Hello,

thank you very much for your support.
With your explanation I found the causer.
It is my WiFi Repeater (Fritz!Wlan Repeater 1160).
If I connecting directly to my AP, the connection works fine and
"netstat -W iwn" is not eye-catching.
I tried to fix it with resetting the Repeater. I also choosed a less
used channel.
Indeed the repeater still trying to death auth me:

ieee80211 on iwn0:
        0 input packets with bad version
        4 input packets too short
        0 input packets from wrong bssid
        39 input packet duplicates discarded
        0 input packets with wrong direction
        9 input multicast echo packets discarded
        0 input packets from unassociated station discarded
        0 input encrypted packets without wep/wpa config discarded
        0 input unencrypted packets with wep/wpa config discarded
        14 input wep/wpa packets processing failed
        0 input packet decapsulations failed
        0 input management packets discarded
        0 input control packets discarded
        0 input packets with truncated rate set
        0 input packets with missing elements
        0 input packets with elements too big
        0 input packets with elements too small
        0 input packets with invalid channel
        130 input packets with mismatched channel
        0 node allocations failed
        0 input packets with mismatched ssid
        0 input packets with unsupported auth algorithm
        0 input authentications failed
        0 input associations from wrong bssid
        0 input associations without authentication
        0 input associations with mismatched capabilities
        0 input associations without matching rates
        0 input associations with bad rsn ie
        211 input deauthentication packets
        0 input disassociation packets
        0 input packets with unknown subtype
        0 input packets failed for lack of mbufs
        0 input decryptions failed on crc
        0 input ahdemo management packets discarded
        0 input packets with bad auth request
        10 input eapol-key packets
        0 input eapol-key packets with bad mic
        0 input eapol-key packets replayed
        0 input packets with bad tkip mic
        0 input tkip mic failure notifications
        0 input packets on unauthenticated port
        0 output packets failed for lack of mbufs
        0 output packets failed for no nodes
        0 output packets of unknown management type
        9 output packets on unauthenticated port
        1 active scan started
        0 passive scans started
        0 nodes timed out
        0 failures with no memory for crypto ctx
        0 ccmp decryption errors
        0 ccmp replayed frames
        0 cmac icv errors
        0 cmac replayed frames
        0 tkip icv errors
        0 tkip replays
        0 pbac errors
        0 HT negotiation failures because peer does not support MCS 0-7
        0 HT negotiation failures because we do not support basic MCS set
        0 HT negotiation failures because peer uses bad crypto
        0 HT protection changes
        8 new input block ack agreements
        4 new output block ack agreements
        178 input frames below block ack window start
        0 input frames above block ack window end
        0 input block ack window slides
        0 input block ack window jumps
        56 duplicate input block ack frames
        0 expected input block ack frames never arrived
        0 input block ack window gaps timed out
        0 input block ack agreements timed out
        0 output block ack agreements timed out

 
Can you say me if this is a problem of the shitty repeater. So I will
throw it away and maybe make my own or buy a better one.
Or is it a bug of OpenBSD which maybe fixed in a newer version? So I
would wait.

Thank you very much!
greetings,
Peter

Reply via email to