Very frequent disconnects of Windows 11 22H2 client

I'm having problems with a new Windows 11 PC and DHCP on TL-MR3020v3 with 23.05.4 firmware.
It connects fine with an old TL-MR3020v1 router with factory firmware, but using v3+OpenWRT it seems unstable - the router log:

$ cat logread.txt
Mon Dec 2 16:34:43 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:43 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:43 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:43 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f lennz

Mon Dec 2 16:34:51 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:51 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Mon Dec 2 16:34:51 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Mon Dec 2 16:34:51 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Mon Dec 2 16:34:51 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Mon Dec 2 16:34:51 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:51 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:51 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f lennz

Mon Dec 2 16:34:57 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:57 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Mon Dec 2 16:34:57 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Mon Dec 2 16:34:57 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Mon Dec 2 16:34:57 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Mon Dec 2 16:34:57 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:57 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f
Mon Dec 2 16:34:57 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.109 b8:1e:a4:a0:5f:4f lennz

Mon Dec 2 16:35:02 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
... and so on, indefinitely.

The router is 10.0.0.2 and the PC is 10.0.0.109.
On the PC I see that the lease is being renewed quite often:

$ for i in {1..10}; do ipconfig /all | grep Expires; sleep 1; done
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.09
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.09
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.10
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.16
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.15
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.17
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.17
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.18
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.17
Lease Expires . . . . . . . . . . : Tuesday, 3 December 2024 04.16.23

A Wireshark trace shows a seemingly ok DHCP handshake, but afterwards the PC client keeps making DHCPREQUEST and getting DHCPACK.
Another symptom is quite a lot of ARP-messages compared to a v1 router trace.

Wireshark trace showing only DHCP and ARP messages:

A Windows 8.1 PC runs perfectly on the router, with textbook DHCP handshake and very few ARP messages.
I'm pretty sure that Windows is the culprit, but hope that somehow the router can be tweaked to avoid the situation.
(I refrain from preformatted text because it seemed to truncate the log lines)

We'll need to see the config to be able to advise more specifically...

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
grafik
Remember to redact passwords, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall

Here you go - I had the same/similar problem on 21.02.1, therefore I tried to upgrade via 22.03 to 23.05.04 - and hence som artefacts in the configuration from obsoleted 3G modems etc.:

{
	"kernel": "5.15.162",
	"hostname": "routerv3",
	"system": "MediaTek MT7628AN ver:1 eco:2",
	"model": "TP-Link TL-MR3020 v3",
	"board_name": "tplink,tl-mr3020-v3",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "23.05.4",
		"revision": "r24012-d8dd03c46f",
		"target": "ramips/mt76x8",
		"description": "OpenWrt 23.05.4 r24012-d8dd03c46f"
	}
}

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fdd1:xxxx:yyyy::/48'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0'
	option bridge_empty '1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option ipaddr '10.0.0.2'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '0'

config interface 'wanstik'
	option proto 'dhcp'
	option device 'br-lan'
	option auto '0'

config interface 'wan_rndis'
	option proto 'dhcp'
	option device 'eth1'

config interface 'wan_zte'
	option proto '3g'
	option device '/dev/ttyUSB2'
	option service 'umts_only'
	option apn 'internet'
	option ipv6 'auto'

config interface 'ethernet'
	option proto 'static'
	option device 'eth0'
	option ipaddr '10.0.0.200'
	option gateway '10.0.0.1'
	option auto '0'
	option netmask '255.255.255.0'

config route
	option interface 'lan'
	option target '0.0.0.0/0'
	option gateway '10.0.0.1'
	option disabled '1'

config route
	option interface 'lan'
	option target '0.0.0.0/0'
	option disabled '1'


config wifi-device 'radio0'
	option type 'mac80211'
	option hwmode '11g'
	option path 'platform/10300000.wmac'
	option cell_density '0'
	option txpower '18'
	option htmode 'HT20'
	option country 'DK'
	option channel '2'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option encryption 'psk2'
	option key '()'
	option disassoc_low_ack '0'
	option dtim_period '1'
	option ssid '(XXXX)'


config dnsmasq
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option expandhosts '1'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option localservice '1'
	option ednspacket_max '1232'
	option sequential_ip '1'
	option domainneeded '1'
	option domain 'local'
	option nonwildcard '0'

config dhcp 'lan'
	option interface 'lan'
	option leasetime '12h'
	option dhcpv4 'server'
	option ra 'server'
	list ra_flags 'managed-config'
	list ra_flags 'other-config'
	option limit '10'
	option dhcpv6 'server'
	option start '20'
	option force '1'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

config host
	option name '(ME-win11)'
	option ip '10.0.0.109'
	option broadcast '1'
	list mac '(liteon)'
	option leasetime '30m'


config defaults
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option synflood_protect '1'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'
	list network 'wan_rndis'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config forwarding
	option src 'lan'
	option dest 'wan'


Freshest version is 23.05.5 , you can use luci-app-attendedsysupgrade to maintain fw updates.

option cell_density '0'
-	option txpower '18'
	option htmode 'HT20'
	option country 'DK'
-	option channel '2'
+   option channel 'auto'
+   option acs_chan_bias '1:0.8 5:0.8 9:0.8 13:0.8'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
-	option encryption 'psk2'
+	option encryption 'psk2+ccmp'
+   option ieee80211w '1'
	option key '()'
-	option disassoc_low_ack '0'
-	option dtim_period '1'
	option ssid '(XXXX)'

Thanks for also looking into this, I know about the update but will concentrate on this issue for now - the firewall file now looks like this:

config wifi-device 'radio0'
	option type 'mac80211'
	option hwmode '11g'
	option path 'platform/10300000.wmac'
	option cell_density '0'
	option htmode 'HT20'
	option country 'DK'
	option channel 'auto'
	option acs_chan_bias '1:0.8 5:0.8 9:0.8 13:0.8'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option encryption 'psk2+ccmp'
	option ieee80211w '1'
	option key '()'
	option ssid '()'

and the problem remains:

Problem of what?
You "migrated" 2 versions ahead, half of settings was not migrated anyway.
Reset the device and type back config from backup made from v21.

I clean-installed 23.05.4, didn't restore my v21 config but manually configured as little as possible to get things running:
same symptoms: very frequent disconnects, repeated DHCPREQUEST + DHCPACK after initiial DHCPDISCOVER + DHCPOFFER, a lot of ARP traffic.
I've saved the new Wireshark trace.
The config files:

{
	"kernel": "5.15.167",
	"hostname": "OpenWrt",
	"system": "MediaTek MT7628AN ver:1 eco:2",
	"model": "TP-Link TL-MR3020 v3",
	"board_name": "tplink,tl-mr3020-v3",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "23.05.5",
		"revision": "r24106-10cc5fcd00",
		"target": "ramips/mt76x8",
		"description": "OpenWrt 23.05.5 r24106-10cc5fcd00"
	}
}

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd91:XXXX:YYYY::/48'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0.1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option ipaddr '10.0.0.2'
	option netmask '255.255.255.0'
	option ip6assign '60'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '0 6t'

config interface 'huawei_modem'
	option proto 'dhcp'
	option device 'eth1'


config wifi-device 'radio0'
	option type 'mac80211'
	option path 'platform/10300000.wmac'
	option channel 'auto'
	option band '2g'
	option htmode 'HT20'
	option country 'DK'
	option cell_density '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid '    '
	option encryption 'psk2'
	option key '    '


config dnsmasq
	option domainneeded '1'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option domain 'lan'
	option expandhosts '1'
	option cachesize '1000'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option localservice '1'
	option ednspacket_max '1232'

config dhcp 'lan'
	option interface 'lan'
	option start '100'
	option limit '150'
	option leasetime '12h'
	option dhcpv4 'server'
	option dhcpv6 'server'
	option ra 'server'
	list ra_flags 'managed-config'
	list ra_flags 'other-config'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'


config defaults
	option syn_flood '1'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'
	list network 'wan'
	list network 'wan6'
	list network 'huawei_modem'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'


Wireshark is secondary backscatter
Try to capture trace of hostapd at level 1 (level 0 is too much)

https://openwrt.org/docs/guide-developer/debugging#logging_hostapd_behaviour

Trying to follow instructions, see no .conf files mentioned ?

root@OpenWrt:~# ps | grep hostapd
 1778 root      2908 S    {hostapd} /sbin/ujail -t 5 -n hostapd -U network -G network -C /etc/capabilities/wpad.json -c -- /usr/sbin/hostapd -s -g /var/run/hostapd/global
 1783 network   4596 S    /usr/sbin/hostapd -s -g /var/run/hostapd/global
 3409 root      1372 S    grep hostapd
root@OpenWrt:~#

The files are in same place, just not in command line. Try to take it seriously instead of complaining.

root@OpenWrt:~# logread -f
Fri Dec  6 14:45:11 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:11 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:11 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:11 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:11 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:11 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:11 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:11 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:11 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Fri Dec  6 14:45:12 2024 daemon.info dnsmasq-dhcp[1]: DHCPRELEASE(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:14 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:14 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:14 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:14 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:14 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:14 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:14 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:17 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:17 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:17 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:17 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:17 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:17 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:17 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:21 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:21 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:21 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:21 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:21 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:21 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:21 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Fri Dec  6 14:45:28 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:28 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:28 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:28 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:28 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:28 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:28 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:31 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:31 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Fri Dec  6 14:45:35 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:35 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:35 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:35 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:35 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:35 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:35 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:35 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:35 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Fri Dec  6 14:45:45 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:45 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Fri Dec  6 14:45:45 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Fri Dec  6 14:45:45 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Fri Dec  6 14:45:45 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Fri Dec  6 14:45:45 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Fri Dec  6 14:45:45 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:45 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Fri Dec  6 14:45:45 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz

hostap trace shows nothing, no disconnect windows authenticates again. Can you add another access point with different name and check if it has something to do with windows stored connection information.

Possibly you have another access point around and Windows is trying to roam to it periodically?

Trying to answer you both:
On Windows:
turned wifi off
removed all known networks
On router via cabled connection from another PC:
renamed the access point in router
shutdown router
Booted router

logread while Windows connecting to new AP:

Sat Dec  7 14:31:30 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: Drop repeated authentication frame seq_ctrl=0x40
Sat Dec  7 14:31:30 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Sat Dec  7 14:31:30 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Sat Dec  7 14:31:30 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Sat Dec  7 14:31:31 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: EAPOL-Key timeout
Sat Dec  7 14:31:31 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: EAPOL-Key timeout
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: Process SNonce update from STA based on retransmitted EAPOL-Key 1/4
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: Try to process received EAPOL-Key 4/4 based on old Replay Counter and SNonce from an earlier EAPOL-Key 1/4
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Dec  7 14:31:32 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Sat Dec  7 14:31:32 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Sat Dec  7 14:31:32 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:32 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:32 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Sat Dec  7 14:31:32 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:32 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Sat Dec  7 14:31:32 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Dec  7 14:31:32 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Sat Dec  7 14:31:32 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Sat Dec  7 14:31:32 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Sat Dec  7 14:31:32 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:32 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:32 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz
Sat Dec  7 14:31:36 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authentication OK (open system)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 0 notification
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-AUTHENTICATE.indication(b8:1e:a4:a0:5f:4f, OPEN_SYSTEM)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:36 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: authenticated
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: association OK (aid 1)
Sat Dec  7 14:31:36 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: associated (aid 1)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-REASSOCIATE.indication(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f MLME: MLME-DELETEKEYS.request(b8:1e:a4:a0:5f:4f)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.11: binding station to interface 'phy0-ap0'
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: event 1 notification
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 1/4 msg of 4-Way Handshake
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: sending 3/4 msg of 4-Way Handshake
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Dec  7 14:31:36 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:1e:a4:a0:5f:4f auth_alg=open
Sat Dec  7 14:31:36 2024 daemon.debug hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f IEEE 802.1X: authorizing port
Sat Dec  7 14:31:36 2024 daemon.info hostapd: phy0-ap0: STA b8:1e:a4:a0:5f:4f WPA: pairwise key handshake completed (RSN)
Sat Dec  7 14:31:36 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:36 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f
Sat Dec  7 14:31:36 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 10.0.0.110 b8:1e:a4:a0:5f:4f lennz

I didn't manage to capture the start because buffer seems to be only 583 lines - hope that's not a problem.
There were no other routers switched on (but lots in the neighbourhood apartments)

Considering that another PC is maintaining a stable connection to this router, my best guess is that the Win11 PC has a wifi driver issue. I suggest you to go to the manufacturer website, look up the PC model there and see if an updated driver is available in their downloads. If not then you could try to look for an updated driver online. Be careful though, most of the top google results for driver updates will try to give you some sort of adware or malware.

Also make sure the power save features for the wifi on your PC are turned off

1 Like

I'll have another look for an updated wifi driver.
The power save tab for the wifi interface is not present:

As I wrote in the beginning, the DHCP handshake works very well with my spare TL-MR3020v1 with TP-Link firmware (from Wireshark trace):
DISCOVER, OFFER, REQUEST, ACK - and that's it.
Also, the ARP-traffic between the router and PC dies out within a few seconds...

Probably wrong start, remove wifi adapter keeping driver files and let windows re-detect it with default settings.

I once encountered win 10, it had a bug from the start and I think you have the same problem with 11.
the problem is not in the router, the problem is in windows itself.
try deleting your wifi connection in win settings and reconnect and enter the password.
Personally, I continue to use Win 7, because it is better than any new one in everything)

I tried both suggestions with same result.
A search for a driver with a newer version led me only to russian sites so far...

I've used Wireshark to log the initial DHCP handshake on both routers, maybe the logs can help identify the cause of the problem?

Router with OpenWrt firmware:

Frame 1: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Dynamic Host Configuration Protocol (Discover)
    Message type: Boot Request (1)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0xe54950bf
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 0.0.0.0
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Discover)
    Option: (61) Client identifier
    Option: (12) Host Name
    Option: (60) Vendor class identifier
    Option: (55) Parameter Request List
    Option: (255) End
    Padding: 0000000000000000000000000000

Frame 18: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: TP-Link_fc:da:96 (c0:06:c3:fc:da:96), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 10.0.0.2, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Dynamic Host Configuration Protocol (Offer)
    Message type: Boot Reply (2)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0xe54950bf
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 10.0.0.110
    Next server IP address: 10.0.0.2
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Offer)
    Option: (54) DHCP Server Identifier (10.0.0.2)
    Option: (51) IP Address Lease Time
    Option: (58) Renewal Time Value
    Option: (59) Rebinding Time Value
    Option: (1) Subnet Mask (255.255.255.0)
    Option: (28) Broadcast Address (10.0.0.255)
    Option: (3) Router
    Option: (6) Domain Name Server
    Option: (15) Domain Name
    Option: (255) End
    Padding: 000000

Frame 19: 350 bytes on wire (2800 bits), 350 bytes captured (2800 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Dynamic Host Configuration Protocol (Request)
    Message type: Boot Request (1)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0xe54950bf
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 0.0.0.0
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Request)
    Option: (61) Client identifier
    Option: (50) Requested IP Address (10.0.0.110)
    Option: (54) DHCP Server Identifier (10.0.0.2)
    Option: (12) Host Name
    Option: (81) Client Fully Qualified Domain Name
    Option: (60) Vendor class identifier
    Option: (55) Parameter Request List
    Option: (255) End

Frame 20: 353 bytes on wire (2824 bits), 353 bytes captured (2824 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: TP-Link_fc:da:96 (c0:06:c3:fc:da:96), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 10.0.0.2, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Dynamic Host Configuration Protocol (ACK)
    Message type: Boot Reply (2)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0xe54950bf
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 10.0.0.110
    Next server IP address: 10.0.0.2
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (ACK)
    Option: (54) DHCP Server Identifier (10.0.0.2)
    Option: (51) IP Address Lease Time
    Option: (58) Renewal Time Value
    Option: (59) Rebinding Time Value
    Option: (1) Subnet Mask (255.255.255.0)
    Option: (28) Broadcast Address (10.0.0.255)
    Option: (3) Router
    Option: (6) Domain Name Server
    Option: (15) Domain Name
    Option: (81) Client Fully Qualified Domain Name
    Option: (255) End

Frame 128: 344 bytes on wire (2752 bits), 344 bytes captured (2752 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Dynamic Host Configuration Protocol (Request)
    Message type: Boot Request (1)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x5b7c3870
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 0.0.0.0
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Request)
    Option: (61) Client identifier
    Option: (50) Requested IP Address (10.0.0.110)
    Option: (12) Host Name
    Option: (81) Client Fully Qualified Domain Name
    Option: (60) Vendor class identifier
    Option: (55) Parameter Request List
    Option: (255) End

Frame 129: 353 bytes on wire (2824 bits), 353 bytes captured (2824 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: TP-Link_fc:da:96 (c0:06:c3:fc:da:96), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 10.0.0.2, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Dynamic Host Configuration Protocol (ACK)
    Message type: Boot Reply (2)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x5b7c3870
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 10.0.0.110
    Next server IP address: 10.0.0.2
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (ACK)
    Option: (54) DHCP Server Identifier (10.0.0.2)
    Option: (51) IP Address Lease Time
    Option: (58) Renewal Time Value
    Option: (59) Rebinding Time Value
    Option: (1) Subnet Mask (255.255.255.0)
    Option: (28) Broadcast Address (10.0.0.255)
    Option: (3) Router
    Option: (6) Domain Name Server
    Option: (15) Domain Name
    Option: (81) Client Fully Qualified Domain Name
    Option: (255) End

Router with TP-Link firmware:

Frame 25: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Dynamic Host Configuration Protocol (Discover)
    Message type: Boot Request (1)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x87c67df0
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 0.0.0.0
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Discover)
    Option: (61) Client identifier
    Option: (12) Host Name
    Option: (60) Vendor class identifier
    Option: (55) Parameter Request List
    Option: (255) End
    Padding: 0000000000000000000000000000

Frame 26: 590 bytes on wire (4720 bits), 590 bytes captured (4720 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: Tp-LinkT_a0:5d:80 (f8:d1:11:a0:5d:80), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 10.0.0.1, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Dynamic Host Configuration Protocol (Offer)
    Message type: Boot Reply (2)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x87c67df0
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 10.0.0.109
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Offer)
    Option: (54) DHCP Server Identifier (10.0.0.1)
    Option: (51) IP Address Lease Time
    Option: (1) Subnet Mask (255.255.255.0)
    Option: (3) Router
    Option: (6) Domain Name Server
    Option: (255) End
    Padding: 000000000000000000000000000000000000000000000000000000000000000000000000…

Frame 27: 350 bytes on wire (2800 bits), 350 bytes captured (2800 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Dynamic Host Configuration Protocol (Request)
    Message type: Boot Request (1)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x87c67df0
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 0.0.0.0
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (Request)
    Option: (61) Client identifier
    Option: (50) Requested IP Address (10.0.0.109)
    Option: (54) DHCP Server Identifier (10.0.0.1)
    Option: (12) Host Name
    Option: (81) Client Fully Qualified Domain Name
    Option: (60) Vendor class identifier
    Option: (55) Parameter Request List
    Option: (255) End

Frame 28: 590 bytes on wire (4720 bits), 590 bytes captured (4720 bits) on interface \Device\NPF_{9C67C0B1-318E-472E-88F3-4DFC06E66D70}, id 0
Ethernet II, Src: Tp-LinkT_a0:5d:80 (f8:d1:11:a0:5d:80), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 10.0.0.1, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Dynamic Host Configuration Protocol (ACK)
    Message type: Boot Reply (2)
    Hardware type: Ethernet (0x01)
    Hardware address length: 6
    Hops: 0
    Transaction ID: 0x87c67df0
    Seconds elapsed: 0
    Bootp flags: 0x8000, Broadcast flag (Broadcast)
    Client IP address: 0.0.0.0
    Your (client) IP address: 10.0.0.109
    Next server IP address: 0.0.0.0
    Relay agent IP address: 0.0.0.0
    Client MAC address: LiteonTe_a0:5f:4f (b8:1e:a4:a0:5f:4f)
    Client hardware address padding: 00000000000000000000
    Server host name not given
    Boot file name not given
    Magic cookie: DHCP
    Option: (53) DHCP Message Type (ACK)
    Option: (54) DHCP Server Identifier (10.0.0.1)
    Option: (51) IP Address Lease Time
    Option: (1) Subnet Mask (255.255.255.0)
    Option: (3) Router
    Option: (6) Domain Name Server
    Option: (255) End
    Padding: 000000000000000000000000000000000000000000000000000000000000000000000000…

Of course the traces are not equal, but I'm unable to pinpoint any major differences.
Let me know if the traces need to have som fields expanded further.

I can also provide a trace from a Windows 8.1 client connecting correctly to the router with OpenWrt firmware if that may be of any help?