Some 2.4GHz devices refuse to connect to WRT32X (running 18.06.4 w/mwlwifi 10.3.8.0-20181210-31d9386): Amazon Cloud Cam, Chromecast, Sonoff devices. There is the snippet of log file when a Sonoff device tried to connect to the router:
Sat Jul 27 22:43:10 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: associated (aid 5)
Sat Jul 27 22:43:10 2019 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 06:05:04:03:02:01
Sat Jul 27 22:43:10 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 RADIUS: starting accounting session 8AB4CDD24062089B
Sat Jul 27 22:43:10 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 WPA: pairwise key handshake completed (RSN)
Sat Jul 27 22:43:12 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: authenticated
Sat Jul 27 22:43:33 2019 daemon.notice hostapd: wlan1-1: AP-STA-DISCONNECTED 06:05:04:03:02:01
Sat Jul 27 22:43:33 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: disassociated
Sat Jul 27 22:43:33 2019 kern.debug kernel: [51444.401845] ieee80211 phy1: staid 5 deleted
Sat Jul 27 22:43:34 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Jul 27 22:43:44 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: associated (aid 5)
Sat Jul 27 22:43:44 2019 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 06:05:04:03:02:01
Sat Jul 27 22:43:44 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 RADIUS: starting accounting session AF0DD809F404E8F6
Sat Jul 27 22:43:44 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 WPA: pairwise key handshake completed (RSN)
Sat Jul 27 22:43:49 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: authenticated
Sat Jul 27 22:45:17 2019 kern.debug kernel: [51548.268348] ieee80211 phy1: staid 5 deleted
Sat Jul 27 22:45:17 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: associated (aid 5)
Sat Jul 27 22:45:17 2019 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 06:05:04:03:02:01
Sat Jul 27 22:45:17 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 RADIUS: starting accounting session AF0DD809F404E8F6
Sat Jul 27 22:45:17 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 WPA: pairwise key handshake completed (RSN)
Sat Jul 27 22:45:21 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: authenticated
Sat Jul 27 22:45:39 2019 daemon.notice hostapd: wlan1-1: AP-STA-DISCONNECTED 06:05:04:03:02:01
Sat Jul 27 22:45:39 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: disassociated
Sat Jul 27 22:45:39 2019 kern.debug kernel: [51570.833787] ieee80211 phy1: staid 5 deleted
Sat Jul 27 22:45:40 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Jul 27 22:45:50 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: associated (aid 5)
Sat Jul 27 22:45:51 2019 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 06:05:04:03:02:01
Sat Jul 27 22:45:51 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 RADIUS: starting accounting session 12D8FFFA141F491E
Sat Jul 27 22:45:51 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 WPA: pairwise key handshake completed (RSN)
Sat Jul 27 22:45:53 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: authenticated
Sat Jul 27 22:46:14 2019 daemon.notice hostapd: wlan1-1: AP-STA-DISCONNECTED 06:05:04:03:02:01
Sat Jul 27 22:46:14 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: disassociated
Sat Jul 27 22:46:14 2019 kern.debug kernel: [51605.609236] ieee80211 phy1: staid 5 deleted
Sat Jul 27 22:46:15 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Jul 27 22:46:16 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: associated (aid 5)
Sat Jul 27 22:46:16 2019 daemon.notice hostapd: wlan1-1: AP-STA-CONNECTED 06:05:04:03:02:01
Sat Jul 27 22:46:16 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 RADIUS: starting accounting session 968AEA8B560D111D
Sat Jul 27 22:46:16 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 WPA: pairwise key handshake completed (RSN)
Sat Jul 27 22:46:18 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: authenticated
Sat Jul 27 22:46:39 2019 daemon.notice hostapd: wlan1-1: AP-STA-DISCONNECTED 06:05:04:03:02:01
Sat Jul 27 22:46:39 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: disassociated
Sat Jul 27 22:46:39 2019 kern.debug kernel: [51630.602582] ieee80211 phy1: staid 5 deleted
Sat Jul 27 22:46:40 2019 daemon.info hostapd: wlan1-1: STA 06:05:04:03:02:01 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
One workaround is set wmm to 0. But my understanding is that setting wmm=0 is effectively disable N mode. Any solution to this problem?
The only other thing would be setting 2.5Ghz to Legacy, but you may be doing that already disabling N mode.
IOT's not connecting has been an issue for a long time (I have a printer that refuses to connect). My recommendation would be to buy one of those Netgear 2.5Ghz wifi extenders. They work great and are cheap.
Thanks the suggestion @davidc502. My current solution is putting an old router into AP mode and connecting it to wrt32x with wired port(only 100M). Is this a mwlwifi driver issue or firmware issue?
I've had two problems with r10618. First, when I try to install dnsmasq-full per the instructions for adding vpn-policy-routing (https://github.com/stangri/openwrt_packages/blob/master/vpn-policy-routing/files/README.md), I get "Failed to download" errors with wget returning 4, as described in my earlier posts. That occurs repeatedly. When I move to downloading the dnsmasq-full ipk and installing it, I end up with the same "Failed to download" errors as opkg installs the dependencies (libnfnetlink0 is the first one). I recognize I could likely solve this by downloading all the dependencies as ipks myself, but I shouldn't have to do this given it has always worked per the vpn-policy-routing instructions in the past. The behavior makes me suspect a larger issue.
Second, although samba4 works now that version 4.9 comes with the build, the "Network Shares" through LuCI shows no shares. This is mainly just an annoyance because samba is working and I can manage it all through the command line and config files. However, it isn't very user friendly.
So, my 2 cents, I suppose. I'm inclined to stay with r10307 for now.
I have an IPv6 connection. If I understand what you've written properly, given that I have an IPv6 connection it isn't worth adding the option ipv6 0 line to my network config.
Looks like you are an expert on upnp ... I'm using miniupnp's default config, and since some versions ago it's flooding my syslog with something like this:
I don't see those warnings in my syslog. Did you enabled the "additional logging" for UPNP?
The only thing that floods my syslog are ssdp m-search notifications (even for devices which aren't allowed to use UPNP) if additional logging is enabled.
Maybe the latest miniupnpd daemon will fix those entries. We are still using 2.1.20190408 instead of 2.1.20190630 (latest)....
I didn't have debug enabled... but did enable it , then disabled it, and now the issue seems not to be happening ... but now, coincidentally, I'm getting flooded with this one: