Dzisiaj jest 17 sie 2018, 22:35

Strefa czasowa UTC+1godz. [letni]




Nowy temat Odpowiedz w temacie  [ Posty: 4 ] 
Autor Wiadomość
 Tytuł: MMA z VPN'em ciąg dalszy...
Post: 9 cze 2018, 21:09 
Offline
Użytkownik

Rejestracja: 13 sie 2013, 19:55
Posty: 49
Ok wykonałem wszystkie procedury z ww strony.
https://openwrt.org/docs/guide-user/ser ... rver.setup

Sat Jun 09 19:57:03 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sat Jun 09 19:57:03 2018 Windows version 6.1 (Windows 7) 64bit
Sat Jun 09 19:57:03 2018 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Enter Management Password:
Sat Jun 09 19:57:03 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sat Jun 09 19:57:03 2018 Need hold release from management interface, waiting...
Sat Jun 09 19:57:04 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'state on'
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'log all on'
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'echo all on'
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'bytecount 5'
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'hold off'
Sat Jun 09 19:57:04 2018 MANAGEMENT: CMD 'hold release'
Sat Jun 09 19:57:04 2018 NOTE: --fast-io is disabled since we are running on Windows
Sat Jun 09 19:57:04 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jun 09 19:57:04 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jun 09 19:57:04 2018 MANAGEMENT: >STATE:1528570624,RESOLVE,,,,,,
Sat Jun 09 19:57:04 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.13.XXX.XXX:1194
Sat Jun 09 19:57:04 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Jun 09 19:57:04 2018 UDP link local: (not bound)
Sat Jun 09 19:57:04 2018 UDP link remote: [AF_INET]185.13.XXX.XXX:1194
Sat Jun 09 19:57:04 2018 MANAGEMENT: >STATE:1528570624,WAIT,,,,,,
Sat Jun 09 19:57:04 2018 MANAGEMENT: >STATE:1528570624,AUTH,,,,,,
Sat Jun 09 19:57:04 2018 TLS: Initial packet from [AF_INET]185.13.XXX.XXX:1194, sid=69dc66c3 0c9a6055
Sat Jun 09 19:57:06 2018 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
Sat Jun 09 19:57:06 2018 VERIFY KU OK
Sat Jun 09 19:57:06 2018 Validating certificate extended key usage
Sat Jun 09 19:57:06 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jun 09 19:57:06 2018 VERIFY EKU OK
Sat Jun 09 19:57:06 2018 VERIFY OK: depth=0, CN=my-server
Sat Jun 09 19:57:06 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Jun 09 19:57:06 2018 [my-server] Peer Connection Initiated with [AF_INET]185.13.184.176:1194
Sat Jun 09 19:57:07 2018 MANAGEMENT: >STATE:1528570627,GET_CONFIG,,,,,,
Sat Jun 09 19:57:07 2018 SENT CONTROL [my-server]: 'PUSH_REQUEST' (status=1)
Sat Jun 09 19:57:07 2018 PUSH: Received control message: 'PUSH_REPLY,comp-lzo yes,persist-key,persist-tun,topology subnet,route-gateway dhcp,redirect-gateway def1,route 192.168.200.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: compression parms modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: --persist options modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: route options modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: route-related options modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: peer-id set
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Sat Jun 09 19:57:07 2018 OPTIONS IMPORT: data channel crypto options modified
Sat Jun 09 19:57:07 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Jun 09 19:57:07 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Jun 09 19:57:07 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Jun 09 19:57:07 2018 interactive service msg_channel=372
Sat Jun 09 19:57:07 2018 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=14 HWADDR=68:17:29:XX:XX:XX
Sat Jun 09 19:57:07 2018 open_tun
Sat Jun 09 19:57:07 2018 TAP-WIN32 device [Połączenie lokalne 3] opened: \\.\Global\{F695FCCD-A3F1-40D5-9978-A1E0A8831765}.tap
Sat Jun 09 19:57:07 2018 TAP-Windows Driver Version 9.21
Sat Jun 09 19:57:07 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 192.168.200.0/192.168.200.2/255.255.255.0 [SUCCEEDED]
Sat Jun 09 19:57:07 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.200.2/255.255.255.0 on interface {F695FCCD-A3F1-40D5-9978-A1E0A8831765} [DHCP-serv: 192.168.200.254, lease-time: 31536000]
Sat Jun 09 19:57:07 2018 Successful ARP Flush on interface [26] {F695FCCD-A3F1-40D5-9978-A1E0A8831765}
Sat Jun 09 19:57:07 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun 09 19:57:07 2018 MANAGEMENT: >STATE:1528570627,ASSIGN_IP,,192.168.200.2,,,,
Sat Jun 09 19:57:12 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sat Jun 09 19:57:12 2018 C:\Windows\system32\route.exe ADD 185.13.XXX.XXX MASK 255.255.255.255 192.168.0.1
Sat Jun 09 19:57:12 2018 Route addition via service succeeded
Sat Jun 09 19:57:12 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.200.1
Sat Jun 09 19:57:12 2018 Route addition via service succeeded
Sat Jun 09 19:57:12 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.200.1
Sat Jun 09 19:57:12 2018 Route addition via service succeeded
Sat Jun 09 19:57:12 2018 MANAGEMENT: >STATE:1528570632,ADD_ROUTES,,,,,,
Sat Jun 09 19:57:12 2018 C:\Windows\system32\route.exe ADD 192.168.200.0 MASK 255.255.255.0 192.168.200.1
Sat Jun 09 19:57:12 2018 Route addition via service succeeded
Sat Jun 09 19:57:12 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jun 09 19:57:12 2018 Initialization Sequence Completed
Sat Jun 09 19:57:12 2018 MANAGEMENT: >STATE:1528570632,CONNECTED,SUCCESS,192.168.200.2,185.13.XXX.XXX,1194,,
Sat Jun 09 19:58:09 2018 C:\Windows\system32\route.exe DELETE 192.168.200.0 MASK 255.255.255.0 192.168.200.1
Sat Jun 09 19:58:09 2018 Route deletion via service succeeded
Sat Jun 09 19:58:09 2018 C:\Windows\system32\route.exe DELETE 185.13.XXX.XXX MASK 255.255.255.255 192.168.0.1
Sat Jun 09 19:58:09 2018 Route deletion via service succeeded
Sat Jun 09 19:58:09 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 192.168.200.1
Sat Jun 09 19:58:09 2018 Route deletion via service succeeded
Sat Jun 09 19:58:09 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 192.168.200.1
Sat Jun 09 19:58:09 2018 Route deletion via service succeeded
Sat Jun 09 19:58:09 2018 Closing TUN/TAP interface
Sat Jun 09 19:58:10 2018 TAP: DHCP address released
Sat Jun 09 19:58:10 2018 SIGTERM[hard,] received, process exiting
Sat Jun 09 19:58:10 2018 MANAGEMENT: >STATE:1528570690,EXITING,SIGTERM,,,,,


root@OpenWrt:~# cat /tmp/openvpn.log
Sat Jun  9 15:21:33 2018 OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jun  9 15:21:33 2018 library versions: OpenSSL 1.0.2o  27 Mar 2018, LZO 2.10
Sat Jun  9 15:21:34 2018 TUN/TAP device ovpns0 opened
Sat Jun  9 15:21:34 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun  9 15:21:34 2018 /sbin/ifconfig ovpns0 192.168.200.1 netmask 255.255.255.0 mtu 1500 broadcast 192.168.200.255
Sat Jun  9 15:21:34 2018 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Sat Jun  9 15:21:34 2018 setsockopt(IPV6_V6ONLY=0)
Sat Jun  9 15:21:34 2018 UDPv6 link local (bound): [AF_INET6][undef]:1194
Sat Jun  9 15:21:34 2018 UDPv6 link remote: [AF_UNSPEC]
Sat Jun  9 15:21:34 2018 Initialization Sequence Completed
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_VER=2.4.6
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_PLAT=win
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_PROTO=2
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_NCP=2
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_LZ4=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_LZ4v2=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_LZO=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_COMP_STUB=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_COMP_STUBv2=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_TCPNL=1
Sat Jun  9 20:57:08 2018 81.97.XX.XXX peer info: IV_GUI_VER=OpenVPN_GUI_11
Sat Jun  9 20:57:08 2018 81.97.XX.XXX [my-client] Peer Connection Initiated with [AF_INET6]::ffff:81.97.XX.XXX:65386
Sat Jun  9 20:57:08 2018 my-client/81.97.XX.XXX MULTI_sva: pool returned IPv4=192.168.200.2, IPv6=(Not enabled)
Sat Jun  9 21:02:11 2018 my-client/81.97.XX.XXX [my-client] Inactivity timeout (--ping-restart), restarting
root@OpenWrt:~#





cel = (1) bez dns leaków, (2) sieć lan, i (3)zwrotka do mnie [internet z polszy] (4) posprzątać/uciszyć śmietnik z logread - nic nie działa

dwa, router openwrt w polszy standardowo ma ip 192.168.1.1

root@OpenWrt:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr F8:1A:XX:XX:XX:XX
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          inet6 addr: fe80::fa1a:67ff:fee5:5e99/64 Scope:Link
          inet6 addr: fdae:a817:10d1::1/60 Scope:Global
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:6281 errors:0 dropped:0 overruns:0 frame:0
          TX packets:6593 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:663743 (648.1 KiB)  TX bytes:4677073 (4.4 MiB)

eth0      Link encap:Ethernet  HWaddr F8:1A:XX:XX:XX:XX
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
          Interrupt:5

eth1      Link encap:Ethernet  HWaddr F8:1A:XX:XX:XX:XX
          inet6 addr: fe80::fa1a:67ff:fee5:5e9b/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:12823 errors:0 dropped:0 overruns:0 frame:0
          TX packets:12243 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:6172411 (5.8 MiB)  TX bytes:2176966 (2.0 MiB)
          Interrupt:4

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:97 errors:0 dropped:0 overruns:0 frame:0
          TX packets:97 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1
          RX bytes:10525 (10.2 KiB)  TX bytes:10525 (10.2 KiB)

ovpns0    Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:1876 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          RX bytes:460028 (449.2 KiB)  TX bytes:0 (0.0 B)

pppoe-wan Link encap:Point-to-Point Protocol
          inet addr:185.13.XXX.XXX  P-t-P:185.13.XXX.X  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1492  Metric:1
          RX packets:10291 errors:0 dropped:0 overruns:0 frame:0
          TX packets:9707 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:3
          RX bytes:5794029 (5.5 MiB)  TX bytes:1886695 (1.7 MiB)

wlan0     Link encap:Ethernet  HWaddr F8:1A:XX:XX:XX:XX
          inet6 addr: fe80::fa1a:67ff:fee5:5e9a/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:6279 errors:0 dropped:0 overruns:0 frame:0
          TX packets:6745 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:751637 (734.0 KiB)  TX bytes:4877352 (4.6 MiB)

root@OpenWrt:~#


root@OpenWrt:~# cat /etc/config/network

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fdae:a817:10d1::/48'

config interface 'lan'
        option ifname 'eth0'
        option force_link '1'
        option type 'bridge'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option ip6assign '60'

config interface 'wan'
        option ifname 'eth1'
        option _orig_ifname 'eth1'
        option _orig_bridge 'false'
        option proto 'pppoe'
        option username 'NIEEEE'
        option password 'NIEEEEEE'
        option ipv6 '1'

config interface 'wan6'
        option ifname '@wan'
        option proto 'dhcpv6'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '0 1 2 3 4'

config interface 'vpnserver'
        option proto 'none'
        option ifname 'ovpns0'
        option auto '1'

root@OpenWrt:~#


root@OpenWrt:~# cat /etc/config/openvpn

config openvpn 'vpnserver'
        option enabled '1'
        option dev_type 'tun'
        option dev 'ovpns0'
        option port '1194'
        option proto 'udp'
        option comp_lzo 'yes'
        option keepalive '10 120'
        option persist_key '1'
        option persist_tun '1'
        option ca '/etc/openvpn/ca.crt'
        option cert '/etc/openvpn/my-server.crt'
        option key '/etc/openvpn/my-server.key'
        option dh '/etc/openvpn/dh2048.pem'
        option tls_auth '/etc/openvpn/tls-auth.key 0'
        option mode 'server'
        option tls_server '1'
        option server '192.168.200.0 255.255.255.0'
        option topology 'subnet'
        option route_gateway 'dhcp'
        option client_to_client '1'
        list push 'comp-lzo yes'
        list push 'persist-key'
        list push 'persist-tun'
        list push 'topology subnet'
        list push 'route-gateway dhcp'
        list push 'redirect-gateway def1'
        list push 'route 192.168.200.0 255.255.255.0'
        list push 'dhcp-option DNS 192.168.1.1'
        option log '/tmp/openvpn.log'

root@OpenWrt:~#

cos jeszcze o czym zapomnialem a moze miec znaczenie?
obsy wspominał o routingu...

root@OpenWrt:~# logread
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.000000] Linux version 4.4.92 (buildbot@builds-02.infra.lede-project.org) (gcc version 5.4.0 (LEDE GCC 5.4.0 r3101-bce140e) ) #0 Tue Oct 17 14:59:45 2017
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000] MyLoader: sysp=f9e981ae, boardp=d8ddba4e, parts=aa8bc4df
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] CPU0 revision is: 00019374 (MIPS 24Kc)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] SoC: Atheros AR9330 rev 1
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Determined physical RAM map:
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000]  memory: 04000000 @ 00000000 (usable)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.000000] No valid device tree found, continuing without
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Zone ranges:
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Movable zone start for each node
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Early memory node ranges
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000] On node 0 totalpages: 16384
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 803d04d0, node_mem_map 81000000
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000]   Normal zone: 128 pages used for memmap
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000]   Normal zone: 16384 pages, LIFO batch:3
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 16256
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.000000] Kernel command line:  board=TL-WR741ND-v4  console=ttyATH0,115200 rootfstype=squashfs,jffs2 noinitrd
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Writing ErrCtl register=00000000
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Readback ErrCtl register=00000000
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Memory: 60352K/65536K available (3076K kernel code, 160K rwdata, 412K rodata, 312K init, 205K bss, 5184K reserved, 0K cma-reserved)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] NR_IRQS:51
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] Clocks: CPU:400.000MHz, DDR:400.000MHz, AHB:200.000MHz, Ref:25.000MHz
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 9556302233 ns
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.000013] sched_clock: 32 bits at 200MHz, resolution 5ns, wraps every 10737418237ns
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.007553] Calibrating delay loop... 265.42 BogoMIPS (lpj=1327104)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.088746] pid_max: default: 32768 minimum: 301
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.093353] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.099501] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.109771] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.117805] futex hash table entries: 256 (order: -1, 3072 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.125382] NET: Registered protocol family 16
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.130072] MIPS: machine is TP-LINK TL-WR741ND v4
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.575772] Can't analyze schedule() prologue at 800670fc
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.592791] clocksource: Switched to clocksource MIPS
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.597872] NET: Registered protocol family 2
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.602008] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.607407] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.613445] TCP: Hash tables configured (established 1024 bind 1024)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.619617] UDP hash table entries: 256 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.625103] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.631391] NET: Registered protocol family 1
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    0.635282] PCI: CLS 0 bytes, default 32
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.640914] Crashlog allocated RAM at address 0x3f00000
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.665467] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.669667] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.682687] io scheduler noop registered
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.685125] io scheduler deadline registered (default)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.690257] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.700274] ar933x-uart: ttyATH0 at MMIO 0x18020000 (irq = 11, base_baud = 1562500) is a AR933X UART
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.708139] console [ttyATH0] enabled
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.714921] bootconsole [early0] disabled
Sat Jun  9 15:21:24 2018 kern.warn kernel: [    0.729148] m25p80 spi0.0: found w25q128, expected m25p80
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.733200] m25p80 spi0.0: w25q128 (16384 Kbytes)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.739218] 5 tp-link partitions found on MTD device spi0.0
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.743408] Creating 5 MTD partitions on "spi0.0":
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.748127] 0x000000000000-0x000000020000 : "u-boot"
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.755131] 0x000000020000-0x0000001533fc : "kernel"
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.760890] 0x0000001533fc-0x000000ff0000 : "rootfs"
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.766734] mtd: device 2 (rootfs) set to be root filesystem
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.770991] 1 squashfs-split partitions found on MTD device rootfs
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.777207] 0x000000380000-0x000000ff0000 : "rootfs_data"
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.784841] 0x000000ff0000-0x000001000000 : "art"
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    0.790371] 0x000000020000-0x000000ff0000 : "firmware"
Sat Jun  9 15:21:24 2018 kern.info kernel: [    0.813617] libphy: ag71xx_mdio: probed
Sat Jun  9 15:21:24 2018 kern.info kernel: [    1.404282] ag71xx-mdio.1: Found an AR7240/AR9330 built-in switch
Sat Jun  9 15:21:24 2018 kern.info kernel: [    1.436385] eth0: Atheros AG71xx at 0xba000000, irq 5, mode:GMII
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.024502] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.1:04 [uid=004dd041, driver=Generic PHY]
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.033255] eth1: Atheros AG71xx at 0xb9000000, irq 4, mode:MII
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.041505] NET: Registered protocol family 10
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.050440] NET: Registered protocol family 17
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.053623] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.066201] 8021q: 802.1Q VLAN Support v1.8
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.077644] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
Sat Jun  9 15:21:24 2018 kern.info kernel: [    2.085755] Freeing unused kernel memory: 312K
Sat Jun  9 15:21:24 2018 user.info kernel: [    3.340005] init: Console is alive
Sat Jun  9 15:21:24 2018 user.info kernel: [    3.342243] init: - watchdog -
Sat Jun  9 15:21:24 2018 user.info kernel: [    4.402383] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Sat Jun  9 15:21:24 2018 user.info kernel: [    4.499874] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Sat Jun  9 15:21:24 2018 user.info kernel: [    4.507770] init: - preinit -
Sat Jun  9 15:21:24 2018 kern.info kernel: [    5.156383] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    5.190096] random: procd: uninitialized urandom read (4 bytes read, 8 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    7.637923] jffs2: notice: (372) jffs2_build_xattr_subsystem: complete building xattr subsystem, 0 of xdatum (0 unchecked, 0 orphan) and 0 of xref (0 dead, 0 orphan) found.
Sat Jun  9 15:21:24 2018 user.info kernel: [    7.655437] mount_root: switching to jffs2 overlay
Sat Jun  9 15:21:24 2018 user.warn kernel: [    7.670615] urandom-seed: Seeding with /etc/urandom.seed
Sat Jun  9 15:21:24 2018 user.info kernel: [    7.982440] procd: - early -
Sat Jun  9 15:21:24 2018 user.info kernel: [    7.984122] procd: - watchdog -
Sat Jun  9 15:21:24 2018 user.info kernel: [    8.666753] procd: - watchdog -
Sat Jun  9 15:21:24 2018 user.info kernel: [    8.668815] procd: - ubus -
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.799155] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.809711] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.818351] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.826329] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.835754] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.844190] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.853350] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 kern.notice kernel: [    8.862174] random: ubusd: uninitialized urandom read (4 bytes read, 14 bits of entropy available)
Sat Jun  9 15:21:24 2018 user.info kernel: [    8.871874] procd: - init -
Sat Jun  9 15:21:24 2018 user.info kernel: [    9.709071] kmodloader: loading kernel modules from /etc/modules.d/*
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.726851] tun: Universal TUN/TAP device driver, 1.6
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.730453] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.742858] ip6_tables: (C) 2000-2006 Netfilter Core Team
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.762179] Loading modules backported from Linux version wt-2017-01-31-0-ge882dff19e7f
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.768826] Backport generated by backports.git backports-20160324-13-g24da7d3c
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.781444] ip_tables: (C) 2000-2006 Netfilter Core Team
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.796154] nf_conntrack version 0.5.0 (947 buckets, 3788 max)
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.846739] xt_time: kernel timezone is -0000
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.932214] PPP generic driver version 2.4.2
Sat Jun  9 15:21:24 2018 kern.info kernel: [    9.938531] NET: Registered protocol family 24
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998252] ath: EEPROM regdomain: 0x0
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998283] ath: EEPROM indicates default country code should be used
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998297] ath: doing EEPROM country->regdmn map search
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998325] ath: country maps to regdmn code: 0x3a
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998342] ath: Country alpha2 being used: US
Sat Jun  9 15:21:24 2018 kern.debug kernel: [    9.998355] ath: Regpair used: 0x3a
Sat Jun  9 15:21:24 2018 kern.debug kernel: [   10.010376] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Sat Jun  9 15:21:24 2018 kern.info kernel: [   10.018577] ieee80211 phy0: Atheros AR9330 Rev:1 mem=0xb8100000, irq=2
Sat Jun  9 15:21:24 2018 user.info kernel: [   10.183464] kmodloader: done loading kernel modules from /etc/modules.d/*
Sat Jun  9 15:21:24 2018 kern.notice kernel: [   11.647728] random: jshn: uninitialized urandom read (4 bytes read, 19 bits of entropy available)
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: 8021ad
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: 8021q
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: macvlan
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: bridge
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: Network device
Sat Jun  9 15:21:26 2018 user.notice : Added device handler type: tunnel
Sat Jun  9 15:21:29 2018 authpriv.info dropbear[732]: Not backgrounding
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN1
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN2
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN3
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN4
Sat Jun  9 15:21:32 2018 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN
Sat Jun  9 15:21:34 2018 kern.info kernel: [   22.998597] device eth0 entered promiscuous mode
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'lan' is enabled
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'lan' is setting up now
Sat Jun  9 15:21:34 2018 kern.info kernel: [   23.014458] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'lan' is now up
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'loopback' is enabled
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'loopback' is setting up now
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'loopback' is now up
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'vpnserver' is enabled
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'wan' is enabled
Sat Jun  9 15:21:34 2018 kern.info kernel: [   23.095128] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Sat Jun  9 15:21:34 2018 daemon.info odhcpd[702]: Raising SIGUSR1 due to address change on br-lan
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Network device 'ovpns0' link is up
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'vpnserver' has link connectivity
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'vpnserver' is setting up now
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'vpnserver' is now up
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Network device 'lo' link is up
Sat Jun  9 15:21:34 2018 daemon.notice netifd: Interface 'loopback' has link connectivity
Sat Jun  9 15:21:35 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Jun  9 15:21:35 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 15:21:35 2018 daemon.notice odhcpd[702]: Failed to send to ff02::1%br-lan (Address not available)
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.763043] ath: EEPROM regdomain: 0x8268
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.765603] ath: EEPROM indicates we should expect a country code
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.771681] ath: doing EEPROM country->regdmn map search
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.777027] ath: country maps to regdmn code: 0x37
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.781748] ath: Country alpha2 being used: PL
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.786191] ath: Regpair used: 0x37
Sat Jun  9 15:21:36 2018 kern.debug kernel: [   24.789650] ath: regdomain 0x8268 dynamically updated by user
Sat Jun  9 15:21:36 2018 daemon.info procd: - init complete -
Sat Jun  9 15:21:37 2018 kern.info kernel: [   25.496460] eth1: link up (100Mbps/Full duplex)
Sat Jun  9 15:21:37 2018 kern.info kernel: [   25.499588] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Sat Jun  9 15:21:37 2018 daemon.notice netifd: Network device 'eth1' link is up
Sat Jun  9 15:21:37 2018 daemon.notice netifd: Interface 'wan' has link connectivity
Sat Jun  9 15:21:37 2018 daemon.notice netifd: Interface 'wan' is setting up now
Sat Jun  9 15:21:38 2018 daemon.info pppd[986]: Plugin rp-pppoe.so loaded.
Sat Jun  9 15:21:38 2018 daemon.info pppd[986]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Sat Jun  9 15:21:38 2018 daemon.notice pppd[986]: pppd 2.4.7 started by root, uid 0
Sat Jun  9 15:21:38 2018 daemon.info pppd[986]: PPP session is 16482
Sat Jun  9 15:21:38 2018 daemon.warn pppd[986]: Connected to 60:2e:XX:XX:XX:XX via interface eth1
Sat Jun  9 15:21:38 2018 kern.info kernel: [   26.980739] pppoe-wan: renamed from ppp0
Sat Jun  9 15:21:38 2018 daemon.info pppd[986]: Using interface pppoe-wan
Sat Jun  9 15:21:38 2018 daemon.notice pppd[986]: Connect: pppoe-wan <--> eth1
Sat Jun  9 15:21:39 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Sat Jun  9 15:21:39 2018 kern.info kernel: [   27.697157] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Sat Jun  9 15:21:39 2018 kern.info kernel: [   27.719071] device wlan0 entered promiscuous mode
Sat Jun  9 15:21:39 2018 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Jun  9 15:21:39 2018 daemon.err hostapd: Using interface wlan0 with hwaddr f8:1a:XX:XX:XX:XX and ssid "OpenWrt"
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: started, version 2.78 cachesize 150
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: using local addresses only for domain lan
Sat Jun  9 15:21:39 2018 daemon.warn dnsmasq[1077]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: read /etc/hosts - 1 addresses
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: read /tmp/hosts/odhcpd - 0 addresses
Sat Jun  9 15:21:39 2018 daemon.info dnsmasq[1077]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Sat Jun  9 15:21:40 2018 kern.info kernel: [   28.861220] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sat Jun  9 15:21:40 2018 kern.info kernel: [   28.866468] br-lan: port 2(wlan0) entered forwarding state
Sat Jun  9 15:21:40 2018 kern.info kernel: [   28.871650] br-lan: port 2(wlan0) entered forwarding state
Sat Jun  9 15:21:40 2018 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ENABLED
Sat Jun  9 15:21:40 2018 daemon.notice hostapd: wlan0: AP-ENABLED
Sat Jun  9 15:21:40 2018 daemon.notice netifd: bridge 'br-lan' link is up
Sat Jun  9 15:21:40 2018 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Jun  9 15:21:40 2018 kern.info kernel: [   28.896534] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sat Jun  9 15:21:40 2018 daemon.notice netifd: Network device 'wlan0' link is up
Sat Jun  9 15:21:41 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 15:21:41 2018 daemon.notice odhcpd[702]: Failed to send to ff02::1%br-lan (Address not available)
Sat Jun  9 15:21:41 2018 daemon.info pppd[986]: CHAP authentication succeeded: Authentication success,Welcome!
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: CHAP authentication succeeded
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: peer from calling number 60:2E:XX:XX:XX:XX authorized
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: local  IP address 185.13.XXX.XXX
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: remote IP address 185.13.XXX.X
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: primary   DNS address 62.133.128.10
Sat Jun  9 15:21:41 2018 daemon.notice pppd[986]: secondary DNS address 62.133.128.20
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Interface 'wan6' is enabled
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Network alias 'pppoe-wan' link is up
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Interface 'wan6' has link connectivity
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Interface 'wan6' is setting up now
Sat Jun  9 15:21:42 2018 daemon.notice netifd: Interface 'wan' is now up
Sat Jun  9 15:21:42 2018 daemon.info dnsmasq[1077]: reading /tmp/resolv.conf.auto
Sat Jun  9 15:21:42 2018 daemon.info dnsmasq[1077]: using local addresses only for domain lan
Sat Jun  9 15:21:42 2018 daemon.info dnsmasq[1077]: using nameserver 62.133.128.10#53
Sat Jun  9 15:21:42 2018 daemon.info dnsmasq[1077]: using nameserver 62.133.128.20#53
Sat Jun  9 15:21:42 2018 kern.info kernel: [   30.862862] br-lan: port 2(wlan0) entered forwarding state
Sat Jun  9 15:21:43 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 15:21:43 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 15:21:44 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 15:21:44 2018 user.notice firewall: Reloading firewall due to ifup of vpnserver (ovpns0)
Sat Jun  9 15:21:46 2018 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sat Jun  9 15:21:46 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:34:12 2018 daemon.info pppd[986]: System time change detected.
Sat Jun  9 20:34:12 2018 user.notice ddns-scripts[1373]: dynamicznydns: PID '1373' started at 2018-06-09 20:34
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1077]: exiting on receipt of SIGTERM
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: started, version 2.78 cachesize 150
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq-dhcp[1527]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: using local addresses only for domain lan
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: reading /tmp/resolv.conf.auto
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: using local addresses only for domain lan
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: using nameserver 62.133.128.10#53
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: using nameserver 62.133.128.20#53
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: read /etc/hosts - 1 addresses
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: read /tmp/hosts/odhcpd - 0 addresses
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq[1527]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Sat Jun  9 20:34:14 2018 daemon.info dnsmasq-dhcp[1527]: read /etc/ethers - 0 addresses
Sat Jun  9 20:34:16 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:34:24 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:34:29 2018 kern.notice kernel: [   52.657777] random: nonblocking pool is initialized
Sat Jun  9 20:34:40 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:34:45 2018 daemon.info dnsmasq[1527]: read /etc/hosts - 1 addresses
Sat Jun  9 20:34:45 2018 daemon.info dnsmasq[1527]: read /tmp/hosts/odhcpd - 0 addresses
Sat Jun  9 20:34:45 2018 daemon.info dnsmasq[1527]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Sat Jun  9 20:34:45 2018 daemon.info dnsmasq-dhcp[1527]: read /etc/ethers - 0 addresses
Sat Jun  9 20:35:04 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:a0:XX:XX IEEE 802.11: authenticated
Sat Jun  9 20:35:04 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:a0:XX:XX IEEE 802.11: associated (aid 1)
Sat Jun  9 20:35:04 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 1c:ab:a7:XX:XX:XX
Sat Jun  9 20:35:04 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:XX:XX:XX WPA: pairwise key handshake completed (WPA)
Sat Jun  9 20:35:04 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:35:04 2018 daemon.info dnsmasq-dhcp[1527]: DHCPREQUEST(br-lan) 192.168.1.129 1c:ab:a7:XX:XX:XX
Sat Jun  9 20:35:04 2018 daemon.info dnsmasq-dhcp[1527]: DHCPACK(br-lan) 192.168.1.129 1c:ab:a7:XX:XX:XX iPad
Sat Jun  9 20:35:04 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:35:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX IEEE 802.11: authenticated
Sat Jun  9 20:35:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX IEEE 802.11: associated (aid 2)
Sat Jun  9 20:35:06 2018 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: pairwise key handshake completed (WPA)
Sat Jun  9 20:35:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:35:07 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:35:09 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPDISCOVER(br-lan) 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPOFFER(br-lan) 192.168.1.201 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPDISCOVER(br-lan) 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPOFFER(br-lan) 192.168.1.201 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPREQUEST(br-lan) 192.168.1.201 44:80:eb:XX:XX:XX
Sat Jun  9 20:35:10 2018 daemon.info dnsmasq-dhcp[1527]: DHCPACK(br-lan) 192.168.1.201 44:80:eb:XX:XX:XX android-f510e9724f1a5ed1
Sat Jun  9 20:35:13 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:35:13 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:36:17 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:38:24 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:40:26 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:42:16 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:43:47 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:44:05 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:44:06 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:a0:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:44:09 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:46:07 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:48:07 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:50:04 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:52:06 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:53:29 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 20:54:00 2018 authpriv.info dropbear[1603]: Child connection from 81.97.86.XXX:1242
Sat Jun  9 20:54:05 2018 authpriv.info dropbear[1603]: Exit before auth (user 'root', 0 fails): Exited normally
Sat Jun  9 20:54:06 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:54:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 20:54:12 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:56:03 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:58:07 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 20:59:24 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 21:00:07 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:02:02 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:04:02 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:04:06 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 21:04:06 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 21:06:08 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:07:48 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 21:08:00 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:08:38 2018 authpriv.info dropbear[1705]: Child connection from 81.97.86.XXX:1580
Sat Jun  9 21:08:43 2018 authpriv.notice dropbear[1705]: Password auth succeeded for 'root' from 81.97.86.XXX:1580
Sat Jun  9 21:09:50 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:11:42 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:13:36 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:13:45 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 21:14:05 2018 daemon.info hostapd: wlan0: STA 44:80:eb:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 21:14:06 2018 daemon.info hostapd: wlan0: STA 1c:ab:a7:XX:XX:XX WPA: group key handshake completed (WPA)
Sat Jun  9 21:15:35 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:17:26 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:18:56 2018 daemon.info odhcpd[702]: Using a RA lifetime of 0 seconds on br-lan
Sat Jun  9 21:19:21 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
Sat Jun  9 21:21:29 2018 daemon.err odhcp6c[1134]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
root@OpenWrt:~#


root@OpenWrt:~# route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
default         dynamic185-13-1 0.0.0.0         UG    0      0        0 pppoe-wan
185.13.184.1    *               255.255.255.255 UH    0      0        0 pppoe-wan
192.168.1.0     *               255.255.255.0   U     0      0        0 br-lan
root@OpenWrt:~# echo "1" > /proc/sys/net/ipv4/ip_forward
root@OpenWrt:~#
root@OpenWrt:~# ip route show
default via 185.13.184.1 dev pppoe-wan
185.13.XXX.X dev pppoe-wan  src 185.13.XXX.XXX
192.168.1.0/24 dev br-lan  src 192.168.1.1
root@OpenWrt:~#



Ostatnio zmieniony 11 cze 2018, 01:15 przez byku, łącznie zmieniany 5 razy

Na górę
 Wyświetl profil  
Odpowiedz z cytatem  
 Tytuł: Re: MMA z VPN'em ciąg dalszy...
Post: 9 cze 2018, 21:52 
Offline
Użytkownik

Rejestracja: 13 sie 2013, 19:55
Posty: 49
jedyną prośbę mam do adminów i tym podobnych, żeby wyedytowali dane które są sensitive nic więcej poza tematem, pozdrawiam


Na górę
 Wyświetl profil  
Odpowiedz z cytatem  
 Tytuł: Re: MMA z VPN'em ciąg dalszy...
Post: 9 cze 2018, 23:00 
Offline
Administrator
Awatar użytkownika

Rejestracja: 10 kwie 2010, 00:28
Posty: 13248
Lokalizacja: Warszawa
login/pass wywaliłeś, reszta to normalnie dane.

_________________
http://eko.one.pl - prawie wszystko o OpenWrt


Na górę
 Wyświetl profil  
Odpowiedz z cytatem  
 Tytuł: Re: MMA z VPN'em ciąg dalszy...
Post: 10 cze 2018, 23:01 
Offline
Użytkownik

Rejestracja: 13 sie 2013, 19:55
Posty: 49
Problem rozwiązany, wyedytowana linia w /etc/config/openvpn
option proto 'udp4'

tak samo w kliencie .ovpn
proto udp4


Jakiś bład był pomiędzy ipv4/ipv6.

klient:
Sat Jun 09 19:57:04 2018 UDP link local: (not bound)
Sat Jun 09 19:57:04 2018 UDP link remote: [AF_INET]


serwer:
Sat Jun  9 15:21:34 2018 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Sat Jun  9 15:21:34 2018 setsockopt(IPV6_V6ONLY=0)
Sat Jun  9 15:21:34 2018 UDPv6 link local (bound): [AF_INET6][undef]:1194
Sat Jun  9 15:21:34 2018 UDPv6 link remote: [AF_UNSPEC]


Polecenie "ip addr show" (błędnie bez rozgłaszania dhcp)
5: ovpns0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 100
    link/[65534]


a powinno :

11: ovpns0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 100
    link/[65534]
    inet 192.168.200.1/24 brd 192.168.200.255 scope global ovpns0
       valid_lft forever preferred_lft forever


cel (1), (2), (3) - zrealizowane


Na górę
 Wyświetl profil  
Odpowiedz z cytatem  
Wyświetl posty nie starsze niż:  Sortuj wg  
Nowy temat Odpowiedz w temacie  [ Posty: 4 ] 

Strefa czasowa UTC+1godz. [letni]


Kto jest online

Użytkownicy przeglądający to forum: Obecnie na forum nie ma żadnego zarejestrowanego użytkownika i 4 gości


Nie możesz tworzyć nowych tematów
Nie możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów

Szukaj:
Przejdź do:  
designed by digi-led.pl
...Copyright © 2010-2013, Ekipa openrouter.info