Created
January 13, 2018 09:46
-
-
Save mrghosh/f69dbca2bb16b7a1e7d835d7e2d1addb to your computer and use it in GitHub Desktop.
ndsctl loglevel 7
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Reading and validating configuration file /tmp/etc/nodogsplash_cfg0221da.conf | |
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Initializing signal handlers | |
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Detected gateway br-lan at 192.168.8.1 | |
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Created web server on 192.168.8.1:2050 | |
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Initializing firewall rules | |
Sat Jan 13 14:08:07 2018 daemon.notice nodogsplash[25320]: Waiting for connections | |
Sat Jan 13 14:08:10 2018 daemon.notice nodogsplash[25320]: Set debug loglevel to 7. | |
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Unlocking config | |
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Config unlocked | |
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Exiting ndsctl_loglevel. | |
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: ndsctl request processed: [loglevel 7] | |
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Exiting thread_ndsctl_handler.... | |
Sat Jan 13 14:08:16 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: disassociated | |
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: authenticated | |
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: associated (aid 2) | |
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 RADIUS: starting accounting session F5D402509F8A47F9 | |
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 WPA: pairwise key handshake completed (RSN) | |
Sat Jan 13 14:08:20 2018 daemon.info dnsmasq-dhcp[1949]: DHCPREQUEST(br-lan) 192.168.8.125 28:e3:47:d2:fb:60 | |
Sat Jan 13 14:08:20 2018 daemon.info dnsmasq-dhcp[1949]: DHCPACK(br-lan) 192.168.8.125 28:e3:47:d2:fb:60 sourav-windows | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:20 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/connecttest.txt] | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:20 2018 daemon.notice nodogsplash[25320]: Adding 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 to client list | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:20 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125 | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125 | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/redirect] | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Client 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 already on client list | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125 | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125 | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/favicon.ico] | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Client 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 already on client list | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125 | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Action 2: 192.168.8.125 28:e3:47:d2:fb:60 tokens 5c70e687, 5c70e687 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Redirect: http://www.msftconnecttest.com/redirect | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking config | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Config locked | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking config | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Config unlocked | |
Sat Jan 13 14:08:26 2018 daemon.notice nodogsplash[25320]: Authenticating 192.168.8.125 28:e3:47:d2:fb:60 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsOUT -s 192.168.8.125 -m mac --mac-source 28:e3:47:d2:fb:60 -j MARK --or-mark 0xa400 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25537 to exit | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25537 exited normally, status 0 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsINC -d 192.168.8.125 -j MARK --or-mark 0xa400 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25539 to exit | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25539 exited normally, status 0 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsINC -d 192.168.8.125 -j ACCEPT | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25541 to exit | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25541 exited normally, status 0 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125 | |
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125 | |
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:27 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [api.device.xiaomi.net/api/user/device/setting] | |
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [sgpac.account.xiaomi.com/pass/passportapi/safe/getPhoneTicket] | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:39 2018 daemon.notice nodogsplash[25320]: Adding 192.168.8.103 4c:49:e3:61:db:5d token e48de5dc to client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [sgpac.account.xiaomi.com/pass/passportapi/safe/getPhoneTicket] | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Locking client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list locked | |
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Client 192.168.8.103 4c:49:e3:61:db:5d token e48de5dc already on client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Unlocking client list | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list unlocked | |
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103 | |
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:47 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [api.device.xiaomi.net/api/user/device/setting] | |
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103 | |
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment