Hi. It seems like there's a problem with ath5k in ad-hoc mode with wpa encryption. The nodes connects ok and i can't see any real errors in wpa_supplicant log (included last in this email). If i use tcpdump on the nodes i see broadcast traffic from the other nodes, such as arp requests and broadcast pings. No unicast packets is recieved.
I'm using wpa_supplicant 0.7.2 (tried 0.6.x as well, same result) with this config: ap_scan=2 network={ mode=1 ssid="MCMR" frequency=5700 scan_ssid=1 key_mgmt=WPA-NONE proto=WPA group=CCMP pairwise=NONE psk="123456789012345" } What do you think, is this a problem with ath5k or with wpa_supplicant? Regards, Robert. wpa_supplicant start log: ------------------------------------------- Initializing interface 'wlan0' conf '/tmp/wpa_supplicant-wlan0.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/tmp/wpa_supplicant-wlan0.conf' -> '/tmp/wpa_supplicant-wlan0.conf' Reading configuration file '/tmp/wpa_supplicant-wlan0.conf' ap_scan=2 Line: 3 - start of a new network block mode=1 (0x1) ssid - hexdump_ascii(len=4): 4d 43 4d 52 MCMR frequency=5700 (0x1644) scan_ssid=1 (0x1) key_mgmt: 0x10 proto: 0x1 group: 0x10 pairwise: 0x1 PSK (ASCII passphrase) - hexdump_ascii(len=15): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='MCMR' netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 00:0b:6b:2f:a3:cc wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x53d00 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x53d00 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x53d00 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x53d00 key_idx=3 set_tx=0 seq_len=0 key_len=0 RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1102 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1143 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Trying to associate with SSID 'MCMR' Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: No WPA/RSN IE available from association info WPA: Set cipher suites based on configuration WPA: Selected cipher suites: group 16 pairwise 1 key_mgmt 16 proto 1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK CCMP WPA: using PTK NONE WPA: using KEY_MGMT WPA-NONE WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 00 01 00 00 50 f2 00 No keys have been configured - skip key clearing wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x53d00 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: set_key failed; err=-67 Link has been severed) State: SCANNING -> ASSOCIATING wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 nl80211: Join IBSS (ifindex=4) nl80211: Failed to set interface 4 to mode 1: -16 (Device or resource busy) nl80211: Mode change succeeded while interface is down * SSID - hexdump_ascii(len=4): 4d 43 4d 52 MCMR * freq=5700 * Extra IEs for Beacon/Probe Response frames - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 00 01 00 00 50 f2 00 nl80211: Join IBSS request sent successfully wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x53d00 key_idx=0 set_tx=1 seq_len=6 key_len=16 Cancelling authentication timeout State: ASSOCIATING -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed (auth) [id=-1 id_str=] wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=ForceAuthorized EAPOL: Supplicant port status: Unauthorized nl80211: Event message available nl80211: IBSS a2:27:fa:11:09:f6 joined State: COMPLETED -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=a2:27:fa:11:09:f6 Select network based on association information Network configuration found for the current AP WPA: Using WPA IE from AssocReq to set cipher suites WPA: Selected cipher suites: group 16 pairwise 1 key_mgmt 16 proto 1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK CCMP WPA: using PTK NONE WPA: using KEY_MGMT WPA-NONE WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 00 01 00 00 50 f2 00 EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=ForceAuthorized EAPOL: Supplicant port status: Unauthorized Associated with a2:27:fa:11:09:f6 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE Cancelling authentication timeout State: ASSOCIATED -> COMPLETED CTRL-EVENT-CONNECTED - Connection to a2:27:fa:11:09:f6 completed (reauth) [id=0 id_str=] wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 Cancelling scan request RTM_NEWLINK: operstate=1 ifi_flags=0x1102 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1102 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x11103 ([UP][LOWER_UP]) netlink: Operstate: linkmode=-1, operstate=6 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x11103 ([UP][LOWER_UP]) netlink: Operstate: linkmode=-1, operstate=6 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added l2_packet_receive - recvfrom: Network is down RTM_NEWLINK: operstate=1 ifi_flags=0x11103 ([UP][LOWER_UP]) netlink: Operstate: linkmode=-1, operstate=6 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: disable timer tick nl80211: Event message available nl80211: Ignored unknown event (cmd=19) nl80211: Event message available nl80211: IBSS f2:29:0d:63:a1:e0 joined State: COMPLETED -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f2:29:0d:63:a1:e0 Select network based on association information Network configuration found for the current AP WPA: Using WPA IE from AssocReq to set cipher suites WPA: Selected cipher suites: group 16 pairwise 1 key_mgmt 16 proto 1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK CCMP WPA: using PTK NONE WPA: using KEY_MGMT WPA-NONE WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 00 01 00 00 50 f2 00 EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=ForceAuthorized Associated with f2:29:0d:63:a1:e0 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE Cancelling authentication timeout State: ASSOCIATED -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f2:29:0d:63:a1:e0 completed (reauth) [id=0 id_str=] wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 Cancelling scan request RTM_NEWLINK: operstate=1 ifi_flags=0x11103 ([UP][LOWER_UP]) netlink: Operstate: linkmode=-1, operstate=6 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: Event message available nl80211: Ignored unknown event (cmd=19) _______________________________________________ ath5k-devel mailing list ath5k-devel@lists.ath5k.org https://lists.ath5k.org/mailman/listinfo/ath5k-devel