Advertisement
Guest User

20180709-highload-pre-reboot

a guest
Sep 5th, 2018
97
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 75.05 KB | None | 0 0
  1. $ ssh FF-WKP-Privat-01
  2.  
  3.  
  4. BusyBox v1.25.1 () built-in shell (ash)
  5.  
  6. _______ __ ___ __
  7. | ___|.----.-----.|__|.' _|.--.--.-----.| |--.
  8. | ___|| _| -__|| || _|| | | || <
  9. |___| |__| |_____||__||__| |_____|__|__||__|__|
  10. _______ __ Freie Netze fuer alle! __
  11. | | |.-----.----.--| |.--.--.--.-----.-----.| |_
  12. | || _ | _| _ || | | | -__|__ --|| _|
  13. |__|____||_____|__| |_____||________|_____|_____||____|
  14.  
  15. ##############################################################################
  16. _________
  17. / /\ _ ___ ___ ___
  18. / LE / \ | | | __| \| __|
  19. / DE / \ | |__| _|| |) | _|
  20. /________/ LE \ |____|___|___/|___| lede-project.org
  21. \ \ DE /
  22. \ LE \ /
  23. \ DE \ /
  24. \________\/
  25. ------------------------------------------------------------------------------
  26. LEDE Version: LEDE Reboot 17.01-SNAPSHOT r3881+51-999bb66b20 (r3881+51-999bb66b20)
  27. Gluon Version: v2017.1.8-7-g8e371e86 Gluon Release: 20180709
  28. Selected Hood: landkreis-steinfurt
  29. ------------------------------------------------------------------------------
  30. root@FF-WKP-Privat-01:~# uptime
  31. 09:36:48 up 2 days, 23:27, load average: 11.75, 10.85, 10.43
  32. root@FF-WKP-Privat-01:~# logread
  33. Tue Sep 4 16:53:47 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  34. Tue Sep 4 16:53:48 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  35. Tue Sep 4 16:54:09 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  36. Tue Sep 4 16:54:29 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  37. Tue Sep 4 16:54:48 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  38. Tue Sep 4 16:54:49 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  39. Tue Sep 4 16:54:58 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  40. Tue Sep 4 16:54:58 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  41. Tue Sep 4 16:56:27 2018 user.notice root: hoodselector[23459]: The hoodselector is still running.
  42. Tue Sep 4 17:04:44 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  43. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  44. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  45. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  46. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  47. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  48. Tue Sep 4 17:05:26 2018 daemon.notice hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: did not acknowledge authentication response
  49. Tue Sep 4 17:07:48 2018 user.notice root: hoodselector[23640]: The hoodselector is still running.
  50. Tue Sep 4 17:09:21 2018 daemon.info hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: disassociated due to inactivity
  51. Tue Sep 4 17:09:33 2018 daemon.info hostapd: client0: STA ec:1f:72:d4:c2:36 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  52. Tue Sep 4 17:15:20 2018 user.notice root: hoodselector[23747]: The hoodselector is still running.
  53. Tue Sep 4 17:17:55 2018 daemon.notice hostapd: client0: interface state ENABLED->DISABLED
  54. Tue Sep 4 17:17:58 2018 daemon.notice hostapd: client0: AP-DISABLED
  55. Tue Sep 4 17:18:03 2018 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING
  56. Tue Sep 4 17:18:13 2018 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0
  57. Tue Sep 4 17:18:13 2018 daemon.notice netifd: radio0 (23799): Command failed: Request timed out
  58. Tue Sep 4 17:18:14 2018 kern.info kernel: [198510.050757] device client0 left promiscuous mode
  59. Tue Sep 4 17:18:14 2018 kern.info kernel: [198510.055861] br-client: port 4(client0) entered disabled state
  60. Tue Sep 4 17:18:32 2018 daemon.notice netifd: Network device 'client0' link is down
  61. Tue Sep 4 17:19:13 2018 kern.info kernel: [198566.213845] batman_adv: bat0: Interface deactivated: mesh0
  62. Tue Sep 4 17:19:27 2018 daemon.notice netifd: Network device 'mesh0' link is down
  63. Tue Sep 4 17:19:27 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  64. Tue Sep 4 17:19:35 2018 kern.info kernel: [198589.108253] batman_adv: bat0: Removing interface: mesh0
  65. Tue Sep 4 17:19:36 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  66. Tue Sep 4 17:21:03 2018 user.notice root: hoodselector[23926]: The hoodselector is still running.
  67. Tue Sep 4 17:25:37 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  68. Tue Sep 4 17:25:39 2018 kern.info kernel: [198954.103925] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  69. Tue Sep 4 17:25:52 2018 kern.info kernel: [198965.617202] device client0 entered promiscuous mode
  70. Tue Sep 4 17:26:12 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  71. Tue Sep 4 17:26:29 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  72. Tue Sep 4 17:26:29 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  73. Tue Sep 4 17:26:29 2018 daemon.notice hostapd: client0: AP-ENABLED
  74. Tue Sep 4 17:26:29 2018 kern.info kernel: [199004.246878] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  75. Tue Sep 4 17:26:29 2018 kern.info kernel: [199004.253955] br-client: port 4(client0) entered forwarding state
  76. Tue Sep 4 17:26:29 2018 kern.info kernel: [199004.260331] br-client: port 4(client0) entered forwarding state
  77. Tue Sep 4 17:26:36 2018 kern.info kernel: [199006.256489] br-client: port 4(client0) entered forwarding state
  78. Tue Sep 4 17:26:36 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  79. Tue Sep 4 17:27:26 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  80. Tue Sep 4 17:28:55 2018 kern.info kernel: [199135.402263] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
  81. Tue Sep 4 17:29:41 2018 kern.info kernel: [199193.608579] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
  82. Tue Sep 4 17:29:42 2018 daemon.notice netifd: Network device 'mesh0' link is up
  83. Tue Sep 4 17:31:27 2018 user.notice root: hoodselector[24298]: The hoodselector is still running.
  84. Tue Sep 4 17:32:57 2018 daemon.notice netifd: Interface 'mesh_radio0' is enabled
  85. Tue Sep 4 17:32:58 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
  86. Tue Sep 4 17:32:58 2018 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
  87. Tue Sep 4 17:32:58 2018 daemon.notice netifd: Network device 'client0' link is up
  88. Tue Sep 4 17:33:22 2018 daemon.notice netifd: radio0 (23956): Command failed: Request timed out
  89. Tue Sep 4 17:34:25 2018 daemon.notice netifd: mesh_radio0 (24385): ip: SIOCSIFMTU: No such device
  90. Tue Sep 4 17:35:14 2018 daemon.notice netifd: Interface 'mesh_radio0' is now up
  91. Tue Sep 4 17:37:54 2018 daemon.info respondd[24512]: unable to read providers from '/usr/lib/respondd', ignoring
  92. Tue Sep 4 17:38:49 2018 kern.info kernel: [199733.708630] batman_adv: bat0: Adding interface: mesh0
  93. Tue Sep 4 17:38:49 2018 kern.info kernel: [199733.713966] batman_adv: bat0: Interface activated: mesh0
  94. Tue Sep 4 17:45:28 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  95. Tue Sep 4 17:45:37 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  96. Tue Sep 4 17:45:37 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  97. Tue Sep 4 17:45:50 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  98. Tue Sep 4 17:45:50 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  99. Tue Sep 4 17:48:34 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  100. Tue Sep 4 17:56:04 2018 user.notice root: hoodselector[24854]: The hoodselector is still running.
  101. Tue Sep 4 17:56:04 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  102. Tue Sep 4 17:59:44 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  103. Tue Sep 4 18:00:14 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  104. Tue Sep 4 18:00:28 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  105. Tue Sep 4 18:00:38 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  106. Tue Sep 4 18:00:44 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  107. Tue Sep 4 18:01:03 2018 user.notice root: hoodselector[24930]: The hoodselector is still running.
  108. Tue Sep 4 18:01:17 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  109. Tue Sep 4 18:01:22 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  110. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  111. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  112. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  113. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  114. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  115. Tue Sep 4 18:01:27 2018 daemon.notice hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: did not acknowledge authentication response
  116. Tue Sep 4 18:04:24 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  117. Tue Sep 4 18:04:46 2018 daemon.info hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: disassociated due to inactivity
  118. Tue Sep 4 18:04:46 2018 daemon.info hostapd: client0: STA 24:18:1d:44:bc:c1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
  119. Tue Sep 4 18:05:05 2018 daemon.info respondd[25042]: unable to read providers from '/usr/lib/respondd', ignoring
  120. Tue Sep 4 18:06:13 2018 user.notice root: hoodselector[25031]: The hoodselector is still running.
  121. Tue Sep 4 18:09:08 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  122. Tue Sep 4 18:20:24 2018 user.notice root: hoodselector[25295]: The hoodselector is still running.
  123. Tue Sep 4 18:37:48 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  124. Tue Sep 4 18:37:55 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  125. Tue Sep 4 18:38:01 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  126. Tue Sep 4 18:38:12 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  127. Tue Sep 4 18:38:12 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  128. Tue Sep 4 18:41:42 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  129. Tue Sep 4 18:47:39 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  130. Tue Sep 4 18:50:11 2018 user.notice root: hoodselector[25918]: The hoodselector is still running.
  131. Tue Sep 4 18:53:38 2018 user.notice root: hoodselector[25975]: The hoodselector is still running.
  132. Tue Sep 4 19:01:34 2018 user.notice root: hoodselector[26117]: The hoodselector is still running.
  133. Tue Sep 4 19:16:49 2018 daemon.err hostapd: eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there
  134. is a bug that ends up in a busy loop that prevents clean shutdown.
  135. Killing program forcefully.
  136. Tue Sep 4 19:17:10 2018 kern.info kernel: [205640.282137] br-client: port 4(client0) entered disabled state
  137. Tue Sep 4 19:17:10 2018 kern.info kernel: [205641.223198] device client0 left promiscuous mode
  138. Tue Sep 4 19:17:10 2018 kern.info kernel: [205641.228144] br-client: port 4(client0) entered disabled state
  139. Tue Sep 4 19:17:10 2018 daemon.notice netifd: Network device 'client0' link is down
  140. Tue Sep 4 19:17:20 2018 kern.info kernel: [205648.124474] batman_adv: bat0: Interface deactivated: mesh0
  141. Tue Sep 4 19:17:38 2018 daemon.notice netifd: Network device 'mesh0' link is down
  142. Tue Sep 4 19:17:38 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  143. Tue Sep 4 19:17:52 2018 kern.info kernel: [205677.443115] batman_adv: bat0: Removing interface: mesh0
  144. Tue Sep 4 19:17:52 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  145. Tue Sep 4 19:20:35 2018 daemon.notice netifd: wan6 (1485): Command failed: Request timed out
  146. Tue Sep 4 19:21:18 2018 user.notice root: hoodselector[26540]: The hoodselector is still running.
  147. Tue Sep 4 19:21:22 2018 daemon.info procd: Instance gluon-respondd::instance1 pid 25042 not stopped on SIGTERM, sending SIGKILL instead
  148. Tue Sep 4 19:21:27 2018 daemon.info respondd[26569]: unable to read providers from '/usr/lib/respondd', ignoring
  149. Tue Sep 4 19:25:33 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  150. Tue Sep 4 19:25:45 2018 kern.info kernel: [206156.236180] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  151. Tue Sep 4 19:25:45 2018 kern.info kernel: [206156.424349] device client0 entered promiscuous mode
  152. Tue Sep 4 19:25:45 2018 kern.info kernel: [206156.429652] br-client: port 4(client0) entered forwarding state
  153. Tue Sep 4 19:25:45 2018 kern.info kernel: [206156.435996] br-client: port 4(client0) entered forwarding state
  154. Tue Sep 4 19:25:45 2018 kern.info kernel: [206156.926116] br-client: port 4(client0) entered disabled state
  155. Tue Sep 4 19:26:05 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  156. Tue Sep 4 19:26:26 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  157. Tue Sep 4 19:26:29 2018 kern.info kernel: [206190.774934] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  158. Tue Sep 4 19:26:29 2018 kern.info kernel: [206190.782114] br-client: port 4(client0) entered forwarding state
  159. Tue Sep 4 19:26:29 2018 kern.info kernel: [206190.788474] br-client: port 4(client0) entered forwarding state
  160. Tue Sep 4 19:26:29 2018 kern.info kernel: [206192.826189] br-client: port 4(client0) entered forwarding state
  161. Tue Sep 4 19:26:30 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  162. Tue Sep 4 19:26:30 2018 daemon.notice hostapd: client0: AP-ENABLED
  163. Tue Sep 4 19:26:36 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  164. Tue Sep 4 19:27:52 2018 kern.info kernel: [206284.222910] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
  165. Tue Sep 4 19:28:04 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  166. Tue Sep 4 19:28:11 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  167. Tue Sep 4 19:28:29 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  168. Tue Sep 4 19:28:29 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  169. Tue Sep 4 19:28:38 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  170. Tue Sep 4 19:28:39 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  171. Tue Sep 4 19:29:12 2018 kern.info kernel: [206365.497765] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
  172. Tue Sep 4 19:29:12 2018 daemon.notice netifd: Network device 'mesh0' link is up
  173. Tue Sep 4 19:30:51 2018 user.notice root: hoodselector[26894]: The hoodselector is still running.
  174. Tue Sep 4 19:31:41 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  175. Tue Sep 4 19:32:36 2018 daemon.notice netifd: Interface 'mesh_radio0' is enabled
  176. Tue Sep 4 19:32:36 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
  177. Tue Sep 4 19:32:36 2018 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
  178. Tue Sep 4 19:32:36 2018 daemon.notice netifd: Network device 'client0' link is up
  179. Tue Sep 4 19:33:35 2018 daemon.notice netifd: mesh_radio0 (26966): ip: SIOCSIFMTU: No such device
  180. Tue Sep 4 19:34:43 2018 daemon.notice netifd: Interface 'mesh_radio0' is now up
  181. Tue Sep 4 19:37:29 2018 kern.info kernel: [206862.681019] batman_adv: bat0: Adding interface: mesh0
  182. Tue Sep 4 19:37:29 2018 kern.info kernel: [206862.686446] batman_adv: bat0: Interface activated: mesh0
  183. Tue Sep 4 19:38:09 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  184. Tue Sep 4 19:39:31 2018 daemon.info procd: Instance gluon-respondd::instance1 pid 26569 not stopped on SIGTERM, sending SIGKILL instead
  185. Tue Sep 4 19:40:05 2018 daemon.info respondd[27162]: unable to read providers from '/usr/lib/respondd', ignoring
  186. Tue Sep 4 19:40:42 2018 user.notice root: hoodselector[27136]: The hoodselector is still running.
  187. Tue Sep 4 19:41:59 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  188. Tue Sep 4 19:44:37 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  189. Tue Sep 4 19:56:34 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  190. Tue Sep 4 20:00:04 2018 user.notice root: hoodselector[27537]: The hoodselector is still running.
  191. Tue Sep 4 20:19:25 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  192. Tue Sep 4 20:19:30 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  193. Tue Sep 4 20:19:31 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  194. Tue Sep 4 20:19:38 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  195. Tue Sep 4 20:19:39 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  196. Tue Sep 4 20:21:42 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  197. Tue Sep 4 20:31:56 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  198. Tue Sep 4 20:37:28 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  199. Tue Sep 4 20:44:22 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  200. Tue Sep 4 20:50:56 2018 daemon.notice hostapd: client0: interface state ENABLED->DISABLED
  201. Tue Sep 4 20:51:01 2018 daemon.notice hostapd: client0: AP-DISABLED
  202. Tue Sep 4 20:51:01 2018 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING
  203. Tue Sep 4 20:51:23 2018 daemon.notice netifd: radio0 (28443): Command failed: Request timed out
  204. Tue Sep 4 20:51:23 2018 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0
  205. Tue Sep 4 20:51:23 2018 kern.info kernel: [211297.886192] device client0 left promiscuous mode
  206. Tue Sep 4 20:51:23 2018 kern.info kernel: [211297.891282] br-client: port 4(client0) entered disabled state
  207. Tue Sep 4 20:51:40 2018 daemon.notice netifd: Network device 'client0' link is down
  208. Tue Sep 4 20:52:46 2018 kern.info kernel: [211378.548876] batman_adv: bat0: Interface deactivated: mesh0
  209. Tue Sep 4 20:52:50 2018 daemon.notice netifd: Network device 'mesh0' link is down
  210. Tue Sep 4 20:52:50 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  211. Tue Sep 4 20:52:55 2018 kern.info kernel: [211388.654044] batman_adv: bat0: Removing interface: mesh0
  212. Tue Sep 4 20:53:05 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  213. Tue Sep 4 20:55:10 2018 daemon.info respondd[28630]: unable to read providers from '/usr/lib/respondd', ignoring
  214. Tue Sep 4 21:00:21 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  215. Tue Sep 4 21:00:45 2018 kern.info kernel: [211859.409873] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  216. Tue Sep 4 21:00:45 2018 kern.info kernel: [211859.503164] device client0 entered promiscuous mode
  217. Tue Sep 4 21:00:45 2018 kern.info kernel: [211859.508546] br-client: port 4(client0) entered forwarding state
  218. Tue Sep 4 21:00:45 2018 kern.info kernel: [211859.514800] br-client: port 4(client0) entered forwarding state
  219. Tue Sep 4 21:00:45 2018 kern.info kernel: [211859.792979] br-client: port 4(client0) entered disabled state
  220. Tue Sep 4 21:00:52 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  221. Tue Sep 4 21:01:38 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  222. Tue Sep 4 21:01:39 2018 kern.info kernel: [211915.812254] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  223. Tue Sep 4 21:01:39 2018 kern.info kernel: [211915.819429] br-client: port 4(client0) entered forwarding state
  224. Tue Sep 4 21:01:39 2018 kern.info kernel: [211915.825758] br-client: port 4(client0) entered forwarding state
  225. Tue Sep 4 21:01:43 2018 kern.info kernel: [211917.817684] br-client: port 4(client0) entered forwarding state
  226. Tue Sep 4 21:01:48 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  227. Tue Sep 4 21:01:56 2018 daemon.notice hostapd: client0: AP-ENABLED
  228. Tue Sep 4 21:02:14 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  229. Tue Sep 4 21:03:13 2018 kern.info kernel: [212009.008835] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
  230. Tue Sep 4 21:04:12 2018 kern.info kernel: [212066.753289] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
  231. Tue Sep 4 21:04:23 2018 daemon.notice netifd: Network device 'mesh0' link is up
  232. Tue Sep 4 21:07:04 2018 daemon.notice netifd: Interface 'mesh_radio0' is enabled
  233. Tue Sep 4 21:07:04 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
  234. Tue Sep 4 21:07:04 2018 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
  235. Tue Sep 4 21:07:04 2018 daemon.notice netifd: Network device 'client0' link is up
  236. Tue Sep 4 21:08:23 2018 daemon.notice netifd: mesh_radio0 (28966): ip: SIOCSIFMTU: No such device
  237. Tue Sep 4 21:09:10 2018 daemon.notice netifd: Interface 'mesh_radio0' is now up
  238. Tue Sep 4 21:11:10 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  239. Tue Sep 4 21:11:11 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  240. Tue Sep 4 21:11:12 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  241. Tue Sep 4 21:11:20 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  242. Tue Sep 4 21:11:20 2018 kern.info kernel: [212494.574267] batman_adv: bat0: Adding interface: mesh0
  243. Tue Sep 4 21:11:20 2018 kern.info kernel: [212494.579605] batman_adv: bat0: Interface activated: mesh0
  244. Tue Sep 4 21:11:33 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  245. Tue Sep 4 21:11:33 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  246. Tue Sep 4 21:13:37 2018 daemon.info respondd[29174]: unable to read providers from '/usr/lib/respondd', ignoring
  247. Tue Sep 4 21:16:06 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  248. Tue Sep 4 21:21:21 2018 user.notice root: hoodselector[29294]: The hoodselector is still running.
  249. Tue Sep 4 21:31:31 2018 user.notice root: hoodselector[29508]: The hoodselector is still running.
  250. Tue Sep 4 21:35:36 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  251. Tue Sep 4 21:36:04 2018 user.notice root: hoodselector[29586]: The hoodselector is still running.
  252. Tue Sep 4 21:45:26 2018 user.notice root: hoodselector[29784]: The hoodselector is still running.
  253. Tue Sep 4 22:01:16 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  254. Tue Sep 4 22:01:18 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  255. Tue Sep 4 22:01:22 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  256. Tue Sep 4 22:01:29 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  257. Tue Sep 4 22:01:29 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  258. Tue Sep 4 22:06:13 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  259. Tue Sep 4 22:07:20 2018 user.notice root: hoodselector[30197]: The hoodselector is still running.
  260. Tue Sep 4 22:29:40 2018 user.notice root: hoodselector[30576]: The hoodselector is still running.
  261. Tue Sep 4 22:34:35 2018 daemon.notice netifd: wan6 (1485): cat: write error: Broken pipe
  262. Tue Sep 4 22:35:01 2018 daemon.notice fastd[1886]: connection with <mesh_vpn_backbone_peer__10001> disestablished.
  263. Tue Sep 4 22:35:01 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  264. Tue Sep 4 22:35:09 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  265. Tue Sep 4 22:35:16 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  266. Tue Sep 4 22:35:17 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  267. Tue Sep 4 22:35:18 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  268. Tue Sep 4 22:35:18 2018 daemon.notice fastd[1886]: connection with <mesh_vpn_backbone_peer__10001> established.
  269. Tue Sep 4 22:35:18 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  270. Tue Sep 4 22:36:43 2018 user.notice firewall: Reloading firewall due to ifupdate of wan6 (br-wan)
  271. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  272. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  273. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  274. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  275. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  276. Tue Sep 4 22:39:53 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  277. Tue Sep 4 22:39:57 2018 daemon.err respondd[29174]: sendto failed: Operation not permitted
  278. Tue Sep 4 22:39:57 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  279. Tue Sep 4 22:39:57 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  280. Tue Sep 4 22:39:57 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  281. Tue Sep 4 22:40:13 2018 daemon.warn fastd[1886]: sendmsg: Operation not permitted
  282. Tue Sep 4 22:41:29 2018 user.notice root: hoodselector[30899]: The hoodselector is still running.
  283. Tue Sep 4 22:49:50 2018 user.notice root: hoodselector[31078]: The hoodselector is still running.
  284. Tue Sep 4 22:53:58 2018 daemon.err hostapd: eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there
  285. is a bug that ends up in a busy loop that prevents clean shutdown.
  286. Killing program forcefully.
  287. Tue Sep 4 22:54:21 2018 kern.info kernel: [218674.440689] br-client: port 4(client0) entered disabled state
  288. Tue Sep 4 22:54:30 2018 daemon.notice netifd: Network device 'client0' link is down
  289. Tue Sep 4 22:54:35 2018 kern.info kernel: [218689.112512] device client0 left promiscuous mode
  290. Tue Sep 4 22:54:35 2018 kern.info kernel: [218689.117500] br-client: port 4(client0) entered disabled state
  291. Tue Sep 4 22:54:41 2018 kern.info kernel: [218695.754241] batman_adv: bat0: Interface deactivated: mesh0
  292. Tue Sep 4 22:54:54 2018 daemon.notice netifd: Network device 'mesh0' link is down
  293. Tue Sep 4 22:54:54 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  294. Tue Sep 4 22:54:54 2018 kern.info kernel: [218708.395583] batman_adv: bat0: Removing interface: mesh0
  295. Tue Sep 4 22:54:55 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  296. Tue Sep 4 22:59:50 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  297. Tue Sep 4 23:00:03 2018 kern.info kernel: [219015.628797] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  298. Tue Sep 4 23:00:12 2018 kern.info kernel: [219023.844360] device client0 entered promiscuous mode
  299. Tue Sep 4 23:00:12 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  300. Tue Sep 4 23:00:18 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  301. Tue Sep 4 23:00:18 2018 kern.info kernel: [219033.535451] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  302. Tue Sep 4 23:00:18 2018 kern.info kernel: [219033.542546] br-client: port 4(client0) entered forwarding state
  303. Tue Sep 4 23:00:18 2018 kern.info kernel: [219033.548940] br-client: port 4(client0) entered forwarding state
  304. Tue Sep 4 23:00:20 2018 kern.info kernel: [219035.670238] br-client: port 4(client0) entered forwarding state
  305. Tue Sep 4 23:00:20 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  306. Tue Sep 4 23:00:20 2018 daemon.notice hostapd: client0: AP-ENABLED
  307. Tue Sep 4 23:01:34 2018 kern.info kernel: [219103.674510] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
  308. Tue Sep 4 23:02:07 2018 kern.info kernel: [219139.694202] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
  309. Tue Sep 4 23:02:13 2018 daemon.notice netifd: Network device 'mesh0' link is up
  310. Tue Sep 4 23:05:38 2018 daemon.notice netifd: Interface 'mesh_radio0' is enabled
  311. Tue Sep 4 23:05:44 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
  312. Tue Sep 4 23:05:44 2018 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
  313. Tue Sep 4 23:05:51 2018 daemon.notice netifd: Network device 'client0' link is up
  314. Tue Sep 4 23:05:53 2018 user.notice root: hoodselector[31656]: The hoodselector is still running.
  315. Tue Sep 4 23:06:32 2018 daemon.notice netifd: client (1481): Command failed: Request timed out
  316. Tue Sep 4 23:06:32 2018 daemon.notice netifd: client (1481): Command failed: Request timed out
  317. Tue Sep 4 23:06:32 2018 daemon.notice netifd: wan6 (1485): Command failed: Request timed out
  318. Tue Sep 4 23:07:34 2018 daemon.notice netifd: mesh_radio0 (31691): ip: SIOCSIFMTU: No such device
  319. Tue Sep 4 23:07:40 2018 daemon.info respondd[31750]: unable to read providers from '/usr/lib/respondd', ignoring
  320. Tue Sep 4 23:08:03 2018 daemon.notice netifd: Interface 'mesh_radio0' is now up
  321. Tue Sep 4 23:10:48 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  322. Tue Sep 4 23:11:15 2018 kern.info kernel: [219690.658904] batman_adv: bat0: Adding interface: mesh0
  323. Tue Sep 4 23:11:15 2018 kern.info kernel: [219690.664349] batman_adv: bat0: Interface activated: mesh0
  324. Tue Sep 4 23:23:58 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  325. Tue Sep 4 23:28:10 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  326. Tue Sep 4 23:28:12 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  327. Tue Sep 4 23:28:12 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  328. Tue Sep 4 23:28:24 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  329. Tue Sep 4 23:28:28 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  330. Tue Sep 4 23:28:42 2018 local0.info autoupdater-wifi-fallback: connectivity check failed
  331. Tue Sep 4 23:29:01 2018 daemon.info respondd[32253]: unable to read providers from '/usr/lib/respondd', ignoring
  332. Tue Sep 4 23:30:56 2018 user.notice root: hoodselector[32275]: The hoodselector is still running.
  333. Tue Sep 4 23:35:38 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  334. Tue Sep 4 23:46:19 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  335. Wed Sep 5 00:01:09 2018 daemon.notice netifd: client (1481): Command failed: Request timed out
  336. Wed Sep 5 00:01:09 2018 daemon.notice netifd: client (1481): Command failed: Request timed out
  337. Wed Sep 5 00:23:19 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  338. Wed Sep 5 00:23:19 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  339. Wed Sep 5 00:23:24 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  340. Wed Sep 5 00:23:27 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  341. Wed Sep 5 00:23:27 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  342. Wed Sep 5 01:15:13 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  343. Wed Sep 5 01:15:14 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  344. Wed Sep 5 01:15:15 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  345. Wed Sep 5 01:15:19 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  346. Wed Sep 5 01:15:19 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  347. Wed Sep 5 02:07:42 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  348. Wed Sep 5 02:07:43 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  349. Wed Sep 5 02:07:43 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  350. Wed Sep 5 02:07:43 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  351. Wed Sep 5 02:07:43 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  352. Wed Sep 5 02:59:16 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  353. Wed Sep 5 02:59:16 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  354. Wed Sep 5 02:59:17 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  355. Wed Sep 5 02:59:17 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  356. Wed Sep 5 02:59:18 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  357. Wed Sep 5 03:51:10 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  358. Wed Sep 5 03:51:10 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  359. Wed Sep 5 03:51:10 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  360. Wed Sep 5 03:51:10 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  361. Wed Sep 5 03:51:10 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  362. Wed Sep 5 04:42:32 2018 daemon.info fastd[1886]: refreshing session with <mesh_vpn_backbone_peer__10001>
  363. Wed Sep 5 04:42:32 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  364. Wed Sep 5 04:42:32 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  365. Wed Sep 5 04:42:33 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  366. Wed Sep 5 04:42:33 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  367. Wed Sep 5 05:15:06 2018 kern.info kernel: [241521.253787] IPv6: ADDRCONF(NETDEV_UP): tmp.mesh0: link is not ready
  368. Wed Sep 5 05:28:07 2018 user.notice firewall: Reloading firewall due to ifupdate of wan6 (br-wan)
  369. Wed Sep 5 05:29:15 2018 daemon.notice fastd[1886]: connection with <mesh_vpn_backbone_peer__10001> disestablished.
  370. Wed Sep 5 05:29:15 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  371. Wed Sep 5 05:29:15 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  372. Wed Sep 5 05:29:16 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  373. Wed Sep 5 05:29:16 2018 daemon.info fastd[1886]: received handshake response from <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001] using fastd v18
  374. Wed Sep 5 05:29:16 2018 daemon.info fastd[1886]: [2a01:4f8:110:1473::54]:10001 authorized as <mesh_vpn_backbone_peer__10001>
  375. Wed Sep 5 05:29:16 2018 daemon.notice fastd[1886]: connection with <mesh_vpn_backbone_peer__10001> established.
  376. Wed Sep 5 05:29:16 2018 daemon.info fastd[1886]: new session with <mesh_vpn_backbone_peer__10001> established using method `salsa2012+umac'.
  377. Wed Sep 5 05:38:13 2018 daemon.notice netifd: client (1481): cat: write error: Broken pipe
  378. Wed Sep 5 06:06:32 2018 daemon.notice fastd[1886]: connection with <mesh_vpn_backbone_peer__10001> disestablished.
  379. Wed Sep 5 06:06:32 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  380. Wed Sep 5 06:06:32 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  381. Wed Sep 5 06:06:34 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  382. Wed Sep 5 06:06:46 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  383. Wed Sep 5 06:06:46 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  384. Wed Sep 5 06:06:54 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[78.46.49.54:10001]...
  385. Wed Sep 5 06:06:54 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  386. Wed Sep 5 06:06:54 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  387. Wed Sep 5 06:07:04 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  388. Wed Sep 5 06:07:14 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  389. Wed Sep 5 06:07:25 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[78.46.49.54:10000]...
  390. Wed Sep 5 06:07:25 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  391. Wed Sep 5 06:07:25 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  392. Wed Sep 5 06:07:36 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[78.46.49.54:10001]...
  393. Wed Sep 5 06:07:36 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  394. Wed Sep 5 06:07:36 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  395. Wed Sep 5 06:07:42 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  396. Wed Sep 5 06:07:59 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  397. Wed Sep 5 06:08:03 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[78.46.49.54:10000]...
  398. Wed Sep 5 06:08:03 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  399. Wed Sep 5 06:08:04 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  400. Wed Sep 5 06:08:20 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[78.46.49.54:10001]...
  401. Wed Sep 5 06:08:20 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  402. Wed Sep 5 06:08:20 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  403. Wed Sep 5 06:08:25 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  404. Wed Sep 5 06:08:39 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  405. Wed Sep 5 06:08:44 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[78.46.49.54:10000]...
  406. Wed Sep 5 06:08:44 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  407. Wed Sep 5 06:08:44 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  408. Wed Sep 5 06:09:00 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[78.46.49.54:10001]...
  409. Wed Sep 5 06:09:00 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  410. Wed Sep 5 06:09:00 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  411. Wed Sep 5 06:09:07 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  412. Wed Sep 5 06:09:17 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  413. Wed Sep 5 06:09:28 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[78.46.49.54:10000]...
  414. Wed Sep 5 06:09:28 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  415. Wed Sep 5 06:09:28 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  416. Wed Sep 5 06:09:39 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[78.46.49.54:10001]...
  417. Wed Sep 5 06:09:39 2018 daemon.info fastd[1886]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  418. Wed Sep 5 06:09:39 2018 daemon.info fastd[1886]: resolved host `lk-st02.sn.ffnw.de' successfully
  419. Wed Sep 5 06:09:47 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  420. Wed Sep 5 06:10:03 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10001>[[2a01:4f8:110:1473::54]:10001]...
  421. Wed Sep 5 06:10:06 2018 daemon.info fastd[1886]: sending handshake to <mesh_vpn_backbone_peer__10000>[78.46.49.54:10000]...
  422. Wed Sep 5 06:10:06 2018 daemon.info fastd[1886]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  423. Wed Sep 5 06:10:06 2018 daemon.info fastd[1886]: resolved host `lk-st01.sn.ffnw.de' successfully
  424. Wed Sep 5 06:10:08 2018 daemon.notice fastd[1886]: terminating fastd
  425. Wed Sep 5 06:10:08 2018 daemon.info fastd[1886]: deleting peer <mesh_vpn_backbone_peer__10000>
  426. Wed Sep 5 06:10:08 2018 daemon.info fastd[1886]: deleting peer <mesh_vpn_backbone_peer__10001>
  427. Wed Sep 5 06:10:08 2018 daemon.notice netifd: Network device 'mesh-vpn' link is down
  428. Wed Sep 5 06:10:08 2018 daemon.notice netifd: Interface 'mesh_vpn' has link connectivity loss
  429. Wed Sep 5 06:10:08 2018 kern.info kernel: [244824.573541] batman_adv: bat0: Interface deactivated: mesh-vpn
  430. Wed Sep 5 06:10:09 2018 kern.info kernel: [244824.861253] batman_adv: bat0: Removing interface: mesh-vpn
  431. Wed Sep 5 06:10:09 2018 daemon.notice netifd: Interface 'mesh_vpn' is disabled
  432. Wed Sep 5 06:10:11 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  433. Wed Sep 5 06:10:11 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  434. Wed Sep 5 06:10:15 2018 kern.info kernel: [244830.399951] batman_adv: bat0: Interface deactivated: mesh0
  435. Wed Sep 5 06:10:15 2018 kern.info kernel: [244830.405778] batman_adv: bat0: Removing interface: mesh0
  436. Wed Sep 5 06:10:15 2018 daemon.notice netifd: Interface 'mesh_radio0' is now down
  437. Wed Sep 5 06:10:15 2018 daemon.notice hostapd: client0: interface state ENABLED->DISABLED
  438. Wed Sep 5 06:10:15 2018 daemon.notice hostapd: client0: AP-DISABLED
  439. Wed Sep 5 06:10:15 2018 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING
  440. Wed Sep 5 06:10:15 2018 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0
  441. Wed Sep 5 06:10:16 2018 kern.info kernel: [244831.662383] device client0 left promiscuous mode
  442. Wed Sep 5 06:10:16 2018 kern.info kernel: [244831.667524] br-client: port 4(client0) entered disabled state
  443. Wed Sep 5 06:10:16 2018 daemon.notice netifd: Network device 'client0' link is down
  444. Wed Sep 5 06:10:17 2018 daemon.info respondd[15758]: unable to read providers from '/usr/lib/respondd', ignoring
  445. Wed Sep 5 06:10:21 2018 daemon.notice fastd[15890]: fastd v18 starting
  446. Wed Sep 5 06:10:21 2018 daemon.notice fastd[15890]: changed to UID 0, GID 800
  447. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.310566] br-client: port 3(bat0) entered disabled state
  448. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.316570] br-client: port 2(local-port) entered disabled state
  449. Wed Sep 5 06:10:21 2018 daemon.info fastd[15890]: adding peer <mesh_vpn_backbone_peer__11112>
  450. Wed Sep 5 06:10:21 2018 daemon.err odhcp6c[1481]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
  451. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.652402] br-client: port 3(bat0) entered forwarding state
  452. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.658561] br-client: port 3(bat0) entered forwarding state
  453. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.664543] br-client: port 2(local-port) entered forwarding state
  454. Wed Sep 5 06:10:21 2018 kern.info kernel: [244837.671094] br-client: port 2(local-port) entered forwarding state
  455. Wed Sep 5 06:10:22 2018 daemon.info fastd[15890]: adding peer <mesh_vpn_backbone_peer__11111>
  456. Wed Sep 5 06:10:22 2018 daemon.info fastd[15890]: resolving host `default06.ffnw.de' for peer <mesh_vpn_backbone_peer__11111>...
  457. Wed Sep 5 06:10:22 2018 daemon.info fastd[15890]: resolving host `default06.ffnw.de' for peer <mesh_vpn_backbone_peer__11112>...
  458. Wed Sep 5 06:10:22 2018 daemon.err odhcp6c[1481]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  459. Wed Sep 5 06:10:22 2018 daemon.notice netifd: Interface 'mesh_vpn' is enabled
  460. Wed Sep 5 06:10:22 2018 daemon.notice netifd: Network device 'mesh-vpn' link is up
  461. Wed Sep 5 06:10:22 2018 daemon.notice netifd: Interface 'mesh_vpn' has link connectivity
  462. Wed Sep 5 06:10:22 2018 daemon.notice netifd: Interface 'mesh_vpn' is setting up now
  463. Wed Sep 5 06:10:22 2018 daemon.info fastd[15890]: resolved host `default06.ffnw.de' successfully
  464. Wed Sep 5 06:10:22 2018 daemon.info fastd[15890]: resolved host `default06.ffnw.de' successfully
  465. Wed Sep 5 06:10:23 2018 daemon.err odhcp6c[1481]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  466. Wed Sep 5 06:10:24 2018 kern.info kernel: [244839.655998] br-client: port 3(bat0) entered forwarding state
  467. Wed Sep 5 06:10:24 2018 kern.info kernel: [244839.666011] br-client: port 2(local-port) entered forwarding state
  468. Wed Sep 5 06:10:24 2018 daemon.info fastd[15890]: sending handshake to <mesh_vpn_backbone_peer__11112>[[2a06:e881:2000:12::13]:11112]...
  469. Wed Sep 5 06:10:24 2018 daemon.info fastd[15890]: received handshake response from <mesh_vpn_backbone_peer__11112>[[2a06:e881:2000:12::13]:11112] using fastd v18
  470. Wed Sep 5 06:10:25 2018 daemon.err respondd[15758]: join_mcast: no valid interface given
  471. Wed Sep 5 06:10:26 2018 daemon.info fastd[15890]: [2a06:e881:2000:12::13]:11112 authorized as <mesh_vpn_backbone_peer__11112>
  472. Wed Sep 5 06:10:26 2018 daemon.notice fastd[15890]: connection with <mesh_vpn_backbone_peer__11112> established.
  473. Wed Sep 5 06:10:26 2018 daemon.info fastd[15890]: new session with <mesh_vpn_backbone_peer__11112> established using method `salsa2012+umac'.
  474. Wed Sep 5 06:10:27 2018 daemon.notice netifd: Interface 'mesh_vpn' is now up
  475. Wed Sep 5 06:11:05 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  476. Wed Sep 5 06:11:20 2018 kern.info kernel: [244894.955575] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  477. Wed Sep 5 06:11:24 2018 kern.info kernel: [244899.260337] batman_adv: bat0: Adding interface: mesh-vpn
  478. Wed Sep 5 06:11:24 2018 kern.info kernel: [244899.266127] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1312) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
  479. Wed Sep 5 06:11:24 2018 kern.info kernel: [244899.291326] batman_adv: bat0: Interface activated: mesh-vpn
  480. Wed Sep 5 06:11:24 2018 kern.info kernel: [244900.473463] device client0 entered promiscuous mode
  481. Wed Sep 5 06:11:32 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  482. Wed Sep 5 06:11:54 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  483. Wed Sep 5 06:11:57 2018 kern.info kernel: [244926.484420] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  484. Wed Sep 5 06:11:57 2018 kern.info kernel: [244926.491595] br-client: port 4(client0) entered forwarding state
  485. Wed Sep 5 06:11:57 2018 kern.info kernel: [244926.497955] br-client: port 4(client0) entered forwarding state
  486. Wed Sep 5 06:11:57 2018 kern.info kernel: [244928.496543] br-client: port 4(client0) entered forwarding state
  487. Wed Sep 5 06:12:01 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  488. Wed Sep 5 06:12:05 2018 daemon.notice hostapd: client0: AP-ENABLED
  489. Wed Sep 5 06:12:16 2018 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
  490. Wed Sep 5 06:12:58 2018 kern.info kernel: [244983.103600] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
  491. Wed Sep 5 06:13:54 2018 kern.info kernel: [245047.488674] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
  492. Wed Sep 5 06:15:28 2018 kern.info kernel: [245139.562140] br-client: port 4(client0) entered disabled state
  493. Wed Sep 5 06:15:28 2018 kern.info kernel: [245139.568421] br-client: port 3(bat0) entered disabled state
  494. Wed Sep 5 06:15:28 2018 kern.info kernel: [245139.575101] br-client: port 2(local-port) entered disabled state
  495. Wed Sep 5 06:15:42 2018 daemon.notice netifd: bridge 'br-client' link is down
  496. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.476109] br-client: port 4(client0) entered forwarding state
  497. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.482546] br-client: port 4(client0) entered forwarding state
  498. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.488832] br-client: port 3(bat0) entered forwarding state
  499. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.494810] br-client: port 3(bat0) entered forwarding state
  500. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.500827] br-client: port 2(local-port) entered forwarding state
  501. Wed Sep 5 06:15:42 2018 kern.info kernel: [245156.507338] br-client: port 2(local-port) entered forwarding state
  502. Wed Sep 5 06:15:42 2018 daemon.notice netifd: Interface 'client' has link connectivity loss
  503. Wed Sep 5 06:15:42 2018 daemon.err odhcp6c[1481]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
  504. Wed Sep 5 06:15:42 2018 kern.info kernel: [245158.515792] br-client: port 4(client0) entered forwarding state
  505. Wed Sep 5 06:15:42 2018 kern.info kernel: [245158.522176] br-client: port 3(bat0) entered forwarding state
  506. Wed Sep 5 06:15:42 2018 kern.info kernel: [245158.528177] br-client: port 2(local-port) entered forwarding state
  507. Wed Sep 5 06:15:44 2018 daemon.notice netifd: bridge 'br-client' link is up
  508. Wed Sep 5 06:15:44 2018 daemon.notice netifd: Interface 'client' has link connectivity
  509. Wed Sep 5 06:15:44 2018 daemon.notice netifd: Interface 'client' is setting up now
  510. Wed Sep 5 06:15:55 2018 daemon.notice netifd: Interface 'client' is now down
  511. Wed Sep 5 06:15:56 2018 kern.info kernel: [245171.696680] br-client: port 4(client0) entered disabled state
  512. Wed Sep 5 06:15:56 2018 kern.info kernel: [245171.702945] br-client: port 3(bat0) entered disabled state
  513. Wed Sep 5 06:15:56 2018 kern.info kernel: [245171.708849] br-client: port 2(local-port) entered disabled state
  514. Wed Sep 5 06:15:56 2018 kern.info kernel: [245171.721135] device bat0 left promiscuous mode
  515. Wed Sep 5 06:15:56 2018 kern.info kernel: [245171.726143] br-client: port 3(bat0) entered disabled state
  516. Wed Sep 5 06:16:12 2018 kern.info kernel: [245180.914383] device eth0 left promiscuous mode
  517. Wed Sep 5 06:16:12 2018 kern.info kernel: [245180.919275] br-client: port 1(eth0) entered disabled state
  518. Wed Sep 5 06:16:12 2018 kern.info kernel: [245180.930683] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  519. Wed Sep 5 06:16:12 2018 kern.info kernel: [245181.866588] device local-port left promiscuous mode
  520. Wed Sep 5 06:16:12 2018 kern.info kernel: [245181.872001] br-client: port 2(local-port) entered disabled state
  521. Wed Sep 5 06:16:12 2018 kern.info kernel: [245181.884565] IPv6: ADDRCONF(NETDEV_UP): local-port: link is not ready
  522. Wed Sep 5 06:16:12 2018 kern.info kernel: [245181.893073] device client0 left promiscuous mode
  523. Wed Sep 5 06:16:12 2018 kern.info kernel: [245181.898174] br-client: port 4(client0) entered disabled state
  524. Wed Sep 5 06:16:12 2018 kern.info kernel: [245185.767965] device bat0 entered promiscuous mode
  525. Wed Sep 5 06:16:12 2018 kern.info kernel: [245186.398978] device eth0 entered promiscuous mode
  526. Wed Sep 5 06:16:12 2018 kern.info kernel: [245186.560504] batman_adv: bat0: Interface deactivated: mesh-vpn
  527. Wed Sep 5 06:16:12 2018 kern.info kernel: [245186.617689] batman_adv: bat0: Removing interface: mesh-vpn
  528. Wed Sep 5 06:16:12 2018 kern.info kernel: [245187.382771] device local-port entered promiscuous mode
  529. Wed Sep 5 06:16:12 2018 kern.info kernel: [245187.401942] br-client: port 3(local-port) entered forwarding state
  530. Wed Sep 5 06:16:12 2018 kern.info kernel: [245187.408626] br-client: port 3(local-port) entered forwarding state
  531. Wed Sep 5 06:16:12 2018 kern.info kernel: [245187.415142] br-client: port 1(bat0) entered forwarding state
  532. Wed Sep 5 06:16:12 2018 kern.info kernel: [245187.421162] br-client: port 1(bat0) entered forwarding state
  533. Wed Sep 5 06:16:12 2018 daemon.notice fastd[15890]: terminating fastd
  534. Wed Sep 5 06:16:12 2018 daemon.info fastd[15890]: deleting peer <mesh_vpn_backbone_peer__11111>
  535. Wed Sep 5 06:16:12 2018 daemon.notice netifd: Interface 'client' is disabled
  536. Wed Sep 5 06:16:12 2018 daemon.notice fastd[15890]: connection with <mesh_vpn_backbone_peer__11112> disestablished.
  537. Wed Sep 5 06:16:12 2018 daemon.info fastd[15890]: deleting peer <mesh_vpn_backbone_peer__11112>
  538. Wed Sep 5 06:16:12 2018 user.notice root: hoodselector[16121]: The hoodselector is still running.
  539. Wed Sep 5 06:16:13 2018 kern.info kernel: [245189.438078] br-client: port 3(local-port) entered forwarding state
  540. Wed Sep 5 06:16:13 2018 kern.info kernel: [245189.444660] br-client: port 1(bat0) entered forwarding state
  541. Wed Sep 5 06:16:14 2018 daemon.notice netifd: Interface 'client' is enabled
  542. Wed Sep 5 06:16:15 2018 daemon.notice netifd: Interface 'client' is setting up now
  543. Wed Sep 5 06:16:16 2018 user.notice firewall: Reloading firewall due to ifupdate of client (br-client)
  544. Wed Sep 5 06:16:29 2018 kern.info kernel: [245201.870854] br-client: port 3(local-port) entered disabled state
  545. Wed Sep 5 06:16:29 2018 kern.info kernel: [245201.877358] br-client: port 1(bat0) entered disabled state
  546. Wed Sep 5 06:16:29 2018 daemon.err respondd[15758]: Could not join multicast group on mesh0: sendto failed: Permission denied
  547. Wed Sep 5 06:16:30 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  548. Wed Sep 5 06:16:31 2018 daemon.notice netifd: Interface 'client' is now up
  549. Wed Sep 5 06:16:31 2018 daemon.notice netifd: bridge 'br-client' link is down
  550. Wed Sep 5 06:16:31 2018 daemon.notice netifd: Interface 'client' has link connectivity loss
  551. Wed Sep 5 06:16:31 2018 daemon.notice netifd: Network device 'mesh-vpn' link is down
  552. Wed Sep 5 06:16:31 2018 daemon.notice netifd: Interface 'mesh_vpn' has link connectivity loss
  553. Wed Sep 5 06:16:41 2018 daemon.notice netifd: Interface 'mesh_vpn' is now down
  554. Wed Sep 5 06:16:42 2018 kern.info kernel: [245218.269507] br-client: port 3(local-port) entered forwarding state
  555. Wed Sep 5 06:16:42 2018 kern.info kernel: [245218.276105] br-client: port 3(local-port) entered forwarding state
  556. Wed Sep 5 06:16:42 2018 kern.info kernel: [245218.282730] br-client: port 1(bat0) entered forwarding state
  557. Wed Sep 5 06:16:42 2018 kern.info kernel: [245218.288732] br-client: port 1(bat0) entered forwarding state
  558. Wed Sep 5 06:16:44 2018 kern.info kernel: [245220.268245] br-client: port 3(local-port) entered forwarding state
  559. Wed Sep 5 06:16:44 2018 kern.info kernel: [245220.494393] br-client: port 1(bat0) entered forwarding state
  560. Wed Sep 5 06:16:45 2018 daemon.notice netifd: Interface 'mesh_vpn' is disabled
  561. Wed Sep 5 06:16:46 2018 daemon.notice netifd: bridge 'br-client' link is up
  562. Wed Sep 5 06:16:46 2018 daemon.notice netifd: Interface 'client' has link connectivity
  563. Wed Sep 5 06:16:46 2018 daemon.notice netifd: Interface 'client' is setting up now
  564. Wed Sep 5 06:16:52 2018 user.notice root: hoodselector[16194]: The hoodselector is still running.
  565. Wed Sep 5 06:17:06 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  566. Wed Sep 5 06:17:25 2018 daemon.notice netifd: Network device 'mesh0' link is up
  567. Wed Sep 5 06:17:25 2018 daemon.notice netifd: Interface 'mesh_radio0' is enabled
  568. Wed Sep 5 06:17:25 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
  569. Wed Sep 5 06:17:25 2018 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
  570. Wed Sep 5 06:17:25 2018 daemon.notice netifd: Network device 'client0' link is up
  571. Wed Sep 5 06:17:25 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  572. Wed Sep 5 06:17:26 2018 kern.info kernel: [245261.693861] device client0 entered promiscuous mode
  573. Wed Sep 5 06:17:26 2018 kern.info kernel: [245261.699205] br-client: port 4(client0) entered forwarding state
  574. Wed Sep 5 06:17:26 2018 kern.info kernel: [245261.705457] br-client: port 4(client0) entered forwarding state
  575. Wed Sep 5 06:17:28 2018 kern.info kernel: [245263.782557] br-client: port 4(client0) entered forwarding state
  576. Wed Sep 5 06:17:43 2018 daemon.notice netifd: Interface 'mesh_radio0' is disabled
  577. Wed Sep 5 06:17:43 2018 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity loss
  578. Wed Sep 5 06:17:51 2018 daemon.notice netifd: Interface 'mesh_radio0' is now down
  579. Wed Sep 5 06:17:51 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  580. Wed Sep 5 06:17:58 2018 kern.info kernel: [245291.814377] device client0 left promiscuous mode
  581. Wed Sep 5 06:17:58 2018 kern.info kernel: [245291.819465] br-client: port 4(client0) entered disabled state
  582. Wed Sep 5 06:18:06 2018 daemon.err hostapd: eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there
  583. is a bug that ends up in a busy loop that prevents clean shutdown.
  584. Killing program forcefully.
  585. Wed Sep 5 06:18:08 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  586. Wed Sep 5 06:18:21 2018 user.notice sysctl: net.ipv6.conf.br-client.forwarding = 0
  587. Wed Sep 5 06:18:28 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  588. Wed Sep 5 06:18:38 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  589. Wed Sep 5 06:18:43 2018 daemon.notice fastd[16455]: fastd v18 starting
  590. Wed Sep 5 06:18:43 2018 daemon.notice fastd[16455]: changed to UID 0, GID 800
  591. Wed Sep 5 06:18:43 2018 daemon.info fastd[16455]: adding peer <mesh_vpn_backbone_peer__10001>
  592. Wed Sep 5 06:18:43 2018 daemon.info fastd[16455]: adding peer <mesh_vpn_backbone_peer__10000>
  593. Wed Sep 5 06:18:43 2018 daemon.info fastd[16455]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  594. Wed Sep 5 06:18:43 2018 daemon.info fastd[16455]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  595. Wed Sep 5 06:18:44 2018 daemon.notice netifd: Interface 'mesh_vpn' is enabled
  596. Wed Sep 5 06:18:45 2018 daemon.notice netifd: Network device 'mesh-vpn' link is up
  597. Wed Sep 5 06:18:45 2018 daemon.notice netifd: Interface 'mesh_vpn' has link connectivity
  598. Wed Sep 5 06:18:45 2018 daemon.notice netifd: Interface 'mesh_vpn' is setting up now
  599. Wed Sep 5 06:18:48 2018 daemon.notice netifd: Interface 'client' is now up
  600. Wed Sep 5 06:18:48 2018 user.notice root: hoodselector[16330]: The hoodselector is still running.
  601. Wed Sep 5 06:18:53 2018 daemon.info fastd[16455]: resolving host `lk-st02.sn.ffnw.de' failed: Try again
  602. Wed Sep 5 06:18:53 2018 daemon.info fastd[16455]: resolving host `lk-st01.sn.ffnw.de' failed: Try again
  603. Wed Sep 5 06:18:53 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  604. Wed Sep 5 06:18:53 2018 kern.info kernel: [245349.295478] br-client: port 3(local-port) entered disabled state
  605. Wed Sep 5 06:18:53 2018 kern.info kernel: [245349.302052] br-client: port 1(bat0) entered disabled state
  606. Wed Sep 5 06:18:54 2018 daemon.notice netifd: bridge 'br-client' link is down
  607. Wed Sep 5 06:18:54 2018 daemon.notice netifd: Interface 'client' has link connectivity loss
  608. Wed Sep 5 06:18:54 2018 kern.info kernel: [245350.212227] br-client: port 3(local-port) entered forwarding state
  609. Wed Sep 5 06:18:54 2018 kern.info kernel: [245350.218847] br-client: port 3(local-port) entered forwarding state
  610. Wed Sep 5 06:18:54 2018 kern.info kernel: [245350.225475] br-client: port 1(bat0) entered forwarding state
  611. Wed Sep 5 06:18:54 2018 kern.info kernel: [245350.231495] br-client: port 1(bat0) entered forwarding state
  612. Wed Sep 5 06:18:55 2018 daemon.err odhcp6c[16316]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
  613. Wed Sep 5 06:18:56 2018 kern.info kernel: [245352.259187] br-client: port 3(local-port) entered forwarding state
  614. Wed Sep 5 06:18:56 2018 kern.info kernel: [245352.265772] br-client: port 1(bat0) entered forwarding state
  615. Wed Sep 5 06:18:57 2018 daemon.err odhcp6c[16316]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  616. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  617. Wed Sep 5 06:19:07 2018 daemon.notice netifd: bridge 'br-client' link is up
  618. Wed Sep 5 06:19:07 2018 daemon.notice netifd: Interface 'client' has link connectivity
  619. Wed Sep 5 06:19:07 2018 daemon.notice netifd: Interface 'client' is setting up now
  620. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  621. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  622. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  623. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  624. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  625. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  626. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  627. Wed Sep 5 06:19:07 2018 daemon.err respondd[15758]: sendto failed: Permission denied
  628. Wed Sep 5 06:19:10 2018 daemon.info respondd[16553]: unable to read providers from '/usr/lib/respondd', ignoring
  629. Wed Sep 5 06:19:11 2018 daemon.info fastd[16455]: resolving host `lk-st01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10000>...
  630. Wed Sep 5 06:19:14 2018 daemon.notice netifd: Interface 'mesh_vpn' is now up
  631. Wed Sep 5 06:19:14 2018 daemon.notice netifd: Interface 'client' is now up
  632. Wed Sep 5 06:19:14 2018 daemon.info fastd[16455]: resolved host `lk-st01.sn.ffnw.de' successfully
  633. Wed Sep 5 06:19:16 2018 daemon.info fastd[16455]: resolving host `lk-st02.sn.ffnw.de' for peer <mesh_vpn_backbone_peer__10001>...
  634. Wed Sep 5 06:19:17 2018 user.notice firewall: Reloading firewall due to ifup of client (br-client)
  635. Wed Sep 5 06:19:18 2018 daemon.err dnsmasq[1705]: failed to send packet: Operation not permitted
  636. Wed Sep 5 06:19:18 2018 daemon.err dnsmasq[1705]: failed to send packet: Operation not permitted
  637. Wed Sep 5 06:19:19 2018 daemon.info fastd[16455]: resolved host `lk-st02.sn.ffnw.de' successfully
  638. Wed Sep 5 06:19:20 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  639. Wed Sep 5 06:19:20 2018 kern.info kernel: [245376.636778] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  640. Wed Sep 5 06:19:21 2018 kern.info kernel: [245376.837977] batman_adv: bat0: Adding interface: mesh-vpn
  641. Wed Sep 5 06:19:21 2018 kern.info kernel: [245376.843670] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1312) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
  642. Wed Sep 5 06:19:21 2018 kern.info kernel: [245376.868806] batman_adv: bat0: Interface activated: mesh-vpn
  643. Wed Sep 5 06:19:21 2018 kern.info kernel: [245376.893755] device client0 entered promiscuous mode
  644. Wed Sep 5 06:19:21 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
  645. Wed Sep 5 06:19:29 2018 daemon.err hostapd: Using interface client0 with hwaddr f6:05:35:b4:23:f8 and ssid "nordwest.freifunk.net"
  646. Wed Sep 5 06:19:29 2018 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
  647. Wed Sep 5 06:19:29 2018 daemon.notice hostapd: client0: AP-ENABLED
  648. Wed Sep 5 06:19:30 2018 kern.info kernel: [245385.839331] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
  649. Wed Sep 5 06:19:30 2018 kern.info kernel: [245385.846459] br-client: port 4(client0) entered forwarding state
  650. Wed Sep 5 06:19:30 2018 kern.info kernel: [245385.852818] br-client: port 4(client0) entered forwarding state
  651. Wed Sep 5 06:19:32 2018 kern.info kernel: [245387.849203] br-client: port 4(client0) entered forwarding state
  652. Wed Sep 5 06:19:38 2018 daemon.info fastd[16455]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  653. Wed Sep 5 06:19:38 2018 daemon.info fastd[16455]: received handshake response from <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000] using fastd v18
  654. Wed Sep 5 06:19:38 2018 user.notice firewall: Reloading firewall due to ifup of client (br-client)
  655. Wed Sep 5 06:19:45 2018 daemon.info fastd[16455]: [2a01:4f8:110:1473::54]:10000 authorized as <mesh_vpn_backbone_peer__10000>
  656. Wed Sep 5 06:19:45 2018 daemon.notice fastd[16455]: connection with <mesh_vpn_backbone_peer__10000> established.
  657. Wed Sep 5 06:19:45 2018 daemon.info fastd[16455]: new session with <mesh_vpn_backbone_peer__10000> established using method `salsa2012+umac'.
  658. Wed Sep 5 06:21:53 2018 kern.info kernel: [245527.098190] br-client: port 4(client0) entered disabled state
  659. Wed Sep 5 06:21:55 2018 daemon.notice hostapd: client0: INTERFACE-DISABLED
  660. Wed Sep 5 06:22:08 2018 kern.info kernel: [245543.748616] device client0 left promiscuous mode
  661. Wed Sep 5 06:22:08 2018 kern.info kernel: [245543.753592] br-client: port 4(client0) entered disabled state
  662. Wed Sep 5 06:22:41 2018 daemon.err hostapd: Failed to set beacon parameters
  663. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  664. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  665. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  666. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  667. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  668. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  669. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  670. Wed Sep 5 06:22:54 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  671. Wed Sep 5 06:22:55 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  672. Wed Sep 5 06:22:55 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  673. Wed Sep 5 06:23:03 2018 daemon.err respondd[16553]: sendto failed: Operation not permitted
  674. Wed Sep 5 06:23:03 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  675. Wed Sep 5 06:23:03 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  676. Wed Sep 5 06:23:03 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  677. Wed Sep 5 06:23:03 2018 daemon.warn fastd[16455]: sendmsg: Operation not permitted
  678. Wed Sep 5 06:25:25 2018 kern.info kernel: [245739.147473] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
  679. Wed Sep 5 06:25:39 2018 daemon.notice netifd: client (16594): Command failed: Request timed out
  680. Wed Sep 5 06:25:40 2018 daemon.notice hostapd: client0: INTERFACE-ENABLED
  681. Wed Sep 5 06:25:40 2018 daemon.err hostapd: Failed to set beacon parameters
  682. Wed Sep 5 06:25:59 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  683. Wed Sep 5 06:26:09 2018 daemon.notice hostapd: client0: INTERFACE-DISABLED
  684. Wed Sep 5 06:26:09 2018 daemon.err hostapd: nl80211: Could not configure driver mode
  685. Wed Sep 5 06:26:09 2018 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0
  686. Wed Sep 5 06:26:09 2018 daemon.err hostapd: nl80211 driver initialization failed.
  687. Wed Sep 5 06:26:14 2018 daemon.notice hostapd: client0: interface state UNINITIALIZED->DISABLED
  688. Wed Sep 5 06:26:20 2018 daemon.notice hostapd: client0: AP-DISABLED
  689. Wed Sep 5 06:26:20 2018 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING
  690. Wed Sep 5 06:26:20 2018 daemon.err hostapd: hostapd_free_hapd_data: Interface client0 wasn't started
  691. Wed Sep 5 06:27:47 2018 daemon.notice netifd: radio0 (16740): Device setup failed: HOSTAPD_START_FAILED
  692. Wed Sep 5 06:29:08 2018 daemon.notice hostapd: client0: interface state ENABLED->DISABLED
  693. Wed Sep 5 06:29:08 2018 daemon.notice hostapd: client0: AP-DISABLED
  694. Wed Sep 5 06:29:08 2018 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING
  695. Wed Sep 5 06:29:08 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  696. Wed Sep 5 06:29:08 2018 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0
  697. Wed Sep 5 06:29:08 2018 daemon.notice hostapd: nl80211: Failed to remove interface client0 from bridge br-client: Invalid argument
  698. Wed Sep 5 06:35:53 2018 daemon.info respondd[17578]: unable to read providers from '/usr/lib/respondd', ignoring
  699. Wed Sep 5 06:38:55 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  700. Wed Sep 5 06:53:53 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  701. Wed Sep 5 07:03:03 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  702. Wed Sep 5 07:12:52 2018 daemon.info fastd[16455]: refreshing session with <mesh_vpn_backbone_peer__10000>
  703. Wed Sep 5 07:12:58 2018 daemon.info fastd[16455]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  704. Wed Sep 5 07:12:58 2018 daemon.info fastd[16455]: received handshake response from <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000] using fastd v18
  705. Wed Sep 5 07:13:02 2018 daemon.info fastd[16455]: [2a01:4f8:110:1473::54]:10000 authorized as <mesh_vpn_backbone_peer__10000>
  706. Wed Sep 5 07:13:02 2018 daemon.info fastd[16455]: new session with <mesh_vpn_backbone_peer__10000> established using method `salsa2012+umac'.
  707. Wed Sep 5 07:23:15 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  708. Wed Sep 5 07:46:15 2018 daemon.notice netifd: client (16594): cat: write error: Broken pipe
  709. Wed Sep 5 08:03:28 2018 daemon.info fastd[16455]: refreshing session with <mesh_vpn_backbone_peer__10000>
  710. Wed Sep 5 08:03:29 2018 daemon.info fastd[16455]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  711. Wed Sep 5 08:03:29 2018 daemon.info fastd[16455]: received handshake response from <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000] using fastd v18
  712. Wed Sep 5 08:03:33 2018 daemon.info fastd[16455]: [2a01:4f8:110:1473::54]:10000 authorized as <mesh_vpn_backbone_peer__10000>
  713. Wed Sep 5 08:03:33 2018 daemon.info fastd[16455]: new session with <mesh_vpn_backbone_peer__10000> established using method `salsa2012+umac'.
  714. Wed Sep 5 08:14:25 2018 daemon.notice netifd: wan6 (1485): Command failed: Request timed out
  715. Wed Sep 5 08:20:55 2018 daemon.notice netifd: client (16594): Command failed: Request timed out
  716. Wed Sep 5 08:29:09 2018 daemon.notice netifd: wan6 (1485): Command failed: Request timed out
  717. Wed Sep 5 08:29:09 2018 daemon.notice netifd: client (16594): Command failed: Request timed out
  718. Wed Sep 5 08:30:25 2018 user.notice root: hoodselector[21675]: The hoodselector is still running.
  719. Wed Sep 5 08:37:05 2018 daemon.notice netifd: client (16594): Command failed: Request timed out
  720. Wed Sep 5 08:38:48 2018 daemon.notice netifd: client (16594): Command failed: Request timed out
  721. Wed Sep 5 08:55:32 2018 daemon.info fastd[16455]: refreshing session with <mesh_vpn_backbone_peer__10000>
  722. Wed Sep 5 08:55:33 2018 daemon.info fastd[16455]: sending handshake to <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000]...
  723. Wed Sep 5 08:55:34 2018 daemon.info fastd[16455]: received handshake response from <mesh_vpn_backbone_peer__10000>[[2a01:4f8:110:1473::54]:10000] using fastd v18
  724. Wed Sep 5 08:55:35 2018 daemon.info fastd[16455]: [2a01:4f8:110:1473::54]:10000 authorized as <mesh_vpn_backbone_peer__10000>
  725. Wed Sep 5 08:55:36 2018 daemon.info fastd[16455]: new session with <mesh_vpn_backbone_peer__10000> established using method `salsa2012+umac'.
  726. Wed Sep 5 09:34:11 2018 authpriv.info dropbear[23545]: Child connection from 2a02:8109:1a40:1d1b:1259:d7ad:7c11:3914:45708
  727. Wed Sep 5 09:34:21 2018 authpriv.notice dropbear[23545]: Pubkey auth succeeded for 'root' with key md5 59:9b:b8:68:27:43:4e:54:23:8a:87:e5:68:3e:42:9d from 2a02:8109:1a40:1d1b:1259:d7ad:7c11:3914:45708
  728. root@FF-WKP-Privat-01:~# reboot;exit
  729. Connection to 2a06:e881:2000:4200:32b5:c2ff:fed9:e416 closed.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement