I have a laptop (Dell Inspiron 15 Gaming/Inspiron 7567) which normally doesn't connect to my OpenWRT device (Linksys WRT1900AC) by WiFi unless I restart the router or restart the wpad service.
Another laptop of the same model connects to the same router just fine.
The problem is probably on my laptop, not OpenWRT, but because it only affects that OpenWRT router, I figured I should ask for help here. My laptop connects to other WiFi networks just fine.
Here's the output from logread | grep 'LAPTOP-MAC':
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: authentication OK (open system)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-AUTHENTICATE.indication(LAPTOP:MAC, OPEN_SYSTEM)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-DELETEKEYS.request(LAPTOP:MAC)
Fri Nov 18 18:09:20 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: authenticated
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: association OK (aid 3)
Fri Nov 18 18:09:20 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: associated (aid 3)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-ASSOCIATE.indication(LAPTOP:MAC)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-DELETEKEYS.request(LAPTOP:MAC)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: binding station to interface 'wlan0'
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: event 1 notification
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: start authentication
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.1X: unauthorizing port
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: sending 1/4 msg of 4-Way Handshake
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: sending 3/4 msg of 4-Way Handshake
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Nov 18 18:09:20 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED LAPTOP:MAC
Fri Nov 18 18:09:20 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.1X: authorizing port
Fri Nov 18 18:09:20 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC WPA: pairwise key handshake completed (RSN)
Fri Nov 18 18:09:23 2022 daemon.info dnsmasq-dhcp[3732]: DHCPDISCOVER(br-lan) LAPTOP:MAC
Fri Nov 18 18:09:23 2022 daemon.info dnsmasq-dhcp[3732]: DHCPOFFER(br-lan) 192.168.1.101 LAPTOP:MAC
Fri Nov 18 18:09:23 2022 daemon.info dnsmasq-dhcp[3732]: DHCPREQUEST(br-lan) 192.168.1.101 LAPTOP:MAC
Fri Nov 18 18:09:23 2022 daemon.info dnsmasq-dhcp[3732]: DHCPACK(br-lan) 192.168.1.101 LAPTOP:MAC Laptop
Fri Nov 18 18:10:08 2022 kern.debug kernel: [342682.250541] ieee80211 phy0: Mac80211 start BA LAPTOP:MAC
I checked the Windows event log in "Applications and Services Logs/Microsoft/Windows/NetworkProfile", but I didn't see evidence of any difficulty connecting.
There's probably a setting I need to flip somewhere. Could somebody please help me find it?
sounds like your laptop... but let's see your config to make sure that there isn't anything obvious on the router:
Please copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
It may be the encryption method. Try standard using encryption method wpa2 instead of psk2+tkip+ccmp.
Also, you should remove the bridge from wan and wan6... that should not be there. It isn't likely to affect your connectivity here, but bridges are not defined in that way anymore (they are done in their own stanzas to define a bridge device).
Ok, I tried changing the encryption method. The options that the GUI gave me were:
Auto
Force CCMP
Force TKIP
Force TKIP and CCMP
I didn't see an option for just "wpa2", so I tried "CCMP"
How do I remove the bridge properly from wan and wan6? The only place in the GUI that I see that mention both wan and wan6 are in relation to firewall zones, and as far as I know both wan and wan6 should be in firewall zones.
I'll have to wait until tomorrow to see if my laptop connects properly with that change.
Ok, I tried connecting my laptop to wifi today, and I had the same issue. I took a look at the output from logread and I didn't see anything obviously wrong.
Here is the output from logread | grep 'LAPTOP:MAC' today after I tried to connect, failed, restarted wpad, and successfully connected:
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: authentication OK (open system)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-AUTHENTICATE.indication(LAPTOP:MAC, OPEN_SYSTEM)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-DELETEKEYS.request(LAPTOP:MAC)
Sat Nov 19 09:09:08 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: authenticated
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: association OK (aid 5)
Sat Nov 19 09:09:08 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: associated (aid 5)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-ASSOCIATE.indication(LAPTOP:MAC)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC MLME: MLME-DELETEKEYS.request(LAPTOP:MAC)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.11: binding station to interface 'wlan0'
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: event 1 notification
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: start authentication
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.1X: unauthorizing port
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: sending 1/4 msg of 4-Way Handshake
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: sending 3/4 msg of 4-Way Handshake
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Nov 19 09:09:08 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED LAPTOP:MAC
Sat Nov 19 09:09:08 2022 daemon.debug hostapd: wlan0: STA LAPTOP:MAC IEEE 802.1X: authorizing port
Sat Nov 19 09:09:08 2022 daemon.info hostapd: wlan0: STA LAPTOP:MAC WPA: pairwise key handshake completed (RSN)
Sat Nov 19 09:09:13 2022 daemon.info dnsmasq-dhcp[3732]: DHCPDISCOVER(br-lan) 192.168.1.101 LAPTOP:MAC
Sat Nov 19 09:09:13 2022 daemon.info dnsmasq-dhcp[3732]: DHCPOFFER(br-lan) 192.168.1.101 LAPTOP:MAC
Sat Nov 19 09:09:13 2022 daemon.info dnsmasq-dhcp[3732]: DHCPREQUEST(br-lan) 192.168.1.101 LAPTOP:MAC
Sat Nov 19 09:09:13 2022 daemon.info dnsmasq-dhcp[3732]: DHCPACK(br-lan) 192.168.1.101 LAPTOP:MAC Laptop
Sat Nov 19 09:09:18 2022 kern.debug kernel: [396633.433741] ieee80211 phy0: Mac80211 start BA LAPTOP:MAC
Update: a couple of days later, I'm noticing that the issue is not longer happening. I think that your guess about the encryption method turned out to be correct. Thank you very much, psherman.