Skip to Content.

cat-users - [[cat-users]] Profile installation fails on macOS: The Wifi Payload could not be installed. Network interface not found

cat-users AT lists.geant.org

Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)

List archive


[[cat-users]] Profile installation fails on macOS: The Wifi Payload could not be installed. Network interface not found


Chronological Thread 
  • From: Martin Pauly <pauly AT hrz.uni-marburg.de>
  • To: cat-users AT lists.geant.org
  • Cc: elko.jacobs AT uni-marburg.de
  • Subject: [[cat-users]] Profile installation fails on macOS: The Wifi Payload could not be installed. Network interface not found
  • Date: Wed, 24 Nov 2021 14:15:56 +0100

Hi,

we have some 10+ MacBooks that won't install our .mobileconfig as delivered
by cat.eduroam.org
(the others do import it, including my own test devices).
The error message is (translated from German):
Profile installation failed: The Wifi Payload could not be installed. Network
interface not found.

One affected user managed to grab a Log snippet that might give a hint
where things go wrong:

Tue Nov 23 11:28:01.765 <kernel> AWDL Sync Enabled 0, data path state[1]
Tue Nov 23 11:28:16.733 <airport[162]> systemWokenByWiFi: System Wake Reason
not found
Tue Nov 23 11:28:36.878 <airport[162]> systemWokenByWiFi: System Wake Reason
not found
Tue Nov 23 11:28:44.254 <airport[162]> Could not set property
APPLE80211_REGKEY_AWDL_MAC_ADDRESS_IN_USE to 1
Tue Nov 23 11:28:47.068 <airport[162]> systemWokenByWiFi: System Wake Reason
not found
Tue Nov 23 11:28:47.082 <airport[162]> Could not set property
APPLE80211_REGKEY_AWDL_MAC_ADDRESS_IN_USE to 0
Tue Nov 23 11:28:47.802 <airport[162]> airportdProcessDLILEvent: <en0>
event=1, flags=0xFFFF8863, lastPowerPref=on
Tue Nov 23 11:28:47.802 <airport[162]> airportdProcessDLILEvent: en0 marked
UP, applying user power preferences (ON).
Tue Nov 23 11:28:47.802 <airport[162]> airportdProcessDLILEvent: <en0>
Setting power ON
<airport[162]> airportdProcessDLILEvent: <en0> event=1, flags=0xFFFF8863,
lastPowerPref=on
Tue Nov 23 11:28:47.808 <airport[162]> airportdProcessDLILEvent: en0 marked
UP, applying user power preferences (ON).
Tue Nov 23 11:28:47.808 <airport[162]> airportdProcessDLILEvent: <en0>
Setting power ON
Tue Nov 23 11:28:47.841 <kernel> parseRSNIE: groupCipherType = 5
pairwiseCipherType = 5 authSel = 1
Tue Nov 23 11:28:47.841 <kernel> initWithInterfaceAndIE: _myMacAddress
xx:xx:xx:xx:xx:xx
Tue Nov 23 11:28:48.089 <kernel> Failed test for valid
apple80211_postMessage_tlv_types in data, 65535
Tue Nov 23 11:28:48.089 <kernel> Unexpected payload found for message 74,
dataLen 104
Tue Nov 23 11:28:48.089 <kernel> payload Data ff ff 00 00 00 00 00 00 dc f7
19 3e fc 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00
Tue Nov 23 11:28:48.089 <kernel> Error storing postMessage 74
Tue Nov 23 11:28:48.097 <kernel> postMessage::1412 APPLE80211_M_BSSID_CHANGED
received
Tue Nov 23 11:28:48.097 <kernel> No InterfaceAverageCCA
Tue Nov 23 11:28:48.097 <kernel> Adding setInterfaceAverageCCA with cca 0
Tue Nov 23 11:28:48.097 <kernel> Added known cca 0 for channel 100 into
setInterfaceAverageCCA
Tue Nov 23 11:28:48.100 <kernel> en0: Received EAPOL packet (length = 67)
Tue Nov 23 11:28:48.100 <kernel> inputEAPOLFrame: Received non-key EAPOL
frame (53)
Tue Nov 23 11:28:48.105 <kernel> en0: Received EAPOL packet (length = 60)
Tue Nov 23 11:28:48.105 <kernel> inputEAPOLFrame: Received non-key EAPOL
frame (46)
Tue Nov 23 11:28:48.110 <kernel> en0: Received EAPOL packet (length = 60)
Tue Nov 23 11:28:48.110 <kernel> inputEAPOLFrame: Received non-key EAPOL
frame (46)
Tue Nov 23 11:28:48.121 <kernel> en0: Received EAPOL packet (length = 1022)
Tue Nov 23 11:28:48.121 <kernel> inputEAPOLFrame: Dropping EAPOL frame, not
key frame
Tue Nov 23 11:28:48.127 <kernel> en0: Received EAPOL packet (length = 1018)
Tue Nov 23 11:28:48.127 <kernel> inputEAPOLFrame: Dropping EAPOL frame, not
key frame
Tue Nov 23 11:28:48.128 <airport[162]> ERROR: sharingd (428) is not entitled
for com.apple.wifi.join_history, will not allow request
Tue Nov 23 11:28:48.129 <airport[162]> ERROR: rapportd (410) is not entitled
for com.apple.wifi.join_history, will not allow request
Tue Nov 23 11:28:48.132 <kernel> en0: Received EAPOL packet (length = 1018)
Tue Nov 23 11:28:48.132 <kernel> inputEAPOLFrame: Dropping EAPOL frame, not
key frame
Tue Nov 23 11:28:48.139 <kernel> en0: Received EAPOL packet (length = 1018)
Tue Nov 23 11:28:48.139 <kernel> inputEAPOLFrame: Dropping EAPOL frame, not
key frame
Tue Nov 23 11:28:48.144 <airport[162]> ERROR: sharingd (428) is not entitled
for com.apple.wifi.join_history, will not allow request
Tue Nov 23 11:28:48.145 <kernel> en0: Received EAPOL packet (length = 1018)

The "Unexpected payload" is highly suspicious, of course.
I could not find anything like
dc f7 19 3e fc 6b
in a hexdump of the .mobileconfig, cf. attachment.
So I assume that somehow the wrong data is passed to the kernel function
which is supposed to read the profile.
I also played around a bit and removed the "Configure wired Interfaces"
Option from one of our profiles,
to no avail. One Student succeeded with a change to EAP-TTLS/PAP which we provide as
"Samsung Workaround".
We do set an anonymous Outer ID in the profile.

My first guess was that the problem is related to leftovers of old configs
being present
in the keychain. But with Keychain Access, we found nothing. It also turned
out that at least
macOS versions 10.14 to current are affected, even devices that have never
seen an eduroam
config before. Any ideas are welcome.

TIA, Martin


--
Dr. Martin Pauly Phone: +49-6421-28-23527
HRZ Univ. Marburg Fax: +49-6421-28-26994
Hans-Meerwein-Str. E-Mail: pauly AT HRZ.Uni-Marburg.DE
D-35032 Marburg

Attachment: eduroam-OS_X-Philipps-Universitat_Marburg-Staff_Philipps-Universitaet_Marburg-1.mobileconfig
Description: Binary data




Archive powered by MHonArc 2.6.19.

Top of Page