[isf-wifidog] I have a router that is being tempremental.

Don Druce dondruce at sympatico.ca
Jeu 30 Aou 00:46:10 EDT 2007


Hi

And in case this can be of some use,

------------------------------------
root at CS-Linksys-G-X-WRT:~# help

Built-in commands:
-------------------
        . : alias bg break cd chdir command continue eval exec exit export
        false fg getopts hash help jobs kill let local pwd read readonly
        return set shift times trap true type ulimit umask unalias unset
        wait

root at CS-Linksys-G-X-WRT:~# wifidog -f -d 7
[6][Thu Aug 30 00:40:14 2007][1220](conf.c:575) Reading configuration 
file '/etc/wifidog.conf'
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
GatewayID, value: default
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
GatewayInterface, value: br0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
AuthServer, value: {
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:287) Adding 192.168.2.200:80 
(SSL: 443) / to the auth server list
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:309) Auth server added
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
FirewallRuleSet, value: global
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set 
global
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [block to 192.168.0.0/16]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to 
192.168.0.0/16
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
block (null) port (null) to 192.168.0.0/16
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [block to 172.16.0.0/12]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to 
172.16.0.0/12
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
block (null) port (null) to 172.16.0.0/12
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [block to 10.0.0.0/8]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to 
10.0.0.0/8
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
block (null) port (null) to 10.0.0.0/8
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set global 
added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
FirewallRuleSet, value: validating-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set 
validating-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set 
validating-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
FirewallRuleSet, value: known-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set 
known-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set 
known-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
FirewallRuleSet, value: unknown-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set 
unknown-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow udp port 53]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp port 53
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow udp port 53 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow tcp port 53]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp port 53
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow tcp port 53 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow udp port 67]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp port 67
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow udp port 67 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [allow tcp port 67]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp port 67
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
allow tcp port 67 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set 
unknown-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token: 
FirewallRuleSet, value: locked-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set 
locked-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2 
= [block to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule 
block (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set 
locked-users added.
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:314) Initializing signal 
handlers
[6][Thu Aug 30 00:40:14 2007][1220](gateway.c:374) Setting started_time
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:384) Finding IP address of br0
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:389) br0 = 192.168.5.1
[5][Thu Aug 30 00:40:14 2007][1220](gateway.c:404) Creating web server 
on 192.168.5.1:2060
[3][Thu Aug 30 00:40:14 2007][1220](gateway.c:406) Could not create web 
server: Address already in use
root at CS-Linksys-G-X-WRT:~#

--------------------------------------

Pascal Charest wrote:
> The correct syntax to get the iptables listing would be  :
> iptables -L
>
> that should give us bit more info.
>
> Another good thing would be the output from "ifconfig" and knowing if 
> "ping www.google.com <http://www.google.com>" and "ping 64.233.167.147 
> <http://64.233.167.147>" work.
>
> Pascal Ch.
>
> -- 
> Pascal Charest, Consultant en logiciel libre.
> http://blog.pacharest.com
>
> On 8/28/07, *Don Druce* <dondruce at sympatico.ca 
> <mailto:dondruce at sympatico.ca>> wrote:
>
>     Router Linksys WRT54  works at times, but when it does not want
>     to, it acts like a mule and just does nothing.
>     I managed to coax it into telling me about its problems, can
>     anyone help me diagnose this.  It is a bit beyond me.
>
>     This is on my LAN and was working with my Captive Server. (when it
>     wanted to)
>
>     Don
>     ----------------------------------------------------
>     root at CS-Linksys-G-X-WRT:~# wifidog-init status
>     WiFiDog status
>
>     Version: 1.1.3_rc1
>     Uptime: 0d 0h 8m 20s
>     Has been restarted: no
>     Internet Connectivity: yes
>     *Auth server reachable: no*
>     Clients served this session: 0
>
>     0 clients connected.
>
>     Authentication servers:
>       Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
>     <http://192.168.2.200>)
>     root at CS-Linksys-G-X-WRT:~#
>
>
>     -----------------------------------------------
>     Authentication servers:
>       Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
>     <http://192.168.2.200>)
>     OK
>     Starting Wifidog ...
>     Testing for iptables modules
>       Testing ipt_mac
>        ipt_mac  module is working
>       Testing ipt_mark
>        ipt_mark module is working
>       Testing ipt_REDIRECT
>        ipt_REDIRECT  module is working
>     OK
>     *root at CS-Linksys-G-X-WRT:~# iptables: Invalid argument
>     iptables: Invalid argument
>     iptables: Invalid argument
>     [3][Fri Dec 31 19:02:49 1999][1371](centralserver.c:176) Failed to
>     connect to any of the auth servers
>
>     --------------------------------------------------
>
>     *Help, comments, leads, ideas etc appreciated.*
>     *
>
>     _______________________________________________
>     WiFiDog mailing list
>     WiFiDog at listes.ilesansfil.org <mailto:WiFiDog at listes.ilesansfil.org>
>     http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>
>
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
> ------------------------------------------------------------------------
>
> No virus found in this incoming message.
> Checked by AVG Free Edition. 
> Version: 7.5.484 / Virus Database: 269.12.10/977 - Release Date: 8/28/2007 4:29 PM
>   

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listes.ilesansfil.org/pipermail/wifidog/attachments/20070830/2e1fb6b0/attachment-0001.htm 


Plus d'informations sur la liste de diffusion WiFiDog