Client mode wireless connection Drops out

Hello all,

I have a WRT1900AC with this version of OpenWRT installed: OpenWrt 18.06.1 r7258-5eb055306f .

Now, I configured one of the radio's (radio0) as a client to connect to the univeristy's eduroam. It is a 802.1x wifi connection. The name for this network is called eduroam. I was able to successfull connect and get internet on the LAN ports. I then configured my other 2 wireless radios to broadcast with different SSIDs. Radio1 is called RGMedia and Radio2 is called RGWireless.

Now about once every 6 - 8 hours, the connection on radio0 drops out and dies. This then kills the internet on the LAN and other WLAN interfaces. I then need to restart the radio and internet is back on.

I recently found out that in my eduroam wireless settings under Interface Configuration->network, both Media and eduroam were selected.

I believe that this caused some interference issues killing the eduroam network. However, since I need to wait another 6 - 8 hours before I say that it worked, I would like discuss with the community if this was an actual fix or if there is something more sinister lurking.

What could cause this issue? Any feedback would be greatly appreciated. Thank you

Below is a copy of the log. I marked where the wireless connection died, when it was attempting to perform reconnects, and then, when I reset the system to change the settings.

Tue Dec 18 18:16:25 2018 daemon.info dnsmasq-dhcp[4082]: DHCPDISCOVER(br-RGMedia) 80:5e:4f:21:9f:92
Tue Dec 18 18:16:25 2018 daemon.info dnsmasq-dhcp[4082]: DHCPOFFER(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:16:25 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:16:25 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92 DEFAULT
Tue Dec 18 18:16:34 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated
Tue Dec 18 18:16:34 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated
Tue Dec 18 18:16:41 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:16:41 2018 kern.debug kernel: [30338.168864] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:16:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:16:42 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:16:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 RADIUS: starting accounting session 33F62202C21DE77C
Tue Dec 18 18:16:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:16:43 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5
Tue Dec 18 18:16:43 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5 amazon-544fea6a2
Tue Dec 18 18:16:43 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: authenticated
Tue Dec 18 18:17:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:20 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:26 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:32 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:38 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:44 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:51 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:17:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:11 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:18 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:24 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:31 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:38 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:44 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:51 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:18:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)

------ wireless died ------

Tue Dec 18 18:19:52 2018 kern.debug kernel: [30529.361612] ieee80211 phy1: staid 4 deleted
Tue Dec 18 18:19:52 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: associated (aid 4)
Tue Dec 18 18:19:52 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: disassociated
Tue Dec 18 18:19:52 2018 kern.debug kernel: [30529.395302] ieee80211 phy1: staid 4 deleted
Tue Dec 18 18:19:52 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: associated (aid 4)
Tue Dec 18 18:19:53 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 80:5e:4f:21:9f:92
Tue Dec 18 18:19:53 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 RADIUS: starting accounting session 6D222B12F35A2B68
Tue Dec 18 18:19:53 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:19:53 2018 daemon.info dnsmasq-dhcp[4082]: DHCPDISCOVER(br-RGMedia) 80:5e:4f:21:9f:92
Tue Dec 18 18:19:53 2018 daemon.info dnsmasq-dhcp[4082]: DHCPOFFER(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:19:53 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:19:53 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92 DEFAULT
Tue Dec 18 18:19:57 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated
Tue Dec 18 18:19:57 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated
Tue Dec 18 18:19:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:09 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:20:09 2018 kern.debug kernel: [30546.292366] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:20:10 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:20:10 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:20:10 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 RADIUS: starting accounting session 4CF4546EEF739F9F
Tue Dec 18 18:20:10 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:20:10 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5
Tue Dec 18 18:20:10 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5 amazon-544fea6a2
Tue Dec 18 18:20:10 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:12 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: authenticated
Tue Dec 18 18:20:16 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:22 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:41 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:48 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:20:54 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:01 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:21 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:27 2018 daemon.warn odhcpd[1762]: DHCPV6 RENEW IA_NA from 00020000ab112fb4a35f7e09b902 on br-lan: no binding
Tue Dec 18 18:21:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:41 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:47 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 172.31.0.6
Tue Dec 18 18:21:48 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:21:54 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:01 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:21 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:41 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:48 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:22:54 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:01 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:18 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:23:18 2018 kern.debug kernel: [30736.174384] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:23:20 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:23:21 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:26 2018 kern.debug kernel: [30743.613901] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:23:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:29 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: deauthenticated due to local deauth request
Tue Dec 18 18:23:32 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:23:32 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:23:32 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 RADIUS: starting accounting session FAEE497D4E1C38D5
Tue Dec 18 18:23:32 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:23:33 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5
Tue Dec 18 18:23:33 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5 amazon-544fea6a2
Tue Dec 18 18:23:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:34 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: authenticated
Tue Dec 18 18:23:34 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: authenticated
Tue Dec 18 18:23:41 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:48 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:23:54 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:01 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:21 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:41 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:44 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 7c:c3:a1:a2:a1:48
Tue Dec 18 18:24:44 2018 daemon.info hostapd: wlan1: STA 7c:c3:a1:a2:a1:48 IEEE 802.11: disassociated
Tue Dec 18 18:24:44 2018 kern.debug kernel: [30821.905973] ieee80211 phy1: staid 1 deleted
Tue Dec 18 18:24:45 2018 daemon.info hostapd: wlan1: STA 7c:c3:a1:a2:a1:48 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Dec 18 18:24:48 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:24:54 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:01 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:08 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:14 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:21 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:28 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:33 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 172.31.0.6
Tue Dec 18 18:25:34 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:40 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:46 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:52 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:25:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:11 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:18 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:24 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:31 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:38 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:41 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:26:41 2018 kern.debug kernel: [30938.771311] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:26:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: associated (aid 1)
Tue Dec 18 18:26:42 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 18:74:2e:44:63:d5
Tue Dec 18 18:26:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 RADIUS: starting accounting session AA006A6C687D5C67
Tue Dec 18 18:26:42 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:26:43 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5
Tue Dec 18 18:26:43 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.140 18:74:2e:44:63:d5 amazon-544fea6a2
Tue Dec 18 18:26:43 2018 daemon.info hostapd: wlan1: STA 18:74:2e:44:63:d5 IEEE 802.11: authenticated
Tue Dec 18 18:26:44 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:51 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:26:55 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 80:5e:4f:21:9f:92
Tue Dec 18 18:26:55 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: disassociated due to inactivity
Tue Dec 18 18:26:56 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Dec 18 18:26:57 2018 kern.debug kernel: [30954.253186] ieee80211 phy1: staid 4 deleted
Tue Dec 18 18:26:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:11 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:18 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:24 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:25 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 172.31.0.6
Tue Dec 18 18:27:31 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:38 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:44 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:51 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:27:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:11 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:18 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)

---- Wireless re-setup ----

Tue Dec 18 18:28:21 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:28:24 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:31 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:38 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:44 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:49 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:28:51 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:28:58 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:29:03 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:29:04 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:29:10 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:29:11 2018 daemon.warn dnsmasq[4082]: Maximum number of concurrent DNS queries reached (max: 150)
Tue Dec 18 18:29:13 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:29:15 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending renew to 0.0.0.0
Tue Dec 18 18:29:15 2018 daemon.notice netifd: eduroam (3297): udhcpc: lease lost, entering init state
Tue Dec 18 18:29:15 2018 daemon.notice netifd: Interface 'eduroam' has lost the connection
Tue Dec 18 18:29:15 2018 daemon.warn dnsmasq[4082]: no servers found in /tmp/resolv.conf.auto, will retry
Tue Dec 18 18:29:15 2018 daemon.notice netifd: eduroam (3297): udhcpc: sending discover
Tue Dec 18 18:29:52 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-lan) 10.0.0.238 00:26:b9:85:db:48
Tue Dec 18 18:29:52 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-lan) 10.0.0.238 00:26:b9:85:db:48 RG-W09
Tue Dec 18 18:30:47 2018 daemon.notice netifd: Interface 'eduroam' is disabled
Tue Dec 18 18:30:47 2018 daemon.notice netifd: Interface 'eduroam' has link connectivity loss
Tue Dec 18 18:30:47 2018 daemon.notice netifd: eduroam (3297): udhcpc: received SIGTERM
Tue Dec 18 18:30:47 2018 daemon.notice netifd: Interface 'eduroam' is now down
Tue Dec 18 18:30:47 2018 kern.info kernel: [31184.684714] wlan0: deauthenticating from 84:d4:7e:04:d2:33 by local choice (Reason: 3=DEAUTH_LEAVING)
Tue Dec 18 18:30:47 2018 kern.debug kernel: [31184.773921] ieee80211 phy0: staid 1 deleted
Tue Dec 18 18:30:47 2018 kern.debug kernel: [31184.785260] ieee80211 phy0: staid 2 deleted
Tue Dec 18 18:30:47 2018 kern.debug kernel: [31184.837727] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:47 2018 kern.debug kernel: [31184.936765] ieee80211 phy0: change: 0x100
Tue Dec 18 18:30:47 2018 daemon.notice netifd: radio0 (8780): command failed: Not supported (-95)
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31185.412946] ieee80211 phy0: change: 0xffffffff
Tue Dec 18 18:30:48 2018 kern.info kernel: [31185.520171] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Tue Dec 18 18:30:48 2018 daemon.notice netifd: radio0 (8780): Successfully initialized wpa_supplicant
Tue Dec 18 18:30:48 2018 daemon.notice netifd: Interface 'eduroam' is enabled
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31185.671469] ieee80211 phy0: change: 0x100
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31185.684584] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31185.871064] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31186.061128] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:48 2018 kern.debug kernel: [31186.251192] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:49 2018 kern.debug kernel: [31186.431255] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:49 2018 kern.debug kernel: [31186.651326] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:49 2018 kern.debug kernel: [31186.881401] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:49 2018 kern.debug kernel: [31187.111474] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:49 2018 kern.debug kernel: [31187.321548] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:50 2018 kern.debug kernel: [31187.531616] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:50 2018 kern.debug kernel: [31187.751697] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:50 2018 kern.debug kernel: [31187.971766] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:50 2018 kern.debug kernel: [31188.191837] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:51 2018 kern.debug kernel: [31188.411908] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:51 2018 kern.debug kernel: [31188.631994] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:51 2018 kern.debug kernel: [31188.852060] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:51 2018 kern.debug kernel: [31189.072131] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:51 2018 kern.debug kernel: [31189.292218] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:52 2018 kern.debug kernel: [31189.512292] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:52 2018 kern.debug kernel: [31189.732354] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:52 2018 kern.debug kernel: [31189.942418] ieee80211 phy0: change: 0x60
Tue Dec 18 18:30:52 2018 kern.debug kernel: [31190.112487] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:52 2018 kern.debug kernel: [31190.292539] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.472599] ieee80211 phy0: change: 0x40
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.662662] ieee80211 phy0: change: 0x60
Tue Dec 18 18:30:53 2018 kern.info kernel: [31190.664195] wlan0: authenticate with 84:d4:7e:04:d2:33
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.769704] ieee80211 phy0: change: 0x100
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.782718] ieee80211 phy0: change: 0x100
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.795758] ieee80211 phy0: change: 0x42
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31190.897741] ieee80211 phy0: change: 0x2
Tue Dec 18 18:30:53 2018 kern.info kernel: [31190.901641] wlan0: send auth to 84:d4:7e:04:d2:33 (try 1/3)
Tue Dec 18 18:30:53 2018 kern.info kernel: [31190.907980] wlan0: authenticated
Tue Dec 18 18:30:53 2018 kern.info kernel: [31190.912750] wlan0: associate with 84:d4:7e:04:d2:33 (try 1/3)
Tue Dec 18 18:30:53 2018 kern.info kernel: [31190.919494] wlan0: RX AssocResp from 84:d4:7e:04:d2:33 (capab=0x11 status=0 aid=1)
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31191.011785] ieee80211 phy0: change: 0x2
Tue Dec 18 18:30:53 2018 kern.info kernel: [31191.015684] wlan0: associated
Tue Dec 18 18:30:53 2018 kern.debug kernel: [31191.018709] wlan0: Limiting TX power to 36 (36 - 0) dBm as advertised by 84:d4:7e:04:d2:33
Tue Dec 18 18:30:53 2018 daemon.notice netifd: Network device 'wlan0' link is up
Tue Dec 18 18:30:53 2018 daemon.notice netifd: Interface 'eduroam' has link connectivity
Tue Dec 18 18:30:53 2018 daemon.notice netifd: Interface 'eduroam' is setting up now
Tue Dec 18 18:30:53 2018 daemon.notice netifd: eduroam (8988): udhcpc: started, v1.28.3
Tue Dec 18 18:30:53 2018 daemon.notice netifd: eduroam (8988): udhcpc: sending discover
Tue Dec 18 18:30:53 2018 kern.info kernel: [31191.172888] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Tue Dec 18 18:30:56 2018 daemon.notice netifd: eduroam (8988): udhcpc: sending discover
Tue Dec 18 18:30:56 2018 daemon.notice netifd: eduroam (8988): udhcpc: sending select for 172.31.246.122
Tue Dec 18 18:30:56 2018 daemon.notice netifd: eduroam (8988): udhcpc: lease of 172.31.246.122 obtained, lease time 900
Tue Dec 18 18:30:56 2018 daemon.notice netifd: Interface 'eduroam' is now up
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: reading /tmp/resolv.conf.auto
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain test
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain onion
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain localhost
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain local
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain invalid
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain bind
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using local addresses only for domain local.resonancegroupusa.com
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using nameserver 131.183.12.67#53
Tue Dec 18 18:30:56 2018 daemon.info dnsmasq[4082]: using nameserver 131.183.12.68#53
Tue Dec 18 18:30:57 2018 user.notice firewall: Reloading firewall due to ifup of eduroam (wlan0)
Tue Dec 18 18:31:06 2018 daemon.warn odhcpd[1762]: DHCPV6 RENEW IA_NA from 00020000ab112fb4a35f7e09b902 on br-lan: no binding
Tue Dec 18 18:31:25 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:31:25 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 80:5e:4f:21:9f:92
Tue Dec 18 18:31:25 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 RADIUS: starting accounting session E15004053255FE47
Tue Dec 18 18:31:25 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:31:25 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 80:5e:4f:21:9f:92
Tue Dec 18 18:31:25 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: disassociated
Tue Dec 18 18:31:25 2018 kern.debug kernel: [31222.623657] ieee80211 phy1: staid 2 deleted
Tue Dec 18 18:31:26 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: associated (aid 2)
Tue Dec 18 18:31:26 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 80:5e:4f:21:9f:92
Tue Dec 18 18:31:26 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 RADIUS: starting accounting session E15004053255FE47
Tue Dec 18 18:31:26 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 WPA: pairwise key handshake completed (RSN)
Tue Dec 18 18:31:26 2018 daemon.info dnsmasq-dhcp[4082]: DHCPDISCOVER(br-RGMedia) 80:5e:4f:21:9f:92
Tue Dec 18 18:31:26 2018 daemon.info dnsmasq-dhcp[4082]: DHCPOFFER(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:31:26 2018 daemon.info dnsmasq-dhcp[4082]: DHCPREQUEST(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92
Tue Dec 18 18:31:26 2018 daemon.info dnsmasq-dhcp[4082]: DHCPACK(br-RGMedia) 192.168.1.207 80:5e:4f:21:9f:92 DEFAULT
Tue Dec 18 18:31:28 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated
Tue Dec 18 18:31:28 2018 daemon.info hostapd: wlan1: STA 80:5e:4f:21:9f:92 IEEE 802.11: authenticated

I don't know why it's disconnecting from eduroam, but it is typical behavior that the local stations stop when the client connection on the same radio stops. Some of the reason behind this is that there is only one radio and its channel depends on the channel of the upstream AP that it connects to. With no upstream AP, the radio doesn't "know" which channel to select. The "travelmate" package is one way to help mitigate this part of the drop.

So if I am understanding you correctly, since eduroam stops transmitting because say there are no clients, then this causes the radio to turn off because it doesn't which channel to select to since there is no upstream?

The travelmate package? I have not heard of this before

I haven't used it myself, but it seems to have quite a following with people that want to connect to another wireless service, then have their own AP for their own devices.

Thank you for the link! The devices are able to still connect to the router even when the connection between the router and eduroam drops.

The main issue is that the connection between my router and the AP of the university drops and there is no internet.

As a side note, I see that the connection status for eduroam on my router keeps dropping to 0% then shoots back up to 97%. Now this shoot up usually occurs when the traffic is higher (I tested with speedtest.net) and then it shoots down when there is very little traffic. So far, I am assuming that this is some sort of energy saving mode. But just in case that it isn't, is this behavior normal?

Any other thoughts?

So new update. I installed travelmate last night and the connection did end up dieing. However, this morning the connection was back up!

I will be waiting to see if the connection dies again (hopefully it does not) but in the mean, has anyone else ran into something similiar to this?

Ok so the connection is repeatedly dieing over and over again. Eventually, the connection comes back online but it then later dies. Is there anything that I can do to keep the connection up?

Inactivity is a common reason for wireless connections to be terminated. Perhaps a ping a minute or two (or five, or ten or ...) to a host on the other side of the link?

This would be a reason that your AP drops.

Ok, great, thanks @jeff

For the ping, would that be a simple cron job?

Edit: Ok, so I created a cron job that will ping google's servers every 15 minutes. Let's see if that will work.

Looking at your log file it looks like the failure is tripped off by the eduroam middle process being unable to renew the DHCP lease. This causes eduroam to shut down, which triggers a client initiated disconnection (deauthenticated by local choice) from the college AP. A few seconds later it reconnects successfully.

@mk24 @jeff

Thank you for your feedback. I did implement Jeff's recommendation where I am pining google's servers every 15 minutes. unfortunately, this did not work and the connection still went down.

Now, is it possible that my AP glitches and cannot renew the DCHP lease causing eduroam to permanently go down? If this is the case, then how cna I fix the issue?

Hello all,

Does anyone have any feedback on fixing the DHCP lease? I am still having the issue and I have attempted to use travelMate, a heartbeat ping, and changing the settings of the router to no avail.

I haven't quite figured out how to fix this DHCP lease.

Could it be the wireless AP is shutting the down network?

I am bumping the post because I really need some assistance

  • I gave you a good reason your connection likely drops, did you address that?

  • Travelmate was suggested by @jeff above.

This has also been covered in 2 more threads:

Hi, just to check the progress cuz I am facing the same problem, have you solved this issue?

@MakerX, welcome to the community!

You may wish to make a new thread in the future.

To be clear:

  • you're saying that you setup an upstream WiFi connection for Internet; and
  • you also have an SSID for LAN
  • furthermore, that your client connections on that SSID drops

If so, to solve you issue, let the Internet SSID connect first. Additionally, the upstream WiFi can NEVER loose connection!

Also, please see Post No. 16 for other links and information.

Hi, thanks for your reply, and I've created a thread here.
To reply to your description, my router does loss connection to upstream WiFi (WISP) completely, though "connected" but without Internet access. I often had to reboot the radio to reestablish the connection.

1 Like

Try to add T1 and T2