You are not logged in.

#1 2010-03-16 22:06:27

ondo
Member
Registered: 2009-08-08
Posts: 5

problem with wpa_supplicant unstable

Hello, I have some problems using wpa_supplicant. I didn't really noticed since when, because my router wasn't working for some time, but I suspect it was the upgrade to the kernel 2.6.32.

Anyway, my connection is too unstable, very slow most of times, but sometimes fast(between 0k/s to 1500k/s), and drop after a minute.
At the beginning, the connection is obtained slower than usual.
And after around a minute(sometimes more), I have in wpa_supplicant logs this message:

RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b19 len=16
Received 799 bytes of scan results (2 BSSes)
New scan results available
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:39:32:c5:81 ssid='linksys' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:39:32:c5:81 ssid='linksys'
Already associated with the selected AP.

In general, when I got this message after the connection(somtimes it's after the second time), the internet doesn't work anymore, even if the interface is still there, and iwconfig and iwlist scan shows the right information. There's no message in the logs, no error, no nothing. And I have to kill wpa_supplicant to reconnect.

I wonder if anyone have the same problem, or knows why I have this "wireless event".

My configuration is a Linux64, atheros card(DLink DWA547), using WPA2 security
In wpa_supplicant.conf:

network={
        ssid="linksys"

        proto=RSN
        psk=xxxxxxx
        priority=1
}

Here's the log of the connection

Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=0
Line: 509 - start of a new network block
ssid - hexdump_ascii(len=7):
     6c 69 6e 6b 73 79 73                              linksys         
proto: 0x2
PSK - hexdump(len=32): [REMOVED]
priority=1 (0x1)
Priority group 1
   id=0 ssid='linksys'
Initializing interface (2) 'ath0'
Interface ath0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1c:f0:5b:d8:0a
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): f7 e2 2f 2e e3 9d 51 47 9a e6 b8 17 a9 14 0e 90
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface ath0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b06 len=12
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 440 bytes of scan results (1 BSSes)
New scan results available
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:39:32:c5:81 ssid='linksys' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:39:32:c5:81 ssid='linksys'
Trying to associate with 00:18:39:32:c5:81 (SSID='linksys' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b04 len=16
EAPOL: disable timer tick
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b19 len=16
Received 799 bytes of scan results (2 BSSes)
New scan results available
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:18:39:32:c5:81 ssid='linksys' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:18:39:32:c5:81 ssid='linksys'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:18:39:32:c5:81
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:39:32:c5:81
No keys have been configured - skip key clearing
Associated with 00:18:39:32:c5:81
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:39:32:c5:81
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:39:32:c5:81 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 69 01 18 59 3a c2 52 d7 26 3c db 92 51 7e 4b 97 d3 3e 0a a7 cf 32 9c 82 58 2f 8a eb 3d b6 6a af
WPA: PTK derivation - A1=00:1c:f0:5b:d8:0a A2=00:18:39:32:c5:81
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 69 01 18 59 3a c2 52 d7 26 3c db 92 51 7e 4b 97 d3 3e 0a a7 cf 32 9c 82 58 2f 8a eb 3d b6 6a af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 a1 cc 03 76 20 64 f4 a5 77 2a b9 59 3d 52 d9 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:18:39:32:c5:81
RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 41 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 30 dc 3f 93 b3 15 ac 51 70 cb 6c c6 19 1c 79 00 68 c0 46 a1 2c f7 e0 e6 9b b6 b0 25 b1 7f 9b ac cc de 1f a4 ab 28 29 22 82 16 bd 12 4e 0d 12 c1 54 d4 58 9c 2d cc f1 f2 c2 f3 81 b7 0b f4 92 c2 69 73 31 d5 5b d6 7f 35 d1 40 1a 71 4d dc 58 b9 43 e7 69 d7 25 25 48 da ad 5c 2f 70 96 32 f2 24 ba 2f b6 9c 97 dc 34 f6 e4 37 4a 3d 41 ad 00 7c 6d 46 07 9f b6 c3 3f 9c a9
IEEE 802.1X RX: version=2 type=3 length=199
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=104
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 41 02 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 14 30 dc 3f 93 b3 15 ac 51 70 cb 6c c6 19 1c 79
WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 86 e5 80 cf 87 fc 5f 82 84 78 23 70 57 61 ae 6b da 1d 82 cc 29 0d a0 1c ea 55 f2 7d 30 4e 5f 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 41 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 30 dc 3f 93 b3 15 ac 51 70 cb 6c c6 19 1c 79 00 68 c0 46 a1 2c f7 e0 e6 9b b6 b0 25 b1 7f 9b ac cc de 1f a4 ab 28 29 22 82 16 bd 12 4e 0d 12 c1 54 d4 58 9c 2d cc f1 f2 c2 f3 81 b7 0b f4 92 c2 69 73 31 d5 5b d6 7f 35 d1 40 1a 71 4d dc 58 b9 43 e7 69 d7 25 25 48 da ad 5c 2f 70 96 32 f2 24 ba 2f b6 9c 97 dc 34 f6 e4 37 4a 3d 41 ad 00 7c 6d 46 07 9f b6 c3 3f 9c a9
RSN: encrypted key data - hexdump(len=104): c0 46 a1 2c f7 e0 e6 9b b6 b0 25 b1 7f 9b ac cc de 1f a4 ab 28 29 22 82 16 bd 12 4e 0d 12 c1 54 d4 58 9c 2d cc f1 f2 c2 f3 81 b7 0b f4 92 c2 69 73 31 d5 5b d6 7f 35 d1 40 1a 71 4d dc 58 b9 43 e7 69 d7 25 25 48 da ad 5c 2f 70 96 32 f2 24 ba 2f b6 9c 97 dc 34 f6 e4 37 4a 3d 41 ad 00 7c 6d 46 07 9f b6 c3 3f 9c a9
WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:39:32:c5:81 (ver=2)
WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 61 5d c5 e9 0c 67 2d ad 05 07 6d 9d 42 5a 0a 52 ff 0b 0f 1e 05 63 1a 6c 57 53 c0 54 2b 20 2e 44 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 12 f7 83 4a fc 6a 7d 57 b3 2d 50 cf e7 5f 9d 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
WPA: RSC - hexdump(len=6): 41 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:18:39:32:c5:81 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:39:32:c5:81 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUP

Last edited by ondo (2010-03-16 22:09:08)

Offline

#2 2010-03-21 13:16:16

ondo
Member
Registered: 2009-08-08
Posts: 5

Re: problem with wpa_supplicant unstable

Not solved, but my workaround was to downgrade to kernel 2.6.31+madwifi0.9.4096. Apparently there was nothing special to the suspicious message from the logs, as it was already there and it still works.

Offline

Board footer

Powered by FluxBB