hello marcel, hello joseph, please test again with version 6.30.223.248. i've experienced similar symptoms with 6.30.223.30, and they went away with 6.30.223.248.
for the record, my issues showed up with different vendors' routers. the first had no wifi security; there, the device sent a dhcp request, received an offer, and the accept was logged in wireshark but not detected by any other device on the same wifi. in the other wifi, there was wireless security. i switched my hostapd to verbose, and the logs from different clients were equal to this point: > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx MLME: > MLME-DELETEKEYS.request(00:90:a2:cb:xx:xx) > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: event 1 notification > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: start authentication > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx IEEE 802.1X: unauthorizing > port > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 1/4 msg of > 4-Way Handshake but while with a working device, what followed was > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: received EAPOL-Key > frame (2/4 Pairwise) > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 3/4 msg of > 4-Way Handshake > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: received EAPOL-Key > frame (4/4 Pairwise) , the affected defice produced > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: EAPOL-Key timeout > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: sending 1/4 msg of > 4-Way Handshake > daemon.debug hostapd: wlan0: STA 00:90:a2:cb:xx:xx WPA: EAPOL-Key timeout . my assumption is that under certain conditions, the wifi card fails to send unicast packages. best regards chrysn
signature.asc
Description: Digital signature