[freifunk-public] Ausfälle wieder

Patrick Meyer pmeyer-mail at gmx.de
Thu Jun 9 22:21:11 CEST 2016


Hallo Ihr !

ich hab sehr erfolgreich nachfolgende Konfiguration getetest (alle vernetzt):

TP 841  ("BL2", online, VPN mesh=1)    ->>>   TP 841 (mesh, wlan, VPN mesh=0)   ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0) 

Obiges Setup läuft problemlos bzw. stabil.

Und hiermit bzw. bei einem 4300 hab ich wieder Probleme:

TP 841  ("BL2", online, VPN mesh=1)    ->>>   TP 4300 ("BL", mesh, wlan, VPN mesh=0)   ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0) 

Hier noch link ("BL"): 4300: https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:f4f26d6d2c36
bzw von BL2: https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:60e327bdccea

Heute hab ich so zwischen 16.00 und 17.00 h einen kompletten Ausfall gehabt. Auch der erste TP 841 (online, BL2) der die anderen "versorgt" konnte keine WLAN Verbindung aufbauen. Eventuell ist es der Fehler: "daemon.notice netifd: client (1493): cat: write error: Broken pipe". Keine Ahnung was es bedeutet bzw. was die Ursache ist.

Ein Neustart von "BL2" via ssh (ist nicht gut erreichbar und die anderen sind dann eh offline) und alles geht wieder. Allerdings wohl bald wieder nicht....

Kann mir da jemand helfen ? Ansonsten tausche ich den 4300 echt durch einen 841 oder ggf. 1043 aus.

Anbei logread von "BL2":

root at BL2_ffsaar:~# logread
Thu Jun  9 08:24:50 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 08:24:50 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 09:01:08 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 09:06:27 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 09:18:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 09:18:12 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 09:32:20 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 10:10:06 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 10:10:06 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 11:04:38 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 11:52:57 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 11:56:34 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 12:07:29 2016 daemon.info hostapd: client0: STA 84:38:38:0a:a6:6d IEEE 802.11: authenticated
Thu Jun  9 12:07:29 2016 daemon.info hostapd: client0: STA 84:38:38:0a:a6:6d IEEE 802.11: associated (aid 1)
Thu Jun  9 12:12:51 2016 daemon.info hostapd: client0: STA 84:38:38:0a:a6:6d IEEE 802.11: disassociated due to inactivity
Thu Jun  9 12:12:52 2016 daemon.info hostapd: client0: STA 84:38:38:0a:a6:6d IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 12:38:46 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 12:52:57 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 12:53:43 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 13:13:36 2016 daemon.notice hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication response
Thu Jun  9 13:13:36 2016 daemon.notice hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication response
Thu Jun  9 13:13:37 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
Thu Jun  9 13:13:37 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
Thu Jun  9 13:16:11 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
Thu Jun  9 13:16:12 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 13:20:03 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
Thu Jun  9 13:23:21 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
Thu Jun  9 13:23:21 2016 daemon.info hostapd: client0: STA a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
Thu Jun  9 13:28:24 2016 daemon.info hostapd: client0: STA f0:27:65:2c:61:b2 IEEE 802.11: authenticated
Thu Jun  9 13:28:24 2016 daemon.info hostapd: client0: STA f0:27:65:2c:61:b2 IEEE 802.11: associated (aid 1)
Thu Jun  9 13:31:40 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
Thu Jun  9 13:31:40 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 2)
Thu Jun  9 13:33:40 2016 daemon.info hostapd: client0: STA f0:27:65:2c:61:b2 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 13:33:41 2016 daemon.info hostapd: client0: STA f0:27:65:2c:61:b2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 13:33:45 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
Thu Jun  9 13:33:46 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 13:40:57 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
Thu Jun  9 13:40:57 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 13:41:17 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 13:41:17 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: associated (aid 2)
Thu Jun  9 13:45:54 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
Thu Jun  9 13:45:55 2016 daemon.info hostapd: client0: STA 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 13:47:49 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 13:47:50 2016 daemon.info hostapd: client0: STA f4:09:d8:2c:ad:18 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 14:18:00 2016 daemon.info hostapd: client0: STA 6c:2f:2c:35:b4:b9 IEEE 802.11: authenticated
Thu Jun  9 14:18:00 2016 daemon.info hostapd: client0: STA 6c:2f:2c:35:b4:b9 IEEE 802.11: associated (aid 1)
Thu Jun  9 14:19:22 2016 daemon.info hostapd: client0: STA 38:2d:d1:f5:d4:ce IEEE 802.11: authenticated
Thu Jun  9 14:19:22 2016 daemon.info hostapd: client0: STA 38:2d:d1:f5:d4:ce IEEE 802.11: associated (aid 2)
Thu Jun  9 14:23:51 2016 daemon.info hostapd: client0: STA 6c:2f:2c:35:b4:b9 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 14:23:52 2016 daemon.info hostapd: client0: STA 6c:2f:2c:35:b4:b9 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 14:24:32 2016 daemon.info hostapd: client0: STA 38:2d:d1:f5:d4:ce IEEE 802.11: disassociated due to inactivity
Thu Jun  9 14:24:33 2016 daemon.info hostapd: client0: STA 38:2d:d1:f5:d4:ce IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 14:33:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 14:33:22 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 14:45:07 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 14:45:22 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 15:24:21 2016 daemon.info fastd[1396]: received handshake from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 20:02:af:2b:0d:f7 IEEE 802.11: associated (aid 1)
Thu Jun  9 15:41:12 2016 daemon.info hostapd: client0: STA 7c:0b:c6:67:8f:e8 IEEE 802.11: authenticated
Thu Jun  9 15:41:12 2016 daemon.info hostapd: client0: STA 7c:0b:c6:67:8f:e8 IEEE 802.11: associated (aid 2)
Thu Jun  9 15:45:18 2016 daemon.info hostapd: client0: STA 20:02:af:2b:0d:f7 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 15:45:19 2016 daemon.info hostapd: client0: STA 20:02:af:2b:0d:f7 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 15:46:30 2016 daemon.info hostapd: client0: STA 7c:0b:c6:67:8f:e8 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 15:46:31 2016 daemon.info hostapd: client0: STA 7c:0b:c6:67:8f:e8 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 16:02:54 2016 daemon.info hostapd: client0: STA 5c:ac:4c:48:8f:b1 IEEE 802.11: authenticated
Thu Jun  9 16:02:54 2016 daemon.info hostapd: client0: STA 5c:ac:4c:48:8f:b1 IEEE 802.11: associated (aid 1)
Thu Jun  9 16:04:19 2016 daemon.info hostapd: client0: STA 00:73:8d:78:81:9f IEEE 802.11: authenticated
Thu Jun  9 16:04:20 2016 daemon.info hostapd: client0: STA 00:73:8d:78:81:9f IEEE 802.11: associated (aid 2)
Thu Jun  9 16:09:38 2016 daemon.info hostapd: client0: STA 00:73:8d:78:81:9f IEEE 802.11: disassociated due to inactivity
Thu Jun  9 16:09:39 2016 daemon.info hostapd: client0: STA 00:73:8d:78:81:9f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 16:14:54 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 16:14:54 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 16:14:55 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 16:14:56 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 16:14:56 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 16:35:22 2016 daemon.info hostapd: client0: STA 08:ec:a9:8d:e9:fc IEEE 802.11: authenticated
Thu Jun  9 16:35:22 2016 daemon.info hostapd: client0: STA 08:ec:a9:8d:e9:fc IEEE 802.11: associated (aid 2)
Thu Jun  9 16:40:51 2016 daemon.info hostapd: client0: STA 08:ec:a9:8d:e9:fc IEEE 802.11: disassociated due to inactivity
Thu Jun  9 16:40:52 2016 daemon.info hostapd: client0: STA 08:ec:a9:8d:e9:fc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 16:46:58 2016 daemon.info hostapd: client0: STA 5c:ac:4c:48:8f:b1 IEEE 802.11: disassociated due to inactivity
Thu Jun  9 16:46:59 2016 daemon.info hostapd: client0: STA 5c:ac:4c:48:8f:b1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Jun  9 16:47:24 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 17:08:15 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 17:08:15 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 17:17:48 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 17:42:06 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 17:57:51 2016 daemon.info fastd[1396]: received handshake from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
Thu Jun  9 17:57:52 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 17:57:53 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 17:57:53 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 18:42:23 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 18:49:47 2016 daemon.info fastd[1396]: refreshing session with <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: sending handshake to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 18:54:11 2016 user.notice firewall: Reloading firewall due to ifupdate of wan6 (br-wan)
Thu Jun  9 18:54:12 2016 daemon.info fastd[1396]: received handshake from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: received handshake response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using fastd v17
Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: 51.254.23.212:10003 authorized as <mesh_vpn_backbone_peer_gw3>
Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: new session with <mesh_vpn_backbone_peer_gw3> established using method `salsa2012+umac'.
Thu Jun  9 19:27:51 2016 daemon.notice netifd: client (1493): cat: write error: Broken pipe
Thu Jun  9 19:31:33 2016 authpriv.info dropbear[7601]: Child connection from fd4e:f2d7:88d2:ffff:f8b1:1175:1397:b88a:33312
Thu Jun  9 19:31:45 2016 authpriv.notice dropbear[7601]: Pubkey auth succeeded for 'root' with key md5





More information about the freifunk-public mailing list