[Librecmc-users] Another Upgrade Failure

Michael Vincent mcv at protonmail.com
Wed Apr 11 16:01:15 EDT 2018


Looks like the log file is too big for the listserv (it's about 90 KB; the limit is 40 KB). Any suggestions?

Below is more command output.

--MV

Output of 'uci show network':
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd30:bbea:0c8b::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth1'
network.lan.proto='static'
network.lan.ipaddr='192.168.10.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.wan=interface
network.wan.ifname='eth0'
network.wan.proto='dhcp'
network.wan6=interface
network.wan6.ifname='eth0'
network.wan6.proto='dhcpv6'

Output of 'uci show firewall':
firewall. at defaults[0]=defaults
firewall. at defaults[0].syn_flood='1'
firewall. at defaults[0].input='ACCEPT'
firewall. at defaults[0].output='ACCEPT'
firewall. at defaults[0].forward='REJECT'
firewall. at zone[0]=zone
firewall. at zone[0].name='lan'
firewall. at zone[0].network='lan'
firewall. at zone[0].input='ACCEPT'
firewall. at zone[0].output='ACCEPT'
firewall. at zone[0].forward='ACCEPT'
firewall. at zone[1]=zone
firewall. at zone[1].name='wan'
firewall. at zone[1].network='wan' 'wan6'
firewall. at zone[1].input='REJECT'
firewall. at zone[1].output='ACCEPT'
firewall. at zone[1].forward='REJECT'
firewall. at zone[1].masq='1'
firewall. at zone[1].mtu_fix='1'
firewall. at forwarding[0]=forwarding
firewall. at forwarding[0].src='lan'
firewall. at forwarding[0].dest='wan'
firewall. at rule[0]=rule
firewall. at rule[0].name='Allow-DHCP-Renew'
firewall. at rule[0].src='wan'
firewall. at rule[0].proto='udp'
firewall. at rule[0].dest_port='68'
firewall. at rule[0].target='ACCEPT'
firewall. at rule[0].family='ipv4'
firewall. at rule[1]=rule
firewall. at rule[1].name='Allow-Ping'
firewall. at rule[1].src='wan'
firewall. at rule[1].proto='icmp'
firewall. at rule[1].icmp_type='echo-request'
firewall. at rule[1].family='ipv4'
firewall. at rule[1].target='ACCEPT'
firewall. at rule[2]=rule
firewall. at rule[2].name='Allow-IGMP'
firewall. at rule[2].src='wan'
firewall. at rule[2].proto='igmp'
firewall. at rule[2].family='ipv4'
firewall. at rule[2].target='ACCEPT'
firewall. at rule[3]=rule
firewall. at rule[3].name='Allow-DHCPv6'
firewall. at rule[3].src='wan'
firewall. at rule[3].proto='udp'
firewall. at rule[3].src_ip='fc00::/6'
firewall. at rule[3].dest_ip='fc00::/6'
firewall. at rule[3].dest_port='546'
firewall. at rule[3].family='ipv6'
firewall. at rule[3].target='ACCEPT'
firewall. at rule[4]=rule
firewall. at rule[4].name='Allow-MLD'
firewall. at rule[4].src='wan'
firewall. at rule[4].proto='icmp'
firewall. at rule[4].src_ip='fe80::/10'
firewall. at rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall. at rule[4].family='ipv6'
firewall. at rule[4].target='ACCEPT'
firewall. at rule[5]=rule
firewall. at rule[5].name='Allow-ICMPv6-Input'
firewall. at rule[5].src='wan'
firewall. at rule[5].proto='icmp'
firewall. at rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall. at rule[5].limit='1000/sec'
firewall. at rule[5].family='ipv6'
firewall. at rule[5].target='ACCEPT'
firewall. at rule[6]=rule
firewall. at rule[6].name='Allow-ICMPv6-Forward'
firewall. at rule[6].src='wan'
firewall. at rule[6].dest='*'
firewall. at rule[6].proto='icmp'
firewall. at rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall. at rule[6].limit='1000/sec'
firewall. at rule[6].family='ipv6'
firewall. at rule[6].target='ACCEPT'
firewall. at rule[7]=rule
firewall. at rule[7].name='Allow-IPSec-ESP'
firewall. at rule[7].src='wan'
firewall. at rule[7].dest='lan'
firewall. at rule[7].proto='esp'
firewall. at rule[7].target='ACCEPT'
firewall. at rule[8]=rule
firewall. at rule[8].name='Allow-ISAKMP'
firewall. at rule[8].src='wan'
firewall. at rule[8].dest='lan'
firewall. at rule[8].dest_port='500'
firewall. at rule[8].proto='udp'
firewall. at rule[8].target='ACCEPT'
firewall. at include[0]=include
firewall. at include[0].path='/etc/firewall.user'

Output of 'uci show dhcp':
dhcp. at dnsmasq[0]=dnsmasq
dhcp. at dnsmasq[0].domainneeded='1'
dhcp. at dnsmasq[0].boguspriv='1'
dhcp. at dnsmasq[0].filterwin2k='0'
dhcp. at dnsmasq[0].localise_queries='1'
dhcp. at dnsmasq[0].rebind_protection='1'
dhcp. at dnsmasq[0].rebind_localhost='1'
dhcp. at dnsmasq[0].local='/lan/'
dhcp. at dnsmasq[0].domain='lan'
dhcp. at dnsmasq[0].expandhosts='1'
dhcp. at dnsmasq[0].nonegcache='0'
dhcp. at dnsmasq[0].authoritative='1'
dhcp. at dnsmasq[0].readethers='1'
dhcp. at dnsmasq[0].leasefile='/tmp/dhcp.leases'
dhcp. at dnsmasq[0].resolvfile='/tmp/resolv.conf.auto'
dhcp. at dnsmasq[0].localservice='1'
dhcp.lan=dhcp
dhcp.lan.interface='lan'
dhcp.lan.start='100'
dhcp.lan.limit='150'
dhcp.lan.leasetime='12h'
dhcp.lan.dhcpv6='server'
dhcp.lan.ra='server'
dhcp.wan=dhcp
dhcp.wan.interface='wan'
dhcp.wan.ignore='1'
dhcp.odhcpd=odhcpd
dhcp.odhcpd.maindhcp='0'
dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd'
dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update'
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.librecmc.org/pipermail/librecmc-users/attachments/20180411/97705cb9/attachment-0001.html>


More information about the Librecmc-users mailing list