> From my uneducated point of view it looks like problem in
> driver
Not necessarily. It might be your wpa_supplicant or the AP.
> After some time of successful usage (5-10 minutes) AP sends
> deauthentication with reason code 2, which AFAIU is "Previous
> authentication no longer valid".
The you need to find out why the AP does this in the first place.
> WPA configuration:
> ctrl_interface=/var/run/wpa_supplicant
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> fast_reauth=1
>
> network={
> scan_ssid=0
> ssid=".........."
> proto=WPA
> key_mgmt=WPA-PSK
> pairwise=CCMP TKIP
> group=CCMP TKIP WEP104 WEP40
> psk="............"
> }
So, the above entry is strange. If you know the network/AP, you
can do an "iwlist eth1 scan" and fill in pairwise/group
accordingly. Usually they're both identical. As you
have "proto=WPA", you should normally then have pairwise=TKIP,
group=TKIP. CCMP is used with proto=WPA2 (or proto=RSN, which is
the same).
> network={
> ssid="any"
> key_mgmt=NONE
> priority=2
> }
And that's even more strange, an entry for something that
shouldn't exist: an open, unencrypted, unprotected wireless
network ...
Some things that might help you: Try "wpa_cli" and it's "status"
and "level" commands. Make sure that no other external programs,
e.g. Network-Manager, is responsible. Look with "ps faxwww" at
the command line arguments for wpa_supplicant. Then kill it, do
an "ifconfig XXX up" (name of the interface) and start
wpa-supplicant by yourself, but this time without the "-B"
(background) option, but with one or two "-d" (debug options).
_______________________________________________
Bcm43xx-dev mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/bcm43xx-dev