Advertisement
Guest User

Untitled

a guest
Sep 20th, 2014
381
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.64 KB | None | 0 0
  1.  
  2. Sep 20 22:24:02 pi kernel: [ 104.802124] tun: Universal TUN/TAP device driver, 1.6
  3. Sep 20 22:24:02 pi kernel: [ 104.802161] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  4. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: ifplugd 0.28 initializing.
  5. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
  6. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using detection mode: SIOCETHTOOL
  7. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Initialization complete, link beat detected.
  8. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
  9. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: client: Ignoring unknown interface tap_soft=tap_soft.
  10. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Program executed successfully.
  11. Sep 20 22:24:12 pi kernel: [ 115.108443] NET: Registered protocol family 10
  12. Sep 20 22:24:12 pi kernel: [ 115.142833] Bridge firewalling registered
  13. Sep 20 22:24:12 pi kernel: [ 115.212481] device eth0 entered promiscuous mode
  14. Sep 20 22:24:12 pi kernel: [ 115.258175] device tap_soft entered promiscuous mode
  15. Sep 20 22:24:12 pi kernel: [ 115.338280] vpn: port 2(tap_soft) entered forwarding state
  16. Sep 20 22:24:12 pi kernel: [ 115.338392] vpn: port 2(tap_soft) entered forwarding state
  17. Sep 20 22:24:12 pi kernel: [ 115.338437] vpn: port 1(eth0) entered forwarding state
  18. Sep 20 22:24:12 pi kernel: [ 115.338471] vpn: port 1(eth0) entered forwarding state
  19. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: ifplugd 0.28 initializing.
  20. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using interface vpn/00:AC:D1:F2:1E:57 with driver <bridge> (version: 2.3)
  21. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using detection mode: SIOCETHTOOL
  22. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Initialization complete, link beat detected.
  23. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Executing '/etc/ifplugd/ifplugd.action vpn up'.
  24. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: client: /sbin/ifup: interface vpn already configured
  25. Sep 20 22:24:13 pi ifplugd(vpn)[2240]: Program executed successfully.
  26. Sep 20 22:24:18 pi kernel: [ 121.349874] vpn: port 2(tap_soft) entered forwarding state
  27. Sep 20 22:24:18 pi kernel: [ 121.349957] vpn: port 1(eth0) entered forwarding state
  28. Sep 20 22:29:02 pi kernel: [ 404.852027] vpn: port 2(tap_soft) entered disabled state
  29. Sep 20 22:29:02 pi kernel: [ 404.852575] device tap_soft left promiscuous mode
  30. Sep 20 22:29:02 pi kernel: [ 404.852608] vpn: port 2(tap_soft) entered disabled state
  31. Sep 20 22:29:02 pi ifplugd(tap_soft)[2188]: Exiting.
  32. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: ifplugd 0.28 initializing.
  33. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
  34. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using detection mode: SIOCETHTOOL
  35. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Initialization complete, link beat detected.
  36. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
  37. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: client: Ignoring unknown interface tap_soft=tap_soft.
  38. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Program executed successfully.
  39. Sep 20 22:35:34 pi kernel: [ 796.800033] vpn: port 1(eth0) entered disabled state
  40. Sep 20 22:35:34 pi kernel: [ 796.867848] smsc95xx 1-1.1:1.0 eth0: hardware isn't capable of remote wakeup
  41. Sep 20 22:35:34 pi kernel: [ 796.875622] device eth0 left promiscuous mode
  42. Sep 20 22:35:34 pi kernel: [ 796.875663] vpn: port 1(eth0) entered disabled state
  43. Sep 20 22:35:34 pi kernel: [ 796.878968] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  44. Sep 20 22:35:34 pi ifplugd(vpn)[2240]: Link beat lost.
  45. Sep 20 22:35:34 pi ifplugd(vpn)[2240]: Exiting.
  46. Sep 20 22:35:35 pi ifplugd(eth0)[1561]: Link beat lost.
  47. Sep 20 22:35:35 pi kernel: [ 797.720158] smsc95xx 1-1.1:1.0 eth0: hardware isn't capable of remote wakeup
  48. Sep 20 22:35:36 pi kernel: [ 799.332219] smsc95xx 1-1.1:1.0 eth0: link up, 100Mbps, full-duplex, lpa 0xCDE1
  49. Sep 20 22:35:37 pi ifplugd(eth0)[1561]: Link beat detected.
  50. Sep 20 22:35:37 pi ntpd[2003]: Deleting interface #2 vpn, 10.10.10.100#123, interface stats: received=19, sent=19, dropped=0, active_time=776 secs
  51. Sep 20 22:35:37 pi ntpd[2003]: 10.10.10.10 interface 10.10.10.100 -> (none)
  52. Sep 20 22:35:37 pi ntpd[2003]: peers refreshed
  53. Sep 20 22:35:39 pi kernel: [ 802.143463] device eth0 entered promiscuous mode
  54. Sep 20 22:35:39 pi kernel: [ 802.185756] device tap_soft entered promiscuous mode
  55. Sep 20 22:35:39 pi kernel: [ 802.268498] vpn: port 2(tap_soft) entered forwarding state
  56. Sep 20 22:35:39 pi kernel: [ 802.268605] vpn: port 2(tap_soft) entered forwarding state
  57. Sep 20 22:35:39 pi kernel: [ 802.268651] vpn: port 1(eth0) entered forwarding state
  58. Sep 20 22:35:39 pi kernel: [ 802.268687] vpn: port 1(eth0) entered forwarding state
  59. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: ifplugd 0.28 initializing.
  60. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Using interface vpn/00:AC:D1:F2:1E:57 with driver <bridge> (version: 2.3)
  61. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Using detection mode: SIOCETHTOOL
  62. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Initialization complete, link beat detected.
  63. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Executing '/etc/ifplugd/ifplugd.action vpn up'.
  64. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: client: /sbin/ifup: interface vpn already configured
  65. Sep 20 22:35:39 pi ifplugd(vpn)[2583]: Program executed successfully.
  66. Sep 20 22:35:45 pi kernel: [ 808.277679] vpn: port 2(tap_soft) entered forwarding state
  67. Sep 20 22:35:45 pi kernel: [ 808.277764] vpn: port 1(eth0) entered forwarding state
  68. Sep 20 22:35:46 pi ntpd[2003]: Listen normally on 3 vpn 10.10.10.100 UDP 123
  69. Sep 20 22:35:46 pi ntpd[2003]: peers refreshed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement