gargoyle-ispy 2016-May-12 09:22.torrent

Want to share your OpenWrt / Gargoyle knowledge? Implemented a new feature? Let us know here.

Moderator: Moderators

ispyisail
Moderator
Posts: 4882
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by ispyisail »

I'm starting to turn more stuff on - QOS, TOR

Wifi is rock solid

General router stability is great

This could be one of the best builds ever?

Based on the lack of reports others might be finding the same thing?

User avatar
Krog
Posts: 47
Joined: Mon May 06, 2013 4:50 pm

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by Krog »

i install on wdr3600 no problem on it :D

i believe
TL-WR-741ND V4.20 -Version 1.9.X
TL-WA-701ND V1.2 - Version 1.9.X
TL-WA-701ND V2.1 - Version 1.9.X
TL-WR-741ND V4.22 X 3 -Version 1.9.X
TL-WR-841ND V8 -Version 1.9.X
TL-WA-901ND V3 - Version 1.9.X

nworbnhoj
Posts: 914
Joined: Mon Jul 21, 2014 10:08 am
Location: Australia
Contact:

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by nworbnhoj »

Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.

The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.

My config includes PPPoE, wifi, guest-wifi, DHCP, a port forward, QoS, and the adblock plugin. The plugin root is set to an external USB drive.

This is a log captured between boot and bootloop

Code: Select all

BusyBox v1.23.2 (2016-05-11 23:21:16 NZST) built-in shell (ash)

------------------------------------------------------------------
|            _____                             _                 |
|           |  __ \                           | |                |
|           | |  \/ __ _ _ __ __ _  ___  _   _| | ___            |
|           | | __ / _` | '__/ _` |/ _ \| | | | |/ _ \           |
|           | |_\ \ (_| | | | (_| | (_) | |_| | |  __/           |
|            \____/\__,_|_|  \__, |\___/ \__, |_|\___|           |
|                             __/ |       __/ |                  |
|                            |___/       |___/                   |
|                                                                |
|----------------------------------------------------------------|
| Gargoyle version 1.9.X    | OpenWrt Chaos Calmer branch        |
| Gargoyle revision f311c08 | OpenWrt commit eadf19c             |
| Built May 11, 2016        | Target  ar71xx/usb                 |
------------------------------------------------------------------
root@Gargoyle:~# logread
Thu May 19 08:12:55 2016 user.emerg syslog: (Did you specify correct configuration file path?)
Thu May 19 08:12:55 2016 kern.info kernel: [   32.910000] EXT4-fs (sda2): recovery complete
Thu May 19 08:12:55 2016 kern.info kernel: [   32.940000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:56 2016 user.notice root: vsftpd init: mounted = 1
Thu May 19 08:12:56 2016 kern.info kernel: [   33.730000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.780000] device wlan1-1 entered promiscuous mode
Thu May 19 08:12:56 2016 kern.info kernel: [   33.780000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.790000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.800000] br-lan: port 4(wlan1-1) entered disabled state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): Using interface wlan1-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:56 2016 kern.info kernel: [   33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: interface state HT_SCAN->ENABLED
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: AP-ENABLED
Thu May 19 08:12:56 2016 daemon.err block: /dev/sda1 is already mounted
Thu May 19 08:12:56 2016 kern.info kernel: [   34.330000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   34.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1' link is up
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [   34.420000] device wlan0-1 entered promiscuous mode
Thu May 19 08:12:57 2016 kern.info kernel: [   34.420000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 kern.info kernel: [   34.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): Using interface wlan0-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: interface state HT_SCAN->ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: AP-ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0' link is up
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [   35.320000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [   35.570000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [   35.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:58 2016 kern.info kernel: [   35.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:58 2016 daemon.err block: /dev/sda2 is already mounted
Thu May 19 08:12:58 2016 kern.info kernel: [   36.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [   36.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [   37.100000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:59 2016 kern.info kernel: [   37.360000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:13:00 2016 kern.debug kernel: [   38.120000] UDP: bad checksum. From 101.116.86.207:8121 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:01 2016 user.notice root: vsftpd init: got_lock = 1
Thu May 19 08:13:01 2016 user.emerg syslog: WARNING: No shares defined, vsftpd will not be started
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB1
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB2
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led WLAN2G
Thu May 19 08:13:02 2016 daemon.info procd: - init complete -
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:07 2016 kern.debug kernel: [   44.940000] UDP: bad checksum. From 14.43.76.84:26282 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:07 2016 kern.debug kernel: [   44.940000] UDP: bad checksum. From 18.149.126.188:41446 to 103.25.181.95:53 ulen 47
Thu May 19 08:13:07 2016 kern.warn kernel: [   45.050000] ipt_bandwidth: timezone shift of 600 minutes detected, adjusting
Thu May 19 08:13:07 2016 kern.warn kernel: [   45.050000]                old minutes west=0, new minutes west=-600
Thu May 19 08:13:09 2016 kern.debug kernel: [   47.050000] UDP: bad checksum. From 112.183.176.233:36953 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:14 2016 kern.debug kernel: [   51.870000] UDP: bad checksum. From 94.251.215.176:37800 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: started, version 2.73 cachesize 150
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: DNS service limited to local subnets
Thu May 19 08:13:14 2016 daemon.info dnsmasq-dhcp[4398]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: reading /tmp/resolv.conf.auto
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /etc/hosts - 2 addresses
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /tmp/hosts/dhcp - 1 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq[4398]: read /etc/block.hosts - 13767 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq-dhcp[4398]: read /etc/ethers - 0 addresses
Thu May 19 08:13:16 2016 kern.debug kernel: [   54.260000] UDP: bad checksum. From 57.195.228.235:22131 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:19 2016 authpriv.info dropbear[5152]: Child connection from 192.168.1.230:43078
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [   69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [   73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [   79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [   80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [   86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [   69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [   73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [   79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [   80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [   86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:14:30 2016 user.notice root: Tor seems to have died unexpectedly, restarting
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g  1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g  1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:34 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:40 2016 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
root@Gargoyle:~#


There is some weird stuff like this

Code: Select all

kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41

that looks a bit like DDoS rubbish to me. Hope that has nothing to do with it!
Can you help someone else get Gargoyle up and running?
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E

ispyisail
Moderator
Posts: 4882
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by ispyisail »

I am not seeing this (yet) on my RSPro




nworbnhoj wrote:Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.

The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.

My config includes PPPoE, wifi, guest-wifi, DHCP, a port forward, QoS, and the adblock plugin. The plugin root is set to an external USB drive.

This is a log captured between boot and bootloop

Code: Select all

BusyBox v1.23.2 (2016-05-11 23:21:16 NZST) built-in shell (ash)

------------------------------------------------------------------
|            _____                             _                 |
|           |  __ \                           | |                |
|           | |  \/ __ _ _ __ __ _  ___  _   _| | ___            |
|           | | __ / _` | '__/ _` |/ _ \| | | | |/ _ \           |
|           | |_\ \ (_| | | | (_| | (_) | |_| | |  __/           |
|            \____/\__,_|_|  \__, |\___/ \__, |_|\___|           |
|                             __/ |       __/ |                  |
|                            |___/       |___/                   |
|                                                                |
|----------------------------------------------------------------|
| Gargoyle version 1.9.X    | OpenWrt Chaos Calmer branch        |
| Gargoyle revision f311c08 | OpenWrt commit eadf19c             |
| Built May 11, 2016        | Target  ar71xx/usb                 |
------------------------------------------------------------------
root@Gargoyle:~# logread
Thu May 19 08:12:55 2016 user.emerg syslog: (Did you specify correct configuration file path?)
Thu May 19 08:12:55 2016 kern.info kernel: [   32.910000] EXT4-fs (sda2): recovery complete
Thu May 19 08:12:55 2016 kern.info kernel: [   32.940000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:56 2016 user.notice root: vsftpd init: mounted = 1
Thu May 19 08:12:56 2016 kern.info kernel: [   33.730000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.780000] device wlan1-1 entered promiscuous mode
Thu May 19 08:12:56 2016 kern.info kernel: [   33.780000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.790000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.800000] br-lan: port 4(wlan1-1) entered disabled state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): Using interface wlan1-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:56 2016 kern.info kernel: [   33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: interface state HT_SCAN->ENABLED
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: AP-ENABLED
Thu May 19 08:12:56 2016 daemon.err block: /dev/sda1 is already mounted
Thu May 19 08:12:56 2016 kern.info kernel: [   34.330000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [   34.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1' link is up
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [   34.420000] device wlan0-1 entered promiscuous mode
Thu May 19 08:12:57 2016 kern.info kernel: [   34.420000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 kern.info kernel: [   34.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): Using interface wlan0-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: interface state HT_SCAN->ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: AP-ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0' link is up
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [   35.320000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [   35.570000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [   35.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:58 2016 kern.info kernel: [   35.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:58 2016 daemon.err block: /dev/sda2 is already mounted
Thu May 19 08:12:58 2016 kern.info kernel: [   36.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [   36.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [   37.100000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:59 2016 kern.info kernel: [   37.360000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:13:00 2016 kern.debug kernel: [   38.120000] UDP: bad checksum. From 101.116.86.207:8121 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:01 2016 user.notice root: vsftpd init: got_lock = 1
Thu May 19 08:13:01 2016 user.emerg syslog: WARNING: No shares defined, vsftpd will not be started
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB1
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB2
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led WLAN2G
Thu May 19 08:13:02 2016 daemon.info procd: - init complete -
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:07 2016 kern.debug kernel: [   44.940000] UDP: bad checksum. From 14.43.76.84:26282 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:07 2016 kern.debug kernel: [   44.940000] UDP: bad checksum. From 18.149.126.188:41446 to 103.25.181.95:53 ulen 47
Thu May 19 08:13:07 2016 kern.warn kernel: [   45.050000] ipt_bandwidth: timezone shift of 600 minutes detected, adjusting
Thu May 19 08:13:07 2016 kern.warn kernel: [   45.050000]                old minutes west=0, new minutes west=-600
Thu May 19 08:13:09 2016 kern.debug kernel: [   47.050000] UDP: bad checksum. From 112.183.176.233:36953 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:14 2016 kern.debug kernel: [   51.870000] UDP: bad checksum. From 94.251.215.176:37800 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: started, version 2.73 cachesize 150
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: DNS service limited to local subnets
Thu May 19 08:13:14 2016 daemon.info dnsmasq-dhcp[4398]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: reading /tmp/resolv.conf.auto
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /etc/hosts - 2 addresses
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /tmp/hosts/dhcp - 1 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq[4398]: read /etc/block.hosts - 13767 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq-dhcp[4398]: read /etc/ethers - 0 addresses
Thu May 19 08:13:16 2016 kern.debug kernel: [   54.260000] UDP: bad checksum. From 57.195.228.235:22131 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:19 2016 authpriv.info dropbear[5152]: Child connection from 192.168.1.230:43078
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [   69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [   73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [   79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [   80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [   86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [   62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [   69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [   73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [   79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [   80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [   83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [   86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:14:30 2016 user.notice root: Tor seems to have died unexpectedly, restarting
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g  1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g  1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:34 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:40 2016 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
root@Gargoyle:~#


There is some weird stuff like this

Code: Select all

kern.debug kernel: [   62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41

that looks a bit like DDoS rubbish to me. Hope that has nothing to do with it!

nworbnhoj
Posts: 914
Joined: Mon Jul 21, 2014 10:08 am
Location: Australia
Contact:

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by nworbnhoj »

nworbnhoj wrote:Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.

The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.


I have just reproduced the behaviour on a minimal setup
  • Flash this build and set password and timezone
  • Configure a PPPoE Internet connection
  • Plug a blank USB drive (insufficient room on TL-WDR36600 root for Tor)
  • Change plugin root to USB
  • Refresh plugins
  • Install Tor
  • Tor Client: Enable, Toggled by Each Host
  • Tor Data Drive: USB
  • Save Changes - reboot loop within a couple of minutes
  • Tor Client - disabled - router stable

It would be helpful to test this on:
  • another model router
  • another model router on root drive (ie no USB)
  • another TL-WDR3600
Can you help someone else get Gargoyle up and running?
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E

ispyisail
Moderator
Posts: 4882
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by ispyisail »

It would be helpful to test this on:
another model router
another model router on root drive (ie no USB)
another TL-WDR3600


I'm at work but from memory the differences are:

Not using

Code: Select all

Configure a PPPoE Internet connection


Hard baked into RSpro

Code: Select all

Install Tor


Using SD Card

Code: Select all

Change plugin root to USB


Everything else looks the same

scrmtrey
Posts: 102
Joined: Wed May 14, 2014 2:25 am

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by scrmtrey »

Twitch magically working again on gargoyle on my wdr3600. Maybe isp change from static ip to dynamic ip on wan (which i noticed on stock).

But it is working now, so i am really happy.
wdr3600 v1.5 @ Latest ispyisail build

ispyisail
Moderator
Posts: 4882
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by ispyisail »

scrmtrey wrote:Twitch magically working again on gargoyle on my wdr3600. Maybe isp change from static ip to dynamic ip on wan (which i noticed on stock).

But it is working now, so i am really happy.


can you test TOR?

Image

ispyisail
Moderator
Posts: 4882
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by ispyisail »

I'm loving this build.

I don't usually use QOS, but for testing purposes I thought I would turn it on.

Web pages are now loading so fast, i'm loving it.

Just using the default settings for QOS

scrmtrey
Posts: 102
Joined: Wed May 14, 2014 2:25 am

Re: gargoyle-ispy 2016-May-12 09:22.torrent

Post by scrmtrey »

Not enough space (i could use usb flash i guess but i dont know, im kind lazy today to set it up).

I can test QOS though. I used to use it all the time, but lost my setting for home (mac addresses-ip bind etc). I can use stock setting, just for testing purposes.
wdr3600 v1.5 @ Latest ispyisail build

Post Reply