On Tue, Jan 02, 2018 at 12:01:50PM +0000, Roderick wrote:
> 
> Dear Sirs,
> 
> After connecting with the AP (Cisco DPQ3925) I lose after a while
> the link. All works again after issuing again:
> 
> # ifconfig run0 nwid .. wpakey ..  bssid ..
> 
> Bellow are the relevant messages after doing "ifconfig run0 debug".
> I do not find anything suspicious. The AP is not mine and I cannot
> see the configuration, but it works OK with other OS.
> 
> Is it perhaps a bug? Or perhaps only misconfiguration?

There is no error in the logs you provided.
It's hard to guess what the problem is unless you can describe
the problem a bit better and show more data.
For example:
When the problem occurs, do the counters shown by the following
commands _change_ when you run these commands mulitple times?
        netstat -n -I run0
        netstat -W run0
Another example: What do you see in tcpdump -n -i run0?
What do you see in tcpdump -n -i run0 -y IEEE802_11_RADIO?

The run(4) code has not been changed in a relatively long time.
What version are you running and when did this problem start happening?

Is it happening with only this particular AP or also others?

> 
> 
> ------------------------------
> 
> # ifconfig run0
> 
> run0: flags=8847<UP,BROADCAST,DEBUG,RUNNING,SIMPLEX,MULTICAST> mtu 1500
>         lladdr 00:1f:1f:22:ce:d2
>         index 5 priority 4 llprio 3
>         groups: wlan egress
>         media: IEEE802.11 autoselect (OFDM6 mode 11g)
>         status: active
>         ieee80211: nwid rna903295 chan 1 bssid 7c:05:07:f7:6f:4c -36dBm 
> wpakey <not displayed> wpaprotos wpa2 wpaakms psk wpaciphers ccmp 
> wpagroupcipher ccmp
>         inet 192.168.0.12 netmask 0xffffff00 broadcast 192.168.0.255
> 
> ------------------
> 
> # cat /var/log/messages 
> ....
> 
> Jan  2 11:42:37 nc10 /bsd:  - ec:22:80:a9:6c:71!  11   +66 54M   ess  
> privacy   rsn  ""!
> Jan  2 11:42:37 nc10 /bsd: run0: SCAN -> AUTH
> Jan  2 11:42:37 nc10 /bsd: run0: sending auth to 7c:05:07:f7:6f:4c on 
> channel 1 mode 11g
> Jan  2 11:42:37 nc10 /bsd: run0: AUTH -> ASSOC
> Jan  2 11:42:37 nc10 /bsd: run0: sending assoc_req to 7c:05:07:f7:6f:4c on 
> channel 1 mode 11g
> Jan  2 11:42:37 nc10 /bsd: run0: received msg 1/4 of the 4-way handshake 
> from 7c:05:07:f7:6f:4c
> Jan  2 11:42:37 nc10 /bsd: run0: sending msg 2/4 of the 4-way handshake to 
> 7c:05:07:f7:6f:4c
> Jan  2 11:42:37 nc10 /bsd: run0: ASSOC -> RUN
> Jan  2 11:42:37 nc10 /bsd: run0: associated with 7c:05:07:f7:6f:4c ssid 
> "rna903295" channel 1 start 1Mb long preamble short slot time
> Jan  2 11:42:37 nc10 /bsd: run0: missed beacon threshold set to 7 beacons, 
> beacon interval is 100 TU
> Jan  2 11:42:37 nc10 /bsd: run0: received msg 3/4 of the 4-way handshake 
> from 7c:05:07:f7:6f:4c
> Jan  2 11:42:37 nc10 /bsd: run0: sending msg 4/4 of the 4-way handshake to 
> 7c:05:07:f7:6f:4c
> 
> -------
> 
> # dmesg
> 
> run0 at uhub0 port 6 configuration 1 interface 0 "Ralink 802.11 n WLAN" 
> rev 2.00/1.01 addr 2
> run0: MAC/BBP RT2860 (rev 0x0102), RF RT2720 (MIMO 1T2R), address 
> 00:1f:1f:22:ce:d2
> ...
> ...
> ...
> run0: SCAN -> AUTH
> run0: sending auth to 7c:05:07:f7:6f:4c on channel 1 mode 11g
> run0: AUTH -> ASSOC
> run0: sending assoc_req to 7c:05:07:f7:6f:4c on channel 1 mode 11g
> run0: received msg 1/4 of the 4-way handshake from 7c:05:07:f7:6f:4c
> run0: sending msg 2/4 of the 4-way handshake to 7c:05:07:f7:6f:4c
> run0: ASSOC -> RUN
> run0: associated with 7c:05:07:f7:6f:4c ssid "rna903295" channel 1 start 
> 1Mb long preamble short slot time
> run0: missed beacon threshold set to 7 beacons, beacon interval is 100 TU
> run0: received msg 3/4 of the 4-way handshake from 7c:05:07:f7:6f:4c
> run0: sending msg 4/4 of the 4-way handshake to 7c:05:07:f7:6f:4c
> ....
> 

Reply via email to