Freifunk an Unitymedia

Leider habe ich nichts passendes gefunden, bzw nur (für mich) verwirrende angaben.

Ich habe seit 2 Tagen einen Unitymedia Anschluss.

Erfreut über die erhöhte Bandbreite hänge ich den FF-Router an dir UM-Box, und werde derbe enttäuscht.

Es passiert nichts. gibt es da nen Trick?

MfG
RaggaB

Hallo @Ragga_B,

kannst du mal genau sagen um was für einen Anschluss es sich handelt, und Welche Hardware du von Unitymedia bekommen hast?

Die Community wäre noch nicht Schlecht als Angabe :wink:

Der Anschluss nenn sich Internet Premium 120 (Privatkunden).
Die Box ist eine Technicolor Model:TC7200.U
Die Community ist das Ruhrgebiet-West.

Die Konten: (momentan ohne Kabelverbindung untereinander)
FF-MH-HKS-001 (TP-Link WR1043ND)
FF-MH-HKS-002 (TP-Link CPE210)

MfG
RaggaB

Ok. Ich denke mal du bist so ein DSLite opfer.

Kannst du mal versuchen auf dem Router IPv4 zu deaktivieren? Das hat bei mir oft geholfen.

EDIT: Habe das Thema mal ins Ruhrgebiet verschoben, damit Leute die die Kategorie Abonniert haben auch was mitbekommen

Was für eine MTU-size nutzt ffrg derzeit zu den Fastd-servern? Wenn mehr als 1364, dann wäre das die Erklärung.

Also in Rheinufer haben wir 1406 für fastd und mit Unitymedia keine Probleme.
Oft liegt es einfach daran das die Node bevorzugt wie @stefan es schon schrieb Ipv4 benutzen. Das macht natürlich keinen Sinn da es nicht nativ ist.

Das Technicolor Modem hat zudem Firmware Probleme, wer Unitymedia nutzt sollte sich wenn der Routerzwang endlich weg ist ein anständiges Modem kaufen. Alternativ lässt sich mit Telefon + und/oder Upload Upgrade bei UM eine Fritz.box ergattern welche wesentlich besser ist und bei mir keinerlei Probleme bis jetzt hatte.
Mit dem Technicolor Modem hingegen hatte ich von Tag 1 an Probleme. Techniker von UM haben mir unter der Hand gesagt dass das Technicolor Modem von der Herstellerseite aus eine sehr schlechte Firmware hat und teils nicht 1 Stunde ohne Probleme läuft.

Ich könnte lediglich den DHCP-Server abschalten, oder unter System den „Switch Modus“ ändern.
Dieser steht momentan auf „Router Modus“, „Bridge Modus“ ist auch verfügbar.

MfG
RaggaB

Oje, da kommt die Verwirrung schon.

Wo soll ich versuchen IPv4 abzuschalten? UM-Box oder FF-Router?

MfG
RaggaB

Ich glaube damit war dein Freifunk Node gemeint, dort lässt sich im Config Mode Ipv4 abschalten :slight_smile:

1 „Gefällt mir“

IPv4 auf dem FF-Router deaktiviert, leider keine Besserung.
Die Internetlampe blinkt recht wenig, IP´s werden nicht vergeben :frowning:

MfG
RaggaB

Wenn du per SSH auf den Router kommst wäre die ausgabe von „dmesg“ bzw. „logread“ mal interessant

„keine Besserung“?
Ich hatte den Eingangspost so verstanden, dass es nur langsam ist, so wie mit dem vorherigen Internetanschluss.

Hast Du WAN mesh auf on bei de FF-Routern? Kann sein, dass das diesen komische Unity Box stört. Oder machen die beiden Router nur mesh VPN?

Öh, also IPv4 wieder an und Lokal über die IPv4 Adresse? IPv6 hab ich ja grad nicht.

[quote=„adorfer, post:12, topic:7803, full:true“]
„keine Besserung“? Ich hatte den Eingangspost so verstanden, dass es nur langsam ist, so wie mit dem vorherigen Internetanschluss.[/quote]

Dann habe ich mich nicht ganz klar ausgedrückt, Habe vor 2 Tagen von DSL auf Unitymedia gewechselt, daher die Freude über erhöhte Bandbreite. Eine funktionierende Verbindung hatte ich über der UM-Anschluss leider noch nicht.

MfG
RaggaB

Nein, das TC7200 lässt heftigsten MoW kalt. Ist keine Fritzbox.

WR1043ND, Mesh-VPN + Mesh on LAN
CPE210, Mesh on WAN

MfG
RaggaB

dmesg:
[ 0.000000] Linux version 3.10.49 (pberndro@PB-Ubuntu) (gcc version 4.8.3 (OpenWrt/Linaro GCC 4.8-2014.04 r45951) ) #1 Wed Jul 22 13:20:47 CEST 2015
[ 0.000000] MyLoader: sysp=6fa46994, boardp=69856986, parts=e9f66196
[ 0.000000] bootconsole [early0] enabled
[ 0.000000] CPU revision is: 00019750 (MIPS 74Kc)
[ 0.000000] SoC: Qualcomm Atheros QCA9558 rev 0
[ 0.000000] Clocks: CPU:720.000MHz, DDR:600.000MHz, AHB:200.000MHz, Ref:40.000MHz
[ 0.000000] Determined physical RAM map:
[ 0.000000] memory: 04000000 @ 00000000 (usable)
[ 0.000000] Initrd not found or empty - disabling initrd
[ 0.000000] Zone ranges:
[ 0.000000] Normal [mem 0x00000000-0x03ffffff]
[ 0.000000] Movable zone start for each node
[ 0.000000] Early memory node ranges
[ 0.000000] node 0: [mem 0x00000000-0x03ffffff]
[ 0.000000] On node 0 totalpages: 16384
[ 0.000000] free_area_init_node: node 0, pgdat 80330b60, node_mem_map 81000000
[ 0.000000] Normal zone: 128 pages used for memmap
[ 0.000000] Normal zone: 0 pages reserved
[ 0.000000] Normal zone: 16384 pages, LIFO batch:3
[ 0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
[ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
[ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
[ 0.000000] pcpu-alloc: [0] 0
[ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 16256
[ 0.000000] Kernel command line: board=TL-WR1043ND-v2 console=ttyS0,115200 rootfstype=squashfs,jffs2 noinitrd
[ 0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
[ 0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
[ 0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
[ 0.000000] Writing ErrCtl register=00000000
[ 0.000000] Readback ErrCtl register=00000000
[ 0.000000] Memory: 61076k/65536k available (2355k kernel code, 4460k reserved, 619k data, 288k init, 0k highmem)
[ 0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
[ 0.000000] NR_IRQS:51
[ 0.060000] Calibrating delay loop… 358.80 BogoMIPS (lpj=1794048)
[ 0.060000] pid_max: default: 32768 minimum: 301
[ 0.060000] Mount-cache hash table entries: 512
[ 0.070000] NET: Registered protocol family 16
[ 0.070000] MIPS: machine is TP-LINK TL-WR1043ND v2
[ 0.480000] bio: create slab at 0
[ 0.490000] Switching to clocksource MIPS
[ 0.490000] NET: Registered protocol family 2
[ 0.500000] TCP established hash table entries: 512 (order: 0, 4096 bytes)
[ 0.500000] TCP bind hash table entries: 512 (order: -1, 2048 bytes)
[ 0.510000] TCP: Hash tables configured (established 512 bind 512)
[ 0.510000] TCP: reno registered
[ 0.510000] UDP hash table entries: 256 (order: 0, 4096 bytes)
[ 0.520000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
[ 0.530000] NET: Registered protocol family 1
[ 0.530000] PCI: CLS 0 bytes, default 32
[ 0.540000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[ 0.550000] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[ 0.560000] msgmni has been set to 119
[ 0.560000] io scheduler noop registered
[ 0.570000] io scheduler deadline registered (default)
[ 0.570000] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[ 0.600000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11) is a 16550A
[ 0.610000] console [ttyS0] enabled, bootconsole disabled
[ 0.620000] ath79-spi ath79-spi: master is unqueued, this is deprecated
[ 0.630000] m25p80 spi0.0: found s25fl064k, expected m25p80
[ 0.640000] m25p80 spi0.0: s25fl064k (8192 Kbytes)
[ 0.640000] 5 tp-link partitions found on MTD device spi0.0
[ 0.650000] Creating 5 MTD partitions on „spi0.0“:
[ 0.650000] 0x000000000000-0x000000020000 : „u-boot“
[ 0.660000] 0x000000020000-0x00000012d768 : „kernel“
[ 0.660000] mtd: partition „kernel“ must either start or end on erase block boundary or be smaller than an erase block – forcing read-only
[ 0.680000] 0x00000012d768-0x0000007f0000 : „rootfs“
[ 0.680000] mtd: partition „rootfs“ must either start or end on erase block boundary or be smaller than an erase block – forcing read-only
[ 0.700000] mtd: device 2 (rootfs) set to be root filesystem
[ 0.700000] 1 squashfs-split partitions found on MTD device rootfs
[ 0.710000] 0x000000360000-0x0000007f0000 : „rootfs_data“
[ 0.720000] 0x0000007f0000-0x000000800000 : „art“
[ 0.720000] 0x000000020000-0x0000007f0000 : „firmware“
[ 0.760000] switch0: Atheros AR8327 rev. 4 switch registered on ag71xx-mdio.0
[ 2.010000] libphy: ag71xx_mdio: probed
[ 2.570000] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd034, driver=Atheros AR8216/AR8236/AR8316]
[ 2.580000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
[ 3.130000] eth1: Atheros AG71xx at 0xba000000, irq 5, mode:SGMII
[ 3.140000] TCP: cubic registered
[ 3.150000] NET: Registered protocol family 17
[ 3.150000] Bridge firewalling registered
[ 3.150000] 8021q: 802.1Q VLAN Support v1.8
[ 3.170000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
[ 3.170000] Freeing unused kernel memory: 288K (80348000 - 80390000)
[ 5.920000] eth1: link up (1000Mbps/Full duplex)
[ 9.190000] jffs2: notice: (359) jffs2_build_xattr_subsystem: complete building xattr subsystem, 1 of xdatum (0 unchecked, 0 orphan) and 16 of xref (0 dead, 2 orphan) found.
[ 9.370000] eth1: link down
[ 10.890000] NET: Registered protocol family 10
[ 10.900000] tun: Universal TUN/TAP device driver, 1.6
[ 10.900000] tun: (C) 1999-2004 Max Krasnyansky maxk@qualcomm.com
[ 10.910000] nf_conntrack version 0.5.0 (958 buckets, 3832 max)
[ 10.930000] ip6_tables: (C) 2000-2006 Netfilter Core Team
[ 10.940000] batman_adv: B.A.T.M.A.N. advanced 2014.4.0 (compatibility version 15) loaded
[ 10.960000] u32 classifier
[ 10.960000] input device check on
[ 10.970000] Actions configured
[ 10.970000] Mirror/redirect action on
[ 10.980000] Failed to load ipt action
[ 10.990000] netem: version 1.3
[ 11.010000] Loading modules backported from Linux version master-2014-05-22-0-gf2032ea
[ 11.020000] Backport generated by backports.git backports-20140320-37-g5c33da0
[ 11.040000] Ebtables v2.0 registered
[ 11.060000] ip_tables: (C) 2000-2006 Netfilter Core Team
[ 11.150000] xt_time: kernel timezone is -0000
[ 11.190000] cfg80211: Calling CRDA to update world regulatory domain
[ 11.210000] cfg80211: World regulatory domain updated:
[ 11.210000] cfg80211: DFS Master region: unset
[ 11.220000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[ 11.230000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[ 11.240000] cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[ 11.250000] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A)
[ 11.250000] cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A)
[ 11.260000] cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s)
[ 11.270000] cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s)
[ 11.280000] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
[ 11.290000] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A)
[ 11.370000] ath: EEPROM regdomain: 0x0
[ 11.370000] ath: EEPROM indicates default country code should be used
[ 11.370000] ath: doing EEPROM country->regdmn map search
[ 11.370000] ath: country maps to regdmn code: 0x3a
[ 11.370000] ath: Country alpha2 being used: US
[ 11.370000] ath: Regpair used: 0x3a
[ 11.380000] ieee80211 phy0: Selected rate control algorithm ‚minstrel_ht‘
[ 11.400000] cfg80211: Calling CRDA for country: US
[ 11.400000] cfg80211: Regulatory domain changed to country: US
[ 11.410000] cfg80211: DFS Master region: FCC
[ 11.410000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[ 11.420000] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 3000 mBm), (N/A)
[ 11.430000] cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz), (N/A, 1700 mBm), (N/A)
[ 11.440000] cfg80211: (5250000 KHz - 5330000 KHz @ 80000 KHz), (N/A, 2300 mBm), (0 s)
[ 11.450000] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 3000 mBm), (N/A)
[ 11.460000] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 4000 mBm), (N/A)
[ 11.470000] ieee80211 phy0: Atheros AR9550 Rev:0 mem=0xb8100000, irq=47
[ 21.860000] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[ 21.880000] device eth0 entered promiscuous mode
[ 21.880000] br-wan: port 1(eth0) entered forwarding state
[ 21.890000] br-wan: port 1(eth0) entered forwarding state
[ 21.940000] eth1: link up (1000Mbps/Full duplex)
[ 21.980000] IPv6: ADDRCONF(NETDEV_UP): br-client: link is not ready
[ 22.000000] device br-client entered promiscuous mode
[ 22.000000] IPv6: ADDRCONF(NETDEV_UP): local-node: link is not ready
[ 22.270000] batman_adv: bat0: Adding interface: eth1
[ 22.270000] batman_adv: bat0: The MTU of interface eth1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 22.300000] batman_adv: bat0: Interface activated: eth1
[ 22.310000] 8021q: adding VLAN 0 to HW filter on device bat0
[ 22.310000] device bat0 entered promiscuous mode
[ 22.320000] br-client: port 1(bat0) entered forwarding state
[ 22.320000] br-client: port 1(bat0) entered forwarding state
[ 22.330000] IPv6: ADDRCONF(NETDEV_CHANGE): br-client: link becomes ready
[ 22.380000] IPv6: ADDRCONF(NETDEV_CHANGE): local-node: link becomes ready
[ 23.130000] br-wan: port 1(eth0) entered disabled state
[ 23.560000] cfg80211: Calling CRDA for country: DE
[ 23.560000] cfg80211: Regulatory domain changed to country: DE
[ 23.570000] cfg80211: DFS Master region: ETSI
[ 23.570000] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[ 23.580000] cfg80211: (2400000 KHz - 2483000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[ 23.590000] cfg80211: (5150000 KHz - 5250000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
[ 23.600000] cfg80211: (5250000 KHz - 5350000 KHz @ 80000 KHz), (N/A, 2000 mBm), (0 s)
[ 23.610000] cfg80211: (5470000 KHz - 5725000 KHz @ 80000 KHz), (N/A, 2700 mBm), (0 s)
[ 23.610000] cfg80211: (57240000 KHz - 65880000 KHz @ 2160000 KHz), (N/A, 4000 mBm), (N/A)
[ 23.740000] batman_adv: bat0: Adding interface: mesh-vpn
[ 23.750000] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1280) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 23.770000] batman_adv: bat0: Interface activated: mesh-vpn
[ 23.780000] batman_adv: bat0: no_rebroadcast: Changing from: disabled to: enabled
[ 23.900000] batman_adv: bat0: Changing gw mode from: off to: client
[ 23.910000] batman_adv: bat0: hop_penalty: Changing from: 30 to: 15
[ 23.910000] batman_adv: bat0: multicast_mode: Changing from: enabled to: disabled
[ 23.950000] batman_adv: bat0: orig_interval: Changing from: 1000 to: 5000
[ 24.130000] eth0: link up (1000Mbps/Full duplex)
[ 24.180000] br-wan: port 1(eth0) entered forwarding state
[ 24.180000] br-wan: port 1(eth0) entered forwarding state
[ 24.190000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 24.320000] br-client: port 1(bat0) entered forwarding state
[ 25.610000] IPv6: ADDRCONF(NETDEV_UP): client0: link is not ready
[ 25.650000] device client0 entered promiscuous mode
[ 25.680000] br-client: port 2(client0) entered forwarding state
[ 25.680000] br-client: port 2(client0) entered forwarding state
[ 25.690000] IPv6: ADDRCONF(NETDEV_CHANGE): client0: link becomes ready
[ 25.880000] IPv6: ADDRCONF(NETDEV_UP): mesh0: link is not ready
[ 25.910000] mesh0: Created IBSS using preconfigured BSSID 02:ee:13:37:ff:01
[ 25.910000] mesh0: Creating new IBSS network, BSSID 02:ee:13:37:ff:01
[ 25.920000] IPv6: ADDRCONF(NETDEV_CHANGE): mesh0: link becomes ready
[ 26.100000] batman_adv: bat0: Adding interface: mesh0
[ 26.110000] batman_adv: bat0: Interface activated: mesh0
[ 26.180000] br-wan: port 1(eth0) entered forwarding state
[ 27.680000] br-client: port 2(client0) entered forwarding state

logread:
Fri Sep 11 15:27:14 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:27:14 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:15 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[89.163.150.86:10000]…
Fri Sep 11 15:27:15 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:27:15 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[89.163.150.87:10004]…
Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[89.163.150.86:10002]…
Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:27:17 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:18 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[89.163.150.86:10004]…
Fri Sep 11 15:27:18 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:27:18 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:19 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[89.163.150.86:10003]…
Fri Sep 11 15:27:19 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:27:19 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:30 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[[2001:4ba0:ffff:1c6::87]:10002]…
Fri Sep 11 15:27:30 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:27:30 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:33 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest021>[[2001:4ba0:ffff:1c6::87]:10000]…
Fri Sep 11 15:27:33 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest021>... Fri Sep 11 15:27:33 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest023>[[2001:4ba0:ffff:1c6::87]:10003]…
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[[2001:4ba0:ffff:1c6::86]:10002]…
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[[2001:4ba0:ffff:1c6::86]:10000]…
Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:27:36 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:37 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[[2001:4ba0:ffff:1c6::86]:10003]…
Fri Sep 11 15:27:37 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:27:37 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:38 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[[2001:4ba0:ffff:1c6::87]:10004]…
Fri Sep 11 15:27:38 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:27:38 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:39 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[[2001:4ba0:ffff:1c6::86]:10004]…
Fri Sep 11 15:27:39 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:27:39 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:48 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[89.163.150.87:10002]…
Fri Sep 11 15:27:48 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:27:48 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:52 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest021>[89.163.150.87:10000]…
Fri Sep 11 15:27:52 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest021>... Fri Sep 11 15:27:52 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest023>[89.163.150.87:10003]…
Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[89.163.150.86:10003]…
Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:27:56 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[89.163.150.86:10000]…
Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[89.163.150.86:10002]…
Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:27:58 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:27:59 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[89.163.150.86:10004]…
Fri Sep 11 15:27:59 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:27:59 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:28:00 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[89.163.150.87:10004]…
Fri Sep 11 15:28:00 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:28:00 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:28:10 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[[2001:4ba0:ffff:1c6::87]:10002]…
Fri Sep 11 15:28:10 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:28:10 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:28:12 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest021>[[2001:4ba0:ffff:1c6::87]:10000]…
Fri Sep 11 15:28:12 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest021>... Fri Sep 11 15:28:12 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:28:16 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest023>[[2001:4ba0:ffff:1c6::87]:10003]…
Fri Sep 11 15:28:16 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:28:16 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:28:17 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[[2001:4ba0:ffff:1c6::86]:10004]…
Fri Sep 11 15:28:17 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:28:17 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[[2001:4ba0:ffff:1c6::86]:10003]…
Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[[2001:4ba0:ffff:1c6::86]:10002]…
Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:28:18 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:28:19 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[[2001:4ba0:ffff:1c6::86]:10000]…
Fri Sep 11 15:28:19 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:28:19 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:28:20 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[[2001:4ba0:ffff:1c6::87]:10004]…
Fri Sep 11 15:28:20 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:28:20 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:28:29 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[89.163.150.87:10002]…
Fri Sep 11 15:28:29 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:28:29 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest021>[89.163.150.87:10000]…
Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest021>... Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest023>[89.163.150.87:10003]…
Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:40:19 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:20 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[89.163.150.86:10004]…
Fri Sep 11 15:40:20 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:40:20 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:24 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[89.163.150.86:10002]…
Fri Sep 11 15:40:24 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:40:24 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:25 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[89.163.150.86:10003]…
Fri Sep 11 15:40:25 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:40:25 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:26 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[89.163.150.86:10000]…
Fri Sep 11 15:40:26 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:40:26 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:27 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[89.163.150.87:10004]…
Fri Sep 11 15:40:27 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:40:27 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:33 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[[2001:4ba0:ffff:1c6::87]:10002]…
Fri Sep 11 15:40:33 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:40:33 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest023>[[2001:4ba0:ffff:1c6::87]:10003]…
Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest023>... Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest014>[[2001:4ba0:ffff:1c6::86]:10004]…
Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest014>... Fri Sep 11 15:40:39 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:41 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest021>[[2001:4ba0:ffff:1c6::87]:10000]…
Fri Sep 11 15:40:41 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest021>... Fri Sep 11 15:40:41 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:43 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest012>[[2001:4ba0:ffff:1c6::86]:10002]…
Fri Sep 11 15:40:43 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest012>... Fri Sep 11 15:40:43 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:44 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest013>[[2001:4ba0:ffff:1c6::86]:10003]…
Fri Sep 11 15:40:44 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest013>... Fri Sep 11 15:40:44 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:46 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_1_peer_rgwest011>[[2001:4ba0:ffff:1c6::86]:10000]…
Fri Sep 11 15:40:46 2015 daemon.info fastd[1400]: resolving host rg-west01.freifunk.ruhr' for peer <mesh_vpn_backbone_1_peer_rgwest011>... Fri Sep 11 15:40:46 2015 daemon.info fastd[1400]: resolved host rg-west01.freifunk.ruhr’ successfully
Fri Sep 11 15:40:48 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest024>[[2001:4ba0:ffff:1c6::87]:10004]…
Fri Sep 11 15:40:48 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest024>... Fri Sep 11 15:40:48 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully
Fri Sep 11 15:40:53 2015 daemon.info fastd[1400]: sending handshake to <mesh_vpn_backbone_2_peer_rgwest022>[89.163.150.87:10002]…
Fri Sep 11 15:40:53 2015 daemon.info fastd[1400]: resolving host rg-west02.freifunk.ruhr' for peer <mesh_vpn_backbone_2_peer_rgwest022>... Fri Sep 11 15:40:53 2015 daemon.info fastd[1400]: resolved host rg-west02.freifunk.ruhr’ successfully

Mesh on Wan klappt an meiner Fritzbox zuhause super :wink: Hab den Uplink via Raspi und dafür natürlich Mesh on Wan.
Ich denke das diese Probleme eher Software bezogen sind oder etwas mit den lokalen Einstellungen zu tun hat. Möglich ist natürlich auch das Unitymedia Netz vor Ort.

@Ragga_B
Es sieht aus als ob die Handshakes gar nicht erst durch gehen. Kannst du evtl mittels tracepath mal prüfen welche MTU für dich am besten wäre?
z.b. mit einem Linux Laptop:

pi@raspbmc:~$ tracepath6 -n rg-west02.freifunk.ruhr
 1?: [LOCALHOST]                        0.323ms pmtu 1500
 1:  2a02:908:1341:cc60:3681:c4ff:fed7:5e08                2.154ms 
 1:  2a02:908:1341:cc60:3681:c4ff:fed7:5e08                1.729ms 
 2:  no reply
 3:  2a02:908:0:2e9::1                                    12.646ms asymm  4 
 4:  no reply
 5:  2001:4ba0:dead:fefe::2                               18.405ms asymm 11 
 6:  2001:4ba0:ffff:1c6::87                               19.918ms reached
     Resume: pmtu 1500 hops 6 back 53

Für Windows gibt es da bestimmt auch passende Programme. :smile:

hab nen Mac, muss ich dafür nen packet installieren?