Cybereu

Untitled

Jul 4th, 2020
120
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 73.83 KB | None | 0 0
  1. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.161438] u32 classifier
  2. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.164225]     input device check on
  3. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.167932]     Actions configured
  4. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.174565] Mirror/redirect action on
  5. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.217783] fuse init (API version 7.26)
  6. Sat Jul  4 18:32:54 2020 kern.notice kernel: [   16.230432] Bridge firewalling registered
  7. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.238080] usbcore: registered new interface driver cdc_acm
  8. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.243868] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
  9. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.254784] usbcore: registered new interface driver cdc_wdm
  10. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.263664] Loading modules backported from Linux version wt-2017-11-01-0-gfe248fc2c180
  11. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.271784] Backport generated by backports.git v4.14-rc2-1-31-g86cf0e5d
  12. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.308323] Ebtables v2.0 registered
  13. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.328648] ip_tables: (C) 2000-2006 Netfilter Core Team
  14. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.355071] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
  15. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.455391] ctnetlink v0.93: registering with nfnetlink.
  16. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.582354] nf_tables: (c) 2007-2009 Patrick McHardy <kaber@trash.net>
  17. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.714672] usbcore: registered new interface driver ums-alauda
  18. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.736492] usbcore: registered new interface driver ums-cypress
  19. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.755448] usbcore: registered new interface driver ums-datafab
  20. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.775283] usbcore: registered new interface driver ums-freecom
  21. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.795124] usbcore: registered new interface driver ums-isd200
  22. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.815431] usbcore: registered new interface driver ums-jumpshot
  23. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.829231] usbcore: registered new interface driver ums-karma
  24. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.847675] usbcore: registered new interface driver ums-sddr09
  25. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.865221] usbcore: registered new interface driver ums-sddr55
  26. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.885943] usbcore: registered new interface driver ums-usbat
  27. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.906437] usbcore: registered new interface driver usblp
  28. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.951786] usbcore: registered new interface driver usbserial
  29. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.957840] usbcore: registered new interface driver usbserial_generic
  30. Sat Jul  4 18:32:54 2020 kern.info kernel: [   16.964564] usbserial: USB Serial support registered for generic
  31. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.140746] xt_time: kernel timezone is -0000
  32. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.166060] usbcore: registered new interface driver cdc_ether
  33. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.198339] usbcore: registered new interface driver cdc_ncm
  34. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.363810] gspca_main: v2.14.0 registered
  35. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.383772] usbcore: registered new interface driver ov534
  36. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.430664] usbcore: registered new interface driver gspca_zc3xx
  37. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.476170] usbcore: registered new interface driver huawei_cdc_ncm
  38. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.785996] PPP generic driver version 2.4.2
  39. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.793417] PPP MPPE Compression module registered
  40. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.800569] NET: Registered protocol family 24
  41. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.807104] PPTP driver version 0.8.5
  42. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.826183] usbcore: registered new interface driver qmi_wwan
  43. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.836995] usbcore: registered new interface driver rndis_host
  44. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.860494] usbcore: registered new interface driver sierra
  45. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.866270] usbserial: USB Serial support registered for Sierra USB modem
  46. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.891031] usbcore: registered new interface driver sierra_net
  47. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.936972] usbcore: registered new interface driver uvcvideo
  48. Sat Jul  4 18:32:54 2020 kern.info kernel: [   17.942844] USB Video Class driver (1.1.1)
  49. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   18.039870] PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
  50. Sat Jul  4 18:32:54 2020 kern.info kernel: [   18.045806] ath10k_pci 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
  51. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   18.355161] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin failed with error -2
  52. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   18.366051] ath10k_pci 0000:01:00.0: Falling back to user helper
  53. Sat Jul  4 18:32:54 2020 kern.err kernel: [   19.446981] firmware ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
  54. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   19.459149] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/firmware-6.bin failed with error -2
  55. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   19.470037] ath10k_pci 0000:01:00.0: Falling back to user helper
  56. Sat Jul  4 18:32:54 2020 kern.err kernel: [   19.608040] firmware ath10k!QCA988X!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
  57. Sat Jul  4 18:32:54 2020 kern.info kernel: [   19.999827] ath10k_pci 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
  58. Sat Jul  4 18:32:54 2020 kern.info kernel: [   20.009225] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
  59. Sat Jul  4 18:32:54 2020 kern.info kernel: [   20.022286] ath10k_pci 0000:01:00.0: firmware ver 10.2.4-1.0-00037 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 a4a52adb
  60. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   20.067312] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
  61. Sat Jul  4 18:32:54 2020 kern.warn kernel: [   20.077923] ath10k_pci 0000:01:00.0: Falling back to user helper
  62. Sat Jul  4 18:32:54 2020 kern.err kernel: [   20.147051] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
  63. Sat Jul  4 18:32:54 2020 kern.info kernel: [   20.165326] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
  64. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.288356] ath10k_pci 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
  65. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423497] ath: EEPROM regdomain: 0x0
  66. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423503] ath: EEPROM indicates default country code should be used
  67. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423506] ath: doing EEPROM country->regdmn map search
  68. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423517] ath: country maps to regdmn code: 0x3a
  69. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423521] ath: Country alpha2 being used: US
  70. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.423524] ath: Regpair used: 0x3a
  71. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.530988] usbcore: registered new interface driver cdc_mbim
  72. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.539693] usbcore: registered new interface driver option
  73. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.545477] usbserial: USB Serial support registered for GSM modem (1-port)
  74. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.617746] usbcore: registered new interface driver qcserial
  75. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.623708] usbserial: USB Serial support registered for Qualcomm USB modem
  76. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653535] ath: EEPROM regdomain: 0x0
  77. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653541] ath: EEPROM indicates default country code should be used
  78. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653544] ath: doing EEPROM country->regdmn map search
  79. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653556] ath: country maps to regdmn code: 0x3a
  80. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653561] ath: Country alpha2 being used: US
  81. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.653564] ath: Regpair used: 0x3a
  82. Sat Jul  4 18:32:54 2020 kern.debug kernel: [   21.669537] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
  83. Sat Jul  4 18:32:54 2020 kern.info kernel: [   21.672721] ieee80211 phy1: Atheros AR9550 Rev:0 mem=0xb8100000, irq=47
  84. Sat Jul  4 18:32:54 2020 user.info kernel: [   21.692846] kmodloader: done loading kernel modules from /etc/modules.d/*
  85. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  86. Sat Jul  4 18:32:55 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  87. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  88. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bit
  89. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .glue
  90. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .parody
  91. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .dyn
  92. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bbs
  93. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .free
  94. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .fur
  95. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .geek
  96. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .gopher
  97. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .indy
  98. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .ing
  99. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .null
  100. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .oss
  101. Sat Jul  4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .micro
  102. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: started, version 2.80 cachesize 150
  103. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: DNS service limited to local subnets
  104. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  105. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
  106. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
  107. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
  108. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
  109. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
  110. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
  111. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
  112. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
  113. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
  114. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
  115. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
  116. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
  117. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
  118. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
  119. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
  120. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
  121. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
  122. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
  123. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
  124. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
  125. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
  126. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
  127. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
  128. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
  129. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
  130. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
  131. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
  132. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
  133. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
  134. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
  135. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
  136. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
  137. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
  138. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
  139. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
  140. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
  141. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: using 12 more nameservers
  142. Sat Jul  4 18:32:56 2020 daemon.warn dnsmasq[1525]: no servers found in /tmp/resolv.conf.auto, will retry
  143. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: read /etc/hosts - 5 addresses
  144. Sat Jul  4 18:32:56 2020 daemon.info dnsmasq[1525]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  145. Sat Jul  4 18:32:56 2020 authpriv.info dropbear[1552]: Not backgrounding
  146. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: tunnel
  147. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: Network device
  148. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: bridge
  149. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: veth
  150. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: macvlan
  151. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: 8021ad
  152. Sat Jul  4 18:33:01 2020 user.notice : Added device handler type: 8021q
  153. Sat Jul  4 18:33:03 2020 daemon.err block: /dev/mtdblock2 is already mounted on /rom
  154. Sat Jul  4 18:33:03 2020 daemon.err block: /dev/mtdblock3 is already mounted on /overlay
  155. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.949650] eth1: link up (1000Mbps/Full duplex)
  156. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.954442] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
  157. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.976213] br-lan: port 1(eth1.1) entered blocking state
  158. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.981700] br-lan: port 1(eth1.1) entered disabled state
  159. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.987508] device eth1.1 entered promiscuous mode
  160. Sat Jul  4 18:33:05 2020 kern.info kernel: [   33.992403] device eth1 entered promiscuous mode
  161. Sat Jul  4 18:33:05 2020 kern.info kernel: [   34.045518] br-lan: port 1(eth1.1) entered blocking state
  162. Sat Jul  4 18:33:05 2020 kern.info kernel: [   34.051000] br-lan: port 1(eth1.1) entered forwarding state
  163. Sat Jul  4 18:33:05 2020 kern.info kernel: [   34.056800] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
  164. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is enabled
  165. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is setting up now
  166. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is now up
  167. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: reading /tmp/resolv.conf.auto
  168. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
  169. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
  170. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
  171. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
  172. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
  173. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
  174. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
  175. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
  176. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
  177. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
  178. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
  179. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
  180. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
  181. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
  182. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
  183. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
  184. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
  185. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
  186. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
  187. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is enabled
  188. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
  189. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is setting up now
  190. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
  191. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
  192. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is now up
  193. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
  194. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
  195. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
  196. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
  197. Sat Jul  4 18:33:05 2020 kern.info kernel: [   34.121658] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  198. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
  199. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
  200. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
  201. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
  202. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
  203. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
  204. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
  205. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
  206. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
  207. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
  208. Sat Jul  4 18:33:05 2020 daemon.warn dnsmasq[1525]: ignoring nameserver 192.168.1.1 - local interface
  209. Sat Jul  4 18:33:05 2020 daemon.info dnsmasq[1525]: using 12 more nameservers
  210. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'wan' is enabled
  211. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'wan6' is enabled
  212. Sat Jul  4 18:33:05 2020 daemon.notice netifd: bridge 'br-lan' link is up
  213. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'lan' has link connectivity
  214. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Network device 'eth1' link is up
  215. Sat Jul  4 18:33:05 2020 daemon.notice netifd: VLAN 'eth1.1' link is up
  216. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Network device 'lo' link is up
  217. Sat Jul  4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
  218. Sat Jul  4 18:33:06 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  219. Sat Jul  4 18:33:06 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  220. Sat Jul  4 18:33:07 2020 kern.info kernel: [   35.492268] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  221. Sat Jul  4 18:33:07 2020 kern.info kernel: [   35.498999] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  222. Sat Jul  4 18:33:07 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  223. Sat Jul  4 18:33:07 2020 kern.info kernel: [   35.680683] eth0: link up (1000Mbps/Full duplex)
  224. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Network device 'eth0' link is up
  225. Sat Jul  4 18:33:07 2020 kern.info kernel: [   35.782141] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  226. Sat Jul  4 18:33:07 2020 daemon.notice netifd: VLAN 'eth0.2' link is up
  227. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Interface 'wan' has link connectivity
  228. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Interface 'wan' is setting up now
  229. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
  230. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' is setting up now
  231. Sat Jul  4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' is now up
  232. Sat Jul  4 18:33:07 2020 cron.info crond[2046]: crond (busybox 1.28.4) started, log level 7
  233. Sat Jul  4 18:33:07 2020 daemon.err insmod: module is already loaded - slhc
  234. Sat Jul  4 18:33:07 2020 daemon.err insmod: module is already loaded - ppp_generic
  235. Sat Jul  4 18:33:07 2020 daemon.err insmod: module is already loaded - pppox
  236. Sat Jul  4 18:33:08 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  237. Sat Jul  4 18:33:08 2020 daemon.err insmod: module is already loaded - pppoe
  238. Sat Jul  4 18:33:08 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  239. Sat Jul  4 18:33:09 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  240. Sat Jul  4 18:33:09 2020 daemon.info pppd[2095]: Plugin rp-pppoe.so loaded.
  241. Sat Jul  4 18:33:09 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  242. Sat Jul  4 18:33:09 2020 daemon.info pppd[2095]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
  243. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: pppd 2.4.7 started by root, uid 0
  244. Sat Jul  4 18:33:09 2020 daemon.info pppd[2095]: PPP session is 24135
  245. Sat Jul  4 18:33:09 2020 daemon.warn pppd[2095]: Connected to 04:b0:e7:86:2f:09 via interface eth0.2
  246. Sat Jul  4 18:33:09 2020 kern.info kernel: [   37.977540] pppoe-wan: renamed from ppp0
  247. Sat Jul  4 18:33:09 2020 daemon.info pppd[2095]: Using interface pppoe-wan
  248. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: Connect: pppoe-wan <--> eth0.2
  249. Sat Jul  4 18:33:09 2020 daemon.info pppd[2095]: Remote message: Authentication success,Welcome!
  250. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: PAP authentication succeeded
  251. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: peer from calling number 04:B0:E7:86:2F:09 authorized
  252. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: local  IP address 201.13.76.52
  253. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: remote IP address 187.100.231.38
  254. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: primary   DNS address 200.204.0.10
  255. Sat Jul  4 18:33:09 2020 daemon.notice pppd[2095]: secondary DNS address 200.204.0.138
  256. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742799] ath: EEPROM regdomain: 0x804c
  257. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742806] ath: EEPROM indicates we should expect a country code
  258. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742810] ath: doing EEPROM country->regdmn map search
  259. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742814] ath: country maps to regdmn code: 0x3b
  260. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742818] ath: Country alpha2 being used: BR
  261. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742821] ath: Regpair used: 0x3b
  262. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742826] ath: regdomain 0x804c dynamically updated by user
  263. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742905] ath: EEPROM regdomain: 0x804c
  264. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742908] ath: EEPROM indicates we should expect a country code
  265. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742910] ath: doing EEPROM country->regdmn map search
  266. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742914] ath: country maps to regdmn code: 0x3b
  267. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742917] ath: Country alpha2 being used: BR
  268. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742920] ath: Regpair used: 0x3b
  269. Sat Jul  4 18:33:10 2020 kern.debug kernel: [   38.742924] ath: regdomain 0x804c dynamically updated by user
  270. Sat Jul  4 18:33:10 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  271. Sat Jul  4 18:33:10 2020 daemon.notice netifd: Network device 'pppoe-wan' link is up
  272. Sat Jul  4 18:33:10 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  273. Sat Jul  4 18:33:10 2020 daemon.notice netifd: Interface 'wan' is now up
  274. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: reading /tmp/resolv.conf.auto
  275. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
  276. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
  277. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
  278. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
  279. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
  280. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
  281. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
  282. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
  283. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
  284. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
  285. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
  286. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
  287. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
  288. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
  289. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
  290. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
  291. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
  292. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
  293. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
  294. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
  295. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
  296. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
  297. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
  298. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
  299. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
  300. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
  301. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
  302. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
  303. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
  304. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
  305. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
  306. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
  307. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
  308. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
  309. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
  310. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
  311. Sat Jul  4 18:33:10 2020 daemon.warn dnsmasq[1525]: ignoring nameserver 192.168.1.1 - local interface
  312. Sat Jul  4 18:33:10 2020 daemon.info dnsmasq[1525]: using 14 more nameservers
  313. Sat Jul  4 18:33:11 2020 user.notice mac80211: Failed command: iw phy phy1 set antenna all all
  314. Sat Jul  4 18:33:11 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  315. Sat Jul  4 18:33:11 2020 user.notice mac80211: Failed command: iw phy phy0 set antenna all all
  316. Sat Jul  4 18:33:11 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  317. Sat Jul  4 18:33:12 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  318. Sat Jul  4 18:33:12 2020 daemon.notice hostapd: rfkill: Cannot open RFKILL control device
  319. Sat Jul  4 18:33:12 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  320. Sat Jul  4 18:33:13 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
  321. Sat Jul  4 18:33:13 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  322. Sat Jul  4 18:33:13 2020 user.err : error starting threads: errno 89 (Function not implemented)
  323. Sat Jul  4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: could not open /var/lib/nfs/.etab.lock for locking: errno 2 (No such file or directory)
  324. Sat Jul  4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: can't lock /var/lib/nfs/etab for writing
  325. Sat Jul  4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: could not open /var/lib/nfs/.xtab.lock for locking: errno 2 (No such file or directory)
  326. Sat Jul  4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: can't lock /var/lib/nfs/xtab for writing
  327. Sat Jul  4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: Command failed: Not found
  328. Sat Jul  4 18:33:45 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  329. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[1525]: exiting on receipt of SIGTERM
  330. Sat Jul  4 18:33:47 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  331. Sat Jul  4 18:33:47 2020 daemon.notice hostapd: rfkill: Cannot open RFKILL control device
  332. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.072097] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
  333. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: started, version 2.80 cachesize 150
  334. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: DNS service limited to local subnets
  335. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  336. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq-dhcp[2488]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
  337. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain test
  338. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain onion
  339. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain localhost
  340. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.111749] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
  341. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain local
  342. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain invalid
  343. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain bind
  344. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain micro
  345. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain micro
  346. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain micro
  347. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain oss
  348. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain oss
  349. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain oss
  350. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain null
  351. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain null
  352. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain null
  353. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.141619] br-lan: port 2(wlan0) entered blocking state
  354. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.147058] br-lan: port 2(wlan0) entered disabled state
  355. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.152783] device wlan0 entered promiscuous mode
  356. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.157702] br-lan: port 2(wlan0) entered blocking state
  357. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.163141] br-lan: port 2(wlan0) entered forwarding state
  358. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain ing
  359. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain ing
  360. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain ing
  361. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain indy
  362. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain indy
  363. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain indy
  364. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain gopher
  365. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain gopher
  366. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain gopher
  367. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain geek
  368. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain geek
  369. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain geek
  370. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain fur
  371. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain fur
  372. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain fur
  373. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain free
  374. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain free
  375. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain free
  376. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain bbs
  377. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain bbs
  378. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain bbs
  379. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using 12 more nameservers
  380. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: reading /tmp/resolv.conf.auto
  381. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain test
  382. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain onion
  383. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain localhost
  384. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain local
  385. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain invalid
  386. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain bind
  387. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain micro
  388. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain micro
  389. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain micro
  390. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain oss
  391. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain oss
  392. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.202859] br-lan: port 2(wlan0) entered disabled state
  393. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain oss
  394. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain null
  395. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain null
  396. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain null
  397. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain ing
  398. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain ing
  399. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain ing
  400. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain indy
  401. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain indy
  402. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain indy
  403. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain gopher
  404. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain gopher
  405. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain gopher
  406. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain geek
  407. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain geek
  408. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain geek
  409. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain fur
  410. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain fur
  411. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain fur
  412. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain free
  413. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain free
  414. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain free
  415. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain bbs
  416. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain bbs
  417. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain bbs
  418. Sat Jul  4 18:33:47 2020 daemon.warn dnsmasq[2488]: ignoring nameserver 192.168.1.1 - local interface
  419. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: using 14 more nameservers
  420. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: read /etc/hosts - 5 addresses
  421. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq[2488]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  422. Sat Jul  4 18:33:47 2020 daemon.info dnsmasq-dhcp[2488]: read /etc/ethers - 0 addresses
  423. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.290228] br-lan: port 3(wlan1) entered blocking state
  424. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.295666] br-lan: port 3(wlan1) entered disabled state
  425. Sat Jul  4 18:33:47 2020 kern.info kernel: [   44.301425] device wlan1 entered promiscuous mode
  426. Sat Jul  4 18:33:47 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  427. Sat Jul  4 18:33:47 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
  428. Sat Jul  4 18:33:47 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  429. Sat Jul  4 18:33:47 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
  430. Sat Jul  4 18:33:48 2020 daemon.err hostapd: Using interface wlan0 with hwaddr ec:08:6b:5b:22:1d and ssid "IMPOSTO EH ROUBO 5GHz"
  431. Sat Jul  4 18:33:48 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  432. Sat Jul  4 18:33:49 2020 kern.info kernel: [   45.844005] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  433. Sat Jul  4 18:33:49 2020 kern.info kernel: [   45.850583] br-lan: port 2(wlan0) entered blocking state
  434. Sat Jul  4 18:33:49 2020 kern.info kernel: [   45.856013] br-lan: port 2(wlan0) entered forwarding state
  435. Sat Jul  4 18:33:49 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  436. Sat Jul  4 18:33:49 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
  437. Sat Jul  4 18:33:49 2020 daemon.notice hostapd: wlan0: AP-ENABLED
  438. Sat Jul  4 18:33:49 2020 daemon.info ddns_gargoyle[2523]: Forcing update:
  439. Sat Jul  4 18:33:49 2020 daemon.info ddns_gargoyle[2523]:   service provider=duckdns.org
  440. Sat Jul  4 18:33:49 2020 daemon.info ddns_gargoyle[2523]:   domain=cybereu.duckdns.org
  441. Sat Jul  4 18:33:49 2020 daemon.info ddns_gargoyle[2523]:       Could not determine local ip from url: http://www.ipchicken.com
  442. Sat Jul  4 18:33:49 2020 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=11 sec=7 based on overlapping BSSes
  443. Sat Jul  4 18:33:49 2020 daemon.err hostapd: Using interface wlan1 with hwaddr ec:08:6b:5b:22:1e and ssid "IMPOSTO EH ROUBO"
  444. Sat Jul  4 18:33:49 2020 daemon.notice netifd: Network device 'wlan0' link is up
  445. Sat Jul  4 18:33:50 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  446. Sat Jul  4 18:33:50 2020 daemon.info ddns_gargoyle[2523]:       Could not determine local ip from url: http://www.tracemyip.org
  447. Sat Jul  4 18:33:50 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  448. Sat Jul  4 18:33:50 2020 kern.info kernel: [   47.107939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  449. Sat Jul  4 18:33:50 2020 kern.info kernel: [   47.114565] br-lan: port 3(wlan1) entered blocking state
  450. Sat Jul  4 18:33:50 2020 kern.info kernel: [   47.119974] br-lan: port 3(wlan1) entered forwarding state
  451. Sat Jul  4 18:33:50 2020 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
  452. Sat Jul  4 18:33:50 2020 daemon.notice hostapd: wlan1: AP-ENABLED
  453. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
  454. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.10
  455. Sat Jul  4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
  456. Sat Jul  4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  457. Sat Jul  4 18:33:50 2020 daemon.info ddns_gargoyle[2523]:       Successfully retrieved local ip from url: http://checkip.dyndns.org
  458. Sat Jul  4 18:33:50 2020 daemon.info ddns_gargoyle[2523]:   local IP  = 201.13.76.52
  459. Sat Jul  4 18:33:50 2020 daemon.info ddns_gargoyle[2523]:   remote IP cannot be determined
  460. Sat Jul  4 18:33:50 2020 daemon.notice netifd: Network device 'wlan1' link is up
  461. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Diffie-Hellman initialized with 1024 bit key
  462. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  463. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  464. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: TUN/TAP device tun0 opened
  465. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: TUN/TAP TX queue length set to 100
  466. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  467. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: /sbin/ifconfig tun0 10.0.8.1 netmask 255.255.255.0 mtu 1500 broadcast 10.0.8.255
  468. Sat Jul  4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  469. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Socket Buffers: R=[163840->163840] S=[163840->163840]
  470. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: UDPv4 link local (bound): [AF_INET][undef]:443
  471. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: UDPv4 link remote: [AF_UNSPEC]
  472. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: MULTI: multi_init called, r=256 v=256
  473. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: IFCONFIG POOL: base=10.0.8.2 size=253, ipv6=0
  474. Sat Jul  4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Initialization Sequence Completed
  475. Sat Jul  4 18:33:51 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  476. Sat Jul  4 18:33:52 2020 daemon.info ddns_gargoyle[2523]:   Update successful
  477. Sat Jul  4 18:33:52 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  478. Sat Jul  4 18:33:52 2020 kern.warn kernel: [   48.942378] ipt_bandwidth: timezone shift of 180 minutes detected, adjusting
  479. Sat Jul  4 18:33:52 2020 kern.warn kernel: [   48.949541]                old minutes west=0, new minutes west=180
  480. Sat Jul  4 18:33:53 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  481. Sat Jul  4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 IEEE 802.11: authenticated
  482. Sat Jul  4 18:33:53 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  483. Sat Jul  4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 IEEE 802.11: associated (aid 1)
  484. Sat Jul  4 18:33:53 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a8:47:4a:ed:84:03
  485. Sat Jul  4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 RADIUS: starting accounting session E4B65D83B0DC4256
  486. Sat Jul  4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 WPA: pairwise key handshake completed (RSN)
  487. Sat Jul  4 18:33:53 2020 cron.info crond[2948]: crond (busybox 1.28.4) started, log level 7
  488. Sat Jul  4 18:33:54 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  489. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  490. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  491. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  492. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  493. Sat Jul  4 18:33:56 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  494. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  495. Sat Jul  4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
  496. Sat Jul  4 18:33:57 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  497. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 IEEE 802.11: authenticated
  498. Sat Jul  4 18:34:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  499. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 IEEE 802.11: associated (aid 2)
  500. Sat Jul  4 18:34:00 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 7e:03:29:2d:49:07
  501. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 RADIUS: starting accounting session 815A24B70EEDA8C2
  502. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 WPA: pairwise key handshake completed (RSN)
  503. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb IEEE 802.11: authenticated
  504. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb IEEE 802.11: associated (aid 3)
  505. Sat Jul  4 18:34:00 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED f8:e4:e3:7b:01:fb
  506. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb RADIUS: starting accounting session AE0AF036AFF6C13E
  507. Sat Jul  4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb WPA: pairwise key handshake completed (RSN)
  508. Sat Jul  4 18:34:00 2020 cron.info crond[2948]: USER root pid 3031 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  509. Sat Jul  4 18:34:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  510. Sat Jul  4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 IEEE 802.11: authenticated
  511. Sat Jul  4 18:34:01 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  512. Sat Jul  4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 IEEE 802.11: associated (aid 4)
  513. Sat Jul  4 18:34:01 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 50:8f:4c:ca:eb:55
  514. Sat Jul  4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 RADIUS: starting accounting session 1C35791BD823A76D
  515. Sat Jul  4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 WPA: pairwise key handshake completed (RSN)
  516. Sat Jul  4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a IEEE 802.11: authenticated
  517. Sat Jul  4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a IEEE 802.11: associated (aid 5)
  518. Sat Jul  4 18:34:02 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED c0:97:27:30:39:5a
  519. Sat Jul  4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a RADIUS: starting accounting session 12A4AB4EF2F67928
  520. Sat Jul  4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a WPA: pairwise key handshake completed (RSN)
  521. Sat Jul  4 18:34:02 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  522. Sat Jul  4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 7e:03:29:2d:49:07
  523. Sat Jul  4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  524. Sat Jul  4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  525. Sat Jul  4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb desktop-01
  526. Sat Jul  4 18:34:03 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  527. Sat Jul  4 18:34:04 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  528. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 50:8f:4c:ca:eb:55
  529. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
  530. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 7e:03:29:2d:49:07
  531. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  532. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  533. Sat Jul  4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  534. Sat Jul  4 18:34:07 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  535. Sat Jul  4 18:34:08 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  536. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
  537. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
  538. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  539. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  540. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  541. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  542. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
  543. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
  544. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 50:8f:4c:ca:eb:55
  545. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
  546. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
  547. Sat Jul  4 18:34:10 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  548. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55 MIPAD3-MiPad3
  549. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  550. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.167 7e:03:29:2d:49:07
  551. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
  552. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
  553. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  554. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  555. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
  556. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb desktop-01
  557. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.127 c0:97:27:30:39:5a
  558. Sat Jul  4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.127 c0:97:27:30:39:5a
  559. Sat Jul  4 18:34:11 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  560. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  561. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  562. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  563. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  564. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  565. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  566. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  567. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  568. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  569. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  570. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  571. Sat Jul  4 18:34:11 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  572. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  573. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  574. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  575. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  576. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  577. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  578. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  579. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  580. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  581. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  582. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  583. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  584. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  585. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  586. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  587. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  588. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  589. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  590. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  591. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  592. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  593. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  594. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  595. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  596. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  597. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  598. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  599. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  600. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  601. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  602. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  603. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  604. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  605. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  606. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  607. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  608. Sat Jul  4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
  609. Sat Jul  4 18:34:12 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  610. Sat Jul  4 18:34:15 2020 user.notice root: vsftpd init: mounted = 0
  611. Sat Jul  4 18:34:15 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  612. Sat Jul  4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S90vsftpd: ERROR: No drives attached, no directories to share!
  613. Sat Jul  4 18:34:15 2020 kern.notice kernel: [   71.966720] random: crng init done
  614. Sat Jul  4 18:34:15 2020 kern.notice kernel: [   71.970178] random: 6 urandom warning(s) missed due to ratelimiting
  615. Sat Jul  4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led USB1
  616. Sat Jul  4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led USB2
  617. Sat Jul  4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN2G
  618. Sat Jul  4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN5G
  619. Sat Jul  4 18:34:16 2020 user.info Gargoyle STA Manager: Starting...
  620. Sat Jul  4 18:34:16 2020 user.info Gargoyle STA Manager: No STA Config found in Wireless CFG. Exiting...
  621. Sat Jul  4 18:34:16 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  622. Sat Jul  4 18:34:16 2020 daemon.info procd: - init complete -
  623. Sat Jul  4 18:34:16 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  624. Sat Jul  4 18:34:17 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  625. Sat Jul  4 18:34:26 2020 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
  626. Sat Jul  4 18:34:26 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  627. Sat Jul  4 18:34:27 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  628. Sat Jul  4 18:34:37 2020 cron.info crond[3611]: crond (busybox 1.28.4) started, log level 7
  629. Sat Jul  4 18:34:37 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  630. Sat Jul  4 18:34:38 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  631. Sat Jul  4 18:34:39 2020 cron.info crond[3867]: crond (busybox 1.28.4) started, log level 7
  632. Sat Jul  4 18:34:39 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  633. Sat Jul  4 18:34:40 2020 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  634. Sat Jul  4 18:34:40 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  635. Sat Jul  4 18:34:40 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  636. Sat Jul  4 18:34:41 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  637. Sat Jul  4 18:34:50 2020 cron.info crond[4095]: crond (busybox 1.28.4) started, log level 7
  638. Sat Jul  4 18:34:50 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  639. Sat Jul  4 18:34:51 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  640. Sat Jul  4 18:34:52 2020 cron.info crond[4351]: crond (busybox 1.28.4) started, log level 7
  641. Sat Jul  4 18:34:52 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  642. Sat Jul  4 18:34:53 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  643. Sat Jul  4 18:34:56 2020 cron.info crond[4501]: crond (busybox 1.28.4) started, log level 7
  644. Sat Jul  4 18:34:56 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  645. Sat Jul  4 18:34:57 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  646. Sat Jul  4 18:34:58 2020 cron.info crond[4876]: crond (busybox 1.28.4) started, log level 7
  647. Sat Jul  4 18:34:58 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  648. Sat Jul  4 18:34:59 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  649. Sat Jul  4 18:35:00 2020 cron.info crond[4876]: USER root pid 4889 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  650. Sat Jul  4 18:35:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  651. Sat Jul  4 18:35:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  652. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: Checking whether update needed:
  653. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:   service provider=duckdns.org
  654. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:   domain=cybereu.duckdns.org
  655. Sat Jul  4 18:35:04 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  656. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:       Successfully retrieved local ip from url: http://checkip.org
  657. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:   local IP  = 201.13.76.52
  658. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:   remote IP = 201.13.76.52
  659. Sat Jul  4 18:35:04 2020 daemon.info ddns_gargoyle[2523]:   Update not needed, IPs match
  660. Sat Jul  4 18:35:05 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  661. Sat Jul  4 18:35:19 2020 daemon.err openvpn(custom_config)[2605]: event_wait : Interrupted system call (code=4)
  662. Sat Jul  4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: Closing TUN/TAP interface
  663. Sat Jul  4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: /sbin/ifconfig tun0 0.0.0.0
  664. Sat Jul  4 18:35:19 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  665. Sat Jul  4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: SIGTERM[hard,] received, process exiting
  666. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
  667. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.10
  668. Sat Jul  4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
  669. Sat Jul  4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  670. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Diffie-Hellman initialized with 1024 bit key
  671. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  672. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  673. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: TUN/TAP device tun0 opened
  674. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: TUN/TAP TX queue length set to 100
  675. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  676. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: /sbin/ifconfig tun0 10.0.8.1 netmask 255.255.255.0 mtu 1500 broadcast 10.0.8.255
  677. Sat Jul  4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  678. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Socket Buffers: R=[163840->163840] S=[163840->163840]
  679. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: UDPv4 link local (bound): [AF_INET][undef]:443
  680. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: UDPv4 link remote: [AF_UNSPEC]
  681. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: MULTI: multi_init called, r=256 v=256
  682. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: IFCONFIG POOL: base=10.0.8.2 size=253, ipv6=0
  683. Sat Jul  4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Initialization Sequence Completed
  684. Sat Jul  4 18:35:20 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  685. Sat Jul  4 18:36:00 2020 cron.info crond[4876]: USER root pid 4975 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  686. Sat Jul  4 18:36:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  687. Sat Jul  4 18:36:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  688. Sat Jul  4 18:37:00 2020 cron.info crond[4876]: USER root pid 4979 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  689. Sat Jul  4 18:37:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  690. Sat Jul  4 18:37:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  691. Sat Jul  4 18:38:00 2020 cron.info crond[4876]: USER root pid 4983 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  692. Sat Jul  4 18:38:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  693. Sat Jul  4 18:38:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  694. Sat Jul  4 18:39:00 2020 cron.info crond[4876]: USER root pid 4987 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  695. Sat Jul  4 18:39:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  696. Sat Jul  4 18:39:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  697. Sat Jul  4 18:40:00 2020 cron.info crond[4876]: USER root pid 4991 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  698. Sat Jul  4 18:40:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  699. Sat Jul  4 18:40:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  700. Sat Jul  4 18:41:00 2020 cron.info crond[4876]: USER root pid 4995 cmd /usr/bin/set_kernel_timezone >/dev/null 2>&1
  701. Sat Jul  4 18:41:00 2020 cron.info crond[4876]: USER root pid 4996 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  702. Sat Jul  4 18:41:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  703. Sat Jul  4 18:41:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  704. Sat Jul  4 18:42:00 2020 cron.info crond[4876]: USER root pid 5000 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  705. Sat Jul  4 18:42:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  706. Sat Jul  4 18:42:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  707. Sat Jul  4 18:43:00 2020 cron.info crond[4876]: USER root pid 5004 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  708. Sat Jul  4 18:43:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  709. Sat Jul  4 18:43:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  710. Sat Jul  4 18:44:00 2020 cron.info crond[4876]: USER root pid 5008 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  711. Sat Jul  4 18:44:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  712. Sat Jul  4 18:44:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  713. Sat Jul  4 18:45:00 2020 cron.info crond[4876]: USER root pid 5012 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  714. Sat Jul  4 18:45:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  715. Sat Jul  4 18:45:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  716. Sat Jul  4 18:46:00 2020 cron.info crond[4876]: USER root pid 5024 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  717. Sat Jul  4 18:46:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  718. Sat Jul  4 18:46:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  719. Sat Jul  4 18:46:46 2020 authpriv.info dropbear[5028]: Child connection from 192.168.1.100:41080
  720. Sat Jul  4 18:46:46 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  721. Sat Jul  4 18:46:47 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  722. Sat Jul  4 18:46:49 2020 authpriv.notice dropbear[5028]: Password auth succeeded for 'root' from 192.168.1.100:41080
  723. Sat Jul  4 18:46:49 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  724. Sat Jul  4 18:46:50 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  725. Sat Jul  4 18:47:00 2020 cron.info crond[4876]: USER root pid 5038 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  726. Sat Jul  4 18:47:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  727. Sat Jul  4 18:47:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  728. Sat Jul  4 18:48:00 2020 cron.info crond[4876]: USER root pid 5045 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  729. Sat Jul  4 18:48:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  730. Sat Jul  4 18:48:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
  731. Sat Jul  4 18:49:00 2020 cron.info crond[4876]: USER root pid 5049 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
  732. Sat Jul  4 18:49:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
  733. Sat Jul  4 18:49:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
Add Comment
Please, Sign In to add comment