On Tue, 2 Jan 2018, Stefan Sperling wrote:
> > Is it perhaps a bug? Or perhaps only misconfiguration?
>
> There is no error in the logs you provided.
> It's hard to guess what the problem is unless you can describe
> the problem a bit better and show more data.
I hope the following helps:
# uname -a
OpenBSD nc10.my.domain 6.2 GENERIC.MP#166 i386
BEFORE LOSING LINK
# netstat -n -I run0
Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Colls
run0 1500 <Link> 00:1f:1f:22:ce:d2 2905 6 364 0 0
run0 1500 192.168.0/2 192.168.0.12 2905 6 364 0 0
# netstat -W run0
ieee80211 on run0:
0 input packets with bad version
0 input packets too short
3158 input packets from wrong bssid
0 input packet duplicates discarded
0 input packets with wrong direction
3 input multicast echo packets discarded
0 input packets from unassociated station discarded
12 input encrypted packets without wep/wpa config discarded
7 input unencrypted packets with wep/wpa config discarded
0 input wep/wpa packets processing failed
0 input packet decapsulations failed
0 input management packets discarded
0 input control packets discarded
0 input packets with truncated rate set
0 input packets with missing elements
0 input packets with elements too big
0 input packets with elements too small
0 input packets with invalid channel
2 input packets with mismatched channel
0 node allocations failed
0 input packets with mismatched ssid
0 input packets with unsupported auth algorithm
0 input authentications failed
0 input associations from wrong bssid
0 input associations without authentication
0 input associations with mismatched capabilities
0 input associations without matching rates
0 input associations with bad rsn ie
0 input deauthentication packets
0 input disassociation packets
0 input packets with unknown subtype
0 input packets failed for lack of mbufs
0 input decryptions failed on crc
0 input ahdemo management packets discarded
0 input packets with bad auth request
2 input eapol-key packets
0 input eapol-key packets with bad mic
0 input eapol-key packets replayed
0 input packets with bad tkip mic
0 input tkip mic failure notifications
1 input packet on unauthenticated port
0 output packets failed for lack of mbufs
0 output packets failed for no nodes
0 output packets of unknown management type
0 output packets on unauthenticated port
1 active scan started
0 passive scans started
0 nodes timed out
0 failures with no memory for crypto ctx
0 ccmp decryption errors
0 ccmp replayed frames
0 cmac icv errors
0 cmac replayed frames
0 tkip icv errors
0 tkip replays
0 pbac errors
0 HT negotiation failures because peer does not support MCS 0-7
0 HT negotiation failures because we do not support basic MCS set
0 HT negotiation failures because peer uses bad crypto
0 HT protection changes
0 new input block ack agreements
0 new output block ack agreements
0 input frames below block ack window start
0 input frames above block ack window end
0 input block ack window slides
0 input block ack window jumps
0 duplicate input block ack frames
0 expected input block ack frames never arrived
0 input block ack window gaps timed out
0 input block ack agreements timed out
0 output block ack agreements timed out
# tcpdump -n -i run0
15:03:42.788935 arp who-has 192.168.0.94 tell 192.168.0.1
15:03:43.819179 192.168.0.12.2088 > 200.1.19.17.123: v4 client strat 0 poll 0
prec 0 [tos 0x10]
15:03:43.832405 200.1.19.17.123 > 192.168.0.12.2088: v4 server strat 2 poll 3
prec -23 (DF)
15:03:47.929162 192.168.0.12.17331 > 64.233.190.108.993: P
3276235917:3276235953(36) ack 912426522 win 256 <nop,nop,timestamp 1174077249
3207266542> (DF)
15:03:47.942544 64.233.190.108.993 > 192.168.0.12.17331: . ack 36 win 225
<nop,nop,timestamp 3207418732 1174077249>
15:03:48.148291 64.233.190.108.993 > 192.168.0.12.17331: P 1:43(42) ack 36 win
225 <nop,nop,timestamp 3207418939 1174077249>
15:03:48.339025 192.168.0.12.17331 > 64.233.190.108.993: . ack 43 win 256
<nop,nop,timestamp 1174077250 3207418939> (DF)
15:03:48.879039 192.168.0.12.12287 > 200.1.19.4.123: v4 client strat 0 poll 0
prec 0 [tos 0x10]
15:03:48.893012 200.1.19.4.123 > 192.168.0.12.12287: v4 server strat 2 poll 3
prec -23 (DF)
# tcpdump -n -i run0 -y IEEE802_11_RADIO
15:07:10.067739 802.11: beacon, ssid (VTR-5317427), rates, ds, tim, country,
erp, xrates, htcaps, htop, <radiotap v0, chan 1, 11g, sig -60dBm, signal 58dB>
15:07:10.084489 802.11: beacon, ssid (ARRIS-9262), rates, ds, xrates, country,
51:8, 51:8, tim, rsn, erp, <radiotap v0, chan 1, 11g, sig -62dBm, signal 60dB>
15:07:10.116488 802.11: beacon, ssid (rna903295), rates, ds, tim, erp, 47:1,
rsn, 2 stations, 12% utilization, admission capacity 0us/s, 127:8, vendor,
<radiotap v0, chan 1, 11g, sig -23dBm, signal 21dB>
---------------------------------------------
After losing Link
# netstat netstat -n -I run0 >> tmp-netstat1
netstat: interval is invalid
# netstat -W run0
ieee80211 on run0:
0 input packets with bad version
0 input packets too short
6904 input packets from wrong bssid
0 input packet duplicates discarded
0 input packets with wrong direction
3 input multicast echo packets discarded
0 input packets from unassociated station discarded
12 input encrypted packets without wep/wpa config discarded
10 input unencrypted packets with wep/wpa config discarded
0 input wep/wpa packets processing failed
0 input packet decapsulations failed
0 input management packets discarded
0 input control packets discarded
0 input packets with truncated rate set
0 input packets with missing elements
0 input packets with elements too big
0 input packets with elements too small
0 input packets with invalid channel
7 input packets with mismatched channel
0 node allocations failed
0 input packets with mismatched ssid
0 input packets with unsupported auth algorithm
0 input authentications failed
0 input associations from wrong bssid
0 input associations without authentication
0 input associations with mismatched capabilities
0 input associations without matching rates
0 input associations with bad rsn ie
0 input deauthentication packets
0 input disassociation packets
0 input packets with unknown subtype
0 input packets failed for lack of mbufs
0 input decryptions failed on crc
0 input ahdemo management packets discarded
0 input packets with bad auth request
2 input eapol-key packets
0 input eapol-key packets with bad mic
0 input eapol-key packets replayed
0 input packets with bad tkip mic
0 input tkip mic failure notifications
1 input packet on unauthenticated port
0 output packets failed for lack of mbufs
0 output packets failed for no nodes
0 output packets of unknown management type
0 output packets on unauthenticated port
1 active scan started
0 passive scans started
0 nodes timed out
0 failures with no memory for crypto ctx
0 ccmp decryption errors
0 ccmp replayed frames
0 cmac icv errors
0 cmac replayed frames
0 tkip icv errors
0 tkip replays
0 pbac errors
0 HT negotiation failures because peer does not support MCS 0-7
0 HT negotiation failures because we do not support basic MCS set
0 HT negotiation failures because peer uses bad crypto
0 HT protection changes
0 new input block ack agreements
0 new output block ack agreements
0 input frames below block ack window start
0 input frames above block ack window end
0 input block ack window slides
0 input block ack window jumps
0 duplicate input block ack frames
0 expected input block ack frames never arrived
0 input block ack window gaps timed out
0 input block ack agreements timed out
0 output block ack agreements timed out
# tcpdump -n -i run0
tcpdump: listening on run0, link-type EN10MB
^C
0 packets received by filter
0 packets dropped by kernel
# tcpdump -n -i run0 -y IEEE802_11_RADIO
tcpdump: listening on run0, link-type IEEE802_11_RADIO
15:29:37.475139 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: FP
3160548212:3160548235(23) ack 3357202105 win 256 <nop,nop,timestamp 4270344605
658810306>, <radiotap v0, chan 1, 11g>
15:29:45.974910 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: FP
1359026660:1359026696(36) ack 2175423745 win 256 <nop,nop,timestamp 964805565
1626745330> (DF), <radiotap v0, chan 1, 11g>
15:30:41.473291 802.11: data: 192.168.0.12.41070 > 64.233.190.16.587: R
24:24(0) ack 1 win 0, <radiotap v0, chan 1, 11g>
15:30:49.973049 802.11: data: 192.168.0.12.47665 > 64.233.186.108.993: R
37:37(0) ack 1 win 0 (DF), <radiotap v0, chan 1, 11g>
15:31:28.692024 802.11: data: 192.168.0.12.4130 > 200.1.19.17.123: v4 client
strat 0 poll 0 prec 0 [tos 0x10], <radiotap v0, chan 1, 11g>
15:33:43.018220 8
# ifconfig run0
run0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
lladdr 00:1f:1f:22:ce:d2
index 5 priority 4 llprio 3
groups: wlan egress
media: IEEE802.11 autoselect (DS1 mode 11g)
status: active
ieee80211: nwid rna903295 chan
1 bssid 7c:05:07:f7:6f:4c -21dBm wpakey
0x61d88ace2e7cdf45bb701e9850f3824c95b4ccb33dc860a403edaf9fdefaf7f1 wpaprotos
wpa2 wpaakms psk wpaciphers ccmp wpagroupcipher ccmp
inet 192.168.0.12
netmask 0xffffff00 broadcast 192.168.0.255
-----------------------------