Brief Wifi disconnect troubleshooting due to router unexpected router reboots

hello all,

I noticed my WiFi drops for all my devices for a minute time to time. Looks like my OpenWrt One reboots unexpectedly.

WiFI dropped just a few minutes ago, I fetched the logs this time and decided to post here. The system logs show reboot if I am not mistaken:

I live in NZ so router time Tue Nov 25 06:09:44 2025 → Tue Nov 25 19:09:44 NZDT 2025 (the same time as my WiFi hotspot disappeared and came back online)

uptime

root@OpenWrt:~# uptime
 06:45:42 up 36 min,  load average: 0.00, 0.00, 0.00

logs

Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd034]
Tue Nov 25 06:09:44 2025 kern.notice kernel: [    0.000000] Linux version 6.6.73 (builder@buildhost) (aarch64-openwrt-linux-musl-gcc (OpenWrt GCC 13.3.0 r28427-6df0e3d02a) 13.3.0, GNU ld (GNU Binutils) 2.42) #0 SMP Mon Feb  3 23:09:37 2025
Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] Machine model: OpenWrt One
Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] OF: reserved mem: 0x0000000042ff0000..0x0000000042ffffff (64 KiB) map non-reusable ramoops@42ff0000
Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] OF: reserved mem: 0x0000000043000000..0x000000004302ffff (192 KiB) nomap non-reusable secmon@43000000
Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] OF: reserved mem: 0x0000000047c80000..0x0000000047d7ffff (1024 KiB) nomap non-reusable wmcpu-reserved@47c80000
Tue Nov 25 06:09:44 2025 kern.info kernel: [    0.000000] OF: reserved mem: 0x0000000047d80000..0x0000000047dbffff (256 KiB) nomap non-reusable wo-emi@47d80000
....
Tue Nov 25 06:15:46 2025 authpriv.notice dropbear[4205]: Auth succeeded with blank password for 'root' from 192.168.1.204:39382

(I know I should set root password and update OpenWRT to latest).

My old router has never done this, so it is not a power supply issue. What will be the next step troubleshooting the issue?

My configs are basic - VLAN tag10, one SSID, one static IP, one dnsmasq rule for my home server.

ubus call system board
{
	"kernel": "6.6.73",
	"hostname": "OpenWrt",
	"system": "ARMv8 Processor rev 4",
	"model": "OpenWrt One",
	"board_name": "openwrt,one",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "24.10.0",
		"revision": "r28427-6df0e3d02a",
		"target": "mediatek/filogic",
		"description": "OpenWrt 24.10.0 r28427-6df0e3d02a",
		"builddate": "1738624177"
	}
}
root@OpenWrt:~# cat /etc/openwrt_release
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='24.10.0'
DISTRIB_REVISION='r28427-6df0e3d02a'
DISTRIB_TARGET='mediatek/filogic'
DISTRIB_ARCH='aarch64_cortex-a53'
DISTRIB_DESCRIPTION='OpenWrt 24.10.0 r28427-6df0e3d02a'
DISTRIB_TAINTS=''
uci export system
package system

config system
	option hostname 'OpenWrt'
	option timezone 'UTC'
	option ttylogin '0'
	option log_size '128'
	option urandom_seed '0'

config timeserver 'ntp'
	option enabled '1'
	option enable_server '0'
	list server '0.openwrt.pool.ntp.org'
	list server '1.openwrt.pool.ntp.org'
	list server '2.openwrt.pool.ntp.org'
	list server '3.openwrt.pool.ntp.org'

config led 'led_wanact'
	option name 'WANACT'
	option sysfs 'mdio-bus:0f:green:wan'
	option trigger 'netdev'
	option mode 'rx tx'
	option dev 'eth0'

config led 'led_wanlink'
	option name 'WANLINK'
	option sysfs 'mdio-bus:0f:amber:wan'
	option trigger 'netdev'
	option mode 'link'
	option dev 'eth0'

config led 'led_lanact'
	option name 'LANACT'
	option sysfs 'green:lan'
	option trigger 'netdev'
	option mode 'rx tx'
	option dev 'eth1'

config led 'led_lanlink'
	option name 'LANLINK'
	option sysfs 'amber:lan'
	option trigger 'netdev'
	option mode 'link'
	option dev 'eth1'
uci export network
package network

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fdff:ca1b:d5dd::/48'
	option packet_steering '1'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option ipaddr '192.168.1.1'
	option netmask '255.255.255.0'
	option ip6assign '60'

config interface 'wan'
	option device 'eth0.10'
	option proto 'dhcp'

config interface 'wan6'
	option device 'eth0.10'
	option proto 'dhcpv6'
	option reqaddress 'try'
	option reqprefix 'auto'
	option norelease '1'

config device
	option type '8021q'
	option ifname 'eth0'
	option vid '10'
	option name 'eth0.10'
uci export wireless
package wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option path 'platform/soc/18000000.wifi'
	option band '2g'
	option channel '1'
	option htmode 'HE20'
	option num_global_macaddr '7'
	option country 'NZ'
	option cell_density '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid '...........'
	option encryption 'psk2'
	option key '.............'

config wifi-device 'radio1'
	option type 'mac80211'
	option path 'platform/soc/18000000.wifi+1'
	option band '5g'
	option channel '36'
	option htmode 'HE80'
	option num_global_macaddr '7'
	option disabled '1'

config wifi-iface 'default_radio1'
	option device 'radio1'
	option network 'lan'
	option mode 'ap'
	option ssid 'OpenWrt'
	option encryption 'none'
uci export dhcp
package dhcp

config dnsmasq
	option domainneeded '1'
	option boguspriv '1'
	option filterwin2k '0'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option domain 'lan'
	option expandhosts '1'
	option nonegcache '0'
	option cachesize '1000'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option nonwildcard '0'
	option localservice '1'
	option ednspacket_max '1232'
	option filter_aaaa '0'
	option filter_a '0'
	list address '/soyspray.vip/192.168.1.20'
	list rebind_domain 'soyspray.vip'
	option local_ttl '30'
	list server '1.1.1.1'
	list server '8.8.8.8'

config dhcp 'lan'
	option interface 'lan'
	option start '100'
	option limit '150'
	option leasetime '12h'
	option dhcpv4 'server'
	option dhcpv6 'server'
	option ra 'server'
	option ra_slaac '1'
	list ra_flags 'managed-config'
	list ra_flags 'other-config'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

config host
	option name 'node-0'
	option mac '98:fa:9b:12:9d:6d'
	option ip '192.168.1.10'
	option dns '1'
	option leasetime 'infinite'

start by upgrading to latest stable.

1 Like

+Set country and enable same AP in both bands.

1 Like

this is done thanks

ssh root@192.168.1.1


BusyBox v1.36.1 (2025-10-19 16:37:45 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 24.10.4, r28959-29397011cc
1 Like

Now set both countries + add AP and check logread -e hostap after the glitch.

I couldn't enable the 5G spot, not sure why - I just removed it from the LuCi interface.

root@OpenWrt:~# uci export wireless
package wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option path 'platform/soc/18000000.wifi'
	option band '2g'
	option channel '1'
	option htmode 'HE20'
	option num_global_macaddr '7'
	option country 'NZ'
	option cell_density '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid '......'
	option encryption 'psk2'
	option key '.....'

config wifi-device 'radio1'
	option type 'mac80211'
	option path 'platform/soc/18000000.wifi+1'
	option band '5g'
	option channel '36'
	option htmode 'HE80'
	option num_global_macaddr '7'
	option disabled '1'
	option cell_density '0'
	option country 'NZ'

So now I have NZ and ap set with only one spot. The firwmare is also latest.

Will monitor the reboots

Add same AP (network + authentication) in 5ghz too. Some devices just like to jump bands.

Was this parameter changed when attempting?

Yes, tried to set 0 in the cli and in the GUI.

Not sure what was wrong with the second radio, I just removed it.

Will monitor the reboots.

Set and save parameters and press "enable" button, NZ is DFS, so other channels and 160MHz become available 1-10min from router start.

Thanks all,

I will experiment with recreating the 5G hotspot as the second priority. Will see if another restart happens within a few days.

There were no restarts for 24hrs.

I installed Tailscale and configured access to my home network which should not affect reboots.

Just came back home from work, got a reboot an hour ago:

root@OpenWrt:~# uptime
 04:47:02 up  1:09,  load average: 0.00, 0.00, 0.00
root@OpenWrt:~# logread -e hostap
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: Set new config for phy phy0:
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: Set new config for phy phy0: /var/run/hostapd-phy0.conf
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: Restart interface for phy phy0
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: Configuration file: <inline> (phy phy0) --> new PHY
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: Configuration file: Reading configuration file '<inline>'
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: phy0-ap0: interface state COUNTRY_UPDATE->ENABLED
Thu Nov 27 03:38:04 2025 daemon.notice hostapd: phy0-ap0: AP-ENABLED
Thu Nov 27 03:38:05 2025 daemon.info hostapd: phy0-ap0: STA e0:85:4d:70:a0:f3 IEEE 802.11: authenticated
Thu Nov 27 03:38:05 2025 daemon.info hostapd: phy0-ap0: STA e0:85:4d:70:a0:f3 IEEE 802.11: associated (aid 1)
Thu Nov 27 03:38:05 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e0:85:4d:70:a0:f3 auth_alg=open
Thu Nov 27 03:38:05 2025 daemon.info hostapd: phy0-ap0: STA e0:85:4d:70:a0:f3 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:05 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e0:85:4d:70:a0:f3
Thu Nov 27 03:38:07 2025 daemon.info hostapd: phy0-ap0: STA 5c:a6:e6:9a:2d:c6 IEEE 802.11: authenticated
Thu Nov 27 03:38:07 2025 daemon.info hostapd: phy0-ap0: STA 5c:a6:e6:9a:2d:c6 IEEE 802.11: associated (aid 2)
Thu Nov 27 03:38:07 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 5c:a6:e6:9a:2d:c6 auth_alg=open
Thu Nov 27 03:38:07 2025 daemon.info hostapd: phy0-ap0: STA 5c:a6:e6:9a:2d:c6 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:07 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 5c:a6:e6:9a:2d:c6
Thu Nov 27 03:38:09 2025 daemon.info hostapd: phy0-ap0: STA 00:5f:67:51:4c:a5 IEEE 802.11: authenticated
Thu Nov 27 03:38:09 2025 daemon.info hostapd: phy0-ap0: STA 00:5f:67:51:4c:a5 IEEE 802.11: associated (aid 3)
Thu Nov 27 03:38:09 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 00:5f:67:51:4c:a5 auth_alg=open
Thu Nov 27 03:38:09 2025 daemon.info hostapd: phy0-ap0: STA 00:5f:67:51:4c:a5 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:09 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 00:5f:67:51:4c:a5
Thu Nov 27 03:38:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 IEEE 802.11: authenticated
Thu Nov 27 03:38:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 IEEE 802.11: associated (aid 4)
Thu Nov 27 03:38:12 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 70:c9:32:09:70:26 auth_alg=open
Thu Nov 27 03:38:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:12 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 70:c9:32:09:70:26
Thu Nov 27 03:38:18 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: authenticated
Thu Nov 27 03:38:18 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: associated (aid 5)
Thu Nov 27 03:38:18 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 50:b1:27:70:a3:83 auth_alg=open
Thu Nov 27 03:38:18 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:18 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 50:b1:27:70:a3:83
Thu Nov 27 03:38:24 2025 daemon.info hostapd: phy0-ap0: STA fc:b9:7e:9c:6e:45 IEEE 802.11: authenticated
Thu Nov 27 03:38:24 2025 daemon.info hostapd: phy0-ap0: STA fc:b9:7e:9c:6e:45 IEEE 802.11: associated (aid 6)
Thu Nov 27 03:38:24 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED fc:b9:7e:9c:6e:45 auth_alg=open
Thu Nov 27 03:38:24 2025 daemon.info hostapd: phy0-ap0: STA fc:b9:7e:9c:6e:45 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:24 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED fc:b9:7e:9c:6e:45
Thu Nov 27 03:38:27 2025 daemon.info hostapd: phy0-ap0: STA 26:e6:20:74:d4:bc IEEE 802.11: authenticated
Thu Nov 27 03:38:27 2025 daemon.info hostapd: phy0-ap0: STA 26:e6:20:74:d4:bc IEEE 802.11: associated (aid 7)
Thu Nov 27 03:38:27 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 26:e6:20:74:d4:bc auth_alg=open
Thu Nov 27 03:38:27 2025 daemon.info hostapd: phy0-ap0: STA 26:e6:20:74:d4:bc WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:27 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 26:e6:20:74:d4:bc
Thu Nov 27 03:38:58 2025 daemon.info hostapd: phy0-ap0: STA d8:1f:12:c6:15:f1 IEEE 802.11: authenticated
Thu Nov 27 03:38:58 2025 daemon.info hostapd: phy0-ap0: STA d8:1f:12:c6:15:f1 IEEE 802.11: associated (aid 8)
Thu Nov 27 03:38:58 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:1f:12:c6:15:f1 auth_alg=open
Thu Nov 27 03:38:58 2025 daemon.info hostapd: phy0-ap0: STA d8:1f:12:c6:15:f1 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:38:58 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:1f:12:c6:15:f1
Thu Nov 27 03:39:04 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 70:c9:32:09:70:26
Thu Nov 27 03:39:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 IEEE 802.11: authenticated
Thu Nov 27 03:39:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 IEEE 802.11: associated (aid 4)
Thu Nov 27 03:39:12 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 70:c9:32:09:70:26 auth_alg=open
Thu Nov 27 03:39:12 2025 daemon.info hostapd: phy0-ap0: STA 70:c9:32:09:70:26 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:39:12 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 70:c9:32:09:70:26
Thu Nov 27 03:39:41 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 50:b1:27:70:a3:83
Thu Nov 27 03:39:41 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: disassociated
Thu Nov 27 03:39:42 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 27 03:41:00 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: authenticated
Thu Nov 27 03:41:00 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 IEEE 802.11: associated (aid 5)
Thu Nov 27 03:41:00 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 50:b1:27:70:a3:83 auth_alg=open
Thu Nov 27 03:41:00 2025 daemon.info hostapd: phy0-ap0: STA 50:b1:27:70:a3:83 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:41:00 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 50:b1:27:70:a3:83
Thu Nov 27 03:41:06 2025 daemon.info hostapd: phy0-ap0: STA 26:71:c9:14:1f:43 IEEE 802.11: authenticated
Thu Nov 27 03:41:06 2025 daemon.info hostapd: phy0-ap0: STA 26:71:c9:14:1f:43 IEEE 802.11: associated (aid 9)
Thu Nov 27 03:41:06 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 26:71:c9:14:1f:43 auth_alg=open
Thu Nov 27 03:41:06 2025 daemon.info hostapd: phy0-ap0: STA 26:71:c9:14:1f:43 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:41:06 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 26:71:c9:14:1f:43
Thu Nov 27 03:41:46 2025 daemon.info hostapd: phy0-ap0: STA 02:ab:50:64:68:1b IEEE 802.11: authenticated
Thu Nov 27 03:41:46 2025 daemon.info hostapd: phy0-ap0: STA 02:ab:50:64:68:1b IEEE 802.11: associated (aid 10)
Thu Nov 27 03:41:46 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 02:ab:50:64:68:1b auth_alg=open
Thu Nov 27 03:41:46 2025 daemon.info hostapd: phy0-ap0: STA 02:ab:50:64:68:1b WPA: pairwise key handshake completed (RSN)
Thu Nov 27 03:41:46 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 02:ab:50:64:68:1b
Thu Nov 27 04:16:31 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 02:ab:50:64:68:1b
Thu Nov 27 04:16:31 2025 daemon.info hostapd: phy0-ap0: STA 02:ab:50:64:68:1b IEEE 802.11: disassociated due to inactivity
Thu Nov 27 04:16:32 2025 daemon.info hostapd: phy0-ap0: STA 02:ab:50:64:68:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 27 04:38:38 2025 daemon.info hostapd: phy0-ap0: STA 36:76:b8:20:1d:15 IEEE 802.11: authenticated
Thu Nov 27 04:38:38 2025 daemon.info hostapd: phy0-ap0: STA 36:76:b8:20:1d:15 IEEE 802.11: associated (aid 10)
Thu Nov 27 04:38:38 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 36:76:b8:20:1d:15 auth_alg=open
Thu Nov 27 04:38:38 2025 daemon.info hostapd: phy0-ap0: STA 36:76:b8:20:1d:15 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 04:38:38 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 36:76:b8:20:1d:15
Thu Nov 27 04:39:08 2025 daemon.info hostapd: phy0-ap0: STA f2:aa:96:c8:4e:f5 IEEE 802.11: authenticated
Thu Nov 27 04:39:08 2025 daemon.info hostapd: phy0-ap0: STA f2:aa:96:c8:4e:f5 IEEE 802.11: associated (aid 11)
Thu Nov 27 04:39:08 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED f2:aa:96:c8:4e:f5 auth_alg=open
Thu Nov 27 04:39:08 2025 daemon.info hostapd: phy0-ap0: STA f2:aa:96:c8:4e:f5 WPA: pairwise key handshake completed (RSN)
Thu Nov 27 04:39:08 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED f2:aa:96:c8:4e:f5
Thu Nov 27 04:42:18 2025 daemon.info hostapd: phy0-ap0: STA a8:6d:aa:07:93:1f IEEE 802.11: authenticated
Thu Nov 27 04:42:18 2025 daemon.info hostapd: phy0-ap0: STA a8:6d:aa:07:93:1f IEEE 802.11: associated (aid 12)
Thu Nov 27 04:42:18 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED a8:6d:aa:07:93:1f auth_alg=open
Thu Nov 27 04:42:18 2025 daemon.info hostapd: phy0-ap0: STA a8:6d:aa:07:93:1f WPA: pairwise key handshake completed (RSN)
Thu Nov 27 04:42:18 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED a8:6d:aa:07:93:1f

Started to ship OpenWrt one logs to an always-on machine to see what is logged at the next reboot

ssh ubuntu@192.168.1.10 "head /var/log/openwrt.log"
Nov 27 05:04:10 OpenWrt logread[9480]: Logread connected to 192.168.1.10:514 via udp
...

What else can I do?