Again Captive Portal

As written in some other threads of other users, I am now facing captive portal issue, page being blank, massively.
Beryl AX running on 4.6.2 stable, on EVERY switch to other network with captive portal the portal page is not being loaded, remains empty in browser. I tested different phones, tablets, browsers etc, no chance.
VPN and ADGuard is off.
The usual http://xyz links to force the captive portal are also not working.
DNS things cannot be changed when Beryl AX is in portal mode.
After reset of firmware all is fine and captive portal page loads immediately, but resetting on every network change is annoying.
Any ideas?

Hmm i can only guess here what may be a issue, if you say it only works on each reset, then i wonder if it is not a dns caching issue on the client, does it also fix when you for example reboot the beryl or restart dnsmasq on the router?, if it does then yea... It sound like a cache issue, it renews leases and probably then the client drops the cache though theres also commands for that ipconfig /flushdns for windows.

Also i don't know with what device you test the portal with?, is it a laptop, or a mobile phone?

If you use a mobile phone make sure mobile internet is off just to rule that one out.

Hi,

Please try to enable this option 'Auto-Enable Login Mode for Public Hotspots' if the router in firmware 4.6.2, this feature will auto check if the repeater has captive portal page.

Clip_2024-08-01_11-26-30

Thanks for your good thoughts.
Unfortunately it is not so easy as Bruce mentioned, of course I always set the Auto enable Login Mode for public Hotspots. And Beryl AX goes into Login Mode, then pressing the Hyperlink triggers to load the captive portal page, then stops and leaves the page blank.
I tested with 3 different Android phones and Android tablets even new ones where nothing should be in the cache.
I did not have those issues in earlier firmware versions, it started with 4.6.2 where that in general good feature of Login Mode is implemented.
Reboot of Beryl AX does not fix the issue. I do not understand how to start dnsmask, I saw that you cannot do anything on DNS when the router is in portal mode...
It could not be lease related because the Beryl AX is always resetted, there cannot be lease information from older already connected networks.
And due to other threads, I am not the only one with blank captive portal pages.
Any other ideas?

Hi,

  1. Could you please export the syslog during the router login the captive portal in the 4.6.2 firmware?
  2. For the comparison, please also export the syslog in the available firmware version.

I did update to 4.6.2 with keeping settings.
Therefore I did now local download and flash 4.6.2 again without keeping settings and again, the first Captive Portal works and then first change to another network SSID with captive portal will stop loading and show blank page.
This is relevant syslog from stable 4.6.2:

Mon Aug 5 14:39:02 2024 daemon.err gl-repeater[2342]: (repeater-portal.lua:335) detect portal fail: resolve "captive.apple.com" fail: recv from "10.22.61.1:53" fail: timeout
Mon Aug 5 14:40:14 2024 kern.err kernel: [ 4191.195024] 7981@C13L1,tx_free_v3_notify_handler() 3530: ContTxFailCntTotal = 1, ContTxFailCnt300ms = 1
Mon Aug 5 14:40:14 2024 kern.err kernel: [ 4191.204427] 7981@C13L1,tx_free_v3_notify_handler() 3533: token used by current wcid = 6, free_token_cnt = 2303

Thanks for looking into that.

Ok, I updated to 4.6.3 beta, Beryl AX.
Again the issue, but it looks like the issue starts when I activate ADGuard and VPN (Configfile from NordVPN in OpenVPN) for the first time. I was able to jump into various Captive Portals and since I started ADguard and VPN and of course stopped all after leaving that SSID then I faced the issue, captive portal page is blank..
This is most syslog of all my activities in 4.6.3, some successful captive portals and at the end the issue:

=================> check WPA2PSK :0
Mon Aug 5 15:22:20 2024 kern.err kernel: [ 1156.327923] 7981@C09L1,sta_assoc_timeout() 126: ASSOC - enqueue ASSOC_FSM_ASSOC_TIMEOUT
Mon Aug 5 15:22:20 2024 kern.err kernel: [ 1156.335952] 7981@C09L1,sta_mlme_assoc_req_timeout_action() 2969: ASSOC - AssocTimeoutAction
Mon Aug 5 15:22:20 2024 kern.err kernel: [ 1156.344307] 7981@C09L1,sta_cntl_assoc_conf() 1638: CNTL - Association fails on BSS #24 Reason(16)
Mon Aug 5 15:22:20 2024 kern.warn kernel: [ 1156.353182] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=4
Mon Aug 5 15:22:20 2024 kern.warn kernel: [ 1156.359346] 7981@C13L2,MacTableDeleteEntry() 1938: Del Sta:78:45:58:74:5c:0f
Mon Aug 5 15:22:21 2024 kern.debug kernel: [ 1157.299848] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:22:21 2024 kern.debug kernel: [ 1157.304295] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:22:22 2024 kern.warn kernel: [ 1157.828214] 7981@C09L2,cntl_connect_request() 395: type=2,len=0,caller:ApCliIfUp+0x184/0x338 [mt_wifi]
Mon Aug 5 15:22:22 2024 kern.debug kernel: [ 1157.865051] entrytb_aid_aquire(): found non-occupied aid:4, allocated from:4
Mon Aug 5 15:22:22 2024 kern.err kernel: [ 1157.872126] 7981@C12L1,SetWPAPSKKey() 1642: WPAPSK Key length(0) error, required 8 ~ 64 characters!(keyStr=)
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1157.883328] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1157.891861] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:22 2024 kern.err kernel: [ 1157.898400] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1158.215793] 7981@C00L3,sta_auth_timeout_action() 274: AUTH - AuthTimeoutAction
Mon Aug 5 15:22:22 2024 kern.warn kernel: [ 1158.223050] 7981@C09L2,sta_cntl_auth_conf() 1486: CNTL - AUTH FAIL, try again...
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1158.230593] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1158.239149] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:22 2024 kern.err kernel: [ 1158.245681] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:22 2024 kern.notice kernel: [ 1158.567768] 7981@C00L3,sta_auth_timeout_action() 274: AUTH - AuthTimeoutAction
Mon Aug 5 15:22:22 2024 kern.warn kernel: [ 1158.575006] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=4
Mon Aug 5 15:22:22 2024 kern.warn kernel: [ 1158.581182] 7981@C13L2,MacTableDeleteEntry() 1938: Del Sta:78:45:58:74:5c:0f
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1158.684151] entrytb_aid_aquire(): found non-occupied aid:4, allocated from:4
Mon Aug 5 15:22:23 2024 kern.err kernel: [ 1158.691219] 7981@C12L1,SetWPAPSKKey() 1642: WPAPSK Key length(0) error, required 8 ~ 64 characters!(keyStr=)
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1158.702418] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1158.710949] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:23 2024 kern.err kernel: [ 1158.717475] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.047738] 7981@C00L3,sta_auth_timeout_action() 274: AUTH - AuthTimeoutAction
Mon Aug 5 15:22:23 2024 kern.warn kernel: [ 1159.054999] 7981@C09L2,sta_cntl_auth_conf() 1486: CNTL - AUTH FAIL, try again...
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.062404] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.070924] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:23 2024 kern.err kernel: [ 1159.077458] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.093507] 7981@C09L3,sta_mlme_assoc_req_action() 783: ASSOC - Send ASSOC request...
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1159.101363] ======================================> check WPA2PSK :0
Mon Aug 5 15:22:23 2024 kern.warn kernel: [ 1159.114950] 7981@C09L2,LinkUp() 3099: !!! LINK UP !!! wdev(name=apcli0,type=2,func_idx=0,PortSecured=22)
Mon Aug 5 15:22:23 2024 kern.warn kernel: [ 1159.124430] 7981@C09L2,LinkUp() 3102: BssType=1, AID=3, ssid=WiFi4EU, Channel=6, CentralChannel = 6
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.133486] 7981@C01L3,wifi_sys_linkup() 1231: wdev idx = 4
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.139309] 7981@C00L3,wtc_acquire_groupkey_wcid() 84: Found a non-occupied wtbl_idx:285 for WDEV_TYPE:2
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.139309] LinkToOmacIdx = 1, LinkToWdevType = 2
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.153715] 7981@C08L3,hw_ctrl_flow_v2_link_up() 72: wdev_idx=4
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.171472] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 4
Mon Aug 5 15:22:23 2024 kern.notice kernel: [ 1159.177470] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=4
Mon Aug 5 15:22:23 2024 daemon.notice netifd: Network device 'apcli0' link is up
Mon Aug 5 15:22:23 2024 daemon.notice netifd: Interface 'wwan' has link connectivity
Mon Aug 5 15:22:23 2024 daemon.notice netifd: Interface 'wwan' is setting up now
Mon Aug 5 15:22:23 2024 kern.info kernel: [ 1159.201348] IPv6: ADDRCONF(NETDEV_CHANGE): apcli0: link becomes ready
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1159.208149] add link apcli0, blk_mc:0, link_tbl_cnt=1
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1159.213249] nf_register_hooks()
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1159.222404] add new: ra0(UP)->apcli0(UP), active path:1
Mon Aug 5 15:22:23 2024 daemon.info gl-repeater[3276]: (repeater.lua:380) connected to WiFi4EU
Mon Aug 5 15:22:23 2024 kern.debug kernel: [ 1159.245163] add new: ra1(UP)->apcli0(UP), active path:2
Mon Aug 5 15:22:23 2024 daemon.notice netifd: wwan (26304): udhcpc: started, v1.33.2
Mon Aug 5 15:22:23 2024 daemon.notice netifd: wwan (26304): udhcpc: sending discover
Mon Aug 5 15:22:24 2024 daemon.notice netifd: wwan (26304): udhcpc: sending select for 10.22.61.160
Mon Aug 5 15:22:25 2024 daemon.info avahi-daemon[5193]: Joining mDNS multicast group on interface apcli0.IPv6 with address fe80::f0d5:9bff:fe2c:9f7b.
Mon Aug 5 15:22:25 2024 daemon.info avahi-daemon[5193]: New relevant interface apcli0.IPv6 for mDNS.
Mon Aug 5 15:22:25 2024 daemon.info avahi-daemon[5193]: Registering new address record for fe80::f0d5:9bff:fe2c:9f7b on apcli0..
Mon Aug 5 15:22:26 2024 kern.debug kernel: [ 1161.791520] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:22:26 2024 kern.debug kernel: [ 1161.795966] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:22:27 2024 daemon.notice netifd: wwan (26304): udhcpc: sending select for 10.22.61.160
Mon Aug 5 15:22:27 2024 daemon.notice netifd: wwan (26304): udhcpc: lease of 10.22.61.160 obtained, lease time 3600
Mon Aug 5 15:22:27 2024 daemon.info avahi-daemon[5193]: Joining mDNS multicast group on interface apcli0.IPv4 with address 10.22.61.160.
Mon Aug 5 15:22:27 2024 daemon.info avahi-daemon[5193]: New relevant interface apcli0.IPv4 for mDNS.
Mon Aug 5 15:22:27 2024 daemon.info avahi-daemon[5193]: Registering new address record for 10.22.61.160 on apcli0.IPv4.
Mon Aug 5 15:22:27 2024 daemon.info gl-repeater[3276]: (repeater.lua:1207) interface "wwan" up
Mon Aug 5 15:22:27 2024 daemon.notice netifd: Interface 'wwan' is now up
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain test
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain onion
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain localhost
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain local
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain invalid
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain bind
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain lan
Mon Aug 5 15:22:27 2024 daemon.info dnsmasq[24024]: using nameserver 10.22.61.1#53
Mon Aug 5 15:22:27 2024 user.notice firewall: Reloading firewall due to ifup of wwan (apcli0)
Mon Aug 5 15:22:28 2024 user.notice kmwan: config json str={ "op": 2, "data": { "cells": [ { "interface": "wwan", "netdev": "apcli0", "track_mode": "force", "addr_type": 4, "tracks": [ { "type": "ping", "ip": "1.1.1.1" }, { "type": "ping", "ip": "8.8.8.8" }, { "type": "ping", "ip": "208.67.222.222" }, { "type": "ping", "ip": "208.67.220.220" } ] } ] } }
Mon Aug 5 15:22:28 2024 kern.debug kernel: [ 1164.252925] [add_dev_config 287]add node success. iface:wwan, dev:apcli0, ifindex:9
Mon Aug 5 15:22:28 2024 user.notice kmwan: config json str={ "op": 5, "data": { "cells": [ "wwan" ] } }
Mon Aug 5 15:22:28 2024 user.notice kmwan: config json str={ "op": 4, "data": { "cells": [ "wwan" ] } }
Mon Aug 5 15:22:29 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) disable kmwan track wwan
Mon Aug 5 15:22:30 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:451) portal detecting...
Mon Aug 5 15:22:35 2024 daemon.err gl-repeater[3276]: (repeater-portal.lua:335) detect portal fail: resolve "captive.apple.com" fail: recv from "10.22.61.1:53" fail: timeout
Mon Aug 5 15:22:35 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) enable kmwan track wwan
Mon Aug 5 15:22:36 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:473) not found portal
Mon Aug 5 15:22:41 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:282) enter bare mode...
Mon Aug 5 15:22:41 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) disable kmwan track wwan
Mon Aug 5 15:22:42 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:181) set all bypass vpn
Mon Aug 5 15:22:42 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:419) portal detected
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.469450] 7981@C09L3,sta_peer_deauth_action() 311: Receive DE-AUTH from our AP
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.476856] 7981@C09L2,sta_peer_deauth_action() 352: AUTH_RSP - receive DE-AUTH from our AP (Reason=6)
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.486165] 7981@C09L3,sta_cntl_deauth_conf() 1777: CNTL - DeAuth successful
Mon Aug 5 15:22:57 2024 daemon.err gl-repeater[3276]: (repeater.lua:391) disconnected from WiFi4EU
Mon Aug 5 15:22:57 2024 daemon.notice netifd: Network device 'apcli0' link is down
Mon Aug 5 15:22:57 2024 daemon.notice netifd: Interface 'wwan' has link connectivity loss
Mon Aug 5 15:22:57 2024 daemon.notice netifd: wwan (26304): udhcpc: received SIGTERM
Mon Aug 5 15:22:57 2024 daemon.notice netifd: wwan (26304): udhcpc: unicasting a release of 10.22.61.160 to 10.22.61.1
Mon Aug 5 15:22:57 2024 daemon.notice netifd: wwan (26304): udhcpc: sending release
Mon Aug 5 15:22:57 2024 daemon.notice netifd: wwan (26304): udhcpc: entering released state
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.525846] 7981@C09L2,cntl_connect_request() 395: type=2,len=0,caller:ApCliIfUp+0x184/0x338 [mt_wifi]
Mon Aug 5 15:22:57 2024 kern.err kernel: [ 1193.535190] 7981@C09L1,cntl_connect_request() 412: Return since CNTL not IDLE,CNTL(4),SYNC(0),AUTH(0),ASSOC(0)
Mon Aug 5 15:22:57 2024 daemon.notice netifd: wwan (26304): Command failed: Permission denied
Mon Aug 5 15:22:57 2024 daemon.notice netifd: Interface 'wwan' is now down
Mon Aug 5 15:22:57 2024 daemon.info avahi-daemon[5193]: Withdrawing address record for 10.22.61.160 on apcli0.
Mon Aug 5 15:22:57 2024 daemon.info avahi-daemon[5193]: Leaving mDNS multicast group on interface apcli0.IPv4 with address 10.22.61.160.
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.559315] 7981@C01L2,RTMP_COM_IoctlHandle() 1505: -> CMD_RTPRIV_IOCTL_VIRTUAL_INF_DOWN
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.613087] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=4
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.620871] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=4
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.628413] 7981@C13L2,MacTableDeleteEntry() 1938: Del Sta:78:45:58:74:5c:0f
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.635748] 7981@C00L3,LinkDown() 4080: WHNAT Enable, Need Delete HNAT Entry When Disconnect!
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.645096] 7981@C01L3,wifi_sys_linkdown() 1364: wdev idx = 4
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.651195] 7981@C08L3,hw_ctrl_flow_v2_link_down() 123: wdev_idx=4
Mon Aug 5 15:22:57 2024 kern.debug kernel: [ 1193.658822] mtwf_dbg_prt: vsnprintf error
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.662853] 7981@C09L3,sync_fsm_reset() 2705: (caller : rt28xx_sta_ioctl+0xadc/0x1ee8 [mt_wifi]) SYNC[apcli0, Band:0]: [IDLE] =========================================> [I
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.663208] WiFi@C01L3,wifi_sys_close() 945: wdev idx = 4
Mon Aug 5 15:22:57 2024 kern.notice kernel: [ 1193.684241] 7981@C08L3,hw_ctrl_flow_v2_close() 41: wdev_idx=4
Mon Aug 5 15:22:57 2024 kern.warn kernel: [ 1193.690251] 7981@C01L2,RTMP_COM_IoctlHandle() 1528: -> CMD_RTPRIV_IOCTL_VIRTUAL_INF_DEINIT
Mon Aug 5 15:22:58 2024 kern.info kernel: [ 1193.698517] extif_put_dev(apcli0)
Mon Aug 5 15:22:58 2024 kern.info kernel: [ 1193.701831] mtk_ppe_dev_unregister_hook : ineterface apcli0 set null (3)
Mon Aug 5 15:22:58 2024 daemon.info avahi-daemon[5193]: Interface apcli0.IPv4 no longer relevant for mDNS.
Mon Aug 5 15:22:58 2024 daemon.info avahi-daemon[5193]: Interface apcli0.IPv6 no longer relevant for mDNS.
Mon Aug 5 15:22:58 2024 daemon.info avahi-daemon[5193]: Leaving mDNS multicast group on interface apcli0.IPv6 with address fe80::f0d5:9bff:fe2c:9f7b.
Mon Aug 5 15:22:58 2024 daemon.info avahi-daemon[5193]: Withdrawing address record for fe80::f0d5:9bff:fe2c:9f7b on apcli0.
Mon Aug 5 15:22:58 2024 daemon.notice netifd: Interface 'wwan' is disabled
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.710685] del link apcli0
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.713498] nf_unregister_hooks()
Mon Aug 5 15:22:58 2024 kern.warn kernel: [ 1193.714640] 7981@C01L2,RTMP_COM_IoctlHandle() 1517: -> CMD_RTPRIV_IOCTL_VIRTUAL_INF_INIT
Mon Aug 5 15:22:58 2024 kern.warn kernel: [ 1193.725030] 7981@C01L2,RTMP_COM_IoctlHandle() 1494: -> CMD_RTPRIV_IOCTL_VIRTUAL_INF_UP
Mon Aug 5 15:22:58 2024 kern.notice kernel: [ 1193.733082] WiFi@C01L3,wifi_sys_open() 856: wdev idx = 4
Mon Aug 5 15:22:58 2024 kern.notice kernel: [ 1193.738713] 7981@C18L3,BuildChannelList() 507:
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.743345] wdev_attr_update(): wdevId4 = 92:83:c4:3e:07:79
Mon Aug 5 15:22:58 2024 kern.info kernel: [ 1193.748955] apcli0: update addr to: f2:d5:9b:2c:9f:7b
Mon Aug 5 15:22:58 2024 kern.notice kernel: [ 1193.754042] 7981@C08L3,hw_ctrl_flow_v2_open() 13: wdev_idx=4
Mon Aug 5 15:22:58 2024 kern.info kernel: [ 1193.759975] extif_set_dev(apcli0)
Mon Aug 5 15:22:58 2024 kern.info kernel: [ 1193.763303] mtk_ppe_dev_register_hook : ineterface apcli0 register (3)
Mon Aug 5 15:22:58 2024 daemon.notice netifd: Interface 'wwan' is enabled
Mon Aug 5 15:22:58 2024 daemon.warn dnsmasq[24024]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.770212] del path: ra0(UP)->apcli0(DN), active path:1
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.775665] nf_register_hooks()
Mon Aug 5 15:22:58 2024 user.notice firewall: Reloading firewall due to ifdown of wwan ()
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.780976] del path: ra1(UP)->apcli0(DN), active path:0
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1193.786365] nf_unregister_hooks()
Mon Aug 5 15:22:58 2024 user.notice kmwan: config json str={ "op": 3, "data": { "cells": [ "wwan" ] } }
Mon Aug 5 15:22:58 2024 kern.debug kernel: [ 1194.007780] kmwan: Delete node:wwan
Mon Aug 5 15:22:59 2024 kern.warn kernel: [ 1194.689672] 7981@C09L2,cntl_connect_request() 395: type=2,len=0,caller:ApCliIfUp+0x184/0x338 [mt_wifi]
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1194.798423] entrytb_aid_aquire(): found non-occupied aid:4, allocated from:4
Mon Aug 5 15:22:59 2024 kern.err kernel: [ 1194.805528] 7981@C12L1,SetWPAPSKKey() 1642: WPAPSK Key length(0) error, required 8 ~ 64 characters!(keyStr=)
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1194.941275] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1194.949822] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:59 2024 kern.err kernel: [ 1194.956382] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.269250] 7981@C00L3,sta_auth_timeout_action() 274: AUTH - AuthTimeoutAction
Mon Aug 5 15:22:59 2024 kern.warn kernel: [ 1195.276481] 7981@C09L2,sta_cntl_auth_conf() 1486: CNTL - AUTH FAIL, try again...
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.283884] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=4,wdev_func_idx=0
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.292411] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Mon Aug 5 15:22:59 2024 kern.err kernel: [ 1195.298941] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)...
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.313613] 7981@C09L3,sta_mlme_assoc_req_action() 783: ASSOC - Send ASSOC request...
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1195.321467] ======================================> check WPA2PSK :0
Mon Aug 5 15:22:59 2024 kern.warn kernel: [ 1195.338958] 7981@C09L2,LinkUp() 3099: !!! LINK UP !!! wdev(name=apcli0,type=2,func_idx=0,PortSecured=22)
Mon Aug 5 15:22:59 2024 kern.warn kernel: [ 1195.348434] 7981@C09L2,LinkUp() 3102: BssType=1, AID=3, ssid=WiFi4EU, Channel=6, CentralChannel = 6
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.357491] 7981@C01L3,wifi_sys_linkup() 1231: wdev idx = 4
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.363294] 7981@C00L3,wtc_acquire_groupkey_wcid() 84: Found a non-occupied wtbl_idx:285 for WDEV_TYPE:2
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.363294] LinkToOmacIdx = 1, LinkToWdevType = 2
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.377697] 7981@C08L3,hw_ctrl_flow_v2_link_up() 72: wdev_idx=4
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.395433] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 4
Mon Aug 5 15:22:59 2024 kern.notice kernel: [ 1195.401450] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=4
Mon Aug 5 15:22:59 2024 daemon.info gl-repeater[3276]: (repeater.lua:380) connected to WiFi4EU
Mon Aug 5 15:22:59 2024 daemon.notice netifd: Network device 'apcli0' link is up
Mon Aug 5 15:22:59 2024 daemon.notice netifd: Interface 'wwan' has link connectivity
Mon Aug 5 15:22:59 2024 daemon.notice netifd: Interface 'wwan' is setting up now
Mon Aug 5 15:22:59 2024 kern.info kernel: [ 1195.425361] IPv6: ADDRCONF(NETDEV_CHANGE): apcli0: link becomes ready
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1195.433315] add link apcli0, blk_mc:0, link_tbl_cnt=1
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1195.438405] nf_register_hooks()
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1195.444245] add new: ra0(UP)->apcli0(UP), active path:1
Mon Aug 5 15:22:59 2024 kern.debug kernel: [ 1195.450385] add new: ra1(UP)->apcli0(UP), active path:2
Mon Aug 5 15:22:59 2024 daemon.notice netifd: wwan (27065): udhcpc: started, v1.33.2
Mon Aug 5 15:22:59 2024 daemon.notice netifd: wwan (27065): udhcpc: sending discover
Mon Aug 5 15:22:59 2024 daemon.notice netifd: wwan (27065): udhcpc: sending select for 10.22.61.160
Mon Aug 5 15:22:59 2024 daemon.notice netifd: wwan (27065): udhcpc: lease of 10.22.61.160 obtained, lease time 3600
Mon Aug 5 15:22:59 2024 daemon.info avahi-daemon[5193]: Joining mDNS multicast group on interface apcli0.IPv4 with address 10.22.61.160.
Mon Aug 5 15:22:59 2024 daemon.info avahi-daemon[5193]: New relevant interface apcli0.IPv4 for mDNS.
Mon Aug 5 15:22:59 2024 daemon.info avahi-daemon[5193]: Registering new address record for 10.22.61.160 on apcli0.IPv4.
Mon Aug 5 15:22:59 2024 daemon.info gl-repeater[3276]: (repeater.lua:1207) interface "wwan" up
Mon Aug 5 15:22:59 2024 daemon.notice netifd: Interface 'wwan' is now up
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain test
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain onion
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain localhost
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain local
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain invalid
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain bind
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using only locally-known addresses for domain lan
Mon Aug 5 15:22:59 2024 daemon.info dnsmasq[24024]: using nameserver 10.22.61.1#53
Mon Aug 5 15:23:00 2024 user.notice firewall: Reloading firewall due to ifup of wwan (apcli0)
Mon Aug 5 15:23:00 2024 daemon.info avahi-daemon[5193]: Joining mDNS multicast group on interface apcli0.IPv6 with address fe80::f0d5:9bff:fe2c:9f7b.
Mon Aug 5 15:23:00 2024 daemon.info avahi-daemon[5193]: New relevant interface apcli0.IPv6 for mDNS.
Mon Aug 5 15:23:00 2024 daemon.info avahi-daemon[5193]: Registering new address record for fe80::f0d5:9bff:fe2c:9f7b on apcli0.
.
Mon Aug 5 15:23:01 2024 user.notice kmwan: config json str={ "op": 2, "data": { "cells": [ { "interface": "wwan", "netdev": "apcli0", "track_mode": "force", "addr_type": 4, "tracks": [ { "type": "ping", "ip": "1.1.1.1" }, { "type": "ping", "ip": "8.8.8.8" }, { "type": "ping", "ip": "208.67.222.222" }, { "type": "ping", "ip": "208.67.220.220" } ] } ] } }
Mon Aug 5 15:23:01 2024 kern.debug kernel: [ 1196.942767] [add_dev_config 287]add node success. iface:wwan, dev:apcli0, ifindex:9
Mon Aug 5 15:23:01 2024 user.notice kmwan: config json str={ "op": 5, "data": { "cells": [ "wwan" ] } }
Mon Aug 5 15:23:01 2024 user.notice kmwan: config json str={ "op": 4, "data": { "cells": [ "wwan" ] } }
Mon Aug 5 15:23:01 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) disable kmwan track wwan
Mon Aug 5 15:23:02 2024 kern.debug kernel: [ 1197.921075] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:23:02 2024 kern.debug kernel: [ 1197.925520] BcnCheck start after 2500 ms (ra0)
Mon Aug 5 15:23:02 2024 daemon.err gl-repeater[3276]: (repeater-portal.lua:335) detect portal fail: resolve "captive.apple.com" fail: recv from "10.22.61.1:53" fail: timeout
Mon Aug 5 15:23:02 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:305) exit bare mode...
Mon Aug 5 15:23:02 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) enable kmwan track wwan
Mon Aug 5 15:23:02 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:451) portal detecting...
Mon Aug 5 15:23:03 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:203) set all via vpn
Mon Aug 5 15:23:03 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:425) portal pass
Mon Aug 5 15:23:07 2024 daemon.err gl-repeater[3276]: (repeater-portal.lua:335) detect portal fail: resolve "captive.apple.com" fail: recv from "10.22.61.1:53" fail: timeout
Mon Aug 5 15:23:07 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) enable kmwan track wwan
Mon Aug 5 15:23:08 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:473) not found portal
Mon Aug 5 15:23:14 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:282) enter bare mode...
Mon Aug 5 15:23:14 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:269) disable kmwan track wwan
Mon Aug 5 15:23:15 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:181) set all bypass vpn
Mon Aug 5 15:23:15 2024 daemon.info gl-repeater[3276]: (repeater-portal.lua:419) portal detected
Mon Aug 5 15:23:42 2024 kern.warn kernel: [ 1238.034207] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=0
Mon Aug 5 15:23:42 2024 kern.notice kernel: [ 1238.040386] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=0
Mon Aug 5 15:23:42 2024 kern.warn kernel: [ 1238.047524] 7981@C13L2,MacTableDeleteEntry() 1938: Del Sta:b6:e9:39:d8:05:c0
Mon Aug 5 15:23:42 2024 kern.notice kernel: [ 1238.054692] 7981@C08L3,ap_peer_deauth_action() 437: AUTH - receive DE-AUTH(seq-2160) from b6:e9:39:d8:05:c0, reason=3
Mon Aug 5 15:26:18 2024 kern.debug kernel: [ 1394.180790] entrytb_aid_aquire(): found non-occupied aid:5, allocated from:4
Mon Aug 5 15:26:18 2024 kern.warn kernel: [ 1394.187853] 7981@C13L2,MacTableInsertEntry() 1577: New Sta:b6:e9:39:d8:05:c0
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.201257] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1714: Recv Assoc from STA - b6:e9:39:d8:05:c0
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.210528] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2241: ASSOC Send ASSOC response (Status=0)...
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.219618] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 0
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.225643] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=0
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.353116] 7981@C15L3,WPABuildPairMsg1() 5310: <=== send Msg1 of 4-way
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.362317] 7981@C15L3,PeerPairMsg2Action() 6303: ===>Receive msg 2
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.369045] 7981@C15L3,WPABuildPairMsg3() 5595: <=== send Msg3 of 4-way
Mon Aug 5 15:26:18 2024 kern.notice kernel: [ 1394.395909] 7981@C15L3,PeerPairMsg4Action() 6734: ===>Receive msg 4
Mon Aug 5 15:26:18 2024 kern.warn kernel: [ 1394.407441] 7981@C15L2,PeerPairMsg4Action() 7098: AP SETKEYS DONE(ra0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=2 from b6:e9:39:d8:05:c0
Mon Aug 5 15:26:18 2024 kern.warn kernel: [ 1394.407441]
Mon Aug 5 15:26:18 2024 daemon.info dnsmasq-dhcp[24024]: DHCPREQUEST(br-lan) 192.168.8.241 b6:e9:39:d8:05:c0
Mon Aug 5 15:26:18 2024 daemon.info dnsmasq-dhcp[24024]: DHCPACK(br-lan) 192.168.8.241 b6:e9:39:d8:05:c0 Galaxy-A52s-5G
Mon Aug 5 15:27:23 2024 kern.err kernel: [ 1458.925270] 7981@C13L1,tx_free_v3_notify_handler() 3530: ContTxFailCntTotal = 1, ContTxFailCnt300ms = 1
Mon Aug 5 15:27:23 2024 kern.err kernel: [ 1458.934667] 7981@C13L1,tx_free_v3_notify_handler() 3533: token used by current wcid = 2, free_token_cnt = 2302

Thanks for investigation.

Could you please share the router with us via the GoodCloud to remotely check?

Please PM me your ruoter MAC.

Technical Support via GoodCloud.tar (192 KB)

Issue is solved. I bought a second Beryl AX and this new one is working great, no issues. Seems that my old one is somehow faulty. Thanks to all for good ideas and thanks Bruce for the offer to check via Goodcloud.

1 Like

Final update: Firmware 4.6.4 solved the issue on my old Beryl AX.
My both Beryl AX running fine now with 4.6.4 stable, all captive portals can be opened again and again. VPN and AD blocker to be activated and deactivated again and again, all fine. Once more thanks to all for contributing good ideas.

1 Like

Thanks for your update. Hope it bring better life and work for you.

Hello @bruce

I am facing the same issue now. running 4.6.4

I followed all instructions like auto dns, disabling vpn and adguard, manually cloned the MAC from my iphone (both in the network setting and as well in the wifi connection settings, also tried camouflage...), then reboot, etc.
when the MT3000 connects to any wifi with a captive portal(hotel, airport, airplane), it switches to the public hotspot mode. but that's it. No automatic forwarding to captive portal, or when I click the link, the page simply does not load. When I open a browser and try any website, or the captive addresses (captive.apple, nossl...), the page stays blank, also after reconnecting to the router.
This is really frustrating, and I am currently writing this post from a "dirty" network.
please help.

thank you

1 Like

So I have now upgraded the Beryl MT3000 to 4.7.0 beta o24, but without success regarding captive portals.
I have tried all the steps as mentioned before, and the automatic hotspot feature still activates, but the captive portal is not displayed, just a blank page which is loading.
trying to enter the router ip, dns server ip, captive.apple.com, nossl.com ... nothing works

BSSID: B8:50:01:07:AB:F0 (Qatar Air)

BSSID: CC:DB:93:DB:51:0D (Doha Airport)

but it's the same with any captive portal, hotels too

any ideas?

Please try these commands on the SSH of the MT3000, and try to repeat the 2.4G hotspot:

mkdir -p /usr/share/nftables.d/chain-pre/mangle_prerouting
echo 'iifname wlan0 counter ip ttl set 64' > /usr/share/nftables.d/chain-pre/mangle_prerouting/01-set-ttl-portal.nft
/etc/init.d/firewall reload

If the upper commands do not work, please try this one, and reboot:

iptables -t mangle -A PREROUTING -i wlan0 -j TTL --ttl-set 64

If no luck, please PM me the issue syslog.