WPS fails on OpenWRT 24.10 with authentication failed

Hi All

I am running OpenWRT 24.10 on GL-INET MT6000 and have issue with an old Samsung M2020 printer that only supports WPS wireless connectivity. I have been trying multiple IoT network settings but with each it fails, at some point, with "authentication failed - EAP type: 0 (unknown)" error. It did work before on a custom pesa build based on snapshots but since moving to 24.10 release I cannot make this setup work.

All help or pointing in a right direction will be greatly appreciated. Not really keen to replace printer at this moment :slight_smile:

Wireless configuration:

cat /etc/config/wireless 

config wifi-device 'radio0'
        option type 'mac80211'
        option path 'platform/soc/18000000.wifi'
        option band '2g'
        option channel 'auto'
        option htmode 'HT20'
        option cell_density '0'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid '******'
        option encryption 'sae'
        option key '******'
        option ieee80211r '1'
        option ft_over_ds '0'
        option ocv '0'
        option ieee80211k '1'
        option time_advertisement '2'
        option time_zone 'CET-1CEST,M3.5.0,M10.5.0/3'
        option bss_transition '1'

config wifi-device 'radio1'
        option type 'mac80211'
        option path 'platform/soc/18000000.wifi+1'
        option band '5g'
        option channel 'auto'
        option htmode 'HE160'
        option cell_density '0'
        option country 'PL'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option ssid '******'
        option encryption 'sae'
        option key '******'
        option ieee80211r '1'
        option ft_over_ds '0'
        option ocv '0'
        option ieee80211k '1'
        option time_advertisement '2'
        option time_zone 'CET-1CEST,M3.5.0,M10.5.0/3'
        option bss_transition '1'

config wifi-iface 'wifinet2'
        option device 'radio0'
        option mode 'ap'
        option ssid '******_IoT'
        option encryption 'psk2'
        option key '******'
        option ieee80211r '1'
        option ft_over_ds '0'
        option ft_psk_generate_local '0'
        option network 'lan'
        option wps_pushbutton '1'

Attempt 1:

Sat Apr 12 22:27:35 2025 daemon.notice hostapd: phy0-ap1: WPS-PBC-ACTIVE
Sat Apr 12 22:29:21 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:29:21 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:29:21 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:29:21 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:29:21 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:29:21 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:29:21 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
Sat Apr 12 22:29:23 2025 daemon.notice hostapd: phy0-ap1: WPS-REG-SUCCESS 30:cd:a7:fd:66:f5 16a65700-007c-1000-bb49-30cda7fd66f5
Sat Apr 12 22:29:23 2025 daemon.notice hostapd: phy0-ap1: WPS-PBC-DISABLE
Sat Apr 12 22:29:23 2025 daemon.notice hostapd: phy0-ap1: WPS-SUCCESS
Sat Apr 12 22:29:23 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-FAILURE 30:cd:a7:fd:66:f5
Sat Apr 12 22:29:23 2025 daemon.warn hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: authentication failed - EAP type: 0 (unknown)
Sat Apr 12 22:29:23 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: Supplicant used different EAP type: 254 (expanded)
Sat Apr 12 22:29:28 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: deauthenticated due to local deauth request

Log from attempt 2:

Sat Apr 12 22:30:25 2025 daemon.notice hostapd: phy0-ap1: WPS-PBC-ACTIVE
Sat Apr 12 22:30:30 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:30:30 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:30:30 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:30 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:30 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:30 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:32 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:30:32 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:30:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:32 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
Sat Apr 12 22:30:35 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:30:35 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:30:35 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:35 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:38 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-RETRANSMIT 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:46 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-RETRANSMIT 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:50 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:30:50 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:30:51 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:51 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:30:51 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
Sat Apr 12 22:30:53 2025 daemon.notice hostapd: phy0-ap1: WPS-REG-SUCCESS 30:cd:a7:fd:66:f5 16a65700-007c-1000-bb49-30cda7fd66f5
Sat Apr 12 22:30:53 2025 daemon.notice hostapd: phy0-ap1: WPS-PBC-DISABLE
Sat Apr 12 22:30:53 2025 daemon.notice hostapd: phy0-ap1: WPS-SUCCESS
Sat Apr 12 22:30:53 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-FAILURE 30:cd:a7:fd:66:f5
Sat Apr 12 22:30:53 2025 daemon.warn hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: authentication failed - EAP type: 0 (unknown)
Sat Apr 12 22:30:53 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: Supplicant used different EAP type: 254 (expanded)
Sat Apr 12 22:30:58 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: deauthenticated due to local deauth request

Log from attempt 3:

Sat Apr 12 22:12:17 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: authenticated
Sat Apr 12 22:12:17 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.11: associated (aid 1)
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-STARTED 30:cd:a7:fd:66:f5
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
Sat Apr 12 22:12:17 2025 daemon.notice hostapd: phy0-ap1: WPS-PIN-NEEDED 16a65700-007c-1000-bb49-30cda7fd66f5 30:cd:a7:fd:66:f5 [SamsungM2020W|Samsung Electronics|M2020 Series|M2020 Series|08HYB8GHBE00WGE|3-0050F204-1]
Sat Apr 12 22:12:18 2025 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-EAP-FAILURE 30:cd:a7:fd:66:f5
Sat Apr 12 22:12:18 2025 daemon.warn hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: authentication failed - EAP type: 0 (unknown)
Sat Apr 12 22:12:18 2025 daemon.info hostapd: phy0-ap1: STA 30:cd:a7:fd:66:f5 IEEE 802.1X: Supplicant used different EAP type: 254 (expanded)

Whats the point of 11r on a singular AP past potential interop glitches?

HP claims opposite, it has usb config tool and a panel with buttons to enter wifi password.

Should have RTFM :slight_smile: Thanks, indeed there is after connecting via USB and logging to the portal. I could provide wifi settings and it connected. Why WPS failed guess I will never know.

I kinda pointed you to gross parametritis