From: Luca Coelho <luca@coelho.fi>
To: Dariusz Gadomski <dariusz.gadomski@canonical.com>,
linux-wireless@vger.kernel.org
Subject: Re: Cisco's Wi-Fi Direct Client Policy and iwlwifi (8260)
Date: Fri, 18 Aug 2017 20:20:02 +0300 [thread overview]
Message-ID: <1503076802.15969.322.camel@coelho.fi> (raw)
In-Reply-To: <1503076588.15969.320.camel@coelho.fi>
On Fri, 2017-08-18 at 20:16 +0300, Luca Coelho wrote:
> Hi Dariusz,
>
> On Fri, 2017-08-18 at 14:48 +0200, Dariusz Gadomski wrote:
> > Hi,
> >
> > There is a “Wi-Fi Direct Client Policy” setting in some Cisco AP hardware [1].
> > I am unaware how that works exactly behind the scenes (except for some hints at
> > [2]), but I have noticed that with that setting set to “Deny” I am observing
> > issues when trying to connect from a machine with an Intel 8260 on a 4.10.0
> > kernel - all connection attempts lead to failure.
> >
> > I have managed to obtain some captured packets from that attempt as well as
> > from a successful attempt (a machine with Broadcom bcm43224). What I have
> > noticed is that AP puts the P2P IE in the beacon frames and when 8260 sends a
> > probe request it also puts a P2P IE element in it. No response from the AP is
> > ever transmitted.
> >
> > In case of the Broadcom-based device the probe request does not contain P2P IE
> > and it is able to correct normally. My understanding of this issue is that the
> > AP makes the decision to temporarily blacklist the client after receiving a P2P
> > IE from it.
> >
> > I have made an additional test by commenting out the P2P interface types from
> > iwlwifi/mvn/mac80211.c - using such kernel allowed the 8260 device to connect
> > successfully.
> >
> > I’m wondering if there’s a way of changing this behavior to enable the 8260 to
> > connect to a network ‘secured’ in this way? I would also appreciate some
> > information about which behavior is correct (bcm43224 vs 8260) and is it
> > specified anywhere in the Wi-Fi P2P specs (or anywhere else ftm)?
>
> I have heard about this before. The issue is that the Cisco AP doesn't
> allow the 8260 to connect because it has the P2P IE in it. But AFAICT
> it is not against any specs to include this IE. The Cisco AP is using
> the IE as an indication that we are trying to connect as a P2P device,
> which in this case we are not.
>
> I'll try to dig the thread I had about this and take it again with our
> system engineers to hear what they have to say about it.
>
> In the meantime, I think it would be helpful if you could contact Cisco
> about this issue as well.
Also, as a workaround if you are really not interested in using P2P is
to start wpa_supplicant with “p2p_disabled=1” in the configuration.
This should prevent the P2P IE from being sent.
--
Cheers,
Luca.
next prev parent reply other threads:[~2017-08-18 17:20 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-08-18 12:48 Cisco's Wi-Fi Direct Client Policy and iwlwifi (8260) Dariusz Gadomski
2017-08-18 17:16 ` Luca Coelho
2017-08-18 17:20 ` Luca Coelho [this message]
2017-09-21 15:53 ` Dariusz Gadomski
2017-09-05 13:23 ` Johannes Berg
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1503076802.15969.322.camel@coelho.fi \
--to=luca@coelho.fi \
--cc=dariusz.gadomski@canonical.com \
--cc=linux-wireless@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).