30 match=7f multicast=0 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x55d786c45a30 match= multicast=0 nl80211: Enable Probe Request reporting nl_preq=0x55d786c40db0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x55d786c40db0 match= multicast=0 rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: if_indices[16]: 3(5) nl80211: Add own interface ifindex 5 (ifidx_reason -1) nl80211: if_indices[16]: 3(5) 5(-1) nl80211: Adding interface wlx18d6c711b36c into bridge br0 phy: phy1 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) wlx18d6c711b36c: interface state UNINITIALIZED->COUNTRY_UPDATE Previous country code AR, new country code AR nl80211: Regulatory information - country=AR (DFS-FCC) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 17 mBm nl80211: 5250-5330 @ 80 MHz 24 mBm (DFS) nl80211: 5490-5730 @ 160 MHz 24 mBm (DFS) nl80211: 5735-5835 @ 80 MHz 30 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720[DISABLED] 5745 5765 5785 5805 5825 5845[DISABLED] 5865[DISABLED] 5885[DISABLED] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] hw vht capab: 0x3c031a2, conf vht capab: 0x3c001a2 wlx18d6c711b36c: interface state COUNTRY_UPDATE->HT_SCAN Scan for neighboring BSSes prior to enabling 40 MHz channel 40 MHz affected channel range: [5170,5210] MHz wlx18d6c711b36c: nl80211: scan request nl80211: Passive scan requested Scan requested (ret=0) - scan timeout 10 seconds Interface initialization will be completed in a callback ctrl_iface not configured! RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=br0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) wlx18d6c711b36c: Event INTERFACE_STATUS (5) received Unknown event 5 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=2 ifi_family=7 ifi_flags=0x1003 ([UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: Scan trigger wlx18d6c711b36c: Event SCAN_STARTED (47) received Unknown event 47 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: New scan results available nl80211: Scan included frequencies: 5180 5200 wlx18d6c711b36c: Event SCAN_RESULTS (3) received nl80211: Received scan results (0 BSSes) HT40: control channel: 36 (5180 MHz), secondary channel: 40 (5200 MHz) Completing interface initialization Mode: IEEE 802.11a Channel: 36 Frequency: 5180 MHz DFS 0 channels required radar detection nl80211: Set freq 5180 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=40 MHz, cf1=5190 MHz, cf2=0 MHz) * freq=5180 * he_enabled=0 * vht_enabled=1 * ht_enabled=1 * bandwidth=40 * channel_width=2 * center_freq1=5190 * center_freq2=0 RATE[0] rate=60 flags=0x1 RATE[1] rate=90 flags=0x0 RATE[2] rate=120 flags=0x1 RATE[3] rate=180 flags=0x0 RATE[4] rate=240 flags=0x1 RATE[5] rate=360 flags=0x0 RATE[6] rate=480 flags=0x0 RATE[7] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x55d786c3efe0 (wlx18d6c711b36c), first=1) nl80211: flush -> DEL_STATION wlx18d6c711b36c (all) Using interface wlx18d6c711b36c with hwaddr 18:d6:c7:11:b3:6c and ssid "FDC" Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=3): 46 44 43 FDC PSK (ASCII passphrase) - hexdump_ascii(len=10): 31 31 31 31 31 31 31 31 31 31 1111111111 PSK (from passphrase) - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 random: Got 20/20 random bytes GMK - hexdump(len=32): 13 ba 5b 36 3f 40 83 2b 77 40 ec 87 53 51 47 b6 d6 1a 4e 36 6c 34 43 0f 9c d8 47 62 31 65 16 5c Key Counter - hexdump(len=32): 90 73 63 f3 f8 a1 c5 d5 0f 72 c1 bc f9 5d eb bb bc d8 dc 14 95 2c 81 c2 7b 3c 84 5a 28 c3 93 bc WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=54): 80 00 00 00 ff ff ff ff ff ff 18 d6 c7 11 b3 6c 18 d6 c7 11 b3 6c 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 03 46 44 43 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 nl80211: Beacon tail - hexdump(len=150): 07 10 41 52 20 24 04 11 34 04 18 64 0b 18 95 05 1e 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 6e 08 1f ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 00 00 00 02 bf 0c a2 01 c0 03 fa ff 63 03 fa ff 63 03 c0 05 00 26 00 fc ff c3 03 01 22 22 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: ifindex=5 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=FDC * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x2 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02 wlx18d6c711b36c: Deauthenticate all stations at BSS start nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): 9b f0 a5 35 cc 35 36 6b d8 c0 cf 0c b8 cd 7c e4 WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x55d785b95ffd key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 9b f0 a5 35 cc 35 36 6b d8 c0 cf 0c b8 cd 7c e4 broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wlx18d6c711b36c operstate 0->1 (UP) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 nl80211: Set Deny ACL (num_mac_acl=0) wlx18d6c711b36c: interface state HT_SCAN->ENABLED wlx18d6c711b36c: AP-ENABLED wlx18d6c711b36c: Setup of interface done. RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=6 linkmode=0 master=3 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlx18d6c711b36c nl80211: New station 90:de:80:fb:d7:89 nl80211: Assoc Req IEs - hexdump(len=124): 00 03 46 44 43 01 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 2d 1a ff 09 03 ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 0a 02 01 40 40 40 00 01 20 bf 0c b2 21 80 33 fa ff 00 00 fa ff 00 20 3b 15 80 51 52 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 dd 07 00 50 f2 02 00 01 00 wlx18d6c711b36c: Event ASSOC (0) received wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.11: associated STA included RSN IE in (Re)AssocReq New STA ap_sta_add: register ap_handle_timer timeout for 90:de:80:fb:d7:89 (300 seconds - ap_max_inactivity) nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x55d786c6feb0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: start authentication WPA: 90:de:80:fb:d7:89 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x55d786c6feb0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: unauthorizing port WPA: 90:de:80:fb:d7:89 WPA_PTK_GROUP entering state IDLE WPA: 90:de:80:fb:d7:89 WPA_PTK entering state AUTHENTICATION WPA: 90:de:80:fb:d7:89 WPA_PTK entering state AUTHENTICATION2 WPA: Re-initialize GMK/Counter on first station GMK - hexdump(len=32): 03 d3 a8 97 33 89 0d 05 74 20 5a 2d 07 93 20 5b a6 28 c8 a8 73 8e a2 cb 22 5a 20 80 d2 c1 b4 26 Key Counter - hexdump(len=32): 2e ea 91 69 cf 35 28 cb 21 02 95 49 97 4e 71 f1 7e 35 b8 db 6b f3 7b e6 79 d6 3c c0 d5 f6 b7 c2 GTK - hexdump(len=16): 62 e3 9a 04 3e 6d a4 fe 94 92 02 91 2b 2f bc af wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x55d785b95ffd key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 62 e3 9a 04 3e 6d a4 fe 94 92 02 91 2b 2f bc af broadcast key nl80211: NL80211_CMD_SET_KEY - default key WPA: Assign ANonce - hexdump(len=32): 0c 6e c1 d2 49 f7 63 1a 46 80 67 8f 77 4a ed 7a 09 db 6e aa 6d c3 7d 9c e4 e1 3a ab 95 df ac 9d WPA: 90:de:80:fb:d7:89 WPA_PTK entering state INITPSK Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKSTART wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) wlx18d6c711b36c: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 90:de:80:fb:d7:89 (300 seconds - ap_max_inactivity) wlx18d6c711b36c: Event EAPOL_RX (23) received IEEE 802.1X: 121 bytes from 90:de:80:fb:d7:89 IEEE 802.1X: version=1 type=3 length=117 WPA: Received EAPOL-Key from 90:de:80:fb:d7:89 key_info=0x10a type=2 mic_len=16 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 42 34 c6 9c 9b 4c 68 c8 02 79 25 7c 83 84 fc ce 00 16 ab 07 6c a1 12 a8 49 48 76 5f 00 53 92 30 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: received EAPOL-Key frame (2/4 Pairwise) WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKCALCNEGOTIATING Searching a PSK for 90:de:80:fb:d7:89 prev_psk=(nil) WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=18:d6:c7:11:b3:6c A2=90:de:80:fb:d7:89 WPA: Nonce1 - hexdump(len=32): 0c 6e c1 d2 49 f7 63 1a 46 80 67 8f 77 4a ed 7a 09 db 6e aa 6d c3 7d 9c e4 e1 3a ab 95 df ac 9d WPA: Nonce2 - hexdump(len=32): 42 34 c6 9c 9b 4c 68 c8 02 79 25 7c 83 84 fc ce 00 16 ab 07 6c a1 12 a8 49 48 76 5f 00 53 92 30 WPA: PMK - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 WPA: PTK - hexdump(len=48): db bf a4 4c c4 15 43 a8 89 65 f6 e4 cb 2f cb 83 60 ba 86 ca 37 a9 01 fe cf e8 b9 5e 65 7a aa 39 37 0b f0 de 87 27 c8 6e fe 95 f5 6b 7a a8 27 43 WPA: KCK - hexdump(len=16): db bf a4 4c c4 15 43 a8 89 65 f6 e4 cb 2f cb 83 WPA: KEK - hexdump(len=16): 60 ba 86 ca 37 a9 01 fe cf e8 b9 5e 65 7a aa 39 WPA: TK - hexdump(len=16): 37 0b f0 de 87 27 c8 6e fe 95 f5 6b 7a a8 27 43 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITNEGOTIATING wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=56): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 62 e3 9a 04 3e 6d a4 fe 94 92 02 91 2b 2f bc af dd 00 00 00 00 00 00 00 00 00 WPA: Encrypt Key Data using AES-WRAP (KEK length 16) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) wlx18d6c711b36c: Event EAPOL_RX (23) received IEEE 802.1X: 99 bytes from 90:de:80:fb:d7:89 IEEE 802.1X: version=1 type=3 length=95 WPA: Received EAPOL-Key from 90:de:80:fb:d7:89 key_info=0x30a type=2 mic_len=16 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: 90:de:80:fb:d7:89 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x55d786c6feb0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): 37 0b f0 de 87 27 c8 6e fe 95 f5 6b 7a a8 27 43 addr=90:de:80:fb:d7:89 pairwise key wlx18d6c711b36c: AP-STA-CONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: authorizing port wlx18d6c711b36c: STA 90:de:80:fb:d7:89 RADIUS: starting accounting session 7C164CF9BB189F54 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: pairwise key handshake completed (RSN) wlx18d6c711b36c: EAPOL-4WAY-HS-COMPLETED 90:de:80:fb:d7:89 nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlx18d6c711b36c nl80211: Delete station 90:de:80:fb:d7:89 wlx18d6c711b36c: Event DISASSOC (1) received wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.11: disassociated wlx18d6c711b36c: AP-STA-DISCONNECTED 90:de:80:fb:d7:89 nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 WPA: event 2 notification wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x55d786c6feb0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key WPA: 90:de:80:fb:d7:89 WPA_PTK entering state DISCONNECTED WPA: 90:de:80:fb:d7:89 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=0 addr=0x55d786c6feb0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=90:de:80:fb:d7:89 pairwise key nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0 wlx18d6c711b36c: STA 90:de:80:fb:d7:89 IEEE 802.1X: unauthorizing port nl80211: Set STA flags - ifname=wlx18d6c711b36c addr=90:de:80:fb:d7:89 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0 nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c 90:de:80:fb:d7:89 --> 0 (Success) nl80211: deleted bridge FDB entry for 90:de:80:fb:d7:89 hostapd_ht_operation_update current operation mode=0x0 hostapd_ht_operation_update new operation mode=0x0 changes=0 ap_free_sta: cancel ap_handle_timer for 90:de:80:fb:d7:89 Signal 15 received - terminating hostapd_interface_deinit_free(0x55d786c3d630) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x55d786c3d630) wlx18d6c711b36c: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wlx18d6c711b36c wlx18d6c711b36c: Deauthenticate all stations nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found wlx18d6c711b36c: AP-DISABLED hostapd_cleanup(hapd=0x55d786c3efe0 (wlx18d6c711b36c)) wlx18d6c711b36c: CTRL-EVENT-TERMINATING hostapd_free_hapd_data(wlx18d6c711b36c) hostapd_interface_deinit_free: driver=0x55d785c2b760 drv_priv=0x55d786c40860 -> hapd_deinit nl80211: deinit ifname=wlx18d6c711b36c disabled_11b_rates=0 nl80211: Disable Probe Request reporting nl_preq=0x8888dd5f0e4c8539 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=5) netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 5 iftype 2 (STATION) nl80211: Teardown AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888dd5f0e4cd2b9 (AP teardown (dev SME)) hostapd_interface_free(0x55d786c3d630) hostapd_interface_free: free hapd 0x55d786c3efe0 hostapd_cleanup_iface(0x55d786c3d630) hostapd_cleanup_iface_partial(0x55d786c3d630) hostapd_cleanup_iface: free iface=0x55d786c3d630 random: getrandom() support available Configuration file: /etc/hostapd/hostapd-WiFi5.conf nl80211: TDLS supported nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4106 nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4107 nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0xa0858c0 rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=9 nl80211: interface wlx18d6c711b36c in phy phy1 nl80211: Set mode ifindex 5 iftype 3 (AP) nl80211: Setup AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x558594cc7a30 (device SME) nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=12 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x558594cc7a30 match=7f multicast=0 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x558594cc7a30 match= multicast=0 nl80211: Enable Probe Request reporting nl_preq=0x558594cc2db0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x558594cc2db0 match= multicast=0 rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: if_indices[16]: 3(5) nl80211: Add own interface ifindex 5 (ifidx_reason -1) nl80211: if_indices[16]: 3(5) 5(-1) nl80211: Adding interface wlx18d6c711b36c into bridge br0 phy: phy1 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) wlx18d6c711b36c: interface state UNINITIALIZED->COUNTRY_UPDATE Previous country code AR, new country code AR nl80211: Regulatory information - country=AR (DFS-FCC) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 17 mBm nl80211: 5250-5330 @ 80 MHz 24 mBm (DFS) nl80211: 5490-5730 @ 160 MHz 24 mBm (DFS) nl80211: 5735-5835 @ 80 MHz 30 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720[DISABLED] 5745 5765 5785 5805 5825 5845[DISABLED] 5865[DISABLED] 5885[DISABLED] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] hw vht capab: 0x3c031a2, conf vht capab: 0x3c001a2 wlx18d6c711b36c: interface state COUNTRY_UPDATE->HT_SCAN Scan for neighboring BSSes prior to enabling 40 MHz channel 40 MHz affected channel range: [5170,5210] MHz wlx18d6c711b36c: nl80211: scan request nl80211: Passive scan requested Scan requested (ret=0) - scan timeout 10 seconds Interface initialization will be completed in a callback ctrl_iface not configured! RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=2 linkmode=0 master=3 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=br0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) wlx18d6c711b36c: Event INTERFACE_STATUS (5) received Unknown event 5 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=2 ifi_family=7 ifi_flags=0x1003 ([UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: Scan trigger wlx18d6c711b36c: Event SCAN_STARTED (47) received Unknown event 47 RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlx18d6c711b36c wlx18d6c711b36c: nl80211: New scan results available nl80211: Scan included frequencies: 5180 5200 wlx18d6c711b36c: Event SCAN_RESULTS (3) received nl80211: Received scan results (0 BSSes) HT40: control channel: 36 (5180 MHz), secondary channel: 40 (5200 MHz) Completing interface initialization Mode: IEEE 802.11a Channel: 36 Frequency: 5180 MHz DFS 0 channels required radar detection nl80211: Set freq 5180 (ht_enabled=1, vht_enabled=1, he_enabled=0, bandwidth=80 MHz, cf1=5210 MHz, cf2=0 MHz) * freq=5180 * he_enabled=0 * vht_enabled=1 * ht_enabled=1 * bandwidth=80 * channel_width=3 * center_freq1=5210 * center_freq2=0 RATE[0] rate=60 flags=0x1 RATE[1] rate=90 flags=0x0 RATE[2] rate=120 flags=0x1 RATE[3] rate=180 flags=0x0 RATE[4] rate=240 flags=0x1 RATE[5] rate=360 flags=0x0 RATE[6] rate=480 flags=0x0 RATE[7] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x558594cc0fe0 (wlx18d6c711b36c), first=1) nl80211: flush -> DEL_STATION wlx18d6c711b36c (all) Using interface wlx18d6c711b36c with hwaddr 18:d6:c7:11:b3:6c and ssid "FDC" Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=3): 46 44 43 FDC PSK (ASCII passphrase) - hexdump_ascii(len=10): 31 31 31 31 31 31 31 31 31 31 1111111111 PSK (from passphrase) - hexdump(len=32): 2f 16 d2 fa bd 27 1d 5b f4 38 f3 2a bb 77 54 a1 3b dc 24 72 33 22 c7 2d 5b 3d 80 9c 50 9d 61 b3 random: Got 20/20 random bytes GMK - hexdump(len=32): 13 1b b6 e5 72 90 37 32 e2 ec 3d b6 6a e0 82 15 7b 14 ca d7 89 85 e7 00 5d 1e e1 c2 bc 6a 71 3f Key Counter - hexdump(len=32): 62 35 13 ae 63 1c 93 83 3f 80 7b df f9 ed 2b 3c bd 42 c9 b1 ef b6 5b 63 be de 6e 6e f1 5a 07 d0 WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=54): 80 00 00 00 ff ff ff ff ff ff 18 d6 c7 11 b3 6c 18 d6 c7 11 b3 6c 00 00 00 00 00 00 00 00 00 00 64 00 11 00 00 03 46 44 43 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 nl80211: Beacon tail - hexdump(len=151): 07 10 41 52 20 24 04 11 34 04 18 64 0b 18 95 05 1e 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 6e 08 1f ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 00 00 00 02 bf 0c a2 01 c0 03 fa ff 63 03 fa ff 63 03 c0 05 01 2a 00 fc ff c3 04 02 22 22 22 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: ifindex=5 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=FDC * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x2 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02 nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02 wlx18d6c711b36c: Deauthenticate all stations at BSS start nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): b9 d3 a7 23 1e 0a 58 85 5d f2 b9 93 51 61 c0 21 WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=5 (wlx18d6c711b36c) alg=3 addr=0x558593a87ffd key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): b9 d3 a7 23 1e 0a 58 85 5d f2 b9 93 51 61 c0 21 broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wlx18d6c711b36c operstate 0->1 (UP) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 nl80211: Set Deny ACL (num_mac_acl=0) wlx18d6c711b36c: interface state HT_SCAN->ENABLED wlx18d6c711b36c: AP-ENABLED wlx18d6c711b36c: Setup of interface done. RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c operstate=6 linkmode=0 master=3 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c master=3 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Add ifindex 3 for bridge br0 nl80211: Add own interface ifindex 3 (ifidx_reason 5) nl80211: ifindex 3 already in the list VLAN: RTM_NEWLINK: ifi_index=5 ifname=wlx18d6c711b36c ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) VLAN: vlan_newlink(wlx18d6c711b36c) Signal 15 received - terminating hostapd_interface_deinit_free(0x558594cbf630) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x558594cbf630) wlx18d6c711b36c: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wlx18d6c711b36c wlx18d6c711b36c: Deauthenticate all stations nl80211: sta_remove -> DEL_STATION wlx18d6c711b36c ff:ff:ff:ff:ff:ff --> -22 (Invalid argument) nl80211: bridge FDB entry delete for ff:ff:ff:ff:ff:ff ifindex=5 failed: Object not found wlx18d6c711b36c: AP-DISABLED hostapd_cleanup(hapd=0x558594cc0fe0 (wlx18d6c711b36c)) wlx18d6c711b36c: CTRL-EVENT-TERMINATING hostapd_free_hapd_data(wlx18d6c711b36c) hostapd_interface_deinit_free: driver=0x558593b1d760 drv_priv=0x558594cc2860 -> hapd_deinit nl80211: deinit ifname=wlx18d6c711b36c disabled_11b_rates=0 nl80211: Disable Probe Request reporting nl_preq=0x8888dd0d1c44a539 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=5) netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 5 iftype 2 (STATION) nl80211: Teardown AP(wlx18d6c711b36c) - device_ap_sme=1 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888dd0d1c44f2b9 (AP teardown (dev SME)) hostapd_interface_free(0x558594cbf630) hostapd_interface_free: free hapd 0x558594cc0fe0 hostapd_cleanup_iface(0x558594cbf630) hostapd_cleanup_iface_partial(0x558594cbf630) hostapd_cleanup_iface: free iface=0x558594cbf630 ```
I tried to check if the 20 and 40 MHz bandwidths work and they don't work. It continues broadcasting at 80 MHz.
This is a driver option (module parameter) issue.
options 8812au rtw_switch_usb_mode=2 rtw_power_mgnt=0 rtw_dfs_region_domain=1 rtw_country_code=AR rtw_vht_enable=2
Change rtw_vht_enable=2
to rtw_vht_enable=1" The ONLY time to use
rtw_vht_enable=2` is when you want 80 MHz on the 5 GHz band.
Channel 132 not work.
This may be an issue with regdb. What channels are allowed in Argentina? And does the current regdb reflect what the law allows?
@morrownr I didn't know that information and it's good to clarify it. I changed that setting to rtw_vht_enable=1
and it now works on 20 MHz and 40 MHz.
Channel 165 - 20 MHz.
channel=165
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
#vht_oper_chwidth=0
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=165
Channel 132 - 40 MHz.
channel=132
# Channel width (0 = 40 MHz. 1 = 80 Mhz)
vht_oper_chwidth=0
# VHT center channel (chan + 6)
vht_oper_centr_freq_seg0_idx=134
Channel 132 not work.
This may be an issue with regdb. What channels are allowed in Argentina? And does the current regdb reflect what the law allows?
The device does not support channel 132 at 80 MHz viewing iw list
. Apparently the culprit is channel 144. It is also not possible to connect to a network that uses that channel and bandwidth in client mode.
franco@netbook:~$ sudo iw list | grep "* 5"
[sudo] contraseña para franco:
* 5.5 Mbps
* 54.0 Mbps
* 54.0 Mbps
* 5180 MHz [36] (15.0 dBm)
* 5200 MHz [40] (15.0 dBm)
* 5220 MHz [44] (15.0 dBm)
* 5240 MHz [48] (15.0 dBm)
* 5260 MHz [52] (15.0 dBm)
* 5280 MHz [56] (15.0 dBm)
* 5300 MHz [60] (15.0 dBm)
* 5320 MHz [64] (15.0 dBm)
* 5500 MHz [100] (15.0 dBm)
* 5520 MHz [104] (15.0 dBm)
* 5540 MHz [108] (15.0 dBm)
* 5560 MHz [112] (15.0 dBm)
* 5580 MHz [116] (15.0 dBm)
* 5600 MHz [120] (15.0 dBm)
* 5620 MHz [124] (15.0 dBm)
* 5640 MHz [128] (15.0 dBm)
* 5660 MHz [132] (15.0 dBm)
* 5680 MHz [136] (15.0 dBm)
* 5700 MHz [140] (15.0 dBm)
* 5720 MHz [144] (disabled)
* 5745 MHz [149] (15.0 dBm)
* 5765 MHz [153] (15.0 dBm)
* 5785 MHz [157] (15.0 dBm)
* 5805 MHz [161] (15.0 dBm)
* 5825 MHz [165] (15.0 dBm)
* 5845 MHz [169] (disabled)
* 5865 MHz [173] (disabled)
* 5885 MHz [177] (disabled)
* 5.5 Mbps
* 54.0 Mbps
franco@netbook:~$ sudo iw reg get
global
country AR: DFS-FCC
(2402 - 2482 @ 40), (N/A, 20), (N/A)
(5170 - 5250 @ 80), (N/A, 17), (N/A), AUTO-BW
(5250 - 5330 @ 80), (N/A, 24), (0 ms), DFS, AUTO-BW
(5490 - 5730 @ 160), (N/A, 24), (0 ms), DFS
(5735 - 5835 @ 80), (N/A, 30), (N/A)
phy#0
country 99: DFS-UNSET
(2402 - 2472 @ 40), (N/A, 20), (N/A)
(2457 - 2482 @ 40), (N/A, 20), (N/A), PASSIVE-SCAN
(5140 - 5360 @ 80), (N/A, 30), (N/A)
(5460 - 5860 @ 80), (N/A, 30), (N/A)
The device does not support channel 132 at 80 MHz viewing iw list. Apparently the culprit is channel 144. It is also not possible to connect to a network that uses that channel and bandwidth in client mode.
Ch 144 used to be handled the same in the US but has been open for use for years now. I just went and took a look at the AR info in db.txt. I suspect it is dated and needs to be updated. That is your job since you volunteered
Seriously, there is no magic that keeps db.txt updated. It takes a person in each country to bring the changes to the attention of the maintainer. Can I forward you information on how to get started on getting AR updated?
@morrownr
Can I forward you information on how to get started on getting AR updated?
Maybe another time. I'm still testing the controller. And I have to report that there are problems. And it's high latency (again).
[franco@pc ~]$ ping 1.1.1.1
PING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.
64 bytes from 1.1.1.1: icmp_seq=1 ttl=57 time=30.8 ms
64 bytes from 1.1.1.1: icmp_seq=2 ttl=57 time=56.1 ms
64 bytes from 1.1.1.1: icmp_seq=3 ttl=57 time=23.4 ms
64 bytes from 1.1.1.1: icmp_seq=4 ttl=57 time=23.0 ms
64 bytes from 1.1.1.1: icmp_seq=5 ttl=57 time=110 ms
64 bytes from 1.1.1.1: icmp_seq=6 ttl=57 time=21.9 ms
64 bytes from 1.1.1.1: icmp_seq=7 ttl=57 time=21.7 ms
64 bytes from 1.1.1.1: icmp_seq=8 ttl=57 time=29.5 ms
64 bytes from 1.1.1.1: icmp_seq=9 ttl=57 time=30.4 ms
64 bytes from 1.1.1.1: icmp_seq=10 ttl=57 time=23.1 ms
64 bytes from 1.1.1.1: icmp_seq=11 ttl=57 time=22.2 ms
64 bytes from 1.1.1.1: icmp_seq=12 ttl=57 time=22.6 ms
64 bytes from 1.1.1.1: icmp_seq=13 ttl=57 time=22.9 ms
64 bytes from 1.1.1.1: icmp_seq=14 ttl=57 time=24.2 ms
64 bytes from 1.1.1.1: icmp_seq=15 ttl=57 time=24.9 ms
64 bytes from 1.1.1.1: icmp_seq=16 ttl=57 time=23.0 ms
64 bytes from 1.1.1.1: icmp_seq=17 ttl=57 time=27.9 ms
64 bytes from 1.1.1.1: icmp_seq=18 ttl=57 time=23.8 ms
64 bytes from 1.1.1.1: icmp_seq=19 ttl=57 time=22.9 ms
64 bytes from 1.1.1.1: icmp_seq=20 ttl=57 time=83.2 ms
64 bytes from 1.1.1.1: icmp_seq=21 ttl=57 time=38.8 ms
64 bytes from 1.1.1.1: icmp_seq=22 ttl=57 time=23.6 ms
64 bytes from 1.1.1.1: icmp_seq=23 ttl=57 time=24.2 ms
64 bytes from 1.1.1.1: icmp_seq=24 ttl=57 time=18.9 ms
64 bytes from 1.1.1.1: icmp_seq=25 ttl=57 time=23.9 ms
64 bytes from 1.1.1.1: icmp_seq=26 ttl=57 time=27.3 ms
64 bytes from 1.1.1.1: icmp_seq=27 ttl=57 time=488 ms
64 bytes from 1.1.1.1: icmp_seq=28 ttl=57 time=22.6 ms
64 bytes from 1.1.1.1: icmp_seq=29 ttl=57 time=23.4 ms
64 bytes from 1.1.1.1: icmp_seq=30 ttl=57 time=22.4 ms
64 bytes from 1.1.1.1: icmp_seq=31 ttl=57 time=23.0 ms
64 bytes from 1.1.1.1: icmp_seq=32 ttl=57 time=352 ms
64 bytes from 1.1.1.1: icmp_seq=33 ttl=57 time=505 ms
64 bytes from 1.1.1.1: icmp_seq=34 ttl=57 time=343 ms
64 bytes from 1.1.1.1: icmp_seq=35 ttl=57 time=27.7 ms
64 bytes from 1.1.1.1: icmp_seq=36 ttl=57 time=199 ms
64 bytes from 1.1.1.1: icmp_seq=37 ttl=57 time=23.4 ms
64 bytes from 1.1.1.1: icmp_seq=38 ttl=57 time=23.9 ms
64 bytes from 1.1.1.1: icmp_seq=39 ttl=57 time=24.0 ms
64 bytes from 1.1.1.1: icmp_seq=40 ttl=57 time=23.0 ms
64 bytes from 1.1.1.1: icmp_seq=41 ttl=57 time=23.2 ms
64 bytes from 1.1.1.1: icmp_seq=42 ttl=57 time=23.0 ms
64 bytes from 1.1.1.1: icmp_seq=43 ttl=57 time=24.2 ms
64 bytes from 1.1.1.1: icmp_seq=44 ttl=57 time=26.8 ms
64 bytes from 1.1.1.1: icmp_seq=45 ttl=57 time=23.3 ms
64 bytes from 1.1.1.1: icmp_seq=46 ttl=57 time=23.7 ms
64 bytes from 1.1.1.1: icmp_seq=47 ttl=57 time=23.1 ms
64 bytes from 1.1.1.1: icmp_seq=48 ttl=57 time=22.2 ms
64 bytes from 1.1.1.1: icmp_seq=49 ttl=57 time=23.3 ms
64 bytes from 1.1.1.1: icmp_seq=50 ttl=57 time=24.0 ms
64 bytes from 1.1.1.1: icmp_seq=51 ttl=57 time=130 ms
64 bytes from 1.1.1.1: icmp_seq=52 ttl=57 time=21.8 ms
64 bytes from 1.1.1.1: icmp_seq=53 ttl=57 time=24.9 ms
64 bytes from 1.1.1.1: icmp_seq=54 ttl=57 time=21.8 ms
64 bytes from 1.1.1.1: icmp_seq=55 ttl=57 time=125 ms
64 bytes from 1.1.1.1: icmp_seq=56 ttl=57 time=412 ms
64 bytes from 1.1.1.1: icmp_seq=57 ttl=57 time=23.4 ms
64 bytes from 1.1.1.1: icmp_seq=58 ttl=57 time=22.2 ms
64 bytes from 1.1.1.1: icmp_seq=59 ttl=57 time=22.6 ms
64 bytes from 1.1.1.1: icmp_seq=60 ttl=57 time=166 ms
64 bytes from 1.1.1.1: icmp_seq=61 ttl=57 time=391 ms
64 bytes from 1.1.1.1: icmp_seq=62 ttl=57 time=23.8 ms
64 bytes from 1.1.1.1: icmp_seq=63 ttl=57 time=22.9 ms
64 bytes from 1.1.1.1: icmp_seq=64 ttl=57 time=22.6 ms
64 bytes from 1.1.1.1: icmp_seq=65 ttl=57 time=590 ms
64 bytes from 1.1.1.1: icmp_seq=66 ttl=57 time=23.1 ms
64 bytes from 1.1.1.1: icmp_seq=67 ttl=57 time=1221 ms
64 bytes from 1.1.1.1: icmp_seq=68 ttl=57 time=611 ms
64 bytes from 1.1.1.1: icmp_seq=69 ttl=57 time=461 ms
^C
--- 1.1.1.1 ping statistics ---
81 packets transmitted, 69 received, 14.8148% packet loss, time 80249ms
rtt min/avg/max/mdev = 18.889/108.652/1220.599/202.144 ms, pipe 2
[franco@pc ~]$ ping 192.168.40.2
PING 192.168.40.2 (192.168.40.2) 56(84) bytes of data.
64 bytes from 192.168.40.2: icmp_seq=1 ttl=64 time=10863 ms
64 bytes from 192.168.40.2: icmp_seq=2 ttl=64 time=9840 ms
64 bytes from 192.168.40.2: icmp_seq=3 ttl=64 time=8827 ms
64 bytes from 192.168.40.2: icmp_seq=4 ttl=64 time=7814 ms
64 bytes from 192.168.40.2: icmp_seq=5 ttl=64 time=6801 ms
64 bytes from 192.168.40.2: icmp_seq=6 ttl=64 time=5788 ms
64 bytes from 192.168.40.2: icmp_seq=7 ttl=64 time=4775 ms
64 bytes from 192.168.40.2: icmp_seq=8 ttl=64 time=3764 ms
64 bytes from 192.168.40.2: icmp_seq=9 ttl=64 time=2751 ms
64 bytes from 192.168.40.2: icmp_seq=10 ttl=64 time=1743 ms
64 bytes from 192.168.40.2: icmp_seq=11 ttl=64 time=730 ms
64 bytes from 192.168.40.2: icmp_seq=12 ttl=64 time=2.58 ms
64 bytes from 192.168.40.2: icmp_seq=13 ttl=64 time=2.52 ms
64 bytes from 192.168.40.2: icmp_seq=14 ttl=64 time=534 ms
64 bytes from 192.168.40.2: icmp_seq=15 ttl=64 time=20507 ms
64 bytes from 192.168.40.2: icmp_seq=16 ttl=64 time=27105 ms
64 bytes from 192.168.40.2: icmp_seq=17 ttl=64 time=26092 ms
64 bytes from 192.168.40.2: icmp_seq=18 ttl=64 time=25082 ms
64 bytes from 192.168.40.2: icmp_seq=19 ttl=64 time=24065 ms
64 bytes from 192.168.40.2: icmp_seq=21 ttl=64 time=22046 ms
64 bytes from 192.168.40.2: icmp_seq=22 ttl=64 time=21033 ms
64 bytes from 192.168.40.2: icmp_seq=23 ttl=64 time=20016 ms
64 bytes from 192.168.40.2: icmp_seq=29 ttl=64 time=13944 ms
64 bytes from 192.168.40.2: icmp_seq=30 ttl=64 time=12934 ms
64 bytes from 192.168.40.2: icmp_seq=31 ttl=64 time=11917 ms
64 bytes from 192.168.40.2: icmp_seq=32 ttl=64 time=10907 ms
64 bytes from 192.168.40.2: icmp_seq=33 ttl=64 time=9894 ms
64 bytes from 192.168.40.2: icmp_seq=34 ttl=64 time=8880 ms
64 bytes from 192.168.40.2: icmp_seq=35 ttl=64 time=7864 ms
64 bytes from 192.168.40.2: icmp_seq=36 ttl=64 time=6862 ms
64 bytes from 192.168.40.2: icmp_seq=37 ttl=64 time=5840 ms
64 bytes from 192.168.40.2: icmp_seq=38 ttl=64 time=4827 ms
64 bytes from 192.168.40.2: icmp_seq=39 ttl=64 time=3814 ms
64 bytes from 192.168.40.2: icmp_seq=40 ttl=64 time=2800 ms
64 bytes from 192.168.40.2: icmp_seq=41 ttl=64 time=1784 ms
64 bytes from 192.168.40.2: icmp_seq=42 ttl=64 time=773 ms
64 bytes from 192.168.40.2: icmp_seq=43 ttl=64 time=111 ms
64 bytes from 192.168.40.2: icmp_seq=44 ttl=64 time=11.4 ms
64 bytes from 192.168.40.2: icmp_seq=45 ttl=64 time=475 ms
64 bytes from 192.168.40.2: icmp_seq=46 ttl=64 time=214 ms
64 bytes from 192.168.40.2: icmp_seq=47 ttl=64 time=6.99 ms
64 bytes from 192.168.40.2: icmp_seq=48 ttl=64 time=46.0 ms
64 bytes from 192.168.40.2: icmp_seq=49 ttl=64 time=3.33 ms
64 bytes from 192.168.40.2: icmp_seq=50 ttl=64 time=5.57 ms
64 bytes from 192.168.40.2: icmp_seq=51 ttl=64 time=6.95 ms
64 bytes from 192.168.40.2: icmp_seq=52 ttl=64 time=5.55 ms
64 bytes from 192.168.40.2: icmp_seq=53 ttl=64 time=12.3 ms
64 bytes from 192.168.40.2: icmp_seq=54 ttl=64 time=3.14 ms
64 bytes from 192.168.40.2: icmp_seq=55 ttl=64 time=6.44 ms
64 bytes from 192.168.40.2: icmp_seq=56 ttl=64 time=5.85 ms
64 bytes from 192.168.40.2: icmp_seq=57 ttl=64 time=6.46 ms
64 bytes from 192.168.40.2: icmp_seq=58 ttl=64 time=2.96 ms
64 bytes from 192.168.40.2: icmp_seq=59 ttl=64 time=2.63 ms
64 bytes from 192.168.40.2: icmp_seq=60 ttl=64 time=5.70 ms
64 bytes from 192.168.40.2: icmp_seq=61 ttl=64 time=4.94 ms
64 bytes from 192.168.40.2: icmp_seq=62 ttl=64 time=9.27 ms
64 bytes from 192.168.40.2: icmp_seq=63 ttl=64 time=3.14 ms
64 bytes from 192.168.40.2: icmp_seq=64 ttl=64 time=2.68 ms
64 bytes from 192.168.40.2: icmp_seq=65 ttl=64 time=5.90 ms
64 bytes from 192.168.40.2: icmp_seq=66 ttl=64 time=6.23 ms
64 bytes from 192.168.40.2: icmp_seq=67 ttl=64 time=5.69 ms
64 bytes from 192.168.40.2: icmp_seq=68 ttl=64 time=5.46 ms
64 bytes from 192.168.40.2: icmp_seq=69 ttl=64 time=2.44 ms
64 bytes from 192.168.40.2: icmp_seq=70 ttl=64 time=5.09 ms
64 bytes from 192.168.40.2: icmp_seq=71 ttl=64 time=7.74 ms
64 bytes from 192.168.40.2: icmp_seq=72 ttl=64 time=2.71 ms
64 bytes from 192.168.40.2: icmp_seq=73 ttl=64 time=2.72 ms
64 bytes from 192.168.40.2: icmp_seq=74 ttl=64 time=2.37 ms
64 bytes from 192.168.40.2: icmp_seq=75 ttl=64 time=6.39 ms
64 bytes from 192.168.40.2: icmp_seq=76 ttl=64 time=17.5 ms
64 bytes from 192.168.40.2: icmp_seq=77 ttl=64 time=5.71 ms
64 bytes from 192.168.40.2: icmp_seq=78 ttl=64 time=6.01 ms
64 bytes from 192.168.40.2: icmp_seq=79 ttl=64 time=3.74 ms
64 bytes from 192.168.40.2: icmp_seq=80 ttl=64 time=6.05 ms
64 bytes from 192.168.40.2: icmp_seq=81 ttl=64 time=6.85 ms
64 bytes from 192.168.40.2: icmp_seq=82 ttl=64 time=6.02 ms
64 bytes from 192.168.40.2: icmp_seq=83 ttl=64 time=6.15 ms
64 bytes from 192.168.40.2: icmp_seq=84 ttl=64 time=3.18 ms
64 bytes from 192.168.40.2: icmp_seq=85 ttl=64 time=2.73 ms
64 bytes from 192.168.40.2: icmp_seq=86 ttl=64 time=2.81 ms
64 bytes from 192.168.40.2: icmp_seq=87 ttl=64 time=6.27 ms
64 bytes from 192.168.40.2: icmp_seq=88 ttl=64 time=5.93 ms
64 bytes from 192.168.40.2: icmp_seq=89 ttl=64 time=3.16 ms
64 bytes from 192.168.40.2: icmp_seq=90 ttl=64 time=6.17 ms
64 bytes from 192.168.40.2: icmp_seq=91 ttl=64 time=6.21 ms
64 bytes from 192.168.40.2: icmp_seq=92 ttl=64 time=5.60 ms
64 bytes from 192.168.40.2: icmp_seq=93 ttl=64 time=2.54 ms
64 bytes from 192.168.40.2: icmp_seq=94 ttl=64 time=14.3 ms
64 bytes from 192.168.40.2: icmp_seq=95 ttl=64 time=3.90 ms
64 bytes from 192.168.40.2: icmp_seq=96 ttl=64 time=3.17 ms
64 bytes from 192.168.40.2: icmp_seq=97 ttl=64 time=6.19 ms
64 bytes from 192.168.40.2: icmp_seq=98 ttl=64 time=3.72 ms
64 bytes from 192.168.40.2: icmp_seq=99 ttl=64 time=6.04 ms
64 bytes from 192.168.40.2: icmp_seq=100 ttl=64 time=19.6 ms
64 bytes from 192.168.40.2: icmp_seq=101 ttl=64 time=2.71 ms
64 bytes from 192.168.40.2: icmp_seq=102 ttl=64 time=2.80 ms
64 bytes from 192.168.40.2: icmp_seq=103 ttl=64 time=12.3 ms
64 bytes from 192.168.40.2: icmp_seq=104 ttl=64 time=2.98 ms
64 bytes from 192.168.40.2: icmp_seq=105 ttl=64 time=2.83 ms
64 bytes from 192.168.40.2: icmp_seq=106 ttl=64 time=5.60 ms
64 bytes from 192.168.40.2: icmp_seq=107 ttl=64 time=2.28 ms
64 bytes from 192.168.40.2: icmp_seq=108 ttl=64 time=6.26 ms
64 bytes from 192.168.40.2: icmp_seq=109 ttl=64 time=2.58 ms
64 bytes from 192.168.40.2: icmp_seq=110 ttl=64 time=2.57 ms
64 bytes from 192.168.40.2: icmp_seq=111 ttl=64 time=2.68 ms
64 bytes from 192.168.40.2: icmp_seq=112 ttl=64 time=9.92 ms
64 bytes from 192.168.40.2: icmp_seq=113 ttl=64 time=2.73 ms
64 bytes from 192.168.40.2: icmp_seq=114 ttl=64 time=2.27 ms
64 bytes from 192.168.40.2: icmp_seq=115 ttl=64 time=2.71 ms
64 bytes from 192.168.40.2: icmp_seq=116 ttl=64 time=6.36 ms
64 bytes from 192.168.40.2: icmp_seq=117 ttl=64 time=19.0 ms
64 bytes from 192.168.40.2: icmp_seq=118 ttl=64 time=2.05 ms
64 bytes from 192.168.40.2: icmp_seq=119 ttl=64 time=2.65 ms
64 bytes from 192.168.40.2: icmp_seq=120 ttl=64 time=5.53 ms
64 bytes from 192.168.40.2: icmp_seq=121 ttl=64 time=4.06 ms
64 bytes from 192.168.40.2: icmp_seq=122 ttl=64 time=6.02 ms
64 bytes from 192.168.40.2: icmp_seq=123 ttl=64 time=5.95 ms
64 bytes from 192.168.40.2: icmp_seq=124 ttl=64 time=6.47 ms
64 bytes from 192.168.40.2: icmp_seq=125 ttl=64 time=2.64 ms
64 bytes from 192.168.40.2: icmp_seq=126 ttl=64 time=14.0 ms
64 bytes from 192.168.40.2: icmp_seq=127 ttl=64 time=6.03 ms
64 bytes from 192.168.40.2: icmp_seq=128 ttl=64 time=6.10 ms
64 bytes from 192.168.40.2: icmp_seq=129 ttl=64 time=2.24 ms
64 bytes from 192.168.40.2: icmp_seq=130 ttl=64 time=3.05 ms
64 bytes from 192.168.40.2: icmp_seq=131 ttl=64 time=6.46 ms
64 bytes from 192.168.40.2: icmp_seq=132 ttl=64 time=2.76 ms
64 bytes from 192.168.40.2: icmp_seq=133 ttl=64 time=2.41 ms
64 bytes from 192.168.40.2: icmp_seq=134 ttl=64 time=5.76 ms
64 bytes from 192.168.40.2: icmp_seq=135 ttl=64 time=13.4 ms
64 bytes from 192.168.40.2: icmp_seq=136 ttl=64 time=2.66 ms
64 bytes from 192.168.40.2: icmp_seq=137 ttl=64 time=3.80 ms
64 bytes from 192.168.40.2: icmp_seq=138 ttl=64 time=3.27 ms
64 bytes from 192.168.40.2: icmp_seq=139 ttl=64 time=2.76 ms
64 bytes from 192.168.40.2: icmp_seq=140 ttl=64 time=3.13 ms
64 bytes from 192.168.40.2: icmp_seq=141 ttl=64 time=4.90 ms
64 bytes from 192.168.40.2: icmp_seq=142 ttl=64 time=2.11 ms
64 bytes from 192.168.40.2: icmp_seq=143 ttl=64 time=3.22 ms
64 bytes from 192.168.40.2: icmp_seq=144 ttl=64 time=9.45 ms
64 bytes from 192.168.40.2: icmp_seq=145 ttl=64 time=2.65 ms
64 bytes from 192.168.40.2: icmp_seq=146 ttl=64 time=6.19 ms
64 bytes from 192.168.40.2: icmp_seq=147 ttl=64 time=3.67 ms
64 bytes from 192.168.40.2: icmp_seq=148 ttl=64 time=2.76 ms
64 bytes from 192.168.40.2: icmp_seq=149 ttl=64 time=6.42 ms
64 bytes from 192.168.40.2: icmp_seq=150 ttl=64 time=2.62 ms
64 bytes from 192.168.40.2: icmp_seq=151 ttl=64 time=6.38 ms
64 bytes from 192.168.40.2: icmp_seq=152 ttl=64 time=6.21 ms
64 bytes from 192.168.40.2: icmp_seq=153 ttl=64 time=7.66 ms
64 bytes from 192.168.40.2: icmp_seq=154 ttl=64 time=2.92 ms
64 bytes from 192.168.40.2: icmp_seq=155 ttl=64 time=5.76 ms
64 bytes from 192.168.40.2: icmp_seq=156 ttl=64 time=5.77 ms
64 bytes from 192.168.40.2: icmp_seq=157 ttl=64 time=5.81 ms
64 bytes from 192.168.40.2: icmp_seq=158 ttl=64 time=16.7 ms
64 bytes from 192.168.40.2: icmp_seq=159 ttl=64 time=6.38 ms
64 bytes from 192.168.40.2: icmp_seq=160 ttl=64 time=5.72 ms
64 bytes from 192.168.40.2: icmp_seq=161 ttl=64 time=2.63 ms
64 bytes from 192.168.40.2: icmp_seq=162 ttl=64 time=6.00 ms
^C
--- 192.168.40.2 ping statistics ---
162 packets transmitted, 156 received, 3.7037% packet loss, time 161684ms
rtt min/avg/max/mdev = 2.053/2273.758/27104.697/5684.517 ms, pipe 27
I want you to understand that I am staying on this issue.
My most recent testing has been with as clean of a setup as possible to eliminate causes other than the driver. I just ran the following:
$ ping 192.168.1.1 PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data. 64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1.55 ms 64 bytes from 192.168.1.1: icmp_seq=2 ttl=64 time=1.65 ms 64 bytes from 192.168.1.1: icmp_seq=3 ttl=64 time=1.63 ms 64 bytes from 192.168.1.1: icmp_seq=4 ttl=64 time=1.54 ms 64 bytes from 192.168.1.1: icmp_seq=5 ttl=64 time=1.59 ms 64 bytes from 192.168.1.1: icmp_seq=6 ttl=64 time=1.58 ms 64 bytes from 192.168.1.1: icmp_seq=7 ttl=64 time=1.60 ms 64 bytes from 192.168.1.1: icmp_seq=8 ttl=64 time=1.50 ms 64 bytes from 192.168.1.1: icmp_seq=9 ttl=64 time=1.58 ms 64 bytes from 192.168.1.1: icmp_seq=10 ttl=64 time=1.58 ms 64 bytes from 192.168.1.1: icmp_seq=11 ttl=64 time=1.51 ms 64 bytes from 192.168.1.1: icmp_seq=12 ttl=64 time=1.54 ms 64 bytes from 192.168.1.1: icmp_seq=13 ttl=64 time=1.50 ms 64 bytes from 192.168.1.1: icmp_seq=14 ttl=64 time=1.62 ms 64 bytes from 192.168.1.1: icmp_seq=15 ttl=64 time=1.62 ms 64 bytes from 192.168.1.1: icmp_seq=16 ttl=64 time=1.57 ms 64 bytes from 192.168.1.1: icmp_seq=17 ttl=64 time=1.62 ms 64 bytes from 192.168.1.1: icmp_seq=18 ttl=64 time=1.54 ms 64 bytes from 192.168.1.1: icmp_seq=19 ttl=64 time=1.47 ms ^C --- 192.168.1.1 ping statistics --- 19 packets transmitted, 19 received, 0% packet loss, time 18027ms rtt min/avg/max/mdev = 1.468/1.566/1.647/0.048 ms
This was with my router on channel 116. There is nothing else in this area on that channel so congestion cannot be a problem. The iperf3 server is in the router as it runs OpenWRT.
My plan is leave this issue open when I make the repo open to the public. I can contact a couple of individuals that are better than me at working this issue.
@morrownr
This can be closed as it was a configuration issue.
How do I test AP mode on 80 MHz? The AP that is generated in Arch Linux with KDE plasma is only 20 MHz. I also cannot access the internet from the connected client. I have
dnsmasq
andhostapd
installed.AP Configuration
Scanning from OpenWrt
options 8812au rtw_switch_usb_mode=1 rtw_dfs_region_domain=1 rtw_country_code=AR rtw_vht_enable=2 rtw_power_mgnt=0
iw list
[franco@pc 8812au-20210820]$ iw list Wiphy phy1 wiphy index: 1 max # scan SSIDs: 9 max scan IEs length: 2304 bytes max # sched scan SSIDs: 0 max # match sets: 0 Retry short limit: 7 Retry long limit: 4 Coverage class: 0 (up to 0m) Device supports T-DLS. Supported Ciphers: * WEP40 (00-0f-ac:1) * WEP104 (00-0f-ac:5) * TKIP (00-0f-ac:2) * CCMP-128 (00-0f-ac:4) * CMAC (00-0f-ac:6) Available Antennas: TX 0 RX 0 Supported interface modes: * IBSS * managed * AP * P2P-client * P2P-GO Band 1: Capabilities: 0x1962 HT20/HT40 Static SM Power Save RX HT20 SGI RX HT40 SGI RX STBC 1-stream Max AMSDU length: 7935 bytes DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 16 usec (0x07) HT Max RX data rate: 300 Mbps HT TX/RX MCS rate indexes supported: 0-15 Bitrates (non-HT): * 1.0 Mbps * 2.0 Mbps * 5.5 Mbps * 11.0 Mbps * 6.0 Mbps * 9.0 Mbps * 12.0 Mbps * 18.0 Mbps * 24.0 Mbps * 36.0 Mbps * 48.0 Mbps * 54.0 Mbps Frequencies: * 2412.0 MHz [1] (17.0 dBm) * 2417.0 MHz [2] (17.0 dBm) * 2422.0 MHz [3] (17.0 dBm) * 2427.0 MHz [4] (17.0 dBm) * 2432.0 MHz [5] (17.0 dBm) * 2437.0 MHz [6] (17.0 dBm) * 2442.0 MHz [7] (17.0 dBm) * 2447.0 MHz [8] (17.0 dBm) * 2452.0 MHz [9] (17.0 dBm) * 2457.0 MHz [10] (17.0 dBm) * 2462.0 MHz [11] (17.0 dBm) * 2467.0 MHz [12] (17.0 dBm) (no IR) * 2472.0 MHz [13] (17.0 dBm) (no IR) * 2484.0 MHz [14] (disabled) Band 2: Capabilities: 0x862 HT20/HT40 Static SM Power Save RX HT20 SGI RX HT40 SGI No RX STBC Max AMSDU length: 7935 bytes No DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 16 usec (0x07) HT Max RX data rate: 300 Mbps HT TX/RX MCS rate indexes supported: 0-15 VHT Capabilities (0x03c031a2): Max MPDU length: 11454 Supported Channel Width: neither 160 nor 80+80 short GI (80 MHz) TX STBC SU Beamformee +HTC-VHT VHT RX MCS set: 1 streams: MCS 0-9 2 streams: MCS 0-9 3 streams: not supported 4 streams: not supported 5 streams: not supported 6 streams: not supported 7 streams: not supported 8 streams: not supported VHT RX highest supported: 867 Mbps VHT TX MCS set: 1 streams: MCS 0-9 2 streams: MCS 0-9 3 streams: not supported 4 streams: not supported 5 streams: not supported 6 streams: not supported 7 streams: not supported 8 streams: not supported VHT TX highest supported: 867 Mbps VHT extended NSS: not supported Bitrates (non-HT): * 6.0 Mbps * 9.0 Mbps * 12.0 Mbps * 18.0 Mbps * 24.0 Mbps * 36.0 Mbps * 48.0 Mbps * 54.0 Mbps Frequencies: * 5180.0 MHz [36] (15.0 dBm) * 5200.0 MHz [40] (15.0 dBm) * 5220.0 MHz [44] (15.0 dBm) * 5240.0 MHz [48] (15.0 dBm) * 5260.0 MHz [52] (15.0 dBm) * 5280.0 MHz [56] (15.0 dBm) * 5300.0 MHz [60] (15.0 dBm) * 5320.0 MHz [64] (15.0 dBm) * 5500.0 MHz [100] (15.0 dBm) * 5520.0 MHz [104] (15.0 dBm) * 5540.0 MHz [108] (15.0 dBm) * 5560.0 MHz [112] (15.0 dBm) * 5580.0 MHz [116] (15.0 dBm) * 5600.0 MHz [120] (15.0 dBm) * 5620.0 MHz [124] (15.0 dBm) * 5640.0 MHz [128] (15.0 dBm) * 5660.0 MHz [132] (15.0 dBm) * 5680.0 MHz [136] (15.0 dBm) * 5700.0 MHz [140] (15.0 dBm) * 5720.0 MHz [144] (disabled) * 5745.0 MHz [149] (15.0 dBm) * 5765.0 MHz [153] (15.0 dBm) * 5785.0 MHz [157] (15.0 dBm) * 5805.0 MHz [161] (15.0 dBm) * 5825.0 MHz [165] (15.0 dBm) * 5845.0 MHz [169] (disabled) * 5865.0 MHz [173] (disabled) * 5885.0 MHz [177] (disabled) Supported commands: * new_interface * set_interface * new_key * start_ap * new_station * set_bss * join_ibss * set_pmksa * del_pmksa * flush_pmksa * remain_on_channel * frame * set_channel * tdls_mgmt * tdls_oper * connect * disconnect WoWLAN support: * wake up on anything (device continues operating normally) software interface modes (can always be added): interface combinations are not supported Device supports SAE with AUTHENTICATE command Device supports scan flush. max # scan plans: 1 max scan plan interval: -1 max scan plan iterations: 0 Supported TX frame types: * IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0 Supported RX frame types: * IBSS: 0xd0 * managed: 0x40 0xb0 0xd0 * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 * AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 * P2P-client: 0x40 0xd0 * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0 Supported extended features: