Gluon Konsolen Befehle

@Echo

Wie gestern Abend besprochen hier die kleine Liste von mir die ich des öfteren schon mal an Befehlen bei Gluon benötigt habe. (Vorwiegend zum Testen)

# SSID Anpassen
################
sed -i -e 's/KreisGT.freifunk.net/v15-KreisGT.freifunk.net/g' /etc/config/wireless 
wifi reload
#Nur zur Kontrolle
grep -i ssid /etc/config/wireless 

# Mesh auf 2,4 GHz deaktivieren (radio1 ist 5GHz)
################
uci set wireless.mesh_radio0.disabled=0
uci commit
wifi

# Autoupdater Branch Ändern
################
uci set autoupdater.settings.enabled='1'
uci set autoupdater.settings.branch='tng'
uci commit autoupdater

autoupdater -f 

# Geo Daten Ändern
###################
uci set gluon-node-info.@location[0]='location'
uci set gluon-node-info.@location[0].share_location='0'
uci set gluon-node-info.@location[0].latitude='59.00000000000'
uci set gluon-node-info.@location[0].longitude='8.00000000000'
uci commit gluon-node-info

# Site ändern
##############

uci get gluon-node-info.@location[0].siteselect
uci set gluon-node-info.@location[0].siteselect=rhw
gluon-reconfigure
reboot

# Config Mode
################
uci set gluon-setup-mode.@setup_mode[0].enabled=1
uci commit gluon-setup-mode
reboot

##Archer c7 v2 USB Power cycle
root@33378-a42bb0f43a87:~# echo 0 > /sys/class/gpio/gpio21/value
root@33378-a42bb0f43a87:~# echo 1 > /sys/class/gpio/gpio21/value

[Reformatted. -wusel]

1 „Gefällt mir“

Thx. Zum testen dann diese Schritte:

  1. Stable auf 841
  2. Mesh auf der 4040 deaktivieren
  3. Lan Kabel am 841 ziehen
  4. Branch auf tng auf dem 841
  5. Schauen das der 841 sich von der 4040 über KreisGT.freifunk.net ein neues Image zieht

Richtig?

Und den Netzwerkstecker am 841 ziehen

LAN-Kabel vom WAN-Port des 841 trennen, genau :slight_smile:

Wenn ich neu Flashe und im Config Modus eine public key hinterlege, wird dieser nach einem Neustart nicht akzeptiert. Nur wenn ich wieder im Config mode boote, kann ich mich per SSH einloggen.
Was mache ich falsch?

  • vom Config Mode in die Advance Mode umschalten
  • key hinterlegen
  • zurück zum Config Mode und Neustart

Äh, welche FW? Hatte ich noch nicht das Problem; hast Du auch unten auf ‘speichern’ geklickt? Sonst werden die Änderungen auf den Seiten ja nicht übernommen. Denn im Config-Mode kommst Du IIRC immer passwortlos rein?

Neueste Stable (1.0.1~6 ). Gespeichert habe ich da nach dem reboot im config mode der Key noch drin steht.
Im config mode wird mein Zertifikat nicht überprüft? Hmm. Das habe ich noch garnicht getestet. Dann stellt sich die Frage in welchem Format ich den Key dort eintrage.

Uh. Oh. Äh.

 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAtZG5GGiaTRDo6+ExYLq8UnFZYFVdTLaN7LthDplN/CxO5W1BOFvJxMpnJMXtV8WljTdBc+AETHv1cczNbGO3/yhNTbghvNeYMhEOoOOhBorLX34c7ep6B+fldoINElzX4iRa3DZ9sdauml9GfT2FEbZt/ao69uP/Ar1LtLEUMGs= FFGT

… tut. Ich glaube, fancy Krams wie ecdsa-sha2-nistp521 tut ggf. nicht, dunno, müßte man mal die dropbear-Version suchen und googlen :wink:
-kai

1 „Gefällt mir“

Teste ich gleich mal

doh :hushed: Jetzt läuft SSH. Keine Ahnung was ich als Key eingetragen hatte. War auf jeden Fall falsch.

Haben wir eine Erwartungshaltung wie lange es dauert bis sich der FF_Offline Knoten via KreisGT.freifunk.net ein Update zieht?

Ca. 3-4h, IIRC.

Aha. Darum aktualisiert sich der Knoten nicht.

root@33332-Buschkoettersweg-63-2dbc:~# uci get autoupdater.settings.branch
tng
root@33332-Buschkoettersweg-63-2dbc:~# uci get autoupdater.settings.enabled
1
root@33332-Buschkoettersweg-63-2dbc:~# autoupdater -f
autoupdater: error: unable to load branch configuration for branch 'tng'

Habe ich da einen Denkfehler?

Nein, eher leidest Du unter karpottem IPv6, wie auch die Müritzer Kollegen.

Sorry; to be fixed RSN …

Frohe Weihnachten
Eben wollte ich einen neuen Versuch starten. Was mich wundert ist das die 4040 den tng Branch findet (läuft auf TNG), der 841 hingegen nicht (läuft auf oldschool).

4040:

root@33332-Buschkoettersweg-63-a86c:~# uci get autoupdater.settings.branch
tng
root@33332-Buschkoettersweg-63-a86c:~# autoupdater
Retrieving manifest from http://firmware.ipv6.4830.org/tng/sysupgrade/tng.manifest ...
autoupdater: warning: error downloading manifest: Connection failed
autoupdater: error: no usable mirror found

841:

root@33332-Buschkoettersweg-63-2dbc:~# uci get autoupdater.settings.branch
tng
root@33332-Buschkoettersweg-63-2dbc:~# autoupdater
autoupdater: error: unable to load branch configuration for branch 'tng'

Da ist wohl noch etwas im Argen :frowning:

Danke für die Info (und Frohes Neues Jahr). Ich versuche mal morgen einen Testaufbau hier in Burgas, mal gucken …

Nach mehr als 24h habe ich mich auf den 841 über die Offline SSID Verbunden um einmal nachzuschauen.


Die Version war noch die 1.1.2. Also mal geschaut was bei autoupdater passiert.
Nach einiger Zeit der Reboot. Danach immer noch die 1.1.2.

Was soll ich noch testen? Meine 4040 kann von meinem Anschluss aus ein autoupdater ausführen uns sagt mir das keine neue Version da ist.

Heute habe ich es noch einmal versucht. Und schwups, als ich mich aufschalten wollte war es schon zu spät :slight_smile:
Hat also funktioniert.

Bei mir will der Knoten gerade noch nicht. Lag aber im ersten Fall scheinbar daran, das ich im Autoupdater eine Branch eingetragen habe, den er noch nicht kannte (tng).

Warte jetzt nochmal einen Tag ab.

Versuche per logread -f die Logs abzufangen und Lokal abzuspeichern. Aber wie es aussieht kommt vom Autoupdater nichts rein. Mal schauen was der Knoten moren sagt.

So, habe meinen Testknoten erwischt. Es liegt an der IPv6 Konfiguration. Er verbindet sich auf l2tp.Kreisgt.freifunk.net. (das ist ein Netz ihn Offloader direkt auf meinen 300e). Hier bekommt er aber keine V6 Adresse. Mein Handy aber schon. Also da hält es dann auf jeden Fall.

Fri May 15 16:19:06 2020 local0.info autoupdater-wifi-fallback: connectivity check failed
Fri May 15 16:19:06 2020 local0.info autoupdater-wifi-fallback: going to fallback mode
Fri May 15 16:19:06 2020 kern.info kernel: [72201.718875] IPv6: ADDRCONF(NETDEV_UP): tmp.mesh0: link is not ready
Fri May 15 16:19:07 2020 local0.info autoupdater-wifi-fallback: connect to radio0 l2tp.KreisGT.freifunk.net 1E:00:53:42:06:48
Fri May 15 16:19:07 2020 daemon.notice netifd: Interface ›mesh_radio0‹ is disabled
Fri May 15 16:19:07 2020 daemon.notice netifd: Interface ›mesh_radio0‹ has link connectivity loss
Fri May 15 16:19:08 2020 kern.info kernel: [72203.365529] device client0 left promiscuous mode
Fri May 15 16:19:08 2020 kern.info kernel: [72203.370558] br-client: port 4(client0) entered disabled state
Fri May 15 16:19:08 2020 kern.info kernel: [72203.668721] batman_adv: bat0: Interface deactivated: mesh0
Fri May 15 16:19:08 2020 kern.info kernel: [72203.674522] batman_adv: bat0: Removing interface: mesh0
Fri May 15 16:19:08 2020 daemon.notice netifd: Interface ›mesh_radio0‹ is now down
Fri May 15 16:19:08 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' failed: Try again Fri May 15 16:19:08 2020 daemon.notice hostapd: client0: interface state ENABLED->DISABLED Fri May 15 16:19:08 2020 daemon.notice hostapd: client0: AP-DISABLED Fri May 15 16:19:08 2020 daemon.notice hostapd: client0: CTRL-EVENT-TERMINATING Fri May 15 16:19:08 2020 daemon.notice hostapd: nl80211: deinit ifname=client0 disabled_11b_rates=0 Fri May 15 16:19:08 2020 daemon.notice hostapd: nl80211: Failed to remove interface client0 from bridge br-client: Invalid argument Fri May 15 16:19:09 2020 kern.info kernel: [72205.146867] IPv6: ADDRCONF(NETDEV_UP): fallback: link is not ready Fri May 15 16:19:10 2020 kern.info kernel: [72205.463146] fallback: authenticate with 1e:00:53:42:06:48 Fri May 15 16:19:10 2020 kern.info kernel: [72205.487018] fallback: send auth to 1e:00:53:42:06:48 (try 1/3) Fri May 15 16:19:10 2020 kern.info kernel: [72205.500749] fallback: authenticated Fri May 15 16:19:10 2020 kern.info kernel: [72205.526151] fallback: associate with 1e:00:53:42:06:48 (try 1/3) Fri May 15 16:19:10 2020 kern.info kernel: [72205.537762] fallback: RX AssocResp from 1e:00:53:42:06:48 (capab=0x421 status=0 aid=1) Fri May 15 16:19:10 2020 kern.info kernel: [72205.546716] fallback: associated Fri May 15 16:19:10 2020 kern.info kernel: [72205.550344] IPv6: ADDRCONF(NETDEV_CHANGE): fallback: link becomes ready Fri May 15 16:19:10 2020 daemon.notice netifd: radio0 (23062): fallback (phy #0): unknown event 46 Fri May 15 16:19:10 2020 daemon.notice netifd: radio0 (23062): cat: can't open '/var/run/wpa_supplicant-fallback.pid': No such file or directory Fri May 15 16:19:10 2020 daemon.notice netifd: radio0 (23062): WARNING (wireless_add_process): executable path /usr/sbin/wpa_supplicant does not match process path () Fri May 15 16:19:10 2020 daemon.notice netifd: radio0 (23062): Command failed: Invalid argument Fri May 15 16:19:10 2020 daemon.notice netifd: Network device 'fallback' link is up Fri May 15 16:19:10 2020 daemon.notice netifd: Interface 'fallback' is enabled Fri May 15 16:19:10 2020 daemon.notice netifd: Interface 'fallback' has link connectivity Fri May 15 16:19:10 2020 daemon.notice netifd: Interface 'fallback' is setting up now Fri May 15 16:19:10 2020 daemon.notice netifd: fallback (23205): udhcpc: started, v1.25.1 Fri May 15 16:19:10 2020 daemon.notice netifd: fallback (23205): udhcpc: sending discover Fri May 15 16:19:11 2020 daemon.notice netifd: fallback (23205): udhcpc: sending select for 10.234.148.189 Fri May 15 16:19:11 2020 daemon.notice netifd: fallback (23205): udhcpc: lease of 10.234.148.189 obtained, lease time 3600 Fri May 15 16:19:11 2020 daemon.notice netifd: Interface 'fallback6' is enabled Fri May 15 16:19:11 2020 daemon.notice netifd: Network alias 'fallback' link is up Fri May 15 16:19:12 2020 daemon.notice netifd: Interface 'fallback6' has link connectivity Fri May 15 16:19:12 2020 daemon.notice netifd: Interface 'fallback6' is setting up now Fri May 15 16:19:12 2020 daemon.notice netifd: Interface 'fallback' is now up Fri May 15 16:19:12 2020 daemon.info dnsmasq[12365]: reading /tmp/resolv.conf.auto Fri May 15 16:19:12 2020 daemon.info dnsmasq[12365]: using local addresses only for domain lan Fri May 15 16:19:12 2020 daemon.info dnsmasq[12365]: using nameserver 10.234.144.11#53 Fri May 15 16:19:21 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org’ for peer <mesh_vpn_backbone_peer_gw10x>…
Fri May 15 16:19:21 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... Fri May 15 16:19:26 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org’ failed: Try again
Fri May 15 16:19:26 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' failed: Try again Fri May 15 16:19:33 2020 local0.info autoupdater-wifi-fallback: execute the autoupdater Fri May 15 16:19:40 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org’ for peer <mesh_vpn_backbone_peer_gw10x>…
Fri May 15 16:19:42 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... Fri May 15 16:19:45 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org’ failed: Try again
Fri May 15 16:19:47 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' failed: Try again Fri May 15 16:20:00 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org’ for peer <mesh_vpn_backbone_peer_gw10x>…
Fri May 15 16:20:02 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... Fri May 15 16:20:05 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org’ failed: Try again
Fri May 15 16:20:07 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' failed: Try again Fri May 15 16:20:19 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org’ for peer <mesh_vpn_backbone_peer_gw10x>…
Fri May 15 16:20:22 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... .... .... ... Fri May 15 16:23:46 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:23:49 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org' failed: Try again Fri May 15 16:23:51 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:24:03 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:24:08 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:24:08 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org' failed: Try again Fri May 15 16:24:13 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:24:24 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:24:26 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:24:29 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org' failed: Try again Fri May 15 16:24:31 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:24:34 2020 local0.info autoupdater-wifi-fallback: going back to standard mode
Fri May 15 16:24:34 2020 daemon.notice netifd: Interface ›bat0‹ is now down
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›local_node‹ is now down
Fri May 15 16:24:35 2020 daemon.warn dnsmasq[12365]: no servers found in /tmp/resolv.conf.auto, will retry
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›loopback‹ is now down
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›loopback‹ is disabled
Fri May 15 16:24:35 2020 daemon.notice netifd: Network device ›lo‹ link is down
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›loopback‹ has link connectivity loss
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›client‹ is now down
Fri May 15 16:24:35 2020 kern.info kernel: [72531.023829] br-client: port 3(bat0) entered disabled state
Fri May 15 16:24:35 2020 kern.info kernel: [72531.029665] br-client: port 2(local-port) entered disabled state
Fri May 15 16:24:35 2020 kern.info kernel: [72531.035945] br-client: port 1(eth0) entered disabled state
Fri May 15 16:24:35 2020 kern.info kernel: [72531.084756] batman_adv: bat0: Interface deactivated: mesh-vpn
Fri May 15 16:24:35 2020 kern.info kernel: [72531.090793] batman_adv: bat0: Removing interface: mesh-vpn
Fri May 15 16:24:35 2020 kern.info kernel: [72531.176577] batman_adv: bat0: Interface deactivated: primary0
Fri May 15 16:24:35 2020 kern.info kernel: [72531.182538] batman_adv: bat0: Removing interface: primary0
Fri May 15 16:24:35 2020 kern.info kernel: [72531.236382] device bat0 left promiscuous mode
Fri May 15 16:24:35 2020 kern.info kernel: [72531.240929] br-client: port 3(bat0) entered disabled state
Fri May 15 16:24:35 2020 daemon.notice netifd: Interface ›bat0‹ is disabled
Fri May 15 16:24:35 2020 kern.info kernel: [72531.345614] device eth0 left promiscuous mode
Fri May 15 16:24:35 2020 kern.info kernel: [72531.350355] br-client: port 1(eth0) entered disabled state
Fri May 15 16:24:36 2020 kern.info kernel: [72531.407955] eth0: link down
Fri May 15 16:24:36 2020 kern.info kernel: [72531.442400] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Fri May 15 16:24:36 2020 kern.info kernel: [72531.466304] device local-port left promiscuous mode
Fri May 15 16:24:36 2020 kern.info kernel: [72531.471525] br-client: port 2(local-port) entered disabled state
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›local_node‹ is disabled
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›client‹ is disabled
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›gluon_bat0‹ is now down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›mesh_vpn‹ is now down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›mesh_vpn‹ is disabled
Fri May 15 16:24:36 2020 daemon.notice netifd: Network device ›bat0‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›bat0‹ has link connectivity loss
Fri May 15 16:24:36 2020 daemon.notice netifd: fallback (23205): udhcpc: received SIGTERM
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›fallback‹ is now down
Fri May 15 16:24:36 2020 daemon.notice netifd: Network device ›local-port‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›fallback6‹ is now down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›fallback6‹ is disabled
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›fallback‹ is disabled
Fri May 15 16:24:36 2020 daemon.notice netifd: Network alias ›‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›fallback6‹ has link connectivity loss
Fri May 15 16:24:36 2020 daemon.notice netifd: Network device ›eth0‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: bridge ›br-client‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›client‹ has link connectivity loss
Fri May 15 16:24:36 2020 daemon.notice netifd: Network device ›mesh-vpn‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›mesh_vpn‹ has link connectivity loss
Fri May 15 16:24:36 2020 daemon.notice netifd: veth ›local-node‹ link is down
Fri May 15 16:24:36 2020 daemon.notice netifd: Interface ›local_node‹ has link connectivity loss
Fri May 15 16:24:36 2020 kern.info kernel: [72531.839918] device eth1 left promiscuous mode
Fri May 15 16:24:36 2020 kern.info kernel: [72531.844504] br-wan: port 1(eth1) entered disabled state
Fri May 15 16:24:36 2020 kern.info kernel: [72531.926349] fallback: deauthenticating from 1e:00:53:42:06:48 by local choice (Reason: 3=DEAUTH_LEAVING)
Fri May 15 16:24:37 2020 kern.info kernel: [72532.377156] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Fri May 15 16:24:37 2020 daemon.notice netifd: Interface ›wan6‹ is disabled
Fri May 15 16:24:37 2020 daemon.notice netifd: Interface ›wan‹ is disabled
Fri May 15 16:24:37 2020 daemon.notice netifd: Network device ›fallback‹ link is down
Fri May 15 16:24:37 2020 daemon.notice netifd: Interface ›fallback‹ has link connectivity loss
Fri May 15 16:24:39 2020 user.notice : Added device handler type: 8021ad
Fri May 15 16:24:39 2020 user.notice : Added device handler type: 8021q
Fri May 15 16:24:39 2020 user.notice : Added device handler type: macvlan
Fri May 15 16:24:39 2020 user.notice : Added device handler type: veth
Fri May 15 16:24:39 2020 user.notice : Added device handler type: bridge
Fri May 15 16:24:39 2020 user.notice : Added device handler type: Network device
Fri May 15 16:24:39 2020 user.notice : Added device handler type: tunnel
Fri May 15 16:24:39 2020 daemon.info dnsmasq[12365]: exiting on receipt of SIGTERM
Fri May 15 16:24:39 2020 daemon.info dnsmasq[24014]: started, version 2.78 cachesize 150
Fri May 15 16:24:39 2020 daemon.info dnsmasq[24014]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-a$
Fri May 15 16:24:39 2020 daemon.info dnsmasq[24014]: using local addresses only for domain lan
Fri May 15 16:24:39 2020 daemon.warn dnsmasq[24014]: no servers found in /tmp/resolv.conf.auto, will retry
Fri May 15 16:24:39 2020 daemon.info dnsmasq[24014]: read /etc/hosts - 4 addresses
Fri May 15 16:24:39 2020 daemon.info dnsmasq[24014]: read /tmp/hosts/dhcp.cfg02411c - 0 addresses
Fri May 15 16:24:41 2020 daemon.warn netifd: You have delegated IPv6-prefixes but haven’t assigned them to any interface. Did you forget to set option ip6assign on you$
Fri May 15 16:24:41 2020 kern.info kernel: [72537.214082] device eth0 entered promiscuous mode
Fri May 15 16:24:41 2020 kern.info kernel: [72537.249341] IPv6: ADDRCONF(NETDEV_UP): br-client: link is not ready
Fri May 15 16:24:41 2020 user.notice sysctl: net.ipv6.conf.br-client.forwarding = 0
Fri May 15 16:24:41 2020 daemon.notice netifd: Interface ›client‹ is enabled
Fri May 15 16:24:41 2020 kern.info kernel: [72537.354093] device eth1 entered promiscuous mode
Fri May 15 16:24:42 2020 kern.info kernel: [72537.383994] IPv6: ADDRCONF(NETDEV_UP): br-wan: link is not ready
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›wan6‹ is enabled
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›wan‹ is enabled
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›local_node‹ is enabled
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›local_node‹ is setting up now
Fri May 15 16:24:42 2020 kern.info kernel: [72537.507159] IPv6: ADDRCONF(NETDEV_UP): local-node: link is not ready
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›local_node‹ is now up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›gluon_bat0‹ is setting up now
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›loopback‹ is enabled
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›loopback‹ is setting up now
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›loopback‹ is now up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›mesh_vpn‹ is enabled
Fri May 15 16:24:42 2020 kern.info kernel: [72537.626365] IPv6: ADDRCONF(NETDEV_CHANGE): local-node: link becomes ready
Fri May 15 16:24:42 2020 kern.info kernel: [72537.722876] device local-port entered promiscuous mode
Fri May 15 16:24:42 2020 kern.info kernel: [72537.773595] br-client: port 2(local-port) entered forwarding state
Fri May 15 16:24:42 2020 kern.info kernel: [72537.782248] IPv6: ADDRCONF(NETDEV_CHANGE): br-client: link becomes ready
Fri May 15 16:24:42 2020 daemon.notice netifd: bridge ›br-client‹ link is up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›client‹ has link connectivity
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›client‹ is setting up now
Fri May 15 16:24:42 2020 daemon.notice netifd: Network device ›local-port‹ link is up
Fri May 15 16:24:42 2020 daemon.notice netifd: veth ›local-node‹ link is up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›local_node‹ has link connectivity
Fri May 15 16:24:42 2020 daemon.notice netifd: Network device ›lo‹ link is up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›loopback‹ has link connectivity
Fri May 15 16:24:42 2020 daemon.notice netifd: Network device ›mesh-vpn‹ link is up
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›mesh_vpn‹ has link connectivity
Fri May 15 16:24:42 2020 daemon.notice netifd: Interface ›mesh_vpn‹ is setting up now
Fri May 15 16:24:43 2020 kern.info kernel: [72538.868362] eth0: link up (1000Mbps/Full duplex)
Fri May 15 16:24:43 2020 kern.info kernel: [72538.873215] br-client: port 1(eth0) entered forwarding state
Fri May 15 16:24:43 2020 kern.info kernel: [72538.879163] br-client: port 1(eth0) entered forwarding state
Fri May 15 16:24:43 2020 daemon.notice netifd: Network device ›eth0‹ link is up
Fri May 15 16:24:43 2020 kern.info kernel: [72538.957991] batman_adv: bat0: Adding interface: primary0
Fri May 15 16:24:43 2020 kern.info kernel: [72538.963523] batman_adv: bat0: Interface activated: primary0
Fri May 15 16:24:43 2020 kern.info kernel: [72538.982336] device bat0 entered promiscuous mode
Fri May 15 16:24:43 2020 kern.info kernel: [72538.987552] br-client: port 3(bat0) entered forwarding state
Fri May 15 16:24:43 2020 kern.info kernel: [72538.993436] br-client: port 3(bat0) entered forwarding state
Fri May 15 16:24:43 2020 daemon.notice netifd: Network device ›bat0‹ link is up
Fri May 15 16:24:43 2020 daemon.notice netifd: Interface ›bat0‹ has link connectivity
Fri May 15 16:24:43 2020 daemon.notice netifd: Interface ›bat0‹ is setting up now
Fri May 15 16:24:43 2020 daemon.notice netifd: Interface ›bat0‹ is now up
Fri May 15 16:24:43 2020 daemon.notice netifd: Interface ›mesh_vpn‹ is now up
Fri May 15 16:24:43 2020 kern.info kernel: [72539.240034] batman_adv: bat0: Interface deactivated: primary0
Fri May 15 16:24:44 2020 kern.info kernel: [72539.388210] IPv6: ADDRCONF(NETDEV_UP): primary0: link is not ready
Fri May 15 16:24:44 2020 kern.info kernel: [72539.447586] batman_adv: bat0: Interface activated: primary0
Fri May 15 16:24:44 2020 daemon.notice netifd: Interface ›gluon_bat0‹ is now up
Fri May 15 16:24:44 2020 daemon.notice netifd: Network device ›primary0‹ link is up
Fri May 15 16:24:44 2020 user.notice firewall: Reloading firewall due to ifup of local_node (local-node)
Fri May 15 16:24:44 2020 kern.info kernel: [72539.766158] br-client: port 2(local-port) entered forwarding state
Fri May 15 16:24:44 2020 kern.info kernel: [72539.786549] batman_adv: bat0: Adding interface: mesh-vpn
Fri May 15 16:24:44 2020 kern.info kernel: [72539.792070] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1426) to handle the transport of batman-adv pac$
Fri May 15 16:24:44 2020 kern.info kernel: [72539.817155] batman_adv: bat0: Interface activated: mesh-vpn
Fri May 15 16:24:44 2020 user.notice sysctl: net.ipv6.conf.local-node.forwarding = 0
Fri May 15 16:24:45 2020 kern.info kernel: [72540.876152] br-client: port 1(eth0) entered forwarding state
Fri May 15 16:24:45 2020 kern.info kernel: [72540.986151] br-client: port 3(bat0) entered forwarding state
Fri May 15 16:24:46 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Fri May 15 16:24:46 2020 kern.info kernel: [72541.633891] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
Fri May 15 16:24:46 2020 kern.info kernel: [72541.781003] device client0 entered promiscuous mode
Fri May 15 16:24:46 2020 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri May 15 16:24:46 2020 daemon.err hostapd: Using interface client0 with hwaddr 62:bc:87:8e:e9:08 and ssid »KreisGT.freifunk.net«
Fri May 15 16:24:46 2020 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
Fri May 15 16:24:46 2020 daemon.notice hostapd: client0: AP-ENABLED
Fri May 15 16:24:46 2020 kern.info kernel: [72541.934203] batman_adv: bat0: Changing gw mode from: off to: client
Fri May 15 16:24:46 2020 kern.info kernel: [72541.941219] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
Fri May 15 16:24:46 2020 kern.info kernel: [72541.948258] br-client: port 4(client0) entered forwarding state
Fri May 15 16:24:46 2020 kern.info kernel: [72541.954487] br-client: port 4(client0) entered forwarding state
Fri May 15 16:24:46 2020 kern.info kernel: [72541.994451] batman_adv: bat0: hop_penalty: Changing from: 30 to: 15
Fri May 15 16:24:46 2020 kern.info kernel: [72542.034616] batman_adv: bat0: orig_interval: Changing from: 1000 to: 5000
Fri May 15 16:24:46 2020 kern.info kernel: [72542.253892] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
Fri May 15 16:24:47 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:24:47 2020 kern.info kernel: [72542.459902] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready Fri May 15 16:24:47 2020 daemon.notice netifd: Network device 'mesh0' link is up Fri May 15 16:24:47 2020 daemon.notice netifd: Interface 'mesh_radio0' is enabled Fri May 15 16:24:47 2020 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity Fri May 15 16:24:47 2020 daemon.notice netifd: Interface 'mesh_radio0' is setting up now Fri May 15 16:24:47 2020 daemon.notice netifd: Network device 'client0' link is up Fri May 15 16:24:48 2020 daemon.notice netifd: mesh_radio0 (24623): ip: SIOCSIFMTU: No such device Fri May 15 16:24:48 2020 daemon.notice netifd: Interface 'mesh_radio0' is now up Fri May 15 16:24:48 2020 kern.info kernel: [72543.947059] br-client: port 4(client0) entered forwarding state Fri May 15 16:24:48 2020 user.notice firewall: Reloading firewall due to ifup of mesh_vpn (mesh-vpn) Fri May 15 16:24:48 2020 kern.info kernel: [72544.150747] batman_adv: bat0: Adding interface: mesh0 Fri May 15 16:24:48 2020 kern.info kernel: [72544.156145] batman_adv: bat0: Interface activated: mesh0 Fri May 15 16:24:48 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24014]: exiting on receipt of SIGTERM
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24752]: started, version 2.78 cachesize 150
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24752]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-a$
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24752]: using local addresses only for domain lan
Fri May 15 16:24:49 2020 daemon.warn dnsmasq[24752]: no servers found in /tmp/resolv.conf.auto, will retry
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24752]: read /etc/hosts - 4 addresses
Fri May 15 16:24:49 2020 daemon.info dnsmasq[24752]: read /tmp/hosts/dhcp.cfg02411c - 0 addresses
Fri May 15 16:24:50 2020 daemon.notice netifd: Interface ›client‹ is now up
Fri May 15 16:24:50 2020 user.notice firewall: Reloading firewall due to ifup of mesh_radio0 (mesh0)
Fri May 15 16:24:51 2020 user.notice firewall: Reloading firewall due to ifup of client (br-client)
Fri May 15 16:24:52 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org' failed: Try again Fri May 15 16:24:53 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:25:05 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:25:10 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org’ failed: Try again
Fri May 15 16:25:11 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... Fri May 15 16:25:16 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:25:27 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:25:30 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:25:32 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org' failed: Try again Fri May 15 16:25:35 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:25:46 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:25:47 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:25:51 2020 daemon.info fastd[1844]: resolving host gw10b.4830.org' failed: Try again Fri May 15 16:25:52 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:26:05 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org' for peer <mesh_vpn_backbone_peer_gw10x>... Fri May 15 16:26:06 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ for peer <mesh_vpn_backbone_peer_gw11>…
Fri May 15 16:26:10 2020 daemon.info fastd[1844]: resolving host gw10c.4830.org' failed: Try again Fri May 15 16:26:11 2020 daemon.info fastd[1844]: resolving host gw11.4830.org’ failed: Try again
Fri May 15 16:26:24 2020 daemon.info fastd[1844]: resolving host gw11.4830.org' for peer <mesh_vpn_backbone_peer_gw11>... Fri May 15 16:26:25 2020 daemon.info fastd[1844]: resolving host gw10a.4830.org’ for peer <mesh_vpn_backbone_peer_gw10x>…

Also der Fallback arbeitet, aber das v6 Interface will aus welchen Grund auch immer nicht. Der Knoten ist frisch aufgesetzt worden mit der aktuellen Stable Firmware.

OS: 17.01-SNAPSHOT, r3981+104-184fe1 FW: 1.0.1~6
HW: TP-Link TL-WR841N/ND v9

Eigentlich soll er auf rawhide Updaten.

root@33378-TH-Test-w841:~# autoupdater -f
Retrieving manifest from http://firmware.ipv6.4830.org/rawhide/sysupgrade/rawhide.manifest

Jemand eine Idee wo es haken könnte? Interessant ist ja, das es bei mir auch mal funktioniert hat vor längerer Zeit. Also irgendwo scheint dort ein Haken drin zu sein.

@wusel kannst du den obersten Teil mit den Gluon Konsolen Befehlen und den rest mit autoupdater fallback trennen?