Hallo zusammen,
ich brauche noch mal Eure Hilfe.
Ich habe hier im Ort auf dem Dachboden eines Hauses (Unterkunft für Geflüchtete) einen Offloader und zwei Router (ffnw-muehlen-offloader-01, ffnw-muehlen-04 und ffnw-muehlen-05).
Alle drei Geräte sind per Kabel an einer Fritzbox angeschlossen - haben also alle eine ipv4 Adresse. Der offloader macht das VPN ins FF Netz. Das ganze läuft über einen 16000er Anschluss von EWE.
Das ganze hat bis vor ein paar Tagen mehr oder weniger problemlos funktioniert. Seit dem kommen verstärkt Meldungen: "Das Internet ist tot"
Wenn ich mit Grafana (https://grafana.ffnw.de/dashboard/db/single-node-hopglass?var-hostname=ffnw-...) nachsehe, dann sieht alles so aus wie immer.
Ich komme von zu Hause auch von meinem FF Router per ssh auf die Router auf dem Dachboden. Ich habe einen 50000er Anschluss von EWE.
Ich habe jetzt auf dem einen Router mal den hoodselector ausgeführt:
root@ffnw-muehlen-04:~# hoodselector No VPN connection found Batman gateways found gw source is wan gluon-neighbour-info -i br-wan -p 1001 -d ff02::2 -r hoodselector -t 0.5 No VPN routers over mesh on lan or wan Interface mesh_lan enabled. Testing neighboring adhoc networks for batman advanced gw connection. The following wireless networks have been found: 42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_ 42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_ 43 2437 02:ca:ff:ee:ba:bf mesh.ffnw After filtering we will test the following wireless networks: 42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_ 43 2437 02:ca:ff:ee:ba:bf mesh.ffnw Prepare configuration for testing wireless networks... VPN stopped. Testing MESH 02:ca:ff:ee:ba:bf... VPN started. Interface br-client restarted. Wireless restarted. Finished testing wireless networks, restored previous configuration Neighoring freifunk batman advanced mesh with BSSID 02:ca:ff:ee:ba:bf found Set hood "default" Hood set by scan mode Interface mesh_lan enabled. root@ffnw-muehlen-04:~#
Was bedeutet das? Warum die default Hood?
Hier noch ein logread vom offloader. Der ist ja offensichtlich in der VEC Hood.
root@ffnw-muehlen-offloader01:~# logread Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: adding peer <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: resolving host `lk-vec01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer_lk_vec01_10002>... Thu Jun 22 10:20:02 2017 daemon.notice netifd: Bridge 'br-client' link is down Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' has link connectivity loss Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.103824] br-client: port 1(bat0) entered disabled state Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: resolved host `lk-vec01.sn.ffnw.de' successfully Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.206996] br-client: port 1(bat0) entered forwarding state Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.224031] br-client: port 1(bat0) entered forwarding state Thu Jun 22 10:20:02 2017 daemon.notice netifd: Bridge 'br-client' link is up Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' has link connectivity Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is setting up now Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.255239] batman_adv: bat0: Adding interface: mesh-vpn Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.271275] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1312) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.343991] batman_adv: bat0: Interface activated: mesh-vpn Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.384423] batman_adv: bat0: no_rebroadcast: Changing from: disabled to: enabled Thu Jun 22 10:20:02 2017 daemon.warn dnsmasq[2423]: no servers found in /tmp/resolv.conf.auto, will retry Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'mesh_vpn' is now up Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is now down Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is setting up now Thu Jun 22 10:20:04 2017 kern.info kernel: [ 172.220013] br-client: port 1(bat0) entered forwarding state Thu Jun 22 10:20:04 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[[2a01:4f8:161:5205::23]:10002]... Thu Jun 22 10:20:13 2017 daemon.notice netifd: Interface 'client' is now up Thu Jun 22 10:20:13 2017 user.notice firewall: Reloading firewall due to ifup of client (br-client) Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: resolving host `lk-vec01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer_lk_vec01_10002>... Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: resolved host `lk-vec01.sn.ffnw.de' successfully Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 10:20:26 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 10:20:26 2017 daemon.notice fastd[3060]: connection with <mesh_vpn_backbone_peer_lk_vec01_10002> established. Thu Jun 22 10:20:26 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: reading /tmp/resolv.conf.auto Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using local addresses only for domain lan Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using nameserver 2a03:b0c0:3:d0::bd6:b001#53 Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using nameserver 2001:67c:18e8:0:2::181#53 Thu Jun 22 10:20:30 2017 user.notice firewall: Reloading firewall due to ifupdate of client (br-client) Thu Jun 22 10:23:22 2017 kern.info kernel: [ 370.858520] br-client: Multicast hash table chain limit reached: bat0 Thu Jun 22 10:23:22 2017 kern.warn kernel: [ 370.877971] br-client: Cannot rehash multicast hash table, disabling snooping: bat0, 440, -22 Thu Jun 22 10:30:00 2017 user.notice root: netmon-node-client[3640]: Netmon Node Client is disabled. Thu Jun 22 10:40:00 2017 user.notice root: netmon-node-client[3988]: Netmon Node Client is disabled. Thu Jun 22 10:50:00 2017 user.notice root: netmon-node-client[4342]: Netmon Node Client is disabled. Thu Jun 22 11:00:00 2017 user.notice root: netmon-node-client[4690]: Netmon Node Client is disabled. Thu Jun 22 11:10:00 2017 user.notice root: netmon-node-client[5038]: Netmon Node Client is disabled. Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 11:20:00 2017 user.notice root: netmon-node-client[5393]: Netmon Node Client is disabled. Thu Jun 22 11:30:00 2017 user.notice root: netmon-node-client[5742]: Netmon Node Client is disabled. Thu Jun 22 11:40:00 2017 user.notice root: netmon-node-client[6092]: Netmon Node Client is disabled. Thu Jun 22 11:50:00 2017 user.notice root: netmon-node-client[6448]: Netmon Node Client is disabled. Thu Jun 22 12:00:00 2017 user.notice root: netmon-node-client[6801]: Netmon Node Client is disabled. Thu Jun 22 12:05:01 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 12:05:01 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 12:10:00 2017 user.notice root: netmon-node-client[7153]: Netmon Node Client is disabled. Thu Jun 22 12:20:00 2017 user.notice root: netmon-node-client[7497]: Netmon Node Client is disabled. Thu Jun 22 12:30:00 2017 user.notice root: netmon-node-client[7848]: Netmon Node Client is disabled. Thu Jun 22 12:40:00 2017 user.notice root: netmon-node-client[8202]: Netmon Node Client is disabled. Thu Jun 22 12:50:00 2017 user.notice root: netmon-node-client[8549]: Netmon Node Client is disabled. Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 13:00:00 2017 user.notice root: netmon-node-client[8898]: Netmon Node Client is disabled. Thu Jun 22 13:10:00 2017 user.notice root: netmon-node-client[9254]: Netmon Node Client is disabled. Thu Jun 22 13:20:00 2017 user.notice root: netmon-node-client[9617]: Netmon Node Client is disabled. Thu Jun 22 13:30:00 2017 user.notice root: netmon-node-client[9966]: Netmon Node Client is disabled. Thu Jun 22 13:40:00 2017 user.notice root: netmon-node-client[10314]: Netmon Node Client is disabled. Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 13:50:00 2017 user.notice root: netmon-node-client[10663]: Netmon Node Client is disabled. Thu Jun 22 14:00:01 2017 user.notice root: netmon-node-client[11008]: Netmon Node Client is disabled. Thu Jun 22 14:10:01 2017 user.notice root: netmon-node-client[11363]: Netmon Node Client is disabled. Thu Jun 22 14:20:00 2017 user.notice root: netmon-node-client[11712]: Netmon Node Client is disabled. Thu Jun 22 14:30:00 2017 user.notice root: netmon-node-client[12066]: Netmon Node Client is disabled. Thu Jun 22 14:40:01 2017 user.notice root: netmon-node-client[12417]: Netmon Node Client is disabled. Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 14:50:01 2017 user.notice root: netmon-node-client[12781]: Netmon Node Client is disabled. Thu Jun 22 15:00:01 2017 user.notice root: netmon-node-client[13137]: Netmon Node Client is disabled. Thu Jun 22 15:10:01 2017 user.notice root: netmon-node-client[13494]: Netmon Node Client is disabled. Thu Jun 22 15:20:01 2017 user.notice root: netmon-node-client[13851]: Netmon Node Client is disabled. Thu Jun 22 15:30:01 2017 user.notice root: netmon-node-client[14220]: Netmon Node Client is disabled. Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 15:40:01 2017 user.notice root: netmon-node-client[14582]: Netmon Node Client is disabled. Thu Jun 22 15:50:01 2017 user.notice root: netmon-node-client[14944]: Netmon Node Client is disabled. Thu Jun 22 16:00:01 2017 user.notice root: netmon-node-client[15306]: Netmon Node Client is disabled. Thu Jun 22 16:10:01 2017 user.notice root: netmon-node-client[15672]: Netmon Node Client is disabled. Thu Jun 22 16:20:01 2017 user.notice root: netmon-node-client[16033]: Netmon Node Client is disabled. Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 16:30:01 2017 user.notice root: netmon-node-client[16390]: Netmon Node Client is disabled. Thu Jun 22 16:40:01 2017 user.notice root: netmon-node-client[16750]: Netmon Node Client is disabled. Thu Jun 22 16:50:01 2017 user.notice root: netmon-node-client[17115]: Netmon Node Client is disabled. Thu Jun 22 17:00:01 2017 user.notice root: netmon-node-client[17475]: Netmon Node Client is disabled. Thu Jun 22 17:10:01 2017 user.notice root: netmon-node-client[17842]: Netmon Node Client is disabled. Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 17:20:01 2017 user.notice root: netmon-node-client[18202]: Netmon Node Client is disabled. Thu Jun 22 17:30:01 2017 user.notice root: netmon-node-client[18564]: Netmon Node Client is disabled. Thu Jun 22 17:40:01 2017 user.notice root: netmon-node-client[18925]: Netmon Node Client is disabled. Thu Jun 22 17:50:01 2017 user.notice root: netmon-node-client[19286]: Netmon Node Client is disabled. Thu Jun 22 18:00:01 2017 user.notice root: netmon-node-client[19649]: Netmon Node Client is disabled. Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 18:10:01 2017 user.notice root: netmon-node-client[20028]: Netmon Node Client is disabled. Thu Jun 22 18:20:01 2017 user.notice root: netmon-node-client[20378]: Netmon Node Client is disabled. Thu Jun 22 18:30:01 2017 user.notice root: netmon-node-client[20742]: Netmon Node Client is disabled. Thu Jun 22 18:40:01 2017 user.notice root: netmon-node-client[21104]: Netmon Node Client is disabled. Thu Jun 22 18:50:01 2017 user.notice root: netmon-node-client[21461]: Netmon Node Client is disabled. Thu Jun 22 19:00:01 2017 user.notice root: netmon-node-client[21815]: Netmon Node Client is disabled. Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 19:10:01 2017 user.notice root: netmon-node-client[22180]: Netmon Node Client is disabled. Thu Jun 22 19:20:01 2017 user.notice root: netmon-node-client[22550]: Netmon Node Client is disabled. Thu Jun 22 19:30:01 2017 user.notice root: netmon-node-client[22914]: Netmon Node Client is disabled. Thu Jun 22 19:40:01 2017 user.notice root: netmon-node-client[23270]: Netmon Node Client is disabled. Thu Jun 22 19:50:01 2017 user.notice root: netmon-node-client[23616]: Netmon Node Client is disabled. Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: refreshing session with <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: sending handshake to <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]... Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: received handshake response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002] using fastd v18 Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: 5.9.56.23:10002 authorized as <mesh_vpn_backbone_peer_lk_vec01_10002> Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: new session with <mesh_vpn_backbone_peer_lk_vec01_10002> established using method `salsa2012+umac'. Thu Jun 22 19:57:14 2017 authpriv.info dropbear[23884]: Child connection from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41363 Thu Jun 22 19:57:20 2017 authpriv.notice dropbear[23884]: Password auth succeeded for 'root' from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41363 Thu Jun 22 19:59:45 2017 authpriv.info dropbear[23884]: Exit (root): Exited normally Thu Jun 22 20:00:01 2017 user.notice root: netmon-node-client[23996]: Netmon Node Client is disabled. Thu Jun 22 20:05:16 2017 authpriv.info dropbear[24205]: Child connection from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41368 Thu Jun 22 20:05:22 2017 authpriv.notice dropbear[24205]: Password auth succeeded for 'root' from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41368 root@ffnw-muehlen-offloader01:~#
Wie kann ich von einem Router auf der Konsole am besten testen, wie gut die Verbindung ins Internet ist? Kann ich sicher sein, das ich von der Konsole per wget nicht über das lokale ipv4 Netz rausgehe, sondern über das FF VPN.
Martin
Guten Morgen,
Kann mir keiner weiterhelfen? Ich weiß nicht weiter und bin auf Hilfe angewiesen. Ich würde das gerne heute Nachmittag lösen.
Martin
Moin Martin,
von deiner Mail gestern Abend bis jetzt ist wenig Zeit vergangen - hau auf die anderen Router auch mal meinen Key, ich schau später mal.
Von meinem iPhone gesendet
Am 23.06.2017 um 06:48 schrieb Martin Brehme via Nordwest nordwest@lists.ffnw.de:
Guten Morgen,
Kann mir keiner weiterhelfen? Ich weiß nicht weiter und bin auf Hilfe angewiesen. Ich würde das gerne heute Nachmittag lösen.
Martin
Nordwest mailing list Nordwest@lists.ffnw.de https://lists.ffnw.de/mailman/listinfo/nordwest
Moin,
Dass sollte auch keinesfalls Kritik sein. Man ist halt verwöhnt. Sonst schreibt man in die Liste und in der Regel gibts am selben Abend noch irgend eine Rückmeldung. Hier war jetzt völlige Funkstille. Daher hab ich noch mal nachgehakt.
Deine Keys sind auf allen drei Geräten drauf. Danke, dass du dir das ansehen willst.
Eben bekam ich die Rückmeldung dass es wieder gehen soll. Aber die merkwürdige Meldung mit der default Hood habe ich immernoch. Und der hoodselector behauptet nun auch, dass er keinen brauchbaren Nachbarn findet. Die genaue Meldung hab ich gerade nicht parat, da ich nicht auf die Geräte vom Büro zugreifen kann.
Sorry für meine Ungeduld.
Martin
Am 23. Juni 2017 6:50:27 vorm. schrieb Stefan Dunkel via Nordwest nordwest@lists.ffnw.de:
Moin Martin,
von deiner Mail gestern Abend bis jetzt ist wenig Zeit vergangen - hau auf die anderen Router auch mal meinen Key, ich schau später mal.
Von meinem iPhone gesendet
Am 23.06.2017 um 06:48 schrieb Martin Brehme via Nordwest nordwest@lists.ffnw.de:
Guten Morgen,
Kann mir keiner weiterhelfen? Ich weiß nicht weiter und bin auf Hilfe angewiesen. Ich würde das gerne heute Nachmittag lösen.
Martin
Nordwest mailing list Nordwest@lists.ffnw.de https://lists.ffnw.de/mailman/listinfo/nordwest
Nordwest mailing list Nordwest@lists.ffnw.de https://lists.ffnw.de/mailman/listinfo/nordwest