WNDR3700 WiFi weirdness with Android phones

Report wireless and/or network connectivity problems in this forum.

Moderator: Moderators

Post Reply
butler360
Posts: 10
Joined: Fri Nov 08, 2013 3:40 am

WNDR3700 WiFi weirdness with Android phones

Post by butler360 »

So I've had this router for years, and I've been running Gargoyle 1.9.1 since shortly after it came out and many versions before that with zero WiFi issues, it has been completely stable. I feel like things got weird, though, after I messed with a guest network when playing around with setting up my new Chromecast Audio. I disabled the guest network and returned to all the same wireless settings, but seemingly around that time a Galaxy S6 would have connection issues (which I didn't get too into at the time since it's not my phone and the person didn't notify me until after they'd left). Then after a bit my own Nexus 6P started having connection issues, usually where it says "connected, no internet" and it can't ping the router, even though the router shows the phone as connected. At the same time my Linux desktop's wireless would work fine.

The same thing happened tonight with my 6P so I decided to dig in a bit more. I got the logread, dmesg, and wireless settings before doing anything with the router. After that I tried disconnecting the wifi on the phone then reconnecting, forgetting the network and re-adding, and rebooting the phone, all with no change ("connected, no internet"). Before trying to restart the router I figured I'd log in and see if restarting an individual service would fix it and help narrow down the issue. For whatever reason I felt like trying DHCP first. I'm fairly familiar with Linux but not so much with OpenWRT, and I checked the init.d folder but there was nothing I recognized as relating to DHCP so I tried PS and found udhcpc and killed it. The system seemed to restart it automatically (and it had a new PID), then after that I tried connecting to wifi from the 6P and bam, it has internet access through the wifi. Now I'm not sure whether killing that process also triggered restarting something else or not, but it seemed to fix it either way.

I'm attaching the logs and config. Any ideas what's going on here? Is it possible there's some corruption that reflashing might fix? Like I said it has been stable for so long it seems odd.

One thing that stands out from the dmesg is this line, which shows the IP the 6P had at the time, I believe:

Code: Select all

[556669.030000] UDP: bad checksum. From 192.168.1.8:55525 to 192.168.1.1:53 ulen 41
dmesg:

Code: Select all

[    0.000000] Linux version 3.18.29 (eric@Osiris) (gcc version 4.8.3 (OpenWrt/Linaro GCC 4.8-2014.04 r49261) ) #5 Thu Jul 7 18:08:30 EDT 2016
[    0.000000] MyLoader: sysp=aaaa5554, boardp=aaaa5554, parts=aaaa5554
[    0.000000] bootconsole [early0] enabled
[    0.000000] CPU0 revision is: 00019374 (MIPS 24Kc)
[    0.000000] SoC: Atheros AR7161 rev 2
[    0.000000] Determined physical RAM map:
[    0.000000]  memory: 04000000 @ 00000000 (usable)
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Zone ranges:
[    0.000000]   Normal   [mem 0x00000000-0x03ffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00000000-0x03ffffff]
[    0.000000] Initmem setup node 0 [mem 0x00000000-0x03ffffff]
[    0.000000] On node 0 totalpages: 16384
[    0.000000] free_area_init_node: node 0, pgdat 8035ddf0, node_mem_map 81000000
[    0.000000]   Normal zone: 128 pages used for memmap
[    0.000000]   Normal zone: 0 pages reserved
[    0.000000]   Normal zone: 16384 pages, LIFO batch:3
[    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
[    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[    0.000000] pcpu-alloc: [0] 0 
[    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 16256
[    0.000000] Kernel command line:  board=WNDR3700 mtdparts=spi0.0:320k(u-boot)ro,128k(u-boot-env)ro,7680k(firmware),64k(art)ro console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd
[    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
[    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
[    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
[    0.000000] Writing ErrCtl register=00000000
[    0.000000] Readback ErrCtl register=00000000
[    0.000000] Memory: 60944K/65536K available (2494K kernel code, 128K rwdata, 532K rodata, 228K init, 188K bss, 4592K reserved)
[    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[    0.000000] NR_IRQS:51
[    0.000000] Clocks: CPU:680.000MHz, DDR:340.000MHz, AHB:170.000MHz, Ref:40.000MHz
[    0.000000] Calibrating delay loop... 452.19 BogoMIPS (lpj=2260992)
[    0.060000] pid_max: default: 32768 minimum: 301
[    0.060000] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.070000] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
[    0.070000] NET: Registered protocol family 16
[    0.080000] MIPS: machine is NETGEAR WNDR3700/WNDR3800/WNDRMAC
[    2.710000] registering PCI controller with io_map_base unset
[    2.720000] PCI host bridge to bus 0000:00
[    2.720000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x16ffffff]
[    2.730000] pci_bus 0000:00: root bus resource [io  0x0000]
[    2.730000] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
[    2.740000] pci 0000:00:11.0: [168c:ff1d] type 00 class 0x020000
[    2.740000] pci 0000:00:11.0: fixup device configuration
[    2.740000] pci 0000:00:11.0: reg 0x10: [mem 0x00000000-0x0000ffff]
[    2.740000] pci 0000:00:11.0: PME# supported from D0 D3hot
[    2.740000] pci 0000:00:12.0: [168c:ff1d] type 00 class 0x020000
[    2.740000] pci 0000:00:12.0: fixup device configuration
[    2.750000] pci 0000:00:12.0: reg 0x10: [mem 0x00000000-0x0000ffff]
[    2.750000] pci 0000:00:12.0: PME# supported from D0 D3hot
[    2.750000] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
[    2.750000] pci 0000:00:11.0: BAR 0: assigned [mem 0x10000000-0x1000ffff]
[    2.750000] pci 0000:00:12.0: BAR 0: assigned [mem 0x10010000-0x1001ffff]
[    2.760000] pci 0000:00:11.0: using irq 40 for pin 1
[    2.760000] pci 0000:00:12.0: using irq 41 for pin 1
[    2.770000] Switched to clocksource MIPS
[    2.770000] NET: Registered protocol family 2
[    2.780000] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
[    2.780000] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
[    2.790000] TCP: Hash tables configured (established 1024 bind 1024)
[    2.790000] TCP: reno registered
[    2.800000] UDP hash table entries: 256 (order: 0, 4096 bytes)
[    2.800000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[    2.810000] NET: Registered protocol family 1
[    2.810000] PCI: CLS 0 bytes, default 32
[    2.820000] futex hash table entries: 256 (order: -1, 3072 bytes)
[    2.830000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[    2.830000] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[    2.840000] msgmni has been set to 119
[    2.850000] io scheduler noop registered
[    2.850000] io scheduler deadline registered (default)
[    2.860000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
[    2.860000] console [ttyS0] disabled
[    2.890000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 10625000) is a 16550A
[    2.900000] console [ttyS0] enabled
[    2.900000] bootconsole [early0] disabled
[    2.910000] m25p80 spi0.0: found mx25l6405d, expected m25p80
[    2.920000] m25p80 spi0.0: mx25l6405d (8192 Kbytes)
[    2.920000] 4 cmdlinepart partitions found on MTD device spi0.0
[    2.930000] Creating 4 MTD partitions on "spi0.0":
[    2.930000] 0x000000000000-0x000000050000 : "u-boot"
[    2.940000] 0x000000050000-0x000000070000 : "u-boot-env"
[    2.950000] 0x000000070000-0x0000007f0000 : "firmware"
[    2.960000] 2 netgear-fw partitions found on MTD device firmware
[    2.960000] 0x000000070000-0x000000189440 : "kernel"
[    2.970000] 0x000000189440-0x0000007f0000 : "rootfs"
[    2.980000] mtd: device 4 (rootfs) set to be root filesystem
[    2.980000] 1 squashfs-split partitions found on MTD device rootfs
[    2.990000] 0x000000780000-0x0000007f0000 : "rootfs_data"
[    2.990000] 0x0000007f0000-0x000000800000 : "art"
[    3.000000] Realtek RTL8366S ethernet switch driver version 0.2.2
[    3.010000] rtl8366s rtl8366s: using GPIO pins 5 (SDA) and 7 (SCK)
[    3.010000] rtl8366s rtl8366s: RTL8366 ver. 1 chip found
[    3.050000] libphy: rtl8366s: probed
[    3.370000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
[    3.690000] ag71xx ag71xx.1: connected to PHY at rtl8366s:04 [uid=001cc960, driver=Generic PHY]
[    3.700000] eth1: Atheros AG71xx at 0xba000000, irq 5, mode:RGMII
[    3.700000] TCP: cubic registered
[    3.710000] NET: Registered protocol family 17
[    3.710000] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
[    3.720000] Bridge firewalling registered
[    3.730000] 8021q: 802.1Q VLAN Support v1.8
[    3.740000] VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
[    3.750000] Freeing unused kernel memory: 228K (80377000 - 803b0000)
[    4.830000] init: Console is alive
[    4.830000] init: - watchdog -
[    6.980000] usbcore: registered new interface driver usbfs
[    6.990000] usbcore: registered new interface driver hub
[    6.990000] usbcore: registered new device driver usb
[    7.020000] SCSI subsystem initialized
[    7.030000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[    7.040000] ehci-platform: EHCI generic platform driver
[    7.050000] ehci-platform ehci-platform: EHCI Host Controller
[    7.050000] ehci-platform ehci-platform: new USB bus registered, assigned bus number 1
[    7.060000] ehci-platform ehci-platform: irq 3, io mem 0x1b000000
[    7.090000] ehci-platform ehci-platform: USB 2.0 started, EHCI 1.00
[    7.090000] hub 1-0:1.0: USB hub found
[    7.100000] hub 1-0:1.0: 2 ports detected
[    7.100000] usbcore: registered new interface driver usb-storage
[    7.840000] init: - preinit -
[    8.260000] ar71xx: pll_reg 0xb8050010: 0x11110000
[    8.260000] eth0: link up (1000Mbps/Full duplex)
[    8.280000] random: procd urandom read with 12 bits of entropy available
[   11.510000] mount_root: loading kmods from internal overlay
[   11.820000] jffs2: notice: (363) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
[   11.830000] block: attempting to load /tmp/jffs_cfg/upper/etc/config/fstab
[   11.850000] block: extroot: not configured
[   11.890000] jffs2: notice: (360) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
[   12.080000] block: attempting to load /tmp/jffs_cfg/upper/etc/config/fstab
[   12.090000] block: extroot: not configured
[   12.100000] mount_root: switching to jffs2 overlay
[   12.120000] eth0: link down
[   12.130000] procd: - early -
[   12.130000] procd: - watchdog -
[   12.880000] procd: - ubus -
[   13.900000] procd: - init -
[   15.220000] RPC: Registered named UNIX socket transport module.
[   15.220000] RPC: Registered udp transport module.
[   15.230000] RPC: Registered tcp transport module.
[   15.230000] RPC: Registered tcp NFSv4.1 backchannel transport module.
[   15.250000] tun: Universal TUN/TAP device driver, 1.6
[   15.260000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[   15.270000] gre: GRE over IPv4 demultiplexor driver
[   15.270000] ip_gre: GRE over IPv4 tunneling driver
[   15.300000] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
[   15.320000] nf_conntrack version 0.5.0 (955 buckets, 3820 max)
[   15.330000] 	Hooked IMQ after mangle on PREROUTING
[   15.340000] 	Hooked IMQ after nat on POSTROUTING
[   15.340000] IMQ driver loaded successfully. (numdevs = 2, numqueues = 1, imq_dev_accurate_stats = 1)
[   15.350000] 	Hooking IMQ before NAT on PREROUTING.
[   15.360000] 	Hooking IMQ after NAT on POSTROUTING.
[   15.360000] Netfilter messages via NETLINK v0.30.
[   15.370000] ip_set: protocol 6
[   15.410000] u32 classifier
[   15.410000]     input device check on
[   15.410000]     Actions configured
[   15.420000] Mirror/redirect action on
[   15.460000] fuse init (API version 7.23)
[   15.470000] usbcore: registered new interface driver cdc_acm
[   15.470000] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
[   15.480000] usbcore: registered new interface driver cdc_wdm
[   15.490000] Loading modules backported from Linux version v4.4-rc5-1913-gc8fdf68
[   15.500000] Backport generated by backports.git backports-20151218-0-g2f58d9d
[   15.530000] Ebtables v2.0 registered
[   15.540000] ip_tables: (C) 2000-2006 Netfilter Core Team
[   15.600000] usbcore: registered new interface driver ums-alauda
[   15.610000] usbcore: registered new interface driver ums-cypress
[   15.620000] usbcore: registered new interface driver ums-datafab
[   15.630000] usbcore: registered new interface driver ums-freecom
[   15.640000] usbcore: registered new interface driver ums-isd200
[   15.650000] usbcore: registered new interface driver ums-jumpshot
[   15.650000] usbcore: registered new interface driver ums-karma
[   15.660000] usbcore: registered new interface driver ums-sddr09
[   15.670000] usbcore: registered new interface driver ums-sddr55
[   15.680000] usbcore: registered new interface driver ums-usbat
[   15.690000] usbcore: registered new interface driver usblp
[   15.710000] usbcore: registered new interface driver usbserial
[   15.720000] usbcore: registered new interface driver usbserial_generic
[   15.730000] usbserial: USB Serial support registered for generic
[   15.780000] xt_time: kernel timezone is -0000
[   15.790000] usbcore: registered new interface driver cdc_ether
[   15.800000] usbcore: registered new interface driver cdc_ncm
[   15.850000] usbcore: registered new interface driver huawei_cdc_ncm
[   15.920000] PPP generic driver version 2.4.2
[   15.920000] PPP MPPE Compression module registered
[   15.930000] NET: Registered protocol family 24
[   15.940000] PPTP driver version 0.8.5
[   15.940000] usbcore: registered new interface driver qmi_wwan
[   15.950000] usbcore: registered new interface driver rndis_host
[   15.960000] usbcore: registered new interface driver sierra
[   15.970000] usbserial: USB Serial support registered for Sierra USB modem
[   15.980000] usbcore: registered new interface driver sierra_net
[   16.040000] usbcore: registered new interface driver option
[   16.050000] usbserial: USB Serial support registered for GSM modem (1-port)
[   16.060000] usbcore: registered new interface driver qcserial
[   16.070000] usbserial: USB Serial support registered for Qualcomm USB modem
[   16.110000] PCI: Enabling device 0000:00:11.0 (0000 -> 0002)
[   16.120000] ath: phy0: Ignoring endianness difference in EEPROM magic bytes.
[   16.130000] ath: EEPROM regdomain: 0x60
[   16.130000] ath: EEPROM indicates we should expect a direct regpair map
[   16.130000] ath: Country alpha2 being used: 00
[   16.130000] ath: Regpair used: 0x60
[   16.140000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[   16.140000] ieee80211 phy0: Atheros AR9280 Rev:2 mem=0xb0000000, irq=40
[   16.170000] PCI: Enabling device 0000:00:12.0 (0000 -> 0002)
[   16.180000] ath: phy1: Ignoring endianness difference in EEPROM magic bytes.
[   16.180000] ath: EEPROM regdomain: 0x60
[   16.180000] ath: EEPROM indicates we should expect a direct regpair map
[   16.180000] ath: Country alpha2 being used: 00
[   16.180000] ath: Regpair used: 0x60
[   16.200000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
[   16.200000] ieee80211 phy1: Atheros AR9280 Rev:2 mem=0xb0010000, irq=41
[   23.210000] ar71xx: pll_reg 0xb8050010: 0x11110000
[   23.210000] eth0: link up (1000Mbps/Full duplex)
[   23.210000] device eth0.1 entered promiscuous mode
[   23.220000] device eth0 entered promiscuous mode
[   23.240000] br-lan: port 1(eth0.1) entered forwarding state
[   23.240000] br-lan: port 1(eth0.1) entered forwarding state
[   25.240000] br-lan: port 1(eth0.1) entered forwarding state
[   26.180000] device wlan0 entered promiscuous mode
[   27.660000] ar71xx: pll_reg 0xb8050014: 0x11110000
[   27.660000] eth1: link up (1000Mbps/Full duplex)
[   27.890000] br-lan: port 2(wlan0) entered forwarding state
[   27.890000] br-lan: port 2(wlan0) entered forwarding state
[   29.890000] br-lan: port 2(wlan0) entered forwarding state
[   44.870000] random: nonblocking pool is initialized
[   73.600000] ipt_bandwidth: timezone shift of 480 minutes detected, adjusting
[   73.610000]                old minutes west=0, new minutes west=480
[ 2217.290000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[ 3573.800000] device wlan0 left promiscuous mode
[ 3573.800000] br-lan: port 2(wlan0) entered disabled state
[ 3574.620000] br-lan: port 1(eth0.1) entered disabled state
[ 3574.620000] device eth0.1 left promiscuous mode
[ 3574.630000] device eth0 left promiscuous mode
[ 3574.630000] br-lan: port 1(eth0.1) entered disabled state
[ 3574.640000] eth1: link down
[ 3574.670000] eth0: link down
[ 3574.680000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 3574.680000] eth0: link up (1000Mbps/Full duplex)
[ 3574.680000] device eth0.1 entered promiscuous mode
[ 3574.690000] device eth0 entered promiscuous mode
[ 3574.700000] br-lan: port 1(eth0.1) entered forwarding state
[ 3574.700000] br-lan: port 1(eth0.1) entered forwarding state
[ 3574.930000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 3574.930000] eth1: link up (1000Mbps/Full duplex)
[ 3576.130000] device wlan0 entered promiscuous mode
[ 3576.700000] br-lan: port 1(eth0.1) entered forwarding state
[ 3577.240000] br-lan: port 2(wlan0) entered forwarding state
[ 3577.240000] br-lan: port 2(wlan0) entered forwarding state
[ 3579.240000] br-lan: port 2(wlan0) entered forwarding state
[ 6557.540000] device wlan0 left promiscuous mode
[ 6557.540000] br-lan: port 2(wlan0) entered disabled state
[ 6558.320000] br-lan: port 1(eth0.1) entered disabled state
[ 6558.330000] device eth0.1 left promiscuous mode
[ 6558.330000] device eth0 left promiscuous mode
[ 6558.340000] br-lan: port 1(eth0.1) entered disabled state
[ 6558.350000] eth1: link down
[ 6558.370000] eth0: link down
[ 6558.370000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 6558.370000] eth0: link up (1000Mbps/Full duplex)
[ 6558.380000] device eth0.1 entered promiscuous mode
[ 6558.390000] device eth0 entered promiscuous mode
[ 6558.400000] br-lan: port 1(eth0.1) entered forwarding state
[ 6558.400000] br-lan: port 1(eth0.1) entered forwarding state
[ 6558.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 6558.980000] eth1: link up (1000Mbps/Full duplex)
[ 6559.760000] device wlan0 entered promiscuous mode
[ 6560.400000] br-lan: port 1(eth0.1) entered forwarding state
[ 6561.400000] br-lan: port 2(wlan0) entered forwarding state
[ 6561.410000] br-lan: port 2(wlan0) entered forwarding state
[ 6563.410000] br-lan: port 2(wlan0) entered forwarding state
[ 6819.510000] device wlan0 left promiscuous mode
[ 6819.510000] br-lan: port 2(wlan0) entered disabled state
[ 6820.300000] br-lan: port 1(eth0.1) entered disabled state
[ 6820.310000] device eth0.1 left promiscuous mode
[ 6820.310000] device eth0 left promiscuous mode
[ 6820.320000] br-lan: port 1(eth0.1) entered disabled state
[ 6820.330000] eth1: link down
[ 6820.350000] eth0: link down
[ 6820.350000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 6820.350000] eth0: link up (1000Mbps/Full duplex)
[ 6820.360000] device eth0.1 entered promiscuous mode
[ 6820.370000] device eth0 entered promiscuous mode
[ 6820.380000] br-lan: port 1(eth0.1) entered forwarding state
[ 6820.380000] br-lan: port 1(eth0.1) entered forwarding state
[ 6820.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 6820.980000] eth1: link up (1000Mbps/Full duplex)
[ 6821.860000] device wlan1 entered promiscuous mode
[ 6821.900000] device wlan0 entered promiscuous mode
[ 6821.910000] br-lan: port 3(wlan0) entered forwarding state
[ 6821.910000] br-lan: port 3(wlan0) entered forwarding state
[ 6822.380000] br-lan: port 1(eth0.1) entered forwarding state
[ 6822.750000] br-lan: port 3(wlan0) entered disabled state
[ 6823.400000] br-lan: port 2(wlan1) entered forwarding state
[ 6823.410000] br-lan: port 2(wlan1) entered forwarding state
[ 6823.980000] br-lan: port 3(wlan0) entered forwarding state
[ 6823.990000] br-lan: port 3(wlan0) entered forwarding state
[ 6825.410000] br-lan: port 2(wlan1) entered forwarding state
[ 6825.990000] br-lan: port 3(wlan0) entered forwarding state
[ 6919.820000] device wlan1 left promiscuous mode
[ 6919.820000] br-lan: port 2(wlan1) entered disabled state
[ 6919.860000] device wlan0 left promiscuous mode
[ 6919.870000] br-lan: port 3(wlan0) entered disabled state
[ 6920.630000] br-lan: port 1(eth0.1) entered disabled state
[ 6920.640000] device eth0.1 left promiscuous mode
[ 6920.640000] device eth0 left promiscuous mode
[ 6920.650000] br-lan: port 1(eth0.1) entered disabled state
[ 6920.660000] eth1: link down
[ 6920.660000] eth0: link down
[ 6920.680000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 6920.680000] eth0: link up (1000Mbps/Full duplex)
[ 6920.690000] device eth0.1 entered promiscuous mode
[ 6920.690000] device eth0 entered promiscuous mode
[ 6920.710000] br-lan: port 1(eth0.1) entered forwarding state
[ 6920.710000] br-lan: port 1(eth0.1) entered forwarding state
[ 6920.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 6920.980000] eth1: link up (1000Mbps/Full duplex)
[ 6922.260000] device wlan0 entered promiscuous mode
[ 6922.420000] device wlan1 entered promiscuous mode
[ 6922.420000] br-lan: port 3(wlan1) entered forwarding state
[ 6922.430000] br-lan: port 3(wlan1) entered forwarding state
[ 6922.500000] device wlan1 left promiscuous mode
[ 6922.500000] br-lan: port 3(wlan1) entered disabled state
[ 6922.710000] br-lan: port 1(eth0.1) entered forwarding state
[ 6923.980000] br-lan: port 2(wlan0) entered forwarding state
[ 6923.990000] br-lan: port 2(wlan0) entered forwarding state
[ 6925.990000] br-lan: port 2(wlan0) entered forwarding state
[ 6933.090000] device wlan1 entered promiscuous mode
[ 6933.110000] device wlan1 left promiscuous mode
[ 6933.110000] br-lan: port 3(wlan1) entered disabled state
[ 7073.280000] device wlan0 left promiscuous mode
[ 7073.280000] br-lan: port 2(wlan0) entered disabled state
[ 7074.080000] br-lan: port 1(eth0.1) entered disabled state
[ 7074.080000] device eth0.1 left promiscuous mode
[ 7074.090000] device eth0 left promiscuous mode
[ 7074.090000] br-lan: port 1(eth0.1) entered disabled state
[ 7074.100000] eth1: link down
[ 7074.120000] eth0: link down
[ 7074.140000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 7074.140000] eth0: link up (1000Mbps/Full duplex)
[ 7074.140000] device eth0.1 entered promiscuous mode
[ 7074.150000] device eth0 entered promiscuous mode
[ 7074.160000] br-lan: port 1(eth0.1) entered forwarding state
[ 7074.160000] br-lan: port 1(eth0.1) entered forwarding state
[ 7074.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 7074.980000] eth1: link up (1000Mbps/Full duplex)
[ 7075.580000] device wlan1 entered promiscuous mode
[ 7075.620000] device wlan1 left promiscuous mode
[ 7075.620000] br-lan: port 2(wlan1) entered disabled state
[ 7075.810000] device wlan0 entered promiscuous mode
[ 7075.810000] br-lan: port 2(wlan0) entered forwarding state
[ 7075.820000] br-lan: port 2(wlan0) entered forwarding state
[ 7076.160000] br-lan: port 1(eth0.1) entered forwarding state
[ 7076.520000] br-lan: port 2(wlan0) entered disabled state
[ 7077.080000] br-lan: port 2(wlan0) entered forwarding state
[ 7077.080000] br-lan: port 2(wlan0) entered forwarding state
[ 7079.080000] br-lan: port 2(wlan0) entered forwarding state
[ 7086.220000] device wlan1 entered promiscuous mode
[ 7086.230000] device wlan1 left promiscuous mode
[ 7086.230000] br-lan: port 3(wlan1) entered disabled state
[ 7289.200000] device wlan0 left promiscuous mode
[ 7289.200000] br-lan: port 2(wlan0) entered disabled state
[ 7289.980000] br-lan: port 1(eth0.1) entered disabled state
[ 7289.990000] device eth0.1 left promiscuous mode
[ 7289.990000] device eth0 left promiscuous mode
[ 7290.000000] br-lan: port 1(eth0.1) entered disabled state
[ 7290.000000] eth1: link down
[ 7290.020000] eth0: link down
[ 7290.040000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 7290.040000] eth0: link up (1000Mbps/Full duplex)
[ 7290.040000] device eth0.1 entered promiscuous mode
[ 7290.050000] device eth0 entered promiscuous mode
[ 7290.060000] br-lan: port 1(eth0.1) entered forwarding state
[ 7290.060000] br-lan: port 1(eth0.1) entered forwarding state
[ 7290.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 7290.980000] eth1: link up (1000Mbps/Full duplex)
[ 7291.440000] device wlan1 entered promiscuous mode
[ 7291.450000] device wlan1 left promiscuous mode
[ 7291.450000] br-lan: port 2(wlan1) entered disabled state
[ 7291.860000] device wlan0 entered promiscuous mode
[ 7291.860000] br-lan: port 2(wlan0) entered forwarding state
[ 7291.870000] br-lan: port 2(wlan0) entered forwarding state
[ 7292.060000] br-lan: port 1(eth0.1) entered forwarding state
[ 7292.390000] br-lan: port 2(wlan0) entered disabled state
[ 7292.940000] br-lan: port 2(wlan0) entered forwarding state
[ 7292.950000] br-lan: port 2(wlan0) entered forwarding state
[ 7294.950000] br-lan: port 2(wlan0) entered forwarding state
[ 7302.210000] device wlan1 entered promiscuous mode
[ 7302.230000] device wlan1 left promiscuous mode
[ 7302.230000] br-lan: port 3(wlan1) entered disabled state
[ 7435.250000] device wlan0 left promiscuous mode
[ 7435.250000] br-lan: port 2(wlan0) entered disabled state
[ 7436.050000] br-lan: port 1(eth0.1) entered disabled state
[ 7436.050000] device eth0.1 left promiscuous mode
[ 7436.060000] device eth0 left promiscuous mode
[ 7436.060000] br-lan: port 1(eth0.1) entered disabled state
[ 7436.070000] eth1: link down
[ 7436.090000] eth0: link down
[ 7436.110000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 7436.110000] eth0: link up (1000Mbps/Full duplex)
[ 7436.110000] device eth0.1 entered promiscuous mode
[ 7436.120000] device eth0 entered promiscuous mode
[ 7436.130000] br-lan: port 1(eth0.1) entered forwarding state
[ 7436.130000] br-lan: port 1(eth0.1) entered forwarding state
[ 7436.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 7436.980000] eth1: link up (1000Mbps/Full duplex)
[ 7437.530000] device wlan1 entered promiscuous mode
[ 7437.560000] device wlan1 left promiscuous mode
[ 7437.570000] br-lan: port 2(wlan1) entered disabled state
[ 7438.130000] br-lan: port 1(eth0.1) entered forwarding state
[ 7448.100000] device wlan1 entered promiscuous mode
[ 7448.110000] device wlan1 left promiscuous mode
[ 7448.110000] br-lan: port 2(wlan1) entered disabled state
[ 7617.350000] br-lan: port 1(eth0.1) entered disabled state
[ 7617.350000] device eth0.1 left promiscuous mode
[ 7617.360000] device eth0 left promiscuous mode
[ 7617.360000] br-lan: port 1(eth0.1) entered disabled state
[ 7617.370000] eth1: link down
[ 7617.390000] eth0: link down
[ 7617.410000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 7617.410000] eth0: link up (1000Mbps/Full duplex)
[ 7617.410000] device eth0.1 entered promiscuous mode
[ 7617.420000] device eth0 entered promiscuous mode
[ 7617.430000] br-lan: port 1(eth0.1) entered forwarding state
[ 7617.430000] br-lan: port 1(eth0.1) entered forwarding state
[ 7617.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 7617.980000] eth1: link up (1000Mbps/Full duplex)
[ 7618.670000] device wlan1 entered promiscuous mode
[ 7618.670000] br-lan: port 2(wlan1) entered forwarding state
[ 7618.680000] br-lan: port 2(wlan1) entered forwarding state
[ 7619.350000] br-lan: port 2(wlan1) entered disabled state
[ 7619.430000] br-lan: port 1(eth0.1) entered forwarding state
[ 7619.900000] br-lan: port 2(wlan1) entered forwarding state
[ 7619.910000] br-lan: port 2(wlan1) entered forwarding state
[ 7621.910000] br-lan: port 2(wlan1) entered forwarding state
[ 7829.920000] device wlan1 left promiscuous mode
[ 7829.920000] br-lan: port 2(wlan1) entered disabled state
[ 7830.710000] br-lan: port 1(eth0.1) entered disabled state
[ 7830.720000] device eth0.1 left promiscuous mode
[ 7830.720000] device eth0 left promiscuous mode
[ 7830.730000] br-lan: port 1(eth0.1) entered disabled state
[ 7830.750000] eth1: link down
[ 7830.750000] eth0: link down
[ 7830.770000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 7830.770000] eth0: link up (1000Mbps/Full duplex)
[ 7830.790000] device eth0.1 entered promiscuous mode
[ 7830.790000] device eth0 entered promiscuous mode
[ 7830.810000] br-lan: port 1(eth0.1) entered forwarding state
[ 7830.810000] br-lan: port 1(eth0.1) entered forwarding state
[ 7830.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 7830.980000] eth1: link up (1000Mbps/Full duplex)
[ 7832.180000] device wlan1 entered promiscuous mode
[ 7832.810000] br-lan: port 1(eth0.1) entered forwarding state
[ 7833.290000] br-lan: port 2(wlan1) entered forwarding state
[ 7833.290000] br-lan: port 2(wlan1) entered forwarding state
[ 7835.290000] br-lan: port 2(wlan1) entered forwarding state
[ 8041.790000] device wlan1 left promiscuous mode
[ 8041.790000] br-lan: port 2(wlan1) entered disabled state
[ 8042.590000] br-lan: port 1(eth0.1) entered disabled state
[ 8042.590000] device eth0.1 left promiscuous mode
[ 8042.600000] device eth0 left promiscuous mode
[ 8042.600000] br-lan: port 1(eth0.1) entered disabled state
[ 8042.610000] eth1: link down
[ 8042.630000] eth0: link down
[ 8042.650000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 8042.650000] eth0: link up (1000Mbps/Full duplex)
[ 8042.650000] device eth0.1 entered promiscuous mode
[ 8042.660000] device eth0 entered promiscuous mode
[ 8042.670000] br-lan: port 1(eth0.1) entered forwarding state
[ 8042.670000] br-lan: port 1(eth0.1) entered forwarding state
[ 8042.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 8042.980000] eth1: link up (1000Mbps/Full duplex)
[ 8043.960000] device wlan1 entered promiscuous mode
[ 8043.970000] device wlan1 left promiscuous mode
[ 8043.970000] br-lan: port 2(wlan1) entered disabled state
[ 8044.670000] br-lan: port 1(eth0.1) entered forwarding state
[ 8054.570000] device wlan1 entered promiscuous mode
[ 8054.580000] device wlan1 left promiscuous mode
[ 8054.580000] br-lan: port 2(wlan1) entered disabled state
[ 8150.090000] br-lan: port 1(eth0.1) entered disabled state
[ 8150.090000] device eth0.1 left promiscuous mode
[ 8150.100000] device eth0 left promiscuous mode
[ 8150.100000] br-lan: port 1(eth0.1) entered disabled state
[ 8150.110000] eth1: link down
[ 8150.130000] eth0: link down
[ 8150.140000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 8150.140000] eth0: link up (1000Mbps/Full duplex)
[ 8150.150000] device eth0.1 entered promiscuous mode
[ 8150.150000] device eth0 entered promiscuous mode
[ 8150.170000] br-lan: port 1(eth0.1) entered forwarding state
[ 8150.170000] br-lan: port 1(eth0.1) entered forwarding state
[ 8150.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 8150.980000] eth1: link up (1000Mbps/Full duplex)
[ 8151.550000] device wlan1 entered promiscuous mode
[ 8151.560000] br-lan: port 2(wlan1) entered forwarding state
[ 8151.560000] br-lan: port 2(wlan1) entered forwarding state
[ 8151.640000] device wlan1 left promiscuous mode
[ 8151.650000] br-lan: port 2(wlan1) entered disabled state
[ 8152.170000] br-lan: port 1(eth0.1) entered forwarding state
[ 8162.190000] device wlan1 entered promiscuous mode
[ 8162.190000] device wlan1 left promiscuous mode
[ 8162.200000] br-lan: port 2(wlan1) entered disabled state
[ 8270.650000] br-lan: port 1(eth0.1) entered disabled state
[ 8270.660000] device eth0.1 left promiscuous mode
[ 8270.660000] device eth0 left promiscuous mode
[ 8270.670000] br-lan: port 1(eth0.1) entered disabled state
[ 8270.670000] eth1: link down
[ 8270.690000] eth0: link down
[ 8270.710000] ar71xx: pll_reg 0xb8050010: 0x11110000
[ 8270.710000] eth0: link up (1000Mbps/Full duplex)
[ 8270.710000] device eth0.1 entered promiscuous mode
[ 8270.720000] device eth0 entered promiscuous mode
[ 8270.730000] br-lan: port 1(eth0.1) entered forwarding state
[ 8270.740000] br-lan: port 1(eth0.1) entered forwarding state
[ 8270.980000] ar71xx: pll_reg 0xb8050014: 0x11110000
[ 8270.980000] eth1: link up (1000Mbps/Full duplex)
[ 8272.150000] device wlan1 entered promiscuous mode
[ 8272.150000] br-lan: port 2(wlan1) entered forwarding state
[ 8272.160000] br-lan: port 2(wlan1) entered forwarding state
[ 8272.660000] br-lan: port 2(wlan1) entered disabled state
[ 8272.740000] br-lan: port 1(eth0.1) entered forwarding state
[ 8273.350000] br-lan: port 2(wlan1) entered forwarding state
[ 8273.350000] br-lan: port 2(wlan1) entered forwarding state
[ 8275.350000] br-lan: port 2(wlan1) entered forwarding state
[195516.190000] device wlan1 left promiscuous mode
[195516.200000] br-lan: port 2(wlan1) entered disabled state
[195516.990000] br-lan: port 1(eth0.1) entered disabled state
[195516.990000] device eth0.1 left promiscuous mode
[195517.000000] device eth0 left promiscuous mode
[195517.000000] br-lan: port 1(eth0.1) entered disabled state
[195517.010000] eth1: link down
[195517.030000] eth0: link down
[195517.050000] ar71xx: pll_reg 0xb8050010: 0x11110000
[195517.050000] eth0: link up (1000Mbps/Full duplex)
[195517.050000] device eth0.1 entered promiscuous mode
[195517.060000] device eth0 entered promiscuous mode
[195517.070000] br-lan: port 1(eth0.1) entered forwarding state
[195517.070000] br-lan: port 1(eth0.1) entered forwarding state
[195517.190000] ar71xx: pll_reg 0xb8050014: 0x11110000
[195517.190000] eth1: link up (1000Mbps/Full duplex)
[195518.450000] device wlan0 entered promiscuous mode
[195519.070000] br-lan: port 1(eth0.1) entered forwarding state
[195520.080000] br-lan: port 2(wlan0) entered forwarding state
[195520.090000] br-lan: port 2(wlan0) entered forwarding state
[195522.090000] br-lan: port 2(wlan0) entered forwarding state
[195613.580000] device wlan0 left promiscuous mode
[195613.580000] br-lan: port 2(wlan0) entered disabled state
[195614.380000] br-lan: port 1(eth0.1) entered disabled state
[195614.380000] device eth0.1 left promiscuous mode
[195614.390000] device eth0 left promiscuous mode
[195614.390000] br-lan: port 1(eth0.1) entered disabled state
[195614.400000] eth1: link down
[195614.420000] eth0: link down
[195614.430000] ar71xx: pll_reg 0xb8050010: 0x11110000
[195614.430000] eth0: link up (1000Mbps/Full duplex)
[195614.430000] device eth0.1 entered promiscuous mode
[195614.440000] device eth0 entered promiscuous mode
[195614.450000] br-lan: port 1(eth0.1) entered forwarding state
[195614.450000] br-lan: port 1(eth0.1) entered forwarding state
[195615.200000] ar71xx: pll_reg 0xb8050014: 0x11110000
[195615.200000] eth1: link up (1000Mbps/Full duplex)
[195615.800000] device wlan0 entered promiscuous mode
[195616.450000] br-lan: port 1(eth0.1) entered forwarding state
[195617.430000] br-lan: port 2(wlan0) entered forwarding state
[195617.440000] br-lan: port 2(wlan0) entered forwarding state
[195619.440000] br-lan: port 2(wlan0) entered forwarding state
[556669.030000] UDP: bad checksum. From 192.168.1.8:55525 to 192.168.1.1:53 ulen 41
Relevant lines from logread:

Code: Select all

Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: authenticated
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: associated (aid 1)
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 RADIUS: starting accounting session 5871CDB2-0000008C
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: pairwise key handshake completed (RSN)
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.8 24:df:6a:15:4c:23 android-ce4f2e8f035a8860
logread:

Code: Select all

Sun Jan 22 19:13:35 2017 authpriv.warn dropbear[13831]: Login attempt for nonexistent user from 37.16.73.58:35805
Sun Jan 22 19:13:35 2017 authpriv.warn dropbear[13831]: Login attempt for nonexistent user from 37.16.73.58:35805
Sun Jan 22 19:13:36 2017 authpriv.info dropbear[13831]: Exit before auth: Exited normally


Sun Jan 22 19:42:46 2017 authpriv.info dropbear[13845]: Child connection from 123.96.174.102:48594
Sun Jan 22 19:42:47 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:48 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:48 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:49 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:49 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:50 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:50 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:51 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:51 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:52 2017 authpriv.warn dropbear[13845]: Login attempt for nonexistent user from 123.96.174.102:48594
Sun Jan 22 19:42:52 2017 authpriv.info dropbear[13845]: Exit before auth: Max auth tries reached - user 'is invalid' from 123.96.174.102:48594
Sun Jan 22 19:43:08 2017 authpriv.info dropbear[13846]: Child connection from 192.40.89.16:59183
Sun Jan 22 19:43:09 2017 authpriv.info dropbear[13846]: Exit before auth: Exited normally
Sun Jan 22 19:43:10 2017 authpriv.info dropbear[13847]: Child connection from 192.40.89.16:59304
Sun Jan 22 19:43:21 2017 authpriv.warn dropbear[13847]: Login attempt for nonexistent user from 192.40.89.16:59304
Sun Jan 22 19:43:22 2017 authpriv.warn dropbear[13847]: Login attempt for nonexistent user from 192.40.89.16:59304
Sun Jan 22 19:43:31 2017 authpriv.info dropbear[13847]: Exit before auth: Exited normally
Sun Jan 22 19:43:32 2017 authpriv.info dropbear[13848]: Child connection from 192.40.89.16:60237
Sun Jan 22 19:43:42 2017 authpriv.warn dropbear[13848]: Login attempt for nonexistent user from 192.40.89.16:60237
Sun Jan 22 19:43:43 2017 authpriv.warn dropbear[13848]: Login attempt for nonexistent user from 192.40.89.16:60237
Sun Jan 22 19:43:47 2017 authpriv.info dropbear[13848]: Exit before auth: Exited normally

Sun Jan 22 19:48:25 2017 authpriv.info dropbear[13851]: Child connection from 180.179.217.61:56436
Sun Jan 22 19:48:28 2017 authpriv.warn dropbear[13851]: Login attempt for nonexistent user from 180.179.217.61:56436
Sun Jan 22 19:48:29 2017 authpriv.warn dropbear[13851]: Login attempt for nonexistent user from 180.179.217.61:56436
Sun Jan 22 19:48:30 2017 authpriv.warn dropbear[13851]: Login attempt for nonexistent user from 180.179.217.61:56436
Sun Jan 22 19:48:31 2017 authpriv.info dropbear[13851]: Exit before auth: Exited normally
Sun Jan 22 19:55:15 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: authenticated
Sun Jan 22 19:55:15 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: associated (aid 1)
Sun Jan 22 19:55:15 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 RADIUS: starting accounting session 5871CDB2-00000089
Sun Jan 22 19:55:15 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: pairwise key handshake completed (RSN)
Sun Jan 22 19:55:18 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 24:df:6a:15:4c:23 
Sun Jan 22 19:55:18 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 19:55:20 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 24:df:6a:15:4c:23 
Sun Jan 22 19:55:20 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 19:55:20 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 19:55:20 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.8 24:df:6a:15:4c:23 android-ce4f2e8f035a8860
Sun Jan 22 19:57:16 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: group key handshake completed (RSN)

Sun Jan 22 20:01:41 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: disassociated
Sun Jan 22 20:01:42 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Jan 22 20:03:21 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: authenticated
Sun Jan 22 20:03:21 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: associated (aid 1)
Sun Jan 22 20:03:22 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 RADIUS: starting accounting session 5871CDB2-0000008A
Sun Jan 22 20:03:22 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: pairwise key handshake completed (RSN)
Sun Jan 22 20:03:22 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 24:df:6a:15:4c:23 
Sun Jan 22 20:03:22 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:03:22 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:03:22 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.8 24:df:6a:15:4c:23 android-ce4f2e8f035a8860
Sun Jan 22 20:04:58 2017 authpriv.info dropbear[14579]: Child connection from 70.211.144.65:2310
Sun Jan 22 20:05:01 2017 authpriv.info dropbear[14580]: Child connection from 70.211.144.65:2311
Sun Jan 22 20:05:04 2017 authpriv.info dropbear[14580]: Exit before auth (user 'root', 0 fails): Disconnect received
Sun Jan 22 20:05:22 2017 authpriv.info dropbear[14581]: Child connection from 70.211.144.65:2320
Sun Jan 22 20:05:25 2017 authpriv.notice dropbear[14581]: Password auth succeeded for 'root' from 70.211.144.65:2320
Sun Jan 22 20:06:41 2017 authpriv.info dropbear[14587]: Child connection from 37.16.73.58:53453
Sun Jan 22 20:06:43 2017 authpriv.warn dropbear[14587]: Login attempt for nonexistent user from 37.16.73.58:53453
Sun Jan 22 20:06:44 2017 authpriv.warn dropbear[14587]: Login attempt for nonexistent user from 37.16.73.58:53453
Sun Jan 22 20:06:44 2017 authpriv.warn dropbear[14587]: Login attempt for nonexistent user from 37.16.73.58:53453
Sun Jan 22 20:06:45 2017 authpriv.info dropbear[14587]: Exit before auth: Exited normally
Sun Jan 22 20:06:55 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.3 60:a4:4c:21:ba:7e 
Sun Jan 22 20:06:55 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.3 60:a4:4c:21:ba:7e NAS
Sun Jan 22 20:07:12 2017 daemon.warn miniupnpd[9598]: HTTP Connection from 192.168.1.3 closed unexpectedly
Sun Jan 22 20:07:17 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: group key handshake completed (RSN)
Sun Jan 22 20:07:52 2017 authpriv.info dropbear[14591]: Child connection from 192.168.1.3:37254
Sun Jan 22 20:08:02 2017 authpriv.notice dropbear[14591]: Password auth succeeded for 'root' from 192.168.1.3:37254
Sun Jan 22 20:08:03 2017 authpriv.info dropbear[14591]: Exit (root): Disconnect received
Sun Jan 22 20:08:25 2017 authpriv.info dropbear[14594]: Child connection from 192.168.1.3:37292
Sun Jan 22 20:08:38 2017 authpriv.notice dropbear[14594]: Password auth succeeded for 'root' from 192.168.1.3:37292
Sun Jan 22 20:08:38 2017 authpriv.info dropbear[14594]: Exit (root): Disconnect received
Sun Jan 22 20:10:00 2017 authpriv.info dropbear[14579]: Exit before auth: Timeout before auth
Sun Jan 22 20:13:23 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a IEEE 802.11: authenticated
Sun Jan 22 20:13:23 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a IEEE 802.11: associated (aid 2)
Sun Jan 22 20:13:23 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a RADIUS: starting accounting session 5871CDB2-0000008B
Sun Jan 22 20:13:23 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a WPA: pairwise key handshake completed (RSN)
Sun Jan 22 20:13:24 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 192.168.1.2 44:6d:57:75:d4:9a 
Sun Jan 22 20:13:24 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.2 44:6d:57:75:d4:9a 
Sun Jan 22 20:13:24 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.2 44:6d:57:75:d4:9a 
Sun Jan 22 20:13:24 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.2 44:6d:57:75:d4:9a PC

Sun Jan 22 20:17:16 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a WPA: group key handshake completed (RSN)
Sun Jan 22 20:17:17 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: group key handshake completed (RSN)
Sun Jan 22 20:24:32 2017 authpriv.info dropbear[14979]: Child connection from 107.150.106.238:65401
Sun Jan 22 20:24:32 2017 authpriv.info dropbear[14979]: Exit before auth: Exited normally
Sun Jan 22 20:24:51 2017 authpriv.info dropbear[14980]: Child connection from 113.122.13.77:55674
Sun Jan 22 20:24:52 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:52 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:53 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:54 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:54 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:55 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:56 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:58 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:24:59 2017 authpriv.info dropbear[14981]: Child connection from 107.150.106.238:57502
Sun Jan 22 20:24:59 2017 authpriv.info dropbear[14981]: Exit before auth: Exited normally
Sun Jan 22 20:24:59 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:25:01 2017 authpriv.warn dropbear[14980]: Login attempt for nonexistent user from 113.122.13.77:55674
Sun Jan 22 20:25:01 2017 authpriv.info dropbear[14980]: Exit before auth: Max auth tries reached - user 'is invalid' from 113.122.13.77:55674
Sun Jan 22 20:25:05 2017 authpriv.info dropbear[14982]: Child connection from 107.150.106.238:59135
Sun Jan 22 20:25:05 2017 authpriv.info dropbear[14982]: Exit before auth: Exited normally
Sun Jan 22 20:27:16 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a WPA: group key handshake completed (RSN)
Sun Jan 22 20:27:17 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: group key handshake completed (RSN)

Sun Jan 22 20:37:16 2017 daemon.info hostapd: wlan0: STA 44:6d:57:75:d4:9a WPA: group key handshake completed (RSN)
Sun Jan 22 20:37:17 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: group key handshake completed (RSN)
Sun Jan 22 20:41:56 2017 authpriv.info dropbear[14581]: Exit (root): Exited normally
Sun Jan 22 20:44:32 2017 authpriv.info dropbear[18228]: Child connection from 192.168.1.2:35428
Sun Jan 22 20:44:37 2017 authpriv.warn dropbear[18228]: Bad password attempt for 'root' from 192.168.1.2:35428
Sun Jan 22 20:44:40 2017 authpriv.notice dropbear[18228]: Password auth succeeded for 'root' from 192.168.1.2:35428
Sun Jan 22 20:44:44 2017 authpriv.info dropbear[18228]: Exit (root): Disconnect received
Sun Jan 22 20:44:52 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: disassociated
Sun Jan 22 20:44:53 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: authenticated
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 IEEE 802.11: associated (aid 1)
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 RADIUS: starting accounting session 5871CDB2-0000008C
Sun Jan 22 20:45:00 2017 daemon.info hostapd: wlan0: STA 24:df:6a:15:4c:23 WPA: pairwise key handshake completed (RSN)
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPDISCOVER(br-lan) 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPOFFER(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPREQUEST(br-lan) 192.168.1.8 24:df:6a:15:4c:23 
Sun Jan 22 20:45:00 2017 daemon.info dnsmasq-dhcp[11433]: DHCPACK(br-lan) 192.168.1.8 24:df:6a:15:4c:23 android-ce4f2e8f035a8860

Sun Jan 22 20:45:34 2017 authpriv.info dropbear[19074]: Child connection from 192.168.1.2:35716
Sun Jan 22 20:45:39 2017 authpriv.notice dropbear[19074]: Password auth succeeded for 'root' from 192.168.1.2:35716
wireless config:

Code: Select all

config wifi-device 'radio0'
	option type 'mac80211'
	option channel '11'
	option hwmode '11g'
	option path 'pci0000:00/0000:00:11.0'
	option htmode 'HT40-'

config wifi-device 'radio1'
	option type 'mac80211'
	option hwmode '11a'
	option path 'pci0000:00/0000:00:12.0'
	option htmode 'HT40+'
	option channel '36'

config wifi-iface 'ap_g'
	option device 'radio0'
	option mode 'ap'
	option network 'lan'
	option disassoc_low_ack '0'
	option ssid 'REMOVED'
	option encryption 'psk2'
	option key 'REMOVED'

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: WNDR3700 WiFi weirdness with Android phones

Post by ispyisail »

Have you tied a "failsafe reset"?

butler360
Posts: 10
Joined: Fri Nov 08, 2013 3:40 am

Re: WNDR3700 WiFi weirdness with Android phones

Post by butler360 »

I have not, is that this? https://wiki.openwrt.org/doc/howto/generic.failsafe

And what would be the benefit of that versus reflashing?

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: WNDR3700 WiFi weirdness with Android phones

Post by ispyisail »

butler360 wrote:I have not, is that this? https://wiki.openwrt.org/doc/howto/generic.failsafe

And what would be the benefit of that versus reflashing?
re-flashing might be easier but yes, from my understanding they will give you the same result.

corrupt config is a known problem.

pbix
Developer
Posts: 1373
Joined: Fri Aug 21, 2009 5:09 pm

Re: WNDR3700 WiFi weirdness with Android phones

Post by pbix »

It is possible that a neighbor has installed or changed their router such that it is now interfering with your signal?

You could install the wifi scanner plugin to check.

It would explain why something worked for awhile and suddenly got flaky.

I recently discovered why my Wifi didn't work so good at one end of my house. Turns out the neighbor on that side was using the same channel.

And I do not see anything suspicious in the logs you posted. The UDP checksum issue is not related in my opinion.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM

butler360
Posts: 10
Joined: Fri Nov 08, 2013 3:40 am

Re: WNDR3700 WiFi weirdness with Android phones

Post by butler360 »

I did think of that, but my desktop worked fine at the same time and the phone held the connection just fine. I did use Wifi Analyzer on the Play store and it showed the same networks as before. Then restarting a single process on the router fixing it instantly makes me thing that the competing wireless part is pretty much not an issue.

Post Reply