Wifi clients often reconnect after accidentally disconnect

wpa2-enterprise

Model Xiaomi Redmi Router AC2100
Architecture MediaTek MT7621 ver:1 eco:3
Firmware Version OpenWrt 21.02.1 r16325-88151b8303 / LuCI openwrt-21.02 branch git-21.295.67054-13df80d
dmesg -h
[12/03/2022 20:10:08] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
[12/03/2022 21:10:10] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.


logread
Sat Mar 12 21:10:23 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Sat Mar 12 21:10:23 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Mar 12 21:10:25 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session C154820B3CDCFF47
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Sat Mar 12 21:10:25 2022 kern.warn kernel: [541174.635253] Rekeying PTK for STA 9a:eb:36:19:45:9f but driver can't safely do that.

Sat Mar 12 21:46:15 2022 kern.warn kernel: [542626.258567] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
Sat Mar 12 21:49:22 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: disconnected due to excessive missing ACKs
Sat Mar 12 21:49:22 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:24 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: authenticated
Sat Mar 12 21:49:24 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: associated (aid 1)
Sat Mar 12 21:49:24 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:24 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-RETRANSMIT2 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session C154820B3CDCFF47
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Sat Mar 12 21:49:27 2022 daemon.warn dnsmasq-dhcp[4602]: no address range available for DHCP request via br-lan.4
  • Do you have a question?
  • What do you mean by the phrase "accidentally disconnect"?
  • Did you notice that your br-lan.4 is not issuing IP addresses?

1,Often disconnected
2,dhcp configurate
QQ截图20220313151517

The "can't safely rekey PTK" message is because you've checked the "Protect against KRACK attack" box. It's not enabled by default because it can cause problems for some clients. If you are having a problem with actual data loss and not just messages in the log, try turning that setting off.

Also it's normal for many battery-powered clients to abruptly turn their wifi radio off (without formally disconnecting, which requires transmitting packets, a waste of battery power on their end) when they go to sleep. This causes the router to drop them due to missing ACKs. The connection re-establishes from scratch when the device wakes up. The missing ACK disconnect is also going to happen whenever a portable client is moved out of radio range.

4 Likes

1,KRACK attack was disabled
2,Disassociate On Low was disabled
but there are still problems

Tue Mar 15 02:39:06 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Tue Mar 15 02:39:08 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Tue Mar 15 02:39:08 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session 147CC10590941D33
Tue Mar 15 02:39:08 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Tue Mar 15 02:39:08 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Tue Mar 15 02:39:08 2022 kern.warn kernel: [96497.514676] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
Tue Mar 15 03:39:08 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Tue Mar 15 03:39:11 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-RETRANSMIT2 32:5e:16:b1:62:26
Tue Mar 15 03:39:12 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Tue Mar 15 03:39:12 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session 147CC10590941D33
Tue Mar 15 03:39:12 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Tue Mar 15 03:39:12 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Tue Mar 15 03:39:12 2022 kern.warn kernel: [100096.738462] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
Tue Mar 15 04:39:10 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Tue Mar 15 04:39:11 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Tue Mar 15 04:39:11 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session 147CC10590941D33
Tue Mar 15 04:39:11 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Tue Mar 15 04:39:11 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Tue Mar 15 04:39:11 2022 kern.warn kernel: [103701.293770] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
Tue Mar 15 05:39:12 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Tue Mar 15 05:39:15 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-RETRANSMIT2 32:5e:16:b1:62:26
Tue Mar 15 05:39:16 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Tue Mar 15 05:39:16 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session 147CC10590941D33
Tue Mar 15 05:39:16 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Tue Mar 15 05:39:16 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Tue Mar 15 05:39:16 2022 kern.warn kernel: [107300.414326] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.


2