[isf-wifidog] Error: we did not get a valid answer fromthecentralserver

Philippe April isf_lists at philippeapril.com
Ven 30 Sep 09:10:27 EDT 2005


You did the right thing, the tarball only contains the sources, which  
you would not be able to compile directly on the linksys, it has to  
be cross-compiled.

Tell me, had you tried other wifidog .ipk prior to this one?

Can you: ls -la /usr/lib/iptables/

and give me the results?

Thank you!

Philippe April
GnuPG http://key.philippeapril.com

On 30-Sep-05, at 8:10 AM, Dan Holton wrote:

> OpenWRT version is White Russian RC2
> IPKG for wifidog from sourceforge (v 1.1.2 from
> http://sourceforge.net/project/showfiles.php? 
> group_id=102646&package_id=
> 110081)
> I had to use the .ipk since I can't untar the tarball on the  
> linksys for
> some reason.
>
> Dan Holton
> IT Administrator
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>
> -----Original Message-----
> From: wifidog-bounces at listes.ilesansfil.org
> [mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Philippe
> April
> Sent: Thursday, September 29, 2005 4:49 PM
> To: WiFiDog Captive Portal
> Subject: Re: [isf-wifidog] Error: we did not get a valid answer
> fromthecentralserver
>
> iptables modules seem to be segfaulting, from the output you gave  
> to us.
>
> which version of OpenWRT are you using and where did you get the IPKG
> package of wifidog?
>
> Philippe April
> GnuPG http://key.philippeapril.com
>
> On 29-Sep-05, at 3:45 PM, Dan Holton wrote:
>
>
>> 192.168.1.39 is the auth server.
>>
>> here's the output from wifidog -f -d 7
>>
>>
>>
>> [6][Sat Jan 1 00:41:51 2000](conf.c:576) Reading configuration file
>> '/etc/wifidog.conf'
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: GatewayID,
>> value: wifi
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> ExternalInterface, value: vlan1
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> GatewayInterface, value: br0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> GatewayAddress, value: 192.168.1.1
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token: AuthServer,
>> value: {
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:291) Adding 192.168.1.39:80
>> (SSL: 443) /wifidog/ to the auth server list
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:313) Auth server added
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> CheckInterval, value: 60
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> ClientTimeout, value: 5
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> FirewallRuleSet, value: global
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
>> global
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow udp to 69.90.89.192/27]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to
>> 69.90.89.192/27
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> udp port (null) to 69.90.89.192/27
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow udp to 69.90.85.0/27]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp to
>> 69.90.85.0/27
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> udp port (null) to 69.90.85.0/27
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow tcp port 80 to 69.90.89.205]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port
>> 80 to 69.90.89.205
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> tcp port 80 to 69.90.89.205
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set global
>> added.
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> FirewallRuleSet, value: validating-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
>> validating-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [block tcp port 25]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block tcp port 25
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block
>> tcp port 25 to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow to 0.0.0.0/0]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> (null) port (null) to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set
>> validating-users added.
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> FirewallRuleSet, value: known-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
>> known-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow to 0.0.0.0/0]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> (null) port (null) to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set known-
>> users added.
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> FirewallRuleSet, value: unknown-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
>> unknown-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow udp port 53]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 53
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> udp port 53 to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow tcp port 53]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 53
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> tcp port 53 to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow udp port 67]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow udp port 67
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> udp port 67 to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [allow tcp port 67]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: allow tcp port 67
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule allow
>> tcp port 67 to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set unknown-
>> users added.
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:615) Parsing token:
>> FirewallRuleSet, value: locked-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:350) Adding Firewall Rule Set
>> locked-users
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:389) p1 = [FirewallRule]; p2 =
>> [block to 0.0.0.0/0]
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:433) leftover: block to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:515) Adding Firewall Rule block
>> (null) port (null) to 0.0.0.0/0
>>
>> [7][Sat Jan 1 00:41:51 2000](conf.c:413) Firewall Rule Set locked-
>> users added.
>>
>> [5][Sat Jan 1 00:41:51 2000](gateway.c:203) Creating web server on
>> 192.168.1.1:2060
>>
>> [7][Sat Jan 1 00:41:51 2000](gateway.c:210) Assigning callbacks to
>> web server
>>
>> [7][Sat Jan 1 00:41:51 2000](gateway.c:130) Initializing signal
>> handlers
>>
>> [6][Sat Jan 1 00:41:51 2000](firewall.c:191) Removing Firewall rules
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:293) Destroying our
>> iptables entries
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:300) Destroying chains
>> in the MANGLE table
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to
>> destroy all mention of WiFiDog_Outgoing from mangle.PREROUTING
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to
>> destroy all mention of WiFiDog_Incoming from mangle.POSTROUTING
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -F WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -F WiFiDog_Incoming
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -X WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -X WiFiDog_Incoming
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:313) Destroying chains
>> in the NAT table
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to
>> destroy all mention of WiFiDog_Outgoing from nat.PREROUTING
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_WIFI2Router
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -X WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -X WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -X WiFiDog_WIFI2Router
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -X WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -X WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:331) Destroying chains
>> in the FILTER table
>>
>> [7][Sat Jan 1 00:41:51 2000](fw_iptables.c:370) Attempting to
>> destroy all mention of WiFiDog_WIFI2Internet from filter.FORWARD
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -X WiFiDog_Unknown
>>
>> [6][Sat Jan 1 00:41:52 2000](firewall.c:147) Creating ICMP socket
>>
>> [6][Sat Jan 1 00:41:52 2000](firewall.c:157) Initializing Firewall
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Locking config
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:192) Config locked
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Unlocking config
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:197) Config unlocked
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -N WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -N WiFiDog_Incoming
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -I PREROUTING 1 -i br0 -j WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -I POSTROUTING 1 -o br0 -j WiFiDog_Incoming
>>
>> [7][Sat Jan 1 00:41:52 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -N WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -N WiFiDog_WIFI2Router
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -N WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -N WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -N WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A PREROUTING -i br0 -j WiFiDog_Outgoing
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_Outgoing -d 192.168.1.1 -j
>> WiFiDog_WIFI2Router
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_WIFI2Router -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_Outgoing -j WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j ACCEPT
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j ACCEPT
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_Unknown -j WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_Unknown -p tcp --dport 80 -j REDIRECT --
>> to-ports 2060
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:53 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -N WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A FORWARD -i br0 -j WiFiDog_WIFI2Internet
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x254 -j
>> WiFiDog_Locked
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset locked-
>> users into chain WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT" into WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Locked -d 0.0.0.0/0 -j REJECT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset locked-
>> users loaded into WiFiDog_Locked
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset global
>> into chain WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j ACCEPT" into
>> WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Global -d 69.90.89.192/27 -p udp -j
>> ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j ACCEPT" into
>> WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Global -d 69.90.85.0/27 -p udp -j  
>> ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport 80 -j
>> ACCEPT" into WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Global -d 69.90.89.205 -p tcp --dport
>> 80 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset global
>> loaded into WiFiDog_Global
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x1 -j
>> WiFiDog_Validate
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset
>> validating-users into chain WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport 25 -j
>> REJECT" into WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -p tcp --dport
>> 25 -j REJECT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT" into
>> WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Validate -d 0.0.0.0/0 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset validating-
>> users loaded into WiFiDog_Validate
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -m mark --mark 0x2 -j
>> WiFiDog_Known
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset known-
>> users into chain WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT" into WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Known -d 0.0.0.0/0 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:153) Ruleset known-users
>> loaded into WiFiDog_Known
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_WIFI2Internet -j WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:144) Load ruleset
>> unknown-users into chain WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT"
>> into WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport
>> 53 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT"
>> into WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:54 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport
>> 53 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT"
>> into WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p udp --dport
>> 67 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:148) Loading rule "-t
>> filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport 67 -j ACCEPT"
>> into WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Unknown -d 0.0.0.0/0 -p tcp --dport
>> 67 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:153) Ruleset unknown-
>> users loaded into WiFiDog_Unknown
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_Unknown -j REJECT --reject-with icmp-
>> port-unreachable
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:78) Starting wdctl.
>>
>> [5][Sat Jan 1 00:41:55 2000](gateway.c:249) Waiting for connections
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:82) Socket name: /tmp/
>> wdctl.sock
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:91) Creating socket
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:94) Got server socket 8
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:99) Filling sockaddr_un
>>
>> [7][Sat Jan 1 00:41:55 2000](wdctl_thread.c:105) Binding socket (/
>> tmp/wdctl.sock) (15)
>>
>> [6][Sat Jan 1 00:41:55 2000](ping_thread.c:68) Setting started_time
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:78) Running ping()
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:114) Entering ping()
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Locking config
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:168) Config locked
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:210) Level 1:
>> Calculated 1 auth servers in list
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:225) Level 1:
>> Resolving auth server [192.168.1.39]
>>
>> [7][Sat Jan 1 00:41:55 2000](util.c:120) Locking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:41:55 2000](util.c:120) wd_gethostbyname() locked
>>
>> [6][Sat Jan 1 00:41:55 2000](util.c:184) ONLINE status became ON
>>
>> [7][Sat Jan 1 00:41:55 2000](util.c:135) Unlocking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:41:55 2000](util.c:135) wd_gethostbyname() unlocked
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:279) Level 1:
>> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:286) Level 1: Updating
>> last_ip IP of server [192.168.1.39] to [192.168.1.39]
>>
>> [6][Sat Jan 1 00:41:55 2000](firewall.c:166) Clearing the
>> authservers list
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -F WiFiDog_AuthServers
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -F WiFiDog_AuthServers
>>
>> [6][Sat Jan 1 00:41:55 2000](firewall.c:175) Setting the
>> authservers list
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t filter -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:55 2000](fw_iptables.c:79) Executing command:
>> iptables -t nat -A WiFiDog_AuthServers -d 192.168.1.39 -j ACCEPT
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:304) Level 1:
>> Connecting to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:330) Level 1:
>> Successfully connected to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Unlocking config
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:170) Config unlocked
>>
>> [7][Sat Jan 1 00:41:55 2000](centralserver.c:177) Connected to auth
>> server
>>
>> [6][Sat Jan 1 00:41:55 2000](util.c:226) AUTH_ONLINE status became ON
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:165) HTTP Request to
>> Server: [GET /wifidog/ping/?
>> gw_id=wifi&sys_uptime=2515&sys_memfree=5324&sys_load=0.13&wifidog_upt 
>> i
>>
>
>
>> me=0 HTTP/1.0
>>
>> User-Agent: WiFiDog 1.1.2
>>
>> Host: 192.168.1.39
>>
>> ]
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:169) Reading response
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:197) Read 287 bytes,
>> total now 287
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:215) Done reading reply,
>> total 287 bytes
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:219) HTTP Response from
>> Server: [HTTP/1.1 200 OK
>>
>> Date: Thu, 29 Sep 2005 18:07:11 GMT
>>
>> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/
>> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>>
>> X-Powered-By: PHP/5.0.5-1
>>
>> Content-Length: 4
>>
>> Connection: close
>>
>> Content-Type: text/html
>>
>> X-Pad: avoid browser bug
>>
>> Pong]
>>
>> [7][Sat Jan 1 00:41:55 2000](ping_thread.c:226) Auth Server Says:  
>> Pong
>>
>> [6][Sat Jan 1 00:42:14 2000](gateway.c:274) Received connection
>> from 192.168.1.109, spawning worker thread
>>
>> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:65) Processing request
>> from 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:66) Calling
>> httpdProcessRequest() for 192.168.1.109
>>
>> [6][Sat Jan 1 00:42:14 2000](http.c:127) Captured 192.168.1.109
>> requesting [http%3A//www.google.com/] and re-directed them to login
>> page
>>
>> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:68) Returned from
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:14 2000](httpd_thread.c:73) Closing connection
>> with 192.168.1.109
>>
>> [6][Sat Jan 1 00:42:15 2000](gateway.c:274) Received connection
>> from 192.168.1.109, spawning worker thread
>>
>> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:65) Processing request
>> from 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:66) Calling
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:15 2000](http.c:181) Locking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](http.c:181) Client list locked
>>
>> [7][Sat Jan 1 00:42:15 2000](http.c:184) New client for 192.168.1.109
>>
>> [6][Sat Jan 1 00:42:15 2000](client_list.c:108) Added a new client
>> to linked list: IP: 192.168.1.109 Token:
>> 8ce8ec1cbd30a1dfe009a9365a0495a7
>>
>> [7][Sat Jan 1 00:42:15 2000](http.c:190) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](http.c:190) Client list unlocked
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Locking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:102) Client list locked
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:115) Client list unlocked
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Locking config
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:168) Config locked
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:210) Level 1:
>> Calculated 1 auth servers in list
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:225) Level 1:
>> Resolving auth server [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:15 2000](util.c:120) Locking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:15 2000](util.c:120) wd_gethostbyname() locked
>>
>> [7][Sat Jan 1 00:42:15 2000](util.c:135) Unlocking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:15 2000](util.c:135) wd_gethostbyname() unlocked
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:279) Level 1:
>> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:304) Level 1:
>> Connecting to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:330) Level 1:
>> Successfully connected to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Unlocking config
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:170) Config unlocked
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:177) Connected to auth
>> server
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:95) Sending HTTP
>> request to auth server: [GET /wifidog/auth/?
>> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30 
>> a
>>
>
>
>> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>>
>> User-Agent: WiFiDog 1.1.2
>>
>> Host: 192.168.1.39
>>
>> ]
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:98) Reading response
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:125) Read 303 bytes,
>> total now 303
>>
>> [7][Sat Jan 1 00:42:15 2000](centralserver.c:145) HTTP Response
>> from Server: [HTTP/1.1 200 OK
>>
>> Date: Thu, 29 Sep 2005 18:07:31 GMT
>>
>> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/
>> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>>
>> X-Powered-By: PHP/5.0.5-1
>>
>> Content-Length: 19
>>
>> Connection: close
>>
>> Content-Type: text/html
>>
>> X-Pad: avoid browser bug
>>
>> Auth: 1
>>
>> Messages:
>>
>> ]
>>
>> [6][Sat Jan 1 00:42:15 2000](centralserver.c:149) Auth server
>> returned authentication code 1
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Locking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:119) Client list locked
>>
>> [6][Sat Jan 1 00:42:15 2000](auth.c:205) Got ALLOWED from central
>> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from
>> 192.168.1.109 at 00:10:C6:39:D0:EE - adding to firewall and
>> redirecting them to portal
>>
>> [7][Sat Jan 1 00:42:15 2000](firewall.c:85) Allowing 192.168.1.109
>> 00:10:C6:39:D0:EE with fw_connection_state 2
>>
>> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -A WiFiDog_Outgoing -s 192.168.1.109 -m mac --
>> mac-source 00:10:C6:39:D0:EE -j MARK --set-mark 2
>>
>> Segmentation fault
>>
>> [7][Sat Jan 1 00:42:15 2000](fw_iptables.c:79) Executing command:
>> iptables -t mangle -A WiFiDog_Incoming -d 192.168.1.109 -j ACCEPT
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:15 2000](auth.c:260) Client list unlocked
>>
>> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:68) Returned from
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:15 2000](httpd_thread.c:73) Closing connection
>> with 192.168.1.109
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:78) Running ping()
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:114) Entering ping()
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:
>> Calculated 1 auth servers in list
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:
>> Resolving auth server [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:
>> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:
>> Connecting to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:
>> Successfully connected to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth
>> server
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:165) HTTP Request to
>> Server: [GET /wifidog/ping/?
>> gw_id=wifi&sys_uptime=2575&sys_memfree=5296&sys_load=0.05&wifidog_upt 
>> i
>>
>
>
>> me=60 HTTP/1.0
>>
>> User-Agent: WiFiDog 1.1.2
>>
>> Host: 192.168.1.39
>>
>> ]
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:169) Reading response
>>
>> [7][Sat Jan 1 00:42:55 2000](auth.c:79) Running fw_counter()
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:505) Incoming
>> 192.168.1.109 Bytes=1216
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Locking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:506) Client list locked
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:510) 192.168.1.109 -
>> Updated counter.incoming to 1216 bytes
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](fw_iptables.c:515) Client list unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Locking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:212) Client list locked
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:223) Client list unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Locking config
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:168) Config locked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:210) Level 1:
>> Calculated 1 auth servers in list
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:225) Level 1:
>> Resolving auth server [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:120) Locking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:120) wd_gethostbyname() locked
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:135) Unlocking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:42:55 2000](util.c:135) wd_gethostbyname() unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:279) Level 1:
>> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:304) Level 1:
>> Connecting to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:330) Level 1:
>> Successfully connected to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Unlocking config
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:170) Config unlocked
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:177) Connected to auth
>> server
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:95) Sending HTTP
>> request to auth server: [GET /wifidog/auth/?
>> stage=counters&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cb 
>> d
>>
>
>
>> 30a1dfe009a9365a0495a7&incoming=1216&outgoing=0 HTTP/1.0
>>
>> User-Agent: WiFiDog 1.1.2
>>
>> Host: 192.168.1.39
>>
>> ]
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:98) Reading response
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:197) Read 287 bytes,
>> total now 287
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:215) Done reading reply,
>> total 287 bytes
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:219) HTTP Response from
>> Server: [HTTP/1.1 200 OK
>>
>> Date: Thu, 29 Sep 2005 18:08:11 GMT
>>
>> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/
>> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>>
>> X-Powered-By: PHP/5.0.5-1
>>
>> Content-Length: 4
>>
>> Connection: close
>>
>> Content-Type: text/html
>>
>> X-Pad: avoid browser bug
>>
>> Pong]
>>
>> [7][Sat Jan 1 00:42:55 2000](ping_thread.c:226) Auth Server Says:  
>> Pong
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:125) Read 323 bytes,
>> total now 323
>>
>> [7][Sat Jan 1 00:42:55 2000](centralserver.c:145) HTTP Response
>> from Server: [HTTP/1.1 200 OK
>>
>> Date: Thu, 29 Sep 2005 18:08:11 GMT
>>
>> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/
>> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>>
>> X-Powered-By: PHP/5.0.5-1
>>
>> Content-Length: 39
>>
>> Connection: close
>>
>> Content-Type: text/html
>>
>> X-Pad: avoid browser bug
>>
>> Auth: 1
>>
>> Messages: | Updated counters.
>>
>> ]
>>
>> [6][Sat Jan 1 00:42:55 2000](centralserver.c:149) Auth server
>> returned authentication code 1
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Locking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:228) Client list locked
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Unlocking client list
>>
>> [7][Sat Jan 1 00:42:55 2000](firewall.c:300) Client list unlocked
>>
>> [6][Sat Jan 1 00:43:21 2000](gateway.c:274) Received connection
>> from 192.168.1.109, spawning worker thread
>>
>> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:65) Processing request
>> from 192.168.1.109
>>
>> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:66) Calling
>> httpdProcessRequest() for 192.168.1.109
>>
>> [6][Sat Jan 1 00:43:21 2000](http.c:127) Captured 192.168.1.109
>> requesting [http%3A//www.gmail.com/] and re-directed them to login
>> page
>>
>> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:68) Returned from
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:43:21 2000](httpd_thread.c:73) Closing connection
>> with 192.168.1.109
>>
>> [6][Sat Jan 1 00:43:22 2000](gateway.c:274) Received connection
>> from 192.168.1.109, spawning worker thread
>>
>> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:65) Processing request
>> from 192.168.1.109
>>
>> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:66) Calling
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:43:22 2000](http.c:181) Locking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](http.c:181) Client list locked
>>
>> [7][Sat Jan 1 00:43:22 2000](http.c:187) Node for 192.168.1.109
>> already exists
>>
>> [7][Sat Jan 1 00:43:22 2000](http.c:190) Unlocking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](http.c:190) Client list unlocked
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Locking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:102) Client list locked
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Unlocking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:115) Client list unlocked
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Locking config
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:168) Config locked
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:210) Level 1:
>> Calculated 1 auth servers in list
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:225) Level 1:
>> Resolving auth server [192.168.1.39]
>>
>> [7][Sat Jan 1 00:43:22 2000](util.c:120) Locking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:43:22 2000](util.c:120) wd_gethostbyname() locked
>>
>> [7][Sat Jan 1 00:43:22 2000](util.c:135) Unlocking wd_gethostbyname()
>>
>> [7][Sat Jan 1 00:43:22 2000](util.c:135) wd_gethostbyname() unlocked
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:279) Level 1:
>> Resolving auth server [192.168.1.39] succeeded = [192.168.1.39]
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:304) Level 1:
>> Connecting to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:330) Level 1:
>> Successfully connected to auth server 192.168.1.39:80
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Unlocking config
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:170) Config unlocked
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:177) Connected to auth
>> server
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:95) Sending HTTP
>> request to auth server: [GET /wifidog/auth/?
>> stage=login&ip=192.168.1.109&mac=00:10:C6:39:D0:EE&token=8ce8ec1cbd30 
>> a
>>
>
>
>> 1dfe009a9365a0495a7&incoming=0&outgoing=0 HTTP/1.0
>>
>> User-Agent: WiFiDog 1.1.2
>>
>> Host: 192.168.1.39
>>
>> ]
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:98) Reading response
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:125) Read 736 bytes,
>> total now 736
>>
>> [7][Sat Jan 1 00:43:22 2000](centralserver.c:145) HTTP Response
>> from Server: [HTTP/1.1 200 OK
>>
>> Date: Thu, 29 Sep 2005 18:08:38 GMT
>>
>> Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/
>> 2.3.5 PHP/5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>>
>> X-Powered-By: PHP/5.0.5-1
>>
>> Content-Length: 451
>>
>> Connection: close
>>
>> Content-Type: text/html
>>
>> X-Pad: avoid browser bug
>>
>> <br />
>>
>> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/
>> wifidog/auth/index.php</b> on line <b>74</b><br />
>>
>> <br />
>>
>> <b>Notice</b>: Undefined index: gw_id in <b>/var/www/FarragutWiFi/
>> wifidog/auth/index.php</b> on line <b>74</b><br />
>>
>> <br />
>>
>> <b>Notice</b>: Undefined index: mac in <b>/var/www/FarragutWiFi/
>> wifidog/auth/index.php</b> on line <b>74</b><br />
>>
>> Auth: 0
>>
>> Messages: | Tried to login with a token that wasn't TOKEN_UNUSED.
>>
>> ]
>>
>> [6][Sat Jan 1 00:43:22 2000](centralserver.c:149) Auth server
>> returned authentication code 0
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Locking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:119) Client list locked
>>
>> [6][Sat Jan 1 00:43:22 2000](auth.c:159) Got DENIED from central
>> server authenticating token 8ce8ec1cbd30a1dfe009a9365a0495a7 from
>> 192.168.1.109 at 00:10:C6:39:D0:EE - redirecting them to denied
>> message
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Unlocking client list
>>
>> [7][Sat Jan 1 00:43:22 2000](auth.c:260) Client list unlocked
>>
>> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:68) Returned from
>> httpdProcessRequest() for 192.168.1.109
>>
>> [7][Sat Jan 1 00:43:22 2000](httpd_thread.c:73) Closing connection
>> with 192.168.1.109
>>
>>
>>
>>
>>
>> Dan Holton
>> IT Administrator
>>
>> Callahan & Associates, Inc.
>> www.CreditUnions.com | www.Callahan.com
>> Cooperative Knowledge for the Credit Union Community
>>
>>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog



More information about the WiFiDog mailing list