[prev in list] [next in list] [prev in thread] [next in thread] 

List:       hostap
Subject:    hostapd client constantly disconnects and reconnects
From:       Drasko DRASKOVIC <drasko.draskovic () gmail ! com>
Date:       2014-04-30 16:36:54
Message-ID: CAEk6gTCSToCSes5Qy11=8pYx9J+Vj5QCSsEN0x07-ML619H7PA () mail ! gmail ! com
[Download RAW message or body]

Hi all,
I have Android client connecting to hostapd on my embedded board.

I connect it via WPS, and it says that it is connected.

However, every few seconds it disconnectct and re-connects, having log
like pasted on hostapd.

What can be the source of this constant dosconnection/re-connection?

BR,
Drasko


nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 08:60:6e:a1:4c:33
nl80211: Assoc Req IEs - hexdump(len6): 00 06 41 4c 54 45 52 41 01
08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04
01 00 00 0f ac 02 00 0
wlan0: Event ASSOC (0) received
Add randomness: count„ entropy=1
random pool - hexdump(len8): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=6): [REMOVED]
random pool - hexdump(len8): [REMOVED]
wlan0: STA 08:60:6e:a1:4c:33 IEEE 802.11: associated
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA included RSN IE in (Re)AssocReq
wlan0: STA 08:60:6e:a1:4c:33 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr:60:6e:a1:4c:33
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 08:60:6e:a1:4c:33 WPA: event 4 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len=0
   addr:60:6e:a1:4c:33
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state AUTHENTICATION2
Get randomness: len2 entropy=2
random from os_get_random - hexdump(len2): [REMOVED]
random_mix_pool - hexdump(len ): [REMOVED]
random from internal pool - hexdump(len): [REMOVED]
random_mix_pool - hexdump(len ): [REMOVED]
random from internal pool - hexdump(len): [REMOVED]
mixed random - hexdump(len2): [REMOVED]
WPA: Assign ANonce - hexdump(len2): 02 b5 d7 b1 90 70 a1 5c 69 2b 51
53 cb 62 eb cb 84 3c 81 8c 29 f4 83 6f 1c f4 f2 f8 d6 39 bb 72
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state INITPSK
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr:00:00:00:00:00
prev_psk=(nil)
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr:00:00:00:00:00
prev_psk=(nil)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKSTART
wlan0: STA 08:60:6e:a1:4c:33 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1
kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for
08:60:6e:a1:4c:33 (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 121 bytes from 08:60:6e:a1:4c:33
   IEEE 802.1X: version=1 type=3 length7
WPA: Received EAPOL-Key from 08:60:6e:a1:4c:33 key_info=0x10a type=2
key_data_length"
WPA: Received Key Nonce - hexdump(len2): e0 68 98 4f 87 1c 62 da 0c
c7 07 ab b2 78 73 11 d1 f8 67 13 ce f3 90 fa ff bd 01 3e 15 1d 17 3b
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
Add randomness: count… entropy=0
random pool - hexdump(len8): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len2): [REMOVED]
random pool - hexdump(len8): [REMOVED]
wlan0: STA 08:60:6e:a1:4c:33 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr:00:00:00:00:00
prev_psk=(nil)
WPA: PTK derivation - A1€:1f:02:a7:98:25 A2:60:6e:a1:4c:33
WPA: Nonce1 - hexdump(len2): 02 b5 d7 b1 90 70 a1 5c 69 2b 51 53 cb
62 eb cb 84 3c 81 8c 29 f4 83 6f 1c f4 f2 f8 d6 39 bb 72
WPA: Nonce2 - hexdump(len2): e0 68 98 4f 87 1c 62 da 0c c7 07 ab b2
78 73 11 d1 f8 67 13 ce f3 90 fa ff bd 01 3e 15 1d 17 3b
WPA: PMK - hexdump(len2): [REMOVED]
WPA: PTK - hexdump(lenH): [REMOVED]
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 08:60:6e:a1:4c:33 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1
kde_len† keyidx=2 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len–): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 99 bytes from 08:60:6e:a1:4c:33
   IEEE 802.1X: version=1 type=3 length•
WPA: Received EAPOL-Key from 08:60:6e:a1:4c:33 key_info=0x30a type=2
key_data_length=0
WPA: Received Key Nonce - hexdump(len2): 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 10
wlan0: STA 08:60:6e:a1:4c:33 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=3 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len
   addr:60:6e:a1:4c:33
wlan0: STA 08:60:6e:a1:4c:33 IEEE 802.1X: authorizing port
wlan0: STA 08:60:6e:a1:4c:33 RADIUS: starting accounting session
0000183E-00000006
wlan0: STA 08:60:6e:a1:4c:33 WPA: pairwise key handshake completed (RSN)
_______________________________________________
HostAP mailing list
HostAP@lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic