Thu Aug 29 21:07:48 2019 daemon.notice fastd[28112]: fastd v18 starting
Thu Aug 29 21:07:48 2019 daemon.notice netifd: Interface 'mesh_vpn' is enabled
Thu Aug 29 21:07:48 2019 daemon.notice netifd: Network device 'mesh-vpn' link is up
Thu Aug 29 21:07:48 2019 daemon.notice netifd: Interface 'mesh_vpn' has link connectivity
Thu Aug 29 21:07:48 2019 daemon.notice netifd: Interface 'mesh_vpn' is setting up now
Thu Aug 29 21:07:48 2019 daemon.notice fastd[28112]: changed to UID 0, GID 800
Thu Aug 29 21:07:48 2019 daemon.info fastd[28112]: adding peer <mesh_vpn_backbone_peer_vpn4>
Thu Aug 29 21:07:48 2019 daemon.info fastd[28112]: resolving host `vpn4.erfurt.freifunk.net' for peer <mesh_vpn_backbone_peer_vpn4>...
Thu Aug 29 21:07:48 2019 daemon.info fastd[28112]: resolved host `vpn4.erfurt.freifunk.net' successfully
Thu Aug 29 21:07:48 2019 daemon.notice netifd: Interface 'mesh_vpn' is now up
Thu Aug 29 21:07:49 2019 kern.info kernel: [362649.000393] batman_adv: bat0: Adding interface: mesh-vpn
Thu Aug 29 21:07:49 2019 kern.info kernel: [362649.005911] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1426) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
Thu Aug 29 21:07:49 2019 kern.info kernel: [362649.030682] batman_adv: bat0: Interface activated: mesh-vpn
Thu Aug 29 21:07:49 2019 user.notice firewall: Reloading firewall due to ifup of mesh_vpn (mesh-vpn)