Ok. Habe ich gemacht und funktionierte auch … 17194-Joy-IT-11b4
Ein großes Problem mit der Firmware (1.5.0~69 / gluon-v2022.1.2+) habe ich aber doch noch.
Die Knoten sind im Netzt sichtbar (Karte + SSH) können den Clients aber kein vernünftiges WLAN bieten. Entweder die Clients bekommen keine Verbindung oder wenn, dann haben sie „keinen Internetzugriff“.
Android meldet: IP-Adresse konnte nicht abgerufen werden.
Vielleicht findest Du dazu im Log etwas …
BusyBox v1.35.0 (2023-02-04 12:42:09 UTC) built-in shell (ash)
_/_/_/_/ _/ _/_/ _/
_/ _/ _/_/ _/_/ _/ _/ _/ _/_/_/ _/ _/
_/_/_/ _/_/ _/_/_/_/ _/ _/_/_/_/ _/ _/ _/ _/ _/_/
_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/
_/ _/ _/_/_/ _/ _/ _/_/_/ _/ _/ _/ _/
Freifunk-Firmware für den Kreis Gütersloh, Bielefeld, die Müritz-Region
und die Feldberger Seenlandschaft
Info/Kontakt: https://freifunk-kreisgt.de | https://mueritz.freifunk.net
https://freifunk-bielefeld.de | https://freifunk-feldberg.de
Tools:
- autoupdater -f (Firmware-Update erzwingen)
- batctl gwl (Informationen zu batman-adv-Gateways anzeigen)
- batctl o | wc -l (Anzahl 'orginators' (Knoten) im Netz anzeigen)
- batctl tg | wc -l (Anzahl aller Geräte im Netz anzeigen)
OS: 22.03-SNAPSHOT, r20044+10-ddeeb3 FW: 1.5.0~69
HW: TP-Link Archer C7 v2
root@17194-schattiger-Platz:~# logread ... Mist - zu lang!
Jetzt ab Aktivierung der Netzwerkkarte …
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 21.465772] ath10k_pci 0000:00:00.0: enabling device (0000 -> 0002)
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 21.472346] ath10k_pci 0000:00:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 25.038223] ath10k_pci 0000:00:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 25.047617] ath10k_pci 0000:00:00.0: kconfig debug 1 debugfs 1 tracing 0 dfs 1 testmode 0
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 25.060313] ath10k_pci 0000:00:00.0: firmware ver 10.2.4-1.0-00047 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 35bd9258
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 25.779923] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 26.993511] ath10k_pci 0000:00:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal nvmem max-sta 128 raw 0 hwcrypto 1
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127481] ath: EEPROM regdomain: 0x0
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127491] ath: EEPROM indicates default country code should be used
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127496] ath: doing EEPROM country->regdmn map search
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127508] ath: country maps to regdmn code: 0x3a
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127514] ath: Country alpha2 being used: US
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.127519] ath: Regpair used: 0x3a
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 27.297004] batman_adv: B.A.T.M.A.N. advanced 2022.0-openwrt-7 (compatibility version 15) loaded
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329328] ath: EEPROM regdomain: 0x0
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329339] ath: EEPROM indicates default country code should be used
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329344] ath: doing EEPROM country->regdmn map search
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329357] ath: country maps to regdmn code: 0x3a
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329363] ath: Country alpha2 being used: US
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.329367] ath: Regpair used: 0x3a
Thu Feb 23 22:28:27 2023 kern.debug kernel: [ 27.346277] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Thu Feb 23 22:28:27 2023 kern.info kernel: [ 27.348016] ieee80211 phy1: Atheros AR9550 Rev:0 mem=0xb8100000, irq=12
Thu Feb 23 22:28:27 2023 user.info kernel: [ 27.360121] kmodloader: done loading kernel modules from /etc/modules.d/*
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: started, version 2.86 cachesize 150
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Thu Feb 23 22:28:29 2023 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Thu Feb 23 22:28:29 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Thu Feb 23 22:28:29 2023 authpriv.info dropbear[1541]: Not backgrounding
Thu Feb 23 22:28:35 2023 daemon.err gluon-arp-limiter[1825]: Error - interface bat0 is not present or not a batman-adv interface
Thu Feb 23 22:28:36 2023 daemon.err gluon-arp-limiter[1825]: Error - interface bat0 is not present or not a batman-adv interface
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: bonding
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: 8021ad
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: 8021q
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: macvlan
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: veth
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: bridge
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: Network device
Thu Feb 23 22:28:37 2023 user.notice : Added device handler type: tunnel
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.018416] eth1: link up (1000Mbps/Full duplex)
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.023127] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.033968] br-client: port 1(eth1.1) entered blocking state
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.039766] br-client: port 1(eth1.1) entered disabled state
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.045762] device eth1.1 entered promiscuous mode
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.050662] device eth1 entered promiscuous mode
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.113578] br-client: port 1(eth1.1) entered blocking state
Thu Feb 23 22:28:42 2023 kern.info kernel: [ 45.119372] br-client: port 1(eth1.1) entered forwarding state
Thu Feb 23 22:28:42 2023 daemon.notice netifd: Interface 'client' is enabled
Thu Feb 23 22:28:42 2023 user.notice sysctl: net.ipv6.conf.br-client.forwarding = 0
Thu Feb 23 22:28:42 2023 daemon.notice netifd: bridge 'br-client' link is up
Thu Feb 23 22:28:42 2023 daemon.notice netifd: Interface 'client' has link connectivity
Thu Feb 23 22:28:42 2023 daemon.notice netifd: Interface 'client' is setting up now
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 45.951472] eth0: link up (1000Mbps/Full duplex)
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 45.956449] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 45.984600] br-wan: port 1(eth0.2) entered blocking state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 45.990213] br-wan: port 1(eth0.2) entered disabled state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.026995] device eth0.2 entered promiscuous mode
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.031866] device eth0 entered promiscuous mode
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.056591] IPv6: ADDRCONF(NETDEV_CHANGE): br-client: link becomes ready
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.100284] br-wan: port 1(eth0.2) entered blocking state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.105771] br-wan: port 1(eth0.2) entered forwarding state
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan' is enabled
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan6' is enabled
Thu Feb 23 22:28:43 2023 daemon.notice netifd: bridge 'br-wan' link is up
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan' has link connectivity
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan' is setting up now
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan6' has link connectivity
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'wan6' is setting up now
Thu Feb 23 22:28:43 2023 daemon.notice netifd: VLAN 'eth1.1' link is up
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'local_node' is enabled
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'local_node' is setting up now
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'local_node' is now up
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'gluon_bat0' is setting up now
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'loopback' is enabled
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'loopback' is setting up now
Thu Feb 23 22:28:43 2023 daemon.notice netifd: Interface 'loopback' is now up
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.365605] IPv6: ADDRCONF(NETDEV_CHANGE): local-node: link becomes ready
Thu Feb 23 22:28:43 2023 daemon.err odhcp6c[2211]: Failed to send RS (Address not available)
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.438084] br-client: port 2(local-port) entered blocking state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.444192] br-client: port 2(local-port) entered disabled state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.663654] device local-port entered promiscuous mode
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.669126] br-client: port 2(local-port) entered blocking state
Thu Feb 23 22:28:43 2023 kern.info kernel: [ 46.675227] br-client: port 2(local-port) entered forwarding state
Thu Feb 23 22:28:43 2023 daemon.err odhcp6c[2211]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Network device 'eth1' link is up
Thu Feb 23 22:28:44 2023 kern.info kernel: [ 47.066357] IPv6: ADDRCONF(NETDEV_CHANGE): br-wan: link becomes ready
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Network device 'eth0' link is up
Thu Feb 23 22:28:44 2023 daemon.notice netifd: VLAN 'eth0.2' link is up
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Network device 'local-port' link is up
Thu Feb 23 22:28:44 2023 daemon.notice netifd: veth 'local-node' link is up
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Interface 'local_node' has link connectivity
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Network device 'lo' link is up
Thu Feb 23 22:28:44 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
Thu Feb 23 22:28:44 2023 daemon.notice netifd: wan (2270): udhcpc: started, v1.35.0
Thu Feb 23 22:28:44 2023 daemon.err odhcp6c[2272]: Failed to send RS (Address not available)
Thu Feb 23 22:28:44 2023 daemon.err odhcp6c[2211]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
Thu Feb 23 22:28:44 2023 daemon.err odhcp6c[2272]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
Thu Feb 23 22:28:46 2023 user.notice sysctl: net.ipv6.conf.local-node.forwarding = 0
Thu Feb 23 22:28:46 2023 daemon.notice netifd: wan (2270): udhcpc: broadcasting discover
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 49.955650] 8021q: adding VLAN 0 to HW filter on device bat0
Thu Feb 23 22:28:47 2023 daemon.notice netifd: Interface 'bat0' is enabled
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 49.995958] br-client: port 3(bat0) entered blocking state
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.001577] br-client: port 3(bat0) entered disabled state
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.007428] device bat0 entered promiscuous mode
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.012222] br-client: port 3(bat0) entered blocking state
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.017830] br-client: port 3(bat0) entered forwarding state
Thu Feb 23 22:28:47 2023 daemon.notice netifd: Network device 'bat0' link is up
Thu Feb 23 22:28:47 2023 daemon.notice netifd: Interface 'bat0' has link connectivity
Thu Feb 23 22:28:47 2023 daemon.notice netifd: Interface 'bat0' is setting up now
Thu Feb 23 22:28:47 2023 daemon.notice netifd: Interface 'bat0' is now up
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.456272] batman_adv: bat0: No IGMP Querier present - multicast optimizations disabled
Thu Feb 23 22:28:47 2023 kern.info kernel: [ 50.464486] batman_adv: bat0: No MLD Querier present - multicast optimizations disabled
Thu Feb 23 22:28:47 2023 user.notice firewall: Reloading firewall due to ifup of local_node (local-node)
Thu Feb 23 22:28:49 2023 daemon.notice netifd: wan (2270): udhcpc: broadcasting discover
Thu Feb 23 22:28:49 2023 daemon.err odhcp6c[2211]: Failed to send SOLICIT message to ff02::1:2 (Operation not permitted)
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394882] ath: EEPROM regdomain: 0x8114
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394893] ath: EEPROM indicates we should expect a country code
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394899] ath: doing EEPROM country->regdmn map search
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394905] ath: country maps to regdmn code: 0x37
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394911] ath: Country alpha2 being used: DE
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394916] ath: Regpair used: 0x37
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.394922] ath: regdomain 0x8114 dynamically updated by user
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395005] ath: EEPROM regdomain: 0x8114
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395009] ath: EEPROM indicates we should expect a country code
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395014] ath: doing EEPROM country->regdmn map search
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395019] ath: country maps to regdmn code: 0x37
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395023] ath: Country alpha2 being used: DE
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395028] ath: Regpair used: 0x37
Thu Feb 23 22:28:50 2023 kern.debug kernel: [ 53.395033] ath: regdomain 0x8114 dynamically updated by user
Thu Feb 23 22:28:51 2023 kern.info kernel: [ 53.960920] batman_adv: bat0: Adding interface: primary0
Thu Feb 23 22:28:51 2023 kern.info kernel: [ 53.966363] batman_adv: bat0: Interface activated: primary0
Thu Feb 23 22:28:51 2023 kern.info kernel: [ 54.208646] batman_adv: bat0: Interface deactivated: primary0
Thu Feb 23 22:28:51 2023 kern.info kernel: [ 54.260052] batman_adv: bat0: Interface activated: primary0
Thu Feb 23 22:28:51 2023 daemon.notice netifd: Interface 'gluon_bat0' is now up
Thu Feb 23 22:28:51 2023 daemon.notice netifd: Network device 'primary0' link is up
Thu Feb 23 22:28:52 2023 kern.info kernel: [ 55.066292] batman_adv: bat0: IGMP Querier appeared
Thu Feb 23 22:28:52 2023 kern.info kernel: [ 55.071251] batman_adv: bat0: MLD Querier appeared
Thu Feb 23 22:28:52 2023 daemon.notice netifd: wan (2270): udhcpc: broadcasting discover
Thu Feb 23 22:28:53 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy client1) --> new PHY
Thu Feb 23 22:28:53 2023 daemon.info dnsmasq[2957]: started, version 2.86 cachesize 150
Thu Feb 23 22:28:53 2023 daemon.info dnsmasq[2957]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb 23 22:28:53 2023 daemon.warn dnsmasq[2957]: no servers found in /var/gluon/wan-dnsmasq/resolv.conf, will retry
Thu Feb 23 22:28:53 2023 daemon.info dnsmasq[2957]: cleared cache
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.022375] br-client: port 4(client1) entered blocking state
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.028253] br-client: port 4(client1) entered disabled state
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.034389] device client1 entered promiscuous mode
Thu Feb 23 22:28:54 2023 daemon.notice hostapd: client1: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.170080] IPv6: ADDRCONF(NETDEV_CHANGE): client1: link becomes ready
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.176923] br-client: port 4(client1) entered blocking state
Thu Feb 23 22:28:54 2023 kern.info kernel: [ 57.182760] br-client: port 4(client1) entered forwarding state
Thu Feb 23 22:28:54 2023 daemon.notice procd: /etc/rc.d/S90tunneldigger: Not starting tunneldigger - missing uuid
Thu Feb 23 22:28:54 2023 daemon.notice hostapd: client1: interface state COUNTRY_UPDATE->ENABLED
Thu Feb 23 22:28:54 2023 daemon.notice hostapd: client1: AP-ENABLED
Thu Feb 23 22:28:54 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy client0) --> new PHY
Thu Feb 23 22:28:56 2023 kern.warn kernel: [ 59.686852] ath10k_pci 0000:00:00.0: pdev param 0 not supported by firmware
Thu Feb 23 22:28:56 2023 kern.info kernel: [ 59.730900] br-client: port 5(client0) entered blocking state
Thu Feb 23 22:28:56 2023 kern.info kernel: [ 59.736798] br-client: port 5(client0) entered disabled state
Thu Feb 23 22:28:56 2023 kern.info kernel: [ 59.742934] device client0 entered promiscuous mode
Thu Feb 23 22:28:56 2023 daemon.notice netifd: Interface 'client' is now up
Thu Feb 23 22:28:56 2023 daemon.notice hostapd: client0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb 23 22:28:57 2023 kern.info kernel: [ 59.923299] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
Thu Feb 23 22:28:57 2023 kern.info kernel: [ 59.930207] br-client: port 5(client0) entered blocking state
Thu Feb 23 22:28:57 2023 kern.info kernel: [ 59.936043] br-client: port 5(client0) entered forwarding state
Thu Feb 23 22:28:57 2023 daemon.notice hostapd: client0: interface state COUNTRY_UPDATE->ENABLED
Thu Feb 23 22:28:57 2023 daemon.notice hostapd: client0: AP-ENABLED
Thu Feb 23 22:28:57 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Thu Feb 23 22:28:57 2023 daemon.notice netifd: Network device 'client1' link is up
Thu Feb 23 22:28:57 2023 daemon.info procd: - init complete -
Thu Feb 23 22:28:58 2023 user.notice firewall: Reloading firewall due to ifup of client (br-client)
Thu Feb 23 22:28:59 2023 kern.info kernel: [ 62.095844] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
Thu Feb 23 22:28:59 2023 daemon.err odhcp6c[2211]: Failed to send SOLICIT message to ff02::1:2 (Operation not permitted)
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Network device 'mesh0' link is up
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Interface 'mesh_radio0' is enabled
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Interface 'mesh_radio0' has link connectivity
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Interface 'mesh_radio0' is setting up now
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Network device 'client0' link is up
Thu Feb 23 22:28:59 2023 daemon.notice netifd: Interface 'mesh_radio0' is now up
Thu Feb 23 22:29:00 2023 kern.info kernel: [ 63.265491] batman_adv: bat0: Adding interface: mesh0
Thu Feb 23 22:29:00 2023 kern.info kernel: [ 63.270681] batman_adv: bat0: Interface activated: mesh0
Thu Feb 23 22:29:00 2023 user.notice firewall: Reloading firewall due to ifup of mesh_radio0 (mesh0)
Thu Feb 23 22:29:01 2023 daemon.err odhcp6c[2211]: Failed to send SOLICIT message to ff02::1:2 (Operation not permitted)
Thu Feb 23 22:29:21 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb 23 22:29:21 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::34#53
Thu Feb 23 22:29:21 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::b#53
Thu Feb 23 22:29:21 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Thu Feb 23 22:29:21 2023 user.notice firewall: Reloading firewall due to ifupdate of client (br-client)
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::34#53
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::b#53
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::4#53
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::a#53
Thu Feb 23 22:29:28 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::34#53
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::b#53
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::4#53
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::a#53
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::36#53
Thu Feb 23 22:29:32 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::34#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::b#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::4#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::a#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::36#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using nameserver 2001:bf7:170:192::e#53
Thu Feb 23 22:29:34 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Thu Feb 23 22:29:37 2023 daemon.err micrond[2437]: Chain 'RADV_FILTER' doesn't exist.
Thu Feb 23 22:29:37 2023 user.notice radv_filter_simple: ebtables chain RADV_FILTER does not exist
Thu Feb 23 22:29:37 2023 user.notice radv_filter_simple: Setting IPv6 Gateway to 02:ca:ff:ee:05:14
Thu Feb 23 22:29:42 2023 authpriv.info dropbear[4005]: Child connection from 2001:bf7:170:192:8170:7f87:9296:1aa6:50430
Sun Feb 26 09:13:31 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: authenticated
Sun Feb 26 09:13:31 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: associated (aid 1)
Sun Feb 26 09:13:31 2023 daemon.notice hostapd: client0: AP-STA-CONNECTED 12:94:82:98:16:45
Sun Feb 26 09:13:31 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 RADIUS: starting accounting session 43743079C992BFD0
Sun Feb 26 09:13:50 2023 daemon.notice hostapd: client0: AP-STA-DISCONNECTED 12:94:82:98:16:45
Sun Feb 26 09:13:52 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: authenticated
Sun Feb 26 09:13:52 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: associated (aid 1)
Sun Feb 26 09:13:52 2023 daemon.notice hostapd: client0: AP-STA-CONNECTED 12:94:82:98:16:45
Sun Feb 26 09:13:52 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 RADIUS: starting accounting session 01D4C84C0EC0EA30
Sun Feb 26 09:14:10 2023 daemon.notice hostapd: client0: AP-STA-DISCONNECTED 12:94:82:98:16:45
Sun Feb 26 09:14:13 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: authenticated
Sun Feb 26 09:14:13 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: associated (aid 1)
Sun Feb 26 09:14:13 2023 daemon.notice hostapd: client0: AP-STA-CONNECTED 12:94:82:98:16:45
Sun Feb 26 09:14:13 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 RADIUS: starting accounting session 2B89A87E56492386
Sun Feb 26 09:14:31 2023 daemon.notice hostapd: client0: AP-STA-DISCONNECTED 12:94:82:98:16:45
Sun Feb 26 09:14:35 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: authenticated
Sun Feb 26 09:14:35 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 IEEE 802.11: associated (aid 1)
Sun Feb 26 09:14:35 2023 daemon.notice hostapd: client0: AP-STA-CONNECTED 12:94:82:98:16:45
Sun Feb 26 09:14:35 2023 daemon.info hostapd: client0: STA 12:94:82:98:16:45 RADIUS: starting accounting session D7913748F03AE3D9
Sun Feb 26 09:14:36 2023 daemon.notice hostapd: client0: AP-STA-DISCONNECTED 12:94:82:98:16:45