Hostapd Dropout


11

Eu configurei o hostapd como um ponto de acesso, seguindo várias instruções usando o ubuntu 12.04. Tudo funciona bem por várias horas e, em algum momento, o hostapd não aceita mais novas conexões.

A configuração do hostapd é a seguinte:

ssid=PNN
wpa_passphrase=somePassphrase
interface=wlan2
bridge=br0
auth_algs=3
channel=7
driver=nl80211
hw_mode=g
logger_stdout=-1
logger_stdout_level=2
max_num_sta=255
rsn_pairwise=CCMP
wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP CCMP

Usando a saída de

hostapd -dd /etc/hostapd/hostapd.conf

Em circunstâncias normais, novas conexões são atendidas da seguinte maneira:

mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for our SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Unknown Microsoft information element ignored (type=8 len=7)

STA 3c:d0:f8:10:0f:f0 sent probe request for broadcast SSID
mgmt::auth
authentication: STA=40:a6:d9:a5:63:dd auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: authentication OK (open system)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-AUTHENTICATE.indication(40:a6:d9:a5:63:dd, OPEN_SYSTEM)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-DELETEKEYS.request(40:a6:d9:a5:63:dd)
authentication reply: STA=40:a6:d9:a5:63:dd auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::proberesp cb
mgmt::auth cb
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=40:a6:d9:a5:63:dd capab_info=0x431 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  new AID 1
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: association OK (aid 1)
mgmt::assoc_resp cb
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: associated (aid 1)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-ASSOCIATE.indication(40:a6:d9:a5:63:dd)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-DELETEKEYS.request(40:a6:d9:a5:63:dd)
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x216f2b0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x216f2b0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd WPA: start authentication
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x216f2b0 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.1X: unauthorizing port
WPA: 40:a6:d9:a5:63:dd WPA_PTK_GROUP entering state IDLE
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state AUTHENTICATION
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state AUTHENTICATION2
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state INITPSK
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=95 - ack=1
IEEE 802.1X: 121 bytes from 40:a6:d9:a5:63:dd
   IEEE 802.1X: version=2 type=3 length=117
wlan2: STA 40:a6:d9:a5:63:dd WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:0e:8e:3f:f9:71 A2=40:a6:d9:a5:63:dd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKINITNEGOTIATING
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=151 - ack=1
IEEE 802.1X: 99 bytes from 40:a6:d9:a5:63:dd
   IEEE 802.1X: version=2 type=3 length=95
wlan2: STA 40:a6:d9:a5:63:dd WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=6 alg=3 addr=0x216f2b0 key_idx=0 set_tx=1 seq_len=0 key_len=16
   addr=40:a6:d9:a5:63:dd
AP-STA-CONNECTED 40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.1X: authorizing port
wlan2: STA 40:a6:d9:a5:63:dd RADIUS: starting accounting session 50E3DF21-00000000
wlan2: STA 40:a6:d9:a5:63:dd WPA: pairwise key handshake completed (RSN)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Unknown Microsoft information element ignored (type=8 len=7)

STA 3c:d0:f8:10:0f:f0 sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
Unknown Microsoft information element ignored (type=8 len=7)

STA 5c:95:ae:d8:b7:ec sent probe request for broadcast SSID
mgmt::proberesp cb

Quando o hostapd não aceita mais novas conexões, a saída é a seguinte:

mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for our SSID
mgmt::proberesp cb
mgmt::auth
authentication: STA=40:a6:d9:a5:63:dd auth_alg=0 auth_transaction=1 status_code=0 wep=0
  New STA
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: authentication OK (open system)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-AUTHENTICATE.indication(40:a6:d9:a5:63:dd, OPEN_SYSTEM)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-DELETEKEYS.request(40:a6:d9:a5:63:dd)
authentication reply: STA=40:a6:d9:a5:63:dd auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
mgmt::auth cb
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: authenticated
mgmt::assoc_req
association request: STA=40:a6:d9:a5:63:dd capab_info=0x431 listen_interval=10
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
  new AID 1
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: association OK (aid 1)
mgmt::assoc_resp cb
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: associated (aid 1)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-ASSOCIATE.indication(40:a6:d9:a5:63:dd)
wlan2: STA 40:a6:d9:a5:63:dd MLME: MLME-DELETEKEYS.request(40:a6:d9:a5:63:dd)
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x263c270 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x263c270 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd WPA: start authentication
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x263c270 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.1X: unauthorizing port
WPA: 40:a6:d9:a5:63:dd WPA_PTK_GROUP entering state IDLE
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state AUTHENTICATION
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state AUTHENTICATION2
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state INITPSK
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=95 - ack=1
wlan2: STA 40:a6:d9:a5:63:dd WPA: EAPOL-Key timeout
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=95 - ack=1
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:15:6d:60:da:3b sent probe request for broadcast SSID
mgmt::proberesp cb
STA 00:15:6d:60:da:3b sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
wlan2: STA 40:a6:d9:a5:63:dd WPA: EAPOL-Key timeout
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=95 - ack=1
STA 00:15:6d:60:da:3b sent probe request for broadcast SSID
mgmt::proberesp cb
wlan2: STA 40:a6:d9:a5:63:dd WPA: EAPOL-Key timeout
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
wlan2: STA 40:a6:d9:a5:63:dd WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 40:a6:d9:a5:63:dd TX status - version=2 type=3 length=95 - ack=1
STA 00:15:6d:60:da:3b sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
wlan2: STA 40:a6:d9:a5:63:dd WPA: EAPOL-Key timeout
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state PTKSTART
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 40:a6:d9:a5:63:dd reason 2
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state DISCONNECTED
WPA: 40:a6:d9:a5:63:dd WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x263c270 key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr=40:a6:d9:a5:63:dd
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.1X: unauthorizing port
wlan2: STA 40:a6:d9:a5:63:dd IEEE 802.11: deauthenticated due to local deauth request
nl80211: Event message available
nl80211: Ignored unknown event (cmd=20)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:a5:63:dd sent probe request for broadcast SSID
mgmt::proberesp cb
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 40:a6:d9:b0:cd:fd sent probe request for broadcast SSID
mgmt::proberesp cb

A execução do seguinte corrige o problema por mais algumas horas.

sudo service hostapd restart

Eu fiz o máximo de leitura possível e tentei reduzir o txpower do wlan2 de 16dbm para 10dbm, conforme sugerido para problemas de estabilidade, mas o problema permanece.

Se alguém pudesse ajudar, seria muito apreciado.


encerre o serviço hostapd e inicie-o com sudo hostapd -dd /etc/hostapd/hostapd.conf. espero que dê mais detalhes
strings

aparentemente, parece ter algo a ver com o motorista. Porque isso aconteceu comigo com certos chipsets, mas não com outros. Mesma configuração.
Alba Mendez

@ strings - Foi aí que copiei a saída acima, conforme mencionado.
MarcF

@ MarcF certifique-se de rodar com -dd também use lspci e descubra o driver exato como o jmendeth mencionou, é bem possível que exista um driver melhor.
Strings

@jmendeth - Estou usando uma placa SparkLAN WPEA-111N // lspci do // 04: 00.0 Controlador de rede: Atheros Communications Inc. Adaptador de rede sem fio AR928X (PCI-Express) (rev 01)
MarcF

Respostas:


1
  1. Execute sudo iwconfige desative o 'Gerenciamento de energia' do seu cartão. Reinicie e veja se está tudo bem agora. Reinicie novamente e veja se está tudo bem agora. Caso contrário, teríamos que adicioná-lo ao Startup Applications.

  2. Um amigo meu enfrentou o mesmo problema. Os drivers Atheros padrão deveriam ser responsabilizados. Seu registro TX é preenchido e isso leva à falha na autenticação.

    Em 'Fontes de software' / 'Software e atualizações', ative 'Backports' na guia 'Atualizações'.

    Atualize o sistema.

    Além disso: sudo apt-get install linux-backports-modules-cw-3.6-precise-generic

    Reinicie e verifique.

  3. Se ainda assim falhar, verifique aqui: Resolvido: Ubuntu 12.04 Wifi Drivers


@ MarcF Se funciona ou não, por favor me avise através de um comentário. E aceite a resposta, se funcionar, ajudaria outras pessoas a saber o que deve ser tentado primeiro. :-)
TomKat 27/09/13

0

O @TomKat está certo. A razão pela qual ele falha ao fazer o handshake de autenticação é porque seu log TX é preenchido em 255 entradas. Depois disso, você reinicia o (s) processo (s) e tudo fica bom novamente, por algum tempo, e repete o mesmo problema. A razão pela qual a redução da potência Tx diminuiu o tempo entre falhas é porque você basicamente limita o intervalo no qual as conexões eram possíveis, portanto, menos pessoas nesse intervalo, digamos "por hora". Então, menos conexões = maior tempo entre falhas ... Ou então, novamente, eu poderia estar MUITO OFF.

Ao utilizar nosso site, você reconhece que leu e compreendeu nossa Política de Cookies e nossa Política de Privacidade.
Licensed under cc by-sa 3.0 with attribution required.