config wifi-iface '123'
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'edited'
option encryption 'psk2+ccmp'
option key 'edited'
option short_preamble '0'
option disassoc_low_ack '0'
option wpa_group_rekey '86400'
option wpa_strict_rekey '1'
option isolate '1'
option wpa_disable_eapol_key_retries '1'
option tdls_prohibit '1'
this is the only relevant information and the fact that it's an ap on 2,4 Ghz band
I have no issue to share the mac of the offending device because it is not mine D8:D6:68:uv:wx:yz (uv:wx:yz is the part that is changing this is why i did not provided it because I do not even know what is the real one)
As i said in the initial post the log is flooded with:
daemon.debug hostapd: phy0-ap0: STA ab:cd:ef:uv:wx:yz IEEE 802.11: authentication OK (open system)
daemon.debug hostapd: phy0-ap0: STA ab:cd:ef:uv:wx:yz MLME: MLME-AUTHENTICATE.indication(ab:cd:ed:uv:wx:yz, OPEN_SYSTEM)
daemon.debug hostapd: phy0-ap0: STA ab:cd:ef:uv:wx:yz MLME: MLME-DELETEKEYS.request(ab:cd:ed:uv:wx:yz)
daemon.notice hostapd: phy0-ap0: STA ab:cd:ef:uv:wx:yz IEEE 802.11: did not acknowledge authentication response
after i added:
option macfilter 'deny'
list maclist 'd8:d6:68:ab:cd:ef'
all was good for 2 days, but after 2 days i started to see the same behaviour coming from d8:d6:68:uv:wx:yz , so clearly whoever does this saw that it got macfiltered and partially changed the mac. i do not know if this is some neighbour doing this or this is a compromise device, all I know is that this is not a device that i or someone else in the house is owning.
clearly going with deny is a no go, every x days, probably faster because other side is aware that i try to stop this, i will see another mac spamming the logs.
white list also does not work because i have some legit devices that I can not set to use a static mac and only operate on 2,4 Ghz band.
and when i say the log is flooded i mean that u see this in the log over and over with no delay:
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz IEEE 802.11: authentication OK (open system)
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz MLME: MLME-AUTHENTICATE.indication(d8:d6:68:uv:wx:yz, OPEN_SYSTEM)
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz MLME: MLME-DELETEKEYS.request(d8:d6:68:uv:wx:yz)
Sun Nov 23 21:03:48 2025 daemon.notice hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz IEEE 802.11: did not acknowledge authentication response
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz IEEE 802.11: authentication OK (open system)
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz MLME: MLME-AUTHENTICATE.indication(d8:d6:68:uv:wx:yz, OPEN_SYSTEM)
Sun Nov 23 21:03:48 2025 daemon.debug hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz MLME: MLME-DELETEKEYS.request(d8:d6:68:uv:wx:yz)
Sun Nov 23 21:03:48 2025 daemon.notice hostapd: phy0-ap0: STA d8:d6:68:uv:wx:yz IEEE 802.11: did not acknowledge authentication response