[isf-wifidog] Error: we did not get a valid answer fromthecentral server

Dan Holton DHolton at creditunions.com
Jeu 29 Sep 15:45:39 EDT 2005


192.168.1.39 is the auth server.

here's the output from wifidog -f -d 7

 

[6][Sat Jan 1 00:41:51 2000](conf.c:576) Reading configuration file
'/etc/wifidog.conf'

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: GatewayID,
value: wifi

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
ExternalInterface, value: vlan1

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
GatewayInterface, value: br0

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: GatewayAddress,
value: 192.168.1.1

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: AuthServer,
value: {

[7][Sat Jan 1 00:41:51 2000](conf.c:291) Adding 192.168.1.39:80 (SSL:
443) /wifidog/ to the auth server list

[7][Sat Jan 1 00:41:51 2000](conf.c:313) Auth server added

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: CheckInterval,
value: 60

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: ClientTimeout,
value: 5

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: FirewallRuleSet,
value: global

[7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set global

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow udp to 69.90.89.192/27]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to
69.90.89.192/27

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow udp
port (null) to 69.90.89.192/27

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow udp to 69.90.85.0/27]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to
69.90.85.0/27

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow udp
port (null) to 69.90.85.0/27

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow tcp port 80 to 69.90.89.205]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 80 to
69.90.89.205

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow tcp
port 80 to 69.90.89.205

[7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set global added.

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: FirewallRuleSet,
value: validating-users

[7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
validating-users

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[block tcp port 25]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block tcp port 25

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block tcp
port 25 to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow to 0.0.0.0/0]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
(null) port (null) to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set
validating-users added.

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: FirewallRuleSet,
value: known-users

[7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
known-users

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow to 0.0.0.0/0]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
(null) port (null) to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set known-users
added.

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: FirewallRuleSet,
value: unknown-users

[7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
unknown-users

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow udp port 53]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 53

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow udp
port 53 to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow tcp port 53]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 53

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow tcp
port 53 to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow udp port 67]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 67

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow udp
port 67 to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[allow tcp port 67]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 67

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow tcp
port 67 to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set unknown-users
added.

[7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: FirewallRuleSet,
value: locked-users

[7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
locked-users

[7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
[block to 0.0.0.0/0]

[7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block
(null) port (null) to 0.0.0.0/0

[7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set locked-users
added.

[5][Sat Jan 1 00:41:51 2000](gateway.c:203) Creating web server on
192.168.1.1:2060

[7][Sat Jan 1 00:41:51 2000](gateway.c:210) Assigning callbacks to web
server

[7][Sat Jan 1 00:41:51 2000](gateway.c:130) Initializing signal handlers

[6][Sat Jan 1 00:41:51 2000](firewall.c:191) Removing Firewall rules

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:293) Destroying our iptables
entries

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:300) Destroying chains in the
MANGLE table

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to destroy
all mention of WiFiDog_Outgoing from mangle.PREROUTING

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to destroy
all mention of WiFiDog_Incoming from mangle.POSTROUTING

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -F WiFiDog_Outgoing

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -F WiFiDog_Incoming

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -X WiFiDog_Outgoing

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -X WiFiDog_Incoming

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:313) Destroying chains in the
NAT table

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to destroy
all mention of WiFiDog_Outgoing from nat.PREROUTING

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_AuthServers

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_Outgoing

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_WIFI2Router

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_Unknown

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -X WiFiDog_AuthServers

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -X WiFiDog_Outgoing

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -X WiFiDog_WIFI2Router

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -X WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
iptables -t nat -X WiFiDog_Unknown

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:331) Destroying chains in the
FILTER table

[7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to destroy
all mention of WiFiDog_WIFI2Internet from filter.FORWARD

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_AuthServers

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_Locked

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_Global

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_Validate

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_Known

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_Unknown

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_AuthServers

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_Locked

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_Global

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_Validate

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_Known

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t filter -X WiFiDog_Unknown

[6][Sat Jan 1 00:41:52 2000](firewall.c:147) Creating ICMP socket

[6][Sat Jan 1 00:41:52 2000](firewall.c:157) Initializing Firewall

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Locking config

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Config locked

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Unlocking config

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Config unlocked

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -N WiFiDog_Outgoing

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -N WiFiDog_Incoming

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -I PREROUTING 1 -i br0 -j WiFiDog_Outgoing

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -I POSTROUTING 1 -o br0 -j WiFiDog_Incoming

[7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
iptables -t nat -N WiFiDog_Outgoing

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -N WiFiDog_WIFI2Router

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -N WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -N WiFiDog_Unknown

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -N WiFiDog_AuthServers

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A PREROUTING -i br0 -j WiFiDog_Outgoing

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_Outgoing -d 192.168.1.1 -j
WiFiDog_WIFI2Router

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_WIFI2Router -j ACCEPT

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_Outgoing -j WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j ACCEPT

Segmentation fault

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j ACCEPT

Segmentation fault

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_Unknown -j WiFiDog_AuthServers

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_Unknown -p tcp --dport 80 -j REDIRECT
--to-ports 2060

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_AuthServers

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_Locked

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_Global

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_Validate

[7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_Known

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -N WiFiDog_Unknown

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A FORWARD -i br0 -j WiFiDog_WIFI2Internet

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_AuthServers

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x254 -j
WiFiDog_Locked

Segmentation fault

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset
locked-users into chain WiFiDog_Locked

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT" into WiFiDog_Locked

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset locked-users
loaded into WiFiDog_Locked

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset global into
chain WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Global -d 69.90.89.192/27 -p udp -j ACCEPT" into
WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT" into WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Global -d 69.90.89.205 -p tcp --dport 80 -j ACCEPT" into
WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport 80
-j ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset global loaded
into WiFiDog_Global

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j
WiFiDog_Validate

Segmentation fault

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset
validating-users into chain WiFiDog_Validate

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport 25 -j REJECT" into
WiFiDog_Validate

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport 25 -j
REJECT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT" into WiFiDog_Validate

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset validating-users
loaded into WiFiDog_Validate

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j
WiFiDog_Known

Segmentation fault

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset known-users
into chain WiFiDog_Known

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT" into WiFiDog_Known

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset known-users
loaded into WiFiDog_Known

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset
unknown-users into chain WiFiDog_Unknown

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT" into
WiFiDog_Unknown

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 53 -j
ACCEPT

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT" into
WiFiDog_Unknown

[7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 53 -j
ACCEPT

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT" into
WiFiDog_Unknown

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 67 -j
ACCEPT

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t filter
-A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 67 -j ACCEPT" into
WiFiDog_Unknown

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 67 -j
ACCEPT

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:153) Ruleset unknown-users
loaded into WiFiDog_Unknown

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_Unknown -j REJECT --reject-with
icmp-port-unreachable

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:78) Starting wdctl.

[5][Sat Jan 1 00:41:55 2000](gateway.c:249) Waiting for connections

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:82) Socket name:
/tmp/wdctl.sock

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:91) Creating socket

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:94) Got server socket 8

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:99) Filling sockaddr_un

[7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:105) Binding socket
(/tmp/wdctl.sock) (15)

[6][Sat Jan 1 00:41:55 2000](ping_thread.c:68) Setting started_time

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:78) Running ping()

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:114) Entering ping()

[7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Locking config

[7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Config locked

[7][Sat Jan 1 00:41:55 2000](centralserver.c:210) Level 1: Calculated 1
auth servers in list

[7][Sat Jan 1 00:41:55 2000](centralserver.c:225) Level 1: Resolving
auth server [192.168.1.39]

[7][Sat Jan 1 00:41:55 2000](util.c:120) Locking wd_gethostbyname()

[7][Sat Jan 1 00:41:55 2000](util.c:120) wd_gethostbyname() locked

[6][Sat Jan 1 00:41:55 2000](util.c:184) ONLINE status became ON

[7][Sat Jan 1 00:41:55 2000](util.c:135) Unlocking wd_gethostbyname()

[7][Sat Jan 1 00:41:55 2000](util.c:135) wd_gethostbyname() unlocked

[7][Sat Jan 1 00:41:55 2000](centralserver.c:279) Level 1: Resolving
auth server [192.168.1.39] succeeded = [192.168.1.39]

[7][Sat Jan 1 00:41:55 2000](centralserver.c:286) Level 1: Updating
last_ip IP of server [192.168.1.39] to [192.168.1.39]

[6][Sat Jan 1 00:41:55 2000](firewall.c:166) Clearing the authservers
list

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t filter -F WiFiDog_AuthServers

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t nat -F WiFiDog_AuthServers

[6][Sat Jan 1 00:41:55 2000](firewall.c:175) Setting the authservers
list

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t filter -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT

[7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
iptables -t nat -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT

[7][Sat Jan 1 00:41:55 2000](centralserver.c:304) Level 1: Connecting to
auth server 192.168.1.39:80

[7][Sat Jan 1 00:41:55 2000](centralserver.c:330) Level 1: Successfully
connected to auth server 192.168.1.39:80

[7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Unlocking config

[7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Config unlocked

[7][Sat Jan 1 00:41:55 2000](centralserver.c:177) Connected to auth
server

[6][Sat Jan 1 00:41:55 2000](util.c:226) AUTH_ONLINE status became ON

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:165) HTTP Request to Server:
[GET
/wifidog/ping/?gw_id=wifi&sys_uptime=2515&sys_memfree=5324&sys_load=0.13
&wifidog_uptime=0 HTTP/1.0

User-Agent: WiFiDog 1.1.2

Host: 192.168.1.39

]

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:169) Reading response

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:197) Read 287 bytes, total
now 287

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:215) Done reading reply,
total 287 bytes

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:219) HTTP Response from
Server: [HTTP/1.1 200 OK

Date: Thu, 29 Sep 2005 18:07:11 GMT

Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5
PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7

X-Powered-By: PHP/5.0.5-1

Content-Length: 4

Connection: close

Content-Type: text/html

X-Pad: avoid browser bug

Pong]

[7][Sat Jan 1 00:41:55 2000](ping_thread.c:226) Auth Server Says: Pong

[6][Sat Jan 1 00:42:14 2000](gateway.c:274) Received connection from
192.168.1.109, spawning worker thread

[7][Sat Jan 1 00:42:14 2000](httpd_thread.c:65) Processing request from
192.168.1.109

[7][Sat Jan 1 00:42:14 2000](httpd_thread.c:66) Calling
httpdProcessRequest() for 192.168.1.109

[6][Sat Jan 1 00:42:14 2000](http.c:127) Captured 192.168.1.109
requesting [http%3A//www.google.com/] and re-directed them to login page

[7][Sat Jan 1 00:42:14 2000](httpd_thread.c:68) Returned from
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:42:14 2000](httpd_thread.c:73) Closing connection with
192.168.1.109

[6][Sat Jan 1 00:42:15 2000](gateway.c:274) Received connection from
192.168.1.109, spawning worker thread

[7][Sat Jan 1 00:42:15 2000](httpd_thread.c:65) Processing request from
192.168.1.109

[7][Sat Jan 1 00:42:15 2000](httpd_thread.c:66) Calling
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:42:15 2000](http.c:181) Locking client list

[7][Sat Jan 1 00:42:15 2000](http.c:181) Client list locked

[7][Sat Jan 1 00:42:15 2000](http.c:184) New client for 192.168.1.109

[6][Sat Jan 1 00:42:15 2000](client_list.c:108) Added a new client to
linked list: IP: 192.168.1.109 Token: 8ce8ec1cbd30a1dfe009a9365a0495a7

[7][Sat Jan 1 00:42:15 2000](http.c:190) Unlocking client list

[7][Sat Jan 1 00:42:15 2000](http.c:190) Client list unlocked

[7][Sat Jan 1 00:42:15 2000](auth.c:102) Locking client list

[7][Sat Jan 1 00:42:15 2000](auth.c:102) Client list locked

[7][Sat Jan 1 00:42:15 2000](auth.c:115) Unlocking client list

[7][Sat Jan 1 00:42:15 2000](auth.c:115) Client list unlocked

[7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Locking config

[7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Config locked

[7][Sat Jan 1 00:42:15 2000](centralserver.c:210) Level 1: Calculated 1
auth servers in list

[7][Sat Jan 1 00:42:15 2000](centralserver.c:225) Level 1: Resolving
auth server [192.168.1.39]

[7][Sat Jan 1 00:42:15 2000](util.c:120) Locking wd_gethostbyname()

[7][Sat Jan 1 00:42:15 2000](util.c:120) wd_gethostbyname() locked

[7][Sat Jan 1 00:42:15 2000](util.c:135) Unlocking wd_gethostbyname()

[7][Sat Jan 1 00:42:15 2000](util.c:135) wd_gethostbyname() unlocked

[7][Sat Jan 1 00:42:15 2000](centralserver.c:279) Level 1: Resolving
auth server [192.168.1.39] succeeded = [192.168.1.39]

[7][Sat Jan 1 00:42:15 2000](centralserver.c:304) Level 1: Connecting to
auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:15 2000](centralserver.c:330) Level 1: Successfully
connected to auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Unlocking config

[7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Config unlocked

[7][Sat Jan 1 00:42:15 2000](centralserver.c:177) Connected to auth
server

[7][Sat Jan 1 00:42:15 2000](centralserver.c:95) Sending HTTP request to
auth server: [GET
/wifidog/auth/?stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=
8ce8ec1cbd30a1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0

User-Agent: WiFiDog 1.1.2

Host: 192.168.1.39

]

[7][Sat Jan 1 00:42:15 2000](centralserver.c:98) Reading response

[7][Sat Jan 1 00:42:15 2000](centralserver.c:125) Read 303 bytes, total
now 303

[7][Sat Jan 1 00:42:15 2000](centralserver.c:145) HTTP Response from
Server: [HTTP/1.1 200 OK

Date: Thu, 29 Sep 2005 18:07:31 GMT

Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5
PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7

X-Powered-By: PHP/5.0.5-1

Content-Length: 19

Connection: close

Content-Type: text/html

X-Pad: avoid browser bug

Auth: 1

Messages:

]

[6][Sat Jan 1 00:42:15 2000](centralserver.c:149) Auth server returned
authentication code 1

[7][Sat Jan 1 00:42:15 2000](auth.c:119) Locking client list

[7][Sat Jan 1 00:42:15 2000](auth.c:119) Client list locked

[6][Sat Jan 1 00:42:15 2000](auth.c:205) Got ALLOWED from central server
authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from 192.168.1.109
at 00:10:C6:39:D0:EE - adding to firewall and redirecting them to portal

[7][Sat Jan 1 00:42:15 2000](firewall.c:85) Allowing 192.168.1.109
00:10:C6:39:D0:EE with fw_connection_state 2

[7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -A WiFiDog_Outgoing -s 192.168.1.109 -m mac
--mac-source 00:10:C6:39:D0:EE -j MARK --set-mark 2

Segmentation fault

[7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:
iptables -t mangle -A WiFiDog_Incoming -d 192.168.1.109 -j ACCEPT

[7][Sat Jan 1 00:42:15 2000](auth.c:260) Unlocking client list

[7][Sat Jan 1 00:42:15 2000](auth.c:260) Client list unlocked

[7][Sat Jan 1 00:42:15 2000](httpd_thread.c:68) Returned from
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:42:15 2000](httpd_thread.c:73) Closing connection with
192.168.1.109

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:78) Running ping()

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:114) Entering ping()

[7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config

[7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1: Calculated 1
auth servers in list

[7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1: Resolving
auth server [192.168.1.39]

[7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()

[7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked

[7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()

[7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1: Resolving
auth server [192.168.1.39] succeeded = [192.168.1.39]

[7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1: Connecting to
auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1: Successfully
connected to auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config

[7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth
server

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:165) HTTP Request to Server:
[GET
/wifidog/ping/?gw_id=wifi&sys_uptime=2575&sys_memfree=5296&sys_load=0.05
&wifidog_uptime=60 HTTP/1.0

User-Agent: WiFiDog 1.1.2

Host: 192.168.1.39

]

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:169) Reading response

[7][Sat Jan 1 00:42:55 2000](auth.c:79) Running fw_counter()

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:505) Incoming 192.168.1.109
Bytes=1216

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Locking client list

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Client list locked

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:510) 192.168.1.109 - Updated
counter.incoming to 1216 bytes

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Unlocking client list

[7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Client list unlocked

[7][Sat Jan 1 00:42:55 2000](firewall.c:212) Locking client list

[7][Sat Jan 1 00:42:55 2000](firewall.c:212) Client list locked

[7][Sat Jan 1 00:42:55 2000](firewall.c:223) Unlocking client list

[7][Sat Jan 1 00:42:55 2000](firewall.c:223) Client list unlocked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config

[7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1: Calculated 1
auth servers in list

[7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1: Resolving
auth server [192.168.1.39]

[7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()

[7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked

[7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()

[7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1: Resolving
auth server [192.168.1.39] succeeded = [192.168.1.39]

[7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1: Connecting to
auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1: Successfully
connected to auth server 192.168.1.39:80

[7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config

[7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked

[7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth
server

[7][Sat Jan 1 00:42:55 2000](centralserver.c:95) Sending HTTP request to
auth server: [GET
/wifidog/auth/?stage=counters&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&tok
en=8ce8ec1cbd30a1dfe009a9365a0495a7&incoming=1216&outgoing=0 HTTP/1.0

User-Agent: WiFiDog 1.1.2

Host: 192.168.1.39

]

[7][Sat Jan 1 00:42:55 2000](centralserver.c:98) Reading response

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:197) Read 287 bytes, total
now 287

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:215) Done reading reply,
total 287 bytes

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:219) HTTP Response from
Server: [HTTP/1.1 200 OK

Date: Thu, 29 Sep 2005 18:08:11 GMT

Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5
PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7

X-Powered-By: PHP/5.0.5-1

Content-Length: 4

Connection: close

Content-Type: text/html

X-Pad: avoid browser bug

Pong]

[7][Sat Jan 1 00:42:55 2000](ping_thread.c:226) Auth Server Says: Pong

[7][Sat Jan 1 00:42:55 2000](centralserver.c:125) Read 323 bytes, total
now 323

[7][Sat Jan 1 00:42:55 2000](centralserver.c:145) HTTP Response from
Server: [HTTP/1.1 200 OK

Date: Thu, 29 Sep 2005 18:08:11 GMT

Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5
PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7

X-Powered-By: PHP/5.0.5-1

Content-Length: 39

Connection: close

Content-Type: text/html

X-Pad: avoid browser bug

Auth: 1

Messages: | Updated counters.

]

[6][Sat Jan 1 00:42:55 2000](centralserver.c:149) Auth server returned
authentication code 1

[7][Sat Jan 1 00:42:55 2000](firewall.c:228) Locking client list

[7][Sat Jan 1 00:42:55 2000](firewall.c:228) Client list locked

[7][Sat Jan 1 00:42:55 2000](firewall.c:300) Unlocking client list

[7][Sat Jan 1 00:42:55 2000](firewall.c:300) Client list unlocked

[6][Sat Jan 1 00:43:21 2000](gateway.c:274) Received connection from
192.168.1.109, spawning worker thread

[7][Sat Jan 1 00:43:21 2000](httpd_thread.c:65) Processing request from
192.168.1.109

[7][Sat Jan 1 00:43:21 2000](httpd_thread.c:66) Calling
httpdProcessRequest() for 192.168.1.109

[6][Sat Jan 1 00:43:21 2000](http.c:127) Captured 192.168.1.109
requesting [http%3A//www.gmail.com/] and re-directed them to login page

[7][Sat Jan 1 00:43:21 2000](httpd_thread.c:68) Returned from
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:43:21 2000](httpd_thread.c:73) Closing connection with
192.168.1.109

[6][Sat Jan 1 00:43:22 2000](gateway.c:274) Received connection from
192.168.1.109, spawning worker thread

[7][Sat Jan 1 00:43:22 2000](httpd_thread.c:65) Processing request from
192.168.1.109

[7][Sat Jan 1 00:43:22 2000](httpd_thread.c:66) Calling
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:43:22 2000](http.c:181) Locking client list

[7][Sat Jan 1 00:43:22 2000](http.c:181) Client list locked

[7][Sat Jan 1 00:43:22 2000](http.c:187) Node for 192.168.1.109 already
exists

[7][Sat Jan 1 00:43:22 2000](http.c:190) Unlocking client list

[7][Sat Jan 1 00:43:22 2000](http.c:190) Client list unlocked

[7][Sat Jan 1 00:43:22 2000](auth.c:102) Locking client list

[7][Sat Jan 1 00:43:22 2000](auth.c:102) Client list locked

[7][Sat Jan 1 00:43:22 2000](auth.c:115) Unlocking client list

[7][Sat Jan 1 00:43:22 2000](auth.c:115) Client list unlocked

[7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Locking config

[7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Config locked

[7][Sat Jan 1 00:43:22 2000](centralserver.c:210) Level 1: Calculated 1
auth servers in list

[7][Sat Jan 1 00:43:22 2000](centralserver.c:225) Level 1: Resolving
auth server [192.168.1.39]

[7][Sat Jan 1 00:43:22 2000](util.c:120) Locking wd_gethostbyname()

[7][Sat Jan 1 00:43:22 2000](util.c:120) wd_gethostbyname() locked

[7][Sat Jan 1 00:43:22 2000](util.c:135) Unlocking wd_gethostbyname()

[7][Sat Jan 1 00:43:22 2000](util.c:135) wd_gethostbyname() unlocked

[7][Sat Jan 1 00:43:22 2000](centralserver.c:279) Level 1: Resolving
auth server [192.168.1.39] succeeded = [192.168.1.39]

[7][Sat Jan 1 00:43:22 2000](centralserver.c:304) Level 1: Connecting to
auth server 192.168.1.39:80

[7][Sat Jan 1 00:43:22 2000](centralserver.c:330) Level 1: Successfully
connected to auth server 192.168.1.39:80

[7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Unlocking config

[7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Config unlocked

[7][Sat Jan 1 00:43:22 2000](centralserver.c:177) Connected to auth
server

[7][Sat Jan 1 00:43:22 2000](centralserver.c:95) Sending HTTP request to
auth server: [GET
/wifidog/auth/?stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=
8ce8ec1cbd30a1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0

User-Agent: WiFiDog 1.1.2

Host: 192.168.1.39

]

[7][Sat Jan 1 00:43:22 2000](centralserver.c:98) Reading response

[7][Sat Jan 1 00:43:22 2000](centralserver.c:125) Read 736 bytes, total
now 736

[7][Sat Jan 1 00:43:22 2000](centralserver.c:145) HTTP Response from
Server: [HTTP/1.1 200 OK

Date: Thu, 29 Sep 2005 18:08:38 GMT

Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5
PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7

X-Powered-By: PHP/5.0.5-1

Content-Length: 451

Connection: close

Content-Type: text/html

X-Pad: avoid browser bug

<br />

<b>Notice</b>: Undefined index: gw_id in
<b>/var/www/FarragutWiFi/wifidog/auth/index.php</b> on line <b>74</b><br
/>

<br />

<b>Notice</b>: Undefined index: gw_id in
<b>/var/www/FarragutWiFi/wifidog/auth/index.php</b> on line <b>74</b><br
/>

<br />

<b>Notice</b>: Undefined index: mac in
<b>/var/www/FarragutWiFi/wifidog/auth/index.php</b> on line <b>74</b><br
/>

Auth: 0

Messages: | Tried to login with a token that wasn't TOKEN_UNUSED.

]

[6][Sat Jan 1 00:43:22 2000](centralserver.c:149) Auth server returned
authentication code 0

[7][Sat Jan 1 00:43:22 2000](auth.c:119) Locking client list

[7][Sat Jan 1 00:43:22 2000](auth.c:119) Client list locked

[6][Sat Jan 1 00:43:22 2000](auth.c:159) Got DENIED from central server
authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from 192.168.1.109
at 00:10:C6:39:D0:EE - redirecting them to denied message

[7][Sat Jan 1 00:43:22 2000](auth.c:260) Unlocking client list

[7][Sat Jan 1 00:43:22 2000](auth.c:260) Client list unlocked

[7][Sat Jan 1 00:43:22 2000](httpd_thread.c:68) Returned from
httpdProcessRequest() for 192.168.1.109

[7][Sat Jan 1 00:43:22 2000](httpd_thread.c:73) Closing connection with
192.168.1.109

 

 

Dan Holton
IT Administrator

Callahan & Associates, Inc.
www.CreditUnions.com <BLOCKED::http://www.creditunions.com/>  |
www.Callahan.com <BLOCKED::http://www.callahan.com/> 
Cooperative Knowledge for the Credit Union Community

________________________________

From: wifidog-bounces at listes.ilesansfil.org
[mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Mina Naguib
Sent: Thursday, September 29, 2005 2:46 PM
To: WiFiDog Captive Portal
Subject: Re: [isf-wifidog] Error: we did not get a valid answer
fromthecentral server

 

 

Is 192.168.1.39 the router running the WiFiDog client or the web server
running the WiFiDog server ?

 

Also, could you provide the full output of the wifidog client `wifidog
-f -d 7` when this happens ?

 

On 29-Sep-05, at 2:39 PM, Dan Holton wrote:





Okay, I did a complete re-install, and now I 

get a page not found when I try to browse to a web page.

It looks like it's trying to access the (external) web page on the auth
server.

 

The error is 

 

Not Found

 

The requested URL /wifidog/portal/www.creditunions.com/wifi.asp was not
found on this server.

 

the url is that is showing in the address bar is.

http://192.168.1.39/wifidog/portal/www.creditunions.com.wifi.asp

 

(I have it set to forward to www.creditunions.com/wifi.asp)

 

Thanks again,

Dan Holton
IT Administrator

Callahan & Associates, Inc.
www.CreditUnions.com <BLOCKED::http://www.creditunions.com/>  |
www.Callahan.com <BLOCKED::http://www.callahan.com/> 
Cooperative Knowledge for the Credit Union Community

________________________________

From: wifidog-bounces at listes.ilesansfil.org
[mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Mina Naguib
Sent: Thursday, September 29, 2005 11:27 AM
To: WiFiDog Captive Portal
Subject: Re: [isf-wifidog] Error: we did not get a valid answer from
thecentral server

 

 

Hi Dan

 

We need more of the debugging output `wifidog -f -d 7` spits out.  There
should be stuff like "Sending HTTP request to auth server: [XYZ]",
"Reading response" and most importantly "HTTP Response from Server:
[XYZ]"

 

Also if at all possible, provide a .pcap file captured by running
`tcpdump` on the auth server, although it's not as important as the
above info.

 

On 29-Sep-05, at 11:10 AM, Dan Holton wrote:






Thank you to everyone who has helped with my many questions up to this
point.  I think I've ran into the last problem before I can officially
launch.

 

When I open up a browser I get an error that says

 

Error!

Error: We did not get a valid answer from the central server

 

When I look at the output on the gateway (running wifidog -f -d 7)

 

I see 

 

[trying to connect to auth server]

[successfully connected to auth server]

 

[3] [date] (auth.c:151) Got -1 from central server authenticating token
(tokenstring1) from 192.168.1.145 (client IP) at clientMAC

 

[3] [date] (auth.c:151) Got -1 from central server authenticating token
(tokenstring1) from 192.168.1.145 (client IP) at clientMAC

 

[4] [date] (firewall.c:286) Error communicating with auth server -
leaving 192.168.1.145 as-is for now

 

[4] [date] (firewall.c:286) Error communicating with auth server -
leaving 192.168.1.145 as-is for now

 

[4] [date] (firewall.c:286) Error communicating with auth server -
leaving 192.168.1.145 as-is for now

 

[4] [date] (firewall.c:286) Error communicating with auth server -
leaving 192.168.1.145 as-is for now

 

[4] [date] (firewall.c:286) Error communicating with auth server -
leaving 192.168.1.145 as-is for now

 

 

I have all of the original FW config rules in wifidog.conf, and the auth
server and gateway (on wrt54g) seem to be

communicating without a problem (I was connected to the gateway from the
auth server via SSH during this test, and 

I could ping, and connect on various other ports.)


I would attach the output of running wifidog, but I haven't thought of a
good way to get it off of the linksys.


Has anyone seen this before, or can someone give me an idea of where I
should start looking?  I'm running the latest version

of everything (auth server, gateway, openWRT, php, etc.)

 

Thanks (again :-)),

 

Dan Holton
IT Administrator

Callahan & Associates, Inc.
www.CreditUnions.com <BLOCKED::http://www.creditunions.com/>  |
www.Callahan.com <BLOCKED::http://www.callahan.com/> 
Cooperative Knowledge for the Credit Union Community

 

_______________________________________________

WiFiDog mailing list

WiFiDog at listes.ilesansfil.org

http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog

 

_______________________________________________

WiFiDog mailing list

WiFiDog at listes.ilesansfil.org

http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listes.ilesansfil.org/pipermail/wifidog/attachments/20050929/9dbcd6ce/attachment-0001.htm


More information about the WiFiDog mailing list