Wireless client can't obtain IP address

Hi there,
I've updated my WiTi board from 18.06.0 to 18.06.1 and now I can't use wireless devices with it. All hangs on obtaining IP address ( tested on android phones ). After that try WiFi network disappears from list for couple of seconds. I've tried to downgrade to 18.06.0 but it didn't helped...
Here are my configuration files:
dhcp:

config dnsmasq
        option domainneeded '1'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.auto'
        option localservice '1'
        option nonwildcard '0'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv6 'server'
        option ra 'server'
        list dhcp_option '6,192.168.1.2'
        list dns 'fd63:bbaa:3c05:0:40c8:3453:c67:b644'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'

network:

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd63:bbaa:3c05::/48'

config interface 'lan'
        option type 'bridge'
        option ifname 'eth0.1'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option ip6assign '60'

config device 'lan_dev'
        option name 'eth0.1'
        option macaddr '16:bf:6c:47:8a:8f'

config interface 'wan'
        option ifname 'eth0.2'
        option proto 'dhcp'
        option dns '208.67.222.222 208.67.220.220'

config device 'wan_dev'
        option name 'eth0.2'
        option macaddr '16:bf:6c:47:8a:90'

config interface 'wan6'
        option ifname 'eth0.2'
        option proto 'dhcpv6'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '0 1 2 3 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '4 6t'

wireless:

        option type 'mac80211'
        option hwmode '11a'
        option path 'pci0000:00/0000:00:00.0/0000:01:00.0'
        option htmode 'VHT80'
        option channel 'auto'
        option country 'PL'
        option legacy_rates '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option encryption 'psk2'
        option key 'SomeRandomPass'
        option ssid 'LEDE5G'

config wifi-device 'radio1'
        option type 'mac80211'
        option hwmode '11g'
        option path 'pci0000:00/0000:00:01.0/0000:02:00.0'
        option country 'PL'
        option legacy_rates '1'
        option channel 'auto'
        option htmode 'HT40'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option encryption 'psk2'
        option key 'SomeRandomPass'
        option ssid 'LEDE2G'

config wifi-iface
        option device 'radio1'
        option mode 'ap'
        option ssid 'LEDE2'
        option encryption 'psk2'
        option key 'SomeRandomPass'
        option network 'lan'

and firewall:

config defaults
        option syn_flood '1'
        option output 'ACCEPT'
        option forward 'REJECT'
        option input 'REJECT'

config zone
        option name 'lan'
        list network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'

config zone
        option name 'wan'
        list network 'wan'
        list network 'wan6'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        option input 'REJECT'
        option output 'ACCEPT'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fc00::/6'
        option dest_ip 'fc00::/6'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'

Something like option dhcpv4 'server' is missing....perhaps

@Doppel-D Thanks for your response. I believe, that that kind of option is not needed because connection through ethernet cable works fine and ip address is assigned properly.

Is this correct?

@mbo2o yes it is correct. I have Pi-hole server as my lan primary DNS server.

Strange...I am also using odhcp (dnsmasq removed) and without that option I am not getting an IP.

I've made some observations and it seems that WiFi on 5GHz works fine. Problem is only with 2.4 GHz. Is there any way to debug connecting process on router side?

I've changed topic because it looks like problem is not in dhcp but in wireless network itself. On 2.4 GHz WiFi network disappears after connecting to it and after few second its going up. The effect is that my device is trying in loop to connect to WiFi and sometimes even gets IP address, but connection is broken very quick and I can't transfer any data.

Anything helpful in the logs?

From wiki: https://wiki.openwrt.org/doc/devel/debugging I've increased log level to 1:

Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:10 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:02:10 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: start authentication
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: unauthorizing port
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:02:10 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d1:3a:cd:42:85
Sun Sep  2 13:02:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: authorizing port
Sun Sep  2 13:02:10 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:02:11 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:02:11 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-AUTHENTICATE.indication(00:22:6b:6d:d9:38, OPEN_SYSTEM)
Sun Sep  2 13:02:11 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:02:11 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authenticated
Sun Sep  2 13:02:11 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:02:14 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:02:14 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:02:15 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-AUTHENTICATE.indication(00:22:6b:6d:d9:38, OPEN_SYSTEM)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:02:26 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authenticated
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: association OK (aid 2)
Sun Sep  2 13:02:26 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: associated (aid 2)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-ASSOCIATE.indication(00:22:6b:6d:d9:38)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: event 1 notification
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: start authentication
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.1X: unauthorizing port
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:02:26 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 00:22:6b:6d:d9:38
Sun Sep  2 13:02:26 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.1X: authorizing port
Sun Sep  2 13:02:26 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 0 notification
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:43 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:02:43 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:02:43 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d1:3a:cd:42:85
Sun Sep  2 13:02:43 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: authorizing port
Sun Sep  2 13:02:43 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:02:45 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:02:47 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:02:47 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:02:49 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 0 notification
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:10 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:03:10 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:03:10 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:11 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: EAPOL-Key timeout
Sun Sep  2 13:03:11 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:12 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: EAPOL-Key timeout
Sun Sep  2 13:03:12 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:13 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: EAPOL-Key timeout
Sun Sep  2 13:03:13 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: EAPOL-Key timeout
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: PTKSTART: Retry limit 4 reached
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 3 notification
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: unauthorizing port
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DEAUTHENTICATE.indication(04:d1:3a:cd:42:85, 2)
Sun Sep  2 13:03:14 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:19 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: deauthenticated due to local deauth request
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:21 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:03:21 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: start authentication
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: unauthorizing port
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:03:21 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d1:3a:cd:42:85
Sun Sep  2 13:03:21 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: authorizing port
Sun Sep  2 13:03:21 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:03:22 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:03:25 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:03:25 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:03:26 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:03:27 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:03:27 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: event 0 notification
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-AUTHENTICATE.indication(00:22:6b:6d:d9:38, OPEN_SYSTEM)
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:03:35 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authenticated
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: association OK (aid 2)
Sun Sep  2 13:03:35 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: associated (aid 2)
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-REASSOCIATE.indication(00:22:6b:6d:d9:38)
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: event 1 notification
Sun Sep  2 13:03:35 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: EAPOL-Key timeout
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:03:36 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 00:22:6b:6d:d9:38
Sun Sep  2 13:03:36 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.1X: authorizing port
Sun Sep  2 13:03:36 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:04:23 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 0 notification
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:29 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:05:29 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:05:29 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d1:3a:cd:42:85
Sun Sep  2 13:05:29 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: authorizing port
Sun Sep  2 13:05:29 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:05:30 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:05:32 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:05:32 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:05:34 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:05:34 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:05:34 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: event 0 notification
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-AUTHENTICATE.indication(00:22:6b:6d:d9:38, OPEN_SYSTEM)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:05:42 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: authenticated
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: association OK (aid 2)
Sun Sep  2 13:05:42 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: associated (aid 2)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-ASSOCIATE.indication(00:22:6b:6d:d9:38)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 MLME: MLME-DELETEKEYS.request(00:22:6b:6d:d9:38)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: event 1 notification
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:05:42 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 00:22:6b:6d:d9:38
Sun Sep  2 13:05:42 2018 daemon.debug hostapd: wlan1: STA 00:22:6b:6d:d9:38 IEEE 802.1X: authorizing port
Sun Sep  2 13:05:42 2018 daemon.info hostapd: wlan1: STA 00:22:6b:6d:d9:38 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authentication OK (open system)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 0 notification
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-AUTHENTICATE.indication(04:d1:3a:cd:42:85, OPEN_SYSTEM)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:44 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: authenticated
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: association OK (aid 1)
Sun Sep  2 13:05:44 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: associated (aid 1)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-ASSOCIATE.indication(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 MLME: MLME-DELETEKEYS.request(04:d1:3a:cd:42:85)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.11: binding station to interface 'wlan1'
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: event 1 notification
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 1/4 msg of 4-Way Handshake
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (2/4 Pairwise)
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: sending 3/4 msg of 4-Way Handshake
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: received EAPOL-Key frame (4/4 Pairwise)
Sun Sep  2 13:05:44 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 04:d1:3a:cd:42:85
Sun Sep  2 13:05:44 2018 daemon.debug hostapd: wlan1: STA 04:d1:3a:cd:42:85 IEEE 802.1X: authorizing port
Sun Sep  2 13:05:44 2018 daemon.info hostapd: wlan1: STA 04:d1:3a:cd:42:85 WPA: pairwise key handshake completed (RSN)
Sun Sep  2 13:05:45 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan
Sun Sep  2 13:05:48 2018 daemon.info dnsmasq-dhcp[2178]: DHCPDISCOVER(br-lan) 04:d1:3a:cd:42:85
Sun Sep  2 13:05:48 2018 daemon.info dnsmasq-dhcp[2178]: DHCPOFFER(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:05:48 2018 daemon.info dnsmasq-dhcp[2178]: DHCPREQUEST(br-lan) 192.168.1.123 04:d1:3a:cd:42:85
Sun Sep  2 13:05:48 2018 daemon.info dnsmasq-dhcp[2178]: DHCPACK(br-lan) 192.168.1.123 04:d1:3a:cd:42:85 Redmi5A-RM5
Sun Sep  2 13:05:49 2018 daemon.info odhcpd[1283]: Using a RA lifetime of 0 seconds on br-lan