Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sep 20 22:24:02 pi kernel: [ 104.802124] tun: Universal TUN/TAP device driver, 1.6
- Sep 20 22:24:02 pi kernel: [ 104.802161] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: ifplugd 0.28 initializing.
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using detection mode: SIOCETHTOOL
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Initialization complete, link beat detected.
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: client: Ignoring unknown interface tap_soft=tap_soft.
- Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Program executed successfully.
- Sep 20 22:24:12 pi kernel: [ 115.108443] NET: Registered protocol family 10
- Sep 20 22:24:12 pi kernel: [ 115.142833] Bridge firewalling registered
- Sep 20 22:24:12 pi kernel: [ 115.212481] device eth0 entered promiscuous mode
- Sep 20 22:24:12 pi kernel: [ 115.258175] device tap_soft entered promiscuous mode
- Sep 20 22:24:12 pi kernel: [ 115.338280] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:24:12 pi kernel: [ 115.338392] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:24:12 pi kernel: [ 115.338437] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:24:12 pi kernel: [ 115.338471] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: ifplugd 0.28 initializing.
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using interface vpn/00:AC:D1:F2:1E:57 with driver <bridge> (version: 2.3)
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using detection mode: SIOCETHTOOL
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Initialization complete, link beat detected.
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Executing '/etc/ifplugd/ifplugd.action vpn up'.
- Sep 20 22:24:12 pi ifplugd(vpn)[2240]: client: /sbin/ifup: interface vpn already configured
- Sep 20 22:24:13 pi ifplugd(vpn)[2240]: Program executed successfully.
- Sep 20 22:24:18 pi kernel: [ 121.349874] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:24:18 pi kernel: [ 121.349957] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:29:02 pi kernel: [ 404.852027] vpn: port 2(tap_soft) entered disabled state
- Sep 20 22:29:02 pi kernel: [ 404.852575] device tap_soft left promiscuous mode
- Sep 20 22:29:02 pi kernel: [ 404.852608] vpn: port 2(tap_soft) entered disabled state
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2188]: Exiting.
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: ifplugd 0.28 initializing.
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using detection mode: SIOCETHTOOL
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Initialization complete, link beat detected.
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: client: Ignoring unknown interface tap_soft=tap_soft.
- Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Program executed successfully.
- Sep 20 22:35:34 pi kernel: [ 796.800033] vpn: port 1(eth0) entered disabled state
- Sep 20 22:35:34 pi kernel: [ 796.867848] smsc95xx 1-1.1:1.0 eth0: hardware isn't capable of remote wakeup
- Sep 20 22:35:34 pi kernel: [ 796.875622] device eth0 left promiscuous mode
- Sep 20 22:35:34 pi kernel: [ 796.875663] vpn: port 1(eth0) entered disabled state
- Sep 20 22:35:34 pi kernel: [ 796.878968] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
- Sep 20 22:35:34 pi ifplugd(vpn)[2240]: Link beat lost.
- Sep 20 22:35:34 pi ifplugd(vpn)[2240]: Exiting.
- Sep 20 22:35:35 pi ifplugd(eth0)[1561]: Link beat lost.
- Sep 20 22:35:35 pi kernel: [ 797.720158] smsc95xx 1-1.1:1.0 eth0: hardware isn't capable of remote wakeup
- Sep 20 22:35:36 pi kernel: [ 799.332219] smsc95xx 1-1.1:1.0 eth0: link up, 100Mbps, full-duplex, lpa 0xCDE1
- Sep 20 22:35:37 pi ifplugd(eth0)[1561]: Link beat detected.
- Sep 20 22:35:37 pi ntpd[2003]: Deleting interface #2 vpn, 10.10.10.100#123, interface stats: received=19, sent=19, dropped=0, active_time=776 secs
- Sep 20 22:35:37 pi ntpd[2003]: 10.10.10.10 interface 10.10.10.100 -> (none)
- Sep 20 22:35:37 pi ntpd[2003]: peers refreshed
- Sep 20 22:35:39 pi kernel: [ 802.143463] device eth0 entered promiscuous mode
- Sep 20 22:35:39 pi kernel: [ 802.185756] device tap_soft entered promiscuous mode
- Sep 20 22:35:39 pi kernel: [ 802.268498] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:35:39 pi kernel: [ 802.268605] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:35:39 pi kernel: [ 802.268651] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:35:39 pi kernel: [ 802.268687] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: ifplugd 0.28 initializing.
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Using interface vpn/00:AC:D1:F2:1E:57 with driver <bridge> (version: 2.3)
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Using detection mode: SIOCETHTOOL
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Initialization complete, link beat detected.
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Executing '/etc/ifplugd/ifplugd.action vpn up'.
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: client: /sbin/ifup: interface vpn already configured
- Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Program executed successfully.
- Sep 20 22:35:45 pi kernel: [ 808.277679] vpn: port 2(tap_soft) entered forwarding state
- Sep 20 22:35:45 pi kernel: [ 808.277764] vpn: port 1(eth0) entered forwarding state
- Sep 20 22:35:46 pi ntpd[2003]: Listen normally on 3 vpn 10.10.10.100 UDP 123
- Sep 20 22:35:46 pi ntpd[2003]: peers refreshed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement