WPA Supplicant on Bridge Disconnect event every 5 seconds
Joel Lindsay
joel
Wed May 16 17:17:07 PDT 2007
Hi,
I seem to be authenticating with wpa_psk properly, but every 5 seconds it
seems as though a control event is sent to disconnect. I am using the
latest version of wpa_supplicant.
The interface is on a bridge and I am starting it with
wpa_supplicant -Dmadwifi -iath0 -bbr0 -c/wpa_supplicant.cfg
My log looks like this.
[WaveteqCPE /]# cat /var/log/messages
<30>Jan 1 00:05:40 wpa_supplicant[220]: CTRL-EVENT-CONNECTED - Connection
to 00
:0b:6b:36:b7:df completed (reauth) [id=0 id_str=]
<30>Jan 1 00:05:43 wpa_supplicant[220]: CTRL-EVENT-DISCONNECTED -
Disconnect ev
ent - remove keys
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: RUN -> AUTH
<14>Jan 1 00:05:43 kernel: br0: port 2(ath0) entering disabled state
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan 1 00:05:43 last message repeated 7 time(s)
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan 1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie:
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: ASSOC -> AUTH
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan 1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie:
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan 1 00:05:43 kernel: ath0: [00:0b:6b:36:b7:df] assoc success: short
pream
ble, short slot time, fast-frames
<12>Jan 1 00:05:43 kernel: ath0: __ieee80211_newstate: ASSOC -> RUN
<30>Jan 1 00:05:43 wpa_supplicant[220]: Associated with 00:0b:6b:36:b7:df
<14>Jan 1 00:05:44 kernel: br0: port 2(ath0) entering learning state
<14>Jan 1 00:05:44 kernel: br0: topology change detected, propagating
<14>Jan 1 00:05:44 kernel: br0: port 2(ath0) entering forwarding state
<30>Jan 1 00:05:44 wpa_supplicant[220]: WPA: Key negotiation completed with
00:
0b:6b:36:b7:df [PTK=TKIP GTK=TKIP]
<30>Jan 1 00:05:44 wpa_supplicant[220]: CTRL-EVENT-CONNECTED - Connection
to 00
:0b:6b:36:b7:df completed (reauth) [id=0 id_str=]
<30>Jan 1 00:05:49 wpa_supplicant[220]: CTRL-EVENT-DISCONNECTED -
Disconnect ev
ent - remove keys
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: RUN -> AUTH
<14>Jan 1 00:05:49 kernel: br0: port 2(ath0) entering disabled state
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan 1 00:05:49 last message repeated 13 time(s)
<30>Jan 1 00:05:49 wpa_supplicant[220]: Associated with 00:0b:6b:36:b7:df
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> AUTH
<12>Jan 1 00:05:49 last message repeated 8 time(s)
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan 1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie:
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: ASSOC -> AUTH
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: AUTH -> ASSOC
<12>Jan 1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] Adding ath adv cap ie:
ni_
ath_flags = 06, iv_ath_cap = 3d
<12>Jan 1 00:05:49 kernel: ath0: [00:0b:6b:36:b7:df] assoc success: short
pream
ble, short slot time, fast-frames
<12>Jan 1 00:05:49 kernel: ath0: __ieee80211_newstate: ASSOC -> RUN
<14>Jan 1 00:05:50 kernel: br0: port 2(ath0) entering learning state
<14>Jan 1 00:05:50 kernel: br0: topology change detected, propagating
<14>Jan 1 00:05:50 kernel: br0: port 2(ath0) entering forwarding state
Any help appreciated.
Joel Lindsay, B.Eng
Project Engineer
WaveTeq Communications
(250) 766-9229
More information about the Hostap
mailing list