Be cautious upgrading if you're using WPA2 Enterprise, there's regression due to the hostapd upgrading which would render WPA2 Enterprise not be able get authenticated from Radius server.
This build is also untested as I don't have the time to switch my networking setup. So please know how to restore your device to a working state if something goes wrong.
I have encountered them on the OpenWrt master branch. They still happen now and and then but not as much as before. Router also seems unaffected. However, just to be sure, I did always reboot my router afterwards.
Please don't block this post, I think this thread may be the closest to DIR-860L related topics around OpenWRT.
I wonder if @Bartvz has any trouble building all the packages with today's master version? I was trying to remove wpad-basic-wolfssl and install wpad packages for my 801.x usage, but opkg said wpad package is missing.
root@OpenWrt:~# opkg install wpad
Unknown package 'wpad'.
Collected errors:
* pkg_hash_check_unresolved: cannot find dependency libubus20210603 for wpad
* pkg_hash_fetch_best_installation_candidate: Packages for wpad found, but incompatible with the architectures configured
* opkg_install_cmd: Cannot install package wpad.
And a lot of stuff happened, interesting commits to mac80211, like this one and updates to mt76 which does not contain anything special for our hardware.
So, new build is compiling and going into testing today.
Also, went on the hunt as to why the 1 GHz patch did not work anymore and it seems to be related to this commit. Looking into other ways to patch the cpu clock since simply reverting it is not a clean solution with the kernel always moving forwards.
Rekeying caused something in airtime.c to cause a stacktrace, if I read the stack trace correctly it should be this line:
(status->encoding == RX_ENC_HE && streams > 8)))
Which has something to do with data rates for which there are fixes in latest mt76. Could not hurt to try since you can always revert back to a previous build which works fine for you. Disabling rekeying is not recommended for security reasons.
Does it happen on rekeying for an Apple device?
Hmm, that should work just fine. Could you try using 86400 seconds for the rekeying interval?
Disabling rekeying poses less of security risk but nonetheless it is a security risk. In theory an attacker could more easily crack the wireless encryption.
It's a security risk in the sense of once hacker or whoever cracked the wpa encryption, internet trafic in a longer period is cracked, without rekeying.
With 801.x each device can have it's own key, thus hackers cracked one does not mean they get data from other devices cracked.