[freifunk-public] Ausfälle wieder
Marvin W
freifunk at larma.de
Fri Jun 10 00:07:04 CEST 2016
Hallo Patrick,
Die Fehlermeldung "write error: broken pipe" deutet darauf hin, dass
ein Prozess vorab geschlossen wurde.
Das passiert zum Beispiel dann, wenn kein freier Speicher (RAM) auf dem
Gerät verfügbar ist. Die RAM-Nutzung vom BL2 scheint sich auch meißt
über 85% zu befinden (entsprechend der Statistik-Daten). Andere
841nv10 sind eher bei 75-85% RAM-Nutzung.
Es gibt da verschiedene Sachen, die man probieren kann um noch ein paar
KB aus dem RAM rauszukitzeln. Du könntest mal einfach `ps w`
ausführen und nachgucken wo eventuell Speicher verloren geht. Ein
Kanidat ist zum Beispiel der DHCP-Client: Wenn dein Netzwerk es
zulässt kannst du einfach eine IP-Adresse statisch vergeben und damit
1 MB RAM einsparen (Hinweis: der Router hat 32 MB RAM). Je nachdem wie
der Router genutzt wird, macht es eventuell auch Sinn, das
Client-WLAN-Netz abzuschalten, sodass der Router nur noch mesht.
Warum das Problem nur dann auftritt, wenn du den 4300 verbindest, ist
mir allerdings ein Rätsel. Tatsächlich ist aber kurz nachdem die
Verbindung mit flexiHotspot durch die mit BL_ffsaar ersetzt wurde
(29.5, ~17:30) auch die RAM-Nutzung vom BL2 start gestiegen (fast
10%)...
Grüße,
Marvin
On Do, Jun 9, 2016 at 10:21 , Patrick Meyer <pmeyer-mail at gmx.de> wrote:
> Hallo Ihr !
>
> ich hab sehr erfolgreich nachfolgende Konfiguration getetest (alle
> vernetzt):
>
> TP 841 ("BL2", online, VPN mesh=1) ->>> TP 841 (mesh, wlan, VPN
> mesh=0) ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
>
> Obiges Setup läuft problemlos bzw. stabil.
>
> Und hiermit bzw. bei einem 4300 hab ich wieder Probleme:
>
> TP 841 ("BL2", online, VPN mesh=1) ->>> TP 4300 ("BL", mesh,
> wlan, VPN mesh=0) ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
>
> Hier noch link ("BL"): 4300:
> https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:f4f26d6d2c36
> bzw von BL2:
> https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:60e327bdccea
>
> Heute hab ich so zwischen 16.00 und 17.00 h einen kompletten Ausfall
> gehabt. Auch der erste TP 841 (online, BL2) der die anderen
> "versorgt" konnte keine WLAN Verbindung aufbauen. Eventuell ist es
> der Fehler: "daemon.notice netifd: client (1493): cat: write error:
> Broken pipe". Keine Ahnung was es bedeutet bzw. was die Ursache ist.
>
> Ein Neustart von "BL2" via ssh (ist nicht gut erreichbar und die
> anderen sind dann eh offline) und alles geht wieder. Allerdings wohl
> bald wieder nicht....
>
> Kann mir da jemand helfen ? Ansonsten tausche ich den 4300 echt durch
> einen 841 oder ggf. 1043 aus.
>
> Anbei logread von "BL2":
>
> root at BL2_ffsaar:~# logread
> Thu Jun 9 08:24:50 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 08:24:50 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 09:01:08 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 09:06:27 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 09:18:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 09:18:12 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 09:32:20 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 10:10:06 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 10:10:06 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 11:04:38 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 11:52:57 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 11:56:34 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 12:07:29 2016 daemon.info hostapd: client0: STA
> 84:38:38:0a:a6:6d IEEE 802.11: authenticated
> Thu Jun 9 12:07:29 2016 daemon.info hostapd: client0: STA
> 84:38:38:0a:a6:6d IEEE 802.11: associated (aid 1)
> Thu Jun 9 12:12:51 2016 daemon.info hostapd: client0: STA
> 84:38:38:0a:a6:6d IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 12:12:52 2016 daemon.info hostapd: client0: STA
> 84:38:38:0a:a6:6d IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 12:38:46 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 12:52:57 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 12:53:43 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 13:13:36 2016 daemon.notice hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication
> response
> Thu Jun 9 13:13:36 2016 daemon.notice hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication
> response
> Thu Jun 9 13:13:37 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun 9 13:13:37 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:16:11 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun 9 13:16:12 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 13:20:03 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:23:21 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun 9 13:23:21 2016 daemon.info hostapd: client0: STA
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:28:24 2016 daemon.info hostapd: client0: STA
> f0:27:65:2c:61:b2 IEEE 802.11: authenticated
> Thu Jun 9 13:28:24 2016 daemon.info hostapd: client0: STA
> f0:27:65:2c:61:b2 IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:31:40 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun 9 13:31:40 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 2)
> Thu Jun 9 13:33:40 2016 daemon.info hostapd: client0: STA
> f0:27:65:2c:61:b2 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 13:33:41 2016 daemon.info hostapd: client0: STA
> f0:27:65:2c:61:b2 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 13:33:45 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun 9 13:33:46 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 13:40:57 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun 9 13:40:57 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 13:41:17 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 13:41:17 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: associated (aid 2)
> Thu Jun 9 13:45:54 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun 9 13:45:55 2016 daemon.info hostapd: client0: STA
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 13:47:49 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 13:47:50 2016 daemon.info hostapd: client0: STA
> f4:09:d8:2c:ad:18 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 14:18:00 2016 daemon.info hostapd: client0: STA
> 6c:2f:2c:35:b4:b9 IEEE 802.11: authenticated
> Thu Jun 9 14:18:00 2016 daemon.info hostapd: client0: STA
> 6c:2f:2c:35:b4:b9 IEEE 802.11: associated (aid 1)
> Thu Jun 9 14:19:22 2016 daemon.info hostapd: client0: STA
> 38:2d:d1:f5:d4:ce IEEE 802.11: authenticated
> Thu Jun 9 14:19:22 2016 daemon.info hostapd: client0: STA
> 38:2d:d1:f5:d4:ce IEEE 802.11: associated (aid 2)
> Thu Jun 9 14:23:51 2016 daemon.info hostapd: client0: STA
> 6c:2f:2c:35:b4:b9 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 14:23:52 2016 daemon.info hostapd: client0: STA
> 6c:2f:2c:35:b4:b9 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 14:24:32 2016 daemon.info hostapd: client0: STA
> 38:2d:d1:f5:d4:ce IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 14:24:33 2016 daemon.info hostapd: client0: STA
> 38:2d:d1:f5:d4:ce IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 14:33:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 14:33:22 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 14:45:07 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 14:45:22 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 15:24:21 2016 daemon.info fastd[1396]: received handshake
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> 20:02:af:2b:0d:f7 IEEE 802.11: associated (aid 1)
> Thu Jun 9 15:41:12 2016 daemon.info hostapd: client0: STA
> 7c:0b:c6:67:8f:e8 IEEE 802.11: authenticated
> Thu Jun 9 15:41:12 2016 daemon.info hostapd: client0: STA
> 7c:0b:c6:67:8f:e8 IEEE 802.11: associated (aid 2)
> Thu Jun 9 15:45:18 2016 daemon.info hostapd: client0: STA
> 20:02:af:2b:0d:f7 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 15:45:19 2016 daemon.info hostapd: client0: STA
> 20:02:af:2b:0d:f7 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 15:46:30 2016 daemon.info hostapd: client0: STA
> 7c:0b:c6:67:8f:e8 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 15:46:31 2016 daemon.info hostapd: client0: STA
> 7c:0b:c6:67:8f:e8 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 16:02:54 2016 daemon.info hostapd: client0: STA
> 5c:ac:4c:48:8f:b1 IEEE 802.11: authenticated
> Thu Jun 9 16:02:54 2016 daemon.info hostapd: client0: STA
> 5c:ac:4c:48:8f:b1 IEEE 802.11: associated (aid 1)
> Thu Jun 9 16:04:19 2016 daemon.info hostapd: client0: STA
> 00:73:8d:78:81:9f IEEE 802.11: authenticated
> Thu Jun 9 16:04:20 2016 daemon.info hostapd: client0: STA
> 00:73:8d:78:81:9f IEEE 802.11: associated (aid 2)
> Thu Jun 9 16:09:38 2016 daemon.info hostapd: client0: STA
> 00:73:8d:78:81:9f IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 16:09:39 2016 daemon.info hostapd: client0: STA
> 00:73:8d:78:81:9f IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 16:14:54 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 16:14:54 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 16:14:55 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 16:14:56 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 16:14:56 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 16:35:22 2016 daemon.info hostapd: client0: STA
> 08:ec:a9:8d:e9:fc IEEE 802.11: authenticated
> Thu Jun 9 16:35:22 2016 daemon.info hostapd: client0: STA
> 08:ec:a9:8d:e9:fc IEEE 802.11: associated (aid 2)
> Thu Jun 9 16:40:51 2016 daemon.info hostapd: client0: STA
> 08:ec:a9:8d:e9:fc IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 16:40:52 2016 daemon.info hostapd: client0: STA
> 08:ec:a9:8d:e9:fc IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 16:46:58 2016 daemon.info hostapd: client0: STA
> 5c:ac:4c:48:8f:b1 IEEE 802.11: disassociated due to inactivity
> Thu Jun 9 16:46:59 2016 daemon.info hostapd: client0: STA
> 5c:ac:4c:48:8f:b1 IEEE 802.11: deauthenticated due to inactivity
> (timer DEAUTH/REMOVE)
> Thu Jun 9 16:47:24 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 17:08:15 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 17:08:15 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 17:17:48 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 17:42:06 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 17:57:51 2016 daemon.info fastd[1396]: received handshake
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun 9 17:57:52 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 17:57:53 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 17:57:53 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 18:42:23 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 18:49:47 2016 daemon.info fastd[1396]: refreshing session
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: sending handshake
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 18:54:11 2016 user.notice firewall: Reloading firewall due
> to ifupdate of wan6 (br-wan)
> Thu Jun 9 18:54:12 2016 daemon.info fastd[1396]: received handshake
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: received handshake
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> fastd v17
> Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: new session with
> <mesh_vpn_backbone_peer_gw3> established using method
> `salsa2012+umac'.
> Thu Jun 9 19:27:51 2016 daemon.notice netifd: client (1493): cat:
> write error: Broken pipe
> Thu Jun 9 19:31:33 2016 authpriv.info dropbear[7601]: Child
> connection from fd4e:f2d7:88d2:ffff:f8b1:1175:1397:b88a:33312
> Thu Jun 9 19:31:45 2016 authpriv.notice dropbear[7601]: Pubkey auth
> succeeded for 'root' with key md5
>
>
>
> --
> freifunk-public at saar.freifunk.net - Diskussion und Hilfe der Freifunk
> Saar Community.
> Verwaltung: https://lists.hacksaar.de/listinfo/freifunk-public
> Abbestellen: freifunk-public-unsubscribe at saar.freifunk.net
More information about the freifunk-public
mailing list