[isf-wifidog] Error: we did not get a valid answer fromthecentralserver

Dan Holton DHolton at creditunions.com
Ven 30 Sep 08:10:42 EDT 2005


OpenWRT version is White Russian RC2
IPKG for wifidog from sourceforge (v 1.1.2 from
http://sourceforge.net/project/showfiles.php?group_id=102646&package_id=
110081)
I had to use the .ipk since I can't untar the tarball on the linksys for
some reason.

Dan Holton
IT Administrator
Callahan & Associates, Inc.
www.CreditUnions.com | www.Callahan.com
Cooperative Knowledge for the Credit Union Community

-----Original Message-----
From: wifidog-bounces at listes.ilesansfil.org
[mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Philippe
April
Sent: Thursday, September 29, 2005 4:49 PM
To: WiFiDog Captive Portal
Subject: Re: [isf-wifidog] Error: we did not get a valid answer
fromthecentralserver

iptables modules seem to be segfaulting, from the output you gave to us.

which version of OpenWRT are you using and where did you get the IPKG  
package of wifidog?

Philippe April
GnuPG http://key.philippeapril.com

On 29-Sep-05, at 3:45 PM, Dan Holton wrote:

> 192.168.1.39 is the auth server.
>
> here's the output from wifidog -f -d 7
>
>
>
> [6][Sat Jan 1 00:41:51 2000](conf.c:576) Reading configuration file  
> '/etc/wifidog.conf'
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: GatewayID,  
> value: wifi
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> ExternalInterface, value: vlan1
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> GatewayInterface, value: br0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> GatewayAddress, value: 192.168.1.1
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: AuthServer,  
> value: {
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:291) Adding 192.168.1.39:80  
> (SSL: 443) /wifidog/ to the auth server list
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:313) Auth server added
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> CheckInterval, value: 60
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> ClientTimeout, value: 5
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: global
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> global
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp to 69.90.89.192/27]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to  
> 69.90.89.192/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port (null) to 69.90.89.192/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp to 69.90.85.0/27]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to  
> 69.90.85.0/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port (null) to 69.90.85.0/27
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 80 to 69.90.89.205]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port  
> 80 to 69.90.89.205
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 80 to 69.90.89.205
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set global  
> added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: validating-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> validating-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [block tcp port 25]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block tcp port 25
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block  
> tcp port 25 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set  
> validating-users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: known-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> known-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set known- 
> users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: unknown-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> unknown-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp port 53]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 53
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port 53 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 53]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 53
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 53 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow udp port 67]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 67
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> udp port 67 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [allow tcp port 67]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 67
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow  
> tcp port 67 to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set unknown- 
> users added.
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:  
> FirewallRuleSet, value: locked-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set  
> locked-users
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =  
> [block to 0.0.0.0/0]
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block  
> (null) port (null) to 0.0.0.0/0
>
> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set locked- 
> users added.
>
> [5][Sat Jan 1 00:41:51 2000](gateway.c:203) Creating web server on  
> 192.168.1.1:2060
>
> [7][Sat Jan 1 00:41:51 2000](gateway.c:210) Assigning callbacks to  
> web server
>
> [7][Sat Jan 1 00:41:51 2000](gateway.c:130) Initializing signal  
> handlers
>
> [6][Sat Jan 1 00:41:51 2000](firewall.c:191) Removing Firewall rules
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:293) Destroying our  
> iptables entries
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:300) Destroying chains  
> in the MANGLE table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Outgoing from mangle.PREROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Incoming from mangle.POSTROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -F WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -F WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -X WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -X WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:313) Destroying chains  
> in the NAT table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_Outgoing from nat.PREROUTING
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -X WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:331) Destroying chains  
> in the FILTER table
>
> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to  
> destroy all mention of WiFiDog_WIFI2Internet from filter.FORWARD
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Global
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Known
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Global
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Known
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -X WiFiDog_Unknown
>
> [6][Sat Jan 1 00:41:52 2000](firewall.c:147) Creating ICMP socket
>
> [6][Sat Jan 1 00:41:52 2000](firewall.c:157) Initializing Firewall
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Locking config
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Config locked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Unlocking config
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Config unlocked
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -N WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -N WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -I PREROUTING 1 -i br0 -j WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -I POSTROUTING 1 -o br0 -j WiFiDog_Incoming
>
> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -N WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A PREROUTING -i br0 -j WiFiDog_Outgoing
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Outgoing -d 192.168.1.1 -j  
> WiFiDog_WIFI2Router
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Router -j ACCEPT
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Outgoing -j WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j ACCEPT
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j ACCEPT
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Unknown -j WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_Unknown -p tcp --dport 80 -j REDIRECT -- 
> to-ports 2060
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Global
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -N WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A FORWARD -i br0 -j WiFiDog_WIFI2Internet
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x254 -j  
> WiFiDog_Locked
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset locked- 
> users into chain WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT" into WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset locked- 
> users loaded into WiFiDog_Locked
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset global  
> into chain WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j ACCEPT" into  
> WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j  
> ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT" into  
> WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport 80 -j  
> ACCEPT" into WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport  
> 80 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset global  
> loaded into WiFiDog_Global
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j  
> WiFiDog_Validate
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset  
> validating-users into chain WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport 25 -j  
> REJECT" into WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport  
> 25 -j REJECT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT" into  
> WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset validating- 
> users loaded into WiFiDog_Validate
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j  
> WiFiDog_Known
>
> Segmentation fault
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset known- 
> users into chain WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT" into WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset known-users  
> loaded into WiFiDog_Known
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset  
> unknown-users into chain WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport  
> 53 -j ACCEPT
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport  
> 53 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport  
> 67 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t  
> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 67 -j ACCEPT"  
> into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport  
> 67 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:153) Ruleset unknown- 
> users loaded into WiFiDog_Unknown
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_Unknown -j REJECT --reject-with icmp- 
> port-unreachable
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:78) Starting wdctl.
>
> [5][Sat Jan 1 00:41:55 2000](gateway.c:249) Waiting for connections
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:82) Socket name: /tmp/ 
> wdctl.sock
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:91) Creating socket
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:94) Got server socket 8
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:99) Filling sockaddr_un
>
> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:105) Binding socket (/ 
> tmp/wdctl.sock) (15)
>
> [6][Sat Jan 1 00:41:55 2000](ping_thread.c:68) Setting started_time
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:78) Running ping()
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:114) Entering ping()
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:41:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:41:55 2000](util.c:120) wd_gethostbyname() locked
>
> [6][Sat Jan 1 00:41:55 2000](util.c:184) ONLINE status became ON
>
> [7][Sat Jan 1 00:41:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:41:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:286) Level 1: Updating  
> last_ip IP of server [192.168.1.39] to [192.168.1.39]
>
> [6][Sat Jan 1 00:41:55 2000](firewall.c:166) Clearing the  
> authservers list
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -F WiFiDog_AuthServers
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -F WiFiDog_AuthServers
>
> [6][Sat Jan 1 00:41:55 2000](firewall.c:175) Setting the  
> authservers list
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t filter -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:  
> iptables -t nat -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:41:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [6][Sat Jan 1 00:41:55 2000](util.c:226) AUTH_ONLINE status became ON
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:165) HTTP Request to  
> Server: [GET /wifidog/ping/? 
> gw_id=wifi&sys_uptime=2515&sys_memfree=5324&sys_load=0.13&wifidog_upti

> me=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:169) Reading response
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:197) Read 287 bytes,  
> total now 287
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:215) Done reading reply,  
> total 287 bytes
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:219) HTTP Response from  
> Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:07:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 4
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Pong]
>
> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:226) Auth Server Says: Pong
>
> [6][Sat Jan 1 00:42:14 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [6][Sat Jan 1 00:42:14 2000](http.c:127) Captured 192.168.1.109  
> requesting [http%3A//www.google.com/] and re-directed them to login  
> page
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [6][Sat Jan 1 00:42:15 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](http.c:181) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](http.c:181) Client list locked
>
> [7][Sat Jan 1 00:42:15 2000](http.c:184) New client for 192.168.1.109
>
> [6][Sat Jan 1 00:42:15 2000](client_list.c:108) Added a new client  
> to linked list: IP: 192.168.1.109 Token:  
> 8ce8ec1cbd30a1dfe009a9365a0495a7
>
> [7][Sat Jan 1 00:42:15 2000](http.c:190) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](http.c:190) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Client list locked
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:15 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:15 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:15 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:15 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30a

> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:125) Read 303 bytes,  
> total now 303
>
> [7][Sat Jan 1 00:42:15 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:07:31 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 19
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Auth: 1
>
> Messages:
>
> ]
>
> [6][Sat Jan 1 00:42:15 2000](centralserver.c:149) Auth server  
> returned authentication code 1
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Locking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Client list locked
>
> [6][Sat Jan 1 00:42:15 2000](auth.c:205) Got ALLOWED from central  
> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from  
> 192.168.1.109 at 00:10:C6:39:D0:EE - adding to firewall and  
> redirecting them to portal
>
> [7][Sat Jan 1 00:42:15 2000](firewall.c:85) Allowing 192.168.1.109  
> 00:10:C6:39:D0:EE with fw_connection_state 2
>
> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -A WiFiDog_Outgoing -s 192.168.1.109 -m mac -- 
> mac-source 00:10:C6:39:D0:EE -j MARK --set-mark 2
>
> Segmentation fault
>
> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:  
> iptables -t mangle -A WiFiDog_Incoming -d 192.168.1.109 -j ACCEPT
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Unlocking client list
>
> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Client list unlocked
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:78) Running ping()
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:114) Entering ping()
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:165) HTTP Request to  
> Server: [GET /wifidog/ping/? 
> gw_id=wifi&sys_uptime=2575&sys_memfree=5296&sys_load=0.05&wifidog_upti

> me=60 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:169) Reading response
>
> [7][Sat Jan 1 00:42:55 2000](auth.c:79) Running fw_counter()
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:505) Incoming  
> 192.168.1.109 Bytes=1216
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:510) 192.168.1.109 -  
> Updated counter.incoming to 1216 bytes
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Client list unlocked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Client list unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=counters&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd

> 30a1dfe009a9365a0495a7&incoming=1216&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:197) Read 287 bytes,  
> total now 287
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:215) Done reading reply,  
> total 287 bytes
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:219) HTTP Response from  
> Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 4
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Pong]
>
> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:226) Auth Server Says: Pong
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:125) Read 323 bytes,  
> total now 323
>
> [7][Sat Jan 1 00:42:55 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:11 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 39
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Auth: 1
>
> Messages: | Updated counters.
>
> ]
>
> [6][Sat Jan 1 00:42:55 2000](centralserver.c:149) Auth server  
> returned authentication code 1
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Locking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Client list locked
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Unlocking client list
>
> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Client list unlocked
>
> [6][Sat Jan 1 00:43:21 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [6][Sat Jan 1 00:43:21 2000](http.c:127) Captured 192.168.1.109  
> requesting [http%3A//www.gmail.com/] and re-directed them to login  
> page
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
> [6][Sat Jan 1 00:43:22 2000](gateway.c:274) Received connection  
> from 192.168.1.109, spawning worker thread
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:65) Processing request  
> from 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:66) Calling  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](http.c:181) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](http.c:181) Client list locked
>
> [7][Sat Jan 1 00:43:22 2000](http.c:187) Node for 192.168.1.109  
> already exists
>
> [7][Sat Jan 1 00:43:22 2000](http.c:190) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](http.c:190) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Client list locked
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Locking config
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Config locked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:210) Level 1:  
> Calculated 1 auth servers in list
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:225) Level 1:  
> Resolving auth server [192.168.1.39]
>
> [7][Sat Jan 1 00:43:22 2000](util.c:120) Locking wd_gethostbyname()
>
> [7][Sat Jan 1 00:43:22 2000](util.c:120) wd_gethostbyname() locked
>
> [7][Sat Jan 1 00:43:22 2000](util.c:135) Unlocking wd_gethostbyname()
>
> [7][Sat Jan 1 00:43:22 2000](util.c:135) wd_gethostbyname() unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:279) Level 1:  
> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:304) Level 1:  
> Connecting to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:330) Level 1:  
> Successfully connected to auth server 192.168.1.39:80
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Unlocking config
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Config unlocked
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:177) Connected to auth  
> server
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:95) Sending HTTP  
> request to auth server: [GET /wifidog/auth/? 
> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30a

> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>
> User-Agent: WiFiDog 1.1.2
>
> Host: 192.168.1.39
>
> ]
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:98) Reading response
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:125) Read 736 bytes,  
> total now 736
>
> [7][Sat Jan 1 00:43:22 2000](centralserver.c:145) HTTP Response  
> from Server: [HTTP/1.1 200 OK
>
> Date: Thu, 29 Sep 2005 18:08:38 GMT
>
> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/ 
> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 451
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> <br />
>
> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> <br />
>
> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> <br />
>
> <b>Notice</b>: Undefined index: mac in <b>/var/www/FarragutWiFi/ 
> wifidog/auth/index.php</b> on line <b>74</b><br />
>
> Auth: 0
>
> Messages: | Tried to login with a token that wasn't TOKEN_UNUSED.
>
> ]
>
> [6][Sat Jan 1 00:43:22 2000](centralserver.c:149) Auth server  
> returned authentication code 0
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Locking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Client list locked
>
> [6][Sat Jan 1 00:43:22 2000](auth.c:159) Got DENIED from central  
> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from  
> 192.168.1.109 at 00:10:C6:39:D0:EE - redirecting them to denied  
> message
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Unlocking client list
>
> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Client list unlocked
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:68) Returned from  
> httpdProcessRequest() for 192.168.1.109
>
> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:73) Closing connection  
> with 192.168.1.109
>
>
>
>
>
> Dan Holton
> IT Administrator
>
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>


More information about the WiFiDog mailing list