Modify

Opened 4 years ago

Closed 4 years ago

#16638 closed defect (duplicate)

Wifi clients disconnected and wifi stops broadcasting SSID after 30-120 minutes of uptime

Reported by: brith2o Owned by: developers
Priority: highest Milestone: Chaos Calmer 15.05
Component: kernel Version: Trunk
Keywords: Cc:

Description

BARRIER BREAKER (Bleeding Edge, r40862)
Buffalo WZR-HP-G300NH (ar71xx)

I have had this issue since upgrading to Barrier Breaker from Attitude Adjustment. I did not have this issue with Attitude Adjustment.

After 30-120 minutes of up-time, the router stops broadcasting SSID and all wireless clients disconnect. Nothing will reconnect until I (1) reboot the router, or (2) SSH into the router and issue the command "wifi".

The /etc/config/wireless file is as follows:

config wifi-device  radio0
	option type     mac80211
	option channel  '11'
	option macaddr '<MAC Address>'
	option hwmode	11ng
	option htmode	HT20
	option log_level 0

config wifi-iface
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid 'ssid1'
	option encryption 'psk2'
	option key '<password>'

config wifi-iface
	option device 'radio0'
	option network 'guest'
	option mode 'ap'
	option ssid 'ssid2'
	option encryption 'psk2'
	option key '<password>'

The following is captured in the log at the time the issue starts (10:59 pm in this log snippet, when two clients were connected):

5/27/2014 11:39 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:29 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:19 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 11:09 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.11: deauthenticated due to local deauth request
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.1X: unauthorizing port
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: event 3 notification
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: WPA_PTK: sm->Disconnect
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:59 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 2>, 2)
5/27/2014 10:56 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DISASSOCIATE.indication(<MAC Address 2>, 34)
5/27/2014 10:55 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.11: disconnected due to excessive missing ACKs
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: group key handshake completed (RSN)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: received EAPOL-Key frame (2/2 Group)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: group key handshake completed (RSN)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: received EAPOL-Key frame (2/2 Group)
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/27/2014 10:49 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK

I tried adding "option disassoc_low_ack 0" to the wireless config file but that didn't solve the problem. Here is another log snippet after adding this option (4 clients connected, disconnect occurred at 9:35pm):

5/28/2014 9:55 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/28/2014 9:45 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.11: deauthenticated due to local deauth request
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.11: deauthenticated due to local deauth request
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.11: deauthenticated due to local deauth request
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.11: deauthenticated due to local deauth request
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DELETEKEYS.request(<MAC Address 1>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 1>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 2>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DELETEKEYS.request(<MAC Address 2>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 2>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> MLME: MLME-DELETEKEYS.request(<MAC Address 3>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 3>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> IEEE 802.1X: unauthorizing port
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: event 3 notification
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: WPA_PTK: sm->Disconnect
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> MLME: MLME-DELETEKEYS.request(<MAC Address 4>)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> MLME: MLME-DEAUTHENTICATE.indication(<MAC Address 4>, 2)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> IEEE 802.1X: unauthorizing port
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: event 3 notification
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: WPA_PTK: sm->Disconnect
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.1X: unauthorizing port
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: event 3 notification
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: WPA_PTK: sm->Disconnect
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.1X: unauthorizing port
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: event 3 notification
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: WPA_PTK: sm->Disconnect
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: EAPOL-Key timeout
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> IEEE 802.1X: did not Ack EAPOL-Key frame (broadcast index=84)
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:35 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: group key handshake completed (RSN)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: received EAPOL-Key frame (2/2 Group)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: EAPOL-Key timeout
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: group key handshake completed (RSN)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: received EAPOL-Key frame (2/2 Group)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: group key handshake completed (RSN)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: received EAPOL-Key frame (2/2 Group)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: group key handshake completed (RSN)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: received EAPOL-Key frame (2/2 Group)
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 1> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 2> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 3> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: STA <MAC Address 4> WPA: sending 1/2 msg of Group Key Handshake
5/28/2014 9:25 PM,Debug,192.168.1.1,wlan0: WPA rekeying GTK

When this issue occurs, the wifi light on the router becomes steady-on (instead of blinking under normal operation). It remains on until I issue the "wifi" command or reboot.

Attachments (0)

Change History (2)

comment:1 Changed 4 years ago by brith2o

Update: Seems the SSID is in fact broadcasting (at least I can see it periodically on my phone when I do a scan), but wireless clients (two android phones, a Samsung Blu-Ray player, and a Chromecast) refuse to connect until issuing the "wifi" command.

comment:2 Changed 4 years ago by nbd

  • Resolution set to duplicate
  • Status changed from new to closed

duplicate of #15464

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.