Alfa Tube 2HP w/ OpenWrt won't connect to a hotspot (4-Way Handshake Failed) while my laptop will connect to hotspot

Hi,

We're using a Alfa Tube 2HP on our boat, running OpenWRT. The Alfa Tube 2HP typically is used to connect to a wifi hotspot in the vicinity. The 2HP is connected to a Mikrotik Wap AC via ethernet, which then creates a local wifi network so all of our smartphones/laptops/etc. can connect to the internet.

This has worked perfectly for months now but now it will not connect to a certain wifi hotspot called CAFEXWIFI. The odd thing is that our smartphones and laptops (Android, Ios, Mac, Windows devices) will connect to CAFEXWIFI directly, albeit throughput isn’t great and they will drop the connection every once in a while, most likely because the signal is weak without the Alfa 2HP. That is why I want to get the Alfa2HP on OpenWRT working correctly.

It seems to be some sort of 4-way handshake timeout? Is there anything I can change in OpenWRT to allow our Tube2HP to connect to CAFEXWIFI? Thanks in advance!

The error is:

Thu Dec  3 20:23:11 2020 daemon.notice netifd: Interface 'wwan' has link connectivity loss
Thu Dec  3 20:23:11 2020 kern.info kernel: [   84.780655] wlan0: deauthenticated from 00:a2:89:34:74:b3 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Thu Dec  3 20:23:11 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-DISCONNECTED bssid=00:a2:89:34:74:b3 reason=15
Thu Dec  3 20:23:11 2020 daemon.notice wpa_supplicant[1234]: wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Thu Dec  3 20:23:11 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="CAFEXWIFI" auth_failures=3 duration=30 reason=WRONG_KEY

The complete log is below:

Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.000000] Linux version 4.14.180 (builder@buildhost) (gcc version 7.5.0 (OpenWrt GCC 7.5.0 r11063-85e04e9f46)) #0 Sat May 16 18:32:20 2020
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000] MyLoader: sysp=9fefffa7, boardp=7ffdbab7, parts=2e7deff1
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] CPU0 revision is: 00019374 (MIPS 24Kc)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] SoC: Atheros AR9330 rev 1
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Determined physical RAM map:
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000]  memory: 04000000 @ 00000000 (usable)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Zone ranges:
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Movable zone start for each node
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Early memory node ranges
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000] On node 0 totalpages: 16384
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 804ecd30, node_mem_map 81000020
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000]   Normal zone: 128 pages used for memmap
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000]   Normal zone: 16384 pages, LIFO batch:3
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.000000] random: get_random_bytes called from 0x804f0740 with crng_init=0
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 16256
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.000000] Kernel command line:  board=TUBE2H console=ttyATH0,115200 mtdparts=spi0.0:256k(u-boot)ro,64k(u-boot-env)ro,15936k(firmware),64k(nvram),64k(art)ro rootfstype=squashfs noinitrd
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Writing ErrCtl register=00000000
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Readback ErrCtl register=00000000
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Memory: 59320K/65536K available (3949K kernel code, 199K rwdata, 516K rodata, 320K init, 212K bss, 6216K reserved, 0K cma-reserved)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] NR_IRQS: 51
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] Clocks: CPU:400.000MHz, DDR:400.000MHz, AHB:200.000MHz, Ref:25.000MHz
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 9556302233 ns
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.000013] sched_clock: 32 bits at 200MHz, resolution 5ns, wraps every 10737418237ns
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.007578] Calibrating delay loop... 265.42 BogoMIPS (lpj=1327104)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.092165] pid_max: default: 32768 minimum: 301
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.096892] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.102937] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.113049] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.121096] futex hash table entries: 256 (order: -1, 3072 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.128702] NET: Registered protocol family 16
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.133619] MIPS: machine is ALFA NETWORK Tube2H
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.407496] clocksource: Switched to clocksource MIPS
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.412498] NET: Registered protocol family 2
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.416570] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.422053] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.428053] TCP: Hash tables configured (established 1024 bind 1024)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.434310] UDP hash table entries: 256 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.439745] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.446015] NET: Registered protocol family 1
Thu Dec  3 20:22:02 2020 kern.debug kernel: [    0.449905] PCI: CLS 0 bytes, default 32
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    0.455462] Crashlog allocated RAM at address 0x3f00000
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.461109] workingset: timestamp_bits=30 max_order=14 bucket_order=0
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.473839] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.478096] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.501570] io scheduler noop registered
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.503940] io scheduler deadline registered (default)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.509527] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.518212] ar933x-uart: ttyATH0 at MMIO 0x18020000 (irq = 11, base_baud = 1562500) is a AR933X UART
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.526029] console [ttyATH0] enabled
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.532906] bootconsole [early0] disabled
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    0.550429] m25p80 spi0.0: found mx25l12805d, expected m25p80
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.555738] m25p80 spi0.0: mx25l12805d (16384 Kbytes)
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.559888] 5 cmdlinepart partitions found on MTD device spi0.0
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.565667] Creating 5 MTD partitions on "spi0.0":
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.570474] 0x000000000000-0x000000040000 : "u-boot"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.577575] 0x000000040000-0x000000050000 : "u-boot-env"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.584463] 0x000000050000-0x000000fe0000 : "firmware"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.605623] 2 uimage-fw partitions found on MTD device firmware
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.610166] 0x000000050000-0x0000001e0000 : "kernel"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.616165] 0x0000001e0000-0x000000fe0000 : "rootfs"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.621145] mtd: device 4 (rootfs) set to be root filesystem
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.625662] 1 squashfs-split partitions found on MTD device rootfs
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.631894] 0x000000440000-0x000000fe0000 : "rootfs_data"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.641317] 0x000000fe0000-0x000000ff0000 : "nvram"
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    0.646769] 0x000000ff0000-0x000001000000 : "art"
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.654502] libphy: Fixed MDIO Bus: probed
Thu Dec  3 20:22:02 2020 kern.info kernel: [    0.680121] libphy: ag71xx_mdio: probed
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.309310] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.1:04 [uid=004dd041, driver=Generic PHY]
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.317901] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: mii
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.325897] NET: Registered protocol family 10
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.336088] Segment Routing with IPv6
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.338526] NET: Registered protocol family 17
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.342806] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.356496] 8021q: 802.1Q VLAN Support v1.8
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.362381] hctosys: unable to open rtc device (rtc0)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.372091] VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
Thu Dec  3 20:22:02 2020 kern.info kernel: [    1.380245] Freeing unused kernel memory: 320K
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    1.383223] This architecture does not have kernel memory protection.
Thu Dec  3 20:22:02 2020 user.info kernel: [    2.297291] init: Console is alive
Thu Dec  3 20:22:02 2020 user.info kernel: [    2.299705] init: - watchdog -
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    2.537534] random: fast init done
Thu Dec  3 20:22:02 2020 user.info kernel: [    3.570412] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Thu Dec  3 20:22:02 2020 user.info kernel: [    3.649251] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Thu Dec  3 20:22:02 2020 user.info kernel: [    3.657030] init: - preinit -
Thu Dec  3 20:22:02 2020 kern.info kernel: [    4.460843] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    4.498003] random: procd: uninitialized urandom read (4 bytes read)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    6.569014] eth0: link up (100Mbps/Full duplex)
Thu Dec  3 20:22:02 2020 kern.info kernel: [    6.572183] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    7.949742] jffs2: notice: (405) jffs2_build_xattr_subsystem: complete building xattr subsystem, 26 of xdatum (3 unchecked, 23 orphan) and 87 of xref (44 dead, 0 orphan) found.
Thu Dec  3 20:22:02 2020 user.info kernel: [    7.965690] mount_root: switching to jffs2 overlay
Thu Dec  3 20:22:02 2020 kern.warn kernel: [    8.001858] overlayfs: upper fs does not support tmpfile.
Thu Dec  3 20:22:02 2020 user.warn kernel: [    8.013763] urandom-seed: Seeding with /etc/urandom.seed
Thu Dec  3 20:22:02 2020 kern.info kernel: [    8.280116] eth0: link down
Thu Dec  3 20:22:02 2020 user.info kernel: [    8.299768] procd: - early -
Thu Dec  3 20:22:02 2020 user.info kernel: [    8.301350] procd: - watchdog -
Thu Dec  3 20:22:02 2020 user.info kernel: [    9.007011] procd: - watchdog -
Thu Dec  3 20:22:02 2020 user.info kernel: [    9.009312] procd: - ubus -
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    9.147773] random: ubusd: uninitialized urandom read (4 bytes read)
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    9.154915] random: ubusd: uninitialized urandom read (4 bytes read)
Thu Dec  3 20:22:02 2020 kern.notice kernel: [    9.160569] random: ubusd: uninitialized urandom read (4 bytes read)
Thu Dec  3 20:22:02 2020 user.info kernel: [    9.167593] procd: - init -
Thu Dec  3 20:22:02 2020 user.info kernel: [   10.254052] kmodloader: loading kernel modules from /etc/modules.d/*
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.419635] ip6_tables: (C) 2000-2006 Netfilter Core Team
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.447678] Loading modules backported from Linux version v4.19.120-0-gfdc072324f3c
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.453886] Backport generated by backports.git v4.19.120-1-0-g60c3a249
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.481053] ip_tables: (C) 2000-2006 Netfilter Core Team
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.509187] nf_conntrack version 0.5.0 (1024 buckets, 4096 max)
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.680675] xt_time: kernel timezone is -0000
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.835857] PPP generic driver version 2.4.2
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.848954] NET: Registered protocol family 24
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954781] ath: EEPROM regdomain: 0x0
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954795] ath: EEPROM indicates default country code should be used
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954800] ath: doing EEPROM country->regdmn map search
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954821] ath: country maps to regdmn code: 0x3a
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954829] ath: Country alpha2 being used: US
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.954834] ath: Regpair used: 0x3a
Thu Dec  3 20:22:02 2020 kern.debug kernel: [   10.969656] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Thu Dec  3 20:22:02 2020 kern.info kernel: [   10.972618] ieee80211 phy0: Atheros AR9330 Rev:1 mem=0xb8100000, irq=2
Thu Dec  3 20:22:02 2020 user.info kernel: [   11.148106] kmodloader: done loading kernel modules from /etc/modules.d/*
Thu Dec  3 20:22:02 2020 user.info kernel: [   11.351422] urngd: v1.0.2 started.
Thu Dec  3 20:22:02 2020 kern.notice kernel: [   12.184166] random: crng init done
Thu Dec  3 20:22:02 2020 kern.notice kernel: [   12.186126] random: 6 urandom warning(s) missed due to ratelimiting
Thu Dec  3 20:22:04 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Dec  3 20:22:05 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Dec  3 20:22:05 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain hotspot.internet-for-guests.com
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: started, version 2.80 cachesize 150
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: DNS service limited to local subnets
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain test
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain onion
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain localhost
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain local
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain invalid
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain bind
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: using local addresses only for domain lan
Thu Dec  3 20:22:06 2020 daemon.warn dnsmasq[786]: no servers found in /tmp/resolv.conf.auto, will retry
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: read /etc/hosts - 4 addresses
Thu Dec  3 20:22:06 2020 daemon.info dnsmasq[786]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: 8021ad
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: 8021q
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: macvlan
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: veth
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: bridge
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: Network device
Thu Dec  3 20:22:09 2020 user.notice : Added device handler type: tunnel
Thu Dec  3 20:22:12 2020 kern.info kernel: [   26.141852] br-lan: port 1(eth0) entered blocking state
Thu Dec  3 20:22:12 2020 kern.info kernel: [   26.145637] br-lan: port 1(eth0) entered disabled state
Thu Dec  3 20:22:12 2020 kern.info kernel: [   26.151365] device eth0 entered promiscuous mode
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'lan' is enabled
Thu Dec  3 20:22:12 2020 kern.info kernel: [   26.179453] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'lan' is setting up now
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'lan' is now up
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'loopback' is enabled
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'loopback' is setting up now
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'loopback' is now up
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Network device 'lo' link is up
Thu Dec  3 20:22:12 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
Thu Dec  3 20:22:14 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Thu Dec  3 20:22:14 2020 kern.info kernel: [   28.329132] eth0: link up (100Mbps/Full duplex)
Thu Dec  3 20:22:14 2020 kern.info kernel: [   28.332275] br-lan: port 1(eth0) entered blocking state
Thu Dec  3 20:22:14 2020 kern.info kernel: [   28.337431] br-lan: port 1(eth0) entered forwarding state
Thu Dec  3 20:22:14 2020 daemon.notice netifd: Network device 'eth0' link is up
Thu Dec  3 20:22:14 2020 daemon.notice netifd: bridge 'br-lan' link is up
Thu Dec  3 20:22:14 2020 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Dec  3 20:22:14 2020 kern.info kernel: [   28.429732] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Thu Dec  3 20:22:15 2020 kern.info kernel: [   29.272035] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Thu Dec  3 20:22:16 2020 user.info travelmate-1.5.4[971]: travelmate is currently disabled, please set 'trm_enabled' to '1' to use this service
Thu Dec  3 20:22:17 2020 authpriv.info dropbear[1133]: Not backgrounding
Thu Dec  3 20:22:17 2020 daemon.notice wpa_supplicant[1107]: Successfully initialized wpa_supplicant
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Thu Dec  3 20:22:20 2020 daemon.notice netifd: Interface 'wwan' is enabled
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Thu Dec  3 20:22:20 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Thu Dec  3 20:22:21 2020 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Thu Dec  3 20:22:21 2020 daemon.notice wpa_supplicant[1234]: wlan0: SME: Trying to authenticate with 00:a2:89:34:74:b3 (SSID='CAFEXWIFI' freq=2462 MHz)
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.717868] wlan0: authenticate with 00:a2:89:34:74:b3
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.732985] wlan0: send auth to 00:a2:89:34:74:b3 (try 1/3)
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.740546] wlan0: authenticated
Thu Dec  3 20:22:21 2020 daemon.notice wpa_supplicant[1234]: wlan0: Trying to associate with 00:a2:89:34:74:b3 (SSID='CAFEXWIFI' freq=2462 MHz)
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.767692] wlan0: associate with 00:a2:89:34:74:b3 (try 1/3)
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.778040] wlan0: RX AssocResp from 00:a2:89:34:74:b3 (capab=0x411 status=0 aid=2)
Thu Dec  3 20:22:21 2020 kern.info kernel: [   34.784733] wlan0: associated
Thu Dec  3 20:22:21 2020 daemon.notice wpa_supplicant[1234]: wlan0: Associated with 00:a2:89:34:74:b3
Thu Dec  3 20:22:21 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Thu Dec  3 20:22:21 2020 daemon.notice netifd: Network device 'wlan0' link is up
Thu Dec  3 20:22:21 2020 daemon.notice netifd: Interface 'wwan' has link connectivity
Thu Dec  3 20:22:21 2020 daemon.notice netifd: Interface 'wwan' is setting up now
Thu Dec  3 20:22:21 2020 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Thu Dec  3 20:22:21 2020 daemon.notice netifd: wwan (1300): udhcpc: started, v1.30.1
Thu Dec  3 20:22:22 2020 daemon.notice netifd: wwan (1300): udhcpc: sending discover
Thu Dec  3 20:22:22 2020 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Thu Dec  3 20:22:22 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Thu Dec  3 20:22:22 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Thu Dec  3 20:22:25 2020 daemon.notice netifd: wwan (1300): udhcpc: sending discover
Thu Dec  3 20:22:25 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[786]: exiting on receipt of SIGTERM
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: started, version 2.80 cachesize 150
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: DNS service limited to local subnets
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq-dhcp[1412]: DHCP, IP range 192.168.3.100 -- 192.168.3.249, lease time 12h
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain test
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain onion
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain localhost
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain local
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain invalid
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain bind
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: using local addresses only for domain lan
Thu Dec  3 20:22:26 2020 daemon.warn dnsmasq[1412]: no servers found in /tmp/resolv.conf.auto, will retry
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: read /etc/hosts - 4 addresses
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq-dhcp[1412]: read /etc/ethers - 0 addresses
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: read /etc/hosts - 4 addresses
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq[1412]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Dec  3 20:22:26 2020 daemon.info dnsmasq-dhcp[1412]: read /etc/ethers - 0 addresses
Thu Dec  3 20:22:27 2020 daemon.notice netifd: Network device 'wlan0' link is down
Thu Dec  3 20:22:27 2020 daemon.notice netifd: Interface 'wwan' has link connectivity loss
Thu Dec  3 20:22:27 2020 kern.info kernel: [   40.783609] wlan0: deauthenticated from 00:a2:89:34:74:b3 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Thu Dec  3 20:22:27 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-DISCONNECTED bssid=00:a2:89:34:74:b3 reason=15
Thu Dec  3 20:22:27 2020 daemon.notice wpa_supplicant[1234]: wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Thu Dec  3 20:22:27 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="CAFEXWIFI" auth_failures=1 duration=10 reason=WRONG_KEY
Thu Dec  3 20:22:27 2020 daemon.notice netifd: wwan (1300): udhcpc: received SIGTERM
Thu Dec  3 20:22:27 2020 daemon.notice netifd: Interface 'wwan' is now down
Thu Dec  3 20:22:27 2020 daemon.notice netifd: Interface 'wwan' is disabled
Thu Dec  3 20:22:27 2020 daemon.notice netifd: Interface 'wwan' is enabled
Thu Dec  3 20:22:28 2020 daemon.info procd: - init complete -
Thu Dec  3 20:22:31 2020 daemon.info dnsmasq[1412]: read /etc/hosts - 4 addresses
Thu Dec  3 20:22:31 2020 daemon.info dnsmasq[1412]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Dec  3 20:22:31 2020 daemon.info dnsmasq-dhcp[1412]: read /etc/ethers - 0 addresses
Thu Dec  3 20:22:31 2020 daemon.err uhttpd[1200]: luci: accepted login on / for root from 192.168.3.128
Thu Dec  3 20:22:38 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="CAFEXWIFI"
Thu Dec  3 20:22:38 2020 daemon.notice wpa_supplicant[1234]: wlan0: SME: Trying to authenticate with 00:a2:89:34:74:b3 (SSID='CAFEXWIFI' freq=2462 MHz)
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.749277] wlan0: authenticate with 00:a2:89:34:74:b3
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.764404] wlan0: send auth to 00:a2:89:34:74:b3 (try 1/3)
Thu Dec  3 20:22:38 2020 daemon.notice wpa_supplicant[1234]: wlan0: Trying to associate with 00:a2:89:34:74:b3 (SSID='CAFEXWIFI' freq=2462 MHz)
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.782949] wlan0: authenticated
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.797640] wlan0: associate with 00:a2:89:34:74:b3 (try 1/3)
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.807988] wlan0: RX AssocResp from 00:a2:89:34:74:b3 (capab=0x411 status=0 aid=2)
Thu Dec  3 20:22:38 2020 kern.info kernel: [   51.814703] wlan0: associated
Thu Dec  3 20:22:38 2020 daemon.notice wpa_supplicant[1234]: wlan0: Associated with 00:a2:89:34:74:b3
Thu Dec  3 20:22:38 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Thu Dec  3 20:22:38 2020 daemon.notice netifd: Network device 'wlan0' link is up
Thu Dec  3 20:22:38 2020 daemon.notice netifd: Interface 'wwan' has link connectivity
Thu Dec  3 20:22:38 2020 daemon.notice netifd: Interface 'wwan' is setting up now
Thu Dec  3 20:22:38 2020 daemon.notice netifd: wwan (1706): udhcpc: started, v1.30.1
Thu Dec  3 20:22:38 2020 daemon.notice netifd: wwan (1706): udhcpc: sending discover
Thu Dec  3 20:22:41 2020 daemon.notice netifd: wwan (1706): udhcpc: sending discover
Thu Dec  3 20:22:44 2020 kern.info kernel: [   57.809066] wlan0: deauthenticated from 00:a2:89:34:74:b3 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Thu Dec  3 20:22:44 2020 daemon.notice netifd: Network device 'wlan0' link is down
Thu Dec  3 20:22:44 2020 daemon.notice netifd: Interface 'wwan' has link connectivity loss
Thu Dec  3 20:22:44 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-DISCONNECTED bssid=00:a2:89:34:74:b3 reason=15
Thu Dec  3 20:22:44 2020 daemon.notice wpa_supplicant[1234]: wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Thu Dec  3 20:22:44 2020 daemon.notice wpa_supplicant[1234]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="CAFEXWIFI" auth_failures=2 duration=20 reason=WRONG_KEY

I assume you read it is complaining about a wrong key, and you verified it. So, also assuming that this worked before, my first bet is that the owner of the cafe thinks that you are abusing his AP, and has decided to ban your router.

You might try to use another WiFi-MAC in the ALFA. But, in case the owner of the Cafe blocked your org MAC because of high traffic, he will do so again for the new MAC.
Only reasonable solution: Use a 4G-router as backup. Good idea for a boat, anyway :slight_smile:

Thanks for the responses. I know the key (wifi password?) works because I use it on my laptop and smartphone. In any event, I think they're talking about a pre-shared key, which I understand is different than the hotspot password.

It doesn't make sense that my Alfa Tube 2HP was banned because I was never able to connect long enough to even check email. When I said it worked perfectly for months, I meant it worked perfectly at other locations for other hotspots. The Alfa Tube on Open-WRT just doesn't work for this hotspot, while my devices connect just fine.

Is there a way to adjust the handshake timeout?

please take a look at your travelmate, i never used that, so i m not sure, but i see in your log that you have it.

Thanks, I disabled that and have been using the standard way to add this access point.

@wifiatsea, welcome to the communioty!

Just an FYI:

To clear up what you do and do not have:

(BTW, theft of service is a crime in most US jurisdictions...so if you're referring to agreeing to their terms of service on a captive portal page...or their ISP's, beware.)

And yes, they could be block MACs that are commonly routers and network devices (e.g. one could safely exclude let's say Juniper or Cisco MACs). They could also exclude you by seeing differing TTLs on the packets (meaning some passed a router :wink:).

No, unless you control the cafe's WiFi and can flash firmware that had such an incompatible (and maybe illegal) setting.

I have seen the "possible PSK mismatch" once when the key did match. It was on a Raspberry Pi 4 (Broadcom chip) as client of a TP-Link Archer A7 (ath10k chip). Having the AP set for optional Management Frame Protection (option ieee8211w 1) caused the Pi station to fail to connect with errors like the OP reported. This should not cause a fail to connect but it did. Reconfiguring the AP for no MFP allowed the Pi to connect.

I kind of doubt that is the issue here-- though early ath9k chips do not support MFP and might have similar problems. If you don't control the AP there isn't much you can do. Do iw dev wlan0 scan to see what the AP is advertising.

1 Like

We definitely have the permission of the AP owner to use their wifi. It's part of what we're paying for to be at this location. In no way is it "theft of service". In fact, I've asked for their help because our devices have trouble connecting and we're trying to get our Alfa Tube 2h extender to allow us to use the wifi that we're paying for. They were even less technical than I am, so no help there.

Mike - I ran the scan you suggested. here's what I see:

BSS 00:a2:89:34:74:b3(on wlan0)

TSF: 8718464933544 usec (100d, 21:47:44)

freq: 2462

beacon interval: 100 TUs

capability: ESS (0x0411)

signal: -45.00 dBm

last seen: 20 ms ago

Information elements from Probe Response frame:

SSID: CAFEXWIFI

RSN: * Version: 1

  • Group cipher: CCMP

  • Pairwise ciphers: CCMP

  • Authentication suites: PSK

  • Capabilities: 16-PTKSA-RC 1-GTKSA-RC MFP-capable (0x008c)

  • 0 PMKIDs

  • Group mgmt cipher suite: AES-128-CMAC

HT capabilities:

Capabilities: 0x80d

RX LDPC

HT20

SM Power Save disabled

No RX STBC

Max AMSDU length: 7935 bytes

No DSSS/CCK HT40

Maximum RX AMPDU length 65535 bytes (exponent: 0x003)

Minimum RX AMPDU time spacing: 4 usec (0x05)

HT RX MCS rate indexes supported: 0-23

HT TX MCS rate indexes are undefined

HT operation:

  • primary channel: 11

  • secondary channel offset: no secondary

  • STA channel width: 20 MHz

Any thoughts?

you said that the tube is able to connect to other ssid, also you said that your phone will connect at this cafe ssid and thatn disconnect like the tube.
at this point the problem is the bar AP , try to reboot it.

2 Likes

Your scan has the RSSI from the CAFE AP at -45 which is very strong. Generally, signals above -70 are fully usable and above -60 is ideal.

I just tested the MFP scenario again on an old ath9k device (WNR2000v1, ar9100 chip) as the client and it did not have a problem when the AP was running "MFP-capable". So I don't think it's that.

The Tube-2 HP is listed as having an AR9331 which is newer and should be highly compatible. Actually you could install the full wpad and turn MFP on. MFP protects against a type of DoS attack involving fake deauthenticate requests transmitted by a malicious actor within wifi range.

Mike -

The noise level here is quite high, around -74, if that makes a difference. I understand that as long as you have a 20db spread between signal and noise, you're in good shape.

I'm in a catch22 since I can't connect to the internet to use the luci based package downloader. Also my Tube 2HP is on the top of my mast (with a 8dbi antenna) so it won't connect to my smartphone hotspot below it.. I believe that's because of the radiation pattern of the antenna.

Can I download full wpad on my laptop and then install via Luci?

I think a manual .ipk file install requires CLI.

Also this procedure is a little risky since you have to remove wpad-basic first, and if you get left without wpad there is no way to run wifi at all.

Having the phone outside should be enough signal even if not in line with the antenna. If there's that much 2.4 noise in the area that could be the problem all along.

Here's what I've found so far:
This is the version of wpad that is installed, per the luci based opkg

wpad-basic
2019-08-08-ca8c2bd2-3

These are the download links I've found:

https://pkgs.org/download/wpad

Any idea which is the correct one for my AR9331? Do I need to uninstall wpad-basic first?

Are there other packages I need to install also?

Sorry for asking what you probably consider to be quite basic questions.

yes

that is strange

Read /etc/opkg/distfeeds.conf to find the server URL, which will be under downloads.openwrt.org not a third party. The wpad package will be in the basic section. Load this /basic URL into your browser and find wpad in the directory that appears.

Yes that's really strange. If you take a hotspotted smartphone outside the cabin so it has a line of sight to the Tube-2 antenna with no metal, it should connect easily even though it isn't directly in the plane of the antenna.

Bricco -

In my experience, the radiation pattern of a 8dbi antenna is quite "compressed" in the vertical plane. Note that my antenna is around 20m/70ft up in the air on top of the mast.

https://www.radiolabs.com/product-tag/omni-wifi-antenna/

So when I'm in a location and trying to connect to a very close hotspot, my antenna will not see it. However, if the hotspot is a bit further away, it works great. The reason I have it that high is that earlier when I had it quite low, neighboring boats and even my solar panels would interrupt coverage. Something about the panels being in the Fresnel zone.

In any event, that means if I'm standing directly below the antenna with my mobile phone hotspot, my Tube 2hp will not pick it up. But it will see a hotspot 1/2 a mile away!

1 Like

Hi, I didn't read all the responses here but I've been using the AlphaTube2H continuously for over 3 years. I liked the 18.06.04 firmware release for it better than my 19.07.4. Seemed more stable. Are you using a dish or directional antenna at the top of the mast that overshoots the cafe? The routers now days have little saucer shaped beams that you may be totally off the plane of them if you also have a directional antenna at 20' in the air. I just use scan feature to find a signal and I connect and enter the password. More than a couple of occasions recently the local wifi is blocking device MAC that are mfgs other than laptops or smart phones eg. if they are anything outside of a specific mac number range. What I have done is added a line to dummy up a mac address of a smart phone, what they typically like connecting to their network. It's in /etc/config/network add to the wan block using a mac a few numbers off that you see your cell phone using

config interface 'wan'
	option macaddr 'xx:xx:xx:xx:xx:xx'

*** Never experienced a block after adding this macaddr line. Have run into 5G only so if you hear of any combination of OpenWRT with a Alfa or Ubuiquity tube that sports 5G client support, let me know.

Maybe you need my "backpacker special" it is a 17db 2.4Ghz PVC yagi connected to an Alpha wireless USB network adapter with chip Atheros AR9271 that pulls in remote wifi signals, connects as client and feeds via a heavy power & data USB cable into GL-AR300M that re-transmits the signal to other devices in the vicinity.

Don,

Can I set the mac address though Luci using:

Network->Interfaces->WWAN->Advanced Settings->Override MAC Address

Would that achieve the same thing as your command line edit?

Also, I use an omni antenna. The boat moves too much to point a directional.