[pkg-wpa-devel] Bug#655129: hostapd: EAPOL reauthentication/rekeying timeout loop when using WMM
Henry-Nicolas Tourneur
henry.nicolas at tourneur.be
Sun Jan 8 18:01:12 UTC 2012
Package: hostapd
Severity: wishlist
Dear Maintainer,
After installing hostapd on a Wheezy embdedded box, I tried to get the full bw
of the card I have (it's a Atheros chip, 802.11N, TL-WN861N).
Apparently the HT40- or HT40+ options of hostapd are not working with WMM enabled.
This result in an EAPOL reauthentication loop. It seems this happens more often with
Intel chipsets (on the client side).
Obviously, not having the 40Mhz bw available largely reduce the effective throughput.
Anyway, the bug is described here with details:
https://dev.openwrt.org/ticket/8830
And a commit in the hostapd git fixes that bug:
http://hostap.epitest.fi/gitweb/gitweb.cgi?p=hostap-1.git;a=commit;h=4378fc14ebfb355705e7674bf347ea659bcd77bc
So it would be really great if you could backport that commit as a patch in the Debian package.
Also, it seems that wpa_supplicant needs to be patched as well in order to get this fixed.
Thanks and best regards,
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
More information about the Pkg-wpa-devel
mailing list