Success, it looks like I needed to add option proto 'none' to my definition of the VDSL-to-ethernet bridge and/or change the modem firmeware to a more modern version. But after doing both the upgrade seems to work just fine.
On Netgear R7800 it seems that AC 160Mhz still doesn't work, but this time I wasn't able to get wireless working again by switching back from 160Mhz mode. Had to factory reset.
Upgraded my R7800 using the sysupgrade file. Works perfectly. All devices are connecting. WPA3 support is working on a Pixel 3 and iPhone 8. I cannot connect my Linux laptop via WPA-3 though. WPA-2 works.
I don't see any benefits from the switch from ath10k to the "-CT" out-of-tree driver... Should I?
While slightly beyond topic, desktop linux (depending on the wireless card/ driver; not all support IEEE 802.11w, which is mandatory for WPA3) should be the easiest to configure as WPA3/ SAE client.
Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.
Reference:
Otherwise built okay and tested on an ipq8064 system.
Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.
OpenWrt is actually using Debian 9 as a base for the images used by the build bots (used for building all the images and packages) and there's python2 and python3 installed as well. It works, no issue visible.
I upgraded yesterday from 19.07-SNAPSHOT and experienced errors today on my Archer C7 v2 router and access point (2 devices). They are configured to use Band Steering and fast roaming between all 4 Wi-Fis (router 2.4G & 5G and AP 2.4G & 5G)
I removed wpad-basic and installed hostapd-openssl and wpa-supplicant-openssl.
Here are some errors I found in System Log:
router
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 3 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5540 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5550 cf2=0
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5620 chan=124 sec_chan=1
Mon Nov 11 14:25:23 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.186254] device wlan0 left promiscuous mode
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.191501] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:23 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:25:24 2019 kern.warn kernel: [75176.377944] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16 peers: 127 tid: 256
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.394810] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.401254] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424 sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.409433] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:25:25 2019 kern.warn kernel: [75176.472893] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.487625] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.497606] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.503033] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.508737] device wlan0 entered promiscuous mode
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5620 chan=124 sec_chan=1, width=0, seg0=126, seg1=0, cac_time=60s
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: DFS-CAC-COMPLETED success=1 freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:26:29 2019 daemon.err hostapd: Using interface wlan0 with hwaddr SATINIZED_MAC and ssid "Olivenbaum"
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.719063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.725810] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.731223] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 11 14:26:29 2019 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: interface state DFS->ENABLED
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5660 chan=132 sec_chan=1
Mon Nov 11 14:27:49 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:27:49 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.697934] device wlan0 left promiscuous mode
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.702763] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.887321] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16 peers: 127 tid: 256
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.904169] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.910532] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424 sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.918704] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.982970] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.997679] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.007510] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.012998] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.018664] device wlan0 entered promiscuous mode
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5660 chan=132 sec_chan=1, width=0, seg0=134, seg1=0, cac_time=60s
Mon Nov 11 14:28:09 2019 daemon.err uhttpd[1253]: luci: accepted login on / for root from 10.8.0.1
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPREQUEST(br-lan) 10.1.2.69 SATINIZED_MAC
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPACK(br-lan) 10.1.2.69 SATINIZED_MAC SATINIZED_HOSTNAME
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
AP
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:24:52 2019 daemon.notice hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: did not acknowledge authentication response
Mon Nov 11 14:24:54 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:07 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:15 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:17 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:21 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:25 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:38 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:48 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:04 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:25 2019 daemon.err uhttpd[1220]: luci: accepted login on / for root from 10.8.0.1
Is the AP also detecting radar? I see radar was detected on channels 104 and 124. If there really is radar there, don't use channels in that area of the band for your initial configuration.
In ath10k when you're running a STA and an AP on the same radio you must explicitly set the channel to the one that the STA is connecting to, or the AP will not come up. This becomes a big problem when DFS forces a new channel.
I think that decision has to do with the fact that the 4.14 kernel is supported until 01.2024, where as 4.19 is only supported until 12.2020. see
I.e. Long Term Support
4.19 has been “default” on master since right after the branch. A few remaining 4.14 targets are moving over. It can be non-trivial to change kernel versions.
From what I have read on the mailing list, “20.01” will likely be on 4.19, though I haven’t seen a formal decision.
Do not overestimate the validity of those pre-announced EOL dates, those are just the time spans 'guaranteed' in advance. All of those dates for past LTS kernels have been extended at least once, closer to their originally declared expiration. While no one has formally committed to that yet, it's very likely that v4.19[0] will be LTS supported beyond the final/ effective expiration of the v4.14 LTS kernel.
--
[0] Debian 10 'Buster' is shipping with kernel v4.19 and will be supported at least until ~2022, with the LTS efforts probably extending that until 2024. Ben Hutchings as part of the debian-kernel team has taken over maintenance for previous LTS kernels from Greg Kroah-Hartman before - and kept them officially under LTS maintenance on kernel.org for the (extended) durations of Debian's release cycles; it's very likely that he will take over v4.19 as well.
Oh my bad...
For some reason I thought that a few targets that were already on 4.19 were moved back to 4.14 to have a "unified" kernel, and I was trying to make sense of that...
Sorry for the confusion.
BT HomeHub 5A in the UK with Plusnet / BT (same). No issues other than DHCP lease times are miss reported i.e. reported as expired even when active (sometimes)
AdBlock and Stubby installed with no issues. Wireless works with no issues.
Shout out to the OpenWrt developers for their hard work. LuCI renders very nicely in Chrome and seams to be a bit quicker. Thanks.