gargoyle-ispy 2016-May-12 09:22.torrent
Moderator: Moderators
Re: gargoyle-ispy 2016-May-12 09:22.torrent
I'm starting to turn more stuff on - QOS, TOR
Wifi is rock solid
General router stability is great
This could be one of the best builds ever?
Based on the lack of reports others might be finding the same thing?
Wifi is rock solid
General router stability is great
This could be one of the best builds ever?
Based on the lack of reports others might be finding the same thing?
Re: gargoyle-ispy 2016-May-12 09:22.torrent
i install on wdr3600 no problem on it
i believe
i believe
TL-WR-741ND V4.20 -Version 1.9.X
TL-WA-701ND V1.2 - Version 1.9.X
TL-WA-701ND V2.1 - Version 1.9.X
TL-WR-741ND V4.22 X 3 -Version 1.9.X
TL-WR-841ND V8 -Version 1.9.X
TL-WA-901ND V3 - Version 1.9.X
TL-WA-701ND V1.2 - Version 1.9.X
TL-WA-701ND V2.1 - Version 1.9.X
TL-WR-741ND V4.22 X 3 -Version 1.9.X
TL-WR-841ND V8 -Version 1.9.X
TL-WA-901ND V3 - Version 1.9.X
Re: gargoyle-ispy 2016-May-12 09:22.torrent
Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.
The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.
My config includes PPPoE, wifi, guest-wifi, DHCP, a port forward, QoS, and the adblock plugin. The plugin root is set to an external USB drive.
This is a log captured between boot and bootloop
There is some weird stuff like this
that looks a bit like DDoS rubbish to me. Hope that has nothing to do with it!
The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.
My config includes PPPoE, wifi, guest-wifi, DHCP, a port forward, QoS, and the adblock plugin. The plugin root is set to an external USB drive.
This is a log captured between boot and bootloop
Code: Select all
BusyBox v1.23.2 (2016-05-11 23:21:16 NZST) built-in shell (ash)
------------------------------------------------------------------
| _____ _ |
| | __ \ | | |
| | | \/ __ _ _ __ __ _ ___ _ _| | ___ |
| | | __ / _` | '__/ _` |/ _ \| | | | |/ _ \ |
| | |_\ \ (_| | | | (_| | (_) | |_| | | __/ |
| \____/\__,_|_| \__, |\___/ \__, |_|\___| |
| __/ | __/ | |
| |___/ |___/ |
| |
|----------------------------------------------------------------|
| Gargoyle version 1.9.X | OpenWrt Chaos Calmer branch |
| Gargoyle revision f311c08 | OpenWrt commit eadf19c |
| Built May 11, 2016 | Target ar71xx/usb |
------------------------------------------------------------------
root@Gargoyle:~# logread
Thu May 19 08:12:55 2016 user.emerg syslog: (Did you specify correct configuration file path?)
Thu May 19 08:12:55 2016 kern.info kernel: [ 32.910000] EXT4-fs (sda2): recovery complete
Thu May 19 08:12:55 2016 kern.info kernel: [ 32.940000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:56 2016 user.notice root: vsftpd init: mounted = 1
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.730000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.780000] device wlan1-1 entered promiscuous mode
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.780000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.790000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.800000] br-lan: port 4(wlan1-1) entered disabled state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): Using interface wlan1-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 33.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: interface state HT_SCAN->ENABLED
Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: AP-ENABLED
Thu May 19 08:12:56 2016 daemon.err block: /dev/sda1 is already mounted
Thu May 19 08:12:56 2016 kern.info kernel: [ 34.330000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 kern.info kernel: [ 34.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1' link is up
Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [ 34.420000] device wlan0-1 entered promiscuous mode
Thu May 19 08:12:57 2016 kern.info kernel: [ 34.420000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 kern.info kernel: [ 34.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): Using interface wlan0-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests"
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: interface state HT_SCAN->ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: AP-ENABLED
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0' link is up
Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0-1' link is up
Thu May 19 08:12:57 2016 kern.info kernel: [ 35.320000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [ 35.570000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:58 2016 kern.info kernel: [ 35.740000] br-lan: port 3(wlan1) entered forwarding state
Thu May 19 08:12:58 2016 kern.info kernel: [ 35.830000] br-lan: port 4(wlan1-1) entered forwarding state
Thu May 19 08:12:58 2016 daemon.err block: /dev/sda2 is already mounted
Thu May 19 08:12:58 2016 kern.info kernel: [ 36.340000] br-lan: port 2(wlan0) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [ 36.430000] br-lan: port 5(wlan0-1) entered forwarding state
Thu May 19 08:12:59 2016 kern.info kernel: [ 37.100000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:12:59 2016 kern.info kernel: [ 37.360000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Thu May 19 08:13:00 2016 kern.debug kernel: [ 38.120000] UDP: bad checksum. From 101.116.86.207:8121 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:01 2016 user.notice root: vsftpd init: got_lock = 1
Thu May 19 08:13:01 2016 user.emerg syslog: WARNING: No shares defined, vsftpd will not be started
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB1
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB2
Thu May 19 08:13:02 2016 user.emerg syslog: setting up led WLAN2G
Thu May 19 08:13:02 2016 daemon.info procd: - init complete -
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1)
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000
Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN)
Thu May 19 08:13:07 2016 kern.debug kernel: [ 44.940000] UDP: bad checksum. From 14.43.76.84:26282 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:07 2016 kern.debug kernel: [ 44.940000] UDP: bad checksum. From 18.149.126.188:41446 to 103.25.181.95:53 ulen 47
Thu May 19 08:13:07 2016 kern.warn kernel: [ 45.050000] ipt_bandwidth: timezone shift of 600 minutes detected, adjusting
Thu May 19 08:13:07 2016 kern.warn kernel: [ 45.050000] old minutes west=0, new minutes west=-600
Thu May 19 08:13:09 2016 kern.debug kernel: [ 47.050000] UDP: bad checksum. From 112.183.176.233:36953 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:14 2016 kern.debug kernel: [ 51.870000] UDP: bad checksum. From 94.251.215.176:37800 to 103.25.181.95:53 ulen 43
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: started, version 2.73 cachesize 150
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: DNS service limited to local subnets
Thu May 19 08:13:14 2016 daemon.info dnsmasq-dhcp[4398]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: reading /tmp/resolv.conf.auto
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /etc/hosts - 2 addresses
Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /tmp/hosts/dhcp - 1 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq[4398]: read /etc/block.hosts - 13767 addresses
Thu May 19 08:13:15 2016 daemon.info dnsmasq-dhcp[4398]: read /etc/ethers - 0 addresses
Thu May 19 08:13:16 2016 kern.debug kernel: [ 54.260000] UDP: bad checksum. From 57.195.228.235:22131 to 103.25.181.95:53 ulen 53
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX
Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX name
Thu May 19 08:13:19 2016 authpriv.info dropbear[5152]: Child connection from 192.168.1.230:43078
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [ 69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [ 73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [ 79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [ 80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [ 86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078
Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45
Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network
Thu May 19 08:14:03 2016 kern.debug kernel: [ 69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47
Thu May 19 08:14:07 2016 kern.debug kernel: [ 73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53
Thu May 19 08:14:13 2016 kern.debug kernel: [ 79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55
Thu May 19 08:14:13 2016 kern.debug kernel: [ 80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases
Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway?
Thu May 19 08:14:20 2016 kern.debug kernel: [ 86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45
Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
Thu May 19 08:14:30 2016 user.notice root: Tor seems to have died unexpectedly, restarting
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g 1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g 1 Mar 2016).
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc".
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:34 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't.
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting
Thu May 19 08:14:40 2016 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
root@Gargoyle:~#
Code: Select all
kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Can you help someone else get Gargoyle up and running?
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E
Re: gargoyle-ispy 2016-May-12 09:22.torrent
I am not seeing this (yet) on my RSPro
nworbnhoj wrote:Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.
The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.
My config includes PPPoE, wifi, guest-wifi, DHCP, a port forward, QoS, and the adblock plugin. The plugin root is set to an external USB drive.
This is a log captured between boot and bootloopThere is some weird stuff like thisCode: Select all
BusyBox v1.23.2 (2016-05-11 23:21:16 NZST) built-in shell (ash) ------------------------------------------------------------------ | _____ _ | | | __ \ | | | | | | \/ __ _ _ __ __ _ ___ _ _| | ___ | | | | __ / _` | '__/ _` |/ _ \| | | | |/ _ \ | | | |_\ \ (_| | | | (_| | (_) | |_| | | __/ | | \____/\__,_|_| \__, |\___/ \__, |_|\___| | | __/ | __/ | | | |___/ |___/ | | | |----------------------------------------------------------------| | Gargoyle version 1.9.X | OpenWrt Chaos Calmer branch | | Gargoyle revision f311c08 | OpenWrt commit eadf19c | | Built May 11, 2016 | Target ar71xx/usb | ------------------------------------------------------------------ root@Gargoyle:~# logread Thu May 19 08:12:55 2016 user.emerg syslog: (Did you specify correct configuration file path?) Thu May 19 08:12:55 2016 kern.info kernel: [ 32.910000] EXT4-fs (sda2): recovery complete Thu May 19 08:12:55 2016 kern.info kernel: [ 32.940000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null) Thu May 19 08:12:56 2016 user.notice root: vsftpd init: mounted = 1 Thu May 19 08:12:56 2016 kern.info kernel: [ 33.730000] br-lan: port 3(wlan1) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 33.740000] br-lan: port 3(wlan1) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 33.780000] device wlan1-1 entered promiscuous mode Thu May 19 08:12:56 2016 kern.info kernel: [ 33.780000] br-lan: port 4(wlan1-1) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 33.790000] br-lan: port 4(wlan1-1) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 33.800000] br-lan: port 4(wlan1-1) entered disabled state Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): Using interface wlan1-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests" Thu May 19 08:12:56 2016 kern.info kernel: [ 33.830000] br-lan: port 4(wlan1-1) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 33.830000] br-lan: port 4(wlan1-1) entered forwarding state Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: interface state HT_SCAN->ENABLED Thu May 19 08:12:56 2016 daemon.notice netifd: radio1 (1661): wlan1: AP-ENABLED Thu May 19 08:12:56 2016 daemon.err block: /dev/sda1 is already mounted Thu May 19 08:12:56 2016 kern.info kernel: [ 34.330000] br-lan: port 2(wlan0) entered forwarding state Thu May 19 08:12:56 2016 kern.info kernel: [ 34.340000] br-lan: port 2(wlan0) entered forwarding state Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1' link is up Thu May 19 08:12:56 2016 daemon.notice netifd: Network device 'wlan1-1' link is up Thu May 19 08:12:57 2016 kern.info kernel: [ 34.420000] device wlan0-1 entered promiscuous mode Thu May 19 08:12:57 2016 kern.info kernel: [ 34.420000] br-lan: port 5(wlan0-1) entered forwarding state Thu May 19 08:12:57 2016 kern.info kernel: [ 34.430000] br-lan: port 5(wlan0-1) entered forwarding state Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): Using interface wlan0-1 with hwaddr XX:XX:XX:XX:XX:XX:XX and ssid "Guests" Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: interface state HT_SCAN->ENABLED Thu May 19 08:12:57 2016 daemon.notice netifd: radio0 (1660): wlan0: AP-ENABLED Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0' link is up Thu May 19 08:12:57 2016 daemon.notice netifd: Network device 'wlan0-1' link is up Thu May 19 08:12:57 2016 kern.info kernel: [ 35.320000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null) Thu May 19 08:12:58 2016 kern.info kernel: [ 35.570000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null) Thu May 19 08:12:58 2016 kern.info kernel: [ 35.740000] br-lan: port 3(wlan1) entered forwarding state Thu May 19 08:12:58 2016 kern.info kernel: [ 35.830000] br-lan: port 4(wlan1-1) entered forwarding state Thu May 19 08:12:58 2016 daemon.err block: /dev/sda2 is already mounted Thu May 19 08:12:58 2016 kern.info kernel: [ 36.340000] br-lan: port 2(wlan0) entered forwarding state Thu May 19 08:12:59 2016 kern.info kernel: [ 36.430000] br-lan: port 5(wlan0-1) entered forwarding state Thu May 19 08:12:59 2016 kern.info kernel: [ 37.100000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null) Thu May 19 08:12:59 2016 kern.info kernel: [ 37.360000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null) Thu May 19 08:13:00 2016 kern.debug kernel: [ 38.120000] UDP: bad checksum. From 101.116.86.207:8121 to 103.25.181.95:53 ulen 43 Thu May 19 08:13:01 2016 user.notice root: vsftpd init: got_lock = 1 Thu May 19 08:13:01 2016 user.emerg syslog: WARNING: No shares defined, vsftpd will not be started Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1) Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000 Thu May 19 08:13:01 2016 daemon.info hostapd: wlan1: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN) Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB1 Thu May 19 08:13:02 2016 user.emerg syslog: setting up led USB2 Thu May 19 08:13:02 2016 user.emerg syslog: setting up led WLAN2G Thu May 19 08:13:02 2016 daemon.info procd: - init complete - Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: authenticated Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX IEEE 802.11: associated (aid 1) Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX RADIUS: starting accounting session 573CE8E8-00000000 Thu May 19 08:13:05 2016 daemon.info hostapd: wlan0: STA XX:XX:XX:XX:XX:XX:XX WPA: pairwise key handshake completed (RSN) Thu May 19 08:13:07 2016 kern.debug kernel: [ 44.940000] UDP: bad checksum. From 14.43.76.84:26282 to 103.25.181.95:53 ulen 53 Thu May 19 08:13:07 2016 kern.debug kernel: [ 44.940000] UDP: bad checksum. From 18.149.126.188:41446 to 103.25.181.95:53 ulen 47 Thu May 19 08:13:07 2016 kern.warn kernel: [ 45.050000] ipt_bandwidth: timezone shift of 600 minutes detected, adjusting Thu May 19 08:13:07 2016 kern.warn kernel: [ 45.050000] old minutes west=0, new minutes west=-600 Thu May 19 08:13:09 2016 kern.debug kernel: [ 47.050000] UDP: bad checksum. From 112.183.176.233:36953 to 103.25.181.95:53 ulen 41 Thu May 19 08:13:14 2016 kern.debug kernel: [ 51.870000] UDP: bad checksum. From 94.251.215.176:37800 to 103.25.181.95:53 ulen 43 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: started, version 2.73 cachesize 150 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: DNS service limited to local subnets Thu May 19 08:13:14 2016 daemon.info dnsmasq-dhcp[4398]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: reading /tmp/resolv.conf.auto Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain micro Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain oss Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain null Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain ing Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain indy Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain gopher Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain geek Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain fur Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain free Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain bbs Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain dyn Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain parody Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.142.171.235#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 95.211.32.162#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 66.244.95.20#53 for domain glue Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 176.58.118.172#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 106.187.47.17#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 178.32.31.41#53 for domain bit Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using local addresses only for domain lan Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.222.222#53 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: using nameserver 208.67.220.220#53 Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /etc/hosts - 2 addresses Thu May 19 08:13:14 2016 daemon.info dnsmasq[4398]: read /tmp/hosts/dhcp - 1 addresses Thu May 19 08:13:15 2016 daemon.info dnsmasq[4398]: read /etc/block.hosts - 13767 addresses Thu May 19 08:13:15 2016 daemon.info dnsmasq-dhcp[4398]: read /etc/ethers - 0 addresses Thu May 19 08:13:16 2016 kern.debug kernel: [ 54.260000] UDP: bad checksum. From 57.195.228.235:22131 to 103.25.181.95:53 ulen 53 Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPDISCOVER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPOFFER(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.7 XX:XX:XX:XX:XX:XX:XX name Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.230 XX:XX:XX:XX:XX:XX:XX name Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPREQUEST(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX Thu May 19 08:13:18 2016 daemon.info dnsmasq-dhcp[4398]: DHCPACK(br-lan) 192.168.1.141 XX:XX:XX:XX:XX:XX:XX name Thu May 19 08:13:19 2016 authpriv.info dropbear[5152]: Child connection from 192.168.1.230:43078 Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078 Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41 Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45 Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network Thu May 19 08:14:03 2016 kern.debug kernel: [ 69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47 Thu May 19 08:14:07 2016 kern.debug kernel: [ 73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53 Thu May 19 08:14:13 2016 kern.debug kernel: [ 79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55 Thu May 19 08:14:13 2016 kern.debug kernel: [ 80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway? Thu May 19 08:14:20 2016 kern.debug kernel: [ 86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2) Thu May 19 08:13:24 2016 authpriv.notice dropbear[5152]: Pubkey auth succeeded for 'root' with key md5 XX:XX:XX:XX:XX:XX:XX:fb:f0:57:f5:4b:de:f9:87:19:11 from 192.168.1.230:43078 Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41 Thu May 19 08:13:25 2016 kern.debug kernel: [ 62.590000] UDP: bad checksum. From 32.129.27.139:23181 to 103.25.181.95:53 ulen 45 Thu May 19 08:13:58 2016 daemon.warn dnsmasq[4398]: Ignoring query from non-local network Thu May 19 08:14:03 2016 kern.debug kernel: [ 69.550000] UDP: bad checksum. From 108.167.5.214:56612 to 103.25.181.95:53 ulen 47 Thu May 19 08:14:07 2016 kern.debug kernel: [ 73.290000] UDP: bad checksum. From 108.96.145.11:26573 to 103.25.181.95:53 ulen 53 Thu May 19 08:14:13 2016 kern.debug kernel: [ 79.410000] UDP: bad checksum. From 124.79.213.230:52358 to 103.25.181.95:53 ulen 55 Thu May 19 08:14:13 2016 kern.debug kernel: [ 80.180000] UDP: bad checksum. From 91.21.222.69:37489 to 103.25.181.95:53 ulen 41 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 98.104.216.222:39856 to 103.25.181.95:53 ulen 41 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.480000] UDP: bad checksum. From 40.169.91.234:43836 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:17 2016 kern.debug kernel: [ 83.510000] UDP: bad checksum. From 112.94.37.147:1105 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: could not open lease file: /var/upnp.leases Thu May 19 08:14:18 2016 daemon.err miniupnpd[8904]: Why did you run me anyway? Thu May 19 08:14:20 2016 kern.debug kernel: [ 86.190000] UDP: bad checksum. From 18.100.241.159:5225 to 103.25.181.95:53 ulen 45 Thu May 19 08:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2) Thu May 19 08:14:30 2016 user.notice root: Tor seems to have died unexpectedly, restarting Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g 1 Mar 2016). Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 1000204f: OpenSSL 1.0.2d 9 Jul 2015; running with 1000207f: OpenSSL 1.0.2g 1 Mar 2016). Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8. Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor v0.2.6.10 (git-58c51dc6087b0936) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2g and Zlib 1.2.8. Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc". Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: Read configuration file "/etc/tor/torrc". Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted. Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9053' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted. Thu May 19 08:14:33 2016 daemon.notice Tor[10822]: You configured a non-loopback address '192.168.1.1:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted. Thu May 19 08:14:33 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't. Thu May 19 08:14:34 2016 daemon.warn Tor[10822]: You are running Tor as root. You don't need to, and you probably shouldn't. Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting Thu May 19 08:14:36 2016 daemon.notice Tor[10822]: Bootstrapped 0%: Starting Thu May 19 08:14:40 2016 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan) root@Gargoyle:~#
that looks a bit like DDoS rubbish to me. Hope that has nothing to do with it!Code: Select all
kern.debug kernel: [ 62.590000] UDP: bad checksum. From 99.73.8.235:52605 to 103.25.181.95:53 ulen 41
Re: gargoyle-ispy 2016-May-12 09:22.torrent
I have just reproduced the behaviour on a minimal setupnworbnhoj wrote:Enabling the Tor plugin results in a bootloop on my TL-WDR3600 for this build (and some prior builds) - could someone please confirm.
The bootloop is relatively easy to get out of as I have about 100 second to login to the CLI and type firstboot to reset the router.
- Flash this build and set password and timezone
- Configure a PPPoE Internet connection
- Plug a blank USB drive (insufficient room on TL-WDR36600 root for Tor)
- Change plugin root to USB
- Refresh plugins
- Install Tor
- Tor Client: Enable, Toggled by Each Host
- Tor Data Drive: USB
- Save Changes - reboot loop within a couple of minutes
- Tor Client - disabled - router stable
- another model router
- another model router on root drive (ie no USB)
- another TL-WDR3600
Can you help someone else get Gargoyle up and running?
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E
TL-WDR3600 : Gargoyle 1.9.0 : NBN FixedWireless
TL-WR1043ND-V2 : Gargoyle 1.8.0 : 3G Huawei E160E
Re: gargoyle-ispy 2016-May-12 09:22.torrent
I'm at work but from memory the differences are:It would be helpful to test this on:
another model router
another model router on root drive (ie no USB)
another TL-WDR3600
Not using
Code: Select all
Configure a PPPoE Internet connection
Code: Select all
Install Tor
Code: Select all
Change plugin root to USB
Re: gargoyle-ispy 2016-May-12 09:22.torrent
Twitch magically working again on gargoyle on my wdr3600. Maybe isp change from static ip to dynamic ip on wan (which i noticed on stock).
But it is working now, so i am really happy.
But it is working now, so i am really happy.
wdr3600 v1.5 @ Latest ispyisail build
Re: gargoyle-ispy 2016-May-12 09:22.torrent
can you test TOR?scrmtrey wrote:Twitch magically working again on gargoyle on my wdr3600. Maybe isp change from static ip to dynamic ip on wan (which i noticed on stock).
But it is working now, so i am really happy.
Re: gargoyle-ispy 2016-May-12 09:22.torrent
I'm loving this build.
I don't usually use QOS, but for testing purposes I thought I would turn it on.
Web pages are now loading so fast, i'm loving it.
Just using the default settings for QOS
I don't usually use QOS, but for testing purposes I thought I would turn it on.
Web pages are now loading so fast, i'm loving it.
Just using the default settings for QOS
Re: gargoyle-ispy 2016-May-12 09:22.torrent
Not enough space (i could use usb flash i guess but i dont know, im kind lazy today to set it up).
I can test QOS though. I used to use it all the time, but lost my setting for home (mac addresses-ip bind etc). I can use stock setting, just for testing purposes.
I can test QOS though. I used to use it all the time, but lost my setting for home (mac addresses-ip bind etc). I can use stock setting, just for testing purposes.
wdr3600 v1.5 @ Latest ispyisail build