* Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
@ 2026-04-16 8:47 Benson Bear
2026-04-16 9:39 ` Pablo MARTIN-GOMEZ
0 siblings, 1 reply; 13+ messages in thread
From: Benson Bear @ 2026-04-16 8:47 UTC (permalink / raw)
To: linux-wireless
Hi folks, I've never posted here before, don't know much about wireless, but
am having a big problem I have been trying to solve for a week. I've been
googling and ai chatting non-stop but finally after reading the info
page about the
list figured it would probably be acceptable to send this message.
BRIEFEST SUMMARY: There was a firmware update in Rogers's (Canada) XB7 Gateway,
and subsequently my Wi-Fi transfer speeds degraded badly on all three
Linux notebooks I have. Fully up to date notebooks, running Fedora 43 and
42 with most recent kernel 6.19.11. Two different NICs: RTL8852BE and Intel
7265 (rev 59). Wired machines and phones are unaffected.
The machines all connect with high transfer rates of around
800-1000Mbs on the 5G band,
with an 80Mhz wide channnel, and MCS level ranging from 7 to 11 (HE and VHT).
Transfer speeds using WPA2 security have dropped in the one case (RTL)
from 600Mbps to
about 30Mbps. (Using internet speed test but iperf3 gives similar). The other
cases are similar.
BUT the transfer using no network security is still what it used to
be! It is simply
the enabling of WPA2 that brings them to their knees.
So it seems to be a problem related to WPA2, and at a lower level in the
stack of modules, since it happens on two different NICs?
I suspected for a long time that it was a firmware bug in the gateway, but
now I am starting to wonder. I have no solid evidence of that except that
Windows works fine on the same gateway and the same machine.
All three machines work well on another network I have occasional access
to, and have worked fine on this network until about a week ago.
I have ordered another router that I hope I can use to solve the
immediate practical problem, but I would really like to figure out
what is going on and contribute what I can to fixing it, even if only
by being sent out to gather potentially useful data.
Thank you.
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 8:47 Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade Benson Bear
@ 2026-04-16 9:39 ` Pablo MARTIN-GOMEZ
2026-04-16 11:03 ` Benson Bear
0 siblings, 1 reply; 13+ messages in thread
From: Pablo MARTIN-GOMEZ @ 2026-04-16 9:39 UTC (permalink / raw)
To: Benson Bear, linux-wireless
Hello,
On 16/04/2026 10:47, Benson Bear wrote:
> Hi folks, I've never posted here before, don't know much about wireless, but
> am having a big problem I have been trying to solve for a week. I've been
> googling and ai chatting non-stop but finally after reading the info
> page about the
> list figured it would probably be acceptable to send this message.
>
> BRIEFEST SUMMARY: There was a firmware update in Rogers's (Canada) XB7 Gateway,
> and subsequently my Wi-Fi transfer speeds degraded badly on all three
> Linux notebooks I have. Fully up to date notebooks, running Fedora 43 and
> 42 with most recent kernel 6.19.11. Two different NICs: RTL8852BE and Intel
> 7265 (rev 59). Wired machines and phones are unaffected.
>
> The machines all connect with high transfer rates of around
> 800-1000Mbs on the 5G band,
> with an 80Mhz wide channnel, and MCS level ranging from 7 to 11 (HE and VHT).
>
> Transfer speeds using WPA2 security have dropped in the one case (RTL)
> from 600Mbps to
> about 30Mbps. (Using internet speed test but iperf3 gives similar). The other
> cases are similar.
When traffic is capped around 30-50Mbps, the usual suspect is
aggregation not being setup.
>
> BUT the transfer using no network security is still what it used to
> be! It is simply
> the enabling of WPA2 that brings them to their knees.
If I had to guess, this is an issue with PMF. Either the STA or the AP
considers PMF is activated and the other one not; so the action frames
that set up a BA session are dropped.
Check
`/sys/kernel/debug/ieee80211/phy<n>/netdev\:<devname>/stations/<bssid>/flags`
on your notebooks if there is `MFP` in the flags
>
> So it seems to be a problem related to WPA2, and at a lower level in the
> stack of modules, since it happens on two different NICs?
You can try a few things:
- build a master wpa_supplicant from source and replace the Fedora's
binaries
- use a raw wpa_supplicant connection and set ieee80211w=0 in the config
file
- switch the backend of NetworkManager to iwd
- update the security to WPA3
>
> I suspected for a long time that it was a firmware bug in the gateway, but
> now I am starting to wonder. I have no solid evidence of that except that
> Windows works fine on the same gateway and the same machine.
>
> All three machines work well on another network I have occasional access
> to, and have worked fine on this network until about a week ago.
>
> I have ordered another router that I hope I can use to solve the
> immediate practical problem, but I would really like to figure out
> what is going on and contribute what I can to fixing it, even if only
> by being sent out to gather potentially useful data.
>
> Thank you.
>
Pablo MG
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 9:39 ` Pablo MARTIN-GOMEZ
@ 2026-04-16 11:03 ` Benson Bear
2026-04-16 11:09 ` Johannes Berg
2026-04-16 11:47 ` Pablo MARTIN-GOMEZ
0 siblings, 2 replies; 13+ messages in thread
From: Benson Bear @ 2026-04-16 11:03 UTC (permalink / raw)
To: Pablo MARTIN-GOMEZ; +Cc: linux-wireless
Hi Pablo, thanks for your really prompt reply. And sorry
for the spelling error in the Subject header ("Mps" for "Mbps")
and the horrid line formatting. (Not used to using short lines
although that is what I grew up on).
And... you got it! The MFP flag is lacking, and googling
showed me that instead of messing with wpa_supplicant, I
can apparently do the same with nmcli:
nmcli connection modify NAME 802-11-wireless-security.pmf disable
I tried that and it worked! Internet speed test back to 600Mbps!
What a relief! Thank you very much!
I will try other testing with just pure Wi-Fi and with all machines
after I get some sleep.
Can you tell me why this is likely to have happened? Surely
one side or the other is misconfigured? This misunderstanding
between them should not be possible within a good specification,
right?
(Sadly I think I might have an idea -- it's partly my fault. The
mac80211 module was disabling all HT and above because it
felt it could not meet the BCS criteria laid down by the AP.
Many people have thought these criteria were way too onerous.
So I first had very low speeds because of that. No HT even.
I applied a patch to the module that ignored these requirements
and got back to a high connection speed, and HE or VHT
enabled, and got back a little of the lost speed. Clearly very
kludgy but seems a legitimate response to what the patch
author called "aggressive basic MCS rates". But it may
have opened up the room for misunderstandings. I have my
speed back in practice, but I wonder what the "correct" way
of fixing this would be -- without the kludgy module patch).
Thanks again!
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 11:03 ` Benson Bear
@ 2026-04-16 11:09 ` Johannes Berg
2026-04-16 11:28 ` Benson Bear
2026-04-16 11:47 ` Pablo MARTIN-GOMEZ
1 sibling, 1 reply; 13+ messages in thread
From: Johannes Berg @ 2026-04-16 11:09 UTC (permalink / raw)
To: Benson Bear, Pablo MARTIN-GOMEZ; +Cc: linux-wireless
On Thu, 2026-04-16 at 07:03 -0400, Benson Bear wrote:
>
> (Sadly I think I might have an idea -- it's partly my fault. The
> mac80211 module was disabling all HT and above because it
> felt it could not meet the BCS criteria laid down by the AP.
> Many people have thought these criteria were way too onerous.
> So I first had very low speeds because of that. No HT even.
> I applied a patch to the module that ignored these requirements
> and got back to a high connection speed, and HE or VHT
> enabled, and got back a little of the lost speed. Clearly very
> kludgy but seems a legitimate response to what the patch
> author called "aggressive basic MCS rates". But it may
> have opened up the room for misunderstandings. I have my
> speed back in practice, but I wonder what the "correct" way
> of fixing this would be -- without the kludgy module patch).
I think what you're referring to here might be this?
https://lore.kernel.org/linux-wireless/99Mv9QEceyPrQhSP52MtAVmz0_kWJmzqotJjD9YW6LGLqk-AZloAueUyHCURilFkuqOh6Ecv8i2KKdSE1ujP3AnbU5QEouVisT1w_V3xdfc=@r26.me/
johannes
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 11:09 ` Johannes Berg
@ 2026-04-16 11:28 ` Benson Bear
0 siblings, 0 replies; 13+ messages in thread
From: Benson Bear @ 2026-04-16 11:28 UTC (permalink / raw)
To: Johannes Berg; +Cc: Pablo MARTIN-GOMEZ, linux-wireless
On Thu, Apr 16, 2026 at 7:09 AM Johannes Berg <johannes@sipsolutions.net> wrote:
> I think what you're referring to here might be this?
> https://lore.kernel.org/linux-wireless/99Mv9QEceyPrQhSP52MtAVmz0_kWJmzqotJjD9YW6LGLqk-AZloAueUyHCURilFkuqOh6Ecv8i2KKdSE1ujP3AnbU5QEouVisT1w_V3xdfc=@r26.me/
Absolutely yes that is the issue, but the patch I found was different.
As far as I can tell that patch did not determine any specific
conditions under which the check could be bypassed, and this
one does. And, I assume, it does so correctly?
So the "correct" way forward that I was asking about has already
been found? Excellent.
I will apply this patch myself and determine that it does the
job for me just as the other one did.
Here by the way is the one I used, from out in the wild:
https://github.com/WoodyWoodster/mac80211-mcs-patch
So I had two issues with the Rogers XB7 firmware. They
seem now to be unrelated? I think plausibly mac80211
could be said to have a bug in it, on the BCS issue, but
what about the issue I originally asked about?
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 11:03 ` Benson Bear
2026-04-16 11:09 ` Johannes Berg
@ 2026-04-16 11:47 ` Pablo MARTIN-GOMEZ
2026-04-16 12:34 ` Benson Bear
1 sibling, 1 reply; 13+ messages in thread
From: Pablo MARTIN-GOMEZ @ 2026-04-16 11:47 UTC (permalink / raw)
To: Benson Bear; +Cc: linux-wireless
On 16/04/2026 13:03, Benson Bear wrote:
> Hi Pablo, thanks for your really prompt reply. And sorry
> for the spelling error in the Subject header ("Mps" for "Mbps")
> and the horrid line formatting. (Not used to using short lines
> although that is what I grew up on).
>
> And... you got it! The MFP flag is lacking, and googling
> showed me that instead of messing with wpa_supplicant, I
> can apparently do the same with nmcli:
>
> nmcli connection modify NAME 802-11-wireless-security.pmf disable
Oh yeah, I didn't check nmcli documentation thoroughly enough to find
that option. Quite easier to implement than going the raw wpa_supplicant
way.
>
> I tried that and it worked! Internet speed test back to 600Mbps!
> What a relief! Thank you very much!
>
> I will try other testing with just pure Wi-Fi and with all machines
> after I get some sleep.
>
> Can you tell me why this is likely to have happened? Surely
> one side or the other is misconfigured? This misunderstanding
> between them should not be possible within a good specification,
> right?
Given that your client does not have the MFP flag and you can connect
without PMF, that means that your AP advertise MFP Capable (and so is
your client when it is not disabled), and following the association +
4-way handshake, the AP believes it has correctly negotiated MFP but not
your client, so the AP is sending the client encrypted action framed
that are dropped by the client and the client is sending non-encrypted
action frames that are refused by the AP. The easiest way to debug this
would be to capture over the air the auth + assoc + 4-way handshake +
action frame and provide the SSID + the PSK to be able to decrypt
everything and understand who is in the wrong. If it's an issue on the
client side, it is most probably an issue in wpa_supplicant and not in
the kernel.
>
> (Sadly I think I might have an idea -- it's partly my fault. The
> mac80211 module was disabling all HT and above because it
> felt it could not meet the BCS criteria laid down by the AP.
> Many people have thought these criteria were way too onerous.
> So I first had very low speeds because of that. No HT even.
> I applied a patch to the module that ignored these requirements
> and got back to a high connection speed, and HE or VHT
> enabled, and got back a little of the lost speed. Clearly very
> kludgy but seems a legitimate response to what the patch
> author called "aggressive basic MCS rates". But it may
> have opened up the room for misunderstandings. I have my
> speed back in practice, but I wonder what the "correct" way
> of fixing this would be -- without the kludgy module patch).
>
> Thanks again!
>
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 11:47 ` Pablo MARTIN-GOMEZ
@ 2026-04-16 12:34 ` Benson Bear
2026-04-16 13:58 ` Johannes Berg
2026-04-16 14:03 ` Pablo MARTIN-GOMEZ
0 siblings, 2 replies; 13+ messages in thread
From: Benson Bear @ 2026-04-16 12:34 UTC (permalink / raw)
To: Pablo MARTIN-GOMEZ; +Cc: linux-wireless
On Thu, Apr 16, 2026 at 7:47 AM Pablo MARTIN-GOMEZ <pablomg@eskapa.be> wrote:
> Given that your client does not have the MFP flag and you can connect
> without PMF, that means that your AP advertise MFP Capable (and so is
> your client when it is not disabled), and following the association +
> 4-way handshake, the AP believes it has correctly negotiated MFP but not
> your client, so the AP is sending the client encrypted action framed
> that are dropped by the client and the client is sending non-encrypted
> action frames that are refused by the AP. The easiest way to debug this
> would be to capture over the air the auth + assoc + 4-way handshake +
> action frame and provide the SSID + the PSK to be able to decrypt
> everything and understand who is in the wrong. If it's an issue on the
> client side, it is most probably an issue in wpa_supplicant and not in
> the kernel.
Thanks again. Sadly it looks like linux (the wpa_supplicant) is
in the wrong here, just reasoning about it. I assume the AP
always offers the option. It doesn't get a rejection before it
even makes an offer. So that means when it offered it when
PMF was not disabled in the client, the client must have
accepted the offer. Because we know in the other case,
when PMF *is* disabled, that it works fine, which must mean
the AP received correctly a rejection of the offer. So had
the client sent a rejection in the first case, like it did in the
second, there is no reason the AP would not have accepted
that rejection. So the client must have sent an acceptance.
Not iron clad, because maybe the AP is just plain crazy.
But it seems that this craziness would be hard to accomplish,
since there is nothing to distinguish the two cases from its
point of view if the client correctly rejects in both of them.
Unless you can say that, contrary to my initial assumption,
the client makes the rejection even before the offer is made.
I was hoping I could go back to Rogers and tell them their
AP is buggy on this point, but it looks like perhaps not.
Unless you see some other flaw in the reasoning. If you
don't, I will take the issue over to the wpa_supplicant people,
if you think that is a good idea.
It does seem weird, though, that the client here would
send an acceptance and then not carry through with it!
(Since my own problem is solved I might lose interest, and
not be able to carry out the over the air examination,
something like this I have never done... but still we should
get it resolved somehow)
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 12:34 ` Benson Bear
@ 2026-04-16 13:58 ` Johannes Berg
2026-04-16 14:03 ` Pablo MARTIN-GOMEZ
1 sibling, 0 replies; 13+ messages in thread
From: Johannes Berg @ 2026-04-16 13:58 UTC (permalink / raw)
To: Benson Bear, Pablo MARTIN-GOMEZ; +Cc: linux-wireless
On Thu, 2026-04-16 at 08:34 -0400, Benson Bear wrote:
>
> Thanks again. Sadly it looks like linux (the wpa_supplicant) is
> in the wrong here, just reasoning about it. I assume the AP
> always offers the option. It doesn't get a rejection before it
> even makes an offer. So that means when it offered it when
> PMF was not disabled in the client, the client must have
> accepted the offer. Because we know in the other case,
> when PMF *is* disabled, that it works fine, which must mean
> the AP received correctly a rejection of the offer. So had
> the client sent a rejection in the first case, like it did in the
> second, there is no reason the AP would not have accepted
> that rejection. So the client must have sent an acceptance.
Doesn't mean they both negotiated the use correctly, or even encrypted
the frames correctly. Could even be that they both agreed on PMF, but
then the AP sent unencrypted AddBA request (or response, depending on
the direction) and the client dropped it, or any other weird things.
> Not iron clad, because maybe the AP is just plain crazy.
My bet would be on that but we'd have to see a sniffer capture. But in
general, we definitely know that PMF works with Linux/wpa_s and WiFi7
requires it, etc.
johannes
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 12:34 ` Benson Bear
2026-04-16 13:58 ` Johannes Berg
@ 2026-04-16 14:03 ` Pablo MARTIN-GOMEZ
2026-04-17 13:24 ` Benson Bear
1 sibling, 1 reply; 13+ messages in thread
From: Pablo MARTIN-GOMEZ @ 2026-04-16 14:03 UTC (permalink / raw)
To: Benson Bear; +Cc: linux-wireless
On 16/04/2026 14:34, Benson Bear wrote:
> On Thu, Apr 16, 2026 at 7:47 AM Pablo MARTIN-GOMEZ
> <pablomg@eskapa.be> wrote:
>
>
[...]
>
> Thanks again. Sadly it looks like linux (the wpa_supplicant) is in
> the wrong here, just reasoning about it. I assume the AP always
> offers the option. It doesn't get a rejection before it even makes
> an offer. So that means when it offered it when PMF was not
> disabled in the client, the client must have accepted the offer.
> Because we know in the other case, when PMF *is* disabled, that it
> works fine, which must mean the AP received correctly a rejection of
> the offer. So had the client sent a rejection in the first case,
> like it did in the second, there is no reason the AP would not have
> accepted that rejection. So the client must have sent an
> acceptance.
You have dig slightly into 802.11 standard to understand the PMF
negotiation. Here is a quick summary:
1. the AP advertise MFP Capable/MFP Required support in its Beacon and
Probe Response frames (RSN element)
2. the STA advertise MFP Capable/MFP Required support to the AP in its
Association request (RSN element)
3. the AP will accept the assoc (regarding PMF) unless the STA or the AP
advertise MFP Required and the other one does not advertise MFP Capable;
if both are MFPC, the PMF is "pre negotiated"
4. in the M2 of the 4-way handshake, the STA resend its RSN element (it
must match the one in the assoc frame)
5. in the M3 of the 4-way handshake, the AP sends the IGTK used to
encrypt the (robust) management frames
6. in the M4 of the 4-way handshake, the STA acks the keys as a whole
The AP has the final say in the negotiation of PMF. If there is a IGTK
in the M3, PMF has been negotiated, if not it is not (the STA must send
the M4 even if it was expecting a IGTK and didn't received it). In the
M4, the STA cannot say "hey, the IGTK is missing?!" or "I cannot used
the IGTK you sent me [as long as the MIC is validated]" or "your M4 has
weird content I cannot parse beside the PTK". The bug you are
encountering is most probably either the AP thinking it has put the IGTK
inside M3 but, in fact, has not or the STA not being able to
extract/parse the IGTK [while the PTK and MIC are both valid].
>
> Not iron clad, because maybe the AP is just plain crazy.
>
> But it seems that this craziness would be hard to accomplish, since
> there is nothing to distinguish the two cases from its point of view
> if the client correctly rejects in both of them.
>
> Unless you can say that, contrary to my initial assumption, the
> client makes the rejection even before the offer is made.
>
> I was hoping I could go back to Rogers and tell them their AP is
> buggy on this point, but it looks like perhaps not.
>
> Unless you see some other flaw in the reasoning. If you don't, I
> will take the issue over to the wpa_supplicant people, if you think
> that is a good idea.
>
> It does seem weird, though, that the client here would send an
> acceptance and then not carry through with it!
>
> (Since my own problem is solved I might lose interest, and not be
> able to carry out the over the air examination, something like this
> I have never done... but still we should get it resolved somehow)
>
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-16 14:03 ` Pablo MARTIN-GOMEZ
@ 2026-04-17 13:24 ` Benson Bear
2026-04-18 12:04 ` Benson Bear
0 siblings, 1 reply; 13+ messages in thread
From: Benson Bear @ 2026-04-17 13:24 UTC (permalink / raw)
To: linux-wireless
On Thu, Apr 16, 2026 at 10:03 AM Pablo MARTIN-GOMEZ <pablomg@eskapa.be> wrote:
> You have dig slightly into 802.11 standard to understand the PMF
> negotiation. Here is a quick summary:
Thanks very much for that. It shows me how the STA can be put
into a bad place by errant AP behavior. I will try to get the
information that will diagnose this.
But I am having some trouble setting up the monitor mode on one
machine to grab the packets produced by the AP and the
other machine. I can probably figure it out and once I get that I will
save in a file and forward this file after I try to look at it myself also.
I have to work at this in little pieces so it may take a while.
On 2026-04-16 09:58, Johannes Berg wrote:
> > Not iron clad, because maybe the AP is just plain crazy.
>
> My bet would be on that but we'd have to see a sniffer capture. But in
> general, we definitely know that PMF works with Linux/wpa_s and WiFi7
> requires it, et
Yes, (all new to me but) it seems Linux has been doing this
successfully for a while with all manner of APs, and the
Rogers/Comcast XB7 adding PMF capability is rather new, so
prima facie we can suspect the problem is with the AP here.
I will try to get the capture but it will take a while.
(I see you guys are sending to the list and cc'ing me both
(because I am not on the list and probably shouldn't be). But since
you are on the list I took off the cc so you don't get too many copies.
Let me know iff this is not the correct thing to do).
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-17 13:24 ` Benson Bear
@ 2026-04-18 12:04 ` Benson Bear
2026-04-18 13:45 ` Benson Bear
2026-04-20 9:35 ` Pablo MARTIN-GOMEZ
0 siblings, 2 replies; 13+ messages in thread
From: Benson Bear @ 2026-04-18 12:04 UTC (permalink / raw)
To: linux-wireless
[-- Attachment #1: Type: text/plain, Size: 1557 bytes --]
Okay, I have little idea what I am doing, but I believe I have managed
to set one of my machines' NIC to monitor mode (the Intel NIC) and
used it to monitor the attempt of the other machine (RT) to
connect to the AP when the machine is configured to PMF
being optional.
I have never used wireshark before but I messed around and
managed to filter out all the noise and leave only those frames
that are to or from the MAC of the NIC. Then I took just
the initial part (including a small file transfer). Took quite
a while to get this much figured out!
I have not tried to examine it much yet, but I imagine
any of you might be able to immediately figure something
out..
One thing I do notice, is that there are only two EAPOL
frames, the ones from the AP. I assume that this could
be a problem with the monitor capture and not something
else because it seems the frames must be there. I
imagine this can be inferred from the frame contents but
I havent looked into that yet. Have to look up in
more detail the meaning of the fields.
Another thing I noticed. I tried configuring the STA to
require PMF, and guess what? It does not connect
AT ALL. Another clue.
Again, I will try to look into this myself, but I pass this
on now in case any of you can produce with great ease
an analysis or need to request different data.
I will get frame captures for the PMF disabled mode,
and the PMF required mode, and I will try again to
get one with all the EAPOL frames in there. I believe
I saw some before I did the capture to the .pcap
file.
[-- Attachment #2: optional-pmf-filtered.pcap --]
[-- Type: application/vnd.tcpdump.pcap, Size: 15769 bytes --]
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-18 12:04 ` Benson Bear
@ 2026-04-18 13:45 ` Benson Bear
2026-04-20 9:35 ` Pablo MARTIN-GOMEZ
1 sibling, 0 replies; 13+ messages in thread
From: Benson Bear @ 2026-04-18 13:45 UTC (permalink / raw)
To: linux-wireless
Kept working at it but where I am stuck now is that without M2
in the handshake, wireshark cannot decode the M3 to see if
the IGTK is in there. But before I try to somehow
force M2 into the capture, I wonder if it is
better to first look at wpa_supplicant somehow to see if
it noticed anything funny about the IGTK. As Pablo said,
M4 itself is not going to be recording any complaints but perhaps
I can find that wpa_supplicant can at least speak up locally
about it.
On the other hand, as Johannes noted, even if the PMF
was set up okay, it could be any number of things
subsequently that mess it up.
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade.
2026-04-18 12:04 ` Benson Bear
2026-04-18 13:45 ` Benson Bear
@ 2026-04-20 9:35 ` Pablo MARTIN-GOMEZ
1 sibling, 0 replies; 13+ messages in thread
From: Pablo MARTIN-GOMEZ @ 2026-04-20 9:35 UTC (permalink / raw)
To: Benson Bear, linux-wireless
On 18/04/2026 14:04, Benson Bear wrote:
> Okay, I have little idea what I am doing, but I believe I have managed
> to set one of my machines' NIC to monitor mode (the Intel NIC) and
> used it to monitor the attempt of the other machine (RT) to
> connect to the AP when the machine is configured to PMF
> being optional.
>
> I have never used wireshark before but I messed around and
> managed to filter out all the noise and leave only those frames
> that are to or from the MAC of the NIC. Then I took just
> the initial part (including a small file transfer). Took quite
> a while to get this much figured out!
The pcap is missing a lot of important frames [a probe request or a
beacon from the AP would be nice], probably a combination of bad monitor
and over filtering, but we can figure some stuff out.
>
> I have not tried to examine it much yet, but I imagine
> any of you might be able to immediately figure something
> out..
Surprisingly, the STAs are not doing what I though there would be
doing... None of them are encrypting the action frames. Your non-AP STA
sends ADDBA requests to the AP, does not receive any ADDBA response and
eventually (~2sec) sends a DELBA with reason 0x25. The AP sends an ADDBA
request to the STA, it receives a successful ADDBA response (and ACK it)
but somehow does not process it because resends one for the same TID. So
effectively, you don't have a BA session so you have pre-11n performance
(plus both STA "spam" the channel with useless action frames).
>
> One thing I do notice, is that there are only two EAPOL
> frames, the ones from the AP. I assume that this could
> be a problem with the monitor capture and not something
> else because it seems the frames must be there. I
> imagine this can be inferred from the frame contents but
> I havent looked into that yet. Have to look up in
> more detail the meaning of the fields.
>
> Another thing I noticed. I tried configuring the STA to
> require PMF, and guess what? It does not connect
> AT ALL. Another clue.
The AP might in fact not advertised MFPC but a part of its stack might
still process the MFPC setting of the STA and end up on the state you see.
>
> Again, I will try to look into this myself, but I pass this
> on now in case any of you can produce with great ease
> an analysis or need to request different data.
>
> I will get frame captures for the PMF disabled mode,
> and the PMF required mode, and I will try again to
> get one with all the EAPOL frames in there. I believe
> I saw some before I did the capture to the .pcap
> file.
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2026-04-20 9:45 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-16 8:47 Wi-Fi speeds degrade from 600Mps to 30Mps while using WPA2 security, but not on open network, shortly after ISP firmware upgrade Benson Bear
2026-04-16 9:39 ` Pablo MARTIN-GOMEZ
2026-04-16 11:03 ` Benson Bear
2026-04-16 11:09 ` Johannes Berg
2026-04-16 11:28 ` Benson Bear
2026-04-16 11:47 ` Pablo MARTIN-GOMEZ
2026-04-16 12:34 ` Benson Bear
2026-04-16 13:58 ` Johannes Berg
2026-04-16 14:03 ` Pablo MARTIN-GOMEZ
2026-04-17 13:24 ` Benson Bear
2026-04-18 12:04 ` Benson Bear
2026-04-18 13:45 ` Benson Bear
2026-04-20 9:35 ` Pablo MARTIN-GOMEZ
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox