The docs for airpwn (http://airpwn.sourceforge.net/Airpwn.html) explain the
following modifications that can be made to madwifi with regard to packet
Since airpwn is sending packets with the spoofed source MAC of the
access point, the 802.11 ACK packet is sent to the AP and not the host
running airpwn. This will likely cause your wireless driver to
continually retransmit the same airpwn packets over and over waiting
for an ACK that will never come. Depending on the driver, this can
fill the packet queue to stall leading to poor performance. If airpwn
seems to work for the first instance of the match but not subsequent
matches (for example: only replacing the first image or two on a page)
you are likely seeing this behavior. "Tuning" your driver to not
retransmit packets will lead to much better behavior.
To hack the madwifi-ng drivers to not retransmit packets, edit
ath/if_athvar.h and set ATH_TXMACTRY to 1 (default value is 11).
I appreciate this list is madwifi not airpwn, however i'm keen to understand
where the constant ATH_TXMACTRY has gone, and how I might achieve the same
effect with source for madwifi-current.
Grateful for any ideas,