FreeBSD 14.3 should have significantly improved support of WiFi adapters.
Let's test it in Dell Precision 5530 with Intel Wi-Fi 5 (802.11ac) Wireless-AC 9x6x [Thunder Peak].
We can identify Wi-Fi Adapter by following command ...
root@dell5530:~ # pciconf -lv | grep -B 3 -A 1 network
iwm0@pci0:59:0:0: class=0x028000 rev=0x29 hdr=0x00 vendor=0x8086 device=0x2526 subvendor=0x8086 subdevice=0x4010
vendor = 'Intel Corporation'
device = 'Wi-Fi 5(802.11ac) Wireless-AC 9x6x [Thunder Peak]'
class = network
rtsx0@pci0:60:0:0: class=0xff0000 rev=0x01 hdr=0x00 vendor=0x10ec device=0x525a subvendor=0x1028 subdevice=0x087d
root@dell5530:~ #
This Intel Wi-Fi Adapter is managed by driver if_iwlwifi and we can validate that driver is loaded as kernel module by following command ...
root@dell5530:~ # kldstat | grep wifi
16 1 0xffffffff8329a000 b1270 if_iwlwifi.ko
root@dell5530:~ #
The iwlwifi driver (being a ported Linux driver) requires specific firmware files to operate. These are typically provided by the linux-firmware-kmod package. We can leverage utility fwget to identify needed firmware packages ...
root@dell5530:~ # fwget -nv
Trying to match device 0x3e9b in class video and vendor intel with pci_video_intel
Trying to match device 0x2526 in class network and vendor intel with pci_network_intel
Trying to match device 0x525a in class misc and vendor realtek with pci_misc_realtek
Needed firmware packages: 'gpu-firmware-intel-kmod-kabylake wifi-firmware-iwlwifi-kmod-9000'
root@dell5530:~ #
Based on suggestion above we need following two packages ...
- gpu-firmware-intel-kmod-kabylake
- wifi-firmware-iwlwifi-kmod-9000
... therefore, following command will install it
Now we can check if we have wireless interface in dmesg ...
root@dell5530:~ # dmesg | grep -i wireless
Intel(R) Wireless WiFi based driver for FreeBSD
iwm0: <Intel(R) Dual Band Wireless AC 9260> mem 0xed400000-0xed403fff at device 0.0 on pci6
We do see iwm0 interface, so we can continue in wireless configuration.
Once the driver and firmware are working, the system needs to configure the network interface (iwm0) by creating wlan interface ...
ifconfig wlan0 create vlandev iwm0
... in case we would like to configure it manually. When we would like to configure it persistently we have to add following two lines to /etc/rc.conf
wlans_iwm0="wlan0" # Equivalent to: ifconfig wlan0 create wlandev iwm0
ifconfig_wlan0="WPA DHCP country CZ"
The only what we have to do is to create config file /etc/wpa_supplicant.conf with following content ...
network={
ssid="YourSSID"
psk="Your PreShared Key in correct format"
}
However, WPA PreShared Key is not the WiFi password you normally use, but it must be generated by the command wpa_passphrase and generated PSK has to be used in /etc/wpa_supplicant.conf
root@kuna:/etc #
wpa_passphrase PASNET YourPassword
network={ ssid="PASNET" psk=cce6e5a21451d52d430935b7ac315278f8c37b40cf453ac98b3f252c0faadde1 } root@kuna:/etc #
If we have wlan0 interface configured in /etc/rc.conf as discussed above, the system will try to connect to Wi-Fi network automatically during the boot.
If you do not want connect to Wi-Fi automatically, you have to add NOAUTO option to ifconfig_wlan0 config line in /etc/rc.conf configuration file
ifconfig_wlan0="WPA DHCP NOAUTO country CZ"
With the NOAUTO option enabled, you must manually bring up the wlan0 interface to connect to the configured Wi-Fi network.
service netif
start
wlan0
and when wlan0 interface is up and associated, you can initiate DHCP Client (dhclient) ask your DHCP Server for network information like IP settings, default route, DNS, etc.
service dhclient
restart
wlan0
To disconnect from Wi-Fi Access Point use following command
service netif
stop
wlan0
Wi-Fi should be working. Let's do some tests.
Network Performance 802.11g
As FreeBSD Wi-Fi Client is connected to my Acces Point, we can check network details of wlan0 interface with following command.
root@
dell5530
:~ #
ifconfig wlan0
wlan0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 options=0 ether 5c:87:9c:fa:47:72 inet 10.0.4.142 netmask 0xfffffc00 broadcast 10.0.7.255 groups: wlan ssid PASNET channel 6 (2437 MHz 11g ht/20) bssid f0:21:e0:9d:e3:c6 regdomain ETSI country CZ authmode WPA2/802.11i privacy ON deftxkey UNDEF AES-CCM 2:128-bit txpower 30 bmiss 10 scanvalid 60 protmode CTS wme roaming MANUAL roaming MANUAL parent interface: iwm0 media: IEEE 802.11 Wireless Ethernet OFDM/54Mbps mode 11g status: associated nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
We can see that the Wi-Fi Client uses 2.4 GHz Frequency band and Wi-Fi Standard 802.11g (11g).
This is not optimal. 5 Ghz Frequency and Wi-Fi 5 (802.11ac) would be better, but let's test network performance of 802.11g
iperf3 (Throughput) upload test
root@dell5530:~ # iperf3 -c iperf3.moji.fr -t60 -i5
Connecting to host iperf3.moji.fr, port 5201
[ 5] local 10.0.4.142 port 37659 connected to 45.147.210.189 port 5201
[ ID] Interval Transfer Bitrate Retr Cwnd
[ 5] 0.00-5.08 sec 12.4 MBytes 20.4 Mbits/sec 0 253 KBytes
[ 5] 5.08-10.02 sec 13.1 MBytes 22.3 Mbits/sec 60 301 KBytes
[ 5] 10.02-15.00 sec 12.9 MBytes 21.7 Mbits/sec 0 327 KBytes
[ 5] 15.00-20.00 sec 13.4 MBytes 22.4 Mbits/sec 13 346 KBytes
[ 5] 20.00-25.00 sec 13.5 MBytes 22.6 Mbits/sec 6 330 KBytes
[ 5] 25.00-30.00 sec 13.5 MBytes 22.6 Mbits/sec 0 348 KBytes
[ 5] 30.00-35.00 sec 13.6 MBytes 22.9 Mbits/sec 29 387 KBytes
[ 5] 35.00-40.00 sec 13.6 MBytes 22.9 Mbits/sec 13 348 KBytes
[ 5] 40.00-45.01 sec 13.1 MBytes 22.0 Mbits/sec 0 368 KBytes
[ 5] 45.01-50.01 sec 13.2 MBytes 22.2 Mbits/sec 20 257 KBytes
[ 5] 50.01-55.01 sec 13.5 MBytes 22.6 Mbits/sec 0 336 KBytes
[ 5] 55.01-60.01 sec 12.9 MBytes 21.6 Mbits/sec 0 400 KBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 5] 0.00-60.01 sec 159 MBytes 22.2 Mbits/sec 141 sender
[ 5] 0.00-60.15 sec 158 MBytes 22.1 Mbits/sec receiver
iperf Done.
root@dell5530:~ #
iperf3 (Throughput) dowload test
root@dell5530:~ # iperf3 -c iperf3.moji.fr -t60 -i5 -R
Connecting to host iperf3.moji.fr, port 5201
Reverse mode, remote host iperf3.moji.fr is sending
[ 5] local 10.0.4.142 port 26718 connected to 45.147.210.189 port 5201
[ ID] Interval Transfer Bitrate
[ 5] 0.00-5.01 sec 13.6 MBytes 22.8 Mbits/sec
[ 5] 5.01-10.01 sec 13.5 MBytes 22.6 Mbits/sec
[ 5] 10.01-15.01 sec 12.9 MBytes 21.6 Mbits/sec
[ 5] 15.01-20.01 sec 13.6 MBytes 22.9 Mbits/sec
[ 5] 20.01-25.01 sec 12.6 MBytes 21.2 Mbits/sec
[ 5] 25.01-30.01 sec 13.5 MBytes 22.6 Mbits/sec
[ 5] 30.01-35.03 sec 13.5 MBytes 22.6 Mbits/sec
[ 5] 35.03-40.02 sec 12.4 MBytes 20.8 Mbits/sec
[ 5] 40.02-45.02 sec 13.0 MBytes 21.8 Mbits/sec
[ 5] 45.02-50.00 sec 12.5 MBytes 21.0 Mbits/sec
[ 5] 50.00-55.00 sec 13.0 MBytes 21.8 Mbits/sec
[ 5] 55.00-60.00 sec 12.8 MBytes 21.4 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 5] 0.00-60.11 sec 160 MBytes 22.3 Mbits/sec 4 sender
[ 5] 0.00-60.00 sec 157 MBytes 21.9 Mbits/sec receiver
iperf Done.
root@dell5530:~ #
802.11g Network Performance Results
In our test above we have seen 22 Mbps network throughput, which is aligned with typical real-world speeds of 802.11g Wi-Fi.
Network Performance 802.11ac
My Access Point support WiFi 5 (802.11ac) over 5 Ghz, so we can switch to it. It is done by explicitly defining MAC address of AP BSSID. How to get MAC address of AP 5 GHz BSSID is out of scope, but when we have it, we define it in /etc/wpa_supplicant.conf
root@dell5530:~ # cat /etc/wpa_supplicant.conf
network={
ssid="PASNET"
#psk="AlicePaskova8"
psk=2d6b358c711d7901e921f538a149253a02f6ead0869653c97110d2e7eba96a52
# MAC address of 5 GHz AP
bssid=f0:21:e0:9d:e3:c5
}
When we are associated to 5 GHz AP BSSID, we have following ifconfig details ...
root@dell5530:~ # ifconfig wlan0
wlan0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=0
ether 5c:87:9c:fa:47:72
inet 10.0.4.142 netmask 0xfffffc00 broadcast 10.0.7.255
groups: wlan
ssid PASNET channel 112 (5560 MHz 11a) bssid f0:21:e0:9d:e3:c5
regdomain ETSI country CZ authmode WPA2/802.11i privacy ON
deftxkey UNDEF AES-CCM 2:128-bit txpower 23 bmiss 10 mcastrate 6
mgmtrate 6 scanvalid 60 wme roaming MANUAL
parent interface: iwm0
media: IEEE 802.11 Wireless Ethernet OFDM/54Mbps mode 11a
status: associated
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
We can see that the Wi-Fi Client uses 5 GHz Frequency band and Wi-Fi Standard 802.11a (11a), which is little bit confusing because I have expected 802.11ac which should be able up to achieve several Gbps in theory and I wanted to see at least 200 Mbps which is my Internet bandwidth. 802.11ac is what my Intel Wireless-AC 9260 card and Amazon Eero 6 support.
Unfortunately, I was able to achieve only 22 Mbps as with 802.11g, therefore, I'm not able to use 802.11ac.
FreeBSD Bugzilla Report
I will fill in FreeBSD Bugzilla Report to report this behavior back to developers.
1. Summary:
iwm(4) Intel Wireless-AC 9260 (Dell 5530) connects to 5GHz but no 802.11ac (VHT) capabilities advertised/used, stuck at 54Mbps (11a mode)
2. Product:
root@dell5530:~ # freebsd-version -kru
14.3-RELEASE
14.3-RELEASE
14.3-RELEASE
3. Component:
wireless
(This covers network drivers and the net80211
stack)
4. Version:
14.3-RELEASE
5. Hardware:
amd64
Intel Wireless-AC 9260
and the laptop model:Dell Latitude 5530
6. Description (The main body of your report):
* **What you are experiencing:**
* "On a Dell Latitude 5530 with an Intel Wireless-AC 9260, the `iwm(4)` driver successfully loads, firmware is loaded, and `wpa_supplicant` connects to my 5GHz 802.11ac access point (SSID: PASNET, BSSID: f0:21:e0:9d:e3:c5) using WPA2/AES.
* However, `ifconfig wlan0` consistently reports the link as `media: IEEE 802.11 Wireless Ethernet OFDM/54Mbps mode 11a`, indicating that 802.11ac (VHT) or even 802.11n (HT) capabilities are not being utilized, despite the AP supporting them and other devices (e.g., MacBook) achieving full 802.11ac speeds (400+ Mbps) on the same AP."
* **Steps to Reproduce:**
1. Clean install FreeBSD 14.3-RELEASE on Dell Latitude 5530.
2. Install `gpu-firmware-kmod` package.
3. Ensure `if_iwm_load="YES"` and `iwm9260fw_load="YES"` (or `iwm_load="YES"` depending on your `loader.conf` setup) are in `/boot/loader.conf`, and `linux_load="YES"`.
4. Configure `/etc/rc.conf` for wireless:
```
wlans_iwm0="wlan0"
ifconfig_wlan0="WPA DHCP"
```
5. Configure `/etc/wpa_supplicant.conf` to connect to a 5GHz 802.11ac AP, specifying the BSSID for the 5GHz band:
```conf
# /etc/wpa_supplicant.conf
network={
ssid="PASNET"
psk="YOUR_PASSWORD"
bssid=f0:21:e0:9d:e3:c5
}
```
6. Reboot the system or restart network services (`service netif restart && service wpa_supplicant restart`).
7. Observe `ifconfig wlan0` output, which shows `mode 11a` and `54Mbps`.
8. Attempt a speed test (e.g., `pkg install iperf3`, then `iperf3 -c <iperf3_server_ip>`) and note the low speed, consistent with 802.11a.
* **Expected Results:**
* `ifconfig wlan0` should report `mode 11ac` with higher speeds (e.g., `VHT`, `80MHz` bandwidth, and several hundred Mbps).
* Achieve speeds consistent with 802.11ac (e.g., 400+ Mbps in iperf3).
* **Actual Results:**
* `ifconfig wlan0` consistently reports `mode 11a` and `OFDM/54Mbps`.
* Speed tests confirm 54Mbps or lower.
7. Diagnostic Information (Crucial Attachments/Pasted Text):
* **`uname -aKU` output:**
root@dell5530:~ # uname -aKU
FreeBSD dell5530 14.3-RELEASE FreeBSD 14.3-RELEASE releng/14.3-n271432-8c9ce319fef7 GENERIC amd64 1403000 1403000
* **`freebsd-version -kru` output:**
```bash
freebsd-version -kru
```
root@dell5530:~ # freebsd-version -kru
14.3-RELEASE
14.3-RELEASE
14.3-RELEASE
* **`pciconf -lv iwm0` output:**
```bash
pciconf -lv iwm0
```
root@dell5530:~ # pciconf -lv iwm0
iwm0@pci0:59:0:0: class=0x028000 rev=0x29 hdr=0x00 vendor=0x8086 device=0x2526 subvendor=0x8086 subdevice=0x4010
vendor = 'Intel Corporation'
device = 'Wi-Fi 5(802.11ac) Wireless-AC 9x6x [Thunder Peak]'
class = network
* **`dmesg` output (filtered):**
* **Paste the exact output you provided:**
```
dmesg | grep -E 'iwm|wlan|firmware|802.11|VHT|HT'
```
root@dell5530:~ # dmesg | grep -E 'iwm|wlan|firmware|802.11|VHT|HT'
Features=0xbfebfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE>
i915/kbl_dmc_ver1_04.bin: could not load binary firmware /boot/firmware/i915/kbl_dmc_ver1_04.bin either
kbl_dmc_ver1_04.bin: could not load binary firmware /boot/firmware/kbl_dmc_ver1_04.bin either
i915_kbl_dmc_ver1_04.bin: could not load binary firmware /boot/firmware/i915_kbl_dmc_ver1_04.bin either
drmn1: successfully loaded firmware image 'i915/kbl_dmc_ver1_04.bin'
drmn1: [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin (v1.4)
iwm0: <Intel(R) Dual Band Wireless AC 9260> mem 0xed400000-0xed403fff at device 0.0 on pci6
iwm0: hw rev 0x320, fw ver 34.3125811985.0, address 5c:87:9c:fa:47:72
wlan0: Ethernet address: 5c:87:9c:fa:47:72
wlan0: link state changed to UP
* **`ifconfig wlan0` output (when connected to 5GHz AP):**
```bash
ifconfig wlan0
```
root@dell5530:~ # ifconfig wlan0
wlan0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=0
ether 5c:87:9c:fa:47:72
inet 10.0.4.142 netmask 0xfffffc00 broadcast 10.0.7.255
groups: wlan
ssid PASNET channel 36 (5180 MHz 11a) bssid f0:21:e0:9d:e3:c5
regdomain ETSI country CZ authmode WPA2/802.11i privacy ON
deftxkey UNDEF AES-CCM 2:128-bit txpower 17 bmiss 10 mcastrate 6
mgmtrate 6 scanvalid 60 wme roaming MANUAL
parent interface: iwm0
media: IEEE 802.11 Wireless Ethernet OFDM/54Mbps mode 11a
status: associated
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
* **`/etc/rc.conf` contents:**
```bash
cat /etc/rc.conf
```
root@dell5530:~ # cat /etc/rc.conf
hostname="dell5530"
ifconfig_ue0="DHCP"
wlans_iwm0="wlan0" # Equivalent to: ifconfig wlan0 create wlandev iwm0
ifconfig_wlan0="WPA DHCP country CZ"
sshd_enable="YES"
ntpd_enable="YES"
ntpd_sync_on_start="YES"
powerd_enable="YES"
# Set dumpdev to "AUTO" to enable crash dumps, "NO" to disable
dumpdev="AUTO"
kld_list="i915kms"
linux_enable="YES"
dbus_enable="YES"
* **`/boot/loader.conf` contents:**
```bash
cat /boot/loader.conf
```
root@dell5530:~ # cat /boot/loader.conf
hw.usb.usbhid.enable="1"
usbhid_load="YES"
uhid_load="NO"
ukbd_load="NO"
ums_load="NO"
* **`wpa_supplicant` debug log:**
* The full log you provided from running `wpa_supplicant -ddd -i wlan0 -c /etc/wpa_supplicant.conf` (or similar).
* **Redact your actual WiFi password (`psk`)** and any other sensitive information. You can use `[REDACTED]` or `[YOUR_WIFI_PASSWORD]` as you did previously.
* **Highlight this key observation from the log:** "The `wpa_supplicant` log confirms successful connection to the 5GHz AP (`freq 5180`) and WPA2/AES negotiation, but contains no indications of HT/VHT mode negotiation."
wpa_supplicant v2.11
Successfully initialized wpa_supplicant
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Priority group 0
id=0 ssid='PASNET'
wpa_driver_bsd_capa: drivercaps=0x0580c201,cryptocaps=0x0000000b
bsd_ctrl_iface: if wlan0 (no change) enable 0 IFF_UP 0
Add interface wlan0 to a new radio N/A
PTKSA: Initializing
wlan0: Failed to attach pkt_type filter
wlan0: Own MAC address: 5c:87:9c:fa:47:72
bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=2
bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=3
bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=4
ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=5
ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
wpa_driver_bsd_set_countermeasures: enabled=0
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlan0: WPS: UUID based on MAC address: 5adfd6fb-4b1a-5cc0-a603-c34b2237cb47
ENGINE: Loading builtin engines
ENGINE: Loading builtin engines
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
MBO: Update non-preferred channels, non_pref_chan=N/A
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> DISCONNECTED
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
wlan0: Add radio work 'scan'@0x30e061c10560
wlan0: First radio work item in the queue - schedule start immediately
wlan0: Starting radio work 'scan'@0x30e061c10560 after 0.000014 second wait
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
bsd_ctrl_iface: if wlan0 (changed) enable 1 IFF_UP 1
RTM_IFINFO: Interface 'wlan0' UP
wlan0: Event INTERFACE_ENABLED (25) received
wlan0: Interface was enabled
EAPOL: disable timer tick
wlan0: Event SCAN_RESULTS (3) received
Received 4984 bytes of scan results (18 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID f0:21:e0:9d:e3:c5 SSID 'PASNET' freq 5180
wlan0: BSS: Add new id 1 BSSID f0:21:e0:9d:e3:c6 SSID 'PASNET' freq 2437
wlan0: BSS: Add new id 2 BSSID f0:21:e0:9d:e3:c4 SSID '46b272' freq 2437
wlan0: BSS: Add new id 3 BSSID f0:21:e0:e5:f3:84 SSID 'PASNET' freq 2437
wlan0: BSS: Add new id 4 BSSID f0:21:e0:e5:f3:82 SSID '46b272' freq 2437
wlan0: BSS: Add new id 5 BSSID 84:16:f9:b7:02:4a SSID 'PASNET.IoT' freq 2462
wlan0: BSS: Add new id 6 BSSID f0:21:e0:e5:f3:81 SSID '46b272' freq 5180
wlan0: BSS: Add new id 7 BSSID f0:21:e0:e5:f3:83 SSID 'PASNET' freq 5180
wlan0: BSS: Add new id 8 BSSID f0:21:e0:e6:d2:d1 SSID '46b272' freq 5180
wlan0: BSS: Add new id 9 BSSID f0:21:e0:e6:d2:d3 SSID 'PASNET' freq 5180
wlan0: BSS: Add new id 10 BSSID 00:15:6d:f6:b2:22 SSID 'knvnet.cz_S5g' freq 5660
wlan0: BSS: Add new id 11 BSSID f0:21:e0:e6:d2:d4 SSID 'PASNET' freq 2437
wlan0: BSS: Add new id 12 BSSID f0:21:e0:9d:e3:c3 SSID '46b272' freq 5180
wlan0: BSS: Add new id 13 BSSID f0:21:e0:9d:e3:c7 SSID '' freq 5180
wlan0: BSS: Add new id 14 BSSID f0:21:e0:9d:e3:c8 SSID '' freq 2437
wlan0: BSS: Add new id 15 BSSID f0:21:e0:e5:f3:86 SSID '' freq 2437
wlan0: BSS: Add new id 16 BSSID f0:21:e0:e5:f3:85 SSID '' freq 5180
wlan0: BSS: Add new id 17 BSSID f0:21:e0:e6:d2:d5 SSID '' freq 5180
BSS: last_scan_res_used=18/32
wlan0: New scan results available (own=0 ext=0)
wlan0: Radio work 'scan'@0x30e061c10560 done in 2.715626 seconds
wlan0: radio_work_free('scan'@0x30e061c10560): num_active_works --> 0
wlan0: Selecting BSS from priority group 0
wlan0: 0: f0:21:e0:9d:e3:c5 ssid='PASNET' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-33 freq=5180
wlan0: selected based on RSN IE
wlan0: MLD: No Multi-Link element
wlan0: selected BSS f0:21:e0:9d:e3:c5 ssid='PASNET'
wlan0: Considering connect request: reassociate: 0 selected: f0:21:e0:9d:e3:c5 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x30e061c4d000 current_ssid=0x0
wlan0: Request association with f0:21:e0:9d:e3:c5
TDLS: TDLS is allowed in the target BSS
TDLS: TDLS channel switch allowed in the target BSS
wlan0: No ongoing scan/p2p-scan found to abort
wlan0: Add radio work 'connect'@0x30e061c10560
wlan0: First radio work item in the queue - schedule start immediately
wlan0: Starting radio work 'connect'@0x30e061c10560 after 0.000020 second wait
wlan0: WPA: clearing own WPA/RSN IE
wlan0: RSN: clearing own RSNXE
RSN: PMKSA cache search - network_ctx=0x30e061c4d000 try_opportunistic=0 akmp=0x0
RSN: Search for BSSID f0:21:e0:9d:e3:c5
RSN: No PMKSA cache entry found
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: Selected mgmt group cipher 32
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
wlan0: WPA: clearing AP RSNXE
wlan0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
wlan0: WPA: using GTK CCMP
wlan0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
wlan0: WPA: using PTK CCMP
wlan0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
RSN: Set own RSNXE default - hexdump(len=0):
WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
wlan0: Automatic auth_alg selection: 0x1
No supported operating classes IE to add
wlan0: Trying to associate with f0:21:e0:9d:e3:c5 (SSID='PASNET' freq=5180 MHz)
wlan0: Cancelling scan request
wlan0: State: SCANNING -> ASSOCIATING
Limit connection to BSSID f0:21:e0:9d:e3:c5 freq=5180 MHz based on scan results (bssid_set=1 wps=0)
wpa_driver_bsd_associate: ssid 'PASNET' wpa ie len 30 pairwise 16 group 16 key mgmt 2
wpa_driver_bsd_set_drop_unencrypted: enabled=1
bsd_set_opt_ie: set WPA+RSN ie (len 22)
wpa_driver_bsd_set_rsn_wpa_ie: set PRIVACY 1
bsd_ctrl_iface: if wlan0 (no change) enable 1 IFF_UP 1
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wlan0: Associated to a new BSS: BSSID=f0:21:e0:9d:e3:c5
wlan0: Associated with f0:21:e0:9d:e3:c5
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: RX EAPOL from f0:21:e0:9d:e3:c5 (encrypted=-1)
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: WPA: ignoring 2 bytes after the IEEE 802.1X data
wlan0: EAPOL-Key type=2
wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 4a f7 f0 ae dd 6b a0 5b 46 df e5 97 e8 d9 ad 30 10 85 0e 9d f3 04 f5 37 a4 1c df 9a 2b 4a 69 fe
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: WPA: RX message 1 of 4-Way Handshake from f0:21:e0:9d:e3:c5 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: Renewed SNonce - hexdump(len=32): 0c 88 dd 9f 7f 9e a7 6c 61 69 fd 08 c0 b6 dd 80 57 f2 d4 44 cd 4b 74 f6 cd eb fe d5 88 5f fc 80
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=5c:87:9c:fa:47:72 A2=f0:21:e0:9d:e3:c5
WPA: Nonce1 - hexdump(len=32): 0c 88 dd 9f 7f 9e a7 6c 61 69 fd 08 c0 b6 dd 80 57 f2 d4 44 cd 4b 74 f6 cd eb fe d5 88 5f fc 80
WPA: Nonce2 - hexdump(len=32): 4a f7 f0 ae dd 6b a0 5b 46 df e5 97 e8 d9 ad 30 10 85 0e 9d f3 04 f5 37 a4 1c df 9a 2b 4a 69 fe
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: Send EAPOL-Key frame to f0:21:e0:9d:e3:c5 ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 77 1f 73 32 da 11 2a bb 8f a2 bc 03 df 28 99 b7
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wlan0: RX EAPOL from f0:21:e0:9d:e3:c5 (encrypted=-1)
wlan0: IEEE 802.1X RX: version=2 type=3 length=151
wlan0: WPA: ignoring 2 bytes after the IEEE 802.1X data
wlan0: EAPOL-Key type=2
wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 4a f7 f0 ae dd 6b a0 5b 46 df e5 97 e8 d9 ad 30 10 85 0e 9d f3 04 f5 37 a4 1c df 9a 2b 4a 69 fe
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 61 63 74 b1 52 9e ad 25 72 ee 1d 23 50 6c df 2b
WPA: EAPOL-Key MIC using HMAC-SHA1
RSN: encrypted key data - hexdump(len=56): 0e a5 8c 0b 41 54 8c 1d bb f8 e7 8a 86 a5 30 23 4f bb 0a 15 64 fc 9a 34 05 f0 2d 4a 2a f5 46 47 75 05 2e 1d 84 32 80 6c 66 f9 0f a6 c1 b1 ef 2b 58 53 0a 88 ac 0c f7 e1
WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: RSN: RX message 3 of 4-Way Handshake from f0:21:e0:9d:e3:c5 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 01 91 89 aa 0b 0d 60 ad a8 63 cb 35 4f dc 74 e3 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: Send EAPOL-Key frame to f0:21:e0:9d:e3:c5 ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): a2 32 eb 5f 0e a2 d2 51 e6 48 31 b5 aa 5b 9f 56
wlan0: WPA: Installing PTK to the driver
bsd_set_key: alg=3 addr=0x30e061c58570 key_idx=0 set_tx=1 seq_len=6 key_len=16
Added PTKSA cache entry addr=f0:21:e0:9d:e3:c5 cipher=16
EAPOL: External notification - portValid=1
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
bsd_set_key: alg=3 addr=0x162e91391bc5 key_idx=1 set_tx=0 seq_len=6 key_len=16
wlan0: WPA: Key negotiation completed with f0:21:e0:9d:e3:c5 [PTK=CCMP GTK=CCMP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: Radio work 'connect'@0x30e061c10560 done in 2.185197 seconds
wlan0: radio_work_free('connect'@0x30e061c10560): num_active_works --> 0
wlan0: CTRL-EVENT-CONNECTED - Connection to f0:21:e0:9d:e3:c5 completed [id=0 id_str=]
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=SUCCESS
wlan0: Removing interface wlan0
wlan0: Request to deauthenticate - bssid=f0:21:e0:9d:e3:c5 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=COMPLETED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
TDLS: Tear down peers
wlan0: Event DEAUTH (11) received
wlan0: Deauthentication notification
wlan0: * reason 3 (DEAUTH_LEAVING) locally_generated=1
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlan0: CTRL-EVENT-DISCONNECTED bssid=f0:21:e0:9d:e3:c5 reason=3 locally_generated=1
wlan0: Auto connect disabled: do not try to re-connect
wlan0: Ignore connection failure indication since interface has been put into disconnected state
TDLS: Remove peers on disassociation
wlan0: WPA: Clear old PMK and PTK
Flush PTKSA cache entry for f0:21:e0:9d:e3:c5
wlan0: Disconnect event - remove keys
bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=0x30e061c30140 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: addr=f0:21:e0:9d:e3:c5
wlan0: State: COMPLETED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wlan0: State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
QM: Clear all active DSCP policies
wlan0: CTRL-EVENT-DSCP-POLICY clear_all
wpa_driver_bsd_set_countermeasures: enabled=0
PTKSA: Deinit. n_ptksa=0
wlan0: WPA: Clear old PMK and PTK
wlan0: BSS: Remove id 0 BSSID f0:21:e0:9d:e3:c5 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 1 BSSID f0:21:e0:9d:e3:c6 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 2 BSSID f0:21:e0:9d:e3:c4 SSID '46b272' due to wpa_bss_flush
wlan0: BSS: Remove id 3 BSSID f0:21:e0:e5:f3:84 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 4 BSSID f0:21:e0:e5:f3:82 SSID '46b272' due to wpa_bss_flush
wlan0: BSS: Remove id 5 BSSID 84:16:f9:b7:02:4a SSID 'PASNET.IoT' due to wpa_bss_flush
wlan0: BSS: Remove id 6 BSSID f0:21:e0:e5:f3:81 SSID '46b272' due to wpa_bss_flush
wlan0: BSS: Remove id 7 BSSID f0:21:e0:e5:f3:83 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 8 BSSID f0:21:e0:e6:d2:d1 SSID '46b272' due to wpa_bss_flush
wlan0: BSS: Remove id 9 BSSID f0:21:e0:e6:d2:d3 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 10 BSSID 00:15:6d:f6:b2:22 SSID 'knvnet.cz_S5g' due to wpa_bss_flush
wlan0: BSS: Remove id 11 BSSID f0:21:e0:e6:d2:d4 SSID 'PASNET' due to wpa_bss_flush
wlan0: BSS: Remove id 12 BSSID f0:21:e0:9d:e3:c3 SSID '46b272' due to wpa_bss_flush
wlan0: BSS: Remove id 13 BSSID f0:21:e0:9d:e3:c7 SSID '' due to wpa_bss_flush
wlan0: BSS: Remove id 14 BSSID f0:21:e0:9d:e3:c8 SSID '' due to wpa_bss_flush
wlan0: BSS: Remove id 15 BSSID f0:21:e0:e5:f3:86 SSID '' due to wpa_bss_flush
wlan0: BSS: Remove id 16 BSSID f0:21:e0:e5:f3:85 SSID '' due to wpa_bss_flush
wlan0: BSS: Remove id 17 BSSID f0:21:e0:e6:d2:d5 SSID '' due to wpa_bss_flush
wlan0: Cancelling scan request
wlan0: Cancelling authentication timeout
HS20: Delete all stored icons
QM: Clear all active DSCP policies
wlan0: CTRL-EVENT-DSCP-POLICY clear_all
Remove interface wlan0 from radio
Remove radio
wpa_driver_bsd_set_wpa: enabled=0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
bsd_set_opt_ie: set WPA+RSN ie (len 0)
bsd_ctrl_iface: if wlan0 (changed) enable 0 IFF_UP 0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
bsd_set_opt_ie: set WPA+RSN ie (len 0)
wlan0: CTRL-EVENT-TERMINATING
* **`sysctl` output (filtered):**
```bash
sysctl -a | grep iwm | sort
```
root@dell5530:~ # sysctl -a | grep iwm | sort
<118> parent interface: iwm0
<118>Autoloading module: if_iwm
<118>iwmbtfw: iwmbt_fw_read: open: /usr/local/share/iwmbt-firmware/ibt-18-16-1.sfi: No such file or directory
<118>iwmbtfw: main: Firmware download failed!
dev.iwm.%parent:
dev.iwm.0.%desc: Intel(R) Dual Band Wireless AC 9260
dev.iwm.0.%driver: iwm
dev.iwm.0.%iommu: rid=0x3b00
dev.iwm.0.%location: slot=0 function=0 dbsf=pci0:59:0:0 handle=\_SB_.PCI0.RP01.PXSX
dev.iwm.0.%parent: pci6
dev.iwm.0.%pnpinfo: vendor=0x8086 device=0x2526 subvendor=0x8086 subdevice=0x4010 class=0x028000
dev.iwm.0.debug: 0
irq142: iwm0:295 @cpu0(domain0): 3562
iwm0: <Intel(R) Dual Band Wireless AC 9260> mem 0xed400000-0xed403fff at device 0.0 on pci6
iwm0: hw rev 0x320, fw ver 34.3125811985.0, address 5c:87:9c:fa:47:72
net.wlan.0.%parent: iwm0
net.wlan.devices: iwm0
* **Information about your Access Point:**
* Manufacturer and Model (e.g., "TP-Link Archer AX55")
Amazon Eero6
* Confirm that other devices (like your MacBook) can achieve full 802.11ac speeds on this AP.
MacBook can achieve 150 Mbps and the limit is my Internet
Dell/FreeBSD 14.3 can achieve 22 Mbps.
No comments:
Post a Comment