> -----Original Message-----
> From: Dan Williams [mailto:d...@redhat.com]
> Sent: Thursday, May 18, 2017 1:31 PM
> To: Matthew Starr; networkmanager-list@gnome.org
> Subject: Re: Network Manager 1.0.X Wi-Fi Autoconnect Issues
> 
> On Thu, 2017-05-18 at 15:54 +0000, Matthew Starr wrote:
> > I have tried using NetworkManager 1.0.0 and 1.0.12 on an embedded
> > device built with buildroot that has Ethernet (eth0), Wi-Fi client
> > (mlan0), Wi-Fi Access Point (uap0), and Cellular interfaces (ttyACM0
> > and ppp0).  The Wi-Fi AP (uap0) interface is ignored by Network
> > Manager based on my NetworkManager.conf file. I am able to boot the
> > device and Network Manager will automatically configure and connect
> > with Ethernet, Wi-Fi Client, and Cellular interfaces every time.
> >
> > If I move out of range of the Wi-Fi access point the device will
> > disconnect and if I move back into range in under an hour,
> > NetworkManager will reestablish the connection.  If I wait multiple
> > hours before moving back into range of the Wi-Fi access point, Network
> > Manager will not reestablish a connection automatically with the
> > access point (I waited hours with the AP within range and visible in
> > Wi-Fi scan results).  When Network Manager is not automatically
> > reestablishing a connection to the access point I can use nmcli to
> > bring up the profile associated with the access point and it connects
> > immediately.
> >
> > Why is Network Manager not able to auto connect to a Wi-Fi AP after a
> > longer period of time of not seeing the AP?  Is there a timeout within
> > Network Manager?  Is this a bug?
> 
> Like you say, it does look like NM is trying to auto-activate the connection,
> but it's not doing it correctly.  The most likely thing happening is that it 
> does
> try to activate, but it's not able to find the "best" connection for the 
> device.
> Somehow the existing WiFi connection profile isn't matching.
> 
> Can you run 'nmcli con show <name of connection you expect to start>'?

Dan,

This issue has occurred on several different access point I have attempted to 
connect to all from different vendors (Linksys, Ubiquiti, D-link).

Here is the output for my connection profile for one of them:

# nmcli con show linksys-hed-test
connection.id:                          linksys-hed-test
connection.uuid:                        3a3fdd49-c624-42a3-acbd-135f728c9621
connection.interface-name:              mlan0
connection.type:                        802-11-wireless
connection.autoconnect:                 yes
connection.autoconnect-priority:        0
connection.timestamp:                   1495132442
connection.read-only:                   no
connection.permissions:                 
connection.zone:                        --
connection.master:                      --
connection.slave-type:                  --
connection.secondaries:                 
connection.gateway-ping-timeout:        0
802-11-wireless.ssid:                   linksys-hed-test
802-11-wireless.mode:                   --
802-11-wireless.band:                   --
802-11-wireless.channel:                0
802-11-wireless.bssid:                  --
802-11-wireless.rate:                   0
802-11-wireless.tx-power:               0
802-11-wireless.mac-address:            --
802-11-wireless.cloned-mac-address:     --
802-11-wireless.mac-address-blacklist:  
802-11-wireless.mtu:                    auto
802-11-wireless.seen-bssids:            
802-11-wireless.hidden:                 no
802-11-wireless-security.key-mgmt:      wpa-psk
802-11-wireless-security.wep-tx-keyidx: 0
802-11-wireless-security.auth-alg:      --
802-11-wireless-security.proto:         
802-11-wireless-security.pairwise:      
802-11-wireless-security.group:         
802-11-wireless-security.leap-username: --
802-11-wireless-security.wep-key0:      <hidden>
802-11-wireless-security.wep-key1:      <hidden>
802-11-wireless-security.wep-key2:      <hidden>
802-11-wireless-security.wep-key3:      <hidden>
802-11-wireless-security.wep-key-flags: 0 (none)
802-11-wireless-security.wep-key-type:  0 (unknown)
802-11-wireless-security.psk:           <hidden>
802-11-wireless-security.psk-flags:     0 (none)
802-11-wireless-security.leap-password: <hidden>
802-11-wireless-security.leap-password-flags:0 (none)
ipv4.method:                            auto
ipv4.dns:                               
ipv4.dns-search:                        
ipv4.addresses:                         
ipv4.gateway:                           --
ipv4.routes:                            
ipv4.route-metric:                      -1
ipv4.ignore-auto-routes:                no
ipv4.ignore-auto-dns:                   no
ipv4.dhcp-client-id:                    --
ipv4.dhcp-send-hostname:                yes
ipv4.dhcp-hostname:                     --
ipv4.never-default:                     no
ipv4.may-fail:                          yes
ipv6.method:                            auto
ipv6.dns:                               
ipv6.dns-search:                        
ipv6.addresses:                         
ipv6.gateway:                           --
ipv6.routes:                            
ipv6.route-metric:                      -1
ipv6.ignore-auto-routes:                no
ipv6.ignore-auto-dns:                   no
ipv6.never-default:                     no
ipv6.may-fail:                          yes
ipv6.ip6-privacy:                       -1 (unknown)
ipv6.dhcp-send-hostname:                yes
ipv6.dhcp-hostname:                     --
GENERAL.NAME:                           linksys-hed-test
GENERAL.UUID:                           3a3fdd49-c624-42a3-acbd-135f728c9621
GENERAL.DEVICES:                        mlan0
GENERAL.STATE:                          activated
GENERAL.DEFAULT:                        yes
GENERAL.DEFAULT6:                       no
GENERAL.VPN:                            no
GENERAL.ZONE:                           --
GENERAL.DBUS-PATH:                      
/org/freedesktop/NetworkManager/ActiveConnection/14
GENERAL.CON-PATH:                       
/org/freedesktop/NetworkManager/Settings/8
GENERAL.SPEC-OBJECT:                    
/org/freedesktop/NetworkManager/AccessPoint/6717
GENERAL.MASTER-PATH:                    --
IP4.ADDRESS[1]:                         192.168.20.103/24
IP4.GATEWAY:                            192.168.20.1
IP4.DNS[1]:                             192.168.1.2
DHCP4.OPTION[1]:                        network_number = 192.168.20.0
DHCP4.OPTION[2]:                        dhcp_server_identifier = 192.168.20.1
DHCP4.OPTION[3]:                        ifmtu = 1500
DHCP4.OPTION[4]:                        skip_hooks = lookup-hostname
DHCP4.OPTION[5]:                        if_up = true
DHCP4.OPTION[6]:                        subnet_cidr = 24
DHCP4.OPTION[7]:                        ifcarrier = up
DHCP4.OPTION[8]:                        broadcast_address = 255.255.255.255
DHCP4.OPTION[9]:                        ifmetric = 306
DHCP4.OPTION[10]:                       dhcp_message_type = 5
DHCP4.OPTION[11]:                       ifwireless = 1
DHCP4.OPTION[12]:                       dhcp_lease_time = 86400
DHCP4.OPTION[13]:                       ip_address = 192.168.20.103
DHCP4.OPTION[14]:                       routers = 192.168.20.1
DHCP4.OPTION[15]:                       subnet_mask = 255.255.255.0
DHCP4.OPTION[16]:                       domain_name_servers = 192.168.1.2
DHCP4.OPTION[17]:                       ifssid = linksys-hed-test
DHCP4.OPTION[18]:                       interface_order = mlan0
DHCP4.OPTION[19]:                       if_oneup = true
DHCP4.OPTION[20]:                       if_ipwaited = true
DHCP4.OPTION[21]:                       ifflags = 4163
DHCP4.OPTION[22]:                       if_down = false
IP6.ADDRESS[1]:                         fe80::d6ca:6eff:fe33:25e5/64
IP6.GATEWAY:

> 
> Also, 'iw dev mlan0 scan dump', find the block for the expected AP, and
> report that.  Feel free to replace the BSSID with xs or something if you want
> to hide it.

Here are two of the access points I have used for testing:

BSS 00:25:9c:53:2f:9e(on mlan0) -- associated
        TSF: 2339114597780 usec (27d, 01:45:14)
        freq: 2437
        beacon interval: 100 TUs
        capability: ESS Privacy ShortPreamble ShortSlotTime (0x0431)
        signal: -40.00 dBm
        last seen: 390 ms ago
        SSID: linksys-hed-test
        Supported rates: 1.0* 2.0* 5.5* 11.0* 6.0 9.0 12.0 18.0 
        DS Parameter set: channel 6
        RSN:     * Version: 1
                 * Group cipher: CCMP
                 * Pairwise ciphers: CCMP
                 * Authentication suites: PSK
                 * Capabilities: 1-PTKSA-RC 1-GTKSA-RC (0x0000)
        ERP: <no flags>
        Extended supported rates: 24.0 36.0 48.0 54.0 
        WPS:     * Version: 1.0
                 * Wi-Fi Protected Setup State: 2 (Configured)
                 * Response Type: 3 (AP)
                 * UUID: 00000000-0000-1000-0000-00259c532f9e
                 * Manufacturer: Linksys Inc.
                 * Model: WRT54G2
                 * Model Number: v1.5.01
                 * Serial Number: 0
                 * Primary Device Type: 6-0050f204-1
                 * Device name: WRT54G2
                 * Config methods: Label, PBC
                 * RF Bands: 0x1

BSS 24:a4:3c:55:76:60(on mlan0)
        TSF: 2339114597752 usec (27d, 01:45:14)
        freq: 2412
        beacon interval: 100 TUs
        capability: ESS Privacy ShortPreamble ShortSlotTime (0x0431)
        signal: -71.00 dBm
        last seen: 390 ms ago
        SSID: TEST-WIFI
        Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0* 36.0 54.0 
        DS Parameter set: channel 1
        ERP: <no flags>
        ERP D4.0: <no flags>
        RSN:     * Version: 1
                 * Group cipher: CCMP
                 * Pairwise ciphers: CCMP
                 * Authentication suites: PSK
                 * Capabilities: 16-PTKSA-RC 1-GTKSA-RC (0x000c)
        Extended supported rates: 6.0* 9.0 12.0* 48.0 
        HT capabilities:
                Capabilities: 0x19ad
                        RX LDPC
                        HT20
                        SM Power Save disabled
                        RX HT20 SGI
                        TX STBC
                        RX STBC 1-stream
                        Max AMSDU length: 7935 bytes
                        DSSS/CCK HT40
                Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
                Minimum RX AMPDU time spacing: 4 usec (0x05)
                HT RX MCS rate indexes supported: 0-23
                HT TX MCS rate indexes are undefined
        HT operation:
                 * primary channel: 1
                 * secondary channel offset: no secondary
                 * STA channel width: 20 MHz
                 * RIFS: 1
                 * HT protection: no
                 * non-GF present: 1
                 * OBSS non-GF present: 0
                 * dual beacon: 0
                 * dual CTS protection: 0
                 * STBC beacon: 0
                 * L-SIG TXOP Prot: 0
                 * PCO active: 0
                 * PCO phase: 0
        Extended capabilities: Extended Channel Switching, 6
        WPA:     * Version: 1
                 * Group cipher: CCMP
                 * Pairwise ciphers: CCMP
                 * Authentication suites: PSK
        WMM:     * Parameter version 1
                 * BE: CW 15-1023, AIFSN 3
                 * BK: CW 15-1023, AIFSN 7
                 * VI: CW 7-15, AIFSN 2, TXOP 3008 usec
                 * VO: CW 3-7, AIFSN 2, TXOP 1504 usec

> 
> My best guess is a mismatch between the AP's beacon/properties and the
> connection somehow.
> 
> Dan
> 
_______________________________________________
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list

Reply via email to