> From my uneducated point of view it looks like problem in
> driver

Not necessarily. It might be your wpa_supplicant or the AP.


> After some time of successful usage (5-10 minutes) AP sends
> deauthentication with reason code 2, which AFAIU is "Previous
> authentication no longer valid".

The you need to find out why the AP does this in the first place.


> WPA configuration:
> ctrl_interface=/var/run/wpa_supplicant
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> fast_reauth=1
>
> network={
>   scan_ssid=0
>   ssid=".........."
>   proto=WPA
>   key_mgmt=WPA-PSK
>   pairwise=CCMP TKIP
>   group=CCMP TKIP WEP104 WEP40
>   psk="............"
> }

So, the above entry is strange. If you know the network/AP, you 
can do an "iwlist eth1 scan" and fill in pairwise/group 
accordingly. Usually they're both identical. As you 
have "proto=WPA", you should normally then have pairwise=TKIP, 
group=TKIP. CCMP is used with proto=WPA2 (or proto=RSN, which is 
the same).

> network={
>   ssid="any"
>   key_mgmt=NONE
>   priority=2
> }

And that's even more strange, an entry for something that 
shouldn't exist: an open, unencrypted, unprotected wireless 
network ...




Some things that might help you: Try "wpa_cli" and it's "status" 
and "level" commands. Make sure that no other external programs, 
e.g. Network-Manager, is responsible. Look with "ps faxwww" at 
the command line arguments for wpa_supplicant. Then kill it, do 
an "ifconfig XXX up" (name of the interface) and start 
wpa-supplicant by yourself, but this time without the "-B" 
(background) option, but with one or two "-d" (debug options).
_______________________________________________
Bcm43xx-dev mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/bcm43xx-dev

Reply via email to