Re: MGMT (TX callback) fail - AP rt2x00 with Managed broadcom
Petr Novak
n_petr
Fri Aug 8 13:23:37 PDT 2008
> > I only guess, that therefore (unknown vendor) ACK fail:
> >
> > MGMT (TX callback) ACK
> > unknown vendor specific information element ignored (vendor OUI 00:10:18
> len=9)
>
> This has nothing to do with whether the other end ACKs the Probe
> Response. The vendor IE is just data inside the frame, ACK is low-level
> acknowledgment of the frame itself (regardless of body contents).
Thank you for explanation
>
> > I thought, that ACK fail is not good = no connection between AP and client.
> Channels are set to auto (if I am right, it is not possible set exact number of
> AP channel in /etc/hostapd/hostapd.conf).
>
> Well, I would not be that concerned with Probe Response ACKs assuming
> you can get to authentication/association steps. If the client does not
> even try to authenticate, it may not receive Beacon frames or Probe
> Responses properly. Have you tried using a wireless sniffer to capture
> what frames the AP is transmitting?
I do not know how to catch beginnig of hostapd (I can not run tcpdump before hostapd and something like that does not work "hostapd -dd /etc/hostapd/hostapd.conf && tcpdump -n -i wlan0"), so I run hostapd in one console and quickly switch to another and run tcpdump.
AP is 192.168.0.1 and client is 192.168.0.2:
# sleep 5; hostapd -dd /etc/hostapd/hostapd.conf
Configuration file: /etc/hostapd/hostapd.conf
Opening raw packet socket for ifindex 0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
Failed to update rate sets in kernel module
RATE[0] rate=10 flags=0x2
RATE[1] rate=20 flags=0x6
RATE[2] rate=55 flags=0x6
RATE[3] rate=110 flags=0x6
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Could not set passive scanning: Unknown error 4294967295
Flushing old station entries
Deauthenticate all stations
Failed to set CTS protect in kernel driver
Failed to set Short Slot Time option in kernel driver
Could not set preamble for kernel driver
Using interface wlan0 with hwaddr 00:0f:ea:77:8f:a1 and ssid 'stealth'
Failed to set CTS protect in kernel driver
Failed to set Short Slot Time option in kernel driver
Could not set preamble for kernel driver
wlan0: Setup of interface done.
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... ACK
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
oui = 4120, OUI_MICROSOFT = 20722, unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA 00:16:ce:6a:24:59 sent probe request for broadcast SSID
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
TYPE = 0, WLAN_FC_TYPE_MGMT = 0
MGMT (TX callback) TYPE = 0, WLAN_FC_TYPE_MGMT = 0 ... fail
mgmt::proberesp cb
# tcpdump -n -i wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 96 bytes
22:11:15.201751 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
22:11:15.201814 IP 192.168.0.1 > 224.0.0.22: igmp v3 report, 1 group record(s)
22:11:15.485899 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [3q] [5n][|domain]
22:11:15.549870 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 2/0/0 PTR[|domain]
22:11:15.645733 IP6 :: > ff02::1:ff77:8fa1: ICMP6, neighbor solicitation, who has fe80::20f:eaff:fe77:8fa1, length 24
22:11:15.741831 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [3q] [5n][|domain]
22:11:15.997834 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [3q] [5n][|domain]
22:11:16.197979 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 5/0/0[|domain]
22:11:16.645755 IP6 fe80::20f:eaff:fe77:8fa1 > ff02::2: ICMP6, router solicitation, length 16
22:11:16.653735 IP6 fe80::20f:eaff:fe77:8fa1 > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
22:11:16.785871 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 5/0/0 PTR[|domain]
22:11:16.937930 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0 [3q] [5n][|domain]
22:11:16.938059 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [2q] [2n][|domain]
22:11:16.938468 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 1/0/0 (Cache flush) HINFO (48)
22:11:16.997851 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 2/0/0[|domain]
22:11:17.193867 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0 [3q] [5n][|domain]
22:11:17.194005 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [2q] [2n][|domain]
22:11:17.433950 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 4/0/0[|domain]
22:11:17.445884 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0 [3q] [5n][|domain]
22:11:17.446015 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0 [2q] [2n][|domain]
22:11:17.446423 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 1/0/0 (Cache flush) HINFO (48)
22:11:17.650086 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 5/0/0[|domain]
22:11:17.650216 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 2/0/0[|domain]
22:11:18.237882 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 5/0/0[|domain]
22:11:18.886064 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 5/0/0[|domain]
22:11:18.886203 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 2/0/0[|domain]
22:11:19.021940 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 5/0/0 PTR[|domain]
22:11:19.670002 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 6/0/0[|domain]
22:11:20.473938 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 5/0/0[|domain]
22:11:20.645731 IP6 fe80::20f:eaff:fe77:8fa1 > ff02::2: ICMP6, router solicitation, length 16
22:11:21.122028 IP6 fe80::20f:eaff:fe77:8fa1.5353 > ff02::fb.5353: 0*- [0q] 5/0/0[|domain]
22:11:21.122167 IP 192.168.0.1.5353 > 224.0.0.251.5353: 0*- [0q] 2/0/0[|domain]
22:11:23.645736 IP 192.168.0.1 > 224.0.0.22: igmp v3 report, 1 group record(s)
22:11:24.065731 IP6 fe80::20f:eaff:fe77:8fa1 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
22:11:24.645732 IP6 fe80::20f:eaff:fe77:8fa1 > ff02::2: ICMP6, router solicitation, length 16
22:12:44.530174 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:44.530623 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:44.530851 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:44.531119 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:44.531335 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:44.531678 IP 192.168.0.1.138 > 192.168.0.255.138: NBT UDP PACKET(138)
22:12:46.529844 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.530219 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.530425 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.530663 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.530859 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.531153 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.531358 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.531589 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.531779 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:46.532011 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:48.529833 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:48.530205 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:48.530416 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:48.530650 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
22:12:48.530850 IP 192.168.0.1.137 > 192.168.0.255.137: NBT UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
^C
56 packets captured
56 packets received by filter
0 packets dropped by kernel
>
> > I try to discover, why ACK fails everytime and AP with client is not
> connected.
>
> Well, one of the TX callbacks reported success (the one shown above)..
> Though, this may be from the broadcast deauth frame which would not need
> an acknowledgment in the first place. Anyway, this looks like something
> that requires debugging the driver, not hostapd.
I am afraid that debugging rt2x00 driver is impossible to me. I do not know how to do it and what looking for.
>
> --
> Jouni Malinen PGP id EFC895FA
Yours Sincerely Petr Novak
More information about the Hostap
mailing list