[freifunk-public] Ausfälle wieder
Patrick Meyer
pmeyer-mail at gmx.de
Sun Jun 19 17:47:40 CEST 2016
Hallo Leute!
mir ist bei der Fehlersuche noch was anderes in Sinn gekommen: Da sind jede Menge WLAN-Netze in der Umgebung (zusammen über 40! -> schwankt natürlich; iwinfo client0 scan).
Bekannterweise sendet unser Freifunk auf Channel 1. Hab auch keine Lust dies zu ändern (dann hab ich wohl andere Mesh Probleme :- ). Allerdings könnte ich die Sendeleistung erhöhen um die anderen WLAN's damit mehr in andere Kanäle "zu zwingen".
Hier mal ein Übersicht:
Channel 1: 18 Stk, (einschl. 9 x unser Freifunk mit Mesh usw.)
Channel 6: 11
Channel 9: 2
Channel 11: 10
Also jetzt txpower erhöhen oder nicht (Standard ist beim TP841 16 dBm)? Wie ist eure Meinung dazu?
Vielen Dank schon mal
Gruß,
Patrick
PS: leider konnte ich zum Pizza essen nicht kommen :(. War im Urlaub. Muss echt mal an einem Mittwoch bei euch vorbei schauen wobei jetzt wieder Fussball-EM "Stress" ist ;-)
> Gesendet: Freitag, 10. Juni 2016 um 00:07 Uhr
> Von: "Marvin W" <freifunk at larma.de>
> An: "Patrick Meyer" <pmeyer-mail at gmx.de>
> Cc: "Freifunk Public" <freifunk-public at saar.freifunk.net>
> Betreff: Re: [freifunk-public] Ausfälle wieder
>
> Hallo Patrick,
>
> Die Fehlermeldung "write error: broken pipe" deutet darauf hin, dass
> ein Prozess vorab geschlossen wurde.
> Das passiert zum Beispiel dann, wenn kein freier Speicher (RAM) auf dem
> Gerät verfügbar ist. Die RAM-Nutzung vom BL2 scheint sich auch meißt
> über 85% zu befinden (entsprechend der Statistik-Daten). Andere
> 841nv10 sind eher bei 75-85% RAM-Nutzung.
>
> Es gibt da verschiedene Sachen, die man probieren kann um noch ein paar
> KB aus dem RAM rauszukitzeln. Du könntest mal einfach `ps w`
> ausführen und nachgucken wo eventuell Speicher verloren geht. Ein
> Kanidat ist zum Beispiel der DHCP-Client: Wenn dein Netzwerk es
> zulässt kannst du einfach eine IP-Adresse statisch vergeben und damit
> 1 MB RAM einsparen (Hinweis: der Router hat 32 MB RAM). Je nachdem wie
> der Router genutzt wird, macht es eventuell auch Sinn, das
> Client-WLAN-Netz abzuschalten, sodass der Router nur noch mesht.
>
> Warum das Problem nur dann auftritt, wenn du den 4300 verbindest, ist
> mir allerdings ein Rätsel. Tatsächlich ist aber kurz nachdem die
> Verbindung mit flexiHotspot durch die mit BL_ffsaar ersetzt wurde
> (29.5, ~17:30) auch die RAM-Nutzung vom BL2 start gestiegen (fast
> 10%)...
>
> Grüße,
> Marvin
>
> On Do, Jun 9, 2016 at 10:21 , Patrick Meyer <pmeyer-mail at gmx.de> wrote:
> > Hallo Ihr !
> >
> > ich hab sehr erfolgreich nachfolgende Konfiguration getetest (alle
> > vernetzt):
> >
> > TP 841 ("BL2", online, VPN mesh=1) ->>> TP 841 (mesh, wlan, VPN
> > mesh=0) ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
> >
> > Obiges Setup läuft problemlos bzw. stabil.
> >
> > Und hiermit bzw. bei einem 4300 hab ich wieder Probleme:
> >
> > TP 841 ("BL2", online, VPN mesh=1) ->>> TP 4300 ("BL", mesh,
> > wlan, VPN mesh=0) ->>> TP841 ("BL1", mesh via wlan, VPN mesh=0)
> >
> > Hier noch link ("BL"): 4300:
> > https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:f4f26d6d2c36
> > bzw von BL2:
> > https://mgmt.saar.freifunk.net/hopglass/#!v:m;n:60e327bdccea
> >
> > Heute hab ich so zwischen 16.00 und 17.00 h einen kompletten Ausfall
> > gehabt. Auch der erste TP 841 (online, BL2) der die anderen
> > "versorgt" konnte keine WLAN Verbindung aufbauen. Eventuell ist es
> > der Fehler: "daemon.notice netifd: client (1493): cat: write error:
> > Broken pipe". Keine Ahnung was es bedeutet bzw. was die Ursache ist.
> >
> > Ein Neustart von "BL2" via ssh (ist nicht gut erreichbar und die
> > anderen sind dann eh offline) und alles geht wieder. Allerdings wohl
> > bald wieder nicht....
> >
> > Kann mir da jemand helfen ? Ansonsten tausche ich den 4300 echt durch
> > einen 841 oder ggf. 1043 aus.
> >
> > Anbei logread von "BL2":
> >
> > root at BL2_ffsaar:~# logread
> > Thu Jun 9 08:24:50 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 08:24:50 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 08:24:51 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 09:01:08 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 09:06:27 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 09:18:11 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 09:18:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 09:18:12 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 09:32:20 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 10:10:05 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 10:10:06 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 10:10:06 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 11:04:38 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 11:04:39 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 11:52:57 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 11:56:34 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 11:56:35 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 12:07:29 2016 daemon.info hostapd: client0: STA
> > 84:38:38:0a:a6:6d IEEE 802.11: authenticated
> > Thu Jun 9 12:07:29 2016 daemon.info hostapd: client0: STA
> > 84:38:38:0a:a6:6d IEEE 802.11: associated (aid 1)
> > Thu Jun 9 12:12:51 2016 daemon.info hostapd: client0: STA
> > 84:38:38:0a:a6:6d IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 12:12:52 2016 daemon.info hostapd: client0: STA
> > 84:38:38:0a:a6:6d IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 12:38:46 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 12:47:12 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 12:52:57 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 12:53:43 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 13:13:36 2016 daemon.notice hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication
> > response
> > Thu Jun 9 13:13:36 2016 daemon.notice hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: did not acknowledge authentication
> > response
> > Thu Jun 9 13:13:37 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> > Thu Jun 9 13:13:37 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:16:11 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> > Thu Jun 9 13:16:12 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 13:20:03 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> > Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> > Thu Jun 9 13:20:04 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:23:21 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: authenticated
> > Thu Jun 9 13:23:21 2016 daemon.info hostapd: client0: STA
> > a0:f8:95:5a:fa:2e IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:28:24 2016 daemon.info hostapd: client0: STA
> > f0:27:65:2c:61:b2 IEEE 802.11: authenticated
> > Thu Jun 9 13:28:24 2016 daemon.info hostapd: client0: STA
> > f0:27:65:2c:61:b2 IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:31:40 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> > Thu Jun 9 13:31:40 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 2)
> > Thu Jun 9 13:33:40 2016 daemon.info hostapd: client0: STA
> > f0:27:65:2c:61:b2 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 13:33:41 2016 daemon.info hostapd: client0: STA
> > f0:27:65:2c:61:b2 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 13:33:45 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> > Thu Jun 9 13:33:46 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 13:40:57 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: authenticated
> > Thu Jun 9 13:40:57 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: associated (aid 1)
> > Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 13:41:16 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 13:41:17 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 13:41:17 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: authenticated
> > Thu Jun 9 13:42:19 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: associated (aid 2)
> > Thu Jun 9 13:45:54 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: disassociated
> > Thu Jun 9 13:45:55 2016 daemon.info hostapd: client0: STA
> > 40:a6:d9:d7:57:2f IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 13:47:49 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 13:47:50 2016 daemon.info hostapd: client0: STA
> > f4:09:d8:2c:ad:18 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 14:18:00 2016 daemon.info hostapd: client0: STA
> > 6c:2f:2c:35:b4:b9 IEEE 802.11: authenticated
> > Thu Jun 9 14:18:00 2016 daemon.info hostapd: client0: STA
> > 6c:2f:2c:35:b4:b9 IEEE 802.11: associated (aid 1)
> > Thu Jun 9 14:19:22 2016 daemon.info hostapd: client0: STA
> > 38:2d:d1:f5:d4:ce IEEE 802.11: authenticated
> > Thu Jun 9 14:19:22 2016 daemon.info hostapd: client0: STA
> > 38:2d:d1:f5:d4:ce IEEE 802.11: associated (aid 2)
> > Thu Jun 9 14:23:51 2016 daemon.info hostapd: client0: STA
> > 6c:2f:2c:35:b4:b9 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 14:23:52 2016 daemon.info hostapd: client0: STA
> > 6c:2f:2c:35:b4:b9 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 14:24:32 2016 daemon.info hostapd: client0: STA
> > 38:2d:d1:f5:d4:ce IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 14:24:33 2016 daemon.info hostapd: client0: STA
> > 38:2d:d1:f5:d4:ce IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 14:33:21 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 14:33:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 14:33:22 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 14:45:07 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 14:45:22 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 15:24:21 2016 daemon.info fastd[1396]: received handshake
> > from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> > Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 15:24:22 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> > 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> > Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> > 20:02:af:2b:0d:f7 IEEE 802.11: authenticated
> > Thu Jun 9 15:40:02 2016 daemon.info hostapd: client0: STA
> > 20:02:af:2b:0d:f7 IEEE 802.11: associated (aid 1)
> > Thu Jun 9 15:41:12 2016 daemon.info hostapd: client0: STA
> > 7c:0b:c6:67:8f:e8 IEEE 802.11: authenticated
> > Thu Jun 9 15:41:12 2016 daemon.info hostapd: client0: STA
> > 7c:0b:c6:67:8f:e8 IEEE 802.11: associated (aid 2)
> > Thu Jun 9 15:45:18 2016 daemon.info hostapd: client0: STA
> > 20:02:af:2b:0d:f7 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 15:45:19 2016 daemon.info hostapd: client0: STA
> > 20:02:af:2b:0d:f7 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 15:46:30 2016 daemon.info hostapd: client0: STA
> > 7c:0b:c6:67:8f:e8 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 15:46:31 2016 daemon.info hostapd: client0: STA
> > 7c:0b:c6:67:8f:e8 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 16:02:54 2016 daemon.info hostapd: client0: STA
> > 5c:ac:4c:48:8f:b1 IEEE 802.11: authenticated
> > Thu Jun 9 16:02:54 2016 daemon.info hostapd: client0: STA
> > 5c:ac:4c:48:8f:b1 IEEE 802.11: associated (aid 1)
> > Thu Jun 9 16:04:19 2016 daemon.info hostapd: client0: STA
> > 00:73:8d:78:81:9f IEEE 802.11: authenticated
> > Thu Jun 9 16:04:20 2016 daemon.info hostapd: client0: STA
> > 00:73:8d:78:81:9f IEEE 802.11: associated (aid 2)
> > Thu Jun 9 16:09:38 2016 daemon.info hostapd: client0: STA
> > 00:73:8d:78:81:9f IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 16:09:39 2016 daemon.info hostapd: client0: STA
> > 00:73:8d:78:81:9f IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 16:14:54 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 16:14:54 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 16:14:55 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 16:14:56 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 16:14:56 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 16:35:22 2016 daemon.info hostapd: client0: STA
> > 08:ec:a9:8d:e9:fc IEEE 802.11: authenticated
> > Thu Jun 9 16:35:22 2016 daemon.info hostapd: client0: STA
> > 08:ec:a9:8d:e9:fc IEEE 802.11: associated (aid 2)
> > Thu Jun 9 16:40:51 2016 daemon.info hostapd: client0: STA
> > 08:ec:a9:8d:e9:fc IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 16:40:52 2016 daemon.info hostapd: client0: STA
> > 08:ec:a9:8d:e9:fc IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 16:46:58 2016 daemon.info hostapd: client0: STA
> > 5c:ac:4c:48:8f:b1 IEEE 802.11: disassociated due to inactivity
> > Thu Jun 9 16:46:59 2016 daemon.info hostapd: client0: STA
> > 5c:ac:4c:48:8f:b1 IEEE 802.11: deauthenticated due to inactivity
> > (timer DEAUTH/REMOVE)
> > Thu Jun 9 16:47:24 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 17:08:14 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 17:08:15 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 17:08:15 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 17:17:48 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 17:42:06 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 17:57:51 2016 daemon.info fastd[1396]: received handshake
> > from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> > Thu Jun 9 17:57:52 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 17:57:53 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 17:57:53 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 18:42:23 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 18:49:47 2016 daemon.info fastd[1396]: refreshing session
> > with <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: sending handshake
> > to <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]...
> > Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 18:49:48 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 18:54:11 2016 user.notice firewall: Reloading firewall due
> > to ifupdate of wan6 (br-wan)
> > Thu Jun 9 18:54:12 2016 daemon.info fastd[1396]: received handshake
> > from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003]
> > Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: received handshake
> > response from <mesh_vpn_backbone_peer_gw3>[51.254.23.212:10003] using
> > fastd v17
> > Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: 51.254.23.212:10003
> > authorized as <mesh_vpn_backbone_peer_gw3>
> > Thu Jun 9 18:54:13 2016 daemon.info fastd[1396]: new session with
> > <mesh_vpn_backbone_peer_gw3> established using method
> > `salsa2012+umac'.
> > Thu Jun 9 19:27:51 2016 daemon.notice netifd: client (1493): cat:
> > write error: Broken pipe
> > Thu Jun 9 19:31:33 2016 authpriv.info dropbear[7601]: Child
> > connection from fd4e:f2d7:88d2:ffff:f8b1:1175:1397:b88a:33312
> > Thu Jun 9 19:31:45 2016 authpriv.notice dropbear[7601]: Pubkey auth
> > succeeded for 'root' with key md5
> >
> >
> >
> > --
> > freifunk-public at saar.freifunk.net - Diskussion und Hilfe der Freifunk
> > Saar Community.
> > Verwaltung: https://lists.hacksaar.de/listinfo/freifunk-public
> > Abbestellen: freifunk-public-unsubscribe at saar.freifunk.net
>
>
More information about the freifunk-public
mailing list