Bug 453864
Summary: | Latest kernel/wireless updates breaks WPA(-PSK?) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Stefan Becker <chemobejk> | ||||||
Component: | kernel | Assignee: | John W. Linville <linville> | ||||||
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
Severity: | high | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | 9 | CC: | kernel-maint, ryan.farmer.personal, walovaton | ||||||
Target Milestone: | --- | ||||||||
Target Release: | --- | ||||||||
Hardware: | i686 | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2008-07-03 14:02:00 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Stefan Becker
2008-07-02 22:34:28 UTC
Created attachment 310863 [details]
wpa_supplicant debugging logfile from kernel-2.6.25.9-72.fc9.i686 (OK)
Created attachment 310865 [details]
wpa_supplicant debugging logfile from kernel-2.6.25.9-76.i686 (BROKEN)
When you compare the OK to the BROKEN log file you see that everything works up
to here:
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
In the error case it never seems to receive the group ACK from the base
station.
I also tried the latest kernel on Koji kernel-2.6.25.9-79.fc9.i686 which has even more wireless updates from upstream: still broken :-( Yeah, me too =( Booting 2.6.25.9-76 I can't connect to my wireless network. Booting back with 2.6.25.6-55 works fine as expected. I am using an iwl3945 NIC. Connecting to not protected networks works fine with both kernels, the problem seems to be with the ones that are protected. I think this may be the same bug as #453882 which I posted earlier. Note that WEP still works, so if you live in an area where you doubt your in range of anyone who knows how to crack WEP, you could use that, and then disable remote management of your router along with MAC address filters as a workaround until a new version of wpa supplicant is here. Latest kernel from koji kernel-2.6.25.9-81.fc9.i686 is still broken. I also installed the only kernel between -72 (OK) and -76 (broken) from koji kernel-2.6.25.9-74.fc9.i686 It is also broken. That limits the culprit down to <http://marc.info/?l=linux-netdev&m=121346686508160&w=2> (-73) or <http://marc.info/?l=linux-wireless&m=121440912502527&w=2> (-74) Looking at the changes I would put my money on one of those from -73: Harvey Harrison (11): mac80211: add helpers for frame control testing mac80211: remove ieee80211_get_morefrag mac80211: make ieee80211_get_hdrlen_from_skb return unsigned mac80211: add utility function to get header length mac80211: wpa.c use new access helpers mac80211: use new helpers in util.c - ieee80211_get_bssid() mac80211: wme.c use new helpers mac80211: rx.c use new helpers mac80211: tkip.c consolidate tkip IV writing in helper mac80211: tkip.c fold ieee80211_gen_rc4key into its one caller mac80211: tkip.c use a local struct tkip_ctx in ieee80211_get_tkip_key |