[freifunk-public] Ausfälle wieder

Marvin W freifunk at larma.de
Fri Jun 10 00:07:04 CEST 2016


Hallo Patrick,

Die Fehlermeldung "write error: broken pipe" deutet darauf hin, dass 
ein Prozess vorab geschlossen wurde.
Das passiert zum Beispiel dann, wenn kein freier Speicher (RAM) auf dem 
Gerät verfügbar ist. Die RAM-Nutzung vom BL2 scheint sich auch meißt 
über 85% zu befinden (entsprechend der Statistik-Daten). Andere 
841nv10 sind eher bei 75-85% RAM-Nutzung.

Es gibt da verschiedene Sachen, die man probieren kann um noch ein paar 
KB aus dem RAM rauszukitzeln. Du könntest mal einfach `ps w` 
ausführen und nachgucken wo eventuell Speicher verloren geht. Ein 
Kanidat ist zum Beispiel der DHCP-Client: Wenn dein Netzwerk es 
zulässt kannst du einfach eine IP-Adresse statisch vergeben und damit 
1 MB RAM einsparen (Hinweis: der Router hat 32 MB RAM). Je nachdem wie 
der Router genutzt wird, macht es eventuell auch Sinn, das 
Client-WLAN-Netz abzuschalten, sodass der Router nur noch mesht.

Warum das Problem nur dann auftritt, wenn du den 4300 verbindest, ist 
mir allerdings ein Rätsel. Tatsächlich ist aber kurz nachdem die 
Verbindung mit flexiHotspot durch die mit BL_ffsaar ersetzt wurde 
(29.5, ~17:30) auch die RAM-Nutzung vom BL2 start gestiegen (fast 
10%)...

Grüße,
Marvin

On Do, Jun 9, 2016 at 10:21 , Patrick Meyer <pmeyer-mail at gmx.de> wrote:
> Hallo Ihr !
> 
> ich hab sehr erfolgreich nachfolgende Konfiguration getetest (alle 
> vernetzt):
> 
> TP 841  ("BL2", online, VPN mesh=1)    ->>>   TP 841 (mesh, wlan, VPN 
> mesh=0)   ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
> 
> Obiges Setup läuft problemlos bzw. stabil.
> 
> Und hiermit bzw. bei einem 4300 hab ich wieder Probleme:
> 
> TP 841  ("BL2", online, VPN mesh=1)    ->>>   TP 4300 ("BL", mesh, 
> wlan, VPN mesh=0)   ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
> 
> Hier noch link ("BL"): 4300: 
> https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:f4f26d6d2c36
> bzw von BL2: 
> https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:60e327bdccea
> 
> Heute hab ich so zwischen 16.00 und 17.00 h einen kompletten Ausfall 
> gehabt. Auch der erste TP 841 (online, BL2) der die anderen 
> "versorgt" konnte keine WLAN Verbindung aufbauen. Eventuell ist es 
> der Fehler: "daemon.notice netifd: client (1493): cat: write error: 
> Broken pipe". Keine Ahnung was es bedeutet bzw. was die Ursache ist.
> 
> Ein Neustart von "BL2" via ssh (ist nicht gut erreichbar und die 
> anderen sind dann eh offline) und alles geht wieder. Allerdings wohl 
> bald wieder nicht....
> 
> Kann mir da jemand helfen ? Ansonsten tausche ich den 4300 echt durch 
> einen 841 oder ggf. 1043 aus.
> 
> Anbei logread von "BL2":
> 
> root at BL2_ffsaar:~# logread
> Thu Jun  9 08:24:50 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 08:24:50 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 08:24:51 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 09:01:08 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 09:06:27 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 09:18:11 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 09:18:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 09:18:12 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 09:32:20 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 10:10:05 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 10:10:06 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 10:10:06 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 11:04:38 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 11:04:39 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 11:52:57 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 11:56:34 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 11:56:35 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 12:07:29 2016 daemon.info hostapd: client0: STA 
> 84:38:38:0a:a6:6d IEEE 802.11: authenticated
> Thu Jun  9 12:07:29 2016 daemon.info hostapd: client0: STA 
> 84:38:38:0a:a6:6d IEEE 802.11: associated (aid 1)
> Thu Jun  9 12:12:51 2016 daemon.info hostapd: client0: STA 
> 84:38:38:0a:a6:6d IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 12:12:52 2016 daemon.info hostapd: client0: STA 
> 84:38:38:0a:a6:6d IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 12:38:46 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 12:47:12 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 12:52:57 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 12:53:43 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 13:13:36 2016 daemon.notice hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication 
> response
> Thu Jun  9 13:13:36 2016 daemon.notice hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication 
> response
> Thu Jun  9 13:13:37 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun  9 13:13:37 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:16:11 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun  9 13:16:12 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 13:20:03 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun  9 13:20:04 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:23:21 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> Thu Jun  9 13:23:21 2016 daemon.info hostapd: client0: STA 
> a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:28:24 2016 daemon.info hostapd: client0: STA 
> f0:27:65:2c:61:b2 IEEE 802.11: authenticated
> Thu Jun  9 13:28:24 2016 daemon.info hostapd: client0: STA 
> f0:27:65:2c:61:b2 IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:31:40 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun  9 13:31:40 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 2)
> Thu Jun  9 13:33:40 2016 daemon.info hostapd: client0: STA 
> f0:27:65:2c:61:b2 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 13:33:41 2016 daemon.info hostapd: client0: STA 
> f0:27:65:2c:61:b2 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 13:33:45 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun  9 13:33:46 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 13:40:57 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> Thu Jun  9 13:40:57 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 13:41:16 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 13:41:17 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 13:41:17 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> Thu Jun  9 13:42:19 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: associated (aid 2)
> Thu Jun  9 13:45:54 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> Thu Jun  9 13:45:55 2016 daemon.info hostapd: client0: STA 
> 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 13:47:49 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 13:47:50 2016 daemon.info hostapd: client0: STA 
> f4:09:d8:2c:ad:18 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 14:18:00 2016 daemon.info hostapd: client0: STA 
> 6c:2f:2c:35:b4:b9 IEEE 802.11: authenticated
> Thu Jun  9 14:18:00 2016 daemon.info hostapd: client0: STA 
> 6c:2f:2c:35:b4:b9 IEEE 802.11: associated (aid 1)
> Thu Jun  9 14:19:22 2016 daemon.info hostapd: client0: STA 
> 38:2d:d1:f5:d4:ce IEEE 802.11: authenticated
> Thu Jun  9 14:19:22 2016 daemon.info hostapd: client0: STA 
> 38:2d:d1:f5:d4:ce IEEE 802.11: associated (aid 2)
> Thu Jun  9 14:23:51 2016 daemon.info hostapd: client0: STA 
> 6c:2f:2c:35:b4:b9 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 14:23:52 2016 daemon.info hostapd: client0: STA 
> 6c:2f:2c:35:b4:b9 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 14:24:32 2016 daemon.info hostapd: client0: STA 
> 38:2d:d1:f5:d4:ce IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 14:24:33 2016 daemon.info hostapd: client0: STA 
> 38:2d:d1:f5:d4:ce IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 14:33:21 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 14:33:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 14:33:22 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 14:45:07 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 14:45:22 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 15:24:21 2016 daemon.info fastd[1396]: received handshake 
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 15:24:22 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 
> 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 
> 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> Thu Jun  9 15:40:02 2016 daemon.info hostapd: client0: STA 
> 20:02:af:2b:0d:f7 IEEE 802.11: associated (aid 1)
> Thu Jun  9 15:41:12 2016 daemon.info hostapd: client0: STA 
> 7c:0b:c6:67:8f:e8 IEEE 802.11: authenticated
> Thu Jun  9 15:41:12 2016 daemon.info hostapd: client0: STA 
> 7c:0b:c6:67:8f:e8 IEEE 802.11: associated (aid 2)
> Thu Jun  9 15:45:18 2016 daemon.info hostapd: client0: STA 
> 20:02:af:2b:0d:f7 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 15:45:19 2016 daemon.info hostapd: client0: STA 
> 20:02:af:2b:0d:f7 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 15:46:30 2016 daemon.info hostapd: client0: STA 
> 7c:0b:c6:67:8f:e8 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 15:46:31 2016 daemon.info hostapd: client0: STA 
> 7c:0b:c6:67:8f:e8 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 16:02:54 2016 daemon.info hostapd: client0: STA 
> 5c:ac:4c:48:8f:b1 IEEE 802.11: authenticated
> Thu Jun  9 16:02:54 2016 daemon.info hostapd: client0: STA 
> 5c:ac:4c:48:8f:b1 IEEE 802.11: associated (aid 1)
> Thu Jun  9 16:04:19 2016 daemon.info hostapd: client0: STA 
> 00:73:8d:78:81:9f IEEE 802.11: authenticated
> Thu Jun  9 16:04:20 2016 daemon.info hostapd: client0: STA 
> 00:73:8d:78:81:9f IEEE 802.11: associated (aid 2)
> Thu Jun  9 16:09:38 2016 daemon.info hostapd: client0: STA 
> 00:73:8d:78:81:9f IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 16:09:39 2016 daemon.info hostapd: client0: STA 
> 00:73:8d:78:81:9f IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 16:14:54 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 16:14:54 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 16:14:55 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 16:14:56 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 16:14:56 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 16:35:22 2016 daemon.info hostapd: client0: STA 
> 08:ec:a9:8d:e9:fc IEEE 802.11: authenticated
> Thu Jun  9 16:35:22 2016 daemon.info hostapd: client0: STA 
> 08:ec:a9:8d:e9:fc IEEE 802.11: associated (aid 2)
> Thu Jun  9 16:40:51 2016 daemon.info hostapd: client0: STA 
> 08:ec:a9:8d:e9:fc IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 16:40:52 2016 daemon.info hostapd: client0: STA 
> 08:ec:a9:8d:e9:fc IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 16:46:58 2016 daemon.info hostapd: client0: STA 
> 5c:ac:4c:48:8f:b1 IEEE 802.11: disassociated due to inactivity
> Thu Jun  9 16:46:59 2016 daemon.info hostapd: client0: STA 
> 5c:ac:4c:48:8f:b1 IEEE 802.11: deauthenticated due to inactivity 
> (timer DEAUTH/REMOVE)
> Thu Jun  9 16:47:24 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 17:08:14 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 17:08:15 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 17:08:15 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 17:17:48 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 17:42:06 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 17:57:51 2016 daemon.info fastd[1396]: received handshake 
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun  9 17:57:52 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 17:57:53 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 17:57:53 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 18:42:23 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 18:49:47 2016 daemon.info fastd[1396]: refreshing session 
> with <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: sending handshake 
> to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 18:49:48 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 18:54:11 2016 user.notice firewall: Reloading firewall due 
> to ifupdate of wan6 (br-wan)
> Thu Jun  9 18:54:12 2016 daemon.info fastd[1396]: received handshake 
> from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: received handshake 
> response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using 
> fastd v17
> Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: 51.254.23.212:10003 
> authorized as <mesh_vpn_backbone_peer_gw3>
> Thu Jun  9 18:54:13 2016 daemon.info fastd[1396]: new session with 
> <mesh_vpn_backbone_peer_gw3> established using method 
> `salsa2012+umac'.
> Thu Jun  9 19:27:51 2016 daemon.notice netifd: client (1493): cat: 
> write error: Broken pipe
> Thu Jun  9 19:31:33 2016 authpriv.info dropbear[7601]: Child 
> connection from fd4e:f2d7:88d2:ffff:f8b1:1175:1397:b88a:33312
> Thu Jun  9 19:31:45 2016 authpriv.notice dropbear[7601]: Pubkey auth 
> succeeded for 'root' with key md5
> 
> 
> 
> --
> freifunk-public at saar.freifunk.net - Diskussion und Hilfe der Freifunk 
> Saar Community.
> Verwaltung: https://lists.hacksaar.de/listinfo/freifunk-public
> Abbestellen: freifunk-public-unsubscribe at saar.freifunk.net



More information about the freifunk-public mailing list