Discussion:
[ath9k-devel] Intel 5100, 5300 and 4965AGN clients can't connect in 802.11n mode
Yura
2009-03-01 20:50:45 UTC
Permalink
Hello!

I'm using Asus WL500GPv1 router with AR5008/AR5416 wifi card and 2 additional
antennas running latest OpenWRT svn that includes ath9k driver from compat-wireless-2009-02-25.

Win XP client with Broadcomm BCM4321 card successfully connects at N rates up to 130mbps.

Other two laptops with Intel 5300 and 5100 cards can only connect in G mode.
Intel's wireless utility recognizes network as N mode. It shows "band: 802.11g, 802.11n"
in network properties and displays nice purple (n) icon. But connection speed is only
54mbps and 802.11g/a mode is displayed in "details" window.
I tried various ht_config parameters, different channels in 2.4 and 5ghz band,
all possible encryption modes and Intel driver settings.

I've noticed that this message appears in Intel wireless troubleshooter event log on each connection attempt:
"Security mismatch with 11n. 11n is not in operation"

Found some information about it from intel:
http://www.intel.com/support/wireless/wlan/4965agn/sb/CS-025643.htm
--------------------
Symptom(s):
Client device's WiFi data rate will not exceed 54 Mbps when Wired Equivalent Privacy (WEP) or Temporal Key Integrity Protocol (TKIP) encryption is configured.

Cause:
The IEEE* 802.11n Draft prohibits using High Throughput with WEP or TKIP as the unicast cipher. If you use these encryption methods (e.g. WEP, WPA-TKIP), your data rate will drop to 54 Mbps. The Intel® WiMAX/WiFi Link 5350, Intel® WiMAX/WiFi Link 5150, Intel® WiFi Link 5300, Intel® WiFi Link 5100 and Intel® Wireless WiFi Link 4965AGN client drivers connect using a legacy IEEE 802.11g connection rather than failing to connect altogether, which complies with the IEEE 802.11n draft.

Solution:
1. Contact your WiFi access point (AP) or router manufacturer to download the latest firmware version, or to obtain information on particular models supporting High Throughput.
2. Disable 'packet bursting' or similar feature that may be enabled on the AP or router.
3. Configure the WiFi client device's profile to use Wi-Fi Protected Access* (WPA2-AES or WPA2-TKIP). You may also choose to configure an unsecured profile, but this option is NOT recommended.
4. Configure the AP or router to match the client profile.
--------------------

I tried WPA2-AES encryption and no encryption (as well as WEP and
WPA-TKIP) but it has no effect. I always get the "security mismatch" message in Intel's log and connect at 54mbps.


There are some other OpenWRT users having exactly the same issue.
Take a look at this thread: http://forum.openwrt.org/viewtopic.php?pid=82969#p82969
--
Best regards,
Yura
Yura
2009-03-03 11:58:13 UTC
Permalink
Hello!

The issue reported in my previous post is solved and I can finally
connect in N mode from Intel client cards with 130-300mbps rate.

It became possible after adding "wme_enabled=1" and all other
WME-related options to hostapd.conf. In OpenWRT they were not included
by default.

Obviously Intel windows driver checks WME support flag from AP to enable 11n
operation.

However, it still doesn't not work right. Connection is almost bad in N mode.
Ping shows 50-90% packet loss, every 2nd or 3rd packet is lost.
Transfer speed is usually only some kBps. Sometimes it improves and seems to
work well and I have ~2 MBytes/s speed, but it only lasts some minutes.

Situation is the same with both Intel cards, different ht_capab configs and
bands. Also it doesn't depend from connection speed, signal stregth or distance
to the router.

Broadcom card still works well with wme settings enabled. I have 270 mbps in 5Ghz
band and 130mbps in 2.4 band. Transfer speed is 2.4 MBytes/s limited by CPU load.

Another OpenWRT user reports the same problem.

Did anyone at Atheros test ath9k in 11n AP mode with Intel clients?
--
Best regards,
Yura mailto:***@ukr.net
Jouni Malinen
2009-03-03 12:57:32 UTC
Permalink
Post by Yura
However, it still doesn't not work right. Connection is almost bad in N mode.
Ping shows 50-90% packet loss, every 2nd or 3rd packet is lost.
Transfer speed is usually only some kBps. Sometimes it improves and seems to
work well and I have ~2 MBytes/s speed, but it only lasts some minutes.
Could you please re-test with the current hostapd development git
snapshot (0.7.x, from http://w1.fi/)? It has a bug fix that may affect
HT rate selection especially in HT20 case and that could potentially
explain the types of issues you are reporting.

- Jouni
Yura
2009-03-03 16:03:07 UTC
Permalink
Hello Jouni,
Post by Jouni Malinen
Could you please re-test with the current hostapd development git
snapshot (0.7.x, from http://w1.fi/)? It has a bug fix that may affect
HT rate selection especially in HT20 case and that could potentially
explain the types of issues you are reporting.
I did. Nothing changed.
Here is the hostapd debug log. During that session I connected from
windows laptop in N mode and pinged the router from that laptop.

Please note the following 2 lines:

MGMT (TX callback) ACK
mgmt::action cb

They appear every 5-8 seconds and exactly at that moment wireless
client receives ping reply packets. (ping output looks similar to what
i've previously posted in the "Ath9k packets dropping issue" topic)



***@asus:~# hostapd -P /var/run/wifi-wlan0.pid /var/run/hostapd-wlan0.conf -dd
Configuration file: /var/run/hostapd-wlan0.conf
Line 8: DEPRECATED: 'debug' configuration variable is not used anymore
Opening raw packet socket for ifindex 0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
nl80211: Added 802.11b mode based on 802.11g information
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
HT40: control channel: 10 secondary channel: 6
RATE[0] rate=10 flags=0x2
RATE[1] rate=20 flags=0x6
RATE[2] rate=55 flags=0x6
RATE[3] rate=110 flags=0x6
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
Passive scanning not supported
Flushing old station entries
Deauthenticate all stations
Mode: IEEE 802.11g Channel: 10 Frequency: 2457 MHz
Using interface wlan0 with hwaddr 00:1f:f3:c0:f2:80 and ssid 'N7'
SSID - hexdump_ascii(len=2):
4e 37 N7
PSK (ASCII passphrase) - hexdump_ascii(len=22):
*****
PSK (from passphrase) - hexdump(len=32): *****
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wlan0: Setup of interface done.
MGMT (TX callback) ACK
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for our SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:16:ea:60:97:9a auth_alg=0 auth_transaction=1 status_code=0 wep=0
New STA
wlan0: STA 00:16:ea:60:97:9a IEEE 802.11: authentication OK (open system)
wlan0: STA 00:16:ea:60:97:9a MLME: MLME-AUTHENTICATE.indication(00:16:ea:60:97:9a, OPEN_SYSTEM)
wlan0: STA 00:16:ea:60:97:9a MLME: MLME-DELETEKEYS.request(00:16:ea:60:97:9a)
authentication reply: STA=00:16:ea:60:97:9a auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:16:ea:60:97:9a IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:16:ea:60:97:9a capab_info=0x411 listen_interval=10
WME IE - hexdump(len=7): 00 50 f2 02 00 01 00
Validating WME IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1
HT: STA 00:16:ea:60:97:9a HT Capabilities Info: 0x083c
handle_assoc STA 00:16:ea:60:97:9a - 20 MHz HT, num of 20MHz HT STAs 1
hostapd_ht_operation_update current operation mode=0x0
hostapd_ht_operation_update new operation mode=0x2 changes=1
new AID 1
wlan0: STA 00:16:ea:60:97:9a IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:16:ea:60:97:9a IEEE 802.11: associated (aid 1)
wlan0: STA 00:16:ea:60:97:9a MLME: MLME-ASSOCIATE.indication(00:16:ea:60:97:9a)
wlan0: STA 00:16:ea:60:97:9a MLME: MLME-DELETEKEYS.request(00:16:ea:60:97:9a)
wlan0: STA 00:16:ea:60:97:9a WPA: event 1 notification
wlan0: STA 00:16:ea:60:97:9a WPA: start authentication
WPA: 00:16:ea:60:97:9a WPA_PTK entering state INITIALIZE
wlan0: STA 00:16:ea:60:97:9a IEEE 802.1X: unauthorizing port
WPA: 00:16:ea:60:97:9a WPA_PTK_GROUP entering state IDLE
WPA: 00:16:ea:60:97:9a WPA_PTK entering state AUTHENTICATION
WPA: 00:16:ea:60:97:9a WPA_PTK entering state AUTHENTICATION2
WPA: 00:16:ea:60:97:9a WPA_PTK entering state INITPSK
WPA: 00:16:ea:60:97:9a WPA_PTK entering state PTKSTART
wlan0: STA 00:16:ea:60:97:9a WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
IEEE 802.1X: 00:16:ea:60:97:9a TX status - version=2 type=3 length=95 - ack=1
IEEE 802.1X: 123 bytes from 00:16:ea:60:97:9a
IEEE 802.1X: version=1 type=3 length=119
wlan0: STA 00:16:ea:60:97:9a WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:16:ea:60:97:9a WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:1f:f3:c0:f2:80 A2=00:16:ea:60:97:9a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:16:ea:60:97:9a WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:16:ea:60:97:9a WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 00:16:ea:60:97:9a WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
IEEE 802.1X: 00:16:ea:60:97:9a TX status - version=2 type=3 length=151 - ack=1
IEEE 802.1X: 99 bytes from 00:16:ea:60:97:9a
IEEE 802.1X: version=1 type=3 length=95
wlan0: STA 00:16:ea:60:97:9a WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:16:ea:60:97:9a WPA_PTK entering state PTKINITDONE
wlan0: STA 00:16:ea:60:97:9a IEEE 802.1X: authorizing port
wlan0: STA 00:16:ea:60:97:9a RADIUS: starting accounting session 49A28E7C-00000000
wlan0: STA 00:16:ea:60:97:9a WPA: pairwise key handshake completed (RSN)
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for our SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT
mgmt::action
wlan0: STA 00:16:ea:60:97:9a IEEE 802.11: handle_action - unknown action category 3 or invalid frame
IEEE 802.11: Return unknown Action frame back to sender
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for our SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::proberesp cb
STA 00:16:ea:60:97:9a sent probe request for broadcast SSID
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
MGMT (TX callback) ACK
mgmt::action cb
--
Best regards,
Yura mailto:***@ukr.net
Loading...