GL-XE300 WiFi looks like connected, but it is not (after running well for a while)

Hi,
I have a GL-XE300 router I want to make a review on my blog as a travel router (I really like GL.iNet products), but till now I used it only over Ethernet for longer periods of time.
I use it with 5 or 6 devices connected and the device is only connected via 4G. No WiFi repeater or ETH.
It works ok for a while but always the next morning wifi is down and sometimes it happens a few times between 8 AM - 5 PM while I’m working and need it the most. The SSID is broadcasted, and my devices are looking like trying to connect, but unable to access internet or even the router’s IP. I know for sure that only wifi is the problem as if when it happens if I connect an ETH cable to my laptop i can access the router and also I have access to internet using the cable.
I also restarted the router and changed only the admin passwords and wifi SSID and password in case I installed something that breaks the wifi, but it has the same behavior.
The problem gets fixed if I turn the wifi off and back on or if i reboot the router using the button.
It happens the same with both firmwares: stable v3.217 and also with beta 4.3.7 release4.
This is how my iPhone behave when it happens:

I have a log took from luci (on the stable firmware) after the wifi bug happened but I modified it with X for the info I think is confidential. including MACs.
LOG Over ETH.zip (9.8 KB)
Thanks!

Cannot identify the issue from the log.

Can you check what is the wifi config on the router? e.g. channel and encryption.

This is my configuration. Do you need the one from config file? I have to search where it is located if you need it

Can you change txpower to high and change to a fixed channel?

Sure, a fixed channel doesn’t solve the problem as I tested it before, but I will test this with both changed and see if tomorrow morning it is still working.
Will be back with an answer.

1 Like

@alzhao
After I changed the power to high and channel to 11, it worked probably a few hours longer than usual, but I can’t guarantee this. It didn’t broke in the morning, but I also I rebooted it late yesterday, and still about 24 hours till the problem appeared.
The log is very strange it detects a DNS attack and a bit later it disconnects all the devices because of inactivity, but I’m sure at that time we used at least the ThinkPad and Macbook from the log, but the router disconnected everything like there was no activity. I turned the wifi OFF and back ON using an ETH cable and everithing is connected back and working as expected
I have a DNS protection enabled as it was the default, but I’m sure previously I enabled DNS over TLS too.


This is the log from luci with macs edited

Fri Sep 29 20:02:31 2023 daemon.info dnsmasq-dhcp[2345]: DHCPACK(br-lan) 192.168.1.219 11:22:33:44:55:66 ThinkPad
Fri Sep 29 20:04:28 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 20:04:29 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 20:13:53 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: authenticated
Fri Sep 29 20:13:53 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: associated (aid 5)
Fri Sep 29 20:13:53 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 11:22:33:44:55:66
Fri Sep 29 20:13:53 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 RADIUS: starting accounting session 31201158EF4E5C35
Fri Sep 29 20:13:53 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 WPA: pairwise key handshake completed (RSN)
Fri Sep 29 20:13:54 2023 daemon.info dnsmasq-dhcp[2345]: DHCPREQUEST(br-lan) 192.168.1.218 11:22:33:44:55:66
Fri Sep 29 20:13:54 2023 daemon.info dnsmasq-dhcp[2345]: DHCPACK(br-lan) 192.168.1.218 11:22:33:44:55:66 Macbook
Fri Sep 29 20:20:26 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 20:20:26 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 20:20:27 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 20:20:29 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 20:20:29 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 20:20:30 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 20:20:40 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 20:20:40 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 20:20:41 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 20:20:44 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 20:20:44 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 20:20:45 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 20:21:04 2023 daemon.notice hostapd: wlan0: AP-STA-POLL-OK 11:22:33:44:55:66
Fri Sep 29 20:24:39 2023 daemon.warn dnsmasq[2345]: Ignoring query from non-local network
Fri Sep 29 20:24:40 2023 daemon.info dnsmasq-dhcp[2345]: DHCPDISCOVER(br-lan) 192.168.1.220 11:22:33:44:55:66
Fri Sep 29 20:24:40 2023 daemon.info dnsmasq-dhcp[2345]: DHCPOFFER(br-lan) 192.168.1.220 11:22:33:44:55:66
Fri Sep 29 20:24:40 2023 daemon.info dnsmasq-dhcp[2345]: DHCPREQUEST(br-lan) 192.168.1.220 11:22:33:44:55:66
Fri Sep 29 20:24:40 2023 daemon.info dnsmasq-dhcp[2345]: DHCPACK(br-lan) 192.168.1.220 11:22:33:44:55:66 ThinkPad
Fri Sep 29 20:26:22 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 20:26:22 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 20:26:23 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 20:31:12 2023 daemon.info dnsmasq-dhcp[2345]: DHCPREQUEST(br-lan) 192.168.1.220 11:22:33:44:55:66
Fri Sep 29 20:31:12 2023 daemon.info dnsmasq-dhcp[2345]: DHCPACK(br-lan) 192.168.1.220 11:22:33:44:55:66 ThinkPad
Fri Sep 29 20:33:08 2023 kern.info kernel: [37999.869089] device wlan0 left promiscuous mode
Fri Sep 29 20:33:08 2023 kern.info kernel: [37999.873963] br-lan: port 2(wlan0) entered disabled state
Fri Sep 29 20:33:08 2023 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Fri Sep 29 20:33:08 2023 daemon.notice hostapd: wlan0: AP-DISABLED
Fri Sep 29 20:33:08 2023 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Fri Sep 29 20:33:08 2023 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Fri Sep 29 20:33:08 2023 daemon.notice hostapd: nl80211: Failed to remove interface wlan0 from bridge br-lan: Invalid argument
Fri Sep 29 20:33:21 2023 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Fri Sep 29 20:33:22 2023 daemon.notice netifd: radio0 (5087): sh: /usr/bin/ovs-vsctl: not found
Fri Sep 29 20:33:22 2023 daemon.notice netifd: radio0 (5087): sh: /usr/bin/ovs-vsctl: not found
Fri Sep 29 20:33:22 2023 kern.info kernel: [38013.665444] br-lan: port 2(wlan0) entered blocking state
Fri Sep 29 20:33:22 2023 kern.info kernel: [38013.671065] br-lan: port 2(wlan0) entered disabled state
Fri Sep 29 20:33:22 2023 kern.info kernel: [38013.681239] device wlan0 entered promiscuous mode
Fri Sep 29 20:33:22 2023 daemon.err hostapd: Using interface wlan0 with hwaddr 11:22:33:44:55:66 and ssid "wifiMobile"
Fri Sep 29 20:33:22 2023 kern.info kernel: [38013.959284] br-lan: port 2(wlan0) entered blocking state
Fri Sep 29 20:33:22 2023 kern.info kernel: [38013.964842] br-lan: port 2(wlan0) entered forwarding state
Fri Sep 29 20:33:22 2023 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->ENABLED
Fri Sep 29 20:33:22 2023 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Sep 29 20:33:22 2023 daemon.notice netifd: Network device 'wlan0' link is up
Fri Sep 29 20:33:23 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: authenticated
Fri Sep 29 20:33:23 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: associated (aid 1)
Fri Sep 29 20:33:23 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 11:22:33:44:55:66
Fri Sep 29 20:33:23 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 RADIUS: starting accounting session C23B9185B0FD13C5
Fri Sep 29 20:33:23 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 WPA: pairwise key handshake completed (RSN)

It happened again this morning and I was curious if it will solve itself as I had no need for internet today, but 12 hours later none of my devices can connect back if I don’t reset the wifi on the router. I also looked over some openwrt forums, and It looks i already have disassoc_low_ack ‘0’ in config.
image
It broke for the same reason:

Fri Sep 29 22:44:18 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 22:44:18 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 22:47:48 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 22:47:48 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 22:47:48 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 22:48:19 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 22:48:19 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 22:48:39 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 22:48:39 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated
Fri Sep 29 22:48:40 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 22:48:57 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 11:22:33:44:55:66
Fri Sep 29 22:48:57 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated
Fri Sep 29 22:48:58 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 22:51:08 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: authenticated
Fri Sep 29 22:51:08 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: associated (aid 2)
Fri Sep 29 22:51:08 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 11:22:33:44:55:66
Fri Sep 29 22:51:08 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 RADIUS: starting accounting session ECCC6F266EAFFBE3
Fri Sep 29 22:51:08 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 WPA: pairwise key handshake completed (RSN)
Fri Sep 29 22:51:08 2023 daemon.info dnsmasq-dhcp[2345]: DHCPREQUEST(br-lan) 192.168.1.140 11:22:33:44:55:66
Fri Sep 29 22:51:08 2023 daemon.info dnsmasq-dhcp[2345]: DHCPACK(br-lan) 192.168.1.140 11:22:33:44:55:66 iPhone
Fri Sep 29 22:51:19 2023 user.info : output={"code":-3,"cloud_enable":true,"check_status":true..........................
Fri Sep 29 22:57:19 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: disassociated due to inactivity
Fri Sep 29 22:57:20 2023 daemon.info hostapd: wlan0: STA 11:22:33:44:55:66 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Sep 29 22:57:50 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 22:57:50 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 23:01:12 2023 daemon.notice netifd: modem_1_1_2_4 (3541): udhcpc: sending renew to 10.0.61.208
Fri Sep 29 23:01:12 2023 daemon.notice netifd: modem_1_1_2_4 (3541): udhcpc: lease of 10.0.61.207 obtained, lease time 7200
Fri Sep 29 23:03:50 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.co
Fri Sep 29 23:03:50 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com
Fri Sep 29 23:11:22 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: rezs4pcs01.hec.radissonhotels.com
Fri Sep 29 23:11:22 2023 daemon.warn dnsmasq[2345]: possible DNS-rebind attack detected: sap.radissonhotels.com