From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from MAIL1.WPI.EDU (MAIL1.WPI.EDU [130.215.36.91]) by huchra.bufferbloat.net (Postfix) with ESMTP id 208DF21F22A for ; Sun, 4 May 2014 14:00:58 -0700 (PDT) Received: from MAIL1.WPI.EDU (MAIL1.WPI.EDU [130.215.36.91]) by MAIL1.WPI.EDU (8.14.8/8.14.8) with ESMTP id s44L0wP8009358 for ; Sun, 4 May 2014 17:00:58 -0400 X-DKIM: Sendmail DKIM Filter v2.8.3 MAIL1.WPI.EDU s44L0wP8009358 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=wpi.edu; s=_dkim; t=1399237258; bh=Qnzf5NQSQarqaIWhGqaiD1fE+NY+birueQ+NGeCtbtE=; h=Date:From:To:Subject:Message-ID:MIME-Version:Content-Type; b=OYV1Os5eYB1hIW0RnEvc/Vl6MVkcG6Uy0oR+uctCGQajHvAa42n9Go0P2vgzOzYKh TwPQqsG0WN57m94nKg77qB4iESwHY/15kxYpf+u9fMPDP/wyZFs93D91iWxAieoN0/ qC8xaZZf20unUjh0Pgr+MuMrCbFWNH+x4Ck+0w7A= Received: from MX1.WPI.EDU (mx1.wpi.edu [130.215.36.141]) by MAIL1.WPI.EDU (8.14.8/8.14.8) with ESMTP id s44L0wsG009355 for ; Sun, 4 May 2014 17:00:58 -0400 Received: from angus.ind.WPI.EDU (ANGUS.IND.WPI.EDU [130.215.130.21]) by MX1.WPI.EDU (8.14.4/8.14.4) with ESMTP id s44L0uq4014642 for ; Sun, 4 May 2014 17:00:57 -0400 (envelope-from cra@WPI.EDU) Received: from angus.ind.WPI.EDU (localhost [127.0.0.1]) by angus.ind.WPI.EDU (8.14.4/8.14.4) with ESMTP id s44L0uKB019074 for ; Sun, 4 May 2014 17:00:56 -0400 Received: (from cra@localhost) by angus.ind.WPI.EDU (8.14.4/8.14.4/Submit) id s44L0ufq019073 for cerowrt-devel@lists.bufferbloat.net; Sun, 4 May 2014 17:00:56 -0400 X-Authentication-Warning: angus.ind.WPI.EDU: cra set sender to cra@WPI.EDU using -f Date: Sun, 4 May 2014 17:00:56 -0400 From: Chuck Anderson To: cerowrt-devel@lists.bufferbloat.net Message-ID: <20140504210055.GH30850@angus.ind.WPI.EDU> Mail-Followup-To: cerowrt-devel@lists.bufferbloat.net MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-12-10) Subject: [Cerowrt-devel] DHCPv4 lease file empty, DHCPv6 lease shows "expired" X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 04 May 2014 21:00:59 -0000 I updated to 3.10.38-2. I noticed three things: 1. I have native IPv6 from Comcast now and DHCPv6-PD works correctly, giving me a /60. Yay! 2. The dnsmasq DHCPv4 lease file is empty and the web ui shows "no leases" even though my laptop definitely has an IPv4 address. root@cerowrt:/tmp# cat dhcp.leases root@cerowrt:/tmp# ls -l dhcp.leases -rw-r--r-- 1 root root 0 May 4 14:06 dhcp.leases n: wlp2s0: mtu 1500 qdisc mq state UP group default qlen 1000 inet 172.30.42.74/27 brd 172.30.42.95 scope global dynamic wlp2s0 valid_lft 78403sec preferred_lft 78403sec 3. The odhcpd DHCPv6 lease file has the lease for my laptop, and the web ui shows it, but it says "expired" in the web ui root@cerowrt:/tmp# cat /tmp/hosts/odhcpd 2601:xxxx:xxxx:xxx3::a27 a.home.lan a # sw00 0004fc3abdafbbb36410e1fd72cf0f0cc114 436909da a 1398909585 a27 128 2601:xxxx:xxxx:xxx3::a27/128 n: wlp2s0: mtu 1500 qlen 1000 inet6 2601:xxxx:xxxx:xxx3::a27/128 scope global valid_lft forever preferred_lft forever inet6 2601:xxxx:xxxx:xxx3:76e5:43ff:fe69:9da/64 scope global noprefixroute dynamic valid_lft 7186sec preferred_lft 7186sec inet6 fe80::76e5:43ff:fe69:9da/64 scope link valid_lft forever preferred_lft forever (yes my laptop is named "a") I wonder if the lease were deemed expired and hence removed by the servers because the clock was April 30 when the system first booted up and I got the leases, and then ntpd fixed the time to May 4? This seems like another issue that should be dealt with somehow. I can see several options for dealing with this: a. Delay serving out DHCP leases until AFTER the clock is synced. (this is probably the easiest fix but it does mean clients will be delayed in reconnecting after a bootup until after time is synced) b. Modify dnsmasq and odhcpd to measure elapsed time rather than storing the current wallclock time-of-day for the start of each lease. Maybe using the Linux system uptime seconds-since-boot would work. Unfortunately, this would be problematic for maintaining leases when the system is rebooted. Does Cero/OpenWrt even maintain leases over reboots? The RFCs say this is mandatory, but I wonder given that the lease files are stored under /tmp. Is /tmp maintained over reboots? c. Adjust lease start times after the clock jumps due to an NTP sync. Could be tricky to get right. d. A hybrid approach of b. and c. might make sense. Store BOTH the wallclock time and the seconds-since-boot value in the lease files. If the lease would be considered expired using the wallclock time, check the seconds-since-boot value, and then use that to adjust the lease file's wallclock value for the start of the lease. I thought CeroWrt or OpenWrt had adopted a mechanism to initialize the system clock during boot from a timestamp file that gets touched during normal operation, or before reboot/shutdown/upgrade? I remember something like that being discussed during the ntp bootstrapping discussion. If that had been done, then at least my clock would have been set to the correct day... Log file: Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: Reading included configuration file: /etc/xinetd.d/netserver [file=/etc/xinetd.d/netserver] [line=17] Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: Reading included configuration file: /etc/xinetd.d/rsync [file=/etc/xinetd.d/rsync] [line=16] Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: Reading included configuration file: /etc/xinetd.d/ssh [file=/etc/xinetd.d/ssh] [line=13] Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: Reading included configuration file: /etc/xinetd.d/telnet [file=/etc/xinetd.d/telnet] [line=15] Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: Reading included configuration file: /etc/xinetd.d/xmpp-client [file=/etc/xinetd.d/xmpp-client] [line=12] Wed Apr 30 20:58:57 2014 daemon.err xinetd[2047]: Server /usr/sbin/in.jabberd is not executable [file=/etc/xinetd.d/xmpp-client] [line=9] Wed Apr 30 20:58:57 2014 daemon.err xinetd[2047]: Error parsing attribute server - DISABLING SERVICE [file=/etc/xinetd.d/xmpp-client] [line=9] Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: removing localssh2 Wed Apr 30 20:58:57 2014 daemon.debug xinetd[2047]: removing xmpp-client Wed Apr 30 20:58:57 2014 daemon.notice xinetd[2047]: xinetd Version 2.3.15 started with loadavg options compiled in. Wed Apr 30 20:58:57 2014 daemon.notice xinetd[2047]: Started working: 5 available services Wed Apr 30 20:58:57 2014 kern.debug kernel: [ 80.183593] ar71xx: pll_reg 0xb8050014: 0x11110000 Wed Apr 30 20:58:57 2014 kern.info kernel: [ 80.183593] ge00: link up (1000Mbps/Full duplex) Wed Apr 30 20:58:57 2014 kern.info kernel: [ 80.222656] IPv6: ADDRCONF(NETDEV_CHANGE): ge00: link becomes ready Wed Apr 30 20:58:57 2014 daemon.notice netifd: Network device 'ge00' link is up Wed Apr 30 20:58:57 2014 daemon.notice netifd: Interface 'ge00' has link connectivity Wed Apr 30 20:58:57 2014 daemon.notice netifd: Interface 'ge00' is setting up now Wed Apr 30 20:58:58 2014 kern.info kernel: [ 80.492187] IPv6: ADDRCONF(NETDEV_CHANGE): sw10: link becomes ready Wed Apr 30 20:58:58 2014 kern.info kernel: [ 80.554687] IPv6: ADDRCONF(NETDEV_UP): gw10: link is not ready Wed Apr 30 20:58:58 2014 kern.info kernel: [ 80.562500] IPv6: ADDRCONF(NETDEV_CHANGE): gw10: link becomes ready Wed Apr 30 20:58:58 2014 kern.info kernel: [ 80.847656] IPv6: ADDRCONF(NETDEV_CHANGE): sw00: link becomes ready Wed Apr 30 20:58:58 2014 kern.info kernel: [ 80.902343] IPv6: ADDRCONF(NETDEV_UP): gw00: link is not ready Wed Apr 30 20:58:58 2014 daemon.notice netifd: ge00 (2080): udhcpc (v1.19.4) started Wed Apr 30 20:58:58 2014 user.emerg syslog: Unknown group "netdev" in message bus configuration file Wed Apr 30 20:58:58 2014 daemon.notice netifd: ge00 (2080): Sending discover... Wed Apr 30 20:58:59 2014 daemon.notice netifd: ge00 (2080): Sending select for w.x.y.z... Wed Apr 30 20:58:59 2014 daemon.notice netifd: ge00 (2080): Lease of w.x.y.z obtained, lease time 304976 Wed Apr 30 20:58:59 2014 daemon.notice netifd: Network device 'sw10' link is up Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'sw10' is enabled Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'sw10' has link connectivity Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'sw10' is setting up now Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'sw10' is now up Wed Apr 30 20:58:59 2014 daemon.notice netifd: Network device 'gw10' link is up Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'gw10' is enabled Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'gw10' has link connectivity Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'gw10' is setting up now Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'gw10' is now up Wed Apr 30 20:58:59 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%gw10 (Cannot assign requested address) Wed Apr 30 20:58:59 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%sw10 (Cannot assign requested address) Wed Apr 30 20:58:59 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%gw10 (Cannot assign requested address) Wed Apr 30 20:58:59 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%sw10 (Cannot assign requested address) Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'wan6' is enabled Wed Apr 30 20:58:59 2014 daemon.notice netifd: Network alias 'ge00' link is up Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'wan6' has link connectivity Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'wan6' is setting up now Wed Apr 30 20:58:59 2014 daemon.notice netifd: Interface 'ge00' is now up Wed Apr 30 20:58:59 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%gw10 (Cannot assign requested address) Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: (re)starting transaction on ge00 Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Starting SOLICIT transaction (timeout 4294967295s, max rc 0) Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Got a valid reply after 59ms Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Starting REQUEST transaction (timeout 4294967295s, max rc 10) Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Send REQUEST message (elapsed 0ms, rc 0) Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Got a valid reply after 17ms Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: entering stateful-mode on ge00 Wed Apr 30 20:58:59 2014 daemon.notice odhcp6c[2157]: Starting transaction (timeout 128147s, max rc 0) Wed Apr 30 20:59:00 2014 daemon.notice netifd: Interface 'wan6' is now up Wed Apr 30 20:59:00 2014 kern.info kernel: [ 82.953125] IPv6: ADDRCONF(NETDEV_CHANGE): gw00: link becomes ready Wed Apr 30 20:59:01 2014 daemon.notice netifd: Network device 'sw00' link is up Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'sw00' is enabled Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'sw00' has link connectivity Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'sw00' is setting up now Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'sw00' is now up Wed Apr 30 20:59:01 2014 daemon.notice netifd: Network device 'gw00' link is up Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'gw00' is enabled Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'gw00' has link connectivity Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'gw00' is setting up now Wed Apr 30 20:59:01 2014 daemon.notice netifd: Interface 'gw00' is now up Wed Apr 30 20:59:01 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%gw00 (Cannot assign requested address) Wed Apr 30 20:59:01 2014 daemon.warn odhcpd[1462]: Failed to send to ff02::1%gw00 (Cannot assign requested address) Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534). Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Successfully dropped root privileges. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: avahi-daemon 0.6.31 starting up. Wed Apr 30 20:59:02 2014 daemon.warn avahi-daemon[2218]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Loading service file /etc/avahi/services/http.service. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Loading service file /etc/avahi/services/rsync.service. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Loading service file /etc/avahi/services/ssh.service. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Joining mDNS multicast group on interface gw00.IPv6 with address 2601:xxxx:xxxx:xxx0::1. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: New relevant interface gw00.IPv6 for mDNS. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Joining mDNS multicast group on interface gw00.IPv4 with address 172.30.42.129. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: New relevant interface gw00.IPv4 for mDNS. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Joining mDNS multicast group on interface gw10.IPv6 with address 2601:xxxx:xxxx:xxx1::1. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: New relevant interface gw10.IPv6 for mDNS. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Joining mDNS multicast group on interface gw10.IPv4 with address 172.30.42.161. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: New relevant interface gw10.IPv4 for mDNS. Wed Apr 30 20:59:02 2014 daemon.info avahi-daemon[2218]: Joining mDNS multicast group on interface sw10.IPv6 with address 2601:xxxx:xxxx:xxx4::1. Wed Apr 30 20:59:03 2014 daemon.info avahi-daemon[2218]: Server startup complete. Host name is cerowrt.local. Local service cookie is 2851409704. Wed Apr 30 20:59:03 2014 user.emerg syslog: -i /var/lib/ahcp-unique-id -L /var/log/ahcpd.log Wed Apr 30 20:59:04 2014 user.emerg syslog: setting up led WAN LED (green) Wed Apr 30 20:59:04 2014 user.emerg syslog: setting up led USB Wed Apr 30 20:59:04 2014 daemon.info avahi-daemon[2218]: Service "Secure Shell on cerowrt" (/etc/avahi/services/ssh.service) successfully established. Wed Apr 30 20:59:04 2014 daemon.info avahi-daemon[2218]: Service "rsync on cerowrt" (/etc/avahi/services/rsync.service) successfully established. Wed Apr 30 20:59:04 2014 daemon.info avahi-daemon[2218]: Service "Web Server on cerowrt" (/etc/avahi/services/http.service) successfully established. Wed Apr 30 20:59:05 2014 user.notice polipo[2409]: Established listening socket on port 8123. Wed Apr 30 20:59:05 2014 user.emerg syslog: - init complete - Wed Apr 30 20:59:16 2014 user.notice dnsmasq-checkntp[2454]: Started checkntp. Date says: Wed Apr 30 20:59:16 EDT 2014. Sleeping for 5 seconds. Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: started, version UNKNOWN cachesize 5000 Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack no-ipset auth DNSSEC Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: DNSSEC validation enabled Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: DNSSEC signature timestamps not checked until first cache reload Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: DHCP, IP range 172.30.42.162 -- 172.30.42.187, lease time 1d Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: DHCP, IP range 172.30.42.130 -- 172.30.42.155, lease time 1d Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: DHCP, IP range 172.30.42.98 -- 172.30.42.123, lease time 1d Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: DHCP, IP range 172.30.42.66 -- 172.30.42.91, lease time 1d Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: DHCP, IP range 172.30.42.2 -- 172.30.42.27, lease time 1d Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using local addresses only for domain home.lan Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: reading /tmp/resolv.conf.auto Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using local addresses only for domain home.lan Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using nameserver 75.75.75.75#53 Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using nameserver 75.75.76.76#53 Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using nameserver 2001:558:feed::1#53 Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: using nameserver 2001:558:feed::2#53 Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: read /etc/hosts - 1 addresses Wed Apr 30 20:59:17 2014 daemon.info dnsmasq[2460]: read /tmp/hosts/odhcpd - 0 addresses Wed Apr 30 20:59:17 2014 daemon.info dnsmasq-dhcp[2460]: read /etc/ethers - 0 addresses Wed Apr 30 20:59:19 2014 user.notice dnsmasq-checkntp[2596]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:21 2014 user.notice dnsmasq-checkntp[2715]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:21 2014 user.notice dnsmasq-checkntp[2454]: No running ntpd found, or no stratum file. Running ntpd -q. Wed Apr 30 20:59:23 2014 user.notice dnsmasq-checkntp[2838]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:23 2014 user.notice firewall: Reloading firewall due to ifup of ge00 (ge00) Wed Apr 30 20:59:26 2014 user.notice dnsmasq-checkntp[2996]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:27 2014 user.notice dnsmasq-checkntp[3106]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:30 2014 user.notice dnsmasq-checkntp[3233]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:31 2014 user.notice dnsmasq-checkntp[2454]: Manual ntp sync failed; will try again in 5 seconds. Wed Apr 30 20:59:32 2014 user.notice dnsmasq-checkntp[3398]: Another instance running with pid 2454. Exiting. Wed Apr 30 20:59:41 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da IEEE 802.11: authenticated Wed Apr 30 20:59:41 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da IEEE 802.11: associated (aid 1) Wed Apr 30 20:59:41 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: pairwise key handshake completed (RSN) Wed Apr 30 20:59:42 2014 daemon.info dnsmasq-dhcp[2460]: DHCPDISCOVER(sw00) 172.30.42.74 74:e5:43:69:09:da Wed Apr 30 20:59:42 2014 daemon.info dnsmasq-dhcp[2460]: DHCPOFFER(sw00) 172.30.42.74 74:e5:43:69:09:da Wed Apr 30 20:59:42 2014 daemon.info dnsmasq-dhcp[2460]: DHCPREQUEST(sw00) 172.30.42.74 74:e5:43:69:09:da Wed Apr 30 20:59:42 2014 daemon.info dnsmasq-dhcp[2460]: DHCPACK(sw00) 172.30.42.74 74:e5:43:69:09:da a Wed Apr 30 20:59:46 2014 user.notice dnsmasq-checkntp[2454]: Manual ntp sync failed; will try again in 5 seconds. Wed Apr 30 21:00:01 2014 user.notice dnsmasq-checkntp[2454]: Manual ntp sync failed; will try again in 5 seconds. Wed Apr 30 21:00:57 2014 user.notice dnsmasq-checkntp[2454]: Manual ntp sync failed; will try again in 5 seconds. Sun May 4 14:06:48 2014 user.notice dnsmasq-checkntp[2454]: Time should be in sync. Sending SIGHUP to dnsmasq. Sun May 4 14:06:48 2014 daemon.info dnsmasq[2460]: now checking DNSSEC signature timestamps Sun May 4 14:06:48 2014 daemon.info dnsmasq[2460]: read /etc/hosts - 1 addresses Sun May 4 14:06:48 2014 daemon.info dnsmasq[2460]: read /tmp/hosts/odhcpd - 1 addresses Sun May 4 14:06:48 2014 daemon.info dnsmasq-dhcp[2460]: read /etc/ethers - 0 addresses Sun May 4 14:07:40 2014 cron.err crond[1531]: time disparity of 5346 minutes detected Sun May 4 14:14:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 14:18:45 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 27.104.204.241 to the global_no_access list for 120 minutes Sun May 4 14:24:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 14:26:27 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 178.223.115.209 to the global_no_access list for 120 minutes Sun May 4 14:34:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 14:35:32 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 183.1.236.5 to the global_no_access list for 120 minutes Sun May 4 14:44:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 14:54:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 14:59:54 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 125.70.173.86 to the global_no_access list for 120 minutes Sun May 4 15:04:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 15:14:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 15:24:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 15:34:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 15:44:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 15:47:16 2014 authpriv.info dropbear[21063]: Child connection from 172.30.42.74:58960 Sun May 4 15:47:20 2014 authpriv.info dropbear[21063]: Exit before auth: Exited normally Sun May 4 15:47:21 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 27.20.61.250 to the global_no_access list for 120 minutes Sun May 4 15:47:21 2014 authpriv.info dropbear[21094]: Child connection from 172.30.42.74:58961 Sun May 4 15:47:26 2014 authpriv.info dropbear[21094]: Exit before auth (user 'root', 0 fails): Exited normally Sun May 4 15:47:27 2014 authpriv.info dropbear[21124]: Child connection from 172.30.42.74:58962 Sun May 4 15:47:35 2014 authpriv.notice dropbear[21124]: Password auth succeeded for 'root' from 172.30.42.74:58962 Sun May 4 15:51:09 2014 authpriv.info dropbear[21124]: Exit (root): Disconnect received Sun May 4 15:51:10 2014 authpriv.info dropbear[23116]: Child connection from 172.30.42.74:58977 Sun May 4 15:51:17 2014 authpriv.notice dropbear[23116]: Password auth succeeded for 'root' from 172.30.42.74:58977 Sun May 4 15:54:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 16:04:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 16:09:52 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 117.193.65.108 to the global_no_access list for 120 minutes Sun May 4 16:14:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 16:18:52 2014 daemon.info xinetd[2047]: At least 1 DENY_TIME has expired, global_no_access list updated Sun May 4 16:23:32 2014 daemon.crit xinetd[2047]: 2047 {process_sensor} Adding 125.70.150.203 to the global_no_access list for 120 minutes Sun May 4 16:24:37 2014 daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN) Sun May 4 16:26:52 2014 daemon.info xinetd[2047]: At least 1 DENY_TIME has expired, global_no_access list updated