Skip to content

Instantly share code, notes, and snippets.

@glamrock
Created October 11, 2013 14:34
Show Gist options
  • Save glamrock/6935712 to your computer and use it in GitHub Desktop.
Save glamrock/6935712 to your computer and use it in GitHub Desktop.
debuginfo before wireless crash (tp-link N750 / WDR4300)
Sat Sep 10 19:53:45 UTC 2011
--------------------------------------------------------------------
BEGIN DEBUGGING INFO
--------------------------------------------------------------------
--------------------------------------------------------------------
IP Routing Table: (route -n)
--------------------------------------------------------------------
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br-plug
--------------------------------------------------------------------
IP Routing Tables (ip route list table all):
--------------------------------------------------------------------
192.168.1.0/24 dev br-plug proto kernel scope link src 192.168.1.20
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
broadcast 192.168.1.0 dev br-plug table local proto kernel scope link src 192.168.1.20
local 192.168.1.20 dev br-plug table local proto kernel scope host src 192.168.1.20
broadcast 192.168.1.255 dev br-plug table local proto kernel scope link src 192.168.1.20
fe80::/64 dev br-plug proto kernel metric 256
unreachable default dev lo table unspec proto kernel metric -1 error -128 hoplimit 255
local ::1 via :: dev lo table local proto none metric 0
local fe80:: via :: dev lo table local proto none metric 0
local fe80::a2f3:c1ff:fef8:8a94 via :: dev lo table local proto none metric 0
ff00::/8 dev br-plug table local metric 256
unreachable default dev lo table unspec proto kernel metric -1 error -128 hoplimit 255
--------------------------------------------------------------------
JSON INFO:(wget http://localhost:2006)
--------------------------------------------------------------------
--------------------------------------------------------------------
IP Routing Table's for Smart Gateway:(ip route ls table [224 & 223])
--------------------------------------------------------------------
---------------OLSRd Standard Default Route---------------------
---------------Smart Gateway Default Route---------------------
--------------------------------------------------------------------
radio1 scan
--------------------------------------------------------------------
Cell 01 - Address: DC:9F:DB:1B:9F:21
ESSID: "OTISTAFF5"
Mode: Master Channel: 36
Signal: -37 dBm Quality: 70/70
Encryption: WPA2 PSK (CCMP)
Cell 02 - Address: DC:9F:DB:1B:9F:7F
ESSID: "OTISTAFF5"
Mode: Master Channel: 48
Signal: -55 dBm Quality: 55/70
Encryption: WPA2 PSK (CCMP)
Cell 03 - Address: 00:03:52:5E:79:E0
ESSID: "NAFGUEST"
Mode: Master Channel: 153
Signal: -61 dBm Quality: 49/70
Encryption: none
Cell 04 - Address: 00:03:52:5E:79:E1
ESSID: "NAFSTAFF"
Mode: Master Channel: 153
Signal: -62 dBm Quality: 48/70
Encryption: WEP Open/Shared (WEP-40, WEP-104)
Cell 05 - Address: 00:03:52:5E:79:E2
ESSID: "NAFWPA"
Mode: Master Channel: 153
Signal: -61 dBm Quality: 49/70
Encryption: mixed WPA/WPA2 PSK (TKIP, CCMP)
Cell 06 - Address: 58:35:D9:7B:54:10
ESSID: "LSKS_Wireless"
Mode: Master Channel: 157
Signal: -84 dBm Quality: 26/70
Encryption: WPA PSK (TKIP)
Cell 07 - Address: 00:03:52:5E:73:30
ESSID: "NAFGUEST"
Mode: Master Channel: 165
Signal: -72 dBm Quality: 38/70
Encryption: none
Cell 08 - Address: 00:03:52:5E:73:31
ESSID: "NAFSTAFF"
Mode: Master Channel: 165
Signal: -73 dBm Quality: 37/70
Encryption: WEP Open/Shared (WEP-40, WEP-104)
Cell 09 - Address: 00:03:52:5E:73:32
ESSID: "NAFWPA"
Mode: Master Channel: 165
Signal: -73 dBm Quality: 37/70
Encryption: mixed WPA/WPA2 PSK (TKIP, CCMP)
--------------------------------------------------------------------
IP Filter Tables: (iptables -nvL)
--------------------------------------------------------------------
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
1252 112K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
551 37444 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
1290 58984 syn_flood tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
1477 68223 input_rule all -- * * 0.0.0.0/0 0.0.0.0/0
1477 68223 input all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 forwarding_rule all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forward all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2217 169K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
551 37444 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
290 10589 output_rule all -- * * 0.0.0.0/0 0.0.0.0/0
289 10553 output all -- * * 0.0.0.0/0 0.0.0.0/0
Chain forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_lan_forward all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain forwarding_ap (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_lan (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_mesh (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_secAp (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_vpn (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_wan (1 references)
pkts bytes target prot opt in out source destination
Chain input (1 references)
pkts bytes target prot opt in out source destination
1457 67287 zone_lan all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain input_ap (1 references)
pkts bytes target prot opt in out source destination
Chain input_lan (1 references)
pkts bytes target prot opt in out source destination
Chain input_mesh (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_secAp (1 references)
pkts bytes target prot opt in out source destination
Chain input_vpn (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan (1 references)
pkts bytes target prot opt in out source destination
Chain output (1 references)
pkts bytes target prot opt in out source destination
289 10553 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
10 360 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
9 324 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
8 288 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
7 252 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
6 216 zone_vpn_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain reject (2 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
1123 51300 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
167 7684 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_ap (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 input_ap all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_ap_ACCEPT (5 references)
pkts bytes target prot opt in out source destination
Chain zone_ap_DROP (1 references)
pkts bytes target prot opt in out source destination
Chain zone_ap_REJECT (0 references)
pkts bytes target prot opt in out source destination
Chain zone_ap_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_ap all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_ap_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
81 4764 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
75 4484 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
1 44 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698
10 1630 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
1288 56277 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
1288 56277 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_ACCEPT (5 references)
pkts bytes target prot opt in out source destination
278 10157 ACCEPT all -- * br-plug 0.0.0.0/0 0.0.0.0/0
1288 56277 ACCEPT all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (1 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * br-plug 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_REJECT (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * br-plug 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_mesh (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 input_mesh all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_mesh_ACCEPT (6 references)
pkts bytes target prot opt in out source destination
Chain zone_mesh_DROP (1 references)
pkts bytes target prot opt in out source destination
Chain zone_mesh_REJECT (0 references)
pkts bytes target prot opt in out source destination
Chain zone_mesh_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_mesh all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_secAp (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8082
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 input_secAp all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_secAp_ACCEPT (5 references)
pkts bytes target prot opt in out source destination
Chain zone_secAp_DROP (1 references)
pkts bytes target prot opt in out source destination
Chain zone_secAp_REJECT (0 references)
pkts bytes target prot opt in out source destination
Chain zone_secAp_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 zone_ap_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_secAp_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_mesh_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 forwarding_secAp all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_secAp_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_vpn (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 input_vpn all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_vpn_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_vpn_ACCEPT (1 references)
pkts bytes target prot opt in out source destination
Chain zone_vpn_DROP (2 references)
pkts bytes target prot opt in out source destination
Chain zone_vpn_REJECT (0 references)
pkts bytes target prot opt in out source destination
Chain zone_vpn_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_vpn all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_vpn_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:698
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_ACCEPT (5 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_DROP (2 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_REJECT (0 references)
pkts bytes target prot opt in out source destination
Chain zone_wan_forward (0 references)
pkts bytes target prot opt in out source destination
0 0 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 zone_wan_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
--------------------------------------------------------------------
IP NAT Filter Table: (iptables -t nat -nvL)
--------------------------------------------------------------------
Chain PREROUTING (policy ACCEPT 1302 packets, 61002 bytes)
pkts bytes target prot opt in out source destination
1311 61542 prerouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
1302 61002 zone_lan_prerouting all -- br-plug * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 1135 packets, 53318 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 530 packets, 36006 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 530 packets, 36006 bytes)
pkts bytes target prot opt in out source destination
554 37638 postrouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
3 194 zone_lan_nat all -- * br-plug 0.0.0.0/0 0.0.0.0/0
Chain postrouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_ap (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_lan (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_mesh (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_rule (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_secAp (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_vpn (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_wan (1 references)
pkts bytes target prot opt in out source destination
Chain zone_ap_nat (0 references)
pkts bytes target prot opt in out source destination
Chain zone_ap_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_ap all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_lan_prerouting (1 references)
pkts bytes target prot opt in out source destination
1302 61002 prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_mesh_nat (0 references)
pkts bytes target prot opt in out source destination
Chain zone_mesh_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_mesh all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_secAp_nat (0 references)
pkts bytes target prot opt in out source destination
Chain zone_secAp_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_secAp all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_vpn_nat (0 references)
pkts bytes target prot opt in out source destination
Chain zone_vpn_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_vpn all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_nat (0 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_prerouting (0 references)
pkts bytes target prot opt in out source destination
0 0 prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0
--------------------------------------------------------------------
IP Routing Rules: (ip rule show)
--------------------------------------------------------------------
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
--------------------------------------------------------------------
UCI Firewall Rules: (uci show firewall)
--------------------------------------------------------------------
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=DROP
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=DROP
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=DROP
firewall.@zone[0].network=plug
firewall.@zone[1]=zone
firewall.@zone[1].name=ap
firewall.@zone[1].input=ACCEPT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=DROP
firewall.@zone[1].network=ap
firewall.@zone[2]=zone
firewall.@zone[2].name=secAp
firewall.@zone[2].input=ACCEPT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].forward=DROP
firewall.@zone[2].network=secAp
firewall.@zone[3]=zone
firewall.@zone[3].name=mesh
firewall.@zone[3].input=ACCEPT
firewall.@zone[3].output=ACCEPT
firewall.@zone[3].forward=DROP
firewall.@zone[3].network=mesh
firewall.@zone[4]=zone
firewall.@zone[4].name=wan
firewall.@zone[4].input=DROP
firewall.@zone[4].output=ACCEPT
firewall.@zone[4].forward=DROP
firewall.@zone[4].masq=1
firewall.@zone[4].network=wan
firewall.@zone[5]=zone
firewall.@zone[5].name=vpn
firewall.@zone[5].input=DROP
firewall.@zone[5].output=ACCEPT
firewall.@zone[5].forward=DROP
firewall.@zone[5].network=vpn
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=ap
firewall.@forwarding[0].dest=mesh
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src=ap
firewall.@forwarding[1].dest=ap
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].src=secAp
firewall.@forwarding[2].dest=mesh
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].src=secAp
firewall.@forwarding[3].dest=secAp
firewall.@forwarding[4]=forwarding
firewall.@forwarding[4].src=mesh
firewall.@forwarding[4].dest=mesh
firewall.@forwarding[5]=forwarding
firewall.@forwarding[5].src=lan
firewall.@forwarding[5].dest=lan
firewall.@forwarding[6]=forwarding
firewall.@forwarding[6].src=ap
firewall.@forwarding[6].dest=wan
firewall.@forwarding[7]=forwarding
firewall.@forwarding[7].src=secAp
firewall.@forwarding[7].dest=wan
firewall.@forwarding[8]=forwarding
firewall.@forwarding[8].src=mesh
firewall.@forwarding[8].dest=wan
firewall.@forwarding[9]=forwarding
firewall.@forwarding[9].src=lan
firewall.@forwarding[9].dest=mesh
firewall.@forwarding[10]=forwarding
firewall.@forwarding[10].src=lan
firewall.@forwarding[10].dest=wan
firewall.@forwarding[11]=forwarding
firewall.@forwarding[11].src=lan
firewall.@forwarding[11].dest=ap
firewall.@forwarding[12]=forwarding
firewall.@forwarding[12].src=ap
firewall.@forwarding[12].dest=lan
firewall.@forwarding[13]=forwarding
firewall.@forwarding[13].src=lan
firewall.@forwarding[13].dest=secAp
firewall.@forwarding[14]=forwarding
firewall.@forwarding[14].src=secAp
firewall.@forwarding[14].dest=lan
firewall.@forwarding[15]=forwarding
firewall.@forwarding[15].src=ap
firewall.@forwarding[15].dest=secAp
firewall.@forwarding[16]=forwarding
firewall.@forwarding[16].src=secAp
firewall.@forwarding[16].dest=ap
firewall.@rule[0]=rule
firewall.@rule[0].src=wan
firewall.@rule[0].dest_port=22
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].proto=tcp
firewall.@rule[1]=rule
firewall.@rule[1].src=mesh
firewall.@rule[1].dest_port=22
firewall.@rule[1].target=ACCEPT
firewall.@rule[1].proto=tcp
firewall.@rule[2]=rule
firewall.@rule[2].src=lan
firewall.@rule[2].dest_port=22
firewall.@rule[2].target=ACCEPT
firewall.@rule[2].proto=tcp
firewall.@rule[3]=rule
firewall.@rule[3].src=vpn
firewall.@rule[3].dest_port=22
firewall.@rule[3].target=ACCEPT
firewall.@rule[3].proto=tcp
firewall.@rule[4]=rule
firewall.@rule[4].src=mesh
firewall.@rule[4].dest_port=53
firewall.@rule[4].target=ACCEPT
firewall.@rule[4].proto=tcpudp
firewall.@rule[5]=rule
firewall.@rule[5].src=lan
firewall.@rule[5].dest_port=53
firewall.@rule[5].target=ACCEPT
firewall.@rule[5].proto=tcpudp
firewall.@rule[6]=rule
firewall.@rule[6].src=ap
firewall.@rule[6].dest_port=53
firewall.@rule[6].target=ACCEPT
firewall.@rule[6].proto=tcpudp
firewall.@rule[7]=rule
firewall.@rule[7].src=secAp
firewall.@rule[7].dest_port=53
firewall.@rule[7].target=ACCEPT
firewall.@rule[7].proto=tcpudp
firewall.@rule[8]=rule
firewall.@rule[8].src=lan
firewall.@rule[8].dest_port=80
firewall.@rule[8].target=ACCEPT
firewall.@rule[8].proto=tcp
firewall.@rule[9]=rule
firewall.@rule[9].src=wan
firewall.@rule[9].dest_port=80
firewall.@rule[9].target=ACCEPT
firewall.@rule[9].proto=tcp
firewall.@rule[10]=rule
firewall.@rule[10].src=ap
firewall.@rule[10].dest_port=80
firewall.@rule[10].target=ACCEPT
firewall.@rule[10].proto=tcp
firewall.@rule[11]=rule
firewall.@rule[11].src=secAp
firewall.@rule[11].dest_port=80
firewall.@rule[11].target=ACCEPT
firewall.@rule[11].proto=tcp
firewall.@rule[12]=rule
firewall.@rule[12].src=vpn
firewall.@rule[12].dest_port=80
firewall.@rule[12].target=ACCEPT
firewall.@rule[12].proto=tcp
firewall.@rule[13]=rule
firewall.@rule[13].src=ap
firewall.@rule[13].dest_port=443
firewall.@rule[13].target=ACCEPT
firewall.@rule[13].proto=tcp
firewall.@rule[14]=rule
firewall.@rule[14].src=secAp
firewall.@rule[14].dest_port=443
firewall.@rule[14].target=ACCEPT
firewall.@rule[14].proto=tcp
firewall.@rule[15]=rule
firewall.@rule[15].src=lan
firewall.@rule[15].dest_port=443
firewall.@rule[15].target=ACCEPT
firewall.@rule[15].proto=tcp
firewall.@rule[16]=rule
firewall.@rule[16].src=vpn
firewall.@rule[16].dest_port=443
firewall.@rule[16].target=ACCEPT
firewall.@rule[16].proto=tcp
firewall.@rule[17]=rule
firewall.@rule[17].src=ap
firewall.@rule[17].dest_port=22
firewall.@rule[17].target=ACCEPT
firewall.@rule[17].proto=tcp
firewall.@rule[18]=rule
firewall.@rule[18].src=secAp
firewall.@rule[18].dest_port=22
firewall.@rule[18].target=ACCEPT
firewall.@rule[18].proto=tcp
firewall.@rule[19]=rule
firewall.@rule[19].src=ap
firewall.@rule[19].dest_port=8082
firewall.@rule[19].target=ACCEPT
firewall.@rule[19].proto=tcp
firewall.@rule[20]=rule
firewall.@rule[20].src=secAp
firewall.@rule[20].dest_port=8082
firewall.@rule[20].target=ACCEPT
firewall.@rule[20].proto=tcp
firewall.@rule[21]=rule
firewall.@rule[21].src=lan
firewall.@rule[21].dest_port=8082
firewall.@rule[21].target=ACCEPT
firewall.@rule[21].proto=tcp
firewall.@rule[22]=rule
firewall.@rule[22].src=mesh
firewall.@rule[22].dest_port=698
firewall.@rule[22].target=ACCEPT
firewall.@rule[22].proto=udp
firewall.@rule[23]=rule
firewall.@rule[23].src=wan
firewall.@rule[23].dest_port=698
firewall.@rule[23].target=ACCEPT
firewall.@rule[23].proto=udp
firewall.@rule[24]=rule
firewall.@rule[24].src=lan
firewall.@rule[24].dest_port=698
firewall.@rule[24].target=ACCEPT
firewall.@rule[24].proto=udp
firewall.@rule[25]=rule
firewall.@rule[25].src=mesh
firewall.@rule[25].proto=icmp
firewall.@rule[25].target=ACCEPT
firewall.@rule[26]=rule
firewall.@rule[26].src=lan
firewall.@rule[26].proto=icmp
firewall.@rule[26].target=ACCEPT
firewall.@rule[27]=rule
firewall.@rule[27].src=wan
firewall.@rule[27].proto=icmp
firewall.@rule[27].target=ACCEPT
firewall.@rule[28]=rule
firewall.@rule[28].src=ap
firewall.@rule[28].proto=icmp
firewall.@rule[28].target=ACCEPT
firewall.@rule[29]=rule
firewall.@rule[29].src=secAp
firewall.@rule[29].proto=icmp
firewall.@rule[29].target=ACCEPT
firewall.@rule[30]=rule
firewall.@rule[30].src=vpn
firewall.@rule[30].proto=icmp
firewall.@rule[30].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.freifunk
--------------------------------------------------------------------
UCI Firewall Current State: (uci show -p /var/state firewall)
--------------------------------------------------------------------
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=DROP
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=DROP
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=DROP
firewall.@zone[0].network=plug
firewall.@zone[1]=zone
firewall.@zone[1].name=ap
firewall.@zone[1].input=ACCEPT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=DROP
firewall.@zone[1].network=ap
firewall.@zone[2]=zone
firewall.@zone[2].name=secAp
firewall.@zone[2].input=ACCEPT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].forward=DROP
firewall.@zone[2].network=secAp
firewall.@zone[3]=zone
firewall.@zone[3].name=mesh
firewall.@zone[3].input=ACCEPT
firewall.@zone[3].output=ACCEPT
firewall.@zone[3].forward=DROP
firewall.@zone[3].network=mesh
firewall.@zone[4]=zone
firewall.@zone[4].name=wan
firewall.@zone[4].input=DROP
firewall.@zone[4].output=ACCEPT
firewall.@zone[4].forward=DROP
firewall.@zone[4].masq=1
firewall.@zone[4].network=wan
firewall.@zone[5]=zone
firewall.@zone[5].name=vpn
firewall.@zone[5].input=DROP
firewall.@zone[5].output=ACCEPT
firewall.@zone[5].forward=DROP
firewall.@zone[5].network=vpn
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=ap
firewall.@forwarding[0].dest=mesh
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src=ap
firewall.@forwarding[1].dest=ap
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].src=secAp
firewall.@forwarding[2].dest=mesh
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].src=secAp
firewall.@forwarding[3].dest=secAp
firewall.@forwarding[4]=forwarding
firewall.@forwarding[4].src=mesh
firewall.@forwarding[4].dest=mesh
firewall.@forwarding[5]=forwarding
firewall.@forwarding[5].src=lan
firewall.@forwarding[5].dest=lan
firewall.@forwarding[6]=forwarding
firewall.@forwarding[6].src=ap
firewall.@forwarding[6].dest=wan
firewall.@forwarding[7]=forwarding
firewall.@forwarding[7].src=secAp
firewall.@forwarding[7].dest=wan
firewall.@forwarding[8]=forwarding
firewall.@forwarding[8].src=mesh
firewall.@forwarding[8].dest=wan
firewall.@forwarding[9]=forwarding
firewall.@forwarding[9].src=lan
firewall.@forwarding[9].dest=mesh
firewall.@forwarding[10]=forwarding
firewall.@forwarding[10].src=lan
firewall.@forwarding[10].dest=wan
firewall.@forwarding[11]=forwarding
firewall.@forwarding[11].src=lan
firewall.@forwarding[11].dest=ap
firewall.@forwarding[12]=forwarding
firewall.@forwarding[12].src=ap
firewall.@forwarding[12].dest=lan
firewall.@forwarding[13]=forwarding
firewall.@forwarding[13].src=lan
firewall.@forwarding[13].dest=secAp
firewall.@forwarding[14]=forwarding
firewall.@forwarding[14].src=secAp
firewall.@forwarding[14].dest=lan
firewall.@forwarding[15]=forwarding
firewall.@forwarding[15].src=ap
firewall.@forwarding[15].dest=secAp
firewall.@forwarding[16]=forwarding
firewall.@forwarding[16].src=secAp
firewall.@forwarding[16].dest=ap
firewall.@rule[0]=rule
firewall.@rule[0].src=wan
firewall.@rule[0].dest_port=22
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].proto=tcp
firewall.@rule[1]=rule
firewall.@rule[1].src=mesh
firewall.@rule[1].dest_port=22
firewall.@rule[1].target=ACCEPT
firewall.@rule[1].proto=tcp
firewall.@rule[2]=rule
firewall.@rule[2].src=lan
firewall.@rule[2].dest_port=22
firewall.@rule[2].target=ACCEPT
firewall.@rule[2].proto=tcp
firewall.@rule[3]=rule
firewall.@rule[3].src=vpn
firewall.@rule[3].dest_port=22
firewall.@rule[3].target=ACCEPT
firewall.@rule[3].proto=tcp
firewall.@rule[4]=rule
firewall.@rule[4].src=mesh
firewall.@rule[4].dest_port=53
firewall.@rule[4].target=ACCEPT
firewall.@rule[4].proto=tcpudp
firewall.@rule[5]=rule
firewall.@rule[5].src=lan
firewall.@rule[5].dest_port=53
firewall.@rule[5].target=ACCEPT
firewall.@rule[5].proto=tcpudp
firewall.@rule[6]=rule
firewall.@rule[6].src=ap
firewall.@rule[6].dest_port=53
firewall.@rule[6].target=ACCEPT
firewall.@rule[6].proto=tcpudp
firewall.@rule[7]=rule
firewall.@rule[7].src=secAp
firewall.@rule[7].dest_port=53
firewall.@rule[7].target=ACCEPT
firewall.@rule[7].proto=tcpudp
firewall.@rule[8]=rule
firewall.@rule[8].src=lan
firewall.@rule[8].dest_port=80
firewall.@rule[8].target=ACCEPT
firewall.@rule[8].proto=tcp
firewall.@rule[9]=rule
firewall.@rule[9].src=wan
firewall.@rule[9].dest_port=80
firewall.@rule[9].target=ACCEPT
firewall.@rule[9].proto=tcp
firewall.@rule[10]=rule
firewall.@rule[10].src=ap
firewall.@rule[10].dest_port=80
firewall.@rule[10].target=ACCEPT
firewall.@rule[10].proto=tcp
firewall.@rule[11]=rule
firewall.@rule[11].src=secAp
firewall.@rule[11].dest_port=80
firewall.@rule[11].target=ACCEPT
firewall.@rule[11].proto=tcp
firewall.@rule[12]=rule
firewall.@rule[12].src=vpn
firewall.@rule[12].dest_port=80
firewall.@rule[12].target=ACCEPT
firewall.@rule[12].proto=tcp
firewall.@rule[13]=rule
firewall.@rule[13].src=ap
firewall.@rule[13].dest_port=443
firewall.@rule[13].target=ACCEPT
firewall.@rule[13].proto=tcp
firewall.@rule[14]=rule
firewall.@rule[14].src=secAp
firewall.@rule[14].dest_port=443
firewall.@rule[14].target=ACCEPT
firewall.@rule[14].proto=tcp
firewall.@rule[15]=rule
firewall.@rule[15].src=lan
firewall.@rule[15].dest_port=443
firewall.@rule[15].target=ACCEPT
firewall.@rule[15].proto=tcp
firewall.@rule[16]=rule
firewall.@rule[16].src=vpn
firewall.@rule[16].dest_port=443
firewall.@rule[16].target=ACCEPT
firewall.@rule[16].proto=tcp
firewall.@rule[17]=rule
firewall.@rule[17].src=ap
firewall.@rule[17].dest_port=22
firewall.@rule[17].target=ACCEPT
firewall.@rule[17].proto=tcp
firewall.@rule[18]=rule
firewall.@rule[18].src=secAp
firewall.@rule[18].dest_port=22
firewall.@rule[18].target=ACCEPT
firewall.@rule[18].proto=tcp
firewall.@rule[19]=rule
firewall.@rule[19].src=ap
firewall.@rule[19].dest_port=8082
firewall.@rule[19].target=ACCEPT
firewall.@rule[19].proto=tcp
firewall.@rule[20]=rule
firewall.@rule[20].src=secAp
firewall.@rule[20].dest_port=8082
firewall.@rule[20].target=ACCEPT
firewall.@rule[20].proto=tcp
firewall.@rule[21]=rule
firewall.@rule[21].src=lan
firewall.@rule[21].dest_port=8082
firewall.@rule[21].target=ACCEPT
firewall.@rule[21].proto=tcp
firewall.@rule[22]=rule
firewall.@rule[22].src=mesh
firewall.@rule[22].dest_port=698
firewall.@rule[22].target=ACCEPT
firewall.@rule[22].proto=udp
firewall.@rule[23]=rule
firewall.@rule[23].src=wan
firewall.@rule[23].dest_port=698
firewall.@rule[23].target=ACCEPT
firewall.@rule[23].proto=udp
firewall.@rule[24]=rule
firewall.@rule[24].src=lan
firewall.@rule[24].dest_port=698
firewall.@rule[24].target=ACCEPT
firewall.@rule[24].proto=udp
firewall.@rule[25]=rule
firewall.@rule[25].src=mesh
firewall.@rule[25].proto=icmp
firewall.@rule[25].target=ACCEPT
firewall.@rule[26]=rule
firewall.@rule[26].src=lan
firewall.@rule[26].proto=icmp
firewall.@rule[26].target=ACCEPT
firewall.@rule[27]=rule
firewall.@rule[27].src=wan
firewall.@rule[27].proto=icmp
firewall.@rule[27].target=ACCEPT
firewall.@rule[28]=rule
firewall.@rule[28].src=ap
firewall.@rule[28].proto=icmp
firewall.@rule[28].target=ACCEPT
firewall.@rule[29]=rule
firewall.@rule[29].src=secAp
firewall.@rule[29].proto=icmp
firewall.@rule[29].target=ACCEPT
firewall.@rule[30]=rule
firewall.@rule[30].src=vpn
firewall.@rule[30].proto=icmp
firewall.@rule[30].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.freifunk
firewall.core=firewall_state
firewall.core.lan_ipv4=1
firewall.core.lan_ipv6=1
firewall.core.ap_ipv4=1
firewall.core.ap_ipv6=1
firewall.core.secAp_ipv4=1
firewall.core.secAp_ipv6=1
firewall.core.mesh_ipv4=1
firewall.core.mesh_ipv6=1
firewall.core.wan_ipv4=1
firewall.core.wan_ipv6=1
firewall.core.vpn_ipv4=1
firewall.core.vpn_ipv6=1
firewall.core.lan_networks=plug
firewall.core.plug_zone=lan
firewall.core.plug_ifname=br-plug
firewall.core.zones=lan ap secAp mesh wan vpn
firewall.core.loaded=1
--------------------------------------------------------------------
UCI Splash Info:(uci show luci_splash)
--------------------------------------------------------------------
--------------------------------------------------------------------
UCI Splash Current State:(uci show -p /var/state luci_splash)
--------------------------------------------------------------------
--------------------------------------------------------------------
Kernel Buffer Log: (dmesg)
--------------------------------------------------------------------
[ 0.000000] Linux version 3.3.8 (jenkins@ashida) (gcc version 4.6.3 20120201 (prerelease) (Linaro GCC 4.6-2012.02) ) #1 Wed Sep 25 15:05:48 EDT 2013
[ 0.000000] MyLoader: sysp=b3a3d853, boardp=492118fc, parts=f35d1cdf
[ 0.000000] bootconsole [early0] enabled
[ 0.000000] CPU revision is: 0001974c (MIPS 74Kc)
[ 0.000000] SoC: Atheros AR9344 rev 2
[ 0.000000] Clocks: CPU:560.000MHz, DDR:450.000MHz, AHB:225.000MHz, Ref:40.000MHz
[ 0.000000] Determined physical RAM map:
[ 0.000000] memory: 08000000 @ 00000000 (usable)
[ 0.000000] Initrd not found or empty - disabling initrd
[ 0.000000] Zone PFN ranges:
[ 0.000000] Normal 0x00000000 -> 0x00008000
[ 0.000000] Movable zone start PFN for each node
[ 0.000000] Early memory PFN ranges
[ 0.000000] 0: 0x00000000 -> 0x00008000
[ 0.000000] On node 0 totalpages: 32768
[ 0.000000] free_area_init_node: node 0, pgdat 802da1f0, node_mem_map 81000000
[ 0.000000] Normal zone: 256 pages used for memmap
[ 0.000000] Normal zone: 0 pages reserved
[ 0.000000] Normal zone: 32512 pages, LIFO batch:7
[ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[ 0.000000] pcpu-alloc: [0] 0
[ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
[ 0.000000] Kernel command line: board=TL-WDR4300 console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd
[ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
[ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
[ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
[ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
[ 0.000000] Writing ErrCtl register=00000000
[ 0.000000] Readback ErrCtl register=00000000
[ 0.000000] Memory: 126560k/131072k available (2134k kernel code, 4512k reserved, 403k data, 208k init, 0k highmem)
[ 0.000000] SLUB: Genslabs=9, HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[ 0.000000] NR_IRQS:51
[ 0.000000] Calibrating delay loop... 278.93 BogoMIPS (lpj=1394688)
[ 0.070000] pid_max: default: 32768 minimum: 301
[ 0.070000] Mount-cache hash table entries: 512
[ 0.080000] NET: Registered protocol family 16
[ 0.080000] gpiochip_add: registered GPIOs 0 to 22 on device: ath79
[ 0.090000] MIPS: machine is TP-LINK TL-WDR3600/4300/4310
[ 0.090000] registering PCI controller with io_map_base unset
[ 0.310000] bio: create slab <bio-0> at 0
[ 0.310000] PCI host bridge to bus 0000:00
[ 0.320000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
[ 0.320000] pci_bus 0000:00: root bus resource [io 0x0000]
[ 0.330000] pci 0000:00:00.0: [168c:0033] type 0 class 0x000280
[ 0.330000] pci 0000:00:00.0: invalid calibration data
[ 0.330000] pci 0000:00:00.0: reg 10: [mem 0x00000000-0x0001ffff 64bit]
[ 0.330000] pci 0000:00:00.0: reg 30: [mem 0x00000000-0x0000ffff pref]
[ 0.330000] pci 0000:00:00.0: supports D1
[ 0.330000] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
[ 0.330000] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit]
[ 0.340000] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref]
[ 0.340000] pci 0000:00:00.0: using irq 40 for pin 1
[ 0.350000] Switching to clocksource MIPS
[ 0.350000] NET: Registered protocol family 2
[ 0.360000] IP route cache hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.360000] TCP established hash table entries: 4096 (order: 3, 32768 bytes)
[ 0.370000] TCP bind hash table entries: 4096 (order: 2, 16384 bytes)
[ 0.370000] TCP: Hash tables configured (established 4096 bind 4096)
[ 0.380000] TCP reno registered
[ 0.380000] UDP hash table entries: 256 (order: 0, 4096 bytes)
[ 0.390000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[ 0.390000] NET: Registered protocol family 1
[ 0.400000] PCI: CLS 0 bytes, default 32
[ 0.410000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[ 0.420000] JFFS2 version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[ 0.430000] msgmni has been set to 247
[ 0.430000] io scheduler noop registered
[ 0.440000] io scheduler deadline registered (default)
[ 0.440000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
[ 0.470000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11) is a 16550A
[ 0.470000] console [ttyS0] enabled, bootconsole disabled
[ 0.490000] m25p80 spi0.0: found en25q64, expected m25p80
[ 0.490000] m25p80 spi0.0: en25q64 (8192 Kbytes)
[ 0.500000] 5 tp-link partitions found on MTD device spi0.0
[ 0.500000] Creating 5 MTD partitions on "spi0.0":
[ 0.510000] 0x000000000000-0x000000020000 : "u-boot"
[ 0.520000] 0x000000020000-0x0000001035f4 : "kernel"
[ 0.520000] mtd: partition "kernel" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only
[ 0.540000] 0x0000001035f4-0x0000007f0000 : "rootfs"
[ 0.540000] mtd: partition "rootfs" must either start or end on erase block boundary or be smaller than an erase block -- forcing read-only
[ 0.550000] mtd: partition "rootfs" set to be root filesystem
[ 0.560000] mtd: partition "rootfs_data" created automatically, ofs=660000, len=190000
[ 0.570000] 0x000000660000-0x0000007f0000 : "rootfs_data"
[ 0.580000] 0x0000007f0000-0x000000800000 : "art"
[ 0.580000] 0x000000020000-0x0000007f0000 : "firmware"
[ 0.720000] ag71xx_mdio: probed
[ 0.720000] eth0: Atheros AG71xx at 0xb9000000, irq 4
[ 1.300000] eth0: Atheros AR8327 switch driver attached.
[ 2.460000] ag71xx ag71xx.0: eth0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd033, driver=Atheros AR8216/AR8236/AR8316]
[ 2.480000] TCP cubic registered
[ 2.480000] NET: Registered protocol family 17
[ 2.480000] 8021q: 802.1Q VLAN Support v1.8
[ 2.490000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
[ 2.500000] Freeing unused kernel memory: 208k freed
[ 4.390000] Registered led device: tp-link:blue:qss
[ 4.390000] Registered led device: tp-link:blue:system
[ 4.390000] Registered led device: tp-link:green:usb1
[ 4.390000] Registered led device: tp-link:green:usb2
[ 4.390000] Registered led device: tp-link:blue:wlan2g
[ 5.470000] eth0: link up (1000Mbps/Full duplex)
[ 7.750000] JFFS2 notice: (472) jffs2_build_xattr_subsystem: complete building xattr subsystem, 1 of xdatum (1 unchecked, 0 orphan) and 25 of xref (0 dead, 0 orphan) found.
[ 7.840000] eth0: link down
[ 9.650000] Compat-drivers backport release: compat-drivers-2013-01-21-1
[ 9.650000] Backport based on wireless-testing.git master-2013-02-22
[ 9.660000] compat.git: wireless-testing.git
[ 9.790000] cfg80211: Calling CRDA to update world regulatory domain
[ 9.800000] cfg80211: World regulatory domain updated:
[ 9.800000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[ 9.810000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 9.820000] cfg80211: (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[ 9.830000] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[ 9.840000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 9.840000] cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 10.370000] NET: Registered protocol family 10
[ 10.700000] SCSI subsystem initialized
[ 10.850000] usbcore: registered new interface driver usbfs
[ 10.850000] usbcore: registered new interface driver hub
[ 10.860000] usbcore: registered new device driver usb
[ 11.350000] ath: EEPROM regdomain: 0x0
[ 11.350000] ath: EEPROM indicates default country code should be used
[ 11.350000] ath: doing EEPROM country->regdmn map search
[ 11.350000] ath: country maps to regdmn code: 0x3a
[ 11.350000] ath: Country alpha2 being used: US
[ 11.350000] ath: Regpair used: 0x3a
[ 11.360000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[ 11.360000] Registered led device: ath9k-phy0
[ 11.360000] ieee80211 phy0: Atheros AR9340 Rev:0 mem=0xb8100000, irq=47
[ 11.370000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
[ 11.380000] ath: EEPROM regdomain: 0x0
[ 11.380000] ath: EEPROM indicates default country code should be used
[ 11.380000] ath: doing EEPROM country->regdmn map search
[ 11.380000] ath: country maps to regdmn code: 0x3a
[ 11.380000] ath: Country alpha2 being used: US
[ 11.380000] ath: Regpair used: 0x3a
[ 11.380000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
[ 11.390000] Registered led device: ath9k-phy1
[ 11.390000] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=40
[ 11.400000] cfg80211: Calling CRDA for country: US
[ 11.540000] cfg80211: Regulatory domain changed to country: US
[ 11.550000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[ 11.560000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm)
[ 11.570000] cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm)
[ 11.570000] cfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 11.580000] cfg80211: (5490000 KHz - 5600000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 11.590000] cfg80211: (5650000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[ 11.600000] cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm)
[ 11.690000] PPP generic driver version 2.4.2
[ 11.800000] tun: Universal TUN/TAP device driver, 1.6
[ 11.810000] tun: (C) 1999-2004 Max Krasnyansky <[email protected]>
[ 11.900000] IPv4 over IPv4 tunneling driver
[ 12.020000] ip_tables: (C) 2000-2006 Netfilter Core Team
[ 12.200000] NET: Registered protocol family 24
[ 12.370000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[ 12.380000] ehci-platform ehci-platform: Generic Platform EHCI Controller
[ 12.390000] ehci-platform ehci-platform: new USB bus registered, assigned bus number 1
[ 12.430000] ehci-platform ehci-platform: irq 3, io mem 0x1b000000
[ 12.450000] ehci-platform ehci-platform: USB 2.0 started, EHCI 1.00
[ 12.450000] hub 1-0:1.0: USB hub found
[ 12.460000] hub 1-0:1.0: 1 port detected
[ 12.480000] nf_conntrack version 0.5.0 (1980 buckets, 7920 max)
[ 12.850000] usb 1-1: new high-speed USB device number 2 using ehci-platform
[ 13.120000] hub 1-1:1.0: USB hub found
[ 13.120000] hub 1-1:1.0: 4 ports detected
[ 13.160000] xt_time: kernel timezone is -0000
[ 13.540000] ip6_tables: (C) 2000-2006 Netfilter Core Team
[ 13.840000] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[ 14.040000] Initializing USB Mass Storage driver...
[ 14.040000] usbcore: registered new interface driver usb-storage
[ 14.050000] USB Mass Storage support registered.
[ 18.150000] ADDRCONF(NETDEV_UP): eth0: link is not ready
[ 18.170000] device eth0 entered promiscuous mode
[ 18.170000] ADDRCONF(NETDEV_UP): br-plug: link is not ready
[ 20.050000] eth0: link up (1000Mbps/Full duplex)
[ 20.080000] br-plug: port 1(eth0) entered forwarding state
[ 20.080000] br-plug: port 1(eth0) entered forwarding state
[ 20.090000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 20.090000] ADDRCONF(NETDEV_CHANGE): br-plug: link becomes ready
[ 22.080000] br-plug: port 1(eth0) entered forwarding state
[ 25.170000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[ 25.190000] device wlan0 entered promiscuous mode
[ 25.210000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[ 25.420000] br-plug: port 2(wlan0) entered forwarding state
[ 25.430000] br-plug: port 2(wlan0) entered forwarding state
[ 25.430000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 27.430000] br-plug: port 2(wlan0) entered forwarding state
[ 29.520000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
[ 29.540000] device wlan1 entered promiscuous mode
[ 29.560000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
[ 29.560000] device wlan1 left promiscuous mode
[ 29.570000] br-plug: port 3(wlan1) entered disabled state
[187641.200000] br-plug: port 2(wlan0) entered disabled state
[187641.210000] br-plug: port 1(eth0) entered disabled state
[187641.240000] device eth0 left promiscuous mode
[187641.240000] br-plug: port 1(eth0) entered disabled state
[187641.250000] eth0: link down
[187641.300000] device wlan0 left promiscuous mode
[187641.300000] br-plug: port 2(wlan0) entered disabled state
[187641.330000] ADDRCONF(NETDEV_UP): eth0: link is not ready
[187641.330000] device eth0 entered promiscuous mode
[187641.390000] device wlan0 entered promiscuous mode
[187641.450000] br-plug: port 2(wlan0) entered forwarding state
[187641.450000] br-plug: port 2(wlan0) entered forwarding state
[187641.510000] device wlan0 left promiscuous mode
[187641.520000] br-plug: port 2(wlan0) entered disabled state
[187642.800000] eth0: link up (1000Mbps/Full duplex)
[187642.830000] br-plug: port 1(eth0) entered forwarding state
[187642.830000] br-plug: port 1(eth0) entered forwarding state
[187642.840000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[187644.500000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[187644.560000] device wlan0 entered promiscuous mode
[187644.640000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
[187644.830000] br-plug: port 1(eth0) entered forwarding state
[187645.070000] br-plug: port 2(wlan0) entered forwarding state
[187645.070000] br-plug: port 2(wlan0) entered forwarding state
[187645.080000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[187647.070000] br-plug: port 2(wlan0) entered forwarding state
[187649.490000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
[187649.510000] device wlan1 entered promiscuous mode
[187649.530000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
[187649.530000] device wlan1 left promiscuous mode
[187649.540000] br-plug: port 3(wlan1) entered disabled state
[187795.230000] ADDRCONF(NETDEV_UP): tmp.wlan1: link is not ready
--------------------------------------------------------------------
Device Logs: (logread)
--------------------------------------------------------------------
Sep 10 19:38:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27363 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:39:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27376 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:39:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27377 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27390 cmd /usr/sbin/commotion-service-parser
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27391 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:40:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27392 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:41:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27422 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:41:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27423 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:42:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27436 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:42:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27439 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:43:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27451 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:43:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27452 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 IEEE 802.11: authenticated
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 IEEE 802.11: associated (aid 1)
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 RADIUS: starting accounting session 4E68E2D0-0000000B
Sep 10 19:44:00 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 WPA: pairwise key handshake completed (RSN)
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPDISCOVER(br-plug) 102.138.148.2 6c:88:14:49:67:b0
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPOFFER(br-plug) 102.138.148.2 6c:88:14:49:67:b0
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPREQUEST(br-plug) 102.138.148.2 6c:88:14:49:67:b0
Sep 10 19:44:00 hacklab023254291092 daemon.info dnsmasq-dhcp[1810]: DHCPACK(br-plug) 102.138.148.2 6c:88:14:49:67:b0 the-gibson
Sep 10 19:44:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27465 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:44:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27466 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:44:16 hacklab023254291092 daemon.info hostapd: wlan0: STA 6c:88:14:49:67:b0 WPA: group key handshake completed (RSN)
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27479 cmd /usr/sbin/commotion-service-parser
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27480 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:45:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27481 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:46:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27511 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:46:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27512 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:47:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27530 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:47:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27531 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:48:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27567 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:48:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27568 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:49:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27617 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:49:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27618 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27691 cmd /usr/sbin/commotion-service-parser
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27692 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:50:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27693 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:51:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27789 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:51:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 27790 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:51:11 hacklab023254291092 daemon.notice netifd: Interface 'cfg044d8f' is now down
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for 192.168.1.20 on br-plug.
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Leaving mDNS multicast group on interface br-plug.IPv4 with address 192.168.1.20.
Sep 10 19:51:11 hacklab023254291092 daemon.info avahi-daemon[2177]: Joining mDNS multicast group on interface br-plug.IPv4 with address 102.138.148.1.
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: reading /tmp/resolv.conf.auto
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: using nameserver 8.8.8.8#53
Sep 10 19:51:11 hacklab023254291092 daemon.info dnsmasq[1810]: using local addresses only for domain mesh.local
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'plug' is now down
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.200000] br-plug: port 2(wlan0) entered disabled state
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.210000] br-plug: port 1(eth0) entered disabled state
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for 102.138.148.1 on br-plug.
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Leaving mDNS multicast group on interface br-plug.IPv4 with address 102.138.148.1.
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Interface br-plug.IPv4 no longer relevant for mDNS.
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for fe80::a2f3:c1ff:fef8:8a94 on br-plug.
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.240000] device eth0 left promiscuous mode
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.240000] br-plug: port 1(eth0) entered disabled state
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.250000] eth0: link down
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.300000] device wlan0 left promiscuous mode
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.300000] br-plug: port 2(wlan0) entered disabled state
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.330000] ADDRCONF(NETDEV_UP): eth0: link is not ready
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.330000] device eth0 entered promiscuous mode
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.390000] device wlan0 entered promiscuous mode
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.450000] br-plug: port 2(wlan0) entered forwarding state
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.450000] br-plug: port 2(wlan0) entered forwarding state
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Joining mDNS multicast group on interface br-plug.IPv4 with address 192.168.1.20.
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: New relevant interface br-plug.IPv4 for mDNS.
Sep 10 19:51:12 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for 192.168.1.20 on br-plug.IPv4.
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'cfg044d8f' is now up
Sep 10 19:51:12 hacklab023254291092 daemon.notice netifd: Interface 'plug' is now up
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.510000] device wlan0 left promiscuous mode
Sep 10 19:51:12 hacklab023254291092 kern.info kernel: [187641.520000] br-plug: port 2(wlan0) entered disabled state
Sep 10 19:51:13 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for fe80::a2f3:c1ff:fef8:8a94 on br-plug.*.
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.800000] eth0: link up (1000Mbps/Full duplex)
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.830000] br-plug: port 1(eth0) entered forwarding state
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.830000] br-plug: port 1(eth0) entered forwarding state
Sep 10 19:51:13 hacklab023254291092 kern.info kernel: [187642.840000] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sep 10 19:51:13 hacklab023254291092 user.notice hotplug.olsrd: Action: ifdown, Proto: , Iface: cfg044d8f, Type:
Sep 10 19:51:13 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: static
Sep 10 19:51:13 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: state <interface> <property>
Sep 10 19:51:14 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifdown, Interface: cfg044d8f, Type: state <interface> <property>
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.500000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.560000] device wlan0 entered promiscuous mode
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.640000] ADDRCONF(NETDEV_UP): wlan0: link is not ready
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187644.830000] br-plug: port 1(eth0) entered forwarding state
Sep 10 19:51:15 hacklab023254291092 user.notice ifup: Enabling Router Solicitations on plug (br-plug)
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.070000] br-plug: port 2(wlan0) entered forwarding state
Sep 10 19:51:15 hacklab023254291092 daemon.warn dnsmasq[1810]: no servers found in /tmp/resolv.conf.auto, will retry
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.070000] br-plug: port 2(wlan0) entered forwarding state
Sep 10 19:51:15 hacklab023254291092 kern.info kernel: [187645.080000] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sep 10 19:51:16 hacklab023254291092 user.info firewall: removing plug (br-plug) from zone lan
Sep 10 19:51:16 hacklab023254291092 user.notice hotplug.olsrd: Action: ifup, Proto: , Iface: plug, Type:
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: none
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: plug
Sep 10 19:51:16 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifup, Interface: plug, Type: plug
Sep 10 19:51:16 hacklab023254291092 daemon.info dnsmasq[1810]: exiting on receipt of SIGTERM
Sep 10 19:51:17 hacklab023254291092 daemon.info avahi-daemon[2177]: Registering new address record for fe80::a2f3:c1ff:fef8:8a95 on wlan0.*.
Sep 10 19:51:17 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sep 10 19:51:17 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sep 10 19:51:17 hacklab023254291092 kern.info kernel: [187647.070000] br-plug: port 2(wlan0) entered forwarding state
Sep 10 19:51:17 hacklab023254291092 user.info firewall: adding plug (br-plug) to zone lan
Sep 10 19:51:18 hacklab023254291092 daemon.info avahi-daemon[2177]: Withdrawing address record for fe80::a2f3:c1ff:fef8:8a95 on wlan0.
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.490000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.510000] device wlan1 entered promiscuous mode
Sep 10 19:51:20 hacklab023254291092 daemon.warn hostapd: wlan1: IEEE 802.11 Configured channel (11) not found from the channel list of current mode (2) IEEE 802.11a
Sep 10 19:51:20 hacklab023254291092 daemon.warn hostapd: wlan1: IEEE 802.11 Hardware does not support configured channel
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.530000] ADDRCONF(NETDEV_UP): wlan1: link is not ready
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.530000] device wlan1 left promiscuous mode
Sep 10 19:51:20 hacklab023254291092 kern.info kernel: [187649.540000] br-plug: port 3(wlan1) entered disabled state
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: started, version 2.62 cachesize 150
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq-dhcp[28369]: DHCP, IP range 102.138.148.2 -- 102.138.148.151, lease time 12h
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: using local addresses only for domain mesh.local
Sep 10 19:51:20 hacklab023254291092 daemon.warn dnsmasq[28369]: no servers found in /tmp/resolv.conf.auto, will retry
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq[28369]: read /etc/hosts - 2 addresses
Sep 10 19:51:20 hacklab023254291092 daemon.info dnsmasq-dhcp[28369]: read /etc/ethers - 0 addresses
Sep 10 19:51:21 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sep 10 19:51:21 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sep 10 19:51:21 hacklab023254291092 user.notice ifup: Enabling Router Solicitations on cfg044d8f (br-plug)
Sep 10 19:51:22 hacklab023254291092 user.notice hotplug.olsrd: Action: ifup, Proto: , Iface: cfg044d8f, Type:
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.hotplug.olsrd: proto: static
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.hotplug.olsrd: type: plug
Sep 10 19:51:23 hacklab023254291092 user.notice commotion.dnsmasq.hotplug: Action: ifup, Interface: cfg044d8f, Type: plug
Sep 10 19:51:23 hacklab023254291092 daemon.info dnsmasq[28369]: exiting on receipt of SIGTERM
Sep 10 19:51:23 hacklab023254291092 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sep 10 19:51:23 hacklab023254291092 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: started, version 2.62 cachesize 150
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq-dhcp[28513]: DHCP, IP range 102.138.148.2 -- 102.138.148.151, lease time 12h
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: using local addresses only for domain mesh.local
Sep 10 19:51:24 hacklab023254291092 daemon.warn dnsmasq[28513]: no servers found in /tmp/resolv.conf.auto, will retry
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq[28513]: read /etc/hosts - 2 addresses
Sep 10 19:51:24 hacklab023254291092 daemon.info dnsmasq-dhcp[28513]: read /etc/ethers - 0 addresses
Sep 10 19:51:33 hacklab023254291092 user.info firewall: adding plug (br-plug) to zone lan
Sep 10 19:51:36 hacklab023254291092 user.notice freifunk-p2pblock: WARNING! not running - Aborting!
Sep 10 19:51:37 hacklab023254291092 user.notice freifunk-p2pblock: starting p2pblock...
Sep 10 19:51:37 hacklab023254291092 user.notice freifunk-p2pblock: No wan interface present.
Sep 10 19:52:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29207 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:52:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29208 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:53:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29243 cmd /usr/bin/commotion-bigboard-send
Sep 10 19:53:01 hacklab023254291092 cron.info crond[2013]: crond: USER root pid 29246 cmd /usr/sbin/ff_olsr_test_gw.sh
Sep 10 19:53:46 hacklab023254291092 kern.info kernel: [187795.230000] ADDRCONF(NETDEV_UP): tmp.wlan1: link is not ready
--------------------------------------------------------------------
UCI info: (uci show)
--------------------------------------------------------------------
applications.settings=settings
applications.settings.category=Community Collaboration Fun
applications.settings.autoapprove=1
applications.settings.checkconnect=1
applications.settings.expiration=86400
applications.settings.allowpermanent=1
applications.settings.disabled=0
commotion-dash.@dashboard[0]=dashboard
commotion-dash.@dashboard[0].gatherer=x.x.x.x
commotion-dash.@dashboard[0].enabled=false
commotiond.@daemon[0]=daemon
commotiond.@node[0]=node
commotiond.@node[0].dhcp_timeout=20
commotiond.@node[0].id=3254291093
dhcp.@dnsmasq[0]=dnsmasq
dhcp.@dnsmasq[0].domainneeded=1
dhcp.@dnsmasq[0].boguspriv=1
dhcp.@dnsmasq[0].filterwin2k=0
dhcp.@dnsmasq[0].localise_queries=1
dhcp.@dnsmasq[0].rebind_protection=1
dhcp.@dnsmasq[0].rebind_localhost=1
dhcp.@dnsmasq[0].local=/mesh.local/
dhcp.@dnsmasq[0].domain=mesh.local
dhcp.@dnsmasq[0].expandhosts=1
dhcp.@dnsmasq[0].nonegcache=0
dhcp.@dnsmasq[0].authoritative=1
dhcp.@dnsmasq[0].readethers=1
dhcp.@dnsmasq[0].leasefile=/tmp/dhcp.leases
dhcp.@dnsmasq[0].resolvfile=/tmp/resolv.conf.auto
dhcp.@dhcp[0]=dhcp
dhcp.@dhcp[0].interface=plug
dhcp.@dhcp[0].start=2
dhcp.@dhcp[0].limit=150
dhcp.@dhcp[0].leasetime=12h
dropbear.@dropbear[0]=dropbear
dropbear.@dropbear[0].PasswordAuth=on
dropbear.@dropbear[0].RootPasswordAuth=on
dropbear.@dropbear[0].Port=22
etherwake.setup=etherwake
etherwake.setup.pathes=/usr/bin/etherwake /usr/bin/ether-wake
etherwake.setup.sudo=off
etherwake.setup.broadcast=off
etherwake.@target[0]=target
etherwake.@target[0].name=example
etherwake.@target[0].mac=11:22:33:44:55:66
etherwake.@target[0].password=AABBCCDDEEFF
etherwake.@target[0].wakeonboot=off
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=DROP
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=DROP
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=DROP
firewall.@zone[0].network=plug
firewall.@zone[1]=zone
firewall.@zone[1].name=ap
firewall.@zone[1].input=ACCEPT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=DROP
firewall.@zone[1].network=ap
firewall.@zone[2]=zone
firewall.@zone[2].name=secAp
firewall.@zone[2].input=ACCEPT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].forward=DROP
firewall.@zone[2].network=secAp
firewall.@zone[3]=zone
firewall.@zone[3].name=mesh
firewall.@zone[3].input=ACCEPT
firewall.@zone[3].output=ACCEPT
firewall.@zone[3].forward=DROP
firewall.@zone[3].network=mesh
firewall.@zone[4]=zone
firewall.@zone[4].name=wan
firewall.@zone[4].input=DROP
firewall.@zone[4].output=ACCEPT
firewall.@zone[4].forward=DROP
firewall.@zone[4].masq=1
firewall.@zone[4].network=wan
firewall.@zone[5]=zone
firewall.@zone[5].name=vpn
firewall.@zone[5].input=DROP
firewall.@zone[5].output=ACCEPT
firewall.@zone[5].forward=DROP
firewall.@zone[5].network=vpn
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=ap
firewall.@forwarding[0].dest=mesh
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src=ap
firewall.@forwarding[1].dest=ap
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].src=secAp
firewall.@forwarding[2].dest=mesh
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].src=secAp
firewall.@forwarding[3].dest=secAp
firewall.@forwarding[4]=forwarding
firewall.@forwarding[4].src=mesh
firewall.@forwarding[4].dest=mesh
firewall.@forwarding[5]=forwarding
firewall.@forwarding[5].src=lan
firewall.@forwarding[5].dest=lan
firewall.@forwarding[6]=forwarding
firewall.@forwarding[6].src=ap
firewall.@forwarding[6].dest=wan
firewall.@forwarding[7]=forwarding
firewall.@forwarding[7].src=secAp
firewall.@forwarding[7].dest=wan
firewall.@forwarding[8]=forwarding
firewall.@forwarding[8].src=mesh
firewall.@forwarding[8].dest=wan
firewall.@forwarding[9]=forwarding
firewall.@forwarding[9].src=lan
firewall.@forwarding[9].dest=mesh
firewall.@forwarding[10]=forwarding
firewall.@forwarding[10].src=lan
firewall.@forwarding[10].dest=wan
firewall.@forwarding[11]=forwarding
firewall.@forwarding[11].src=lan
firewall.@forwarding[11].dest=ap
firewall.@forwarding[12]=forwarding
firewall.@forwarding[12].src=ap
firewall.@forwarding[12].dest=lan
firewall.@forwarding[13]=forwarding
firewall.@forwarding[13].src=lan
firewall.@forwarding[13].dest=secAp
firewall.@forwarding[14]=forwarding
firewall.@forwarding[14].src=secAp
firewall.@forwarding[14].dest=lan
firewall.@forwarding[15]=forwarding
firewall.@forwarding[15].src=ap
firewall.@forwarding[15].dest=secAp
firewall.@forwarding[16]=forwarding
firewall.@forwarding[16].src=secAp
firewall.@forwarding[16].dest=ap
firewall.@rule[0]=rule
firewall.@rule[0].src=wan
firewall.@rule[0].dest_port=22
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].proto=tcp
firewall.@rule[1]=rule
firewall.@rule[1].src=mesh
firewall.@rule[1].dest_port=22
firewall.@rule[1].target=ACCEPT
firewall.@rule[1].proto=tcp
firewall.@rule[2]=rule
firewall.@rule[2].src=lan
firewall.@rule[2].dest_port=22
firewall.@rule[2].target=ACCEPT
firewall.@rule[2].proto=tcp
firewall.@rule[3]=rule
firewall.@rule[3].src=vpn
firewall.@rule[3].dest_port=22
firewall.@rule[3].target=ACCEPT
firewall.@rule[3].proto=tcp
firewall.@rule[4]=rule
firewall.@rule[4].src=mesh
firewall.@rule[4].dest_port=53
firewall.@rule[4].target=ACCEPT
firewall.@rule[4].proto=tcpudp
firewall.@rule[5]=rule
firewall.@rule[5].src=lan
firewall.@rule[5].dest_port=53
firewall.@rule[5].target=ACCEPT
firewall.@rule[5].proto=tcpudp
firewall.@rule[6]=rule
firewall.@rule[6].src=ap
firewall.@rule[6].dest_port=53
firewall.@rule[6].target=ACCEPT
firewall.@rule[6].proto=tcpudp
firewall.@rule[7]=rule
firewall.@rule[7].src=secAp
firewall.@rule[7].dest_port=53
firewall.@rule[7].target=ACCEPT
firewall.@rule[7].proto=tcpudp
firewall.@rule[8]=rule
firewall.@rule[8].src=lan
firewall.@rule[8].dest_port=80
firewall.@rule[8].target=ACCEPT
firewall.@rule[8].proto=tcp
firewall.@rule[9]=rule
firewall.@rule[9].src=wan
firewall.@rule[9].dest_port=80
firewall.@rule[9].target=ACCEPT
firewall.@rule[9].proto=tcp
firewall.@rule[10]=rule
firewall.@rule[10].src=ap
firewall.@rule[10].dest_port=80
firewall.@rule[10].target=ACCEPT
firewall.@rule[10].proto=tcp
firewall.@rule[11]=rule
firewall.@rule[11].src=secAp
firewall.@rule[11].dest_port=80
firewall.@rule[11].target=ACCEPT
firewall.@rule[11].proto=tcp
firewall.@rule[12]=rule
firewall.@rule[12].src=vpn
firewall.@rule[12].dest_port=80
firewall.@rule[12].target=ACCEPT
firewall.@rule[12].proto=tcp
firewall.@rule[13]=rule
firewall.@rule[13].src=ap
firewall.@rule[13].dest_port=443
firewall.@rule[13].target=ACCEPT
firewall.@rule[13].proto=tcp
firewall.@rule[14]=rule
firewall.@rule[14].src=secAp
firewall.@rule[14].dest_port=443
firewall.@rule[14].target=ACCEPT
firewall.@rule[14].proto=tcp
firewall.@rule[15]=rule
firewall.@rule[15].src=lan
firewall.@rule[15].dest_port=443
firewall.@rule[15].target=ACCEPT
firewall.@rule[15].proto=tcp
firewall.@rule[16]=rule
firewall.@rule[16].src=vpn
firewall.@rule[16].dest_port=443
firewall.@rule[16].target=ACCEPT
firewall.@rule[16].proto=tcp
firewall.@rule[17]=rule
firewall.@rule[17].src=ap
firewall.@rule[17].dest_port=22
firewall.@rule[17].target=ACCEPT
firewall.@rule[17].proto=tcp
firewall.@rule[18]=rule
firewall.@rule[18].src=secAp
firewall.@rule[18].dest_port=22
firewall.@rule[18].target=ACCEPT
firewall.@rule[18].proto=tcp
firewall.@rule[19]=rule
firewall.@rule[19].src=ap
firewall.@rule[19].dest_port=8082
firewall.@rule[19].target=ACCEPT
firewall.@rule[19].proto=tcp
firewall.@rule[20]=rule
firewall.@rule[20].src=secAp
firewall.@rule[20].dest_port=8082
firewall.@rule[20].target=ACCEPT
firewall.@rule[20].proto=tcp
firewall.@rule[21]=rule
firewall.@rule[21].src=lan
firewall.@rule[21].dest_port=8082
firewall.@rule[21].target=ACCEPT
firewall.@rule[21].proto=tcp
firewall.@rule[22]=rule
firewall.@rule[22].src=mesh
firewall.@rule[22].dest_port=698
firewall.@rule[22].target=ACCEPT
firewall.@rule[22].proto=udp
firewall.@rule[23]=rule
firewall.@rule[23].src=wan
firewall.@rule[23].dest_port=698
firewall.@rule[23].target=ACCEPT
firewall.@rule[23].proto=udp
firewall.@rule[24]=rule
firewall.@rule[24].src=lan
firewall.@rule[24].dest_port=698
firewall.@rule[24].target=ACCEPT
firewall.@rule[24].proto=udp
firewall.@rule[25]=rule
firewall.@rule[25].src=mesh
firewall.@rule[25].proto=icmp
firewall.@rule[25].target=ACCEPT
firewall.@rule[26]=rule
firewall.@rule[26].src=lan
firewall.@rule[26].proto=icmp
firewall.@rule[26].target=ACCEPT
firewall.@rule[27]=rule
firewall.@rule[27].src=wan
firewall.@rule[27].proto=icmp
firewall.@rule[27].target=ACCEPT
firewall.@rule[28]=rule
firewall.@rule[28].src=ap
firewall.@rule[28].proto=icmp
firewall.@rule[28].target=ACCEPT
firewall.@rule[29]=rule
firewall.@rule[29].src=secAp
firewall.@rule[29].proto=icmp
firewall.@rule[29].target=ACCEPT
firewall.@rule[30]=rule
firewall.@rule[30].src=vpn
firewall.@rule[30].proto=icmp
firewall.@rule[30].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.freifunk
freifunk-gwcheck.hosts=gwcheck
freifunk-gwcheck.hosts.host=augsburg.freifunk.net vpn4.leipzig.freifunk.net luci.subsignal.org conntest.jpod.cc
freifunk-policyrouting.pr=settings
freifunk-policyrouting.pr.enable=0
freifunk-policyrouting.pr.strict=1
freifunk-policyrouting.pr.fallback=1
freifunk_p2pblock.p2pblock=settings
freifunk_p2pblock.p2pblock.portrange=1024:65535
freifunk_p2pblock.p2pblock.layer7=edonkey bittorrent fasttrack
freifunk_p2pblock.p2pblock.ipp2p=edk dc kazaa gnu bit ares soul winmx apple
freifunk_p2pblock.p2pblock.blocktime=60
luci.main=core
luci.main.lang=auto
luci.main.resourcebase=/luci-static/resources
luci.main.mediaurlbase=/luci-static/commotion
luci.flash_keep=extern
luci.flash_keep.uci=/etc/config/
luci.flash_keep.dropbear=/etc/dropbear/
luci.flash_keep.openvpn=/etc/openvpn/
luci.flash_keep.passwd=/etc/passwd
luci.flash_keep.opkg=/etc/opkg.conf
luci.flash_keep.firewall=/etc/firewall.user
luci.flash_keep.uploads=/lib/uci/upload/
luci.languages=internal
luci.languages.en=English
luci.languages.fr=Français
luci.sauth=internal
luci.sauth.sessionpath=/tmp/luci-sessions
luci.sauth.sessiontime=3600
luci.ccache=internal
luci.ccache.enable=1
luci.themes=internal
luci.themes.Bootstrap=/luci-static/bootstrap
luci.themes.Commotion=/luci-static/commotion
luci.themes.OpenWrt=/luci-static/openwrt.org
luci_olsr.general=olsr
luci_olsr.general.resolve=1
n2n.@edge[0]=edge
network.loopback=interface
network.loopback.ifname=lo
network.loopback.proto=static
network.loopback.ipaddr=127.0.0.1
network.loopback.netmask=255.0.0.0
network.plug=interface
network.plug.ifname=eth0
network.plug.type=bridge
network.plug._orig_ifname=eth0 wlan0 radio1.network1
network.plug._orig_bridge=true
network.plug.proto=none
network.plug.auto=1
network.@alias[0]=alias
network.@alias[0].interface=plug
network.@alias[0].proto=static
network.@alias[0].ipaddr=192.168.1.20
network.@alias[0].netmask=255.255.255.0
ntpclient.@ntpserver[0]=ntpserver
ntpclient.@ntpserver[0].hostname=0.openwrt.pool.ntp.org
ntpclient.@ntpserver[0].port=123
ntpclient.@ntpserver[1]=ntpserver
ntpclient.@ntpserver[1].hostname=1.openwrt.pool.ntp.org
ntpclient.@ntpserver[1].port=123
ntpclient.@ntpserver[2]=ntpserver
ntpclient.@ntpserver[2].hostname=2.openwrt.pool.ntp.org
ntpclient.@ntpserver[2].port=123
ntpclient.@ntpserver[3]=ntpserver
ntpclient.@ntpserver[3].hostname=3.openwrt.pool.ntp.org
ntpclient.@ntpserver[3].port=123
ntpclient.@ntpdrift[0]=ntpdrift
ntpclient.@ntpdrift[0].freq=0
ntpclient.@ntpclient[0]=ntpclient
ntpclient.@ntpclient[0].interval=600
olsrd.@olsrd[0]=olsrd
olsrd.@olsrd[0].IpVersion=4
olsrd.@olsrd[0].LinkQualityLevel=2
olsrd.@olsrd[0].LinkQualityAlgorithm=etx_ffeth
olsrd.@olsrd[0].SmartGateway=yes
olsrd.@LoadPlugin[0]=LoadPlugin
olsrd.@LoadPlugin[0].library=olsrd_arprefresh.so.0.1
olsrd.@LoadPlugin[1]=LoadPlugin
olsrd.@LoadPlugin[1].library=olsrd_dyn_gw.so.0.5
olsrd.@LoadPlugin[2]=LoadPlugin
olsrd.@LoadPlugin[2].library=olsrd_nameservice.so.0.3
olsrd.@LoadPlugin[2].sighup_pid_file=/var/run/dnsmasq.pid
olsrd.@LoadPlugin[2].hosts_file=/var/run/hosts_olsr
olsrd.@LoadPlugin[2].suffix=.mesh.local
olsrd.@LoadPlugin[3]=LoadPlugin
olsrd.@LoadPlugin[3].library=olsrd_dnssd.so.0.1.2
olsrd.@LoadPlugin[3].P2pdTtl=5
olsrd.@LoadPlugin[3].UdpDestPort=224.0.0.251 5353
olsrd.@LoadPlugin[3].ServiceFileDir=/etc/avahi/services
olsrd.@LoadPlugin[3].Domain=mesh.local
olsrd.@LoadPlugin[3].ServiceUpdateInterval=300
olsrd.@LoadPlugin[4]=LoadPlugin
olsrd.@LoadPlugin[4].library=olsrd_txtinfo.so.0.1
olsrd.@LoadPlugin[4].accept=127.0.0.1
olsrd.@LoadPlugin[4].listen=127.0.0.1
olsrd.@LoadPlugin[5]=LoadPlugin
olsrd.@LoadPlugin[5].library=olsrd_jsoninfo.so.0.0
olsrd.@LoadPlugin[5].accept=127.0.0.1
olsrd.@LoadPlugin[5].listen=127.0.0.1
olsrd.@LoadPlugin[5].port=9090
olsrd.@LoadPlugin[5].UUIDFile=/etc/olsrd.d/olsrd.uuid
olsrd.plug=Hna4
olsrd.plug.netaddr=102.138.149.0
olsrd.plug.netmask=255.255.255.0
qos.wan=interface
qos.wan.classgroup=Default
qos.wan.enabled=0
qos.wan.upload=128
qos.wan.download=1024
qos.@classify[0]=classify
qos.@classify[0].target=Priority
qos.@classify[0].ports=22,53
qos.@classify[1]=classify
qos.@classify[1].target=Normal
qos.@classify[1].proto=tcp
qos.@classify[1].ports=20,21,25,80,110,443,993,995
qos.@classify[2]=classify
qos.@classify[2].target=Express
qos.@classify[2].ports=5190
qos.@default[0]=default
qos.@default[0].target=Express
qos.@default[0].proto=udp
qos.@default[0].pktsize=-500
qos.@reclassify[0]=reclassify
qos.@reclassify[0].target=Priority
qos.@reclassify[0].proto=icmp
qos.@default[1]=default
qos.@default[1].target=Bulk
qos.@default[1].portrange=1024-65535
qos.@reclassify[1]=reclassify
qos.@reclassify[1].target=Priority
qos.@reclassify[1].proto=tcp
qos.@reclassify[1].pktsize=-128
qos.@reclassify[1].mark=!Bulk
qos.@reclassify[1].tcpflags=SYN
qos.@reclassify[2]=reclassify
qos.@reclassify[2].target=Priority
qos.@reclassify[2].proto=tcp
qos.@reclassify[2].pktsize=-128
qos.@reclassify[2].mark=!Bulk
qos.@reclassify[2].tcpflags=ACK
qos.Default=classgroup
qos.Default.classes=Priority Express Normal Bulk
qos.Default.default=Normal
qos.Priority=class
qos.Priority.packetsize=400
qos.Priority.maxsize=400
qos.Priority.avgrate=10
qos.Priority.priority=20
qos.Priority_down=class
qos.Priority_down.packetsize=1000
qos.Priority_down.avgrate=10
qos.Express=class
qos.Express.packetsize=1000
qos.Express.maxsize=800
qos.Express.avgrate=50
qos.Express.priority=10
qos.Normal=class
qos.Normal.packetsize=1500
qos.Normal.packetdelay=100
qos.Normal.avgrate=10
qos.Normal.priority=5
qos.Normal_down=class
qos.Normal_down.avgrate=20
qos.Bulk=class
qos.Bulk.avgrate=1
qos.Bulk.packetdelay=200
quickstart.options=quickstart
quickstart.options.pageNo=welcome
quickstart.options.lastPg=welcome
quickstart.options.complete=false
quickstart.options.apps=true
quickstart.welcome=page
quickstart.welcome.pageTitle=Welcome
quickstart.welcome.topheader=Welcome to the Commotion Quick Start
quickstart.welcome.modules=adminPassword name meshPassword
quickstart.welcome.buttons=noBack 2:finish,|Finish &gt;,| ,| 3:settingsFile,|Use a pre-built network file &gt;,| ,|
quickstart.settingsFile=page
quickstart.settingsFile.pageTitle=Using a Settings File
quickstart.settingsFile.topheader=Using a Settings File
quickstart.settingsFile.subheading=If you have a settings file, please upload it below.
quickstart.settingsFile.fileType=config
quickstart.settingsFile.modules=upload
quickstart.settingsFile.buttons=4:finish,|Upload and Finish,|,| ,| 5:startOver,|&lt;&lt; Start Over,| ,|plus
system.@system[0]=system
system.@system[0].timezone=UTC
system.@system[0].community=Commotion
system.@system[0].homepage=http://thisnode/commotion/index/apps
system.@system[0].hostname=hacklab023254291092
system.ntp=timeserver
system.ntp.server=0.openwrt.pool.ntp.org 1.openwrt.pool.ntp.org 2.openwrt.pool.ntp.org 3.openwrt.pool.ntp.org
system.ntp.enable_server=0
system.led_usb1=led
system.led_usb1.name=USB1
system.led_usb1.sysfs=tp-link:green:usb1
system.led_usb1.trigger=usbdev
system.led_usb1.dev=1-1.1
system.led_usb1.interval=50
system.led_usb2=led
system.led_usb2.name=USB2
system.led_usb2.sysfs=tp-link:green:usb2
system.led_usb2.trigger=usbdev
system.led_usb2.dev=1-1.2
system.led_usb2.interval=50
system.led_wlan2g=led
system.led_wlan2g.name=WLAN2G
system.led_wlan2g.sysfs=tp-link:blue:wlan2g
system.led_wlan2g.trigger=phy0tpt
trelay.@trelay[0]=trelay
trelay.@trelay[0].enabled=0
trelay.@trelay[0].dev1=eth0
trelay.@trelay[0].dev2=wlan0
ucitrack.@network[0]=network
ucitrack.@network[0].init=network
ucitrack.@network[0].affects=dhcp radvd
ucitrack.@wireless[0]=wireless
ucitrack.@wireless[0].affects=network
ucitrack.@firewall[0]=firewall
ucitrack.@firewall[0].init=firewall
ucitrack.@firewall[0].affects=luci-splash qos miniupnpd
ucitrack.@olsr[0]=olsr
ucitrack.@olsr[0].init=olsrd
ucitrack.@dhcp[0]=dhcp
ucitrack.@dhcp[0].init=dnsmasq
ucitrack.@dropbear[0]=dropbear
ucitrack.@dropbear[0].init=dropbear
ucitrack.@httpd[0]=httpd
ucitrack.@httpd[0].init=httpd
ucitrack.@fstab[0]=fstab
ucitrack.@fstab[0].init=fstab
ucitrack.@qos[0]=qos
ucitrack.@qos[0].init=qos
ucitrack.@system[0]=system
ucitrack.@system[0].init=led
ucitrack.@system[0].affects=luci_statistics
ucitrack.@luci_splash[0]=luci_splash
ucitrack.@luci_splash[0].init=luci_splash
ucitrack.@upnpd[0]=upnpd
ucitrack.@upnpd[0].init=miniupnpd
ucitrack.@ntpclient[0]=ntpclient
ucitrack.@ntpclient[0].init=ntpclient
ucitrack.@samba[0]=samba
ucitrack.@samba[0].init=samba
ucitrack.@tinyproxy[0]=tinyproxy
ucitrack.@tinyproxy[0].init=tinyproxy
ucitrack.@freifunk-policyrouting[0]=freifunk-policyrouting
ucitrack.@freifunk-policyrouting[0].affects=network
ucitrack.@olsrd[0]=olsrd
ucitrack.@olsrd[0].init=olsrd
ucitrack.@freifunk_p2pblock[0]=freifunk_p2pblock
ucitrack.@freifunk_p2pblock[0].init=freifunk-p2pblock
uhttpd.main=uhttpd
uhttpd.main.listen_http=0.0.0.0:80
uhttpd.main.listen_https=0.0.0.0:443
uhttpd.main.home=/www
uhttpd.main.rfc1918_filter=1
uhttpd.main.max_requests=2
uhttpd.main.cert=/etc/uhttpd.crt
uhttpd.main.key=/etc/uhttpd.key
uhttpd.main.cgi_prefix=/cgi-bin
uhttpd.main.script_timeout=60
uhttpd.main.network_timeout=30
uhttpd.main.tcp_keepalive=1
uhttpd.px5g=cert
uhttpd.px5g.days=730
uhttpd.px5g.bits=1024
uhttpd.px5g.country=DE
uhttpd.px5g.state=Berlin
uhttpd.px5g.location=Berlin
uhttpd.px5g.commonname=OpenWrt
wireless.radio0=wifi-device
wireless.radio0.type=mac80211
wireless.radio0.hwmode=11ng
wireless.radio0.macaddr=a0:f3:c1:f8:8a:95
wireless.radio0.htmode=HT20
wireless.radio0.ht_capab=LDPC SHORT-GI-20 SHORT-GI-40 TX-STBC RX-STBC1 DSSS_CCK-40
wireless.radio0.txpower=27
wireless.radio0.country=US
wireless.radio0.channel=10
wireless.radio1=wifi-device
wireless.radio1.type=mac80211
wireless.radio1.hwmode=11na
wireless.radio1.macaddr=a0:f3:c1:f8:8a:96
wireless.radio1.htmode=HT20
wireless.radio1.ht_capab=LDPC SHORT-GI-20 SHORT-GI-40 TX-STBC RX-STBC1 DSSS_CCK-40
wireless.radio1.txpower=17
wireless.radio1.country=US
wireless.radio1.channel=11
wireless.@wifi-iface[0]=wifi-iface
wireless.@wifi-iface[0].device=radio0
wireless.@wifi-iface[0].mode=ap
wireless.@wifi-iface[0].ssid=IS4CWN-HACKLAB2-2GHz
wireless.@wifi-iface[0].network=plug
wireless.@wifi-iface[0].encryption=psk2
wireless.@wifi-iface[0].key=h4ckth1s!
wireless.@wifi-iface[1]=wifi-iface
wireless.@wifi-iface[1].device=radio1
wireless.@wifi-iface[1].mode=ap
wireless.@wifi-iface[1].network=plug
wireless.@wifi-iface[1].encryption=psk2
wireless.@wifi-iface[1].key=h4ckth1s!
wireless.@wifi-iface[1].ssid=IS4CWN-HACKLAB2-5GHz
--------------------------------------------------------------------
Current Processes: (ps -w)
--------------------------------------------------------------------
PID USER VSZ STAT COMMAND
1 root 1504 S init
2 root 0 SW [kthreadd]
3 root 0 SW [ksoftirqd/0]
5 root 0 SW [kworker/u:0]
6 root 0 SW< [khelper]
7 root 0 SW [kworker/u:1]
64 root 0 SW [sync_supers]
66 root 0 SW [bdi-default]
68 root 0 SW< [kblockd]
99 root 0 SW [kswapd0]
148 root 0 SW [fsnotify_mark]
161 root 0 SW< [ath79-spi]
172 root 0 SW [mtdblock0]
177 root 0 SW [mtdblock1]
182 root 0 SW [mtdblock2]
187 root 0 SW [mtdblock3]
192 root 0 SW [mtdblock4]
197 root 0 SW [mtdblock5]
265 root 0 SW [kworker/0:1]
473 root 0 SWN [jffs2_gcd_mtd3]
491 root 1504 S init
529 root 0 SW< [cfg80211]
546 root 0 SW [khubd]
670 root 1508 S /sbin/syslogd -C16
672 root 1488 S /sbin/klogd
674 root 856 S /sbin/hotplug2 --override --persistent --set-rules-file /etc/hotplug2.rules --set-coldplug-cmd /sbin/udev
680 root 872 S /sbin/ubusd
698 root 1052 S /usr/sbin/commotiond
722 root 1456 S /sbin/netifd
909 root 1500 S /sbin/watchdog -t 5 /dev/watchdog
2013 root 1512 S /usr/sbin/crond -c /etc/crontabs -l 5
2024 root 1152 S /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
2128 root 1712 S /usr/sbin/uhttpd -f -h /www -r hacklab023254291092 -x /cgi-bin -t 60 -T 30 -A 1 -n 2 -R -p 0.0.0.0:80 -C
2177 nobody 1728 S avahi-daemon: running [hacklab023254291092.local]
2184 root 4412 S /usr/bin/servald start
2227 root 800 S /sbin/rngd -r /dev/urandom -W 4000 -t 30
2231 root 1500 S /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.openwrt.pool.ntp.org -p 2.openwrt.pool.ntp.org -p 3.open
2253 root 1404 S avahi-client
13376 root 0 SW [kworker/0:3]
27544 root 0 SW [kworker/0:0]
28093 root 1896 S hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostapd-phy0.conf
28183 root 0 SW [flush-mtd-unmap]
28513 nobody 952 S /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf
29221 root 0 SW [kworker/0:2]
29270 root 4096 S {luci} /usr/bin/lua /www/cgi-bin/luci
29276 root 1500 S /bin/sh -c /usr/sbin/cdh -a all
29277 root 1504 S {cdh} /bin/sh /usr/sbin/cdh -a all
29286 root 856 S /sbin/hotplug2 --override --persistent --set-rules-file /etc/hotplug2.rules --set-coldplug-cmd /sbin/udev
29309 root 1532 S {hotplug-call} /bin/sh /sbin/hotplug-call net
29312 root 1496 R ps -w
29313 root 1532 S {hotplug-call} /bin/sh /sbin/hotplug-call net
29315 root 1488 R dirname /devices/pci0000:00/0000:00:00.0/net
--------------------------------------------------------------------
Router uptime and Load: (uptime)
--------------------------------------------------------------------
19:53:48 up 2 days, 4:09, load average: 0.72, 0.49, 0.27
--------------------------------------------------------------------
radio1 info
--------------------------------------------------------------------
radio1 ESSID: unknown
Access Point: 00:00:00:00:00:00
Mode: Client Channel: 36 (5.180 GHz)
Tx-Power: unknown Link Quality: unknown/70
Signal: unknown Noise: unknown
Bit Rate: unknown
Encryption: unknown
Type: nl80211 HW Mode(s): 802.11an
Hardware: 168C:0033 168C:A120 [Generic MAC80211]
TX power offset: unknown
Frequency offset: unknown
Supports VAPs: yes
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment