[Wien] freifunk-openwrt-autoupdate-1.7.4.8-0xff-markit-full.trx + tunnel | koennte man 0xff-openvpn-webif ueberarbeiten?

Markus Kittenberger (spam-protected)
Do Dez 2 12:19:25 CET 2010


und was?
ausser dass du das openvpn-webif seine probleme mit 1.7.x hat,
und dass du nun das bestehende tcpdump durch ein anderes ersetzt hast,
wolltest du uns allen nun sagen?

lg Markus

p.s. ich hab absolut nix gegen gründlichen (debug)output,..
aber zumindest kommentieren warum man ihn postet sollte man imho schon,..
(-;

2010/12/2 Petr Koval <(spam-protected)>

>
> http://ipkg.funkfeuer.at/autoupdate/freifunk-openwrt-autoupdate-1.7.4.8-0xff-markit-full.trx
>
>
> Software:
>
>
> ip
> wl
> wificonf
> kernel
> base-files
> freifunk-webadmin
> freifunk-upload
> freifunk-mtdkill
> freifunk-rdate
> freifunk-olsrd
> dropbear
> freifunk-webadmin-0xff
> 0xff-olsr
> freifunk-recommended-de
> xyssl
> freifunk-dnsmasq
> libncurses
> horst
> iptraf
> libpcap
> freifunk-tcpdump
> zlib
> librrd1
> rrdcgi1
> rrdtool1
> rrdcollect
> freifunk-statistics-de
> wl-adv
> netperfbin
> freifunk-netperf-de
> xrelayd
> freifunk-secureadmin-de
> webif-nettools
>
>
> Install:
> openvpn-nossl
>
>
> Verwaltung: Software 2
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/kmod-tun_2.4.30-brcm_mipsel.ipk
> ...
>
> kmod-tun_2.4.30-brcm   0% |                             |     0
> --:-- ETA
> kmod-tun_2.4.30-brcm 100% |*****************************|  5246
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking kmod-tun...Done.
> Configuring kmod-tun...Done.
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/openvpn-nossl_2.1.1_mipsel.ipk
> ...
>
> openvpn-nossl_2.1.1_   0% |                             |     0
> --:-- ETA
> openvpn-nossl_2.1.1_   1% |                             |  1024
> 01:11 ETA
> openvpn-nossl_2.1.1_   1% |                             |  1024
> 02:25 ETA
> openvpn-nossl_2.1.1_   1% |                             |  1024
> 03:35 ETA
> openvpn-nossl_2.1.1_  22% |******                       | 16896
> 00:13 ETA
> openvpn-nossl_2.1.1_  28% |********                     | 21504
> 00:12 ETA
> openvpn-nossl_2.1.1_  69% |********************         | 52224
> 00:02 ETA
> openvpn-nossl_2.1.1_ 100% |*****************************| 74665
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking openvpn-nossl...Done.
> Configuring openvpn-nossl...Done.
>
>
> Install:
> 0xff-openvpn-webif
>
>
> ipkg_depends: Warning: openvpn-nossl-nolzo mentioned in dependency but no
> package found in /usr/lib/ipkg/lists
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/busybox-awk_1.0.1_mipsel.ipk
> ...
>
> busybox-awk_1.0.1_mi   0% |                             |     0
> --:-- ETA
> busybox-awk_1.0.1_mi  22% |******                       |  5120
> 00:03 ETA
> busybox-awk_1.0.1_mi  22% |******                       |  5120
> 00:07 ETA
> busybox-awk_1.0.1_mi  28% |********                     |  6656
> 00:07 ETA
> busybox-awk_1.0.1_mi  28% |********                     |  6656
> 00:09 ETA
> busybox-awk_1.0.1_mi  55% |***************              | 12800
> 00:04 ETA
> busybox-awk_1.0.1_mi  55% |***************              | 12800
> 00:04 ETA
> busybox-awk_1.0.1_mi 100% |*****************************| 23086
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking busybox-awk...Done.
> Configuring busybox-awk...Done.
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/busybox-crontab_1.0.1_mipsel.ipk
> ...
>
> busybox-crontab_1.0.   0% |                             |     0
> --:-- ETA
> busybox-crontab_1.0. 100% |*****************************|  6687
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking busybox-crontab...Done.
> Configuring busybox-crontab...Done.
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/freifunk-iptables-missing_1.7.4_mipsel.ipk
> ...
>
> freifunk-iptables-mi   0% |                             |     0
> --:-- ETA
> freifunk-iptables-mi 100% |*****************************|  6484
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking freifunk-iptables-missing...Done.
> Configuring freifunk-iptables-missing...Done.
>
> Downloading
>
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/freifunk-openwrt-compat_1.7.4_mipsel.ipk
> ...
>
> freifunk-openwrt-com   0% |                             |     0
> --:-- ETA
> freifunk-openwrt-com  14% |****                         | 14336
> 00:05 ETA
> freifunk-openwrt-com  29% |********                     | 28672
> 00:04 ETA
> freifunk-openwrt-com  41% |***********                  | 40448
> 00:04 ETA
> freifunk-openwrt-com  49% |**************               | 47616
> 00:04 ETA
> freifunk-openwrt-com  56% |****************             | 54784
> 00:03 ETA
> freifunk-openwrt-com  82% |***********************      | 79872
> 00:01 ETA
> freifunk-openwrt-com  90% |**************************   | 87040
> 00:00 ETA
> freifunk-openwrt-com  94% |***************************  | 91648
> 00:00 ETA
> freifunk-openwrt-com 100% |*****************************| 96634
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking freifunk-openwrt-compat...Done.
> Configuring freifunk-openwrt-compat...Done.
>
> Downloading
> http://ipkg.funkfeuer.at/ipkg/freifunk/packages/tcpdump_3.9.4-1_mipsel.ipk
> ...
>
> tcpdump_3.9.4-1_mips   0% |                             |     0
> --:-- ETA
> tcpdump_3.9.4-1_mips   8% |**                           | 23040
> 00:10 ETA
> tcpdump_3.9.4-1_mips  16% |****                         | 43520
> 00:09 ETA
> tcpdump_3.9.4-1_mips  21% |******                       | 56320
> 00:10 ETA
> tcpdump_3.9.4-1_mips  22% |******                       | 57856
> 00:13 ETA
> tcpdump_3.9.4-1_mips  28% |********                     | 73728
> 00:12 ETA
> tcpdump_3.9.4-1_mips  35% |**********                   | 90112
> 00:11 ETA
> tcpdump_3.9.4-1_mips  39% |***********                  |    98 KB
> 00:10 ETA
> tcpdump_3.9.4-1_mips  50% |**************               |   128 KB
> 00:07 ETA
> tcpdump_3.9.4-1_mips  55% |***************              |   139 KB
> 00:07 ETA
> tcpdump_3.9.4-1_mips  55% |***************              |   139 KB
> 00:08 ETA
> tcpdump_3.9.4-1_mips  59% |*****************            |   150 KB
> 00:07 ETA
> tcpdump_3.9.4-1_mips  63% |******************           |   160 KB
> 00:06 ETA
> tcpdump_3.9.4-1_mips  70% |********************         |   176 KB
> 00:05 ETA
> tcpdump_3.9.4-1_mips  75% |*********************        |   189 KB
> 00:04 ETA
> tcpdump_3.9.4-1_mips  79% |**********************       |   199 KB
> 00:03 ETA
> tcpdump_3.9.4-1_mips  81% |***********************      |   205 KB
> 00:03 ETA
> tcpdump_3.9.4-1_mips  86% |************************     |   216 KB
> 00:02 ETA
> tcpdump_3.9.4-1_mips  89% |*************************    |   225 KB
> 00:02 ETA
> tcpdump_3.9.4-1_mips  98% |**************************** |   246 KB
> 00:00 ETA
> tcpdump_3.9.4-1_mips 100% |*****************************|   251 KB
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> Unpacking tcpdump...Done.
> Configuring tcpdump...Done.
>
> Downloading
> http://ipkg.funkfeuer.at/ipkg/1.6/0xff-openvpn-webif_1.5.3_mipsel.ipk ...
>
> 0xff-openvpn-webif_1   0% |                             |     0
> --:-- ETA
> 0xff-openvpn-webif_1 100% |*****************************|  5816
> 00:00 ETA
> Connecting to ipkg.funkfeuer.at[193.238.157.7]:80
> Done.
> ipkg_depends: Warning: openvpn-nossl-nolzo mentioned in dependency but no
> package found in /usr/lib/ipkg/lists
> Unpacking 0xff-openvpn-webif...Done.
> Configuring 0xff-openvpn-webif...Done.
>
>
> Software:
>
>
> ip
> wl
> wificonf
> kernel
> base-files
> freifunk-webadmin
> freifunk-upload
> freifunk-mtdkill
> freifunk-rdate
> freifunk-olsrd
> dropbear
> freifunk-webadmin-0xff
> 0xff-olsr
> freifunk-recommended-de
> xyssl
> freifunk-dnsmasq
> libncurses
> horst
> iptraf
> libpcap
> freifunk-tcpdump
> zlib
> librrd1
> rrdcgi1
> rrdtool1
> rrdcollect
> freifunk-statistics-de
> wl-adv
> netperfbin
> freifunk-netperf-de
> xrelayd
> freifunk-secureadmin-de
> webif-nettools
> kmod-tun
> openvpn-nossl
> busybox-awk
> busybox-crontab
> freifunk-iptables-missing
> freifunk-openwrt-compat
> tcpdump
> 0xff-openvpn-webif
>
>
> Vor der Änderung:
>
>
> login as: root
> (spam-protected)'s password:
>
>
> BusyBox v1.01 (2010.08.29-10:07+0000) Built-in shell (ash)
> Enter 'help' for a list of built-in commands.
>
>  _______                     ________        __
>  (       ).-----.-----.-----.)  )  )  ).----.)  )
>  (   -   ))  _  )  -__)     ))  )  )  ))   _))   _)
>  (_______))   __)_____)__)__))________))__)  )____)
>         )__) F R E I F U N K  F I R M W A R E
>
> (spam-protected):~# cat /etc/init.d/S42openvpn
> #!/bin/sh -e
>
> DAEMON=/usr/sbin/openvpn
> CONFIG_DIR=/var/etc/openvpn
> VPN_IF=tap0
> test -x $DAEMON || exit 0
> test -d $CONFIG_DIR || mkdir $CONFIG_DIR
>
> start_vpn () {
>
> ff_openvpn_active="$(nvram get ff_openvpn_active)"
> ff_openvpn_host="$(nvram get ff_openvpn_host)"
> ff_openvpn_proto="$(nvram get ff_openvpn_proto)"
> ff_openvpn_port="$(nvram get ff_openvpn_port)"
> ff_openvpn_secret="$(nvram get ff_openvpn_secret)"
> ff_openvpn_ip="$(nvram get ff_openvpn_ip)"
> ff_openvpn_netmask="$(nvram get ff_openvpn_netmask)"
> ff_openvpn_noolsr="$(nvram get ff_openvpn_noolsr)"
>
> if [ ! "$ff_openvpn_active" = "1" ]; then
>  echo -n " OpenVPN not activated"
>  echo
>  exit 0
> fi
>
> test -z "$ff_openvpn_host" && exit 0
> test -z "$ff_openvpn_port" && exit 0
> test -z "$ff_openvpn_ip" && exit 0
> test -z "$ff_openvpn_netmask" && exit 0
>
> #create OpenVPN config
>
> cat>$CONFIG_DIR/$VPN_IF.conf<<EOM
> dev             $VPN_IF
> proto           $ff_openvpn_proto
> remote          $ff_openvpn_host
> port            $ff_openvpn_port
> ifconfig        $ff_openvpn_ip $ff_openvpn_netmask
> route-up        /etc/openvpn/openvpn-webif-route-up.sh
> up              /etc/openvpn/openvpn-webif-if-up.sh
> down            /etc/openvpn/openvpn-webif-if-down.sh
> up-restart
> verb 3
> EOM
>
> if [ "$ff_openvpn_secret" = "1" ] && [ -f /etc/openvpn/$VPN_IF.secret ];
> then
> cat>>$CONFIG_DIR/$VPN_IF.conf<<EOM
> secret          /etc/openvpn/$VPN_IF.secret"
> auth            sha1
> cipher          none
> EOM
> fi
>
> #create OLSRd config
>
> if [ "$ff_openvpn_noolsr" = "1" ]; then
>  echo > /tmp/etc/local.olsrd.conf-openvpn
> else
>
> ff_ip4broad=$(nvram get ff_ip4broad)
>  test -n "$ff_ip4broad" && ff_ip4broad="Ip4Broadcast $(nvram get
> ff_ip4broad)"
>
> ff_openvpn_lq="$(nvram get ff_openvpn_lq)"
>  test -n "$ff_openvpn_lq" && ff_lqmult="LinkQualityMult default
> $ff_openvpn_lq"
>
> SPEED=$(nvram get ff_olsrspeed)
>  test -z "$SPEED" && SPEED=5
>
>  if [ "0" != "$(nvram get ff_fisheye)" ];then
>  TCINT=$(( 2 * SPEED / 3 ))
>  else
>  TCINT=$(( 2 * SPEED ))
>  fi
>
> cat>/tmp/etc/local.olsrd.conf-openvpn<<EOM
> # this file is automatically generated by openvpn-webif,
> # to define your own settings use /etc/local.olsrd.conf
> Interface "$VPN_IF"
> {
>       HelloInterval           $(( 1 * SPEED )).0
>       HelloValidityTime       $(( 25 * SPEED )).0
>       TcInterval              $TCINT.0
>       TcValidityTime          $(( 75 * SPEED )).0
>       MidInterval             $(( 5 * SPEED )).0
>       MidValidityTime         $(( 75 * SPEED )).0
>       HnaInterval             $(( 5 * SPEED )).0
>       HnaValidityTime         $(( 75 * SPEED )).0
>       $ff_ip4broad
>       $ff_lqmult
> }
> EOM
> fi
>
>
>   $DAEMON --daemon --writepid /var/run/openvpn.$VPN_IF.pid --config
> $CONFIG_DIR/$VPN_IF.conf --cd $CONFIG_DIR || echo -n " FAILED->"
>
>   echo -n " $VPN_IF"
> }
>
>
> stop_vpn () {
>  kill `cat /var/run/openvpn.$VPN_IF.pid` || true
>  rm /var/run/openvpn.$VPN_IF.pid
> }
>
> case "$1" in
> start)
>  echo -n "Starting openvpn:"
>
>     start_vpn
>
>  echo "."
>  ;;
>
> stop)
>  echo -n "Stopping openvpn:"
>
>   if test -e /var/run/openvpn.$VPN_IF.pid ; then
>     stop_vpn
>     echo -n " $VPN_IF"
>   else
>     echo -n " not running: $VPN_IF"
>   fi
>  echo "."
>  ;;
>
> restart)
>  $0 stop
>  sleep 1
>  $0 start
>  ;;
> *)
>  echo "Usage: $0 {start|stop|restart}" >&2
>  exit 1
>  ;;
> esac
>
> exit 0
> (spam-protected):~#
>
>
> Nach der Änderung:
>
>
> login as: root
> (spam-protected)'s password:
>
>
> BusyBox v1.01 (2010.08.29-10:07+0000) Built-in shell (ash)
> Enter 'help' for a list of built-in commands.
>
>  _______                     ________        __
>  (       ).-----.-----.-----.)  )  )  ).----.)  )
>  (   -   ))  _  )  -__)     ))  )  )  ))   _))   _)
>  (_______))   __)_____)__)__))________))__)  )____)
>         )__) F R E I F U N K  F I R M W A R E
>
> (spam-protected):~# cat /etc/init.d/S42openvpn
> #!/bin/sh -e
>
> DAEMON=/usr/sbin/openvpn
> CONFIG_DIR=/var/etc/openvpn
> VPN_IF=tap0
> test -x $DAEMON || exit 0
> test -d $CONFIG_DIR || mkdir $CONFIG_DIR
>
> start_vpn () {
>
> ff_openvpn_active="$(nvram get ff_openvpn_active)"
> ff_openvpn_host="$(nvram get ff_openvpn_host)"
> ff_openvpn_proto="$(nvram get ff_openvpn_proto)"
> ff_openvpn_port="$(nvram get ff_openvpn_port)"
> ff_openvpn_secret="$(nvram get ff_openvpn_secret)"
> ff_openvpn_ip="$(nvram get ff_openvpn_ip)"
> ff_openvpn_netmask="$(nvram get ff_openvpn_netmask)"
> ff_openvpn_noolsr="$(nvram get ff_openvpn_noolsr)"
>
> if [ ! "$ff_openvpn_active" = "1" ]; then
>  echo -n " OpenVPN not activated"
>  echo
>  exit 0
> fi
>
> test -z "$ff_openvpn_host" && exit 0
> test -z "$ff_openvpn_port" && exit 0
> test -z "$ff_openvpn_ip" && exit 0
> test -z "$ff_openvpn_netmask" && exit 0
>
> #create OpenVPN config
>
> cat>$CONFIG_DIR/$VPN_IF.conf<<EOM
> dev             $VPN_IF
> proto           $ff_openvpn_proto
> remote          $ff_openvpn_host
> port            $ff_openvpn_port
> ifconfig        $ff_openvpn_ip $ff_openvpn_netmask
> route-up        /etc/openvpn/openvpn-webif-route-up.sh
> up              /etc/openvpn/openvpn-webif-if-up.sh
> down            /etc/openvpn/openvpn-webif-if-down.sh
> up-restart
> comp-lzo
> script-security 2
> verb 3
> EOM
>
> if [ "$ff_openvpn_secret" = "1" ] && [ -f /etc/openvpn/$VPN_IF.secret ];
> then
> cat>>$CONFIG_DIR/$VPN_IF.conf<<EOM
> secret          /etc/openvpn/$VPN_IF.secret"
> auth            sha1
> cipher          none
> EOM
> fi
>
> #create OLSRd config
>
> if [ "$ff_openvpn_noolsr" = "1" ]; then
>  echo > /tmp/etc/local.olsrd.conf-openvpn
> else
>
> ff_ip4broad=$(nvram get ff_ip4broad)
>  test -n "$ff_ip4broad" && ff_ip4broad="Ip4Broadcast $(nvram get
> ff_ip4broad)"
>
> ff_openvpn_lq="$(nvram get ff_openvpn_lq)"
>  test -n "$ff_openvpn_lq" && ff_lqmult="LinkQualityMult default
> $ff_openvpn_lq"
>
> SPEED=$(nvram get ff_olsrspeed)
>  test -z "$SPEED" && SPEED=5
>
>  if [ "0" != "$(nvram get ff_fisheye)" ];then
>  TCINT=$(( 2 * SPEED / 3 ))
>  else
>  TCINT=$(( 2 * SPEED ))
>  fi
>
> cat>/tmp/etc/local.olsrd.conf-openvpn<<EOM
> # this file is automatically generated by openvpn-webif,
> # to define your own settings use /etc/local.olsrd.conf
> Interface "$VPN_IF"
> {
>       HelloInterval           $(( 1 * SPEED )).0
>       HelloValidityTime       $(( 25 * SPEED )).0
>       TcInterval              $TCINT.0
>       TcValidityTime          $(( 75 * SPEED )).0
>       MidInterval             $(( 5 * SPEED )).0
>       MidValidityTime         $(( 75 * SPEED )).0
>       HnaInterval             $(( 5 * SPEED )).0
>       HnaValidityTime         $(( 75 * SPEED )).0
>       $ff_ip4broad
>       $ff_lqmult
> }
> EOM
> fi
>
>
>   $DAEMON --daemon --writepid /var/run/openvpn.$VPN_IF.pid --config
> $CONFIG_DIR/$VPN_IF.conf --cd $CONFIG_DIR || echo -n " FAILED->"
>
>   echo -n " $VPN_IF"
> }
>
>
> stop_vpn () {
>  kill `cat /var/run/openvpn.$VPN_IF.pid` || true
>  rm /var/run/openvpn.$VPN_IF.pid
> }
>
> case "$1" in
> start)
>  echo -n "Starting openvpn:"
>
>     start_vpn
>
>  echo "."
>  ;;
>
> stop)
>  echo -n "Stopping openvpn:"
>
>   if test -e /var/run/openvpn.$VPN_IF.pid ; then
>     stop_vpn
>     echo -n " $VPN_IF"
>   else
>     echo -n " not running: $VPN_IF"
>   fi
>  echo "."
>  ;;
>
> restart)
>  $0 stop
>  sleep 1
>  $0 start
>  ;;
> *)
>  echo "Usage: $0 {start|stop|restart}" >&2
>  exit 1
>  ;;
> esac
>
> exit 0
> (spam-protected):~#
>
>
> Geändert:
>
> im Bereich
>
> #create OpenVPN config
>
> comp-lzo
> script-security 2
>
> hinzugefügt.
>
>
> Jan  1 00:00:07 (none) kern.info kernel: Universal TUN/TAP device driver
> 1.5 (C)1999-2002 Maxim Krasnyansky
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: OpenVPN 2.1.1
> mipsel-linux [LZO2] [EPOLL] built on Aug 29 2010
> Jan  1 00:00:13 (none) kern.warn openvpn[443]: NOTE: the current
> --script-security setting may allow this configuration to call
> user-defined scripts
> Jan  1 00:00:13 (none) kern.warn openvpn[443]: ******* WARNING *******:
> OpenVPN built without OpenSSL -- encryption and authentication features
> disabled -- all data will be tunnelled as cleartext
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: LZO compression
> initialized
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: TUN/TAP device tap0 opened
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: TUN/TAP TX queue length
> set to 100
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: /usr/sbin/ip link set dev
> tap0 up mtu 1500
> Jan  1 00:00:13 (none) kern.notice openvpn[443]: /usr/sbin/ip addr add dev
> tap0 78.41.112.211/24 broadcast 78.41.112.255
> Jan  1 00:00:13 (none) kern.notice openvpn[443]:
> /etc/openvpn/openvpn-webif-if-up.sh tap0 1500 1533 78.41.112.211
> 255.255.255.0 init
> Jan  1 00:00:14 (none) kern.notice openvpn[443]: Data Channel MTU parms [
> L:1533 D:1450 EF:1 EB:135 ET:32 EL:0 AF:14/1 ]
> Jan  1 00:00:14 (none) kern.notice openvpn[501]: Socket Buffers:
> R=[32767->65534] S=[32767->65534]
> Jan  1 00:00:14 (none) kern.notice openvpn[501]: UDPv4 link local (bound):
> [undef]:5012
> Jan  1 00:00:14 (none) kern.notice openvpn[501]: UDPv4 link remote:
> 78.41.115.228:5012
>
> Jan  1 00:00:22 (none) user.notice olsr/init: olsr/system: Starting
> olsrd...
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '1' (was 1) to
> /proc/sys/net/ipv4/ip_forward
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 0) to
> /proc/sys/net/ipv4/conf/all/send_redirects
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 0) to
> /proc/sys/net/ipv4/conf/eth1/send_redirects
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 1) to
> /proc/sys/net/ipv4/conf/eth1/rp_filter
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Adding interface eth1
> Dec 31 12:00:01 (none) kern.info olsrd[928]: New main address:
> 78.41.113.100
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 0) to
> /proc/sys/net/ipv4/conf/vlan1/send_redirects
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 1) to
> /proc/sys/net/ipv4/conf/vlan1/rp_filter
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Adding interface vlan1
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 0) to
> /proc/sys/net/ipv4/conf/tap0/send_redirects
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Writing '0' (was 1) to
> /proc/sys/net/ipv4/conf/tap0/rp_filter
> Dec 31 12:00:01 (none) kern.info olsrd[928]: Adding interface tap0
> Dec 31 12:00:01 (none) kern.info olsrd[928]: olsr.org -
> 0.6.1-git_da798d9-hash_d41d8cd98f00b204e9800998ecf8427e  - successfully
> started
>
> Dec 31 12:00:08 (none) kern.notice openvpn[501]: Peer Connection Initiated
> with 78.41.115.228:5012
> Dec 31 12:00:08 (none) kern.notice openvpn[501]: Initialization Sequence
> Completed
>
> Nachbarn:
> ...
> tap0    tunnel kryptavpn        0.00    1.000   1.000   1.000
>
>
>
> lg Petr
>
> --
> Wien mailing list
> (spam-protected)
> http://lists.funkfeuer.at/mailman/listinfo/wien
>
-------------- nächster Teil --------------
Ein Dateianhang mit HTML-Daten wurde abgetrennt...
URL: <http://lists.funkfeuer.at/pipermail/wien/attachments/20101202/baf612af/attachment.htm>


Mehr Informationen über die Mailingliste Wien