I have a new Flint 2 running OpenWrt 21.02-SNAPSHOT r15812+1075-46b6ee7ffc. With Windows 10 as my OS. Im wondering if my router is getting attacked because it keeps getting a DEAUTH in the log for days every few minutes. Is that being attacked and then done again and again to keep the clients in constantly trying to reconnect? Here is part of the log info. ty
Wed Oct 30 12:49:17 2024 kern.notice kernel: [22105.579937] 7986@C08L3,ap_cmm_peer_assoc_req_action() 2241: ASSOC Send ASSOC response (Status=0)...
Wed Oct 30 12:49:17 2024 kern.notice kernel: [22105.589014] 7986@C01L3,wifi_sys_conn_act() 1115: wdev idx = 1
Wed Oct 30 12:49:17 2024 kern.notice kernel: [22105.595011] 7986@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=1
Wed Oct 30 12:49:17 2024 kern.notice kernel: [22105.722417] 7986@C15L3,WPABuildPairMsg1() 5310: <=== send Msg1 of 4-way
Wed Oct 30 12:49:17 2024 kern.notice kernel: [22105.729041] 7986@C15L3,PeerPairMsg2Action() 6303: ===>Receive msg 2
Wed Oct 30 12:49:18 2024 kern.notice kernel: [22106.734442] 7986@C15L3,WPABuildPairMsg1() 5310: <=== send Msg1 of 4-way
Wed Oct 30 12:49:18 2024 kern.notice kernel: [22106.741063] 7986@C15L3,PeerPairMsg2Action() 6303: ===>Receive msg 2
Wed Oct 30 12:49:19 2024 kern.notice kernel: [22107.758459] 7986@C15L3,WPABuildPairMsg1() 5310: <=== send Msg1 of 4-way
Wed Oct 30 12:49:19 2024 kern.notice kernel: [22107.765090] 7986@C15L3,PeerPairMsg2Action() 6303: ===>Receive msg 2
Wed Oct 30 12:49:21 2024 kern.err kernel: [22108.781955] 7986@C15L1,WpaEAPOLRetryAction() 7790: 4Way-MSG1 timeout with MACADD
Wed Oct 30 12:49:21 2024 kern.notice kernel: [22108.790326] 7986@C15L3,MlmeDeAuthAction() 1404: Send DEAUTH frame with ReasonCode(2) to MACADD
It could be used for trying to break the encryption to "hack" into the Wi-Fi. Or the neighbor could just run DEAUTH attacks the whole day to drive you crazy. We won't know, unfortunately.
We don't know either if it's a real attack or maybe just some device which flaps around.
The client might not work very well with the krack vulnerability protection which concerns indeed the eapol frames because it sent it at a much lower rate, though i never saw such case, but you might consider reset the wifi on the client (not the router) to ensure it's not hanging on something which does not longer exist.
It can also be a deauth because there was low acknowledgement (not sure what deauth code 2 means on the mtk sdk but that would tell the kick reason).
Maybe. I use Flipper Zero with ESP32 dev board to perform penetration testing and deauth attacks and it works on almost all the routers I have encountered, unless you use WPA3 or explicitly set PMF to ENABLED.
No, PMF stands for Protected Management Frames, and this is an option the vendor can use to protect the beacons sent between the client and the access point. As per the design of the beacon, the access point can simply send a deauth packet to disconnect the client. This is not encrypted and without PMF you can sniff and see the beacon in clear text mode, hence an attacker can masquerade himself and send beacons to deauth the client that looks as if they were coming from the legitimate AP.
By enabling PMF you are encrypting this part of the beacon and the client will learn not to accept unencrypted deauth commands, hence it won't disconnect. I would sniff the traffic in your case to see if and where the deauth beacons are coming from.
Flipper isn't that much costly and there are tons of ways you can get it to anywhere even if banned.
If you REALLY need to sniff traffic use Alpha adapter. Or maybe Hack rf can help, but I don't sure.
If you need to protect from deauth - switch to WPA3, it's simple.
Also you can try to change SSID, BSSID, password and hide network. This will confuse that person who attacks you (if so) if he isn't real pro.
Generally you can not change password, but I will recommend to do so, if bad actor already intercepted handshake.
As for hidden network, it will prevent you from being asked for wifi or be a target of "experiments". Generally, just print QR code (it can be found in GL admin panel, if you will put your mouse pointer on 2,4 or 5 ghz) to connect to your network and use random 25+ symbol password. It will make brute force nearly impossible.