VPN Tunnel baut nicht auf

info at michael-arlt.de info at michael-arlt.de
Sa Feb 11 14:36:36 CET 2017


 

Servus,

ich hoffe ihr koennt mir weiterhelfen. Hab es im IRC channel auch schon
versucht.
Es geht um meinen Knoten phantomFF
https://monitoring.freifunk-franken.de/routers/5633adca44ce6e071cafd6a3
[1] welcher an einer FritzBox angeschlossen ist. Die Fritte sieht die
lokale IP und ich komme per WAN ipv6 an ssh und http ran. Das
Netzwerkkabel steckt am ersten gelben port (LAN1). Neu gestertet hab ich
die Kiste auch schon paar mal. 

root at phantomFF:~# uci show
alfred.alfred=alfred
alfred.alfred.interface='br-mesh'
alfred.alfred.mode='slave'
alfred.alfred.batmanif='bat0'
alfred.alfred.start_vis='0'
alfred.alfred.run_facters='0'
batman-adv.bat0=mesh
batman-adv.bat0.gw_mode='client'
batman-adv.bat0.gw_sel_class='1'
batman-adv.bat0.bridge_loop_avoidance='0'
batman-adv.bat0.network_coding='0'
board.model=model
board.model.name='tl-wr1043nd-v2'
dropbear. at dropbear[0]=dropbear
dropbear. at dropbear[0].PasswordAuth='on'
dropbear. at dropbear[0].RootPasswordAuth='on'
dropbear. at dropbear[0].Port='22'
fastd.sample_config=fastd
fastd.sample_config.enabled='0'
fastd.sample_config.syslog_level='info'
fastd.sample_config.method='salsa2012+umac'
fastd.sample_config.mode='tap'
fastd.sample_config.interface='tap0'
fastd.sample_config.mtu='1426'
fastd.sample_config.forward='0'
fastd.sample_config.secure_handshakes='1'
fastd.sample_peer=peer
fastd.sample_peer.enabled='0'
fastd.sample_peer.net='sample_config'
fastd.sample_peer.key='0000000000000000000000000000000000000000000000000000000000000000'
fastd.sample_group=peer_group
fastd.sample_group.enabled='0'
fastd.sample_group.net='sample_config'
firmware.upgrade=upgrade
firmware.upgrade.path='http://[fe80::ff:feee:1%br-mesh]/dev/firmware/current'
firmware.upgrade.remote='1'
firmware.upgrade.auto='1'
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.w2mesh=interface
network.w2mesh.mtu='1532'
network.w2mesh.proto='batadv'
network.w2mesh.mesh='bat0'
network.mesh=interface
network.mesh.type='bridge'
network.mesh.auto='1'
network.mesh.ifname='eth0.1 bat0'
network.mesh.macaddr='30:b5:c2:3e:87:30'
network.mesh.ip6addr='fdff:0::30b5:c23e:8730/64' 'fdff:0::1/64'
'fdff:0::32b5:c2ff:fe3e:8730/64'
network.mesh.proto='static'
network.wan=interface
network.wan.proto='dhcp'
network.wan.ifname='eth0.2'
network.ethmesh=interface
network.ethmesh.mtu='1532'
network.ethmesh.proto='batadv'
network.ethmesh.mesh='bat0'
network.ethmesh.ifname='eth0.3'
network.bat=interface
network.bat.ifname='bat0'
network.bat.mtu='1500'
network.eth0=switch
network.eth0.name='ag71xx-mdio.0'
network.eth0.enable='1'
network.eth0.reset='1'
network.eth0.enable_vlan='1'
network.eth0_1=switch_vlan
network.eth0_1.device='ag71xx-mdio.0'
network.eth0_1.vlan='1'
network.eth0_1.ports='1 2 6t'
network.eth0_2=switch_vlan
network.eth0_2.device='ag71xx-mdio.0'
network.eth0_2.vlan='2'
network.eth0_2.ports='5 6t'
network.eth0_3=switch_vlan
network.eth0_3.device='ag71xx-mdio.0'
network.eth0_3.vlan='3'
network.eth0_3.ports='3 4 6t'
network.globals=globals
network.globals.ula_prefix='fdff:0::/64'
nodewatcher. at script[0]=script
nodewatcher. at script[0].error_level='0'
nodewatcher. at script[0].logfile='/var/log/nodewatcher.log'
nodewatcher. at script[0].data_file='/tmp/crawldata/node.data'
nodewatcher. at script[0].status_text_file='/tmp/status.txt'
nodewatcher. at network[0]=network
nodewatcher. at network[0].mesh_interface='br-mesh'
nodewatcher. at network[0].iface_blacklist='lo ifb0'
nodewatcher. at network[0].ip_whitelist='br-mesh'
nodewatcher. at network[0].client_interfaces='eth0.1 w2ap'
qos.wan=interface
qos.wan.classgroup='Default'
qos.wan.enabled='1'
qos.wan.overhead='1'
qos.wan.upload='128'
qos.wan.download='1024'
qos. at classify[0]=classify
qos. at classify[0].target='Bulk'
qos. at classify[0].layer7='edonkey'
qos. at classify[1]=classify
qos. at classify[1].target='Bulk'
qos. at classify[1].layer7='bittorrent'
qos. at classify[2]=classify
qos. at classify[2].target='Priority'
qos. at classify[2].ports='22,53'
qos. at classify[3]=classify
qos. at classify[3].target='Normal'
qos. at classify[3].proto='tcp'
qos. at classify[3].ports='20,21,25,80,110,443,993,995'
qos. at classify[4]=classify
qos. at classify[4].target='Express'
qos. at classify[4].ports='5190'
qos. at default[0]=default
qos. at default[0].target='Express'
qos. at default[0].proto='udp'
qos. at default[0].pktsize='-500'
qos. at reclassify[0]=reclassify
qos. at reclassify[0].target='Priority'
qos. at reclassify[0].proto='icmp'
qos. at default[1]=default
qos. at default[1].target='Bulk'
qos. at default[1].portrange='1024-65535'
qos. at reclassify[1]=reclassify
qos. at reclassify[1].target='Priority'
qos. at reclassify[1].proto='tcp'
qos. at reclassify[1].pktsize='-128'
qos. at reclassify[1].mark='!Bulk'
qos. at reclassify[1].tcpflags='SYN'
qos. at reclassify[2]=reclassify
qos. at reclassify[2].target='Priority'
qos. at reclassify[2].proto='tcp'
qos. at reclassify[2].pktsize='-128'
qos. at reclassify[2].mark='!Bulk'
qos. at reclassify[2].tcpflags='ACK'
qos.Default=classgroup
qos.Default.classes='Priority Express Normal Bulk'
qos.Default.default='Normal'
qos.Priority=class
qos.Priority.packetsize='400'
qos.Priority.maxsize='400'
qos.Priority.avgrate='10'
qos.Priority.priority='20'
qos.Priority_down=class
qos.Priority_down.packetsize='1000'
qos.Priority_down.avgrate='10'
qos.Express=class
qos.Express.packetsize='1000'
qos.Express.maxsize='800'
qos.Express.avgrate='50'
qos.Express.priority='10'
qos.Normal=class
qos.Normal.packetsize='1500'
qos.Normal.packetdelay='100'
qos.Normal.avgrate='10'
qos.Normal.priority='5'
qos.Normal_down=class
qos.Normal_down.avgrate='20'
qos.Bulk=class
qos.Bulk.avgrate='1'
qos.Bulk.packetdelay='200'
simple-tc.example=interface
simple-tc.example.enabled='0'
simple-tc.example.ifname='eth0'
simple-tc.example.limit_egress='1000'
simple-tc.example.limit_ingress='5000'
system. at system[0]=system
system. at system[0].hostname='phantomFF'
system. at system[0].timezone='CET-1CEST,M3.5.0,M10.5.0/3'
system. at system[0].latitude='49.48254427'
system. at system[0].longitude='10.99767387'
system. at system[0].position_comment='Am Praterweiher'
system.status_led_green=led
system.status_led_green.name='status'
system.status_led_green.sysfs='tp-link:green:system'
system.status_led_green.trigger='heartbeat'
system.status_led_blue=led
system.status_led_blue.name='status'
system.status_led_blue.sysfs='tp-link:blue:system'
system.status_led_blue.trigger='heartbeat'
system.led_vpn_green=led
system.led_vpn_green.name='VPN'
system.led_vpn_green.sysfs='tp-link:green:qss'
system.led_vpn_green.trigger='netdev'
system.led_vpn_green.dev='fffVPN'
system.led_vpn_green.mode='link'
system.led_vpn_blue=led
system.led_vpn_blue.name='VPN'
system.led_vpn_blue.sysfs='tp-link:blue:qss'
system.led_vpn_blue.trigger='netdev'
system.led_vpn_blue.dev='fffVPN'
system.led_vpn_blue.mode='link'
system.led_usb=led
system.led_usb.name='USB'
system.led_usb.sysfs='tp-link:green:usb'
system.led_usb.trigger='usbdev'
system.led_usb.dev='1-1'
system.led_usb.interval='50'
system.led_wlan=led
system.led_wlan.name='WLAN'
system.led_wlan.sysfs='tp-link:green:wlan'
system.led_wlan.trigger='phy0tpt'
timeserver. at timeserver[0]=timeserver
timeserver. at timeserver[0].hostname='time.fu-berlin.de'
uhttpd.public=uhttpd
uhttpd.public.listen_http='80'
uhttpd.public.home='/www/public'
uhttpd.public.rfc1918_filter='1'
uhttpd.public.cgi_prefix='/cgi-bin'
uhttpd.public.script_timeout='60'
uhttpd.public.network_timeout='30'
uhttpd.public.tcp_keepalive='1'
uhttpd.public.config='_'
uhttpd.ssl=uhttpd
uhttpd.ssl.listen_https='443'
uhttpd.ssl.home='/www/ssl'
uhttpd.ssl.rfc1918_filter='1'
uhttpd.ssl.cert='/etc/uhttpd.crt'
uhttpd.ssl.key='/etc/uhttpd.key'
uhttpd.ssl.cgi_prefix='/cgi-bin'
uhttpd.ssl.script_timeout='60'
uhttpd.ssl.network_timeout='30'
uhttpd.ssl.tcp_keepalive='1'
uhttpd.ssl.config='/etc/httpd.conf'
uhttpd.px5g=cert
uhttpd.px5g.days='1400'
uhttpd.px5g.bits='2048'
uhttpd.px5g.commonname='OpenWrt'
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.channel='1'
wireless.radio0.phy='phy0'
wireless.radio0.hwmode='11g'
wireless.radio0.htmode='HT20'
wireless.radio0.country='DE'
wireless. at wifi-iface[0]=wifi-iface
wireless. at wifi-iface[0].device='radio0'
wireless. at wifi-iface[0].network='w2mesh'
wireless. at wifi-iface[0].ifname='w2mesh'
wireless. at wifi-iface[0].mode='adhoc'
wireless. at wifi-iface[0].bssid='02:CA:FF:EE:BA:BE'
wireless. at wifi-iface[0].ssid='batman.franken.freifunk.net'
wireless. at wifi-iface[0].mcast_rate='6000'
wireless. at wifi-iface[0].encryption='none'
wireless. at wifi-iface[1]=wifi-iface
wireless. at wifi-iface[1].device='radio0'
wireless. at wifi-iface[1].network='mesh'
wireless. at wifi-iface[1].ifname='w2ap'
wireless. at wifi-iface[1].mode='ap'
wireless. at wifi-iface[1].ssid='franken.freifunk.net'
wireless. at wifi-iface[1].encryption='none'
wireless.wan_radio0=wifi-iface
wireless.wan_radio0.device='radio0'
wireless.wan_radio0.network='wan'
wireless.wan_radio0.mode='ap'
wireless.wan_radio0.encryption='psk2'
wireless.wan_radio0.ssid='xxxxxxx'
wireless.wan_radio0.key='xxxxxxx'
wireless.wan_radio0.disabled='1' 

ich wollte auch ein neues image installieren, aber auch das geht nicht
weil der nginx keine seite ausliefert :( 
https://dev.freifunk-franken.de/firmware/20170110/ [2] 

Danke und Gruss, 
Micha 

Links:
------
[1]
https://monitoring.freifunk-franken.de/routers/5633adca44ce6e071cafd6a3
[2] https://dev.freifunk-franken.de/firmware/20170110/
-------------- nächster Teil --------------
Ein Dateianhang mit HTML-Daten wurde abgetrennt...
URL: <http://lists.freifunk.net/pipermail/franken-dev-freifunk.net/attachments/20170211/aa5840cc/attachment.html>


Mehr Informationen über die Mailingliste franken-dev