Make password into the router then not open :(

You didn't tell us how you entered the password (editing wireless config manually with vi, or using the gui). Assuming you edited your wireless configuration with vi, you likely forgot to enclose your password in single quotes, or - if your password itself contained single quotes - failed to properly escape them.

The wireless password must be between 8 and 63 characters long if it is in ASCII notation. A 64 character password is allowed, but must be given in hexadecimal notation. So either 8 to 63 random characters or an exactly 64 character long hexadecimal string.

Note the special characters such as

$ ` ' "

may cause problems when improperly escaped.

When setting the password

special " character ` password $ test ' string

via the gui, the following notation will end up in /etc/config/wireless:

option key 'special " character ` password $ test '\'' string'

Note how the special ' character got escaped.

1 Like



Also, please don't double post!

  • Also, I'd suggest you setup your WiFi on a wired connection.
1 Like

I have tried this on my router and 63 characters work just fine for me. Something must be wrong with your password as @jow mentioned.

1 Like

thank you to all first
then you Enable key reinstallation (KRACK) countermeasures ??????

Yes I also tried with KRACK and without it. 63 characters just work fine for me.

It seems out of place to use 63 characters for a WiFi password unless you are on a military-grade access point but then again I dont think even they will have time to put 63 characters to access internet or other servers. How do you manage to remember such long strings of passwords?

yes :rofl: :joy:

max 57 characters in my router tp-link w8970
i save the password wifi into my computer in text file !
this accept 64 : 4FB70EFD9C5FB4D0A1E2C6FD4D3A7D074FB70EFD9C5FB4D0A1E2C6FD4D3A7D07
this not accept ! : !@o4UfEzXE8rE0roN-spiVAsoK?p99uT+gEkAri!8bij$Y2t+ni0=+o4o_l7OS?
is this : !@o4UfEz
small to : !@o4UfEz*XE8rE0roN-spiVAsoK?p99uT+gEkAri!8bij$Y2t+n ( work and accept )

!@o4UfEz*XE8rE0roN-spiVAsoK?p99uT+gEkAri!8bij$Y2t+ni0=+o4o_l7OS? is 64 byte, not 63. Simply remove one character.


thank you but this 64 ! accept !
and in this
try delete !@o4UfEzXE8rE0roN-spiVAsoK?p99uT+gEkAri!8bij$Y2t+ni0=+o4o_l7OS? ( ? )
XE8rE0roN-spiVAsoK?p99uT+gEkAri!8bij$Y2t+ni0=+o4o_l7OS ( accept )

Because this is in hexadecimal notation (Only characters a-f and 0-9).

This is not in hexadecimal notation (has characters other than a-f and 0-9).

Hexadecimal = exactly 64 chars, not more, not less
Not hexadecimal = between 8 and 63 chars. Not less than 8, not more than 63.


the best encryption used hexadecimal or characters ?

I personally use a pass-phrase when human entry is required more than occasionally. For example

This could be a good phrase, except that it's been posted!

Both get converted to a full-length "hex" string, so it is the information content and "guess-ability" that is important, not the way it's entered.

$ wpa_passphrase some_ssid "This could be a good phrase, except that it's been posted!"
	#psk="This could be a good phrase, except that it's been posted!"

Note that wpa_passphrase is likely only present on "desktop" systems.



A passphrase is just the ASCII representation (63 characters) of the REAL Hex key (null + the 63 hexes of the characters.

The key itself is rarely seen or used by the human user - unless you're hacking. :wink:

1 Like

ok thank you :wink:

1 Like

the wifi password is support Different language characters ( arabic - japan - india )
can mixed password with Different language characters ?

i test it work :+1: but this good or makes bug in security ?

As long as you're choosing the characters at random (using a true crypto qualified random number generator), it doesn't matter what language they are in.


openwrt is open source !
you can add any think ? Schedule to password change automatic ?
used pass1 and pass2 and pass3 etc
i want enable today
pass1 ( enable )----------
pass2 ( disable )
pass3 ( disable )
then tomorrow
pass1 ( disable )
pass2 ( enable )----------
pass3 ( disable )
After tomorrow
pass1 ( disable )
pass2 ( disable )
pass3 ( enable )-----------
etc ?
can be add any think ?

Yes you can change password as you like but you'll need to change it every time you want to change it. I dont think there's a way to add multiple passwords to Wi-Fi in WPA2-PSK but you can create cron jobs to change configuration as you like through uci. Look at the cron documentation for more info.

1 Like

You can, but you're not going to make things significantly more secure.

First off, how are you going to store the "next" passwords? If a script can read them every night, they certainly aren't secure.

More importantly, how long would it likely take someone to crack a good password?

Safes are probably a good analogy. Very secure safes are often rated in hours -- how long they can sustain an attack before they are broken into. Nobody expects a safe to be "impenetrable", but they're "good enough" if it is reasonably certain that someone will be discovered trying to break in before they succeed (overnight, or over a long weekend, for example).

I've read that an average English-language speaker has a vocabulary of 20-30,000 words. Let's be conservative and say that they are pulling from a pool of only 1,000 words. Let's also say that in the pass phrase, there are only four words that are "random".

1,000 ^ 4 = 1,000,000,000,000 combinations

Now let's say that one can be tested every 10 ms. That's pretty fast over wireless. 100 per second. That's got to be some serious, continuous log spam!

1,000,000,000,000 passwords / 100 passwords per second = 10,000,000,000 seconds

10,000,000,000 seconds / 60 seconds per minute / 60 minutes per hour / 24 hours per day

~ 115,740 days / 365 days per year ~ 317 years

So for a 1 in a 100 likelihood of your password being "guessed", assuming they know your exact list of 1,000 words and aren't trying any others, you're looking at over 3 years of continuous, 100 tries per second attacking.

In my opinion, you're a lot better off changing your pass phrase occasionally to prevent human error and concentrating on things that truly make a significant difference in security.

1 Like