I have created a BATMAN mesh with OpenWRT 24.10.2 using 2 x Linksys EA8300 + 6 x ASUS Lyra MAP AC2200
One of the Linksys EA8300 is my router & DHCP. All the other devices are Access Points.
The wireless mesh 'backhaul' uses WPA3-SAE encryption.
So far, performance/stability/reliability has been deplorable with Access Points dropping off the mesh fairly randomly & various pings taking 10+ seconds to reply. I think I have sorted some of the problems, but probably not all. At least I'm learning a few things as I go along!
Currently, in the OpenWRT System Log for one of the Lyra Access Points, I keep seeing this:
Wed Jul 23 14:27:55 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 00:c0:00:05:35:d7
Wed Jul 23 14:27:56 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: disassociated
Wed Jul 23 14:27:56 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: authenticated
Wed Jul 23 14:27:56 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: associated (aid 1)
Wed Jul 23 14:27:56 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 00:c0:00:05:35:d7 auth_alg=open
Wed Jul 23 14:27:56 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 RADIUS: starting accounting session 344621C070507A17
Wed Jul 23 14:27:56 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 WPA: pairwise key handshake completed (RSN)
Wed Jul 23 14:27:56 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 00:c0:00:05:35:d7
Wed Jul 23 14:31:55 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: new peer notification for 10:7b:44:ce:05:d4
Wed Jul 23 14:32:11 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:32:21 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:32:36 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:32:54 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:32:54 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-BLOCKED addr=10:7b:44:ce:05:d4 duration=300
Wed Jul 23 14:32:57 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 00:c0:00:05:35:d7
Wed Jul 23 14:32:57 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: disassociated
Wed Jul 23 14:32:57 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: authenticated
Wed Jul 23 14:32:57 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: associated (aid 1)
Wed Jul 23 14:32:58 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 00:c0:00:05:35:d7 auth_alg=open
Wed Jul 23 14:32:58 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 RADIUS: starting accounting session 5503A052852D1AA0
Wed Jul 23 14:32:58 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 WPA: pairwise key handshake completed (RSN)
Wed Jul 23 14:32:58 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 00:c0:00:05:35:d7
Wed Jul 23 14:36:57 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: new peer notification for 10:7b:44:ce:05:d4
Wed Jul 23 14:37:15 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:37:34 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:37:52 2025 daemon.notice wpa_supplicant[829]: phy0-mesh0: MESH-SAE-AUTH-FAILURE addr=10:7b:44:ce:05:d4
Wed Jul 23 14:37:59 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 00:c0:00:05:35:d7
Wed Jul 23 14:37:59 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: disassociated
Wed Jul 23 14:38:00 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: authenticated
Wed Jul 23 14:38:00 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 IEEE 802.11: associated (aid 1)
Wed Jul 23 14:38:00 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 00:c0:00:05:35:d7 auth_alg=open
Wed Jul 23 14:38:00 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 RADIUS: starting accounting session C43ECD6B828F8294
Wed Jul 23 14:38:00 2025 daemon.info hostapd: phy1-ap0: STA 00:c0:00:05:35:d7 WPA: pairwise key handshake completed (RSN)
Wed Jul 23 14:38:00 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 00:c0:00:05:35:d7
with this continual MESH-SAE-AUTH-FAILURE/MESH-SAE-AUTH-BLOCKED.
Google doesn't seem to have a great deal of clues, but there are similar issues reported, such as this one:
which seems to hint at some kind of issue using wpad-mesh-wolfssl which is what I included in the firmware build for all my OpenWRT devices.
It suggests that wpad-mesh-openssl doesn't exhibit the same issue.
I don't really want to go back to 'square one' and rebuild all my devices using the wpad-mesh-openssl package instead, but in some of the Google search results, there is a suggestion of using "nohwcrypt=1" so that the firmware drivers don't do hardware encryption but instead it's done in software (at a performance penalty).
So, Google told me to edit /etc/modules.conf and insert the line ath10k nohwcrypt=1 which I did and rebooted. But this doesn't appear to have resolved the issue.
Questions:
- Where can I put nohwcrypt=1 where it will have an effect?
- Can I just switch my mesh backhaul encryption to WPA2 and expect the problem to just go away? (or even no encryption? do I need encryption on the mesh backhaul for a home LAN?)
- Can I just use opkg to uninstall wpad-mesh-wolfssl & instead install wpad-mesh-openssl on all my devices and hey-presto! problem solved?