Modify

Opened 6 years ago

Closed 4 years ago

Last modified 2 years ago

#11608 closed defect (no_response)

TP-Link TL-WR740N v1/v4 Wifi disappears and auto channel doesn't work

Reported by: Cristian Deluxe <djcristiandeluxe@…> Owned by: developers
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

Hi I have a lot of TL-WR740N (v1 or v2 both) working with OpenWRT and I'm having some problems with the wifi:

The wifi network is often "disappear" you can not view it with any equipment, computers that were connected are disconnected, if you surf with ethernet cable, the router works perfectly, and if you press the "scan" in the webgui, the SSID appears again.

May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:23:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:23:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:33:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:44:47 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPDISCOVER(br-lan) fa:ke:da:ta:4a:02 
May 30 09:44:47 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPOFFER(br-lan) 192.168.2.197 fa:ke:da:ta:4a:02 
May 30 09:44:48 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.197 fa:ke:da:ta:4a:02 
May 30 09:44:48 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.197 fa:ke:da:ta:4a:02 IPAKA-SIMI
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:53:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 10:03:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: pairwise key handshake completed (RSN)
May 30 10:09:37 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPDISCOVER(br-lan) fa:ke:da:ta:43:ad 
May 30 10:09:37 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPOFFER(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 10:09:48 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 10:09:48 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad David-PC
May 30 10:10:01 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPINFORM(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 10:10:01 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad David-PC
May 30 10:11:10 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPINFORM(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 10:11:10 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad David-PC
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 10:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 10:17:01 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPINFORM(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 10:17:01 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad David-PC
May 30 10:17:08 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.229 fa:ke:da:ta:20:7d 
May 30 10:17:08 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.229 fa:ke:da:ta:20:7d iPad-Deivid

#####################################################################
 HERE IS WHERE IT FAILS
#####################################################################

May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: deauthenticated due to local deauth request

#####################################################################
 ALL WIFI CLIENTS ARE LOST
#####################################################################

I connect a PC with a cable:

May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPDISCOVER(br-lan) fa:ke:da:ta:fc:28 
May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPOFFER(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 
May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPDISCOVER(br-lan) fa:ke:da:ta:fc:28 
May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPOFFER(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 
May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 
May 30 11:08:41 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 SIMI-PC
May 30 11:09:10 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPINFORM(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 
May 30 11:09:10 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.207 fa:ke:da:ta:fc:28 SIMI-PC

Works ok i can surf, if i go to "net->wireless" and click in "Scan" this is what happens:

May 30 11:33:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: authenticated
May 30 11:33:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: associated (aid 1)
May 30 11:33:17 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: pairwise key handshake completed (RSN)
May 30 11:33:19 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.193 fa:ke:da:ta:47:ae 
May 30 11:33:19 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.193 fa:ke:da:ta:47:ae WN3000RP
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: authenticated
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: associated (aid 2)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: pairwise key handshake completed (RSN)
May 30 11:33:26 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.229 fa:ke:da:ta:20:7d 
May 30 11:33:26 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.229 fa:ke:da:ta:20:7d iPad-Deivid
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: pairwise key handshake completed (RSN)
May 30 11:33:30 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPREQUEST(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad 
May 30 11:33:30 OPENWRT daemon.info dnsmasq-dhcp[1811]: DHCPACK(br-lan) 192.168.2.234 fa:ke:da:ta:43:ad David-PC

All clients are working again.

Another log:

root@OPENWRT:~# logread | grep wlan0
May 30 08:43:08 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:e1:b9 WPA: pairwise key handshake completed (RSN)
May 30 08:48:13 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:67:b3 IEEE 802.11: disassociated due to inactivity
May 30 08:48:14 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:67:b3 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
May 30 08:48:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:e1:b9 IEEE 802.11: disassociated due to inactivity
May 30 08:48:27 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:e1:b9 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
May 30 08:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 08:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 08:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 08:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 08:53:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:03:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:03:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:23:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:23:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:23:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:33:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:33:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 09:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 09:53:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 09:53:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
May 30 10:03:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 10:03:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 10:09:34 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: pairwise key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 10:13:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 10:13:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)

#####################################################################
 HERE IS WHERE IT FAILS
#####################################################################

May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:4a:02 IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 IEEE 802.11: deauthenticated due to local deauth request
May 30 10:23:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: deauthenticated due to local deauth request

Go to "net->wireless" and click in "Scan"...

May 30 11:33:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: authenticated
May 30 11:33:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae IEEE 802.11: associated (aid 1)
May 30 11:33:17 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: pairwise key handshake completed (RSN)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: authenticated
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d IEEE 802.11: associated (aid 2)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: pairwise key handshake completed (RSN)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 11:33:26 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: pairwise key handshake completed (RSN)
May 30 11:33:57 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 IEEE 802.11: authenticated
May 30 11:33:57 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 IEEE 802.11: associated (aid 4)
May 30 11:33:57 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: pairwise key handshake completed (RSN)
May 30 11:33:58 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df IEEE 802.11: authenticated
May 30 11:33:58 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df IEEE 802.11: associated (aid 5)
May 30 11:33:58 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: pairwise key handshake completed (RSN)
May 30 11:39:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 11:39:10 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 11:39:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: authenticated
May 30 11:39:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad IEEE 802.11: associated (aid 3)
May 30 11:39:16 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: pairwise key handshake completed (RSN)
May 30 11:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:43:ad WPA: group key handshake completed (RSN)
May 30 11:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:47:ae WPA: group key handshake completed (RSN)
May 30 11:43:01 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:95:59 WPA: group key handshake completed (RSN)
May 30 11:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:b8:df WPA: group key handshake completed (RSN)
May 30 11:43:02 OPENWRT daemon.info hostapd: wlan0: STA fa:ke:da:ta:20:7d WPA: group key handshake completed (RSN)
root@OPENWRT:~#
root@OPENWRT:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option macaddr 'fa:ke:da:ta:61:34'
        option hwmode '11ng'
        list ht_capab 'SHORT-GI-20'
        list ht_capab 'SHORT-GI-40'
        list ht_capab 'RX-STBC1'
        list ht_capab 'DSSS_CCK-40'
        option country 'US'
        option channel '6'
        option txpower '17'
        option htmode 'HT40+'

config wifi-iface
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid 'OPENWRT'
        option encryption 'psk-mixed'
        option key 'mypassword'

root@OPENWRT:~#

Tell me if you need something more =) and thanks for the hard work

When setting up the router in "auto channel" always remains in the channel 1 (this is an issue is not so important but also wanted to comment here)

Attachments (0)

Change History (54)

comment:1 Changed 6 years ago by jow

There is no autochannel in ap mode - "auto" will always map to the lowest available channel.

comment:2 follow-up: Changed 6 years ago by nbd

what openwrt version are you using?

comment:3 Changed 6 years ago by Nilfred <nilfred@…>

Invalid: "deauthenticated due to local deauth request" means "deauthetication attack" this will happen only once if your password is just 8 caracters long, or 300.000-500.000 times if your password is longer and your attacker is full of patient.

You may disengage lowering transmission power to just what you need.

Don't ask me, google it ;)

comment:4 Changed 6 years ago by jow

Must not be an attack. This message can basically mean anything.

comment:5 in reply to: ↑ 2 Changed 6 years ago by anonymous

Replying to nbd:

what openwrt version are you using?

It's happens with any version since i remember 30xxx->32xxx I've tried to low the transmission power and sometimes, if i set the bandwitch to 40mhz, it do the trick, but in some routers nothing works.

I think that can be some incompatibility with certain wireless adapters or with some "N" modes, for sample the first log have lots of devices (mobiles, ipad, laptops, tvs).

Of 100 routers in 100 differently homes, usually 10-15 have problems with "wifi dissapears" and this can explain the "40mhz trick"

This logs where taken from a "r32002" version but i usually compile it once a week and try with new versions.

Thanks and sorry for my bad English

comment:6 follow-up: Changed 6 years ago by nbd

please try the latest version

comment:7 in reply to: ↑ 6 Changed 6 years ago by anonymous

Replying to nbd:

please try the latest version

I'm waiting to #11679 for test it but thanks for your work : )

comment:8 Changed 5 years ago by nbd

  • Resolution set to no_response
  • Status changed from new to closed

comment:9 Changed 5 years ago by alzhao

Have you solved this problem? I have this problem in trunk36364. I happens once a day or several days.

comment:10 Changed 5 years ago by anonymous

  • Resolution no_response deleted
  • Status changed from closed to reopened

comment:11 Changed 5 years ago by nbd

Please try latest trunk, there were quite a few fixes since that old version you mentioned.

comment:12 Changed 5 years ago by anonymous

same problem here on two 740N v4.23 - on 12.09 (r36088) and trunk r36936

comment:13 Changed 5 years ago by alzhao

I will use the latest trunk and try again.

comment:14 Changed 5 years ago by alzhao

I tried BB trunk37103 for two days, the situation is even worse. Everyday the signal will disappear once.
One problem: I configured reset button to up and down wifi, when using the button to bring wifi up, hostapd will use 100% cpu.
This happened before, when I want to execute "wifi up" in cgi using fork. Not sure if this is related to signal disappear.
Another problem, everytime when the wifi signal disappear, in system log, there will be this record:

[93602.850000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.

Why signal is related to firewall?

comment:15 Changed 5 years ago by alzhao

I have tried latest trunk BB and AA, all have this problem.
Here is a quick way to let the wifi signal disappear:
Use two ar7240 routers, install openwrt. Use one as a repeater to connect to another. Input a wrong password, which cause the router to connect then disconnect again and again. In about two hours, the AP router's signal will disappear.
It seems a hostapd problem. I have tried the latest trunk with latest hostapd, no luck.

comment:16 Changed 5 years ago by anonymous

I have the same problem, my router is a TP-LINK WRT-740N v4. In my case, the log message that appeared around the time it stopped working was:

Jul 8 21:15:01 OpenWrt daemon.info hostapd: wlan0: STA 28:cf:da:9e:fa:63 IEEE 802.11: disassociated due to inactivity
Jul 8 21:15:02 OpenWrt daemon.info hostapd: wlan0: STA 28:cf:da:9e:fa:63 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

comment:17 Changed 5 years ago by NTBlade

Hi there, I'm having the same problem also. Which logs should I be checking when this happens?

Thanks
NTBlade

comment:18 Changed 5 years ago by nbd

Same problem as what? Original report? Various comments? Which version are you using? Please be more specific!

comment:19 Changed 5 years ago by anonymous

my comment -> comment:12
problem with disappearing Wifi signal. after couple hours, sometimes couple days. no sign in logs. i went back to oryginal firmware and waiting for solution.

comment:20 Changed 5 years ago by nbd

Please try the latest version

comment:21 Changed 5 years ago by anonymous

lasted version firmware still disappear WIFI signal after couple hours,

comment:22 Changed 5 years ago by nbd

please try latest again, some more stability improvements were committed

comment:23 Changed 5 years ago by choogenboom

Same problem, WiFi radio shuts off after deauth, see log below. In my case I have 6 cellular access points running on 6 different channels. I then have 6 clients, each associated with only one of the 6 access points. All running at same time. After 8 hour test, only one access point has failed, its log is below.

running:ATTITUDE ADJUSTMENT (Attitude Adjustment, r35864)

[code]Jul 30 06:37:43 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: authenticated
Jul 30 06:37:43 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: associated (aid 1)
Jul 30 06:37:43 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: pairwise key handshake completed (RSN)
Jul 30 06:37:47 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPDISCOVER(wlan0) 64:66:b3:4d:8c:c0
Jul 30 06:37:47 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPOFFER(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:37:47 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPREQUEST(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:37:47 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPACK(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:38:44 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: authenticated
Jul 30 06:38:44 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: associated (aid 1)
Jul 30 06:38:44 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: pairwise key handshake completed (RSN)
Jul 30 06:38:45 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPDISCOVER(wlan0) 64:66:b3:4d:8c:c0
Jul 30 06:38:45 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPOFFER(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:38:45 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPREQUEST(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:38:45 OmniSense daemon.info dnsmasq-dhcp[2366]: DHCPACK(wlan0) 192.168.1.216 64:66:b3:4d:8c:c0
Jul 30 06:43:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 06:53:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:03:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:13:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:23:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:33:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:43:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 07:53:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:03:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:13:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:23:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:33:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:43:39 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 WPA: group key handshake completed (RSN)
Jul 30 08:49:01 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: disassociated due to inactivity
Jul 30 08:49:02 OmniSense daemon.info hostapd: wlan0: STA 64:66:b3:4d:8c:c0 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Jul 30 13:38:59 OmniSense kern.info kernel: [28579.220000] eth0: link up (100Mbps/Full duplex)

[/code]

comment:24 Changed 4 years ago by nbd

  • Resolution set to no_response
  • Status changed from reopened to closed

Please reopen if you can reproduce this with a *recent* build of AA or trunk (from svn/git). Old versions like r35xxx don't count!

comment:25 Changed 4 years ago by geadas

hello.
i still have this problem with r37801.
when i accessed the router it was up almost 5 days but the customer said that the wifi went down after the first day.
in the logread output i could only see dhcp info from the wan port.
the strange thing is that dmesg gave me this output in the moment i connected my computer to the router:
[426603.610000] eth0: link up (1000Mbps/Full duplex)
[426603.610000] br-lan: port 1(eth0) entered forwarding state
[426603.620000] br-lan: port 1(eth0) entered forwarding state
[426605.620000] br-lan: port 1(eth0) entered forwarding state

there was no cable conected to eth0 before, could it be a bridge problem?

is there any way i can help you?

thank you.

comment:26 follow-up: Changed 4 years ago by nbd

I'd like to know more about what 'wifi went down' actually means. Not visible in scans? Connection failure with certain clients? DHCP failure on wireless?
Also, what device are you using?

comment:27 in reply to: ↑ 26 Changed 4 years ago by geadas

Replying to nbd:

I'd like to know more about what 'wifi went down' actually means. Not visible in scans? Connection failure with certain clients? DHCP failure on wireless?
Also, what device are you using?

hello.

that means the connection failed with all the clients and the ssid was not visible in scans.
when i arrived there i couldn't see it either. i think the radio was not working.
with a simple wifi command the radio came up again.

i'm using TL-WR740N v4.23.

here i have 3 wr740n prepared with the same release, one connected as ap, two as clients, and one of these two is also working as ap (repeater). they were connected first time last saturday and until this moment i have no problem. one of the routers has more than 170.000.000 packets send and almost the same number of received packets. i really cant understand what's happening.

could it be the uboot version? the one i have in the routers that are performing well is "U-Boot 1.1.4 (Sep 15 2011 - 11:17:26)". on the others most certainly not, but i'm not sure.

thank you

comment:28 Changed 4 years ago by anonymous

  • Resolution no_response deleted
  • Status changed from closed to reopened

OpenWrt Barrier Breaker r37879 / LuCI Trunk (svn-r9899)
TP-Link TL-MR3420 v2.1

Tue Sep 3 23:19:53 2013 daemon.info hostapd: wlan0: STA 00:21:00:c9:53:c7 WPA: group key handshake completed (RSN)
Tue Sep 3 23:24:55 2013 daemon.info hostapd: wlan0: STA 00:21:00:c9:53:c7 IEEE 802.11: disassociated
Tue Sep 3 23:24:56 2013 daemon.info hostapd: wlan0: STA 00:21:00:c9:53:c7 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Packets keep going between the devices, but no useful traffic.
This happens when not connected wired local network connections, only when it works Wan and wi-fi

comment:29 Changed 4 years ago by anonymous

I have same problem on DIR-601 B1 latest version (NO UI). It must be the software issue.

comment:30 Changed 4 years ago by chrmignot@…

Same issue here. Each 5 to 10 minutes I got a:
Sep 28 18:38:44 OpenWrt daemon.info hostapd: wlan0: STA xx:xx:xx:xx:xx:71 IEEE 802.11: disassociated
Sep 28 18:38:45 OpenWrt daemon.info hostapd: wlan0: STA xx:xx:xx:xx:xx:71 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
and the WIFI connection cuts.
It seems that this happens when I am streaming a video.
such as:
http://www.gamekult.com/video/fifa-14-gk-live-fifa-14-vs-pes-2014-la-revanche-3050185393v.html
DLINK DIR-825.
Last version of Attitude Adjustment.
How can I help you to diagnose it?
Thanks
Chris

comment:31 follow-ups: Changed 4 years ago by nbd

please try trunk r38249 or later

comment:32 in reply to: ↑ 31 Changed 4 years ago by anonymous

Replying to nbd:

please try trunk r38249 or later

one of the variants, broken memory device.
You need to try to check the RAM from U-Boot.

it helped me to identify the problem

comment:33 in reply to: ↑ 31 Changed 4 years ago by chrmignot@…

Replying to nbd:

please try trunk r38249 or later

This means I guess "take the last snapshot".
I will.
Thanks.

comment:34 Changed 4 years ago by chrmignot@…

I have installed a snapShot of Broken Barrier.
No more issue since.
Thanks

comment:35 Changed 4 years ago by nbd

  • Resolution set to fixed
  • Status changed from reopened to closed

comment:36 Changed 4 years ago by anonymous

  • Resolution fixed deleted
  • Status changed from closed to reopened

Unfortunately, I have the same issue here. Router is the TP-Link WDR3600 running OpenWrt Barrier Breaker r38692.
Excerpt form the log:

Wed Nov 13 20:39:33 2013 daemon.info hostapd: wlan0: STA <removed> IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 13 20:39:48 2013 daemon.info hostapd: wlan0: STA <removed> IEEE 802.11: disassociated due to inactivity
Wed Nov 13 20:39:49 2013 daemon.info hostapd: wlan0: STA <removed> IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Nov 13 20:40:01 2013 daemon.info hostapd: wlan0: STA <removed> IEEE 802.11: disassociated due to inactivity
Wed Nov 13 20:40:02 2013 daemon.info hostapd: wlan0: STA <removed> IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

comment:37 Changed 4 years ago by glove@…

Same here, with a TP-Link WDR4300, running a recent snapshot. This appears to happen at random times, sometimes within minutes of restarting wifi, sometimes after a few hours.
The two devices shown in the logs below are Squeezebox Booms, but the same happens with laptops or tablets connected: all connections are cut off, and a wifi restart command is required.

Log with debug traces:

Fri Nov 22 04:22:53 2013 daemon.debug hostapd: wlan0: WPA rekeying GTK
Fri Nov 22 04:22:53 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:53 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:53 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:53 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:54 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:55 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: sending 1/2 msg of Group Key Handshake
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:56 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.1X: did not Ack EAPOL-Key frame (unicast index=18)
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: WPA_PTK: sm->Disconnect
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 WPA: event 3 notification
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.1X: unauthorizing port
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: EAPOL-Key timeout
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: WPA_PTK: sm->Disconnect
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 WPA: event 3 notification
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.1X: unauthorizing port
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 MLME: MLME-DEAUTHENTICATE.indication(00:04:20:1f:0e:11, 2)
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:0e:11 MLME: MLME-DELETEKEYS.request(00:04:20:1f:0e:11)
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 MLME: MLME-DEAUTHENTICATE.indication(00:04:20:1f:1f:f5, 2)
Fri Nov 22 04:22:57 2013 daemon.debug hostapd: wlan0: STA 00:04:20:1f:1f:f5 MLME: MLME-DELETEKEYS.request(00:04:20:1f:1f:f5)
Fri Nov 22 04:23:02 2013 daemon.info hostapd: wlan0: STA 00:04:20:1f:0e:11 IEEE 802.11: deauthenticated due to local deauth request
Fri Nov 22 04:23:02 2013 daemon.info hostapd: wlan0: STA 00:04:20:1f:1f:f5 IEEE 802.11: deauthenticated due to local deauth request

comment:38 Changed 4 years ago by glove@…

Anything I can try or any other information I can provide to help resolve this issue?

comment:39 Changed 4 years ago by nbd

please try latest trunk

comment:40 Changed 4 years ago by nbd

  • Resolution set to no_response
  • Status changed from reopened to closed

comment:41 Changed 4 years ago by glove@…

Sorry, did not have a chance to try a more recent version until this week-end.

I installed the latest snapshot (dated December 7th) on Saturday, and so far I have not seen a connection drop. I will monitor closely in the next few days, and reopen the issue in case of problems.

Otherwise, good job and thank you! :-)

comment:42 Changed 4 years ago by xx

r38863 still the same problem on 740n v4

comment:43 Changed 4 years ago by anonymous

I have had this issue occuring since kamikaze, over and over.

The constant "try newest version" response over and over is crap, clearly there is something wrong and no one wants to fix it.

Has anyone had any 100% success with any of this, cause clearly its a continual issue with OpenWRT and these devices.

comment:44 Changed 4 years ago by bittorf@…

please post exact used openwrt-revision and hardware-model, otherwise it's not helpful. (there are a lot of different chipsets out there which all use ath9k).

comment:45 Changed 4 years ago by dexter@…

  • Resolution no_response deleted
  • Status changed from closed to reopened

I have this problem with r39469 on TP-Link TL-WR1043N/ND v1.
Please let me know what info/tests you need.

Restarting wifi helps sometimes 5 minutes, sometimes 5 hours or more.

comment:46 Changed 4 years ago by nbd

please try r39688 or newer

comment:47 Changed 4 years ago by anonymous

could anyone comfirm that this issue is now fixed with r39688 please?

comment:48 Changed 4 years ago by dexter@…

Running it now:

OpenWrt Barrier Breaker r39692 / LuCI Trunk (svn-r9957)

I will report back soon with my findings.

comment:49 Changed 4 years ago by nbd

  • Resolution set to no_response
  • Status changed from reopened to closed

comment:50 Changed 4 years ago by anonymous

Same problem here
Version: ATTITUDE ADJUSTMENT (12.09, r36088)
Hardware: TP-LINK TL-WDR3600

Cannot connect to the wireless randomly, even though i can see the SSID and input the key.

deauthenticated due to inactivity (timer DEAUTH/REMOVE) will appear in the log.

Any idea?

comment:51 Changed 4 years ago by monty_ burns_007

I have the same problem on my TPLINK 1043ND hw. 1.8
Running OpenWrt by mk13139 r40572 (BARRIER BREAKER (Bleeding Edge, r40572)

I was downloading a file with firefox against my max. wan speed (ADSL 300 kb/s).
Another devices (android tablet) was also starting a download and killed my wifi.
No more connect possible on wifi side.
LAN (cable) still worked. (same bug I had in past on DD-WRT, reason I switched to OpenWRT last weekend)
On DD-WRT even the cable LAN was killed.
On OpenWRT I connected with LAN cable. Went to Wifi tab in Luci and did a SCAN (button).
Then my SSID was connected again over Wifi.

Any solution to this bug ? It looks android related ?

comment:52 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

comment:53 Changed 3 years ago by zeeshanzaman24@…

i have configured my tplink wa701nd.tplink signals appears but after conecting , signals disappears and then after 10 seconds again signals appears

comment:54 Changed 2 years ago by anonymous

i have this router but with default firmware and I also have that issue.. so nothing to do with dd wrt or openwrt..

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.