NE8UB94T root@Wicrypt:~# spikesplash [7][Wed Nov 13 07:49:46 2024][16391](conf.c:333) add_ruleset(): Creating Firewall Ruleset trusted-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:333) add_ruleset(): Creating Firewall Ruleset trusted-users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:333) add_ruleset(): Creating Firewall Ruleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:333) add_ruleset(): Creating Firewall Ruleset authenticated-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:333) add_ruleset(): Creating Firewall Ruleset preauthenticated-users [6][Wed Nov 13 07:49:46 2024][16391](main.c:448) Reading and validating configuration file /etc/wicrypt/config/spikesplash.conf [6][Wed Nov 13 07:49:46 2024][16391](conf.c:753) Reading configuration file '/etc/wicrypt/config/spikesplash.conf' [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: GatewayInterface, arg: br-lan [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: login_option_enabled, arg: 0 [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: FirewallRuleSet, arg: authenticated-users { [7][Wed Nov 13 07:49:46 2024][16391](conf.c:445) Parsing FirewallRuleSet authenticated-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow all] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow all port (null) to 0.0.0.0/0 to FirewallRuleset authenticated-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:508) FirewallRuleSet authenticated-users parsed. [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: FirewallRuleSet, arg: preauthenticated-users { [7][Wed Nov 13 07:49:46 2024][16391](conf.c:445) Parsing FirewallRuleSet preauthenticated-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 443 to 52.28.136.23] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 443 to 52.28.136.23 to FirewallRuleset preauthenticated-users [7][Wed Nov 13 07:49:46 2024][16391](conf.c:508) FirewallRuleSet preauthenticated-users parsed. [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: FirewallRuleSet, arg: users-to-router { [7][Wed Nov 13 07:49:46 2024][16391](conf.c:445) Parsing FirewallRuleSet users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow udp port 53] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow udp port 53 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 53] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 53 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow udp port 67] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow udp port 67 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 23] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 23 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 22] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 22 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 80] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 80 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 443] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 443 to 0.0.0.0/0 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 8080 to 192.168.0.1] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 8080 to 192.168.0.1 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:492) p1 = [FirewallRule]; p2 = [allow tcp port 4719 to 192.168.0.1] [7][Wed Nov 13 07:49:46 2024][16391](conf.c:653) Adding FirewallRule allow tcp port 4719 to 192.168.0.1 to FirewallRuleset users-to-router [7][Wed Nov 13 07:49:46 2024][16391](conf.c:508) FirewallRuleSet users-to-router parsed. [7][Wed Nov 13 07:49:46 2024][16391](conf.c:796) Parsing option: MaxClients, arg: 100 [6][Wed Nov 13 07:49:46 2024][16391](conf.c:1097) Done reading configuration file '/etc/wicrypt/config/spikesplash.conf' [6][Wed Nov 13 07:49:46 2024][16391](main.c:456) Initializing signal handlers [7][Wed Nov 13 07:49:46 2024][16391](main.c:218) Setting SIGCHLD handler to sigchld_handler() [7][Wed Nov 13 07:49:46 2024][16391](main.c:234) Setting SIGPIPE handler to SIG_IGN [7][Wed Nov 13 07:49:46 2024][16391](main.c:242) Setting SIGTERM, SIGQUIT, SIGINT handlers to termination_handler() [6][Wed Nov 13 07:49:46 2024][16391](main.c:461) JediMaster: Hello Wicrypt [5][Wed Nov 13 07:49:46 2024][16391](main.c:462) Starting as a daemon, forking to background root@Wicrypt:~# [7][Wed Nov 13 07:49:46 2024][16392](main.c:466) I am the child process running the main_loop() [6][Wed Nov 13 07:49:46 2024][16392](util.c:151) Operating System Uptime: 1494 seconds [6][Wed Nov 13 07:49:46 2024][16392](main.c:292) main: System up time is 1494 seconds [7][Wed Nov 13 07:49:46 2024][16392](util.c:325) Executing command: sh /etc/wicrypt/shellscripts/splash_page.sh deviceSsid [7][Wed Nov 13 07:49:46 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL cat: can't open '/etc/wireless/mediatek/mt7916.dbdc.b0.dat': No such file or directory [7][Wed Nov 13 07:49:46 2024][16392](util.c:325) Executing command: sh /etc/wicrypt/shellscripts/splash_page.sh deviceBssid [7][Wed Nov 13 07:49:46 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [6][Wed Nov 13 07:49:46 2024][16392](main.c:299) Router SSID: [6][Wed Nov 13 07:49:46 2024][16392](main.c:301) Router BSSID: 78:A7:5A:A8:3F:4C [6][Wed Nov 13 07:49:46 2024][16392](main.c:306) WWAN autoconfig start ... [6][Wed Nov 13 07:49:46 2024][16392](auth.c:1858) Start Running get_startup_files_from_shell() command [7][Wed Nov 13 07:49:46 2024][16392](util.c:486) get_startup_files_from_shell() step 1 [7][Wed Nov 13 07:49:46 2024][16392](util.c:501) startup_files_command sh /etc/wicrypt/shellscripts/splash_page.sh release [7][Wed Nov 13 07:49:46 2024][16392](util.c:325) Executing command: sh /etc/wicrypt/shellscripts/splash_page.sh release [7][Wed Nov 13 07:49:46 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [6][Wed Nov 13 07:49:52 2024][16392](auth.c:1860) End Running get_startup_files_from_shell() command [7][Wed Nov 13 07:49:52 2024][16392](auth.c:1644) start updating device info from device_info.json file [6][Wed Nov 13 07:49:52 2024][16392](auth.c:1699) In Second Condition ... [7][Wed Nov 13 07:49:52 2024][16392](auth.c:1740) end updating device info from device_info.json file [7][Wed Nov 13 07:49:52 2024][16392](auth.c:1742) start updating device info from image files [7][Wed Nov 13 07:49:52 2024][16392](auth.c:1793) end updating device info from image files [6][Wed Nov 13 07:49:52 2024][16392](main.c:323) Setting started_time [7][Wed Nov 13 07:49:52 2024][16392](main.c:335) Finding IP address of br-lan [5][Wed Nov 13 07:49:52 2024][16392](main.c:353) Detected gateway br-lan at 192.168.4.4 (78:a7:5a:a8:3f:4f) [5][Wed Nov 13 07:49:52 2024][16392](main.c:365) Created web server on 192.168.4.4:5000 [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:705) Locking config [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:705) Config locked [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:708) Unlocking config [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:708) Config unlocked [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:711) Destroying our tc hooks [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: tc qdisc del dev br-lan root > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: tc qdisc del dev ifb0 root > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: ip link set ifb0 down [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:715) Destroying our iptables entries [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:718) Destroying chains in the MANGLE table [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeTRU in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:804) Deleting rule 3 from mangle.PREROUTING because it mentions spikeTRU [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -D PREROUTING 3 > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeTRU in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:52 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeBLK in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:804) Deleting rule 2 from mangle.PREROUTING because it mentions spikeBLK [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -D PREROUTING 2 > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeBLK in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:52 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeALW in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:52 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeOUT in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:804) Deleting rule 1 from mangle.PREROUTING because it mentions spikeOUT [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -D PREROUTING 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeOUT in chain PREROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:52 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeINC in chain POSTROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:804) Deleting rule 1 from mangle.POSTROUTING because it mentions spikeINC [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -D POSTROUTING 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](fw_iptables.c:786) Checking all mention of spikeINC in chain POSTROUTING of table mangle [7][Wed Nov 13 07:49:52 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:52 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -F spikeTRU > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -F spikeBLK > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -F spikeALW > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -F spikeOUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -F spikeINC > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -X spikeTRU > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -X spikeBLK > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:52 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -X spikeALW > /dev/null 2>&1 [7][Wed Nov 13 07:49:52 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -X spikeOUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -X spikeINC > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:737) Destroying chains in the NAT table [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeOUT in chain PREROUTING of table nat [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:804) Deleting rule 1 from nat.PREROUTING because it mentions spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -D PREROUTING 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeOUT in chain PREROUTING of table nat [7][Wed Nov 13 07:49:53 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:53 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -F spikeOUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -X spikeOUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:745) Destroying chains in the FILTER table [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeRTR in chain INPUT of table filter [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:804) Deleting rule 1 from filter.INPUT because it mentions spikeRTR [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -D INPUT 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeRTR in chain INPUT of table filter [7][Wed Nov 13 07:49:53 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:53 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeNET in chain FORWARD of table filter [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:804) Deleting rule 1 from filter.FORWARD because it mentions spikeNET [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -D FORWARD 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:786) Checking all mention of spikeNET in chain FORWARD of table filter [7][Wed Nov 13 07:49:53 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:53 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -F spikeRTR > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -F spikeNET > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -F spikeAUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -F spikeTRU > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -F spikeTRT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -X spikeRTR > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -X spikeNET > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -X spikeAUT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -X spikeTRU > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -X spikeTRT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [5][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:363) Initializing firewall rules [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:365) Locking config [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:365) Config locked [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:398) Unlocking config [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:398) Config unlocked [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables -V [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [6][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:106) Iptables mark Preauthenticated: 0x0 [6][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:109) Iptables mark Authenticated: 0x30000 [6][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:112) Iptables mark Trusted: 0x20000 [6][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:115) Iptables mark Blocked: 0x10000 [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -I PREROUTING 1 -j MARK --or-mark 0x10000 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -D PREROUTING 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:128) Kernel supports --or-mark. [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -I FORWARD 1 -m mark --mark 0x10000/0x30000 -j REJECT > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -D FORWARD 1 > /dev/null 2>&1 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:138) Kernel supports mark masking. [6][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:147) Iptables mark op "--or-mark" and mark mask "/0x30000". [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -N spikeTRU [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -N spikeBLK [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -N spikeALW [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -N spikeINC [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -N spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -I PREROUTING 1 -i br-lan -s 0.0.0.0/0 -j spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -I PREROUTING 2 -i br-lan -s 0.0.0.0/0 -j spikeBLK [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -I PREROUTING 3 -i br-lan -s 0.0.0.0/0 -j spikeTRU [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t mangle -I POSTROUTING 1 -o br-lan -d 0.0.0.0/0 -j spikeINC [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:474) Start Initializing Traffic Control !!! [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: tc qdisc del dev br-lan root [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL RTNETLINK answers: No such file or directory [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: tc qdisc add dev br-lan root handle 1: hfsc default 2 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: tc class add dev br-lan parent 1: classid 1:1 hfsc sc rate 300240kbit ul rate 300240kbit [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: tc class add dev br-lan parent 1:1 classid 1:2 hfsc sc rate 30024kbit ul rate 30024kbit [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:476) End Initializing Traffic Control !!! [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -N spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -I PREROUTING -i br-lan -s 0.0.0.0/0 -j spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -A spikeOUT -m mark --mark 0x20000/0x30000 -j RETURN [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -A spikeOUT -m mark --mark 0x30000/0x30000 -j RETURN [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:274) Loading ruleset preauthenticated-users into table nat, chain spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:278) Loading rule "-t nat -A spikeOUT -d 52.28.136.23 -p tcp --dport 443 -j ACCEPT" into table nat, chain spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -A spikeOUT -d 52.28.136.23 -p tcp --dport 443 -j ACCEPT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](fw_iptables.c:283) Ruleset preauthenticated-users loaded into table nat, chain spikeOUT [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -A spikeOUT -p tcp --dport 80 -j DNAT --to-destination 192.168.4.4:5000 [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t nat -A spikeOUT -j ACCEPT [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -N spikeNET [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:53 2024][16392](util.c:325) Executing command: iptables --wait -t filter -N spikeRTR [7][Wed Nov 13 07:49:53 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -N spikeAUT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -N spikeTRU [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -N spikeTRT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -I INPUT -i br-lan -s 0.0.0.0/0 -j spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -m mark --mark 0x10000/0x30000 -j DROP [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -m conntrack --ctstate INVALID -j DROP [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -p tcp --tcp-flags SYN SYN \! --tcp-option 2 -j DROP [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -p tcp --dport 5000 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -m mark --mark 0x20000/0x30000 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:274) Loading ruleset users-to-router into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p udp --dport 53 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 53 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p udp --dport 67 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 23 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 23 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 22 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 22 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 80 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 80 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 443 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 0.0.0.0/0 -p tcp --dport 443 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 192.168.0.1 -p tcp --dport 8080 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 192.168.0.1 -p tcp --dport 8080 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeRTR -d 192.168.0.1 -p tcp --dport 4719 -j ACCEPT" into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -d 192.168.0.1 -p tcp --dport 4719 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:283) Ruleset users-to-router loaded into table filter, chain spikeRTR [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeRTR -j REJECT --reject-with icmp-port-unreachable [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -I FORWARD -i br-lan -s 0.0.0.0/0 -j spikeNET [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -m mark --mark 0x10000/0x30000 -j DROP [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -m conntrack --ctstate INVALID -j DROP [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -m mark --mark 0x20000/0x30000 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -m mark --mark 0x30000/0x30000 -j spikeAUT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeAUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:274) Loading ruleset authenticated-users into table filter, chain spikeAUT [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeAUT -d 0.0.0.0/0 -p all -j ACCEPT" into table filter, chain spikeAUT [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeAUT -d 0.0.0.0/0 -p all -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:283) Ruleset authenticated-users loaded into table filter, chain spikeAUT [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeAUT -j REJECT --reject-with icmp-port-unreachable [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:274) Loading ruleset preauthenticated-users into table filter, chain spikeNET [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:278) Loading rule "-t filter -A spikeNET -d 52.28.136.23 -p tcp --dport 443 -j ACCEPT" into table filter, chain spikeNET [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -d 52.28.136.23 -p tcp --dport 443 -j ACCEPT [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:283) Ruleset preauthenticated-users loaded into table filter, chain spikeNET [7][Wed Nov 13 07:49:54 2024][16392](util.c:325) Executing command: iptables --wait -t filter -A spikeNET -j REJECT --reject-with icmp-port-unreachable [7][Wed Nov 13 07:49:54 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL [7][Wed Nov 13 07:49:54 2024][16392](auth.c:3261) File, client traffic : /etc/wicrypt/database/client_traffic.json [6][Wed Nov 13 07:49:54 2024][16392](util.c:627) File does not exist ... We will try again shortly [6][Wed Nov 13 07:49:54 2024][16392](auth.c:3273) Unable to delete the file [7][Wed Nov 13 07:49:54 2024][16392](auth.c:3278) File content : [3][Wed Nov 13 07:49:54 2024][16392](auth.c:3363) Error occured while reading file. Json format is invalid [6][Wed Nov 13 07:49:54 2024][16392](main.c:432) Spike Alive [7][Wed Nov 13 07:49:54 2024][16392](auth.c:270) setting fw_client_list_balance_check_flag to 1 [7][Wed Nov 13 07:49:54 2024][16392](auth.c:278) Locking client list [7][Wed Nov 13 07:49:54 2024][16392](auth.c:278) Client list locked [7][Wed Nov 13 07:49:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:49:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:1285) mac_list: ; ip_list: ; email_list:; in_data_list: ; out_data_list: ; last_updated: Wed Nov 13 07:49:54 2024 [7][Wed Nov 13 07:49:54 2024][16392](fw_iptables.c:1288) Authenticated Client Count: 0, All client count: 0 [7][Wed Nov 13 07:49:54 2024][16392](auth.c:304) Unlocking client list [7][Wed Nov 13 07:49:54 2024][16392](auth.c:304) Client list unlocked [7][Wed Nov 13 07:49:54 2024][16392](auth.c:306) setting fw_client_list_balance_check_flag to 0 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:22 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:22 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1458) Locking client list [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1458) Client list locked [5][Wed Nov 13 07:50:22 2024][16392](client_list.c:158) Adding 192.168.4.230 f4:96:34:1c:11:be token 8523cbee to client list [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1460) Unlocking client list [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1460) Client list unlocked [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:22 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:22 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:22 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:22 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:22 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:22 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:22 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:394) access: GET /spikesplash_auth/ [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:396) user_agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36 Edg/130.0.0.0 [7][Wed Nov 13 07:50:45 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:45 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:542) Query string is [ ?tok=fcd8af68&redir=redir&reference=DF_XXXXXXXXX&form_type=custom_code_login&phone=07069956581&code=EXB78GES ] [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:547) form_reference=DF_XXXXXXXXX [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:552) form_data= [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:562) form_type=custom_code_login [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:1038) Custom_Code_login........ [7][Wed Nov 13 07:50:45 2024][16392](http_microhttpd.c:1049) Custom Code Server Auth Starting Code: EXB78GES and phone number: 07069956581 [6][Wed Nov 13 07:50:45 2024][16392](auth.c:2862) Hash output in Main: a1597da623f9dfeee3a614154cc3baf736e66b6fd70a747731048ae891947813 [7][Wed Nov 13 07:50:45 2024][16392](auth.c:2870) Voucher Auth params: {"phoneNumber": "07069956581", "customCode": "EXB78GES", "ssid": " ", "clientMacAddress": "f4:96:34:1c:11:be", "clientIp": "192.168.4.230", "formData": {}, "formReference": "DF_XXXXXXXXX"} [7][Wed Nov 13 07:50:45 2024][16392](util.c:325) Executing command: sh /etc/wicrypt/shellscripts/splash_page.sh deviceMode [7][Wed Nov 13 07:50:45 2024][16392](util.c:328) Setting default SIGCHLD handler SIG_DFL > POST /api/v1/hotspot-hub/auth/custom-code/78:A7:5A:A8:3F:4C HTTP/1.1 Host: device-api-stg.wicrypt.com Accept: */* X-auth:HMac a1597da623f9dfeee3a614154cc3baf736e66b6fd70a747731048ae891947813 x-customer-id:78:A7:5A:A8:3F:4C Content-Type: application/json Content-Length: 188 < HTTP/1.1 401 Unauthorized < Server: nginx/1.24.0 (Ubuntu) < Date: Wed, 13 Nov 2024 07:50:49 GMT < Content-Length: 0 < Connection: keep-alive < [7][Wed Nov 13 07:50:49 2024][16392](auth.c:2941) HTTP Response Code: 401 [3][Wed Nov 13 07:50:49 2024][16392](auth.c:2951) Server auth is not successful (HTTP 401) libcurl: (0) No error Response cod: 401[7][Wed Nov 13 07:50:49 2024][16392](auth.c:2274) [7][Wed Nov 13 07:50:54 2024][16392](auth.c:270) setting fw_client_list_balance_check_flag to 1 [7][Wed Nov 13 07:50:54 2024][16392](auth.c:278) Locking client list [7][Wed Nov 13 07:50:54 2024][16392](auth.c:278) Client list locked [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:50:54 2024][16392](fw_iptables.c:1285) mac_list: ; ip_list: ; email_list:; in_data_list: ; out_data_list: ; last_updated: Wed Nov 13 07:50:54 2024 [7][Wed Nov 13 07:50:54 2024][16392](fw_iptables.c:1288) Authenticated Client Count: 0, All client count: 1 [7][Wed Nov 13 07:50:54 2024][16392](auth.c:304) Unlocking client list [7][Wed Nov 13 07:50:54 2024][16392](auth.c:304) Client list unlocked [7][Wed Nov 13 07:50:54 2024][16392](auth.c:306) setting fw_client_list_balance_check_flag to 0 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1076) Custom Code Server Auth Error ... [6][Wed Nov 13 07:50:54 2024][16392](util.c:151) Operating System Uptime: 1562 seconds [6][Wed Nov 13 07:50:54 2024][16392](util.c:167) Uncorrected NDS Uptime: 62 seconds [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2419) Advert not enabled [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /imageone.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36 Edg/130.0.0.0 [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /imageone.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /imageone.png ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /imagetwo.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36 Edg/130.0.0.0 [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /imagetwo.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /imagetwo.png ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /imagethree.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36 Edg/130.0.0.0 [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /imagethree.png [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /imagethree.png ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /imagefour [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36 Edg/130.0.0.0 [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /imagefour [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /imagefour ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:50:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:50:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:50:54 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:51:24 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:24 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:51:24 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:51:24 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:51:25 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:25 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:51:25 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:51:25 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued ^C root@Wicrypt:~# [7][Wed Nov 13 07:51:54 2024][16392](auth.c:270) setting fw_client_list_balance_check_flag to 1 [7][Wed Nov 13 07:51:54 2024][16392](auth.c:278) Locking client list [7][Wed Nov 13 07:51:54 2024][16392](auth.c:278) Client list locked [7][Wed Nov 13 07:51:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:51:54 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:54 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [7][Wed Nov 13 07:51:54 2024][16392](fw_iptables.c:1285) mac_list: ; ip_list: ; email_list:; in_data_list: ; out_data_list: ; last_updated: Wed Nov 13 07:51:54 2024 [7][Wed Nov 13 07:51:54 2024][16392](fw_iptables.c:1288) Authenticated Client Count: 0, All client count: 1 [7][Wed Nov 13 07:51:54 2024][16392](auth.c:304) Unlocking client list [7][Wed Nov 13 07:51:54 2024][16392](auth.c:304) Client list unlocked [7][Wed Nov 13 07:51:54 2024][16392](auth.c:306) setting fw_client_list_balance_check_flag to 0 [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:51:55 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:55 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:394) access: GET /connecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:396) user_agent: Microsoft NCSI [7][Wed Nov 13 07:51:55 2024][16392](main.c:117) SIGCHLD handler: Trying to reap a child [7][Wed Nov 13 07:51:55 2024][16392](main.c:125) SIGCHLD handler: waitpid(): No child exists now. [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:526) Is Captive Portal Status: 1 [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:542) Query string is [ ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:547) form_reference=(null) [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:562) form_type=(null) [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1653) url: /connecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1663) preauthenticated: Requested Host is [ www.msftconnecttest.com ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1664) preauthenticated: Requested url is [ /connecttest.txt ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1665) preauthenticated: Gateway Address is [ 192.168.4.4:5000 ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1666) preauthenticated: Gateway Port is [ 5000 ] [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:1807) Separator is [&]. [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2009) Query string is [ ] [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd_utils.c:64) URL encoded string: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt, length: 54 [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2013) originurl: http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2074) splashpageurl: http://192.168.4.4:5000/captive_portal.html?redir=http%3a%2f%2fwww.msftconnecttest.com%2fconnecttest.txt [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2091) send_redirect_temp: MHD_create_response_from_buffer [6][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2115) send_redirect_temp: Queueing response for 192.168.4.230, f4:96:34:1c:11:be [7][Wed Nov 13 07:51:55 2024][16392](http_microhttpd.c:2125) send_redirect_temp: Response is Queued client_loop: send disconnect: Connection reset