<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=UTF-8" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
Hi<br>
<br>
And in case this can be of some use, <br>
<br>
------------------------------------<br>
root@CS-Linksys-G-X-WRT:~# help<br>
<br>
Built-in commands:<br>
-------------------<br>
. : alias bg break cd chdir command continue eval exec exit
export<br>
false fg getopts hash help jobs kill let local pwd read readonly<br>
return set shift times trap true type ulimit umask unalias unset<br>
wait<br>
<br>
root@CS-Linksys-G-X-WRT:~# wifidog -f -d 7<br>
[6][Thu Aug 30 00:40:14 2007][1220](conf.c:575) Reading configuration
file '/etc/wifidog.conf'<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
GatewayID, value: default<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
GatewayInterface, value: br0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
AuthServer, value: {<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:287) Adding 192.168.2.200:80
(SSL: 443) / to the auth server list<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:309) Auth server added<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: global<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule
Set global<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 192.168.0.0/16]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
192.168.0.0/16<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 192.168.0.0/16<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 172.16.0.0/12]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
172.16.0.0/12<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 172.16.0.0/12<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 10.0.0.0/8]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
10.0.0.0/8<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 10.0.0.0/8<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
global added.<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: validating-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule
Set validating-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow to 0.0.0.0/0]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to
0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow (null) port (null) to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
validating-users added.<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: known-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule
Set known-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow to 0.0.0.0/0]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow to
0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow (null) port (null) to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
known-users added.<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: unknown-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule
Set unknown-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow udp port 53]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp
port 53<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow udp port 53 to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow tcp port 53]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp
port 53<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow tcp port 53 to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow udp port 67]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow udp
port 67<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow udp port 67 to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [allow tcp port 67]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: allow tcp
port 67<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
allow tcp port 67 to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
unknown-users added.<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:613) Parsing token:
FirewallRuleSet, value: locked-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:346) Adding Firewall Rule
Set locked-users<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:385) p1 = [FirewallRule]; p2
= [block to 0.0.0.0/0]<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:432) leftover: block to
0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:514) Adding Firewall Rule
block (null) port (null) to 0.0.0.0/0<br>
[7][Thu Aug 30 00:40:14 2007][1220](conf.c:409) Firewall Rule Set
locked-users added.<br>
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:314) Initializing signal
handlers<br>
[6][Thu Aug 30 00:40:14 2007][1220](gateway.c:374) Setting started_time<br>
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:384) Finding IP address
of br0<br>
[7][Thu Aug 30 00:40:14 2007][1220](gateway.c:389) br0 = 192.168.5.1<br>
[5][Thu Aug 30 00:40:14 2007][1220](gateway.c:404) Creating web server
on 192.168.5.1:2060<br>
[3][Thu Aug 30 00:40:14 2007][1220](gateway.c:406) Could not create web
server: Address already in use<br>
root@CS-Linksys-G-X-WRT:~#<br>
<br>
--------------------------------------<br>
<br>
Pascal Charest wrote:
<blockquote
cite="mid:ba4e02df0708291548p3852ab55m767cae62d2d24c62@mail.gmail.com"
type="cite">The correct syntax to get the iptables listing would be :
<br>
iptables -L <br>
<br>
that should give us bit more info. <br>
<br>
Another good thing would be the output from "ifconfig" and knowing if
"ping <a moz-do-not-send="true" href="http://www.google.com">
www.google.com</a>" and "ping <a moz-do-not-send="true"
href="http://64.233.167.147">64.233.167.147</a>" work. <br>
<br>
Pascal Ch.<br>
<br>
-- <br>
Pascal Charest, Consultant en logiciel libre.<br>
<a moz-do-not-send="true" href="http://blog.pacharest.com">http://blog.pacharest.com</a><br>
<br>
<div><span class="gmail_quote">On 8/28/07, <b
class="gmail_sendername">Don Druce</b> <<a moz-do-not-send="true"
href="mailto:dondruce@sympatico.ca">dondruce@sympatico.ca</a>>
wrote:</span>
<blockquote class="gmail_quote"
style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div bgcolor="#ffffff" text="#000000">Router Linksys WRT54 works
at times, but when it does not want to, it
acts like a mule and just does nothing.<br>
I managed to coax it into telling me about its problems, can anyone
help me diagnose this. It is a bit beyond me.<br>
<br>
This is on my LAN and was working with my Captive Server. (when it
wanted to)<br>
<br>
Don<br>
----------------------------------------------------<br>
root@CS-Linksys-G-X-WRT:~# wifidog-init status<br>
WiFiDog status<br>
<br>
Version: 1.1.3_rc1<br>
Uptime: 0d 0h 8m 20s<br>
Has been restarted: no<br>
Internet Connectivity: yes<br>
<big><b>Auth server reachable: no</b></big><br>
Clients served this session: 0<br>
<br>
0 clients connected.<br>
<br>
Authentication servers:<br>
Host: <a moz-do-not-send="true" href="http://192.168.2.200"
target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">192.168.2.200</a>
(<a moz-do-not-send="true" href="http://192.168.2.200" target="_blank"
onclick="return top.js.OpenExtLink(window,event,this)">
192.168.2.200</a>)<br>
root@CS-Linksys-G-X-WRT:~#<br>
<br>
<br>
-----------------------------------------------<br>
Authentication servers:<br>
Host: <a moz-do-not-send="true" href="http://192.168.2.200"
target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">192.168.2.200</a>
(<a moz-do-not-send="true" href="http://192.168.2.200" target="_blank"
onclick="return top.js.OpenExtLink(window,event,this)">
192.168.2.200</a>)<br>
OK<br>
Starting Wifidog ...<br>
Testing for iptables modules<br>
Testing ipt_mac<br>
ipt_mac module is working<br>
Testing ipt_mark<br>
ipt_mark module is working<br>
Testing ipt_REDIRECT<br>
ipt_REDIRECT module is working<br>
OK<br>
<big><b>root@CS-Linksys-G-X-WRT:~# iptables: Invalid argument<br>
iptables: Invalid argument<br>
iptables: Invalid argument<br>
[3][Fri Dec 31 19:02:49 1999][1371](centralserver.c:176) Failed to
connect to any of the auth servers<br>
<br>
--------------------------------------------------<br>
<br>
</b><small>Help, comments, leads, ideas etc appreciated.</small><b><br>
</b></big>
</div>
<br>
_______________________________________________<br>
WiFiDog mailing list<br>
<a moz-do-not-send="true"
onclick="return top.js.OpenExtLink(window,event,this)"
href="mailto:WiFiDog@listes.ilesansfil.org">WiFiDog@listes.ilesansfil.org</a><br>
<a moz-do-not-send="true"
onclick="return top.js.OpenExtLink(window,event,this)"
href="http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog"
target="_blank">http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog</a><br>
</blockquote>
</div>
<br>
<br clear="all">
<br>
<pre wrap="">
<hr size="4" width="90%">
_______________________________________________
WiFiDog mailing list
<a class="moz-txt-link-abbreviated" href="mailto:WiFiDog@listes.ilesansfil.org">WiFiDog@listes.ilesansfil.org</a>
<a class="moz-txt-link-freetext" href="http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog">http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog</a></pre>
<pre wrap="">
<hr size="4" width="90%">
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.5.484 / Virus Database: 269.12.10/977 - Release Date: 8/28/2007 4:29 PM
</pre>
</blockquote>
<br>
</body>
</html>