[isf-wifidog] I have a router that is being tempremental.
Don Druce
dondruce at sympatico.ca
Jeu 30 Aou 00:46:10 EDT 2007
Hi
And in case this can be of some use,
------------------------------------
root at CS-Linksys-G-X-WRT:~# help
Built-in commands:
-------------------
. : alias bg break cd chdir command continue eval exec exit export
false fg getopts hash help jobs kill let local pwd read readonly
return set shift times trap true type ulimit umask unalias unset
wait
root at CS-Linksys-G-X-WRT:~# wifidog -f -d 7
[6][Thu Aug 30 00:40:14 2007][1220](conf.c:575) Reading configuration
file '/etc/wifidog.conf'
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
GatewayID, value: default
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
GatewayInterface, value: br0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
AuthServer, value: {
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:287) Adding 192.168.2.200:80
(SSL: 443) / to the auth server list
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:309) Auth server added
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: global
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set
global
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 192.168.0.0/16]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
192.168.0.0/16
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 192.168.0.0/16
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 172.16.0.0/12]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
172.16.0.0/12
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 172.16.0.0/12
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 10.0.0.0/8]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
10.0.0.0/8
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 10.0.0.0/8
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set global
added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: validating-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set
validating-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
validating-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: known-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set
known-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
known-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: unknown-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set
unknown-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow udp port 53]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp port 53
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow udp port 53 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow tcp port 53]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp port 53
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow tcp port 53 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow udp port 67]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp port 67
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow udp port 67 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow tcp port 67]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp port 67
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow tcp port 67 to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
unknown-users added.
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: locked-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule Set
locked-users
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 0.0.0.0/0]
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 0.0.0.0/0
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
locked-users added.
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:314) Initializing signal
handlers
[6][Thu Aug 30 00:40:14 2007][1220](gateway.c:374) Setting started_time
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:384) Finding IP address of br0
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:389) br0 = 192.168.5.1
[5][Thu Aug 30 00:40:14 2007][1220](gateway.c:404) Creating web server
on 192.168.5.1:2060
[3][Thu Aug 30 00:40:14 2007][1220](gateway.c:406) Could not create web
server: Address already in use
root at CS-Linksys-G-X-WRT:~#
--------------------------------------
Pascal Charest wrote:
> The correct syntax to get the iptables listing would be :
> iptables -L
>
> that should give us bit more info.
>
> Another good thing would be the output from "ifconfig" and knowing if
> "ping www.google.com <http://www.google.com>" and "ping 64.233.167.147
> <http://64.233.167.147>" work.
>
> Pascal Ch.
>
> --
> Pascal Charest, Consultant en logiciel libre.
> http://blog.pacharest.com
>
> On 8/28/07, *Don Druce* <dondruce at sympatico.ca
> <mailto:dondruce at sympatico.ca>> wrote:
>
> Router Linksys WRT54 works at times, but when it does not want
> to, it acts like a mule and just does nothing.
> I managed to coax it into telling me about its problems, can
> anyone help me diagnose this. It is a bit beyond me.
>
> This is on my LAN and was working with my Captive Server. (when it
> wanted to)
>
> Don
> ----------------------------------------------------
> root at CS-Linksys-G-X-WRT:~# wifidog-init status
> WiFiDog status
>
> Version: 1.1.3_rc1
> Uptime: 0d 0h 8m 20s
> Has been restarted: no
> Internet Connectivity: yes
> *Auth server reachable: no*
> Clients served this session: 0
>
> 0 clients connected.
>
> Authentication servers:
> Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
> <http://192.168.2.200>)
> root at CS-Linksys-G-X-WRT:~#
>
>
> -----------------------------------------------
> Authentication servers:
> Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
> <http://192.168.2.200>)
> OK
> Starting Wifidog ...
> Testing for iptables modules
> Testing ipt_mac
> ipt_mac module is working
> Testing ipt_mark
> ipt_mark module is working
> Testing ipt_REDIRECT
> ipt_REDIRECT module is working
> OK
> *root at CS-Linksys-G-X-WRT:~# iptables: Invalid argument
> iptables: Invalid argument
> iptables: Invalid argument
> [3][Fri Dec 31 19:02:49 1999][1371](centralserver.c:176) Failed to
> connect to any of the auth servers
>
> --------------------------------------------------
>
> *Help, comments, leads, ideas etc appreciated.*
> *
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org <mailto:WiFiDog at listes.ilesansfil.org>
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>
>
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
> ------------------------------------------------------------------------
>
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.5.484 / Virus Database: 269.12.10/977 - Release Date: 8/28/2007 4:29 PM
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listes.ilesansfil.org/pipermail/wifidog/attachments/20070830/2e1fb6b0/attachment-0001.htm
Plus d'informations sur la liste de diffusion WiFiDog