Understanding HOSTAPD's log output...

Hi everyone,

I have been investigating the Hostapd application for some time now, and I have sorta got things working???

However, I am seeing log messages that I don’t understand.
Can anyone shed any light on it for me? If I run tail -f /var/log/messages, some times I will see this this sort of repeating pattern. I don’t know if I have cut at the start of the sequence or not. Incidentally, this is a normaly well-behaved client/host.

[FONT=System]Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.11: authentication OK (open system)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e MLME: MLME-AUTHENTICATE.indication(00:0c:f1:11:57:4e, OPEN_SYSTEM)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e MLME: MLME-DELETEKEYS.request(00:0c:f1:11:57:4e)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.11: authenticated
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.11: association OK (aid 1)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.11: associated (aid 1)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e MLME: MLME-ASSOCIATE.indication(00:0c:f1:11:57:4e)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e MLME: MLME-DELETEKEYS.request(00:0c:f1:11:57:4e)
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: event 1 notification
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: start authentication
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.1X: unauthorizing port
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: sending 1/4 msg of 4-Way Handshake
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: EAPOL-Key timeout
Jan 6 10:01:06 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: sending 1/4 msg of 4-Way Handshake
Jan 6 10:01:07 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: EAPOL-Key timeout
Jan 6 10:01:07 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: sending 1/4 msg of 4-Way Handshake
Jan 6 10:01:08 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: EAPOL-Key timeout
Jan 6 10:01:08 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: sending 1/4 msg of 4-Way Handshake
Jan 6 10:01:09 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e WPA: EAPOL-Key timeout
Jan 6 10:01:09 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.1X: unauthorizing port
Jan 6 10:01:09 supermicro hostapd: wlan0: STA 00:0c:f1:11:57:4e IEEE 802.11: deauthenticated due to local deauth request
[/FONT]

Why is the client repeatedly sending the (1/4) message and then timing out?

Regards, Martin

Just to keep this thread alive?

Using “another coat” of looking at …
Running Wireshark to watch wlan0 - which is the interface managed by HOSTAPD and one of the interfaces into/out of br0 (also specified in the hostapd.conf file) - I see (Gratuitous) ARP traffic from the remote host mac.

Does this tell me that there is an “association” between the remote host and the AP?

If this is so, should I not see a report in response to ALL_STA in HOSTAPD_CLI?

Regards, Martin