Advertisement
Guest User

Untitled

a guest
Nov 22nd, 2014
58
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.15 KB | None | 0 0
  1. Jan 1 01:00:38 FF-KR-WEIDEN01 daemon.notice netifd: Interface 'mesh_vpn' is now up
  2. Jan 1 01:00:39 FF-KR-WEIDEN01 user.info sysinit: /etc/rc.d/S99alfred: starting alfred
  3. Jan 1 01:00:39 FF-KR-WEIDEN01 user.info sysinit: /etc/rc.d/S99alfred: starting batadv-vis
  4. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: sending handshake to <mesh_vpn_backbone_peer_ruhrgebiet1>[82.207.138.31:10000]...
  5. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: sending handshake to <mesh_vpn_backbone_peer_ruhrgebiet2>[84.22.97.201:10000]...
  6. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: received handshake response from <mesh_vpn_backbone_peer_ruhrgebiet2>[84.22.97.201:10000] using fastd v12
  7. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: 84.22.97.201:10000 authorized as <mesh_vpn_backbone_peer_ruhrgebiet2>
  8. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.notice fastd[1611]: connection with <mesh_vpn_backbone_peer_ruhrgebiet2> established.
  9. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: new session with <mesh_vpn_backbone_peer_ruhrgebiet2> established using method `salsa2012+gmac'.
  10. Jan 1 01:00:39 FF-KR-WEIDEN01 daemon.info fastd[1611]: received handshake response from <mesh_vpn_backbone_peer_ruhrgebiet1>[82.207.138.31:10000] using fastd v12
  11. Jan 1 01:00:40 FF-KR-WEIDEN01 daemon.info fastd[1611]: 82.207.138.31:10000 authorized as <mesh_vpn_backbone_peer_ruhrgebiet1>
  12. Jan 1 01:00:40 FF-KR-WEIDEN01 daemon.notice fastd[1611]: connection with <mesh_vpn_backbone_peer_ruhrgebiet1> established.
  13. Jan 1 01:00:40 FF-KR-WEIDEN01 daemon.info fastd[1611]: new session with <mesh_vpn_backbone_peer_ruhrgebiet1> established using method `salsa2012+gmac'.
  14. Jan 1 01:00:43 FF-KR-WEIDEN01 daemon.info dnsmasq[1538]: reading /tmp/resolv.conf.auto
  15. Jan 1 01:00:43 FF-KR-WEIDEN01 daemon.info dnsmasq[1538]: using nameserver 2a02:f98:0:26::15#53
  16. Jan 1 01:00:43 FF-KR-WEIDEN01 daemon.info dnsmasq[1538]: using local addresses only for domain lan
  17. Jan 1 01:00:50 FF-KR-WEIDEN01 kern.debug kernel: [ 50.430000] rt6_redirect: source isn't a valid nexthop for redirect target
  18. Jan 1 01:00:50 FF-KR-WEIDEN01 kern.debug kernel: [ 50.520000] rt6_redirect: source isn't a valid nexthop for redirect target
  19. Jan 1 01:00:54 FF-KR-WEIDEN01 kern.debug kernel: [ 54.710000] rt6_redirect: source isn't a valid nexthop for redirect target
  20. Nov 20 17:37:23 FF-KR-WEIDEN01 kern.debug kernel: [ 57.070000] rt6_redirect: source isn't a valid nexthop for redirect target
  21. Nov 20 17:37:57 FF-KR-WEIDEN01 authpriv.info dropbear[3016]: Child connection from 2003:5e:6d07:3400:408b:f87b:323c:3af:60772
  22. Nov 20 17:38:28 FF-KR-WEIDEN01 kern.debug kernel: [ 122.610000] rt6_redirect: source isn't a valid nexthop for redirect target
  23. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.830000] ipv6: Neighbour table overflow.
  24. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.830000] ipv6: Neighbour table overflow.
  25. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.840000] ipv6: Neighbour table overflow.
  26. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.840000] ipv6: Neighbour table overflow.
  27. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.850000] ipv6: Neighbour table overflow.
  28. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.850000] ipv6: Neighbour table overflow.
  29. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.980000] ipv6: Neighbour table overflow.
  30. Nov 20 17:38:31 FF-KR-WEIDEN01 kern.warn kernel: [ 124.980000] ipv6: Neighbour table overflow.
  31. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.620000] net_ratelimit: 472 callbacks suppressed
  32. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.630000] ipv6: Neighbour table overflow.
  33. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.630000] ipv6: Neighbour table overflow.
  34. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.640000] ipv6: Neighbour table overflow.
  35. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.640000] ipv6: Neighbour table overflow.
  36. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.640000] ipv6: Neighbour table overflow.
  37. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.650000] ipv6: Neighbour table overflow.
  38. Nov 20 17:38:33 FF-KR-WEIDEN01 kern.warn kernel: [ 127.690000] ipv6: Neighbour table overflow.
  39. Nov 20 17:38:34 FF-KR-WEIDEN01 kern.warn kernel: [ 127.690000] ipv6: Neighbour table overflow.
  40. Nov 20 17:38:34 FF-KR-WEIDEN01 kern.warn kernel: [ 127.700000] ipv6: Neighbour table overflow.
  41. Nov 20 17:38:34 FF-KR-WEIDEN01 kern.warn kernel: [ 127.700000] ipv6: Neighbour table overflow.
  42. Nov 20 17:38:36 FF-KR-WEIDEN01 authpriv.notice dropbear[3016]: Pubkey auth succeeded for 'root' with key md5 2d:5c:f2:8a:17:4b:78:30:45:e8:02:17:6c:fc:d0:87 from 2003:5e:6d07:3400:408b:f87b:323c:3af:60772
  43. Nov 20 17:38:47 FF-KR-WEIDEN01 daemon.info dnsmasq[1545]: reading /var/gluon/wan-dnsmasq/resolv.conf
  44. Nov 20 17:38:47 FF-KR-WEIDEN01 daemon.info dnsmasq[1545]: using nameserver 192.168.76.1#53
  45. Nov 20 17:38:47 FF-KR-WEIDEN01 daemon.info dnsmasq[1545]: using nameserver fd00::be05:43ff:feec:9ac1#53
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement