[Solved] Wifi up, cannot connect with any device (even with cable)

I'm running a OpenWrt 18.06.1, r7258 on my gl inet (flashed the firmware recently). The stability is much better, but it happens every couple of days that it magically stops working. Any device is stuck at authenticating (is there any command I can use to debug exactly where on my laptop?) and I have to reboot it multiple times, eventually plug the ethernet cable and it starts magically accepting connections and serving again traffic.
logread is empty between when it stops working and when it starts again.
How can I trace this issue? I'm trying to avoid flashing the firmware again and again, mainly because I don't think it'd help.

If you need more info or there's anything missing, please do let me know

It's happening on every reboot after a successful one (one in which it accepts connections).

Surprisingly it's happened one or two times with my HomeHub 5A running v18.06.1 and it says that WiFi is full and even ADSL pppoe wasn't connecting.

As I have ExtRoot installed I think it is because of that. When the router boots up there could be some errors on the ExtRoot drive and after reboot everything was fine. Have you installed an ExtRoot?

I am not, I'm only using the clean firmware. I also don't have anything at all between when it stops responding and when it allows me to log in and use logread. I don't really know how to check this

Could you please clarify a couple of points?

  • Does it work again when you plug in the cable or when you plug it out?
  • Does it work for wired computers?

Sure. When I plug in the cable, it doesn't work. If I leave the cable in and reboot it, as soon as it is up again then it starts working again. (it is so weird)
Both Wifi and ethernet work fine when the cable is in after a reboot.

You can try to increase the log buffer and save it somewhere you can access even if you cant access the router itself. I think there's an option to log remotely into another system but I don't know because never tested myself. This way you can see what is the problem with the router and where exactly it's occurring.

I can try, but I'm not really sure whether it even connects to a network. Maybe to a usb? Increasing the log buffer won't do much: it doesn't log anything at all during the period in which it doesn't work. A higher log level probably can be better.

I think there is an option to log on the remote server but I am not sure if it will work when the network is not quite working. You already said you cannot connect to the device from Ethernet or WiFi when it's acting out and you end up restarting it. So how would you know if it produces any error logs? Furthermore USB is a better choice because even when the device is acting out it may still provide something to the USB. AFAIK logging in default saves to ram, so having a default level of verbosity maybe is also okay as long as you have a log to read even after the reboot. Plus increasing the buffer will be helpful because you maybe reading the log after the router boots up and by then most of the log would be replaced by new one.

I honestly don't know how to work out a solution for this :confused: I have to find out which logs can provide more insight and enable their more verbose logging...

In LuCI go to System -> System and then Logging tab. There you will find a bunch of options that you can choose for logging. You should increase the system log buffer size to a value say 512 Kb then write the file location to save the log file. e.g. /mnt/system.log (or wherever your USB is mounted). Choose log output level to Debug if you want detailed info. Hit save and apply and you should be done and then you can look for your problem in log.

That's great, thanks for the suggestion; both the settings are set to "Debug" now.
The log is being outputted to the pendrive. Here it is:

Fri Feb  1 23:12:02 2019 daemon.notice netifd: Interface 'wwan' is now up
Fri Feb  1 23:12:02 2019 user.notice firewall: Reloading firewall due to ifup of wwan (wlan0)
Fri Feb  1 23:18:55 2019 daemon.info dnsmasq-dhcp[1527]: DHCPDISCOVER(br-lan) d0:4e:71:44:af:e0
Fri Feb  1 23:18:55 2019 daemon.info dnsmasq-dhcp[1527]: DHCPOFFER(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:18:55 2019 daemon.info dnsmasq-dhcp[1527]: DHCPREQUEST(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:18:55 2019 daemon.info dnsmasq-dhcp[1527]: DHCPACK(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:19:05 2019 authpriv.info dropbear[1612]: Child connection from 192.168.8.201:32948
Fri Feb  1 23:19:25 2019 authpriv.notice dropbear[1612]: Password auth succeeded for 'root' from 192.168.8.201:32948
Fri Feb  1 23:19:28 2019 daemon.info dnsmasq[1527]: now checking DNSSEC signature timestamps
Fri Feb  1 23:19:28 2019 daemon.info dnsmasq[1527]: read /etc/hosts - 4 addresses
Fri Feb  1 23:19:28 2019 daemon.info dnsmasq[1527]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Fri Feb  1 23:19:28 2019 daemon.info dnsmasq-dhcp[1527]: read /etc/ethers - 0 addresses
root@OpenWrt:/mnt/sda1# packet_write_wait: Connection to 192.168.8.1 port 22: Broken pipe

It was the same output by logread.
At 23:20 I unplug the gl inet, plug it again without the ethernet cable, see the wifi connection, but as usual I cannot connect.
I unplug the gl inet, plug the ethernet cable and at 23:22 power it on.
I wait till 23:24; I can see the wifi connection, connect and here's the log now.

Fri Feb  1 23:12:00 2019 kern.info kernel: [   31.193592] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
Fri Feb  1 23:12:00 2019 kern.info kernel: [   31.200584] br-lan: port 2(wlan0-1) entered blocking state
Fri Feb  1 23:12:00 2019 kern.info kernel: [   31.206292] br-lan: port 2(wlan0-1) entered forwarding state
Fri Feb  1 23:12:00 2019 daemon.notice netifd: Network device 'wlan0-1' link is up
Fri Feb  1 23:12:00 2019 user.notice firewall: Reloading firewall due to ifup of wwan (wlan0)
Fri Feb  1 23:24:22 2019 daemon.info dnsmasq-dhcp[1538]: DHCPDISCOVER(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:24:22 2019 daemon.info dnsmasq-dhcp[1538]: DHCPOFFER(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:24:22 2019 daemon.info dnsmasq-dhcp[1538]: DHCPREQUEST(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:24:22 2019 daemon.info dnsmasq-dhcp[1538]: DHCPACK(br-lan) 192.168.8.201 d0:4e:71:44:af:e0
Fri Feb  1 23:24:28 2019 authpriv.info dropbear[1611]: Child connection from 192.168.8.201:32952
Fri Feb  1 23:24:30 2019 authpriv.notice dropbear[1611]: Password auth succeeded for 'root' from 192.168.8.201:32952

Some of the entries are gone??? How is this possible??? I'm reading the same file...
(waiting for longer before connecting to the wifi doesn't change anything, it still doesn't let any device connect to it)

I'm looking for a solution to this instead of reflashing (a new) firmware, in case it's a bug and the openwrt team wants to fix it

The log you provided above doesn't say anything that seems to be wrong/broken. So you need to provide more log which states what's actually going on.

Currently the log says that a device is requesting ip address and it is being handled properly. I don't see anything that is wrong in the log. You should use your device as you do and when the router starts to behave abnormally just turn it off completely. Then take out the USB and copy the log to your computer and link the full log here.

Good advice! This is the full log. At 15:03 I turn off the device and reboot it without the ethernet cable in.
Then I try to connect to it, but I cannot connect.

Sat Feb  2 15:03:53 2019 daemon.info dnsmasq[851]: now checking DNSSEC signature timestamps
Sat Feb  2 15:03:53 2019 daemon.info dnsmasq[851]: read /etc/hosts - 4 addresses
Sat Feb  2 15:03:53 2019 daemon.info dnsmasq[851]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Sat Feb  2 15:03:58 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 15:03:58 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 15:03:58 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:03:58 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 15:04:30 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:04:31 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 15:04:31 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 15:04:31 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:04:31 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 15:04:36 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 IEEE 802.11: authenticated
Sat Feb  2 15:04:36 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 IEEE 802.11: associated (aid 2)
Sat Feb  2 15:04:36 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 48:69:03:10:6f:01
Sat Feb  2 15:04:36 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 15:05:12 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:05:13 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 15:05:13 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 15:05:13 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:05:13 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 15:05:21 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 48:69:03:10:6f:01
Sat Feb  2 15:05:25 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 IEEE 802.11: authenticated
Sat Feb  2 15:05:25 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 IEEE 802.11: associated (aid 2)
Sat Feb  2 15:05:25 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 48:69:03:10:6f:01
Sat Feb  2 15:05:25 2019 daemon.info hostapd: wlan0-1: STA 48:69:03:10:6f:01 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 15:05:32 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:05:49 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 15:05:49 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 15:05:49 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 15:05:49 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)

At the end I turn it off and get the full log above from the pendrive.

Well now it makes sense to look at the log, it repeatedly shows device getting connected and then getting disconnected in just a few seconds. That means something is not working right. It can actually be a bug in wifi driver or the hostapd itself maybe.

It is also possible that there's some kind of interference maybe which doesn't let the wifi run properly. Have you tried changing channels? Maybe try different channels to see if the problem is still there. Btw now that v18.06.2 is available, I'd suggest to give it a try because it's possible that this problem may have been fixed in this update but I can't say for sure.

Thanks for the info. I have updated the firmware to the latest version and I still experience the same issue. Here's the log again:

Sat Feb  2 22:01:21 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:01:21 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:01:21 2019 daemon.info dnsmasq[853]: now checking DNSSEC signature timestamps
Sat Feb  2 22:01:21 2019 daemon.info dnsmasq[853]: read /etc/hosts - 4 addresses
Sat Feb  2 22:01:21 2019 daemon.info dnsmasq[853]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Sat Feb  2 22:01:21 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:01:21 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 22:01:52 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:01:53 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:01:53 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:01:53 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:01:53 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 22:02:23 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:02:24 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:02:24 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:02:24 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:02:24 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)

Log when it works:

Sat Feb  2 22:06:24 2019 daemon.info dnsmasq-dhcp[1508]: DHCPREQUEST(br-lan) 192.168.8.201 60:f7:f7:92:ae:5f
Sat Feb  2 22:06:24 2019 daemon.info dnsmasq-dhcp[1508]: DHCPACK(br-lan) 192.168.8.201 60:f7:f7:92:ae:5f
Sat Feb  2 22:06:35 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:06:35 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:06:36 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:06:36 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 22:06:37 2019 daemon.info dnsmasq-dhcp[1508]: DHCPREQUEST(br-lan) 192.168.8.128 d0:4e:71:44:af:e0
Sat Feb  2 22:06:37 2019 daemon.info dnsmasq-dhcp[1508]: DHCPACK(br-lan) 192.168.8.128 d0:4e:71:44:af:e0 android
Sat Feb  2 22:06:52 2019 daemon.info dnsmasq[1508]: now checking DNSSEC signature timestamps
Sat Feb  2 22:06:52 2019 daemon.info dnsmasq[1508]: read /etc/hosts - 4 addresses
Sat Feb  2 22:06:52 2019 daemon.info dnsmasq[1508]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Feb  2 22:06:52 2019 daemon.info dnsmasq-dhcp[1508]: read /etc/ethers - 0 addresses

Still:

  • The log is cut (some parts disappears, but with your suggestion I can get the most recent one)
  • It works only when it boots up with the cable in

It's indifferent to other channels. It's so weird it works only when it boots up with an ethernet cable in :frowning: if the cable is later disconnected it keeps working.
I'd be happy to continue debugging if you have any other ideas or other people help us in finding out what's going on!

I have increased the logging of hostapd to 0 (max verbose) and here it is:

Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authentication OK (open system)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-AUTHENTICATE.indication(d0:4e:71:44:af:e0, OPEN_SYSTEM)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DELETEKEYS.request(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:02 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: association OK (aid 1)
Sat Feb  2 22:23:02 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-ASSOCIATE.indication(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DELETEKEYS.request(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: binding station to interface 'wlan0-1'
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: event 1 notification
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: start authentication
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.1X: unauthorizing port
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: sending 1/4 msg of 4-Way Handshake
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: sending 3/4 msg of 4-Way Handshake
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Feb  2 22:23:02 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:23:02 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.1X: authorizing port
Sat Feb  2 22:23:02 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)
Sat Feb  2 22:23:33 2019 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:23:33 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: event 3 notification
Sat Feb  2 22:23:33 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.1X: unauthorizing port
Sat Feb  2 22:23:33 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: deauthenticated
Sat Feb  2 22:23:33 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DEAUTHENTICATE.indication(d0:4e:71:44:af:e0, 3)
Sat Feb  2 22:23:33 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DELETEKEYS.request(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authentication OK (open system)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-AUTHENTICATE.indication(d0:4e:71:44:af:e0, OPEN_SYSTEM)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DELETEKEYS.request(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:43 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: authenticated
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: association OK (aid 1)
Sat Feb  2 22:23:43 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: associated (aid 1)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-ASSOCIATE.indication(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 MLME: MLME-DELETEKEYS.request(d0:4e:71:44:af:e0)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.11: binding station to interface 'wlan0-1'
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: event 1 notification
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: start authentication
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.1X: unauthorizing port
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: sending 1/4 msg of 4-Way Handshake
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: sending 3/4 msg of 4-Way Handshake
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sat Feb  2 22:23:43 2019 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED d0:4e:71:44:af:e0
Sat Feb  2 22:23:43 2019 daemon.debug hostapd: wlan0-1: STA d0:4e:71:44:af:e0 IEEE 802.1X: authorizing port
Sat Feb  2 22:23:43 2019 daemon.info hostapd: wlan0-1: STA d0:4e:71:44:af:e0 WPA: pairwise key handshake completed (RSN)

It seems the problem is in DHCP server, it seems to be working when there is a LAN connection already working. This is why you cant get it connected through wifi.

One suggestion here is to use static ip on your phone/pc wifi and then try to connect to wifi when it's not working. I think if it's a problem with DHCP it will work properly and you’ll be able to connect. If it works this way then please post your network and dhcp config here.