After updark, when I enable wpa/wpa2 auth in hostapd. Without auth all work excellent. Wi-fi card based on RaLink RT2561/RT61 chip. wlan0 bridged with wired lan. Hostapd.conf: interface=wlan0 bridge=br0 driver=nl80211 logger_syslog=-1 logger_syslog_level=2 logger_stdout=-1 logger_stdout_level=2 dump_file=/tmp/hostapd.dump ctrl_interface=/var/run/hostapd ctrl_interface_group=wheel ssid=Allstail country_code=RU hw_mode=g channel=6 beacon_int=100 dtim_period=2 macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=0 wme_enabled=1 wme_ac_bk_cwmin=4 wme_ac_bk_cwmax=10 wme_ac_bk_aifs=7 wme_ac_bk_txop_limit=0 wme_ac_bk_acm=0 wme_ac_be_aifs=3 wme_ac_be_cwmin=4 wme_ac_be_cwmax=10 wme_ac_be_txop_limit=0 wme_ac_be_acm=0 wme_ac_vi_aifs=2 wme_ac_vi_cwmin=3 wme_ac_vi_cwmax=4 wme_ac_vi_txop_limit=94 wme_ac_vi_acm=0 wme_ac_vo_aifs=2 wme_ac_vo_cwmin=2 wme_ac_vo_cwmax=3 wme_ac_vo_txop_limit=47 wme_ac_vo_acm=0 eap_server=0 own_ip_addr=192.168.5.50 wpa=2 wpa_passphrase=*** wpa_key_mgmt=WPA-PSK rsn_pairwise=CCMP wpa_group_rekey=600 wpa_strict_rekey=1 wpa_gmk_rekey=86400 wpa_ptk_rekey=600 Hostapd log: nl80211: Set beacon (beacon_set=0) wlan0: Setup of interface done. RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x1102 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 nl80211: Add ifindex 10 for bridge br0 nl80211: Add own interface ifindex 10 RTM_NEWLINK: operstate=0 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 nl80211: Add ifindex 10 for bridge br0 nl80211: Add own interface ifindex 10 STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb STA 00:1d:92:ca:ce:42 sent probe request for our SSID STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb mgmt::proberesp cb STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb STA 00:1d:92:ca:ce:42 sent probe request for our SSID STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb mgmt::proberesp cb STA 00:1d:92:ca:ce:42 sent probe request for our SSID STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb mgmt::proberesp cb STA 00:1d:92:ca:ce:42 sent probe request for our SSID STA 00:1d:92:ca:ce:42 sent probe request for our SSID mgmt::proberesp cb mgmt::proberesp cb mgmt::auth authentication: STA=00:1d:92:ca:ce:42 auth_alg=0 auth_transaction=1 status_code=0 wep=0 New STA wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: authentication OK (open system) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-AUTHENTICATE.indication(00:1d:92:ca:ce:42, OPEN_SYSTEM) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-DELETEKEYS.request(00:1d:92:ca:ce:42) authentication reply: STA=00:1d:92:ca:ce:42 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: authenticated mgmt::auth authentication: STA=00:1d:92:ca:ce:42 auth_alg=0 auth_transaction=1 status_code=0 wep=0 wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: authentication OK (open system) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-AUTHENTICATE.indication(00:1d:92:ca:ce:42, OPEN_SYSTEM) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-DELETEKEYS.request(00:1d:92:ca:ce:42) authentication reply: STA=00:1d:92:ca:ce:42 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: authenticated mgmt::assoc_req association request: STA=00:1d:92:ca:ce:42 capab_info=0x411 listen_interval=10 WMM IE - hexdump(len=7): 00 50 f2 02 00 01 00 Validating WMM IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1 QoS info 0x0 new AID 1 nl80211: Set beacon (beacon_set=1) wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: association OK (aid 1) mgmt::assoc_resp cb wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.11: associated (aid 1) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-ASSOCIATE.indication(00:1d:92:ca:ce:42) wlan0: STA 00:1d:92:ca:ce:42 MLME: MLME-DELETEKEYS.request(00:1d:92:ca:ce:42) wpa_driver_nl80211_set_key: ifindex=5 alg=0 addr=0x92c2ca0 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=00:1d:92:ca:ce:42 wlan0: STA 00:1d:92:ca:ce:42 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=5 alg=0 addr=0x92c2ca0 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=00:1d:92:ca:ce:42 wlan0: STA 00:1d:92:ca:ce:42 WPA: start authentication WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=5 alg=0 addr=0x92c2ca0 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=00:1d:92:ca:ce:42 wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.1X: unauthorizing port WPA: 00:1d:92:ca:ce:42 WPA_PTK_GROUP entering state IDLE WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state AUTHENTICATION WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state AUTHENTICATION2 WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state INITPSK WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state PTKSTART wlan0: STA 00:1d:92:ca:ce:42 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) nl80211: Event message available nl80211: Ignored unknown event (cmd=19) IEEE 802.1X: 00:1d:92:ca:ce:42 TX status - version=2 type=3 length=95 - ack=1 IEEE 802.1X: 121 bytes from 00:1d:92:ca:ce:42 IEEE 802.1X: version=1 type=3 length=117 wlan0: STA 00:1d:92:ca:ce:42 WPA: received EAPOL-Key frame (2/4 Pairwise) WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state PTKCALCNEGOTIATING WPA: PTK derivation - A1=90:e6:ba:d0:ab:71 A2=00:1d:92:ca:ce:42 WPA: PMK - hexdump(len=32): d5 b3 f7 62 df 0f 0e 75 90 d4 ef 6d f8 0c 3b bd c3 6a 28 47 2d b5 db 8d 51 74 f0 15 b4 fe f5 8a WPA: PTK - hexdump(len=48): c9 9c 13 81 95 29 20 65 21 37 38 7e ae 13 5d 5e 23 92 a7 7b e8 93 2f dd 17 d2 53 15 e7 94 68 db 5f 8f e8 23 97 47 89 9f 27 09 04 3e 0c 6b 4e 65 WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state PTKINITNEGOTIATING wlan0: STA 00:1d:92:ca:ce:42 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1) Plaintext EAPOL-Key Key Data - hexdump(len=56): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 23 f9 92 de 63 fe 5d bf 8a 5d 9b b7 d9 83 82 64 dd 00 00 00 00 00 00 00 00 00 IEEE 802.1X: 00:1d:92:ca:ce:42 TX status - version=2 type=3 length=151 - ack=1 IEEE 802.1X: 99 bytes from 00:1d:92:ca:ce:42 IEEE 802.1X: version=1 type=3 length=95 wlan0: STA 00:1d:92:ca:ce:42 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: 00:1d:92:ca:ce:42 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=5 alg=3 addr=0x92c2ca0 key_idx=0 set_tx=1 seq_len=0 key_len=16 addr=00:1d:92:ca:ce:42 AP-STA-CONNECTED 00:1d:92:ca:ce:42 wlan0: STA 00:1d:92:ca:ce:42 IEEE 802.1X: authorizing port wlan0: STA 00:1d:92:ca:ce:42 RADIUS: starting accounting session 4D317805-00000000 wlan0: STA 00:1d:92:ca:ce:42 WPA: pairwise key handshake completed (RSN) STA 00:09:4f:76:ff:39 sent probe request for broadcast SSID mgmt::proberesp cb STA 00:09:4f:76:ff:39 sent probe request for broadcast SSID mgmt::proberesp cb Checking STA 00:1d:92:ca:ce:42 inactivity: Station has been active STA 00:09:4f:76:ff:39 sent probe request for broadcast SSID mgmt::proberesp cb STA 00:09:4f:76:ff:39 sent probe request for broadcast SSID mgmt::proberesp cb STA 00:09:4f:76:ff:39 sent probe request for broadcast SSID mgmt::proberesp cb Client log: Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): supplicant connection state: scanning -> associating Jan 15 15:35:18 fr1z2r kernel: [ 5817.653886] Linking with Allstail: channel is 6 Jan 15 15:35:18 fr1z2r kernel: [ 5817.694791] Linking with Allstail: channel is 6 Jan 15 15:35:18 fr1z2r kernel: [ 5817.716220] Associated successfully Jan 15 15:35:18 fr1z2r kernel: [ 5817.716230] Using G rates Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): supplicant connection state: associating -> associated Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): supplicant connection state: associated -> 4-way handshake Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): supplicant connection state: 4-way handshake -> group handshake Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): supplicant connection state: group handshake -> completed Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0/wireless) Stage 2 of 5 (Device Configure) successful. Connected to wireless network 'Allstail'. Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 3 of 5 (IP Configure Start) scheduled. Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 3 of 5 (IP Configure Start) started... Jan 15 15:35:18 fr1z2r NetworkManager: <info> (wlan0): device state change: 5 -> 7 (reason 0) Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Beginning DHCP transaction (timeout in 45 seconds) Jan 15 15:35:18 fr1z2r NetworkManager: <info> dhcpcd started with pid 4794 Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 4 of 5 (IP6 Configure Get) scheduled... Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 3 of 5 (IP Configure Start) complete. Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 4 of 5 (IP6 Configure Get) started... Jan 15 15:35:18 fr1z2r NetworkManager: <info> Activation (wlan0) Stage 4 of 5 (IP6 Configure Get) complete. Jan 15 15:35:18 fr1z2r dhcpcd[4794]: version 5.2.8 starting Jan 15 15:35:18 fr1z2r dhcpcd[4794]: wlan0: rebinding lease of 192.168.5.61 Jan 15 15:35:28 fr1z2r dhcpcd[4794]: wlan0: broadcasting for a lease Jan 15 15:35:48 fr1z2r dhcpcd[4794]: timed out Without auth DHCP also works. Reproducible: Always Steps to Reproduce: 1. Upgrade kernel to 2.6.36-r5 2. Turn on wpa2 in hostapd 3. Try to connect from other host via wi-fi emerge --info: Portage 2.1.9.25 (default/linux/x86/10.0/server, gcc-4.4.4, glibc-2.11.2-r3, 2.6.37-gentoo i686) ================================================================= System uname: Linux-2.6.37-gentoo-i686-Intel-R-_Celeron-R-_CPU_2.40GHz-with-gentoo-1.12.14 Timestamp of tree: Fri, 14 Jan 2011 18:15:02 +0000 app-shells/bash: 4.1_p7 dev-lang/python: 2.6.6-r1, 3.1.2-r4 dev-util/cmake: 2.8.1-r2 sys-apps/baselayout: 1.12.14-r1 sys-apps/sandbox: 2.4 sys-devel/autoconf: 2.65-r1 sys-devel/automake: 1.11.1 sys-devel/binutils: 2.20.1-r1 sys-devel/gcc: 4.4.4-r2 sys-devel/gcc-config: 1.4.1 sys-devel/libtool: 2.2.10 sys-devel/make: 3.81-r2 virtual/os-headers: 2.6.30-r1 (sys-kernel/linux-headers) ACCEPT_KEYWORDS="x86" ACCEPT_LICENSE="* -@EULA" CBUILD="i686-pc-linux-gnu" CFLAGS="-O2 -march=pentium4 -pipe" CHOST="i686-pc-linux-gnu" CONFIG_PROTECT="/etc /var/bind" CONFIG_PROTECT_MASK="/etc/ca-certificates.conf /etc/env.d /etc/fonts/fonts.conf /etc/gconf /etc/php/apache2-php5.3/ext-active/ /etc/php/cgi-php5.3/ext-active/ /etc/php/cli-php5.3/ext-active/ /etc/revdep-rebuild /etc/sandbox.d /etc/terminfo" CXXFLAGS="-O2 -march=pentium4 -pipe" DISTDIR="/usr/portage/distfiles" FEATURES="assume-digests binpkg-logs distlocks fixlafiles fixpackages news parallel-fetch protect-owned sandbox sfperms strict unknown-features-warn unmerge-logs unmerge-orphans userfetch" GENTOO_MIRRORS="http://mirror2.corbina.ru/gentoo-distfiles/ ftp://mirror2.corbina.ru/gentoo-distfiles/ http://mirror.yandex.ru/gentoo-distfiles/ ftp://mirror.yandex.ru/gentoo-distfiles/" LANG="ru_RU.UTF-8" LC_ALL="" LDFLAGS="-Wl,-O1 -Wl,--as-needed" MAKEOPTS="-j2" PKGDIR="/usr/portage/packages" PORTAGE_CONFIGROOT="/" PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --stats --timeout=180 --exclude=/distfiles --exclude=/local --exclude=/packages" PORTAGE_TMPDIR="/var/tmp" PORTDIR="/usr/portage" SYNC="rsync://rsync.ru.gentoo.org/gentoo-portage" USE="acl apache2 berkdb bzip2 clamav cli cracklib crypt cups cxx dri fortran gd gdbm gpm iconv modules mudflap mysql mysqli ncurses nls nptl nptlonly openmp pam pcre pppd readline session snmp ssl suhosin sysfs tcpd truetype unicode usb utf-8 utf8 x86 xml xorg zlib" ALSA_CARDS="ali5451 als4000 atiixp atiixp-modem bt87x ca0106 cmipci emu10k1 emu10k1x ens1370 ens1371 es1938 es1968 fm801 hda-intel intel8x0 intel8x0m maestro3 trident usb-audio via82xx via82xx-modem ymfpci" ALSA_PCM_PLUGINS="adpcm alaw asym copy dmix dshare dsnoop empty extplug file hooks iec958 ioplug ladspa lfloat linear meter mmap_emul mulaw multi null plug rate route share shm softvol" APACHE2_MODULES="actions alias auth_basic authn_alias authn_anon authn_dbm authn_default authn_file authz_dbm authz_default authz_groupfile authz_host authz_owner authz_user autoindex cache cgi cgid dav dav_fs dav_lock deflate dir disk_cache env expires ext_filter file_cache filter headers include info log_config logio mem_cache mime mime_magic negotiation rewrite setenvif speling status unique_id userdir usertrack vhost_alias" COLLECTD_PLUGINS="df interface irq load memory rrdtool swap syslog" ELIBC="glibc" GPSD_PROTOCOLS="ashtech aivdm earthmate evermore fv18 garmin garmintxt gpsclock itrax mtk3301 nmea ntrip navcom oceanserver oldstyle oncore rtcm104v2 rtcm104v3 sirf superstar2 timing tsip tripmate tnt ubx" INPUT_DEVICES="keyboard mouse evdev" KERNEL="linux" LCD_DEVICES="bayrad cfontz cfontz633 glk hd44780 lb216 lcdm001 mtxorb ncurses text" PHP_TARGETS="php5-3" RUBY_TARGETS="ruby18" USERLAND="GNU" VIDEO_CARDS="fbdev glint intel mach64 mga neomagic nouveau nv r128 radeon savage sis tdfx trident vesa via vmware dummy v4l" XTABLES_ADDONS="quota2 psd pknock lscan length2 ipv4options ipset ipp2p iface geoip fuzzy condition tee tarpit sysrq steal rawnat logmark ipmark dhcpmac delude chaos account" Unset: CPPFLAGS, CTARGET, EMERGE_DEFAULT_OPTS, FFLAGS, INSTALL_MASK, LINGUAS, PORTAGE_BUNZIP2_COMMAND, PORTAGE_COMPRESS, PORTAGE_COMPRESS_FLAGS, PORTAGE_RSYNC_EXTRA_OPTS, PORTDIR_OVERLAY
I'm currently running with 2.6.37 with the p54 driver and hostapd 0.7.3, and it works fine. May I suggest you take it upstream, since they are better able to help you with the inner workings of hostapd than I am? You can find their bugzilla website here: http://w1.fi/bugz/ I could take it upsteam, but I'm 99,9% sure they will ask for more info, so instead of having to wait for me to proxy messages back and forth, it would be faster for you to create a bug report there instead :-)
It's fixed in 2.6.38 kernel.