Michael,

reported upstream as requested, including the new findings below:
https://bugzilla.gnome.org/show_bug.cgi?id=770504

Verbose debugging in wpa_supplicant reveals the presence of the scanning MAC address 7E:19:8C:39:8B:F0 during authentication, despite a call before authentication to set-hw-addr for the original MAC address F4:F2:6D:10:C5:09. The MLME frame event is ignored as a foreign address and authentication fails.

Aug 28 15:01:04 ripley NetworkManager[9018]: <info> [1472353264.6902] device (wlxf4f26d10c509): set-hw-addr: set MAC address to 7E:19:8C:39:8B:F0 (scanning)
[...]
Aug 28 15:01:06 ripley NetworkManager[9018]: <info> [1472353266.3000] device (wlxf4f26d10c509): set-hw-addr: set-cloned MAC address to F4:F2:6D:10:C5:09 (permanent)
[...]
Aug 28 15:01:06 ripley wpa_supplicant[8462]: nl80211: New station ec:cb:30:60:58:32 Aug 28 15:01:06 ripley wpa_supplicant[8462]: nl80211: Event message available Aug 28 15:01:06 ripley wpa_supplicant[8462]: nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlxf4f26d10c509 Aug 28 15:01:06 ripley wpa_supplicant[8462]: nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlxf4f26d10c509(7e:19:8c:39:8b:f0) A1=f4:f2:6d:10:c5:09 A2=ec:cb:30:60:58:32 Aug 28 15:01:06 ripley wpa_supplicant[8462]: nl80211: wlxf4f26d10c509: Ignore MLME frame event for foreign address

Workaround is to downgrade to 1.2.4.

Kind regards,

--
Ben Caradoc-Davies <b...@transient.nz>
Director
Transient Software Limited <http://transient.nz/>
New Zealand

Reply via email to