Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WDS: No traffic after group key handshake #242

Open
eduperez opened this issue Dec 14, 2017 · 10 comments
Open

WDS: No traffic after group key handshake #242

eduperez opened this issue Dec 14, 2017 · 10 comments

Comments

@eduperez
Copy link

Main router: WRT3200ACM running LEDE 17.01.4 plus updated (commit 843d00c) mwlwifi drivers.
Wireless extender: WDR4300 running LEDE 17.01.4

I have been running these two devices using "relayd" for a couple of months, and the connection was fast and rock solid. I recently changed to WDS using recent drives, and have noticed that traffic stops completely when the AP router performs a "group key handshake".

These are the logs at the AP when the STA is powered on and a connection is established:

Thu Dec 14 22:56:49 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: associated (aid 2)
Thu Dec 14 22:56:49 2017 daemon.notice hostapd: wlan_5g: AP-STA-CONNECTED c0:4a:00:fc:2c:2a
Thu Dec 14 22:56:49 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a WPA: pairwise key handshake completed (RSN)
Thu Dec 14 22:56:49 2017 kern.info kernel: [ 3810.237052] device wlan_5g.sta2 entered promiscuous mode
Thu Dec 14 22:56:49 2017 kern.info kernel: [ 3810.242669] br-lan: port 5(wlan_5g.sta2) entered forwarding state
Thu Dec 14 22:56:49 2017 kern.info kernel: [ 3810.248859] br-lan: port 5(wlan_5g.sta2) entered forwarding state
Thu Dec 14 22:56:51 2017 daemon.info dnsmasq-dhcp[4212]: DHCPDISCOVER(br-lan) c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:51 2017 daemon.info dnsmasq-dhcp[4212]: DHCPOFFER(br-lan) 192.168.1.253 c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:51 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: authenticated
Thu Dec 14 22:56:51 2017 kern.info kernel: [ 3812.246134] br-lan: port 5(wlan_5g.sta2) entered forwarding state
Thu Dec 14 22:56:54 2017 daemon.info dnsmasq-dhcp[4212]: DHCPDISCOVER(br-lan) c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:54 2017 daemon.info dnsmasq-dhcp[4212]: DHCPOFFER(br-lan) 192.168.1.253 c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:56 2017 daemon.info dnsmasq-dhcp[4212]: DHCPDISCOVER(br-lan) b8:27:eb:b2:77:4a 
Thu Dec 14 22:56:56 2017 daemon.info dnsmasq-dhcp[4212]: DHCPOFFER(br-lan) 192.168.1.1 b8:27:eb:b2:77:4a 
Thu Dec 14 22:56:57 2017 daemon.info dnsmasq-dhcp[4212]: DHCPDISCOVER(br-lan) c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:57 2017 daemon.info dnsmasq-dhcp[4212]: DHCPOFFER(br-lan) 192.168.1.253 c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:58 2017 daemon.info dnsmasq-dhcp[4212]: DHCPREQUEST(br-lan) 192.168.1.253 c0:4a:00:fc:2c:28 
Thu Dec 14 22:56:58 2017 daemon.info dnsmasq-dhcp[4212]: DHCPACK(br-lan) 192.168.1.253 c0:4a:00:fc:2c:28 bridge

Then traffic flows normally and everything works as expected; some time later these logs appear:

Thu Dec 14 23:03:45 2017 daemon.info hostapd: wlan_2g: STA 40:9f:38:5e:1f:18 WPA: group key handshake completed (RSN)
Thu Dec 14 23:03:46 2017 daemon.info hostapd: wlan_ext2g: STA 60:03:08:87:7b:49 WPA: group key handshake completed (RSN)
Thu Dec 14 23:03:47 2017 daemon.info hostapd: wlan_5g: STA 80:00:6e:4c:94:a3 WPA: group key handshake completed (RSN)
Thu Dec 14 23:03:50 2017 daemon.notice hostapd: wlan_5g: AP-STA-DISCONNECTED c0:4a:00:fc:2c:2a
Thu Dec 14 23:03:52 2017 kern.debug kernel: [ 4232.606886] ieee80211 phy0: staid 2 deleted
Thu Dec 14 23:03:52 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: associated (aid 2)
Thu Dec 14 23:03:52 2017 daemon.notice hostapd: wlan_5g: AP-STA-CONNECTED c0:4a:00:fc:2c:2a
Thu Dec 14 23:03:52 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a WPA: pairwise key handshake completed (RSN)
Thu Dec 14 23:04:01 2017 kern.debug kernel: [ 4241.893217] ieee80211 phy0: staid 2 deleted
Thu Dec 14 23:04:01 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: authenticated

And traffic halts completely; however, after a few minutes I see these messages:

Thu Dec 14 23:18:52 2017 daemon.notice hostapd: wlan_5g: AP-STA-DISCONNECTED c0:4a:00:fc:2c:2a
Thu Dec 14 23:18:52 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: disassociated due to inactivity
Thu Dec 14 23:18:52 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: associated (aid 2)
Thu Dec 14 23:18:52 2017 daemon.notice hostapd: wlan_5g: AP-STA-CONNECTED c0:4a:00:fc:2c:2a
Thu Dec 14 23:18:52 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a WPA: pairwise key handshake completed (RSN)
Thu Dec 14 23:18:58 2017 daemon.info hostapd: wlan_5g: STA c0:4a:00:fc:2c:2a IEEE 802.11: authenticated
Thu Dec 14 23:19:05 2017 daemon.notice hostapd: wlan_2g: AP-STA-DISCONNECTED e0:cb:1d:1d:d7:3b
Thu Dec 14 23:19:05 2017 daemon.info hostapd: wlan_2g: STA e0:cb:1d:1d:d7:3b IEEE 802.11: disassociated
Thu Dec 14 23:19:05 2017 kern.debug kernel: [ 5145.886931] ieee80211 phy1: staid 3 deleted

And traffic beings to flow again.

@BrainSlayer
Copy link

how is your group key configured on ap side and how is your group key configured on station side. you missed something very important. your hostapd and your wpa supplicant config. a wrong group key config leads to non working connections (or just unicast but no broadcast/multicast is working)

@yuhhaurlin
Copy link
Collaborator

I will check it. You can disable group rekey as temporary solution. Thanks.

@eduperez
Copy link
Author

@BrainSlayer Perhaps I am missing something... but I have not configured any group key; I just have an AP configured using "psk-mixed+aes" and WDS active on the main router, and a STA also configured with WDS active on the "wireless extender".

@BrainSlayer
Copy link

group key cipher its what i mean. not the key itself.

@eduperez
Copy link
Author

With group re-keying disabled, traffic has been flowing for a while, and everything seems to work as expected.

@eduperez
Copy link
Author

Problem still present at driver 10.3.4.0-20180118 with firmware 9.3.2.4.

@yuhhaurlin
Copy link
Collaborator

Yes. This one is still under working

@gufus
Copy link

gufus commented Jul 14, 2018

@eduperez

Sure, I'll try your work-around.

How do I dissable group key handshake?

@eduperez
Copy link
Author

@gufus Just add a "option wpa_group_rekey 0" line in your "/etc/config/wifi" file on the AP, under the proper "config wifi-iface" section.

@gufus
Copy link

gufus commented Jul 15, 2018

@eduperez

Thanks!

WDS STA stays up now :-)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants