ok I solved. I connected using root as user. And when I run logread the output is this:
.3.134 00:23

b8:d4:1a server
Mar 23 11:02:38 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPINFORM(br-lan) 192.168.3.134 00:23

b8:d4:1a
Mar 23 11:02:38 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPACK(br-lan) 192.168.3.134 00:23

b8:d4:1a server
Mar 23 11:03:07 Gargoyle daemon.notice Tor[2669]: Catching signal TERM, exiting cleanly.
Mar 23 11:03:07 Gargoyle daemon.notice Tor[2669]: Catching signal TERM, exiting cleanly.
Mar 23 11:03:20 Gargoyle daemon.warn Tor[8230]: You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 23 11:03:20 Gargoyle daemon.warn Tor[8230]: You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 23 11:03:29 Gargoyle daemon.notice Tor[8230]: Bootstrapped 45%: Asking for relay descriptors.
Mar 23 11:03:29 Gargoyle daemon.notice Tor[8230]: Bootstrapped 45%: Asking for relay descriptors.
Mar 23 11:03:30 Gargoyle daemon.notice Tor[8230]: We weren't able to find support for all of the TLS ciphersuites that we wanted to advertise. This won't hurt security, but it might make your Tor (if run as a client) more easy for censors to block.
Mar 23 11:03:30 Gargoyle daemon.notice Tor[8230]: We weren't able to find support for all of the TLS ciphersuites that we wanted to advertise. This won't hurt security, but it might make your Tor (if run as a client) more easy for censors to block.
Mar 23 11:03:30 Gargoyle daemon.notice Tor[8230]: To correct this, use a version of OpenSSL built with none of its ciphers disabled.
Mar 23 11:03:30 Gargoyle daemon.notice Tor[8230]: To correct this, use a version of OpenSSL built with none of its ciphers disabled.
Mar 23 11:03:32 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:32 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:36 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:36 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:38 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:38 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:40 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:40 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:43 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:43 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:54 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:03:54 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:04:03 Gargoyle daemon.info hostapd: wlan0: STA 00:23

b8:d4:1a WPA: group key handshake completed (RSN)
Mar 23 11:04:03 Gargoyle daemon.info hostapd: wlan0: STA d0:22:be:51:e1:70 WPA: group key handshake completed (RSN)
Mar 23 11:04:12 Gargoyle daemon.notice Tor[8230]: We now have enough directory information to build circuits.
Mar 23 11:04:12 Gargoyle daemon.notice Tor[8230]: We now have enough directory information to build circuits.
Mar 23 11:04:12 Gargoyle daemon.notice Tor[8230]: Bootstrapped 80%: Connecting to the Tor network.
Mar 23 11:04:12 Gargoyle daemon.notice Tor[8230]: Bootstrapped 80%: Connecting to the Tor network.
Mar 23 11:04:14 Gargoyle daemon.notice Tor[8230]: Bootstrapped 90%: Establishing a Tor circuit.
Mar 23 11:04:14 Gargoyle daemon.notice Tor[8230]: Bootstrapped 90%: Establishing a Tor circuit.
Mar 23 11:04:14 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:04:14 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:04:22 Gargoyle daemon.notice Tor[8230]: Tor has successfully opened a circuit. Looks like client functionality is working.
Mar 23 11:04:22 Gargoyle daemon.notice Tor[8230]: Tor has successfully opened a circuit. Looks like client functionality is working.
Mar 23 11:04:22 Gargoyle daemon.notice Tor[8230]: Bootstrapped 100%: Done.
Mar 23 11:04:22 Gargoyle daemon.notice Tor[8230]: Bootstrapped 100%: Done.
Mar 23 11:04:23 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:04:23 Gargoyle daemon.notice Tor[8230]: New control connection opened.
Mar 23 11:05:17 Gargoyle daemon.notice Tor[8230]: Catching signal TERM, exiting cleanly.
Mar 23 11:05:17 Gargoyle daemon.notice Tor[8230]: Catching signal TERM, exiting cleanly.
Mar 23 11:05:34 Gargoyle daemon.warn Tor[8811]: You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 23 11:05:34 Gargoyle daemon.warn Tor[8811]: You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 23 11:05:57 Gargoyle daemon.notice Tor[8811]: We now have enough directory information to build circuits.
Mar 23 11:05:57 Gargoyle daemon.notice Tor[8811]: We now have enough directory information to build circuits.
Mar 23 11:05:57 Gargoyle daemon.notice Tor[8811]: Bootstrapped 80%: Connecting to the Tor network.
Mar 23 11:05:57 Gargoyle daemon.notice Tor[8811]: Bootstrapped 80%: Connecting to the Tor network.
Mar 23 11:05:58 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:05:58 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:05 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:05 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:06 Gargoyle daemon.notice Tor[8811]: Bootstrapped 85%: Finishing handshake with first hop.
Mar 23 11:06:06 Gargoyle daemon.notice Tor[8811]: Bootstrapped 85%: Finishing handshake with first hop.
Mar 23 11:06:07 Gargoyle daemon.notice Tor[8811]: We weren't able to find support for all of the TLS ciphersuites that we wanted to advertise. This won't hurt security, but it might make your Tor (if run as a client) more easy for censors to block.
Mar 23 11:06:07 Gargoyle daemon.notice Tor[8811]: We weren't able to find support for all of the TLS ciphersuites that we wanted to advertise. This won't hurt security, but it might make your Tor (if run as a client) more easy for censors to block.
Mar 23 11:06:07 Gargoyle daemon.notice Tor[8811]: To correct this, use a version of OpenSSL built with none of its ciphers disabled.
Mar 23 11:06:07 Gargoyle daemon.notice Tor[8811]: To correct this, use a version of OpenSSL built with none of its ciphers disabled.
Mar 23 11:06:18 Gargoyle daemon.notice Tor[8811]: Bootstrapped 90%: Establishing a Tor circuit.
Mar 23 11:06:18 Gargoyle daemon.notice Tor[8811]: Bootstrapped 90%: Establishing a Tor circuit.
Mar 23 11:06:18 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:18 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:25 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:25 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:31 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:31 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:37 Gargoyle daemon.notice Tor[8811]: Tor has successfully opened a circuit. Looks like client functionality is working.
Mar 23 11:06:37 Gargoyle daemon.notice Tor[8811]: Tor has successfully opened a circuit. Looks like client functionality is working.
Mar 23 11:06:37 Gargoyle daemon.notice Tor[8811]: Bootstrapped 100%: Done.
Mar 23 11:06:37 Gargoyle daemon.notice Tor[8811]: Bootstrapped 100%: Done.
Mar 23 11:06:38 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:06:38 Gargoyle daemon.notice Tor[8811]: New control connection opened.
Mar 23 11:07:18 Gargoyle authpriv.info dropbear[9239]: Child connection from 192.168.3.134:63255
Mar 23 11:07:30 Gargoyle authpriv.warn dropbear[9239]: Login attempt for nonexistent user from 192.168.3.134:63255
Mar 23 11:07:34 Gargoyle authpriv.warn dropbear[9239]: Login attempt for nonexistent user from 192.168.3.134:63255
Mar 23 11:07:39 Gargoyle authpriv.warn dropbear[9239]: Login attempt for nonexistent user from 192.168.3.134:63255
Mar 23 11:07:42 Gargoyle authpriv.warn dropbear[9239]: Login attempt for nonexistent user from 192.168.3.134:63255
Mar 23 11:08:27 Gargoyle authpriv.info dropbear[9239]: Exit before auth: Exited normally
Mar 23 11:08:54 Gargoyle authpriv.info dropbear[13630]: Child connection from 192.168.3.134:63295
Mar 23 11:09:21 Gargoyle authpriv.warn dropbear[13630]: Login attempt for nonexistent user from 192.168.3.134:63295
Mar 23 11:09:29 Gargoyle authpriv.warn dropbear[13630]: Login attempt for nonexistent user from 192.168.3.134:63295
Mar 23 11:09:37 Gargoyle authpriv.info dropbear[13630]: Exit before auth: Exited normally
Mar 23 11:09:48 Gargoyle daemon.notice httpd_gargoyle[1810]: exiting due to signal 15
Mar 23 11:09:48 Gargoyle daemon.notice httpd_gargoyle[11264]: exiting due to signal 15
Mar 23 11:09:48 Gargoyle daemon.warn httpd_gargoyle[15705]: started as root without requesting chroot(), warning only
Mar 23 11:09:48 Gargoyle daemon.notice httpd_gargoyle[15705]: httpd_gargoyle/1.0 14mar2008 starting on Gargoyle, port 80
Mar 23 11:10:58 Gargoyle authpriv.info dropbear[15980]: Child connection from 192.168.3.134:63406
Mar 23 11:11:06 Gargoyle authpriv.warn dropbear[15980]: Login attempt for nonexistent user from 192.168.3.134:63406
Mar 23 11:11:10 Gargoyle authpriv.warn dropbear[15980]: Login attempt for nonexistent user from 192.168.3.134:63406
Mar 23 11:11:23 Gargoyle authpriv.warn dropbear[15980]: Login attempt for nonexistent user from 192.168.3.134:63406
Mar 23 11:11:26 Gargoyle authpriv.info dropbear[15980]: Exit before auth: Exited normally
Mar 23 11:11:48 Gargoyle authpriv.info dropbear[16001]: Child connection from 192.168.3.134:63410
Mar 23 11:12:01 Gargoyle authpriv.warn dropbear[16001]: Login attempt for nonexistent user from 192.168.3.134:63410
Mar 23 11:12:04 Gargoyle authpriv.warn dropbear[16001]: Login attempt for nonexistent user from 192.168.3.134:63410
Mar 23 11:12:18 Gargoyle authpriv.info dropbear[16001]: Exit before auth: Exited normally
Mar 23 11:12:40 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPINFORM(br-lan) 192.168.3.134 00:23

b8:d4:1a
Mar 23 11:12:40 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPACK(br-lan) 192.168.3.134 00:23

b8:d4:1a server
Mar 23 11:12:58 Gargoyle authpriv.info dropbear[16069]: Child connection from 192.168.3.134:63435
Mar 23 11:13:14 Gargoyle authpriv.warn dropbear[16069]: Login attempt for nonexistent user from 192.168.3.134:63435
Mar 23 11:13:18 Gargoyle authpriv.warn dropbear[16069]: Login attempt for nonexistent user from 192.168.3.134:63435
Mar 23 11:13:40 Gargoyle authpriv.info dropbear[16069]: Exit before auth: Exited normally
Mar 23 11:14:03 Gargoyle daemon.info hostapd: wlan0: STA 00:23

b8:d4:1a WPA: group key handshake completed (RSN)
Mar 23 11:14:03 Gargoyle daemon.info hostapd: wlan0: STA d0:22:be:51:e1:70 WPA: group key handshake completed (RSN)
Mar 23 11:15:35 Gargoyle authpriv.info dropbear[16187]: Child connection from 192.168.3.134:63459
Mar 23 11:15:41 Gargoyle authpriv.warn dropbear[16187]: Login attempt for nonexistent user from 192.168.3.134:63459
Mar 23 11:15:46 Gargoyle authpriv.warn dropbear[16187]: Login attempt for nonexistent user from 192.168.3.134:63459
Mar 23 11:15:51 Gargoyle authpriv.warn dropbear[16187]: Login attempt for nonexistent user from 192.168.3.134:63459
Mar 23 11:15:55 Gargoyle authpriv.warn dropbear[16187]: Login attempt for nonexistent user from 192.168.3.134:63459
Mar 23 11:16:04 Gargoyle authpriv.info dropbear[16187]: Exit before auth: Exited normally
Mar 23 11:19:40 Gargoyle authpriv.info dropbear[16256]: Child connection from 192.168.3.134:63488
Mar 23 11:21:44 Gargoyle authpriv.warn dropbear[16256]: Login attempt for nonexistent user from 192.168.3.134:63488
Mar 23 11:21:47 Gargoyle authpriv.warn dropbear[16256]: Login attempt for nonexistent user from 192.168.3.134:63488
Mar 23 11:21:50 Gargoyle authpriv.warn dropbear[16256]: Login attempt for nonexistent user from 192.168.3.134:63488
Mar 23 11:21:55 Gargoyle authpriv.info dropbear[16256]: Exit before auth: Exited normally
Mar 23 11:22:42 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPINFORM(br-lan) 192.168.3.134 00:23

b8:d4:1a
Mar 23 11:22:42 Gargoyle daemon.info dnsmasq-dhcp[2217]: DHCPACK(br-lan) 192.168.3.134 00:23

b8:d4:1a server
Mar 23 11:24:02 Gargoyle authpriv.info dropbear[16343]: Child connection from 192.168.3.134:63544
Mar 23 11:24:03 Gargoyle daemon.info hostapd: wlan0: STA 00:23

b8:d4:1a WPA: group key handshake completed (RSN)
Mar 23 11:24:03 Gargoyle daemon.info hostapd: wlan0: STA d0:22:be:51:e1:70 WPA: group key handshake completed (RSN)
Mar 23 11:24:10 Gargoyle authpriv.notice dropbear[16343]: Password auth succeeded for 'root' from 192.168.3.134:63544
Mar 23 11:25:36 Gargoyle authpriv.info dropbear[16343]: Exit (root): Exited normally
Mar 23 11:25:45 Gargoyle authpriv.info dropbear[16370]: Child connection from 192.168.3.134:63559
Mar 23 11:25:52 Gargoyle authpriv.notice dropbear[16370]: Password auth succeeded for 'root' from 192.168.3.134:63559
root@Gargoyle:~#