-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Hallo, ich habe hier mit einem Handy dauernd Verbindungsprobleme und bin dann beim Aufsetzen eines weiteren (baugleichen) Routers auf folgendes Gestoßen:
Mein zweiter Router ffnw-tverrbjelke-d85d4c9c2f6e | TP-Link TL-WR1043N/ND v1
http://map.ffnw.de/#%21v:m%3Bn:d85d4c9c2f6e
Er hat eine andere reale ipv6 als die automatisch bestimmte und in der Map eingetragene! Das gleiche gilt für meinen ersten router ffnw-tverrbjelke-d85d4c9c2da6 http://map.ffnw.de/#%21v:m%3Bn:d85d4c9c2da6 auch!
Ich habe Tarek auf beiden routern seinen SSH-Key eingetragen, damit er debuggen kann. Ich glaube aber das Problem liegt schon HIER:
http://mastersword.de/~reddog/ll.php
diese Seite erzeugt aus meiner MAC (genommen jeweils von der Rückseite des routers) eine komische IPv6, aber die tatsächlich im gerät verwendete ipv6 linklocal ist eine andere!
ffnw-tverrbjelke-d85d4c9c2da6 mit der MAC DA:5E:4C:9C:2D:A6 komme ich real ran mit: ping6 fe80::d85e:4cff:fe9c:2da6%eth0
In der url generierte und auch in der Map eingetragen als fe80::da5d:4cff:fe9c:2da6
Entsprechend auch falsch bei dem router ffnw-tverrbjelke-d85d4c9c2f6e mit der realen mac DA:5E:4C:9C:2F:6E komme ich ran mit: ping6 fe80::d85e:4cff:fe9c:2f6e%eth0
hier mal ein ifconfig auszug:
##############################################################
root@ffnw-tverrbjelke-d85d4c9c2f6e:/etc/dropbear# ifconfig bat0 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:143 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:33 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:6006 (5.8 KiB) TX bytes:0 (0.0 B)
br-client Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fd74:fdaa:9dc4:0:da5d:4cff:fe9c:2f6e/64 Scope:Glob al inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:142 errors:0 dropped:0 overruns:0 frame:0 TX packets:44 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:3976 (3.8 KiB) TX bytes:6006 (5.8 KiB)
br-wan Link encap:Ethernet HWaddr DA:5E:4C:9C:2F:6E inet addr:192.168.2.123 Bcast:192.168.2.255 Mask:255.255.255 .0 inet6 addr: fe80::d85e:4cff:fe9c:2f6e/64 Scope:Link inet6 addr: 2a02:8109:1880:994:d85e:4cff:fe9c:2f6e/64 Scope:Global UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1222 errors:0 dropped:0 overruns:0 frame:0 TX packets:866 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:201027 (196.3 KiB) TX bytes:143936 (140.5 KiB)
client0 Link encap:Ethernet HWaddr DA:5F:4D:9C:2F:6E inet6 addr: fe80::d85f:4dff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:158 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:10464 (10.2 KiB)
eth0 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1293 errors:0 dropped:3 overruns:4595 frame:0 TX packets:1038 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:227559 (222.2 KiB) TX bytes:158205 (154.4 KiB) Interrupt:4
eth0.1 Link encap:Ethernet HWaddr DA:5E:4D:9C:2F:6E UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:164 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 B) TX bytes:8288 (8.0 KiB)
eth0.2 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1290 errors:0 dropped:0 overruns:0 frame:0 TX packets:866 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:204155 (199.3 KiB) TX bytes:143936 (140.5 KiB)
ibss0 Link encap:Ethernet HWaddr DA:60:4D:9C:2F:6E inet6 addr: fe80::d860:4dff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1532 Metric:1 RX packets:1080 errors:0 dropped:0 overruns:0 frame:0 TX packets:1141 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:56232 (54.9 KiB) TX bytes:80604 (78.7 KiB)
lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:1292 errors:0 dropped:0 overruns:0 frame:0 TX packets:1292 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:117064 (114.3 KiB) TX bytes:117064 (114.3 KiB)
local-node Link encap:Ethernet HWaddr 16:41:95:40:F7:DC inet6 addr: fe80::1441:95ff:fe40:f7dc/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:142 errors:0 dropped:0 overruns:0 frame:0 TX packets:7 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:5964 (5.8 KiB) TX bytes:738 (738.0 B)
mesh-vpn Link encap:Ethernet HWaddr DA:61:4C:9C:2F:6E inet6 addr: fe80::d861:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1312 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:581 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:500 RX bytes:0 (0.0 B) TX bytes:39186 (38.2 KiB)
- ---- Ihr werdet sowieso nie begreifen, daß Denken kein bloßer Zeitvertreib, sondern eine Pflicht ist... (Pfeffer)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Hey!
Unser syrischer Gast ist ja nun hier und nutzt das Freifunk Netz.
Er kann problemlos mit seinem laptop ins ffnw-netz, aber mit seinem Smartphone ( GT-I9060I/DS ) geht es nicht (er kriegt schnell eine WIFI-Verbindung hin. Dann bekommt er entweder keine Datenübertragung zustande, oder die verbindung bricht dauernd ab.)
Die WIFI Verbindung mit dem Handy geht on und wieder off und dann wieder on usw - während andere Geräte zur selben Zeit konstante gute Verbindung haben. Unsere anderen zwei Smartphones (S3) und Laptops (T500) und sein eigener ASUS Laptop haben jeweils keine Probleme ins Freifunk-Netz zu connecten - ohne diese dauernden abbrüche.
Das Phenomen ist bei dem neu aufgesetzten ersatz-router leider auch da.
Blöd, weil er *nur* mit diesem (Arabische Sprache) Handy nach hause nach syrien Skypen / Watsapp'en kann (könnte).
Ich hab hier mal geloggt was auf dem Gerät selber los ist... Vielleicht ist das ja eine Chance einen Bug zu finden/fixen...
tverrbjelke
####################################
root@ffnw-tverrbjelke-d85d4c9c2f6e:~# batctl gwl Gateway (#/255) Nexthop [outgoingIF]: advertised uplink bandwidth ... [B.A.T.M.A.N. adv 2015.1, MainIF/MAC: mesh-vpn/da:61:4c:9c:2f:6e (bat0)] 0a:83:b5:74:6f:0e (126) 5e:9c:b6:fe:a5:d9 [ mesh-vpn]: 100.0/100.0 MBit d6:3f:11:21:d2:89 (125) 5e:9c:b6:fe:a5:d9 [ mesh-vpn]: 100.0/100.0 MBit => 5e:9c:b6:fe:a5:d9 (139) 5e:9c:b6:fe:a5:d9 [ mesh-vpn]: 1000.0/1000.0 MBit 5e:ab:34:9c:fc:07 ( 99) 5e:9c:b6:fe:a5:d9 [ mesh-vpn]: 1000.0/1000.0 MBit a6:19:1a:c2:65:7e ( 89) 5e:9c:b6:fe:a5:d9 [ mesh-vpn]: 1000.0/1000.0 MBit
####################################
root@ffnw-tverrbjelke-d85d4c9c2f6e:~# traceroute 8.8.8.8 traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 38 byte packets 1 192.168.2.1 (192.168.2.1) 1.219 ms 0.983 ms 0.928 ms 2 * * * 3 83-169-158-230.static.superkabel.de (83.169.158.230) 16.638 ms 15.856 ms 12.151 ms 4 ip5886c21b.dynamic.kabel-deutschland.de (88.134.194.27) 16.363 ms 16.264 ms 16.927 ms 5 ip5886cbd0.dynamic.kabel-deutschland.de (88.134.203.208) 22.923 ms 18.742 ms 20.378 ms 6 ip5886ca17.dynamic.kabel-deutschland.de (88.134.202.23) 14.124 ms 17.903 ms 14.623 ms 7 72.14.198.218 (72.14.198.218) 16.221 ms 18.905 ms 14.896 ms 8 209.85.249.132 (209.85.249.132) 24.688 ms 209.85.249.134 (209.85.249.134) 19.572 ms 209.85.249.132 (209.85.249.132) 17.914 ms 9 72.14.233.216 (72.14.233.216) 23.667 ms 72.14.233.31 (72.14.233.31) 20.065 ms 72.14.233.167 (72.14.233.167) 20.684 ms 10 209.85.254.198 (209.85.254.198) 24.336 ms 216.239.56.156 (216.239.56.156) 28.490 ms 209.85.254.198 (209.85.254.198) 24.852 ms 11 216.239.49.36 (216.239.49.36) 28.043 ms 27.083 ms 216.239.49.30 (216.239.49.30) 31.033 ms 12 * * * 13 google-public-dns-a.google.com (8.8.8.8) 34.241 ms 24.294 ms 27.056 ms
#############################################
root@ffnw-tverrbjelke-d85d4c9c2f6e:~# ifconfig bat0 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:557585 errors:0 dropped:0 overruns:0 frame:0 TX packets:47614 errors:0 dropped:27 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:90808261 (86.6 MiB) TX bytes:5178194 (4.9 MiB)
br-client Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fd74:fdaa:9dc4:0:da5d:4cff:fe9c:2f6e/64 Scope:Glob al inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link inet6 addr: 2a03:2260:1001:1505:da5d:4cff:fe9c:2f6e/64 Scope:Global UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:604790 errors:0 dropped:0 overruns:0 frame:0 TX packets:774 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:87396609 (83.3 MiB) TX bytes:144382 (140.9 KiB)
br-wan Link encap:Ethernet HWaddr DA:5E:4C:9C:2F:6E inet addr:192.168.2.123 Bcast:192.168.2.255 Mask:255.255.255 .0 inet6 addr: fe80::d85e:4cff:fe9c:2f6e/64 Scope:Link inet6 addr: 2a02:8109:1880:994:d85e:4cff:fe9c:2f6e/64 Scope:Global UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:795028 errors:0 dropped:0 overruns:0 frame:0 TX packets:151448 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:212574606 (202.7 MiB) TX bytes:60934473 (58.1 MiB)
client0 Link encap:Ethernet HWaddr DA:5F:4D:9C:2F:6E inet6 addr: fe80::d85f:4dff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:46977 errors:0 dropped:0 overruns:0 frame:0 TX packets:545531 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:5048516 (4.8 MiB) TX bytes:99838694 (95.2 MiB)
eth0 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E inet6 addr: fe80::da5d:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:795622 errors:0 dropped:531 overruns:4512 frame:0 TX packets:639067 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:227019066 (216.5 MiB) TX bytes:100389070 (95.7 MiB) Interrupt:4
eth0.1 Link encap:Ethernet HWaddr DA:5E:4D:9C:2F:6E UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:487611 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 B) TX bytes:36896500 (35.1 MiB)
eth0.2 Link encap:Ethernet HWaddr D8:5D:4C:9C:2F:6E UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:795029 errors:0 dropped:0 overruns:0 frame:0 TX packets:151448 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:212574748 (202.7 MiB) TX bytes:60934473 (58.1 MiB)
ibss0 Link encap:Ethernet HWaddr DA:60:4D:9C:2F:6E inet6 addr: fe80::d860:4dff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1532 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:1502679 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:216029238 (206.0 MiB)
lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:640 errors:0 dropped:0 overruns:0 frame:0 TX packets:640 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:167093 (163.1 KiB) TX bytes:167093 (163.1 KiB)
local-node Link encap:Ethernet HWaddr 16:41:95:40:F7:DC inet6 addr: fe80::1441:95ff:fe40:f7dc/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:114098 errors:0 dropped:0 overruns:0 frame:0 TX packets:20 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:5396245 (5.1 MiB) TX bytes:1856 (1.8 KiB)
mesh-vpn Link encap:Ethernet HWaddr DA:61:4C:9C:2F:6E inet6 addr: fe80::d861:4cff:fe9c:2f6e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1312 Metric:1 RX packets:773053 errors:0 dropped:0 overruns:0 frame:0 TX packets:147960 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:500 RX bytes:152063154 (145.0 MiB) TX bytes:46863806 (44.6 MiB)
####################################
root@ffnw-tverrbjelke-d85d4c9c2f6e:~# dmesg [ 0.000000] Linux version 3.18.24 (root@buildvm) (gcc version 4.8.3 (OpenWrt/Linaro GCC 4.8-2014.04 r47335) ) #1 Fri Apr 1 00:11:31 CEST 201 6 [ 0.000000] MyLoader: sysp=ffffffff, boardp=ffffffff, parts=7fffffff [ 0.000000] bootconsole [early0] enabled [ 0.000000] CPU0 revision is: 00019374 (MIPS 24Kc) [ 0.000000] SoC: Atheros AR9132 rev 2 [ 0.000000] Determined physical RAM map: [ 0.000000] memory: 02000000 @ 00000000 (usable) [ 0.000000] Initrd not found or empty - disabling initrd [ 0.000000] Zone ranges: [ 0.000000] Normal [mem 0x00000000-0x01ffffff] [ 0.000000] Movable zone start for each node [ 0.000000] Early memory node ranges [ 0.000000] node 0: [mem 0x00000000-0x01ffffff] [ 0.000000] Initmem setup node 0 [mem 0x00000000-0x01ffffff] [ 0.000000] On node 0 totalpages: 8192 [ 0.000000] free_area_init_node: node 0, pgdat 803802b0, node_mem_map 81000000 [ 0.000000] Normal zone: 64 pages used for memmap [ 0.000000] Normal zone: 0 pages reserved [ 0.000000] Normal zone: 8192 pages, LIFO batch:0 [ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes. [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768 [ 0.000000] pcpu-alloc: [0] 0 [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 8128 [ 0.000000] Kernel command line: board=TL-WR1043ND console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd [ 0.000000] PID hash table entries: 128 (order: -3, 512 bytes) [ 0.000000] Dentry cache hash table entries: 4096 (order: 2, 16384 bytes) [ 0.000000] Inode-cache hash table entries: 2048 (order: 1, 8192 byte s) [ 0.000000] Writing ErrCtl register=00000000 [ 0.000000] Readback ErrCtl register=00000000 [ 0.000000] Memory: 28324K/32768K available (2615K kernel code, 132K rwdata, 548K rodata, 216K init, 194K bss, 4444K reserved) [ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes= 1 [ 0.000000] NR_IRQS:51 [ 0.000000] Clocks: CPU:400.000MHz, DDR:400.000MHz, AHB:200.000MHz, Ref:5.000MHz [ 0.000000] Calibrating delay loop... 265.42 BogoMIPS (lpj=1327104) [ 0.080000] pid_max: default: 32768 minimum: 301 [ 0.080000] Mount-cache hash table entries: 1024 (order: 0, 4096 byte s) [ 0.090000] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes) [ 0.100000] NET: Registered protocol family 16 [ 0.100000] MIPS: machine is TP-LINK TL-WR1043ND [ 0.390000] Switched to clocksource MIPS [ 0.390000] NET: Registered protocol family 2 [ 0.400000] TCP established hash table entries: 1024 (order: 0, 4096 bytes) [ 0.400000] TCP bind hash table entries: 1024 (order: 0, 4096 bytes) [ 0.410000] TCP: Hash tables configured (established 1024 bind 1024) [ 0.420000] TCP: reno registered [ 0.420000] UDP hash table entries: 256 (order: 0, 4096 bytes) [ 0.430000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes) [ 0.430000] NET: Registered protocol family 1 [ 0.440000] PCI: CLS 0 bytes, default 32 [ 0.440000] futex hash table entries: 256 (order: -1, 3072 bytes) [ 0.450000] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 0.460000] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc. [ 0.470000] msgmni has been set to 55 [ 0.470000] io scheduler noop registered [ 0.480000] io scheduler deadline registered (default) [ 0.480000] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled [ 0.490000] console [ttyS0] disabled [ 0.520000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 12500000) is a 16550A [ 0.530000] console [ttyS0] enabled [ 0.530000] bootconsole [early0] disabled [ 0.550000] m25p80 spi0.0: found s25sl064p, expected m25p80 [ 0.550000] m25p80 spi0.0: s25sl064p (8192 Kbytes) [ 0.560000] 5 tp-link partitions found on MTD device spi0.0 [ 0.560000] Creating 5 MTD partitions on "spi0.0": [ 0.570000] 0x000000000000-0x000000020000 : "u-boot" [ 0.570000] 0x000000020000-0x000000144e00 : "kernel" [ 0.580000] 0x000000144e00-0x0000007f0000 : "rootfs" [ 0.590000] mtd: device 2 (rootfs) set to be root filesystem [ 0.600000] 1 squashfs-split partitions found on MTD device rootfs [ 0.610000] 0x000000390000-0x0000007f0000 : "rootfs_data" [ 0.620000] 0x0000007f0000-0x000000800000 : "art" [ 0.620000] 0x000000020000-0x0000007f0000 : "firmware" [ 0.630000] Realtek RTL8366RB ethernet switch driver version 0.2.4 [ 0.750000] rtl8366rb rtl8366rb: using GPIO pins 18 (SDA) and 19 (SCK ) [ 0.750000] rtl8366rb rtl8366rb: RTL5937 ver. 2 chip found [ 0.930000] libphy: rtl8366rb: probed [ 1.260000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII [ 1.260000] TCP: cubic registered [ 1.270000] NET: Registered protocol family 17 [ 1.270000] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. [ 1.290000] Bridge firewalling registered [ 1.290000] 8021q: 802.1Q VLAN Support v1.8 [ 1.300000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2. [ 1.310000] Freeing unused kernel memory: 216K (8039a000 - 803d0000) [ 2.680000] init: Console is alive [ 2.690000] init: - watchdog - [ 4.780000] init: - preinit - [ 5.490000] ar71xx: pll_reg 0xb8050014: 0x1a000000 [ 5.490000] eth0: link up (1000Mbps/Full duplex) [ 5.520000] random: procd urandom read with 8 bits of entropy availab le [ 8.930000] jffs2: notice: (346) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found. [ 8.950000] mount_root: switching to jffs2 overlay [ 9.110000] eth0: link down [ 9.130000] procd: - early - [ 9.130000] procd: - watchdog - [ 9.900000] procd: - ubus - [ 10.920000] procd: - init - [ 12.040000] NET: Registered protocol family 10 [ 12.050000] tun: Universal TUN/TAP device driver, 1.6 [ 12.060000] tun: (C) 1999-2004 Max Krasnyansky maxk@qualcomm.com [ 12.070000] ip6_tables: (C) 2000-2006 Netfilter Core Team [ 12.100000] batman_adv: B.A.T.M.A.N. advanced 2015.1 (compatibility version 15) loaded [ 12.110000] u32 classifier [ 12.120000] input device check on [ 12.120000] Actions configured [ 12.120000] Mirror/redirect action on [ 12.130000] netem: version 1.3 [ 12.170000] Loading modules backported from Linux version master-2015-07-21-0-g47cd203 [ 12.180000] Backport generated by backports.git backports-20150626-0-gc1a4168 [ 12.230000] Ebtables v2.0 registered [ 12.230000] ip_tables: (C) 2000-2006 Netfilter Core Team [ 12.290000] nf_conntrack version 0.5.0 (445 buckets, 1780 max) [ 12.420000] xt_time: kernel timezone is -0000 [ 12.460000] cfg80211: World regulatory domain updated: [ 12.470000] cfg80211: DFS Master region: unset [ 12.470000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) [ 12.480000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 12.490000] cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 12.500000] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) [ 12.500000] cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (N/A) [ 12.510000] cfg80211: (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s) [ 12.520000] cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) [ 12.530000] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) [ 12.540000] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) [ 12.710000] ath: EEPROM regdomain: 0x0 [ 12.710000] ath: EEPROM indicates default country code should be used [ 12.710000] ath: doing EEPROM country->regdmn map search [ 12.710000] ath: country maps to regdmn code: 0x3a [ 12.710000] ath: Country alpha2 being used: US [ 12.710000] ath: Regpair used: 0x3a [ 12.740000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht' [ 12.740000] ieee80211 phy0: Atheros AR9100 MAC/BB Rev:7 AR2133 RF Rev:a2 mem=0xb80c0000, irq=2 [ 12.750000] cfg80211: Regulatory domain changed to country: US [ 12.760000] cfg80211: DFS Master region: FCC [ 12.760000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) [ 12.770000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 3000 mBm), (N/A) [ 12.780000] cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 1700 mBm), (N/A) [ 12.790000] cfg80211: (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2300 mBm), (0 s) [ 12.800000] cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2300 mBm), (0 s) [ 12.810000] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 3000 mBm), (N/A) [ 12.810000] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 4000 mBm), (N/A) [ 29.370000] ar71xx: pll_reg 0xb8050014: 0x1a000000 [ 29.390000] eth0: link up (1000Mbps/Full duplex) [ 29.410000] device eth0 entered promiscuous mode [ 29.450000] device eth0.1 entered promiscuous mode [ 29.460000] br-client: port 1(eth0.1) entered forwarding state [ 29.460000] br-client: port 1(eth0.1) entered forwarding state [ 29.570000] device eth0.2 entered promiscuous mode [ 29.640000] br-wan: port 1(eth0.2) entered forwarding state [ 29.640000] br-wan: port 1(eth0.2) entered forwarding state [ 29.660000] device br-client entered promiscuous mode [ 30.460000] random: nonblocking pool is initialized [ 31.460000] br-client: port 1(eth0.1) entered forwarding state [ 31.640000] br-wan: port 1(eth0.2) entered forwarding state [ 31.940000] cfg80211: Regulatory domain changed to country: DE [ 31.950000] cfg80211: DFS Master region: ETSI [ 31.950000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) [ 31.960000] cfg80211: (2400000 KHz - 2483000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 31.970000] cfg80211: (5150000 KHz - 5250000 KHz @ 80000 KHz, 200000 KHz AUTO), (N/A, 2000 mBm), (N/A) [ 31.980000] cfg80211: (5250000 KHz - 5350000 KHz @ 80000 KHz, 200000 KHz AUTO), (N/A, 2000 mBm), (0 s) [ 31.990000] cfg80211: (5470000 KHz - 5725000 KHz @ 160000 KHz), (N/A, 2700 mBm), (0 s) [ 32.000000] cfg80211: (57000000 KHz - 66000000 KHz @ 2160000 KHz), (N/A, 4000 mBm), (N/A) [ 32.870000] batman_adv: bat0: Adding interface: mesh-vpn [ 32.870000] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1312) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.900000] batman_adv: bat0: Interface activated: mesh-vpn [ 32.900000] 8021q: adding VLAN 0 to HW filter on device bat0 [ 32.940000] batman_adv: bat0: no_rebroadcast: Changing from: disabled to: enabled [ 32.950000] device bat0 entered promiscuous mode [ 32.950000] br-client: port 2(bat0) entered forwarding state [ 32.960000] br-client: port 2(bat0) entered forwarding state [ 34.240000] batman_adv: bat0: Changing gw mode from: off to: client [ 34.430000] batman_adv: bat0: gw_sel_class: Changing from: 20 to: 1 [ 34.430000] batman_adv: bat0: hop_penalty: Changing from: 30 to: 15 [ 34.490000] batman_adv: bat0: multicast_mode: Changing from: enabled to: disabled [ 34.490000] batman_adv: bat0: orig_interval: Changing from: 1000 to: 5000 [ 34.960000] br-client: port 2(bat0) entered forwarding state [ 35.270000] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready [ 35.360000] device client0 entered promiscuous mode [ 35.430000] br-client: port 3(client0) entered forwarding state [ 35.430000] br-client: port 3(client0) entered forwarding state [ 35.440000] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes read y [ 36.360000] IPv6: ADDRCONF(NETDEV_UP): ibss0: link is not ready [ 36.420000] ibss0: Created IBSS using preconfigured BSSID 02:ca:ff:ee:ba:bf [ 36.430000] ibss0: Creating new IBSS network, BSSID 02:ca:ff:ee:ba:bf [ 36.430000] IPv6: ADDRCONF(NETDEV_CHANGE): ibss0: link becomes ready [ 36.770000] batman_adv: bat0: Adding interface: ibss0 [ 36.780000] batman_adv: bat0: Interface activated: ibss0 [ 37.430000] br-client: port 3(client0) entered forwarding state
##########################################
Hier in dieser "Sitzung" habe ich mit meinem Samsung Galaxy S3 wifi aktiviert hab, dann wieder ausgemacht, während er Zeitgleich mit seinem Samsung GT-I9060I/DS immer nur kurze Verbindung auf/abbau hatte. Er konnte zwischendurch z.B. bei Youtube was streamen, dann hatter wieder einen Abbruch. Um dann später wieder eine kurze Verbindung hatte, die dann schnell wieder abbricht.
root@ffnw-tverrbjelke-d85d4c9c2f6e:~# logread Sat Apr 2 19:59:32 2016 daemon.notice netifd: Network device 'client0' link is up Sat Apr 2 19:59:32 2016 daemon.notice netifd: Network device 'ibss0' link is up Sat Apr 2 19:59:32 2016 daemon.notice netifd: Interface 'ibss_radio0' is enabled Sat Apr 2 19:59:32 2016 daemon.notice netifd: Interface 'ibss_radio0' has link connectivity Sat Apr 2 19:59:32 2016 daemon.notice netifd: Interface 'ibss_radio0' is setting up now Sat Apr 2 19:59:32 2016 daemon.info dnsmasq[1604]: started, version 2.73 cachesize 150 Sat Apr 2 19:59:32 2016 daemon.info dnsmasq[1604]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify Sat Apr 2 19:59:32 2016 daemon.info dnsmasq[1604]: DNS service limited to local subnets Sat Apr 2 19:59:32 2016 daemon.info dnsmasq[1604]: using local addresses only for domain lan Sat Apr 2 19:59:32 2016 daemon.warn dnsmasq[1604]: no servers found in /tmp/resolv.conf.auto, will retry Sat Apr 2 19:59:32 2016 daemon.info dnsmasq[1604]: read /etc/hosts - 1 addresses Sat Apr 2 19:59:33 2016 kern.info kernel: [ 36.770000] batman_adv: bat0: Adding interface: ibss0 Sat Apr 2 19:59:33 2016 kern.info kernel: [ 36.780000] batman_adv: bat0: Interface activated: ibss0 Sat Apr 2 19:59:33 2016 daemon.notice netifd: Interface 'ibss_radio0' is now up Sat Apr 2 19:59:33 2016 user.notice firewall: Reloading firewall due to ifup of wan (br-wan) Sat Apr 2 19:59:33 2016 kern.info kernel: [ 37.430000] br-client: port 3(client0) entered forwarding state Sat Apr 2 19:59:34 2016 daemon.info dnsmasq[1092]: reading /var/gluon/wan-dnsmasq/resolv.conf Sat Apr 2 19:59:34 2016 daemon.info dnsmasq[1092]: using nameserver 192.168.2.1#53 Sat Apr 2 19:59:37 2016 daemon.notice netifd: Interface 'client' is now up Sat Apr 2 19:59:39 2016 user.notice firewall: Reloading firewall due to ifup of client (br-client) Sat Apr 2 19:59:40 2016 daemon.notice netifd: Interface 'wan6' is now u p Sat Apr 2 19:59:41 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (br-wan) Sat Apr 2 19:59:42 2016 daemon.info dnsmasq[1092]: reading /var/gluon/wan-dnsmasq/resolv.conf Sat Apr 2 19:59:42 2016 daemon.info dnsmasq[1092]: using nameserver fd00::3681:c4ff:fede:80af#53 Sat Apr 2 19:59:42 2016 daemon.info dnsmasq[1092]: using nameserver 192.168.2.1#53 Sat Apr 2 19:59:48 2016 daemon.info fastd[1388]: resolving host `srv12.ffnw.de' for peer <mesh_vpn_backbone_peer_srv12>... Sat Apr 2 19:59:48 2016 daemon.info fastd[1388]: resolved host `srv12.ffnw.de' successfully Sat Apr 2 19:59:48 2016 daemon.info fastd[1388]: resolving host `srv10.ffnw.de' for peer <mesh_vpn_backbone_peer_srv10>... Sat Apr 2 19:59:48 2016 daemon.info fastd[1388]: resolved host `srv10.ffnw.de' successfully Sat Apr 2 19:59:49 2016 daemon.info fastd[1388]: resolving host `srv04.ffnw.de' for peer <mesh_vpn_backbone_peer_srv04>... Sat Apr 2 19:59:49 2016 daemon.info fastd[1388]: resolved host `srv04.ffnw.de' successfully Sat Apr 2 19:59:51 2016 daemon.info fastd[1388]: resolving host `srv11.ffnw.de' for peer <mesh_vpn_backbone_peer_srv11>... Sat Apr 2 19:59:51 2016 daemon.info fastd[1388]: resolved host `srv11.ffnw.de' successfully Sat Apr 2 19:59:54 2016 daemon.info fastd[1388]: resolving host `srv06.ffnw.de' for peer <mesh_vpn_backbone_peer_srv06>... Sat Apr 2 19:59:54 2016 daemon.info fastd[1388]: resolved host `srv06.ffnw.de' successfully Sat Apr 2 20:00:06 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv12>[[2001:4ba0:fffa:23::]:11111]... Sat Apr 2 20:00:07 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv10>[[2a00:12d8:200a:2::48]:11111]... Sat Apr 2 20:00:09 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv11>[[2a00:12d8:200a:2::47]:11111]... Sat Apr 2 20:00:09 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv04>[[2a03:4000:6:4022::1]:11111]... Sat Apr 2 20:00:16 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111]... Sat Apr 2 20:00:16 2016 daemon.info fastd[1388]: received handshake response from <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111] using fastd v17 Sat Apr 2 20:00:17 2016 daemon.info fastd[1388]: [2001:4ba0:fffa:65::1]:11111 authorized as <mesh_vpn_backbone_peer_srv06
Sat Apr 2 20:00:17 2016 daemon.notice fastd[1388]: connection with <mesh_vpn_backbone_peer_srv06> established. Sat Apr 2 20:00:17 2016 daemon.info fastd[1388]: new session with <mesh_vpn_backbone_peer_srv06> established using method `salsa2012+umac' . Sat Apr 2 20:00:21 2016 daemon.info dnsmasq[1604]: reading /tmp/resolv.conf.auto Sat Apr 2 20:00:21 2016 daemon.info dnsmasq[1604]: using local addresses only for domain lan Sat Apr 2 20:00:21 2016 daemon.info dnsmasq[1604]: using nameserver 2a03:4000:6:8025::1#53 Sat Apr 2 20:00:21 2016 user.notice firewall: Reloading firewall due to ifupdate of client (br-client) Mon Apr 11 08:50:22 2016 daemon.notice hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: did not acknowledge authentication respon se Mon Apr 11 08:50:22 2016 daemon.notice hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: did not acknowledge authentication respon se Mon Apr 11 08:50:22 2016 daemon.info hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: associated (aid 1) Mon Apr 11 08:50:22 2016 daemon.info hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: authenticated Mon Apr 11 08:50:22 2016 daemon.info hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: associated (aid 1) Mon Apr 11 08:55:40 2016 daemon.info hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: disassociated due to inactivity Mon Apr 11 08:55:40 2016 daemon.info hostapd: client0: STA 20:54:76:cf:42:0b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:00:27 2016 daemon.notice hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: did not acknowledge authentication respon se Mon Apr 11 09:01:25 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:01:25 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:04:03 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: authenticated Mon Apr 11 09:04:03 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: associated (aid 2) Mon Apr 11 09:04:03 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: authenticated Mon Apr 11 09:04:03 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: associated (aid 2) Mon Apr 11 09:04:27 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:04:27 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:05:30 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: disassociated due to inactivity Mon Apr 11 09:05:31 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:08:49 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: disconnected due to excessive missing ACK s Mon Apr 11 09:09:19 2016 daemon.info hostapd: client0: STA c0:bd:d1:85:39:53 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:09:26 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:09:26 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:12:15 2016 daemon.info hostapd: client0: STA d0:87:e2:7a:e5:ed IEEE 802.11: authenticated Mon Apr 11 09:12:15 2016 daemon.info hostapd: client0: STA d0:87:e2:7a:e5:ed IEEE 802.11: associated (aid 2) Mon Apr 11 09:13:07 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:13:07 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:13:24 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:13:24 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:14:16 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:14:16 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:14:20 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:14:20 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:14:50 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:14:50 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:16:03 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:16:03 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:17:34 2016 daemon.info hostapd: client0: STA d0:87:e2:7a:e5:ed IEEE 802.11: disassociated due to inactivity Mon Apr 11 09:17:35 2016 daemon.info hostapd: client0: STA d0:87:e2:7a:e5:ed IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:20:19 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:20:19 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:20:42 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:20:42 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:20:54 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:20:54 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:21:14 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:21:14 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:22:53 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:22:53 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:24:09 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: authenticated Mon Apr 11 09:24:10 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: authenticated Mon Apr 11 09:24:10 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: associated (aid 2) Mon Apr 11 09:29:38 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: disassociated due to inactivity Mon Apr 11 09:29:39 2016 daemon.info hostapd: client0: STA b8:5a:73:65:c3:ae IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:31:36 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: authenticated Mon Apr 11 09:31:36 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: associated (aid 2) Mon Apr 11 09:31:52 2016 authpriv.info dropbear[4133]: Child connection from fe80::21d:7dff:fe04:3234%br-wan:45438 Mon Apr 11 09:32:01 2016 authpriv.notice dropbear[4133]: Pubkey auth succeeded for 'root' with key md5 6a:0c:52:57:e7:99:f6:d8:25:72:ae:01:f8:3a:86:bc from fe80::21d:7dff:fe04:3234%br-wan:45438 Mon Apr 11 09:32:07 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: disassociated Mon Apr 11 09:32:08 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:32:11 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: authenticated Mon Apr 11 09:32:11 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: associated (aid 2) Mon Apr 11 09:33:46 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:33:46 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:33:57 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:33:57 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:38:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:38:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:38:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:38:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:38:12 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:38:12 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:38:51 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:38:51 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:39:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:39:09 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:39:22 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:39:22 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:39:37 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:39:37 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:40:00 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:40:00 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:40:13 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: disassociated Mon Apr 11 09:40:14 2016 daemon.info hostapd: client0: STA 60:21:c0:70:68:62 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Mon Apr 11 09:40:21 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:40:21 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:40:35 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:40:35 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:40:44 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:40:44 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:40:47 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:40:47 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:41:02 2016 daemon.info fastd[1388]: refreshing session with <mesh_vpn_backbone_peer_srv06> Mon Apr 11 09:41:03 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111]... Mon Apr 11 09:41:03 2016 daemon.info fastd[1388]: received handshake response from <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111] using fastd v17 Mon Apr 11 09:41:03 2016 daemon.info fastd[1388]: [2001:4ba0:fffa:65::1]:11111 authorized as <mesh_vpn_backbone_peer_srv06
Mon Apr 11 09:41:03 2016 daemon.info fastd[1388]: new session with <mesh_vpn_backbone_peer_srv06> established using method `salsa2012+umac' . Mon Apr 11 09:41:06 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:41:06 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:41:24 2016 daemon.info fastd[1388]: sending handshake to <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111]... Mon Apr 11 09:41:24 2016 daemon.info fastd[1388]: received handshake response from <mesh_vpn_backbone_peer_srv06>[[2001:4ba0:fffa:65::1]:11111] using fastd v17 Mon Apr 11 09:41:25 2016 daemon.info fastd[1388]: [2001:4ba0:fffa:65::1]:11111 authorized as <mesh_vpn_backbone_peer_srv06
Mon Apr 11 09:41:25 2016 daemon.info fastd[1388]: new session with <mesh_vpn_backbone_peer_srv06> established using method `salsa2012+umac' . Mon Apr 11 09:41:28 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:41:29 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:42:05 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:42:05 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:42:19 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:42:19 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:42:21 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:42:21 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:42:42 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:42:42 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1) Mon Apr 11 09:43:18 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: authenticated Mon Apr 11 09:43:18 2016 daemon.info hostapd: client0: STA 00:90:4c:c5:12:38 IEEE 802.11: associated (aid 1)