A jednak coś mi nie działa. Nowa instalacja na mr-3420 nowy usb tym razem nie chce przejść przez tworzenie certyfikatu.
firewal przed instalacją openvpn
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type router-solicitation neighbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall po instalacji
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type router-solicitation neighbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall.vpn_zone=zone
firewall.vpn_zone.name=vpn
firewall.vpn_zone.network=vpn
firewall.vpn_zone.input=ACCEPT
firewall.vpn_zone.output=ACCEPT
firewall.vpn_zone.forward=ACCEPT
firewall.vpn_zone.mtu_fix=1
firewall.vpn_zone.masq=1
firewall.vpn_lan_forwarding=forwarding
firewall.vpn_lan_forwarding.src=lan
firewall.vpn_lan_forwarding.dest=vpn
firewall.ra_openvpn=remote_accept
firewall.ra_openvpn.zone=wan
firewall.ra_openvpn.local_port=1194
firewall.ra_openvpn.remote_port=1194
firewall.ra_openvpn.proto=udp
firewall.vpn_wan_forwarding=forwarding
firewall.vpn_wan_forwarding.src=vpn
firewall.vpn_wan_forwarding.dest=wan
log
Jan 1 01:00:57 Gargoyle kern.info kernel: [ 57.090000] br-lan: port 2(wlan0) entered forwarding state
Jan 1 01:00:59 Gargoyle kern.info kernel: [ 59.090000] br-lan: port 2(wlan0) entered forwarding state
Jan 1 01:00:05 Gargoyle user.info sysinit: Loading defaults
Jan 1 01:00:05 Gargoyle user.info sysinit: Loading synflood protection
Jan 1 01:00:05 Gargoyle user.info sysinit: Adding custom chains
Jan 1 01:00:06 Gargoyle user.info sysinit: Loading zones
Jan 1 01:00:08 Gargoyle user.info sysinit: Loading forwardings
Jan 1 01:00:08 Gargoyle user.info sysinit: Loading rules
Jan 1 01:00:08 Gargoyle user.info sysinit: Loading redirects
Jan 1 01:00:08 Gargoyle user.info sysinit: Loading includes
Jan 1 01:00:10 Gargoyle user.info sysinit: Optimizing conntrack
Jan 1 01:00:10 Gargoyle user.info sysinit: Loading interfaces
Jan 1 01:00:10 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:07:24 Gargoyle authpriv.info dropbear[1831]: Running in background
May 31 09:07:24 Gargoyle daemon.warn httpd_gargoyle[1856]: started as root without requesting chroot(), warning only
May 31 09:07:24 Gargoyle daemon.notice httpd_gargoyle[1856]: httpd_gargoyle/1.0 14mar2008 starting on Gargoyle, port 80
May 31 09:07:26 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:07:26 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: started, version 2.62 cachesize 150
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:07:30 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using local addresses only for domain lan
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: reading /tmp/resolv.conf.auto
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 192.168.1.248#53
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 213.241.79.38#53
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 8.8.8.8#53
May 31 09:07:30 Gargoyle daemon.warn dnsmasq[1977]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using local addresses only for domain lan
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: read /etc/hosts - 2 addresses
May 31 09:07:30 Gargoyle daemon.info dnsmasq-dhcp[1977]: read /etc/ethers - 0 addresses
May 31 09:07:31 Gargoyle user.info sysinit: ERROR: No valid dynamic DNS service configurations defined
May 31 09:07:31 Gargoyle user.info sysinit: (Did you specify correct configuration file path?)
May 31 09:07:31 Gargoyle user.info sysinit: setting up led USB
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPDISCOVER(br-lan) 192.168.1.187 00:00:e2:6d:79:15
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPOFFER(br-lan) 192.168.1.187 00:00:e2:6d:79:15
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPREQUEST(br-lan) 192.168.1.187 00:00:e2:6d:79:15
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPACK(br-lan) 192.168.1.187 00:00:e2:6d:79:15 bb
May 31 09:07:34 Gargoyle kern.warn kernel: [ 85.200000] head: sending ioctl 540d to a partition!
May 31 09:07:34 Gargoyle kern.warn kernel: [ 85.200000] head: sending ioctl 540d to a partition!
May 31 09:07:34 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:07:37 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:07:40 Gargoyle authpriv.info dropbear[2276]: Child connection from 192.168.1.187:53841
May 31 09:07:40 Gargoyle kern.warn kernel: [ 91.280000] head: sending ioctl 540d to a partition!
May 31 09:07:40 Gargoyle kern.warn kernel: [ 91.280000] head: sending ioctl 540d to a partition!
May 31 09:07:46 Gargoyle kern.warn kernel: [ 96.950000] head: sending ioctl 540d to a partition!
May 31 09:07:46 Gargoyle kern.warn kernel: [ 96.960000] head: sending ioctl 540d to a partition!
May 31 09:07:47 Gargoyle kern.warn kernel: [ 98.540000] ipt_bandwidth: timezone shift of 120 minutes detected, adjusting
May 31 09:07:47 Gargoyle kern.warn kernel: [ 98.550000] old minutes west=0, new minutes west=-120
May 31 09:07:48 Gargoyle authpriv.info dropbear[2276]: Exit before auth (user 'root', 0 fails): Exited normally
May 31 09:07:49 Gargoyle authpriv.info dropbear[2747]: Child connection from 192.168.1.187:53842
May 31 09:07:54 Gargoyle user.notice fstab: mount: mounting /dev/sda3 on /mnt/sda3 failed: Invalid argument
May 31 09:07:59 Gargoyle authpriv.notice dropbear[2747]: Password auth succeeded for 'root' from 192.168.1.187:53842
May 31 09:08:03 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:09:41 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:41 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:47 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:47 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:52 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:52 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:58 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:58 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:01 Gargoyle daemon.info dnsmasq[1977]: exiting on receipt of SIGTERM
May 31 09:10:01 Gargoyle kern.info kernel: [ 232.320000] device wlan0 left promiscuous mode
May 31 09:10:01 Gargoyle kern.info kernel: [ 232.330000] br-lan: port 2(wlan0) entered disabled state
May 31 09:10:03 Gargoyle kern.info kernel: [ 233.780000] eth0: link down
May 31 09:10:03 Gargoyle kern.info kernel: [ 233.780000] br-lan: port 1(eth0) entered disabled state
May 31 09:10:04 Gargoyle kern.info kernel: [ 234.760000] device eth0 left promiscuous mode
May 31 09:10:04 Gargoyle kern.info kernel: [ 234.760000] br-lan: port 1(eth0) entered disabled state
May 31 09:10:04 Gargoyle kern.info kernel: [ 234.770000] eth1: link down
May 31 09:10:05 Gargoyle daemon.notice netifd: Interface 'lan' is now up
May 31 09:10:05 Gargoyle kern.info kernel: [ 235.820000] device eth0 entered promiscuous mode
May 31 09:10:05 Gargoyle daemon.notice netifd: Interface 'loopback' is now up
May 31 09:10:05 Gargoyle daemon.notice netifd: wan (3683): udhcpc (v1.19.4) started
May 31 09:10:05 Gargoyle daemon.notice netifd: wan (3683): Sending discover...
May 31 09:10:05 Gargoyle kern.info kernel: [ 236.420000] eth0: link up (1000Mbps/Full duplex)
May 31 09:10:05 Gargoyle kern.info kernel: [ 236.420000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:05 Gargoyle kern.info kernel: [ 236.430000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:06 Gargoyle user.notice ifup: Enabling Router Solicitations on lan (br-lan)
May 31 09:10:06 Gargoyle kern.info kernel: [ 236.980000] eth1: link up (100Mbps/Full duplex)
May 31 09:10:07 Gargoyle kern.info kernel: [ 238.430000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Sending discover...
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Sending select for 77.91.34.10...
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Lease of 77.91.34.10 obtained, lease time 25143
May 31 09:10:08 Gargoyle daemon.notice netifd: Interface 'wan' is now up
May 31 09:10:10 Gargoyle kern.info kernel: [ 241.250000] device wlan0 entered promiscuous mode
May 31 09:10:11 Gargoyle kern.info kernel: [ 241.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:11 Gargoyle kern.info kernel: [ 241.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:13 Gargoyle kern.info kernel: [ 243.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:16 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:16 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:17 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:10:18 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:10:20 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:10:20 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:10:21 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:21 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: started, version 2.62 cachesize 150
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:10:23 Gargoyle daemon.info dnsmasq-dhcp[4280]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using local addresses only for domain lan
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: reading /tmp/resolv.conf.auto
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 192.168.1.248#53
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 213.241.79.38#53
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 8.8.8.8#53
May 31 09:10:23 Gargoyle daemon.warn dnsmasq[4280]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using local addresses only for domain lan
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: read /etc/hosts - 2 addresses
May 31 09:10:23 Gargoyle daemon.info dnsmasq-dhcp[4280]: read /etc/ethers - 0 addresses
May 31 09:10:27 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:27 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:32 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:32 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:38 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:38 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:38 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:10:39 Gargoyle user.info firewall: removing wan (eth1) from zone wan
May 31 09:10:39 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:11:03 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:11:35 Gargoyle daemon.info dnsmasq[4280]: exiting on receipt of SIGTERM
May 31 09:11:36 Gargoyle kern.info kernel: [ 326.720000] device wlan0 left promiscuous mode
May 31 09:11:36 Gargoyle kern.info kernel: [ 326.730000] br-lan: port 2(wlan0) entered disabled state
May 31 09:11:37 Gargoyle kern.info kernel: [ 328.460000] eth0: link down
May 31 09:11:37 Gargoyle kern.info kernel: [ 328.460000] br-lan: port 1(eth0) entered disabled state
May 31 09:11:38 Gargoyle kern.info kernel: [ 328.980000] eth1: link down
May 31 09:11:38 Gargoyle kern.info kernel: [ 329.230000] device eth0 left promiscuous mode
May 31 09:11:38 Gargoyle kern.info kernel: [ 329.240000] br-lan: port 1(eth0) entered disabled state
May 31 09:11:39 Gargoyle daemon.notice netifd: Interface 'lan' is now up
May 31 09:11:39 Gargoyle kern.info kernel: [ 330.290000] device eth0 entered promiscuous mode
May 31 09:11:39 Gargoyle daemon.notice netifd: Interface 'loopback' is now up
May 31 09:11:40 Gargoyle daemon.notice netifd: wan (5527): udhcpc (v1.19.4) started
May 31 09:11:40 Gargoyle daemon.notice netifd: wan (5527): Sending discover...
May 31 09:11:40 Gargoyle kern.info kernel: [ 330.890000] eth0: link up (1000Mbps/Full duplex)
May 31 09:11:40 Gargoyle kern.info kernel: [ 330.890000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:40 Gargoyle kern.info kernel: [ 330.900000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:40 Gargoyle kern.info kernel: [ 330.980000] eth1: link up (100Mbps/Full duplex)
May 31 09:11:40 Gargoyle user.notice ifup: Enabling Router Solicitations on lan (br-lan)
May 31 09:11:42 Gargoyle kern.info kernel: [ 332.900000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Sending discover...
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Sending select for 77.91.34.10...
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Lease of 77.91.34.10 obtained, lease time 25048
May 31 09:11:43 Gargoyle daemon.notice netifd: Interface 'wan' is now up
May 31 09:11:45 Gargoyle kern.info kernel: [ 335.830000] device wlan0 entered promiscuous mode
May 31 09:11:45 Gargoyle kern.info kernel: [ 336.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:45 Gargoyle kern.info kernel: [ 336.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:47 Gargoyle kern.info kernel: [ 338.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:52 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:11:52 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:11:54 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:11:54 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: started, version 2.62 cachesize 150
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:11:57 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using local addresses only for domain lan
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: reading /tmp/resolv.conf.auto
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 192.168.1.248#53
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 213.241.79.38#53
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 8.8.8.8#53
May 31 09:11:57 Gargoyle daemon.warn dnsmasq[6084]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using local addresses only for domain lan
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: read /etc/hosts - 2 addresses
May 31 09:11:57 Gargoyle daemon.info dnsmasq-dhcp[6084]: read /etc/ethers - 0 addresses
May 31 09:12:12 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:12:13 Gargoyle user.info firewall: removing wan (eth1) from zone wan
May 31 09:12:14 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:12:40 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:15:59 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:15:59 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:16:00 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 WPA: pairwise key handshake completed (RSN)
May 31 09:16:00 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPREQUEST(br-lan) 192.168.1.229 00:03:c9:37:42:01
May 31 09:16:00 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPACK(br-lan) 192.168.1.229 00:03:c9:37:42:01 bb
May 31 09:16:34 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPREQUEST(br-lan) 192.168.1.187 00:00:e2:6d:79:15
May 31 09:16:34 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPACK(br-lan) 192.168.1.187 00:00:e2:6d:79:15 bb