-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
firmware-brcm80211 1:20190114-1+rpt5 causes failure to connect to some WPA2 APs #9
Comments
It would have been helpful to summarise the results in that thread, which I take to be that you are running hostapd on your laptop, and with the latest firmware the AP is rejecting the connection with the following error message:
Is that correct, and is there anything to add to that? |
Yes, that is correct. I have edited the post to include the portions of logs showing the failure on each side of the connection. I also added details of the wifi dongle I am using to run the laptop AP. |
I'm trying to reproduce this now, using a Pi 3 as an AP, and its working with the latest 43455 firmware. Can you post a copy of the hostapd.conf (minus the passphrase) from the laptop so I can look for differences? |
From my laptop:
|
I can confirm this problem occurred on a Pi 3A+. I ended up reverting to the latest stable Broadcom firmware by running:
I have also prevented upgrading to the testing branch by placing the following in /etc/apt/preferences:
|
Issue persists with firmware-brcm80211 1:20190114-1+rpt7, publicly released yesterday. |
Running Buster Lite (2020-02-13-raspbian-buster-lite) on Rpi4, I was able to connect to an AP running on my laptop using
hostapd
(on wifi dongle Penguin Wireless N USB Adapter for GNU / Linux (TPE-N150USB)), but after upgrading from firmware-brcm80211 1:20190114-1+rpt4 to firmware-brcm80211 1:20190114-1+rpt5, the Rpi4 fails to connect to the AP. It can still connect to my home wifi, however.Here is the log from hostapd showing the failure on the AP side:
Mar 30 16:09:05 hostapd: STA dc:a6:32:65:20:cc WPA: received EAPOL-Key frame (2/4 Pairwise)
Mar 30 16:09:05 hostapd: STA dc:a6:32:65:20:cc WPA: invalid MIC in msg 2/4 of 4-Way Handshake
Here is a portion of the log from wpa_supplicant on the Rpi4 showing the failure:
nl80211: Connect request send successfully
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
nl80211: Connect event (status=16 ignore_next_local_disconnect=0)
wlan0: Event ASSOC_REJECT (12) received
wlan0: CTRL-EVENT-ASSOC-REJECT bssid=28:24:ff:1a:0a:09 status_code=16
I detailed the problem, included logs and configuration files on Stack Exchange.
I was able to downgrade back to firmware-brcm80211 1:20190114-1+rpt4, which did solve the issue.
The text was updated successfully, but these errors were encountered: