I use an EA8500. I updated it from version 21.x.x to 23.05.0 . Ever since that update, phones that either have a normal android install or phones installed with LineageOS now mention that the wifi has a sign in and bring up a Captive Portal. These devices did not update and only the EA8500 was updated. That is what started this. This Captive Portal prompt does not occur on a GrapheneOS phone.
The captive portal is nothing more then a black screen with a title bar. The title bar says "Sign in to (RouterName)." Below it is the URL www.google.com . To the right is a three dot menu. If you click on it then it gives the option to connect or to not connect.
The internet works regardless of doing any action with the Captive Portal. The Captive Portal does prevent auto-connect from working on android phones unless you turn off the notification. Thus you have to manually connect so that the phones connect to the wifi if the notification is left on.
I have been trying to figure out what is causing this captive portal so I could stop it. I was told by S1h that the forums would be the best place to bring this up since this sounds like a rarer bug.
Did you install a captive portal on your router?
Or is there one on your upstream connection?
Likewise, do you have any DNS filtering (adblock, etc.) happening?
On the surface, this doesn't seem like an OpenWrt bug, but with more information, maybe we can figure out what is happening.
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
There is no captive portal installed on the router. There is an adblock on a more upstream router. I was told if the phone thinks it has no internet it can throw a captive portal. I have never seen this in practice though. I do have the issue with my phones thinking they have no internet because they do the check before the VPN on the phones connects. I do not think this problem is just phone related though. The captive portal never came up until after I updated the router. The captive portal prevents auto-connecting to wifi.
config defaults
option syn_flood 1
option input ACCEPT
option output ACCEPT
option forward REJECT
# Uncomment this line to disable ipv6 rules
# option disable_ipv6 1
config zone
option name lan
list network 'lan'
option input ACCEPT
option output ACCEPT
option forward ACCEPT
config zone
option name wan
list network 'wan'
list network 'wan6'
option input REJECT
option output ACCEPT
option forward REJECT
option masq 1
option mtu_fix 1
config forwarding
option src lan
option dest wan
# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
option name Allow-DHCP-Renew
option src wan
option proto udp
option dest_port 68
option target ACCEPT
option family ipv4
# Allow IPv4 ping
config rule
option name Allow-Ping
option src wan
option proto icmp
option icmp_type echo-request
option family ipv4
option target ACCEPT
config rule
option name Allow-IGMP
option src wan
option proto igmp
option family ipv4
option target ACCEPT
# Allow DHCPv6 replies
# see https://dev.openwrt.org/ticket/10381
config rule
option name Allow-DHCPv6
option src wan
option proto udp
option src_ip fc00::/6
option dest_ip fc00::/6
option dest_port 546
option family ipv6
option target ACCEPT
config rule
option name Allow-MLD
option src wan
option proto icmp
option src_ip fe80::/10
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family ipv6
option target ACCEPT
# Allow essential incoming IPv6 ICMP traffic
config rule
option name Allow-ICMPv6-Input
option src wan
option proto icmp
list icmp_type echo-request
list icmp_type echo-reply
list icmp_type destination-unreachable
list icmp_type packet-too-big
list icmp_type time-exceeded
list icmp_type bad-header
list icmp_type unknown-header-type
list icmp_type router-solicitation
list icmp_type neighbour-solicitation
list icmp_type router-advertisement
list icmp_type neighbour-advertisement
option limit 1000/sec
option family ipv6
option target ACCEPT
# Allow essential forwarded IPv6 ICMP traffic
config rule
option name Allow-ICMPv6-Forward
option src wan
option dest *
option proto icmp
list icmp_type echo-request
list icmp_type echo-reply
list icmp_type destination-unreachable
list icmp_type packet-too-big
list icmp_type time-exceeded
list icmp_type bad-header
list icmp_type unknown-header-type
option limit 1000/sec
option family ipv6
option target ACCEPT
config rule
option name Allow-IPSec-ESP
option src wan
option dest lan
option proto esp
option target ACCEPT
config rule
option name Allow-ISAKMP
option src wan
option dest lan
option dest_port 500
option proto udp
option target ACCEPT
# include a file with users custom iptables rules
config include
option path /etc/firewall.user
### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
# option src lan
# option src_ip 192.168.45.2
# option dest wan
# option proto tcp
# option target REJECT
# block a specific mac on wan
#config rule
# option dest wan
# option src_mac 00:11:22:33:44:66
# option target REJECT
# block incoming ICMP traffic on a zone
#config rule
# option src lan
# option proto ICMP
# option target DROP
# port redirect port coming in on wan to lan
#config redirect
# option src wan
# option src_dport 80
# option dest lan
# option dest_ip 192.168.16.235
# option dest_port 80
# option proto tcp
# port redirect of remapped ssh port (22001) on wan
#config redirect
# option src wan
# option src_dport 22001
# option dest lan
# option dest_port 22
# option proto tcp
### FULL CONFIG SECTIONS
#config rule
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 80
# option dest wan
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
# option target REJECT
#config redirect
# option src lan
# option src_ip 192.168.45.2
# option src_mac 00:11:22:33:44:55
# option src_port 1024
# option src_dport 80
# option dest_ip 194.25.2.129
# option dest_port 120
# option proto tcp
I reset the router and I am trying to figure out what I did to turn it into a AP that extends an existing network. Essentially trying to make all wireless and lan clients acting like their connecting to main router and not OpenWRT router. OpenWRT connects to main router via ethernet.
Try adding a DHCP(v4) option 114 to the server that serves the phone, advertising that the network is not captive. list dhcp_option '114, urn:ietf:params:capport:unrestricted'
A recent OS receiving this option should treat the connection as always having Internet and not probe for captive portals. This of course is not implemented on all OS.
I don't think that this should be necessary.... the original configuration was very much invalid, so it would have produced entirely unexpected results. Now that the OP has reset the device and is working towards a dumb AP config, it should be fine.
I see in the guide it talked about connecting LAN to LAN which is what I am not doing. I am connecting the WAN port of OpenWRT to the LAN port of the network. I am using and EA8500 so I am trying to figure out which configuration applies.
If you want to use the wan port (physically speaking, to have an extra port), that can be done, but let's focus on the lan-lan connection now and then we'll address that later.
No, as above, please connect lan-lan if you want this to be a dumb AP.
The dumb AP guide applies to almost all APs, including the EA8500.
I tried setting up the LAN portion. I can get internet and access other devices on the network through the OpenWRT router but the OpenWRT router itself becomes unreachable.
Main router has OpenWRT router set to a static IP. OpenWRT router is set to same IP under LAN interface. DHCP server turn off on OpenWRT. DNS set to main router ip.
Apparently taking the power down on my entire network fixed it. I can now access the OpenWRT router again. I have everything working as I want it now except for the WAN port acting like another LAN port.
Great.
Now we can get the wan port working as you want...
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have: