For the Mac network techies
Jan. 30th, 2011 05:39 pmAbout two weeks ago, Elayna's laptop stopped connecting regularly to the network. Today, 'song's started doing the exact same thing. Both drop the wireless connection, timeout when trying to reestablish it, and pretty much won't work for more than a few seconds.
They're both on 10.5. My laptop (on 10.6), and the XP netbook connect just fine.
Anyone out there a solid expert on MacOS networking and know of any potential solutions here? I've tried zapping the pram, turning Airport off and on, and a handful of other things, to no avail.
ETA: Also, since I know this is a known issue on the MacBook pro line, the issue is NOT because of them being on battery power.
They're both on 10.5. My laptop (on 10.6), and the XP netbook connect just fine.
Anyone out there a solid expert on MacOS networking and know of any potential solutions here? I've tried zapping the pram, turning Airport off and on, and a handful of other things, to no avail.
ETA: Also, since I know this is a known issue on the MacBook pro line, the issue is NOT because of them being on battery power.
(no subject)
Date: 2011-01-30 11:08 pm (UTC)Find your router docs and do a hard restart. If you have your settings written down (WEP password you use, or whatever), you could also try a factory reset.
Otherwise you might try changing either the radio mode (from 2.4Ghz to something else the router/laptops can handle), and drop security (no WPA keys, no password, open broadcast the network). It's odd but sometimes the security is twitching something.
We have an Airport Extreme base station, and I've had to occasionally boost the signal to 100% (the multicast rate and transmit power) during some times of bad interference.
We've had "random drops" before, I never actually figured them out. They eventually "disappeared", although my wife's laptop still has slow internet issues occasionally. And come to think of it, the iMac (PPC G5 running 10.5) was having drop issues and it was in direct line of the router, never figured that one out either.
this is what worked for me...
Date: 2011-01-30 11:14 pm (UTC)(no subject)
Date: 2011-01-30 11:19 pm (UTC)(no subject)
Date: 2011-01-30 11:20 pm (UTC)With all three, it started with OSX 10.5, and the only fix we ever found was "install 10.4 and deal" or "go wired".
(10.6 didn't exist then, of course)
[1]: Both of these are TEMPORARY tests. Even if the problem goes away with WEP or WPA/TKIP or no encryption, you can't leave 'em that way. You *have* to put it back on WPA/AES unless you want your teenaged neighbour to use your internet access for torrenting porn and to read all the files on your laptop.
(no subject)
Date: 2011-01-30 11:48 pm (UTC)(no subject)
Date: 2011-01-31 12:43 am (UTC)(no subject)
Date: 2011-01-31 12:57 am (UTC)WPA versus WPA2 are implementation details - and WPA2 doesn't allow TKIP, which makes it harder to do wrong. But WPA/AES and WPA2/AES are basically equally as secure.
You SHOULD use WPA2 if all your devices speak WPA2 simply on principle, but WPA is perfectly good if you configure it to use AES only and not TKIP.
(no subject)
Date: 2011-01-31 02:45 am (UTC)(no subject)
Date: 2011-01-31 02:48 am (UTC)I'm having a similar problem though with my macbook pro now, started about 3 months ago now. My airport doesn't cycle off and on, the icon stays solid with full bars, but it'll just stop receiving packets... Sometimes toggeling it off and back on will settle it down. The xp box in the house doesn't have the same problem though. I have replaced my airport express at least once over this issue thinking maybe it was my router. Nope...
(no subject)
Date: 2011-01-31 02:52 am (UTC)Far better to just use DHCP, a nice long secure WPA passphrase, and accept that Macbooks running 10.5 are crappy and unreliable.
(no subject)
Date: 2011-01-31 04:21 am (UTC)(no subject)
Date: 2011-01-31 04:23 am (UTC)(no subject)
Date: 2011-01-31 04:24 am (UTC)I think WPA was under five, maybe ten, minutes but I'm not sure.
(Not disputing anything you've said, just adding hard, cold, speculative semi-memories my less-specific previous post.)
(no subject)
Date: 2011-01-31 04:41 am (UTC)Basically, assume that you set up WPA/TKIP with the passphrase "ph*YaS&U@rE4pAMp3e3atREMEgUW-6". This is not conventionally crackable. However, if you left your Linksys router with the username "admin" and the password "password" (the defaults), the fact that you were using TKIP would allow me to log in to your router and learn the passphrase, and then log in as a legit user and do whatever I wanted.
If you were using WPA/AES with the exact same router and passphrase, I'd be completely fucked and entirely unable to get into your network.
If you had changed the admin username and password on your router to something 40-characters long, I would be TECHNICALLY capable of brute-forcing it even if you used TKIP, but it would take longer than the heat death of the universe.
WPA2/AES does not make a difference, compared to WPA/AES. The main difference is that using WPA2 means you CANNOT use TKIP, and TKIP is the problem.
WEP's cracking times depend on the hardware and the software involved. If you can inject packets and the target network doesn't detect the injection, under a minute is doable. WPA cracking depends ENTIRELY on the use of TKIP rather than AES, and the device passwords inside TKIP being insecure. If you use AES instead ot TKIP, or if the passwords of ALL the internal devices are all secure and long and random, WPA is as secure as WPA2.
(no subject)
Date: 2011-01-31 05:03 am (UTC)Yeah. ;)
My WPA2 password is the minimum length required by my old xbox router (it required it to be 13 characters, and which I no longer use but the password was set) and had to change a special character because our wireless printer didn't support it (how odd).
And yeah, there seems to be a theme with 10.5 there.
(no subject)
Date: 2011-01-31 05:11 am (UTC)And I am not a fan of paying Mac prices to get Mac performance, but even given that, OSX 10.5 and wireless connections are REALLY not Apple's high water mark. Once again, I'm not Apple's target audience and I don't fix a lot of Macs, but I've encountered three different Macbook Pros that worked with 10.4 and had their wireless die with 10.5, and the problem was repeatable if you swapped .4 to .5 and back again. And, y'know, a little trivial Googling showed me I wasn't in the slightest the only person to have that problem.
(no subject)
Date: 2011-01-31 05:14 am (UTC)(no subject)
Date: 2011-01-31 08:50 am (UTC)(The GPU shat the bed on that machine too at some point, and I got an entire logic board out of that. The 2007 MBPs were... touchy.)
(no subject)
Date: 2011-01-31 02:51 pm (UTC)MAC address access is completely insecure. All you need to do to gain access is to start a wireless sniffing program, look for mac addresses of other devices currently on the network, and change your MAC address to match one of them. This is trivially easy (even easier than cracking WEP). Having a duplicate MAC address presents surprisingly few problems on a typical home network.
And of course none of your communications are encrypted so someone with a sniffer can see everything you browse unless you are using HTTPS (SSL), see all instant messages, etc.
(no subject)
Date: 2011-01-31 05:49 pm (UTC)