Help installing Tailscale

General discussion about Gargoyle, OpenWrt or anything else even remotely related to the project

Moderator: Moderators

se325919
Posts: 19
Joined: Fri Dec 05, 2025 10:00 pm

Re: Help installing Tailscale

Post by se325919 »

Hi Lantis.
Initially I used a passive USB hub right at the start of my experimentation but quickly realised that the router was not supplying enough power to keep the internal battery of the 4G device charged. It ran out of charge after less than a day and went off. From then on I have been using a powered hub with 2A power supply which is plenty.

Within Gargoyle GUI the USB stick remains set to the USB stick. 'which tailscale' returns '/usr/sbin/tailscale'.

Lantis
Moderator
Posts: 7220
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia
Contact:

Re: Help installing Tailscale

Post by Lantis »

Try opening two SSH sessions.
In one, do “logread -l” (lowercase L)
This will print the system log to the window and print all new entries as they arrive.

Then do your tailscale up in the other window and see if it prints any errors.

It is difficult to advise any further except what changed between now and when it was initially working?
Assuming you added firewall rules and network interfaces, do those still exist ok?
https://lantisproject.com/downloads/gargoylebuilds for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.
https://lantisproject.com/blog

se325919
Posts: 19
Joined: Fri Dec 05, 2025 10:00 pm

Re: Help installing Tailscale

Post by se325919 »

Hi Lantis. I will give that a go when I get home. I didn't create any network interface or firewall rules because I was not able to translate that portion of the instructions from OpenWRT to what I was seeing in Gargoyle.

I will start a new thread soon about the hardware of this router. One notable thing is that this chipset is known to support 2 USB ports (1x USB 2.0 and 1x USB 3.0) so I will try to investigate adding the second USB port.
I also want to explore options to increase the internal memory by possibly swapping the chip, and have 2 possibilities in mind for this.

Does anyone know where to find service manuals or schematics for Netgear/SerComm products?

se325919
Posts: 19
Joined: Fri Dec 05, 2025 10:00 pm

Re: Help installing Tailscale

Post by se325919 »

Lantis wrote:
Mon Dec 15, 2025 3:56 am
Try opening two SSH sessions.
In one, do “logread -l” (lowercase L)
This will print the system log to the window and print all new entries as they arrive.

Then do your tailscale up in the other window and see if it prints any errors.

It is difficult to advise any further except what changed between now and when it was initially working?
Assuming you added firewall rules and network interfaces, do those still exist ok?
I'm trying the logread, Lantis.
Here is a portion of the log.

Code: Select all

Sat Dec 20 07:12:19 2025 daemon.info hostapd: phy1-ap0: STA 4a:d4:42:f8:6a:52 WPA: pairwise key handshake completed (RSN)
Sat Dec 20 07:12:19 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 4a:d4:42:f8:6a:52
Sat Dec 20 07:12:19 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.212 4a:d4:42:f8:6a:52
Sat Dec 20 07:12:19 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.212 4a:d4:42:f8:6a:52
Sat Dec 20 07:12:19 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:12:20 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.212 4a:d4:42:f8:6a:52
Sat Dec 20 07:12:20 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.212 4a:d4:42:f8:6a:52
Sat Dec 20 07:12:24 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:12:24 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:12:28 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:16:27 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:21:39 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:26:09 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.182 34:2e:b7:50:b7:f2
Sat Dec 20 07:26:09 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.182 34:2e:b7:50:b7:f2 new-dell-laptop
Sat Dec 20 07:26:58 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:32:31 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:40:05 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:49:38 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:53:37 2025 daemon.info hostapd: phy0-ap0: STA 12:29:e3:80:11:f6 IEEE 802.11: authenticated
Sat Dec 20 07:53:37 2025 daemon.info hostapd: phy0-ap0: STA 12:29:e3:80:11:f6 IEEE 802.11: associated (aid 1)
Sat Dec 20 07:53:37 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 12:29:e3:80:11:f6 auth_alg=open
Sat Dec 20 07:53:37 2025 daemon.info hostapd: phy0-ap0: STA 12:29:e3:80:11:f6 RADIUS: starting accounting session 567ED06EDC709A3C
Sat Dec 20 07:53:37 2025 daemon.info hostapd: phy0-ap0: STA 12:29:e3:80:11:f6 WPA: pairwise key handshake completed (RSN)
Sat Dec 20 07:53:37 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 12:29:e3:80:11:f6
Sat Dec 20 07:53:37 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.211 12:29:e3:80:11:f6
Sat Dec 20 07:53:37 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.211 12:29:e3:80:11:f6 iPhone
Sat Dec 20 07:53:37 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:53:40 2025 daemon.info hostapd: phy1-ap0: STA 12:29:e3:80:11:f6 IEEE 802.11: authenticated
Sat Dec 20 07:53:40 2025 daemon.info hostapd: phy1-ap0: STA 12:29:e3:80:11:f6 IEEE 802.11: associated (aid 4)
Sat Dec 20 07:53:40 2025 daemon.notice hostapd: phy0-ap0: Prune association for 12:29:e3:80:11:f6
Sat Dec 20 07:53:40 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 12:29:e3:80:11:f6
Sat Dec 20 07:53:40 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 12:29:e3:80:11:f6 auth_alg=open
Sat Dec 20 07:53:40 2025 daemon.info hostapd: phy1-ap0: STA 12:29:e3:80:11:f6 RADIUS: starting accounting session 7D38124A738BF762
Sat Dec 20 07:53:40 2025 daemon.info hostapd: phy1-ap0: STA 12:29:e3:80:11:f6 WPA: pairwise key handshake completed (RSN)
Sat Dec 20 07:53:40 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 12:29:e3:80:11:f6
Sat Dec 20 07:53:40 2025 user.info usteer: station 12:29:e3:80:11:f6 disconnected from node hostapd.phy0-ap0
Sat Dec 20 07:53:42 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:53:46 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:53:53 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 07:54:10 2025 daemon.info hostapd: phy0-ap0: STA 12:29:e3:80:11:f6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 08:01:08 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:07:47 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:12:26 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:21:30 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:27:21 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:35:02 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:38:39 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:40:10 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c WPA: group key handshake completed (RSN)
Sat Dec 20 08:40:10 2025 daemon.info hostapd: phy1-ap0: STA 34:2e:b7:50:b7:f2 WPA: group key handshake completed (RSN)
Sat Dec 20 08:40:10 2025 daemon.notice netifd: wan (3623): udhcpc: sending renew to server 192.168.1.1
Sat Dec 20 08:40:10 2025 daemon.notice netifd: wan (3623): udhcpc: lease of 192.168.1.156 obtained from 192.168.1.1, lease time 43200
Sat Dec 20 08:40:10 2025 daemon.info hostapd: phy1-ap0: STA ac:22:0b:9f:18:2b WPA: group key handshake completed (RSN)
Sat Dec 20 08:40:10 2025 daemon.info hostapd: phy1-ap0: STA 4a:d4:42:f8:6a:52 WPA: group key handshake completed (RSN)
Sat Dec 20 08:40:10 2025 daemon.info hostapd: phy1-ap0: STA 12:29:e3:80:11:f6 WPA: group key handshake completed (RSN)
Sat Dec 20 08:40:20 2025 user.notice firewall: Reloading firewall due to ifupdate of wan (eth1)
Sat Dec 20 08:44:40 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:47:46 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 08:47:46 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 1)
Sat Dec 20 08:47:46 2025 daemon.notice hostapd: phy1-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 08:47:46 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 08:47:46 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 08:47:46 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session 5F810E758485B7DE
Sat Dec 20 08:47:46 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 08:47:46 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 08:47:46 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy1-ap0
Sat Dec 20 08:48:16 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 08:52:18 2025 daemon.notice hostapd: phy0-ap0: BSS-TM-RESP 8e:64:1f:f6:92:8c status_code=0 bss_termination_delay=0 target_bssid=a4:2b:8c:69:76:14
Sat Dec 20 08:52:18 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 08:52:18 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 5)
Sat Dec 20 08:52:18 2025 daemon.notice hostapd: phy0-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 08:52:18 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 08:52:18 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 08:52:18 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session 62DD7C436906BB60
Sat Dec 20 08:52:18 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 08:52:18 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 08:52:19 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy0-ap0
Sat Dec 20 08:52:48 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 08:53:16 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:57:28 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:59:07 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 08:59:07 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 1)
Sat Dec 20 08:59:07 2025 daemon.notice hostapd: phy1-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 08:59:07 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 08:59:07 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 08:59:07 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session 45FB2B8083ACAF85
Sat Dec 20 08:59:07 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 08:59:07 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 08:59:08 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy1-ap0
Sat Dec 20 08:59:21 2025 daemon.info hostapd: phy1-ap0: STA 7c:67:a2:c9:01:35 IEEE 802.11: authenticated
Sat Dec 20 08:59:21 2025 daemon.info hostapd: phy1-ap0: STA 7c:67:a2:c9:01:35 IEEE 802.11: associated (aid 6)
Sat Dec 20 08:59:21 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 7c:67:a2:c9:01:35 auth_alg=open
Sat Dec 20 08:59:21 2025 daemon.info hostapd: phy1-ap0: STA 7c:67:a2:c9:01:35 RADIUS: starting accounting session 79B4786D1EB939E2
Sat Dec 20 08:59:21 2025 daemon.info hostapd: phy1-ap0: STA 7c:67:a2:c9:01:35 WPA: pairwise key handshake completed (RSN)
Sat Dec 20 08:59:21 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 7c:67:a2:c9:01:35
Sat Dec 20 08:59:21 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:59:24 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.124 7c:67:a2:c9:01:35
Sat Dec 20 08:59:24 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.124 7c:67:a2:c9:01:35 IRIS
Sat Dec 20 08:59:25 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:59:29 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 08:59:37 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 09:00:22 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 09:00:22 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 5)
Sat Dec 20 09:00:22 2025 daemon.notice hostapd: phy0-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 09:00:22 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 09:00:22 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 09:00:22 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session BF460FCB483AAC81
Sat Dec 20 09:00:22 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 09:00:22 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 09:00:23 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy0-ap0
Sat Dec 20 09:00:52 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 09:01:12 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:03:12 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 09:03:12 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 1)
Sat Dec 20 09:03:12 2025 daemon.notice hostapd: phy1-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 09:03:12 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 09:03:12 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 09:03:12 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session D6A64206190AFD33
Sat Dec 20 09:03:12 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 09:03:12 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 09:03:12 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy1-ap0
Sat Dec 20 09:03:42 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 09:04:25 2025 daemon.notice hostapd: phy0-ap0: BSS-TM-RESP 8e:64:1f:f6:92:8c status_code=0 bss_termination_delay=0 target_bssid=a4:2b:8c:69:76:14
Sat Dec 20 09:04:25 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: authenticated
Sat Dec 20 09:04:25 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: associated (aid 5)
Sat Dec 20 09:04:25 2025 daemon.notice hostapd: phy0-ap0: Prune association for 8e:64:1f:f6:92:8c
Sat Dec 20 09:04:25 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 8e:64:1f:f6:92:8c
Sat Dec 20 09:04:25 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 8e:64:1f:f6:92:8c auth_alg=open
Sat Dec 20 09:04:25 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c RADIUS: starting accounting session 501EF91B4EBAF7B0
Sat Dec 20 09:04:25 2025 daemon.info hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c WPA: pairwise key handshake completed (RSN)
Sat Dec 20 09:04:25 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 8e:64:1f:f6:92:8c
Sat Dec 20 09:04:26 2025 user.info usteer: station 8e:64:1f:f6:92:8c disconnected from node hostapd.phy0-ap0
Sat Dec 20 09:04:55 2025 daemon.info hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Dec 20 09:09:24 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:17:23 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:21:39 2025 daemon.err tailscaled[5591]: 2025/12/20 09:21:38 c2n: GET /update received
Sat Dec 20 09:21:39 2025 daemon.err tailscaled[5591]: 2025/12/20 09:21:39 c2n: POST /update received
Sat Dec 20 09:21:39 2025 daemon.err tailscaled[5591]: 2025/12/20 09:21:39 c2n: POST /update failed: failed to find cmd/tailscale binary: tailscale executable not found in expected place
Sat Dec 20 09:22:09 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:31:02 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:34:19 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.200 8e:64:1f:f6:92:8c
Sat Dec 20 09:34:19 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.200 8e:64:1f:f6:92:8c Boring
Sat Dec 20 09:36:36 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:40:54 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:47:51 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:52:22 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 09:58:05 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:05:27 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:11:31 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:20:47 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:28:34 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:32:48 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:36:55 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:41:10 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:49:06 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:52:28 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 10:58:21 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:05:55 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:13:30 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:20:50 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:27:24 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:36:39 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:39:27 2025 daemon.err tailscaled[5591]: 2025/12/20 11:39:27 c2n: GET /update received
Sat Dec 20 11:39:27 2025 daemon.err tailscaled[5591]: 2025/12/20 11:39:27 c2n: POST /update received
Sat Dec 20 11:39:27 2025 daemon.err tailscaled[5591]: 2025/12/20 11:39:27 c2n: POST /update failed: failed to find cmd/tailscale binary: tailscale executable not found in expected place
Sat Dec 20 11:40:28 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sat Dec 20 11:48:53 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
I'm not sure what to make of most of it, although I think I can decipher that it is periodically trying to update tailscale but can't because it is not in the expected location. Do you see anything else useful in there?

ispyisail
Moderator
Posts: 5221
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: Help installing Tailscale

Post by ispyisail »

AI reply

1. Tailscale Update Failures
The errors show Tailscale is trying to auto-update but failing:

Code: Select all

c2n: POST /update failed: failed to find cmd/tailscale binary: tailscale executable not found in expected place
This suggests the Tailscale binary wasn't installed in the standard location that Tailscale expects. On OpenWrt/Gargoyle, the binaries are typically in /usr/bin/ or /usr/sbin/, but Tailscale's auto-update mechanism is looking elsewhere.
2. Missing Default Route Warnings
The repeated odhcpd[3489]: No default route present, overriding ra_lifetime! warnings indicate your router doesn't have a default route configured for IPv6. This is likely benign if you're only using IPv4, but it clutters your logs.
3. What's Missing
I don't see any errors related to your actual tailscale up command execution. The log shows normal WiFi operations and DHCP activity, but no indication of what happens when you try to run tailscale up.
Next Steps
When you run tailscale up in your second SSH session, watch the first session with logread -f running. Look specifically for:

Any tailscale daemon messages
Network interface creation/configuration errors
Firewall rule application messages
Authentication-related errors

The update failures shouldn't prevent Tailscale from working, but they might indicate the installation isn't quite right. Can you also check:
bashwhich tailscale

Code: Select all

which tailscaled
ls -la /etc/init.d/tailscale
This will help confirm where things are actually installed.

Lantis
Moderator
Posts: 7220
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia
Contact:

Re: Help installing Tailscale

Post by Lantis »

It looks like the tailscale update script is trying to write to your storage which is (near) full and failing.
The update script needs fixing. I don’t think that is possible without recompiling.

So this is where extroot MIGHT help, but it comes with its own problems and I wouldn’t overly recommend it.
https://lantisproject.com/downloads/gargoylebuilds for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.
https://lantisproject.com/blog

se325919
Posts: 19
Joined: Fri Dec 05, 2025 10:00 pm

Re: Help installing Tailscale

Post by se325919 »

Thanks guys. You are correct that I am not using IPv6.

I hope I have done this correctly.

Code: Select all

root@Gargoyle:~# which tailscaled
t.d/tailscale/usr/sbin/tailscaled
root@Gargoyle:~# ls -la /etc/init.d/tailscale
-rwxr-xr-x    1 root     root          1239 Oct 23 16:39 /etc/init.d/tailscale
root@Gargoyle:~# which tailscale
/usr/sbin/tailscale
Now for the monitoring of logs when connecting and disconnecting via Tailscale from Android phone from WAN.
Here follows the logread -f for the situation outlined (this is a typical use scenario for me):

1 - Engage Tailscale VPN connection on my Android phone which is connected to 4G network (different provider than the network the router is getting its WAN connection from.
2 - Open browser on phone and go to Gargoyle router's webpage (192.168.137.254).
3 - Use Wake-On-Lan section of Gargoyle's GUI to wake up my NAS (192.168.137.222). For some reason my NAS seems to need 2 magic packets in quick succession in order to wake it up. I don't understand why. When I'm away from home I can't see whether it has woken up or not, so you might notice me sending a lot of magic packets to it in the logs before it responds. The timing between the 2 magic packets can't be too long or it doesn't wake up.
4 - In the phone's browser I go to 192.168.137.222 (webpage of the NAS) and keep refreshing until it shows the NAS's login page. That's how I know the NAS has woken up and booted.
5 - Open Ghost Commander on my phone and browse files on the NAS. On this occasion I picked a .webm video file and started playing it on the phone. After watching the first 30 seconds I moved the playhead to nearer the end of the file, and this is where I first got problems. The video froze and would not play. Ghost Commander lost access to the folder on the NAS. I could no longer see Gargoyle or NAS GUIs in the browser. After some time Tailscale on the phone showed "Network map response timeout. Tailscale hasn't received a network map from the coordination server for 2m9s." I toggled the Tailscale VPN connection off and and on again, and this time Tailscale showed "Tailscale can't reach the configured DNS servers. Internet connectivity may be affected." After another toggle on and off I was back in business and could watch and seek through the video file again. This may or may not be significant. I guess this could just have been poor 4G data connection causing this.
6 - After watching the video for some time, I closed it, went back the GUI of my NAS and shutdown the NAS then toggled OFF the Tailscale VPN on the phone. It was shortly after this that the router fell over as it tends to do each time I do this.

The router appears somewhat like it is rebooting in that the Power LED is flashing, but the other LEDs don't go out in the same way as an actual reboot. During the time the power LED is flashing all connected LAN devices lose internet (both wired and wireless), and new devices although they can see the SSID are unable to connect as they are not getting served an IP address. At the same time this is going on, the LED on the USB stick where Tailscale is installed is blinking as if it is trying to read from or write to it. This is where the logs end as the console just hangs with a blinking underscore. It doesn't quit, doesn't say connection terminated or go back to the command prompt, it just hangs, even control+C does nothing. In spite of this, the router does settle itself after a minute or two and resume normal operation, but the console is still hung and all I can do is close the window.

Code: Select all

root@Gargoyle:~# logread -f
Sun Dec 21 13:33:27 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:27 wgengine: Reconfig: [UqhW3] changed from "discokey:1c141fb023e70ed0fc3aeb71253f5e8cc10ad77d4634096b0d74adad13548610" to "discokey:35808321de7aeada4202ea64629c276ebb1d854e6b7313b44ff22a47d785ac6c"
Sun Dec 21 13:33:28 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:28 wgengine: idle peer [UqhW3] now active, reconfiguring WireGuard
Sun Dec 21 13:33:28 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:28 wgengine: Reconfig: configuring userspace WireGuard config (with 1/2 peers)
Sun Dec 21 13:33:29 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:29 Accept: TCP{100.84.162.52:42022 > 100.119.17.15:39238} 60 tcp ok
Sun Dec 21 13:33:29 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:29 Accept: TCP{100.84.162.52:42024 > 100.119.17.15:39238} 60 tcp ok
Sun Dec 21 13:33:29 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:29 Accept: TCP{100.84.162.52:42036 > 100.119.17.15:39238} 60 tcp ok
Sun Dec 21 13:33:38 2025 daemon.err tailscaled[5591]: 2025/12/21 13:33:38 magicsock: endpoints changed: 85.255.235.94:24895 (stun), 85.255.235.94:41641 (stun4localport), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 13:34:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:07 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:34:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:07 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:34:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:07 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:34:28 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:28 Accept: TCP{100.84.162.52:49406 > 192.168.137.254:80} 60 tcp ok
Sun Dec 21 13:34:28 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:28 Accept: TCP{192.168.137.254:80 > 100.84.162.52:49406} 60 ok out
Sun Dec 21 13:34:37 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:37 Accept: TCP{192.168.137.254:80 > 100.84.162.52:49420} 52 ok out
Sun Dec 21 13:34:47 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:47 Accept: TCP{192.168.137.254:80 > 100.84.162.52:49420} 52 ok out
Sun Dec 21 13:34:57 2025 daemon.err tailscaled[5591]: 2025/12/21 13:34:57 Accept: TCP{192.168.137.254:80 > 100.84.162.52:45734} 52 ok out
Sun Dec 21 13:35:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:35:07 Accept: TCP{192.168.137.254:80 > 100.84.162.52:45734} 93 ok out
Sun Dec 21 13:35:17 2025 daemon.err tailscaled[5591]: 2025/12/21 13:35:17 Accept: TCP{100.84.162.52:55814 > 192.168.137.254:80} 52 tcp non-syn
Sun Dec 21 13:35:20 2025 kern.info kernel: [190590.062460] mt7530-mdio mdio-bus:1f lan2: Link is Down
Sun Dec 21 13:35:20 2025 kern.info kernel: [190590.062561] br-lan: port 2(lan2) entered disabled state
Sun Dec 21 13:35:20 2025 daemon.notice netifd: Network device 'lan2' link is down
Sun Dec 21 13:35:24 2025 kern.info kernel: [190594.064861] mt7530-mdio mdio-bus:1f lan2: Link is Up - 10Mbps/Half - flow control off
Sun Dec 21 13:35:24 2025 kern.info kernel: [190594.064928] br-lan: port 2(lan2) entered blocking state
Sun Dec 21 13:35:24 2025 kern.info kernel: [190594.091336] br-lan: port 2(lan2) entered forwarding state
Sun Dec 21 13:35:24 2025 daemon.notice netifd: Network device 'lan2' link is up
Sun Dec 21 13:35:27 2025 daemon.err tailscaled[5591]: 2025/12/21 13:35:27 Accept: TCP{192.168.137.254:80 > 100.84.162.52:49420} 52 ok out
Sun Dec 21 13:35:38 2025 daemon.err tailscaled[5591]: 2025/12/21 13:35:38 Accept: TCP{192.168.137.254:80 > 100.84.162.52:49406} 52 ok out
Sun Dec 21 13:36:09 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:09 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:36:09 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:09 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:36:09 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:09 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:36:20 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:20 Accept: TCP{100.84.162.52:56650 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:36:29 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:29 Accept: TCP{100.84.162.52:55362 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:36:41 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:41 Accept: ICMPv4{192.168.137.254:0 > 100.84.162.52:0} 88 ok out
Sun Dec 21 13:36:50 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:50 Accept: TCP{100.84.162.52:44312 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:36:59 2025 daemon.err tailscaled[5591]: 2025/12/21 13:36:59 Accept: TCP{100.84.162.52:40390 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:37:11 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 13:37:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:37:30 Accept: TCP{100.84.162.52:60208 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:37:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:37:30 Accept: TCP{100.84.162.52:60216 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:37:31 2025 daemon.err tailscaled[5591]: 2025/12/21 13:37:31 Accept: TCP{100.84.162.52:60208 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:10 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:10 Accept: TCP{100.84.162.52:53040 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:10 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:10 Accept: TCP{100.84.162.52:53044 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:11 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:11 Accept: TCP{100.84.162.52:53040 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:20 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:20 Accept: TCP{100.84.162.52:55984 > 192.168.137.254:80} 763 tcp non-syn
Sun Dec 21 13:38:26 2025 kern.info kernel: [190775.865864] mt7530-mdio mdio-bus:1f lan2: Link is Down
Sun Dec 21 13:38:26 2025 kern.info kernel: [190775.865923] br-lan: port 2(lan2) entered disabled state
Sun Dec 21 13:38:26 2025 daemon.notice netifd: Network device 'lan2' link is down
Sun Dec 21 13:38:30 2025 kern.info kernel: [190779.715280] mt7530-mdio mdio-bus:1f lan2: Link is Up - 1Gbps/Full - flow control off
Sun Dec 21 13:38:30 2025 kern.info kernel: [190779.715357] br-lan: port 2(lan2) entered blocking state
Sun Dec 21 13:38:30 2025 kern.info kernel: [190779.741578] br-lan: port 2(lan2) entered forwarding state
Sun Dec 21 13:38:30 2025 daemon.notice netifd: Network device 'lan2' link is up
Sun Dec 21 13:38:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:30 Accept: TCP{192.168.137.254:80 > 100.84.162.52:55990} 52 ok out
Sun Dec 21 13:38:40 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:40 Accept: TCP{100.84.162.52:41602 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:50 2025 daemon.err tailscaled[5591]: 2025/12/21 13:38:50 Accept: TCP{100.84.162.52:52852 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:38:55 2025 kern.info kernel: [190804.753252] mt7530-mdio mdio-bus:1f lan2: Link is Down
Sun Dec 21 13:38:55 2025 kern.info kernel: [190804.753349] br-lan: port 2(lan2) entered disabled state
Sun Dec 21 13:38:55 2025 daemon.notice netifd: Network device 'lan2' link is down
Sun Dec 21 13:38:59 2025 kern.info kernel: [190808.955949] mt7530-mdio mdio-bus:1f lan2: Link is Up - 1Gbps/Full - flow control off
Sun Dec 21 13:38:59 2025 kern.info kernel: [190808.971743] br-lan: port 2(lan2) entered blocking state
Sun Dec 21 13:38:59 2025 kern.info kernel: [190808.982422] br-lan: port 2(lan2) entered forwarding state
Sun Dec 21 13:38:59 2025 daemon.notice netifd: Network device 'lan2' link is up
Sun Dec 21 13:39:00 2025 daemon.info dnsmasq-dhcp[5296]: DHCPDISCOVER(br-lan) 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:00 2025 daemon.info dnsmasq-dhcp[5296]: DHCPOFFER(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:00 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:00 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4 NAS
Sun Dec 21 13:39:01 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 13:39:02 2025 daemon.err tailscaled[5591]: 2025/12/21 13:39:02 Accept: TCP{100.84.162.52:48076 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:39:11 2025 daemon.err tailscaled[5591]: 2025/12/21 13:39:11 Accept: TCP{100.84.162.52:58344 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:39:38 2025 daemon.info dnsmasq-dhcp[5296]: DHCPDISCOVER(br-lan) 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:38 2025 daemon.info dnsmasq-dhcp[5296]: DHCPOFFER(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:38 2025 daemon.info dnsmasq-dhcp[5296]: DHCPREQUEST(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4
Sun Dec 21 13:39:38 2025 daemon.info dnsmasq-dhcp[5296]: DHCPACK(br-lan) 192.168.137.222 2c:b0:5d:be:75:c4 NAS
Sun Dec 21 13:40:14 2025 daemon.err tailscaled[5591]: 2025/12/21 13:40:14 Accept: TCP{100.84.162.52:60802 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 13:40:14 2025 daemon.err tailscaled[5591]: 2025/12/21 13:40:14 Accept: TCP{192.168.137.222:80 > 100.84.162.52:60802} 60 ok out
Sun Dec 21 13:40:14 2025 daemon.err tailscaled[5591]: 2025/12/21 13:40:14 Accept: TCP{100.84.162.52:60802 > 192.168.137.222:80} 52 tcp non-syn
Sun Dec 21 13:40:29 2025 daemon.err tailscaled[5591]: 2025/12/21 13:40:29 Accept: TCP{192.168.137.222:80 > 100.84.162.52:60802} 52 ok out
Sun Dec 21 13:40:37 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 13:42:22 2025 daemon.err tailscaled[5591]: 2025/12/21 13:42:22 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:42:22 2025 daemon.err tailscaled[5591]: 2025/12/21 13:42:22 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:42:23 2025 daemon.err tailscaled[5591]: 2025/12/21 13:42:23 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:42:41 2025 daemon.err tailscaled[5591]: 2025/12/21 13:42:41 Accept: TCP{192.168.137.222:80 > 100.84.162.52:45738} 52 ok out
Sun Dec 21 13:42:45 2025 daemon.err tailscaled[5591]: 2025/12/21 13:42:45 Accept: TCP{192.168.137.222:443 > 100.84.162.52:55520} 89 ok out
Sun Dec 21 13:43:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:43:30 Accept: TCP{100.84.162.52:45738 > 192.168.137.222:80} 52 tcp non-syn
Sun Dec 21 13:43:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:43:30 Accept: TCP{100.84.162.52:55520 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 13:43:30 2025 daemon.err tailscaled[5591]: 2025/12/21 13:43:30 Accept: TCP{100.84.162.52:46488 > 192.168.137.222:443} 60 tcp ok
Sun Dec 21 13:43:46 2025 daemon.err tailscaled[5591]: 2025/12/21 13:43:46 Accept: TCP{192.168.137.222:443 > 100.84.162.52:46494} 89 ok out
Sun Dec 21 13:45:08 2025 daemon.err tailscaled[5591]: 2025/12/21 13:45:08 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:45:08 2025 daemon.err tailscaled[5591]: 2025/12/21 13:45:08 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:45:08 2025 daemon.err tailscaled[5591]: 2025/12/21 13:45:08 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:47:04 2025 daemon.err tailscaled[5591]: 2025/12/21 13:47:04 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:47:04 2025 daemon.err tailscaled[5591]: 2025/12/21 13:47:04 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:47:04 2025 daemon.err tailscaled[5591]: 2025/12/21 13:47:04 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:47:42 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 13:49:09 2025 daemon.err tailscaled[5591]: 2025/12/21 13:49:09 magicsock: endpoints changed: 85.255.235.94:39695 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:24895 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 13:54:34 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:34 Accept: TCP{100.84.162.52:46494 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 13:54:36 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:36 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:54:36 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:36 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:54:44 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:44 Accept: TCP{192.168.137.222:445 > 100.84.162.52:34788} 1280 ok out
Sun Dec 21 13:54:45 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:45 magicsock: endpoints changed: 85.255.235.94:33309 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:24895 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 13:54:54 2025 daemon.err tailscaled[5591]: 2025/12/21 13:54:54 Accept: ICMPv6{[fd7a:115c:a1e0::b901:1111]:0 > [fd7a:115c:a1e0::7001:a236]:0} 128 ok out
Sun Dec 21 13:55:04 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:04 Accept: TCP{100.84.162.52:57356 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 13:55:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:07 magicsock: endpoints changed: 85.255.235.94:55701 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:24895 (stun), 85.255.235.94:33309 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 13:55:14 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:14 Accept: TCP{192.168.137.222:445 > 100.84.162.52:57356} 496 ok out
Sun Dec 21 13:55:24 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:24 Accept: TCP{100.84.162.52:57306 > 192.168.137.222:445} 91 tcp non-syn
Sun Dec 21 13:55:34 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:34 Accept: TCP{100.84.162.52:57312 > 192.168.137.222:445} 91 tcp non-syn
Sun Dec 21 13:55:44 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:44 Accept: TCP{100.84.162.52:57306 > 192.168.137.222:445} 91 tcp non-syn
Sun Dec 21 13:55:54 2025 daemon.err tailscaled[5591]: 2025/12/21 13:55:54 Accept: TCP{192.168.137.222:445 > 100.84.162.52:57322} 91 ok out
Sun Dec 21 13:56:06 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:06 Accept: TCP{100.84.162.52:57312 > 192.168.137.222:445} 91 tcp non-syn
Sun Dec 21 13:56:16 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:16 Accept: TCP{100.84.162.52:43204 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 13:56:25 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:25 Accept: TCP{192.168.137.222:445 > 100.84.162.52:39774} 60 ok out
Sun Dec 21 13:56:36 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:36 Accept: TCP{100.84.162.52:57332 > 192.168.137.222:445} 95 tcp non-syn
Sun Dec 21 13:56:44 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 13:56:45 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:45 Accept: TCP{100.84.162.52:42466 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 13:56:55 2025 daemon.err tailscaled[5591]: 2025/12/21 13:56:55 Accept: TCP{100.84.162.52:58650 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 13:57:05 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:05 Accept: TCP{100.84.162.52:50752 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 13:57:15 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:15 Accept: TCP{100.84.162.52:40430 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 13:57:25 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:25 Accept: TCP{192.168.137.222:445 > 100.84.162.52:40440} 60 ok out
Sun Dec 21 13:57:34 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:34 Accept: TCP{192.168.137.222:445 > 100.84.162.52:40430} 60 ok out
Sun Dec 21 13:57:53 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:53 Accept: TCP{192.168.137.222:445 > 100.84.162.52:50752} 60 ok out
Sun Dec 21 13:57:58 2025 daemon.err tailscaled[5591]: 2025/12/21 13:57:58 Accept: TCP{192.168.137.222:445 > 100.84.162.52:40430} 60 ok out
Sun Dec 21 13:58:07 2025 daemon.err tailscaled[5591]: 2025/12/21 13:58:07 Accept: TCP{192.168.137.222:445 > 100.84.162.52:60296} 60 ok out
Sun Dec 21 13:58:11 2025 daemon.err tailscaled[5591]: 2025/12/21 13:58:11 magicsock: endpoints changed: 85.255.235.94:55701 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:33309 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:00:13 2025 daemon.err tailscaled[5591]: 2025/12/21 14:00:13 magicsock: endpoints changed: 85.255.235.94:15941 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:55701 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:02:06 2025 daemon.err tailscaled[5591]: 2025/12/21 14:02:06 magicsock: endpoints changed: 85.255.235.94:38531 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:55701 (stun), 85.255.235.94:15941 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:04:15 2025 daemon.err tailscaled[5591]: 2025/12/21 14:04:15 magicsock: endpoints changed: 85.255.235.94:55015 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:55701 (stun), 85.255.235.94:38531 (stun), 85.255.235.94:15941 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:05:45 2025 daemon.err tailscaled[5591]: 2025/12/21 14:05:45 magicsock: endpoints changed: 85.255.235.94:63308 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:15941 (stun), 85.255.235.94:38531 (stun), 85.255.235.94:55015 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:06:36 2025 daemon.err tailscaled[5591]: 2025/12/21 14:06:36 magicsock: endpoints changed: 85.255.235.94:63308 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:38531 (stun), 85.255.235.94:55015 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:06:42 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 14:09:26 2025 daemon.err tailscaled[5591]: 2025/12/21 14:09:26 magicsock: endpoints changed: 85.255.235.94:36085 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:63308 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:10:36 2025 daemon.err tailscaled[5591]: 2025/12/21 14:10:36 magicsock: endpoints changed: 85.255.235.94:37436 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:63308 (stun), 85.255.235.94:36085 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:10:53 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 14:11:07 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:07 magicsock: endpoints changed: 85.255.235.94:37497 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:63308 (stun), 85.255.235.94:37436 (stun), 85.255.235.94:36085 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:11:39 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:39 magicsock: endpoints changed: 85.255.235.94:53954 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:63308 (stun), 85.255.235.94:37436 (stun), 85.255.235.94:36085 (stun), 85.255.235.94:37497 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:11:40 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:40 magicsock: [0x31454a0] derp.Recv(derp-8): derp.Recv: read tcp4 192.168.1.156:41842->176.58.88.183:443: read: connection timed out
Sun Dec 21 14:11:40 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:40 health("overall"): error: not connected to home DERP region 8
Sun Dec 21 14:11:40 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:40 derphttp.Client.Recv: connecting to derp-8 (lhr)
Sun Dec 21 14:11:41 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:41 health("overall"): ok
Sun Dec 21 14:11:41 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:41 magicsock: derp-8 connected; connGen=3
Sun Dec 21 14:11:45 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:45 [unexpected] magicsock: derp-8 does not know about peer [UqhW3], removing route
Sun Dec 21 14:11:51 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:51 [unexpected] magicsock: derp-8 does not know about peer [UqhW3], removing route
Sun Dec 21 14:11:53 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:53 Accept: TCP{100.84.162.52:38520 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 14:11:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:54 Accept: TCP{100.84.162.52:42782 > 100.119.17.15:39238} 60 tcp ok
Sun Dec 21 14:11:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:11:54 Accept: TCP{192.168.137.222:445 > 100.84.162.52:38520} 60 ok out
Sun Dec 21 14:12:04 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:04 Accept: TCP{100.84.162.52:37866 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 14:12:08 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:08 magicsock: endpoints changed: 85.255.235.94:53954 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:36085 (stun), 85.255.235.94:37436 (stun), 85.255.235.94:37497 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:12:14 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:14 Accept: TCP{100.84.162.52:38526 > 192.168.137.222:445} 316 tcp non-syn
Sun Dec 21 14:12:24 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:24 Accept: TCP{100.84.162.52:59204 > 192.168.137.222:445} 260 tcp non-syn
Sun Dec 21 14:12:33 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:33 Accept: TCP{100.84.162.52:46546 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:12:44 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:44 Accept: TCP{100.84.162.52:38526 > 192.168.137.222:445} 316 tcp non-syn
Sun Dec 21 14:12:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:12:54 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 115 tcp non-syn
Sun Dec 21 14:13:03 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:03 Accept: TCP{192.168.137.222:445 > 100.84.162.52:58684} 1280 ok out
Sun Dec 21 14:13:13 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:13 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:13:24 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:24 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:13:33 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:33 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:13:44 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:44 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:13:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:13:54 Accept: TCP{100.84.162.52:58684 > 192.168.137.222:445} 52 tcp non-syn
Sun Dec 21 14:14:09 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:09 Accept: TCP{100.84.162.52:51132 > 192.168.137.222:80} 60 tcp ok
Sun Dec 21 14:14:22 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:22 Accept: TCP{100.84.162.52:50836 > 192.168.137.222:443} 782 tcp non-syn
Sun Dec 21 14:14:23 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:23 Accept: TCP{100.84.162.52:50842 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:14:34 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:34 Accept: TCP{100.84.162.52:55984 > 192.168.137.222:443} 606 tcp non-syn
Sun Dec 21 14:14:44 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:44 Accept: TCP{100.84.162.52:50836 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:14:45 2025 daemon.warn odhcpd[3489]: No default route present, overriding ra_lifetime!
Sun Dec 21 14:14:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:54 Accept: TCP{100.84.162.52:50836 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:14:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:14:54 magicsock: endpoints changed: 85.255.235.94:53954 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:37497 (stun), 85.255.235.94:37436 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:15:04 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:04 Accept: TCP{100.84.162.52:55980 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:15:14 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:14 Accept: TCP{100.84.162.52:55980 > 192.168.137.222:443} 40 tcp non-syn
Sun Dec 21 14:15:24 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:24 Accept: TCP{100.84.162.52:46812 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:15:33 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:33 Accept: TCP{100.84.162.52:46812 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:15:43 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:43 Accept: TCP{100.84.162.52:56200 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:15:54 2025 daemon.err tailscaled[5591]: 2025/12/21 14:15:54 Accept: TCP{192.168.137.222:443 > 100.84.162.52:48344} 1280 ok out
Sun Dec 21 14:16:05 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:04 Accept: TCP{100.84.162.52:48348 > 192.168.137.222:443} 52 tcp non-syn
Sun Dec 21 14:16:18 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:16 Accept: TCP{100.84.162.52:54598 > 192.168.137.222:445} 60 tcp ok
Sun Dec 21 14:16:25 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:24 [unexpected] magicsock: derp-8 does not know about peer [UqhW3], removing route
Sun Dec 21 14:16:47 2025 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
Sun Dec 21 14:16:55 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:34 magicsock: endpoints changed: 85.255.235.94:53954 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:37436 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 14:16:55 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:36 [unexpected] magicsock: derp-8 does not know about peer [UqhW3], removing route
Sun Dec 21 14:17:06 2025 daemon.notice hostapd: nl80211: nl80211_recv_beacons->nl_recvmsgs failed: -5
Sun Dec 21 14:17:06 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:50 [unexpected] magicsock: derp-8 does not know about peer [UqhW3], removing route
Sun Dec 21 14:17:06 2025 daemon.err tailscaled[5591]: 2025/12/21 14:16:52 dns udp query: context deadline exceeded
Sun Dec 21 14:17:11 2025 daemon.notice hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy1-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Sun Dec 21 14:17:12 2025 daemon.notice hostapd: phy0-ap0: STA 8e:64:1f:f6:92:8c IEEE 802.11: did not acknowledge authentication response
Now here are the logs captured when typing "tailscale down" followed by "tailscale up".

Code: Select all

root@Gargoyle:~# logread -f
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 EditPrefs: MaskedPrefs{WantRunning=false}
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 control: setPaused(true)
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 control: updateRoutine: awaiting unpause
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 control: authRoutine: awaiting unpause
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 health("overall"): error: state=Stopped, wantRunning=false
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 control: mapRoutine: paused
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 control: mapRoutine: awaiting unpause
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 Switching ipn state Running -> Stopped (WantRunning=false, nm=true)
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 magicsock: SetPrivateKey called (zeroed)
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 magicsock: closing connection to derp-8 (zero-private-key), age 8m47s
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 magicsock: closing connection to derp-14 (zero-private-key), age 7m35s
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 magicsock: 0 active derp conns
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 wgengine: Reconfig: configuring userspace WireGuard config (with 0/0 peers)
Sun Dec 21 16:35:10 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:10 wgengine: Reconfig: configuring router
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 LinkChange: major, rebinding. New state: interfaces.State{defaultRoute=eth1 ifs={br-lan:[192.168.137.254/24 fda6:68ca:f694::1/60 llu6] eth1:[192.168.1.2/24 192.168.1.156/24] tailscale0:[fd7a:115c:a1e0::b901:1111/128 llu6]} v4=true v6=true}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 wgengine: Reconfig: configuring DNS
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Set: {DefaultResolvers:[] Routes:{} SearchDomains:[] Hosts:0}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Resolvercfg: {Routes:{} Hosts:0 LocalDomains:[]}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: OScfg: {}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 LinkChange: major, rebinding. New state: interfaces.State{defaultRoute=eth1 ifs={br-lan:[192.168.137.254/24 fda6:68ca:f694::1/60 llu6] eth1:[192.168.1.2/24 192.168.1.156/24]} v4=true v6=true}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Set: {DefaultResolvers:[] Routes:{} SearchDomains:[] Hosts:0}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Resolvercfg: {Routes:{} Hosts:0 LocalDomains:[]}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: OScfg: {}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 wgengine: set DNS config again after major link change
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Set: {DefaultResolvers:[] Routes:{} SearchDomains:[] Hosts:0}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: Resolvercfg: {Routes:{} Hosts:0 LocalDomains:[]}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 dns: OScfg: {}
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 wgengine: set DNS config again after major link change
Sun Dec 21 16:35:13 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 onPortUpdate(port=41641, network=udp6)
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 onPortUpdate(port=41641, network=udp6)
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:13 onPortUpdate(port=41641, network=udp4)
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 Rebind; defIf="eth1", ips=[192.168.1.2/24 192.168.1.156/24]
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 magicsock: 0 active derp conns
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 magicsock: ReSTUN("link-change-major") ignored; stopped, no private key
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 onPortUpdate(port=41641, network=udp4)
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 Rebind; defIf="eth1", ips=[192.168.1.2/24 192.168.1.156/24]
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 magicsock: 0 active derp conns
Sun Dec 21 16:35:14 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:14 magicsock: ReSTUN("link-change-major") ignored; stopped, no private key
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 EditPrefs: MaskedPrefs{WantRunning=true}
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 transitioning to running; doing Login...
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 control: client.Login(false, 0)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 control: setPaused(false)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 Switching ipn state Stopped -> Starting (WantRunning=true, nm=true)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 control: doLogin(regen=false, hasUrl=false)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 magicsock: SetPrivateKey called (init)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 magicsock: private key changed, reconnecting to home derp-8
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 control: RegisterReq: onode= node=[reNB9] fup=false nks=false
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 magicsock: adding connection to derp-8 for home-keep-alive
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 magicsock: 1 active derp conns: derp-8=cr0s,wr0s
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 derphttp.Client.Recv: connecting to derp-8 (lhr)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 wgengine: Reconfig: configuring userspace WireGuard config (with 0/2 peers)
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 wgengine: Reconfig: configuring router
Sun Dec 21 16:35:20 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:20 control: RegisterReq: got response; nodeKeyExpired=false, machineAuthorized=true; authURL=false
Sun Dec 21 16:35:21 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:21 Switching ipn state Starting -> Running (WantRunning=true, nm=true)
Sun Dec 21 16:35:21 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:21 control: netmap: got new dial plan from control
Sun Dec 21 16:35:21 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:21 magicsock: endpoints changed: 85.255.235.94:64513 (stun), 85.255.235.94:41641 (stun4localport), 85.255.235.94:21036 (stun), 85.255.235.94:40674 (stun), 85.255.235.94:12964 (stun), 192.168.1.2:41641 (local), 192.168.1.156:41641 (local), 192.168.137.254:41641 (local)
Sun Dec 21 16:35:21 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:21 control: netmap: got new dial plan from control
Sun Dec 21 16:35:25 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:25 health("overall"): ok
Sun Dec 21 16:35:25 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:25 magicsock: derp-8 connected; connGen=1
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 wgengine: Reconfig: configuring DNS
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 dns: Set: {DefaultResolvers:[] Routes:{tail0bf2a2.ts.net.:[] ts.net.:[199.247.155.53 2620:111:8007::53]}+65arpa SearchDomains:[tail0bf2a2.ts.net.] Hosts:3}
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 dns: Resolvercfg: {Routes:{.:[127.0.0.1 ::1] ts.net.:[199.247.155.53 2620:111:8007::53]} Hosts:3 LocalDomains:[tail0bf2a2.ts.net.]+65arpa}
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 dns: OScfg: {Nameservers:[100.100.100.100] SearchDomains:[tail0bf2a2.ts.net. home.arpa.] }
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 peerapi: serving on http://100.119.17.15:39238
Sun Dec 21 16:35:26 2025 daemon.err tailscaled[5525]: 2025/12/21 16:35:26 peerapi: serving on http://[fd7a:115c:a1e0::b901:1111]:45255

Lantis
Moderator
Posts: 7220
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia
Contact:

Re: Help installing Tailscale

Post by Lantis »

I don’t know enough about tailscale to advise further sorry.
The crash of the router is what needs investigating in my opinion, and it may be due to space constraints but unsure.

Are you behind CGNAT such that you require tailscale? Would vanilla WireGuard work?
https://lantisproject.com/downloads/gargoylebuilds for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.
https://lantisproject.com/blog

se325919
Posts: 19
Joined: Fri Dec 05, 2025 10:00 pm

Re: Help installing Tailscale

Post by se325919 »

HI Lantis. Yes, the whole reason for having to use Tailscale is because I'm behind the CGNAT, otherwise I would have preferred to use Wireguard. CGNAT seems like it will be something that is going to affect more and more people in the future as mobile internet plans get cheaper and LTE coverage gets more widespread and routers with sim cards grow in popularity. Even I am a complete beginner with Tailscale and only happen to know about it as it was recommended to myself and others on a forum as a Wireguard alternative that could get around the CGNAT issue. Other suggested options were Netbird or Cloudflare Tunnel.

I might try with the USB stick directly into the router rather than in a hub, but that means I will have to use Wireless ISP to get an internet connection which was one of the main reasons for getting a router with a USB port too avoid that initial wifi hop. For testing purposes it will be interesting to see what happens.

Post Reply