Skip to content

Instantly share code, notes, and snippets.

@mrghosh
Created January 13, 2018 09:46
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mrghosh/f69dbca2bb16b7a1e7d835d7e2d1addb to your computer and use it in GitHub Desktop.
Save mrghosh/f69dbca2bb16b7a1e7d835d7e2d1addb to your computer and use it in GitHub Desktop.
ndsctl loglevel 7
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Reading and validating configuration file /tmp/etc/nodogsplash_cfg0221da.conf
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Initializing signal handlers
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Detected gateway br-lan at 192.168.8.1
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Created web server on 192.168.8.1:2050
Sat Jan 13 14:08:05 2018 daemon.notice nodogsplash[25320]: Initializing firewall rules
Sat Jan 13 14:08:07 2018 daemon.notice nodogsplash[25320]: Waiting for connections
Sat Jan 13 14:08:10 2018 daemon.notice nodogsplash[25320]: Set debug loglevel to 7.
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Unlocking config
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Config unlocked
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Exiting ndsctl_loglevel.
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: ndsctl request processed: [loglevel 7]
Sat Jan 13 14:08:10 2018 daemon.debug nodogsplash[25320]: Exiting thread_ndsctl_handler....
Sat Jan 13 14:08:16 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: disassociated
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: authenticated
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 IEEE 802.11: associated (aid 2)
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 RADIUS: starting accounting session F5D402509F8A47F9
Sat Jan 13 14:08:20 2018 daemon.info hostapd: wlan0: STA 28:e3:47:d2:fb:60 WPA: pairwise key handshake completed (RSN)
Sat Jan 13 14:08:20 2018 daemon.info dnsmasq-dhcp[1949]: DHCPREQUEST(br-lan) 192.168.8.125 28:e3:47:d2:fb:60
Sat Jan 13 14:08:20 2018 daemon.info dnsmasq-dhcp[1949]: DHCPACK(br-lan) 192.168.8.125 28:e3:47:d2:fb:60 sourav-windows
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:20 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/connecttest.txt]
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:20 2018 daemon.notice nodogsplash[25320]: Adding 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 to client list
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:20 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:20 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/redirect]
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Client 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 already on client list
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:21 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:21 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.125 for [www.msftconnecttest.com/favicon.ico]
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Client 192.168.8.125 28:e3:47:d2:fb:60 token 5c70e687 already on client list
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:23 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.125
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:23 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Action 2: 192.168.8.125 28:e3:47:d2:fb:60 tokens 5c70e687, 5c70e687
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Redirect: http://www.msftconnecttest.com/redirect
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Locking config
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Config locked
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking config
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Config unlocked
Sat Jan 13 14:08:26 2018 daemon.notice nodogsplash[25320]: Authenticating 192.168.8.125 28:e3:47:d2:fb:60
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsOUT -s 192.168.8.125 -m mac --mac-source 28:e3:47:d2:fb:60 -j MARK --or-mark 0xa400
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25537 to exit
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25537 exited normally, status 0
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsINC -d 192.168.8.125 -j MARK --or-mark 0xa400
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25539 to exit
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25539 exited normally, status 0
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Executing command: iptables -t mangle -A ndsINC -d 192.168.8.125 -j ACCEPT
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Setting default SIGCHLD handler SIG_DFL
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Waiting for PID 25541 to exit
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Process PID 25541 exited normally, status 0
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Restoring previous SIGCHLD handler
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.125
Sat Jan 13 14:08:26 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.125
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:27 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [api.device.xiaomi.net/api/user/device/setting]
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:27 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [sgpac.account.xiaomi.com/pass/passportapi/safe/getPhoneTicket]
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:39 2018 daemon.notice nodogsplash[25320]: Adding 192.168.8.103 4c:49:e3:61:db:5d token e48de5dc to client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [sgpac.account.xiaomi.com/pass/passportapi/safe/getPhoneTicket]
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Locking client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list locked
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Client 192.168.8.103 4c:49:e3:61:db:5d token e48de5dc already on client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Unlocking client list
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Client list unlocked
Sat Jan 13 14:08:39 2018 daemon.info nodogsplash[25320]: Serving splash page /etc/nodogsplash/htdocs/splash.html to 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:39 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Calling httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:47 2018 daemon.info nodogsplash[25320]: Capturing as 404 request from 192.168.8.103 for [api.device.xiaomi.net/api/user/device/setting]
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Returned from httpdProcessRequest() for 192.168.8.103
Sat Jan 13 14:08:47 2018 daemon.debug nodogsplash[25320]: Ended request from 192.168.8.103
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment