[pkg-wpa-devel] Bug#655129: hostapd: EAPOL reauthentication/rekeying timeout loop when using WMM

Henry-Nicolas Tourneur henry.nicolas at tourneur.be
Sun Jan 8 18:01:12 UTC 2012


Package: hostapd
Severity: wishlist

Dear Maintainer,

After installing hostapd on a Wheezy embdedded box, I tried to get the full bw
of the card I have (it's a Atheros chip, 802.11N, TL-WN861N).

Apparently the HT40- or HT40+ options of hostapd are not working with WMM enabled.
This result in an EAPOL reauthentication loop. It seems this happens more often with 
Intel chipsets (on the client side). 
Obviously, not having the 40Mhz bw available largely reduce the effective throughput.

Anyway, the bug is described here with details:
https://dev.openwrt.org/ticket/8830

And a commit in the hostapd git fixes that bug:
http://hostap.epitest.fi/gitweb/gitweb.cgi?p=hostap-1.git;a=commit;h=4378fc14ebfb355705e7674bf347ea659bcd77bc

So it would be really great if you could backport that commit as a patch in the Debian package.

Also, it seems that wpa_supplicant needs to be patched as well in order to get this fixed.

Thanks and best regards,

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash





More information about the Pkg-wpa-devel mailing list