[isf-wifidog] problems starting wifidog

Docfear Docfear docfear at hotmail.com
Jeu 18 Jan 20:31:39 EST 2007


well i tried my wireless Alone and it works Great with wifidog auth server
but as soon as i plug it on my wired router it dont work (i only get direct internet access, no wifidog server)
 
heres my setup:
wired router is 192.168.2.1 (dhcp on)cable modem plugged in wan port
wireless is 192.168.2.2 (dhcp off and dns and gateway 192.168.2.1 ) pluged on port 1 of wired router 
 
let me know if you have any clues of what i'm doing wrong
 
thanks
 
Juan



> Date: Thu, 18 Jan 2007 13:31:24 -0800> From: sgrlogs at gmail.com> To: wifidog at listes.ilesansfil.org> Subject: Re: [isf-wifidog] problems starting wifidog> > How is your Wireless Router connected to wired one? Did you connect> wired router to WAN port of wireless router or are you using your> wireless router as a switch by connecting wired router to one of the> four ports?> > V. Patel> > On 1/17/07, Docfear Docfear <docfear at hotmail.com> wrote:> >> > Hi> >> > i think i figured out that i dont need to change much on the wifidog.conf> > file, i only changed the auth server part> > but now i have a problem when i start it with wifidog -f -d 7 , it tries to> > start the web server on my routers IP.> > the only thing is that my wireless router with wifidog is behind a wired> > router> > so my wired is IP 192.168.2.1 and wireless is 192.168.2.2 using the same> > subnet mask 255.255.255.0> > so here is my wifidog start log:> >> > root at xWRT:~$ wifidog -f -d 7> > [6][Wed Jan 17 15:22:02 2007][1144](conf.c:575) Reading configuration file> > '/etc/wifidog.conf'> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token: GatewayID,> > value: default> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > GatewayInterface, value: br0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token: AuthServer,> > value: {> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:287) Adding lavalsansfil.com:80> > (SSL: 443) / to the auth server list> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:309) Auth server added> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > CheckInterval, value: 60> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > ClientTimeout, value: 5> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > FirewallRuleSet, value: global> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set> > global> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow udp to 69.90.89.192/27]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp to> > 69.90.89.192/27> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > udp port (null) to 69.90.89.192/27> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow udp to 69.90.85.0/27]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp to> > 69.90.85.0/27> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > udp port (null) to 69.90.85.0/27> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow tcp port 80 to 69.90.89.205]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 80> > to 69.90.89.205> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > tcp port 80 to 69.90.89.205> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set global> > added.> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > FirewallRuleSet, value: validating-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set> > validating-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [block tcp port 25]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: block tcp port 25> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule block> > tcp port 25 to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow to 0.0.0.0/0]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > (null) port (null) to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set> > validating-users added.> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > FirewallRuleSet, value: known-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set> > known-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow to 0.0.0.0/0]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > (null) port (null) to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set> > known-users added.> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > FirewallRuleSet, value: unknown-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set> > unknown-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow udp port 53]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp port 53> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > udp port 53 to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow tcp port 53]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 53> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > tcp port 53 to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow udp port 67]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow udp port 67> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > udp port 67 to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [allow tcp port 67]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: allow tcp port 67> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule allow> > tcp port 67 to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set> > unknown-users added.> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:614) Parsing token:> > FirewallRuleSet, value: locked-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:346) Adding Firewall Rule Set> > locked-users> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:385) p1 = [FirewallRule]; p2 => > [block to 0.0.0.0/0]> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:432) leftover: block to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:514) Adding Firewall Rule block> > (null) port (null) to 0.0.0.0/0> > [7][Wed Jan 17 15:22:02 2007][1144](conf.c:409) Firewall Rule Set> > locked-users added.> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:314) Initializing signal> > handlers> > [6][Wed Jan 17 15:22:02 2007][1144](gateway.c:374) Setting started_time> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:384) Finding IP address of br0> > [7][Wed Jan 17 15:22:02 2007][1144](gateway.c:389) br0 = 192.168.2.2> > [5][Wed Jan 17 15:22:02 2007][1144](gateway.c:404) Creating web server on> > 192.168.2.2:2060> > [3][Wed Jan 17 15:22:02 2007][1144](gateway.c:406) Could not create web> > server: Address already in use> > root at xWRT:~$> >> >> > thanks> >> > Juan> >> > ________________________________> > Be one of the first to try Windows Live Mail.> > _______________________________________________> > WiFiDog mailing list> > WiFiDog at listes.ilesansfil.org> > http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog> >> >> _______________________________________________> WiFiDog mailing list> WiFiDog at listes.ilesansfil.org> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
_________________________________________________________________
Be one of the first to try Windows Live Mail.
http://ideas.live.com/programpage.aspx?versionId=5d21c51a-b161-4314-9b0e-4911fb2b2e6d
-------------- section suivante --------------
Une pièce jointe HTML a été enlevée...
URL: http://listes.ilesansfil.org/pipermail/wifidog/attachments/20070118/9b78c9d9/attachment.htm


Plus d'informations sur la liste de diffusion WiFiDog