[isf-wifidog] Error: we did not get a valid answer fromthecentral server

Philippe April isf_lists at philippeapril.com
Jeu 29 Sep 16:49:07 EDT 2005


iptables modules seem to be segfaulting, from the output you gave to us.

which version of OpenWRT are you using and where did you get the IPKG  
package of wifidog?

Philippe April
GnuPG http://key.philippeapril.com

On 29-Sep-05, at 3:45 PM, Dan Holton wrote:

> 192.168.1.39 is the auth server.
>
> here’s the output from wifidog –f –d 7
>
>
>
> [6][Sat Jan 1 00:41:51 2000](conf.c:576) Reading configuration file  
> '/etc/wifidog.conf'
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: GatewayID,  
> value: wifi
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> ExternalInterface, value: vlan1
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> GatewayInterface, value: br0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> GatewayAddress, value: 192.168.1.1
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: AuthServer,  
> value: {
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:291) Adding 192.168.1.39:80  
> (SSL: 443) /wifidog/ to the auth server list
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:313) Auth server added
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> CheckInterval, value: 60
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> ClientTimeout, value: 5
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: global
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> global
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp to 69.90.89.192/27]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to  
> 69.90.89.192/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port (null) to 69.90.89.192/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp to 69.90.85.0/27]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to  
> 69.90.85.0/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port (null) to 69.90.85.0/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 80 to 69.90.89.205]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port  
> 80 to 69.90.89.205
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 80 to 69.90.89.205
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set global  
> added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: validating-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> validating-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [block tcp port 25]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block tcp port 25
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block  
> tcp port 25 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set  
> validating-users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: known-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> known-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set known- 
> users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: unknown-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> unknown-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp port 53]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 53
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port 53 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 53]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 53
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 53 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp port 67]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 67
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port 67 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 67]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 67
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 67 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set unknown- 
> users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: locked-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> locked-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [block to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set locked- 
> users added.
>
> [5][Sat Jan 1 00:41:51 2000](gateway.c:203) Creating web server on  
> 192.168.1.1:2060
>
> [7][Sat Jan 1 00:41:51 2000](gateway.c:210) Assigning callbacks to  
> web server
>
> [7][Sat Jan 1 00:41:51 2000](gateway.c:130) Initializing signal  
> handlers
>
> [6][Sat Jan 1 00:41:51 2000](firewall.c:191) Removing Firewall rules
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:293) Destroying our  
> iptables entries
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:300) Destroying chains  
> in the MANGLE table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Outgoing from mangle.PREROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Incoming from mangle.POSTROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -F WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -F WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -X WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -X WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:313) Destroying chains  
> in the NAT table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Outgoing from nat.PREROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:331) Destroying chains  
> in the FILTER table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_WIFI2Internet from filter.FORWARD
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Global
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Known
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Global
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Known
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Unknown
>
> [6][Sat Jan 1 00:41:52 2000](firewall.c:147) Creating ICMP socket
>
> [6][Sat Jan 1 00:41:52 2000](firewall.c:157) Initializing Firewall
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Locking config
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Config locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Unlocking config
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Config unlocked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -N WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -N WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -I PREROUTING 1 -i br0 -j WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -I POSTROUTING 1 -o br0 -j WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A PREROUTING -i br0 -j WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Outgoing -d 192.168.1.1 -j  
> WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Router -j ACCEPT
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Outgoing -j WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j ACCEPT
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j ACCEPT
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Unknown -j WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Unknown -p tcp --dport 80 -j REDIRECT -- 
> to-ports 2060
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Global
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A FORWARD -i br0 -j WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x254 -j  
> WiFiDog_Locked
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset locked- 
> users into chain WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT" into WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset locked- 
> users loaded into WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset global  
> into chain WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j ACCEPT" into  
> WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j  
> ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT" into  
> WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport 80 -j  
> ACCEPT" into WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport  
> 80 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset global  
> loaded into WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j  
> WiFiDog_Validate
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset  
> validating-users into chain WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport 25 -j  
> REJECT" into WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport  
> 25 -j REJECT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT" into  
> WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset validating- 
> users loaded into WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j  
> WiFiDog_Known
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset known- 
> users into chain WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT" into WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset known-users  
> loaded into WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset  
> unknown-users into chain WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport  
> 53 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport  
> 53 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport  
> 67 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 67 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport  
> 67 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:153) Ruleset unknown- 
> users loaded into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -j REJECT --reject-with icmp- 
> port-unreachable
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:78) Starting wdctl.
>
> [5][Sat Jan 1 00:41:55 2000](gateway.c:249) Waiting for connections
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:82) Socket name: /tmp/ 
> wdctl.sock
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:91) Creating socket
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:94) Got server socket 8
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:99) Filling sockaddr_un
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:105) Binding socket (/ 
> tmp/wdctl.sock) (15)
>
> [6][Sat Jan 1 00:41:55 2000](ping_thread.c:68) Setting started_time
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:78) Running ping()
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:114) Entering ping()
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:41:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:41:55 2000](util.c:120) wd_gethostbyname() locked
>
> [6][Sat Jan 1 00:41:55 2000](util.c:184) ONLINE status became ON
>
> [7][Sat Jan 1 00:41:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:41:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:286) Level 1: Updating  
> last_ip IP of server [192.168.1.39] to [192.168.1.39]
>
> [6][Sat Jan 1 00:41:55 2000](firewall.c:166) Clearing the  
> authservers list
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_AuthServers
>
> [6][Sat Jan 1 00:41:55 2000](firewall.c:175) Setting the  
> authservers list
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [6][Sat Jan 1 00:41:55 2000](util.c:226) AUTH_ONLINE status became ON
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:165) HTTP Request to  
> Server: [GET /wifidog/ping/? 
> gw_id=wifi&sys_uptime=2515&sys_memfree=5324&sys_load=0.13&wifidog_upti 
> me=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:169) Reading response
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:197) Read 287 bytes,  
> total now 287
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:215) Done reading reply,  
> total 287 bytes
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:219) HTTP Response from  
> Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:07:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 4
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Pong]
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:226) Auth Server Says: Pong
>
> [6][Sat Jan 1 00:42:14 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [6][Sat Jan 1 00:42:14 2000](http.c:127) Captured 192.168.1.109  
> requesting [http%3A//www.google.com/] and re-directed them to login  
> page
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [6][Sat Jan 1 00:42:15 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](http.c:181) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](http.c:181) Client list locked
>
> [7][Sat Jan 1 00:42:15 2000](http.c:184) New client for 192.168.1.109
>
> [6][Sat Jan 1 00:42:15 2000](client_list.c:108) Added a new client  
> to linked list: IP: 192.168.1.109 Token:  
> 8ce8ec1cbd30a1dfe009a9365a0495a7
>
> [7][Sat Jan 1 00:42:15 2000](http.c:190) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](http.c:190) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Client list locked
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:15 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:15 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:15 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:15 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30a 
> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:125) Read 303 bytes,  
> total now 303
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:07:31 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 19
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Auth: 1
>
> Messages:
>
> ]
>
> [6][Sat Jan 1 00:42:15 2000](centralserver.c:149) Auth server  
> returned authentication code 1
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Client list locked
>
> [6][Sat Jan 1 00:42:15 2000](auth.c:205) Got ALLOWED from central  
> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from  
> 192.168.1.109 at 00:10:C6:39:D0:EE - adding to firewall and  
> redirecting them to portal
>
> [7][Sat Jan 1 00:42:15 2000](firewall.c:85) Allowing 192.168.1.109  
> 00:10:C6:39:D0:EE with fw_connection_state 2
>
> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -A WiFiDog_Outgoing -s 192.168.1.109 -m mac -- 
> mac-source 00:10:C6:39:D0:EE -j MARK --set-mark 2
>
> Segmentation fault
>
> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -A WiFiDog_Incoming -d 192.168.1.109 -j ACCEPT
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:78) Running ping()
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:114) Entering ping()
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:165) HTTP Request to  
> Server: [GET /wifidog/ping/? 
> gw_id=wifi&sys_uptime=2575&sys_memfree=5296&sys_load=0.05&wifidog_upti 
> me=60 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:169) Reading response
>
> [7][Sat Jan 1 00:42:55 2000](auth.c:79) Running fw_counter()
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:505) Incoming  
> 192.168.1.109 Bytes=1216
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:510) 192.168.1.109 -  
> Updated counter.incoming to 1216 bytes
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Client list unlocked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Client list unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=counters&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd 
> 30a1dfe009a9365a0495a7&incoming=1216&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:197) Read 287 bytes,  
> total now 287
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:215) Done reading reply,  
> total 287 bytes
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:219) HTTP Response from  
> Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 4
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Pong]
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:226) Auth Server Says: Pong
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:125) Read 323 bytes,  
> total now 323
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 39
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Auth: 1
>
> Messages: | Updated counters.
>
> ]
>
> [6][Sat Jan 1 00:42:55 2000](centralserver.c:149) Auth server  
> returned authentication code 1
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Client list unlocked
>
> [6][Sat Jan 1 00:43:21 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [6][Sat Jan 1 00:43:21 2000](http.c:127) Captured 192.168.1.109  
> requesting [http%3A//www.gmail.com/] and re-directed them to login  
> page
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [6][Sat Jan 1 00:43:22 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](http.c:181) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](http.c:181) Client list locked
>
> [7][Sat Jan 1 00:43:22 2000](http.c:187) Node for 192.168.1.109  
> already exists
>
> [7][Sat Jan 1 00:43:22 2000](http.c:190) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](http.c:190) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Client list locked
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:43:22 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:43:22 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:43:22 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:43:22 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30a 
> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:125) Read 736 bytes,  
> total now 736
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:38 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 451
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> <br />
>
> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> <br />
>
> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> <br />
>
> <b>Notice</b>: Undefined index: mac in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> Auth: 0
>
> Messages: | Tried to login with a token that wasn't TOKEN_UNUSED.
>
> ]
>
> [6][Sat Jan 1 00:43:22 2000](centralserver.c:149) Auth server  
> returned authentication code 0
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Client list locked
>
> [6][Sat Jan 1 00:43:22 2000](auth.c:159) Got DENIED from central  
> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from  
> 192.168.1.109 at 00:10:C6:39:D0:EE - redirecting them to denied  
> message
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
>
>
>
>
> Dan Holton
> IT Administrator
>
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>
> From: wifidog-bounces at listes.ilesansfil.org [mailto:wifidog- 
> bounces at listes.ilesansfil.org] On Behalf Of Mina Naguib
> Sent: Thursday, September 29, 2005 2:46 PM
> To: WiFiDog Captive Portal
> Subject: Re: [isf-wifidog] Error: we did not get a valid answer  
> fromthecentral server
>
>
>
>
>
> Is 192.168.1.39 the router running the WiFiDog client or the web  
> server running the WiFiDog server ?
>
>
>
> Also, could you provide the full output of the wifidog client  
> `wifidog -f -d 7` when this happens ?
>
>
>
> On 29-Sep-05, at 2:39 PM, Dan Holton wrote:
>
>
>
>
> Okay, I did a complete re-install, and now I
>
> get a page not found when I try to browse to a web page.
>
> It looks like it’s trying to access the (external) web page on the  
> auth server.
>
>
>
> The error is
>
>
>
> Not Found
>
>
>
> The requested URL /wifidog/portal/www.creditunions.com/wifi.asp was  
> not found on this server.
>
>
>
> the url is that is showing in the address bar is.
>
> http://192.168.1.39/wifidog/portal/www.creditunions.com.wifi.asp
>
>
>
> (I have it set to forward to www.creditunions.com/wifi.asp)
>
>
>
> Thanks again,
>
> Dan Holton
> IT Administrator
>
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>
> From: wifidog-bounces at listes.ilesansfil.org [mailto:wifidog- 
> bounces at listes.ilesansfil.org] On Behalf Of Mina Naguib
> Sent: Thursday, September 29, 2005 11:27 AM
> To: WiFiDog Captive Portal
> Subject: Re: [isf-wifidog] Error: we did not get a valid answer  
> from thecentral server
>
>
>
>
>
> Hi Dan
>
>
>
> We need more of the debugging output `wifidog -f -d 7` spits out.   
> There should be stuff like "Sending HTTP request to auth server:  
> [XYZ]", "Reading response" and most importantly "HTTP Response from  
> Server: [XYZ]"
>
>
>
> Also if at all possible, provide a .pcap file captured by running  
> `tcpdump` on the auth server, although it's not as important as the  
> above info.
>
>
>
> On 29-Sep-05, at 11:10 AM, Dan Holton wrote:
>
>
>
>
>
> Thank you to everyone who has helped with my many questions up to  
> this point.  I think I’ve ran into the last problem before I can  
> officially launch.
>
>
>
> When I open up a browser I get an error that says
>
>
>
> Error!
>
> Error: We did not get a valid answer from the central server
>
>
>
> When I look at the output on the gateway (running wifidog –f –d 7)
>
>
>
> I see
>
>
>
> [trying to connect to auth server]
>
> [successfully connected to auth server]
>
>
>
> [3] [date] (auth.c:151) Got -1 from central server authenticating  
> token (tokenstring1) from 192.168.1.145 (client IP) at clientMAC
>
>
>
> [3] [date] (auth.c:151) Got -1 from central server authenticating  
> token (tokenstring1) from 192.168.1.145 (client IP) at clientMAC
>
>
>
> [4] [date] (firewall.c:286) Error communicating with auth server –  
> leaving 192.168.1.145 as-is for now
>
>
>
> [4] [date] (firewall.c:286) Error communicating with auth server –  
> leaving 192.168.1.145 as-is for now
>
>
>
> [4] [date] (firewall.c:286) Error communicating with auth server –  
> leaving 192.168.1.145 as-is for now
>
>
>
> [4] [date] (firewall.c:286) Error communicating with auth server –  
> leaving 192.168.1.145 as-is for now
>
>
>
> [4] [date] (firewall.c:286) Error communicating with auth server –  
> leaving 192.168.1.145 as-is for now
>
>
>
>
>
> I have all of the original FW config rules in wifidog.conf, and the  
> auth server and gateway (on wrt54g) seem to be
>
> communicating without a problem (I was connected to the gateway  
> from the auth server via SSH during this test, and
>
> I could ping, and connect on various other ports.)
>
>
> I would attach the output of running wifidog, but I haven’t thought  
> of a good way to get it off of the linksys.
>
>
> Has anyone seen this before, or can someone give me an idea of  
> where I should start looking?  I’m running the latest version
>
> of everything (auth server, gateway, openWRT, php, etc.)
>
>
>
> Thanks (again J),
>
>
>
> Dan Holton
> IT Administrator
>
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>
>
>
> _______________________________________________
>
> WiFiDog mailing list
>
> WiFiDog at listes.ilesansfil.org
>
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>
>
>
> _______________________________________________
>
> WiFiDog mailing list
>
> WiFiDog at listes.ilesansfil.org
>
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>
>
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog



More information about the WiFiDog mailing list