Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.161438] u32 classifier
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.164225] input device check on
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.167932] Actions configured
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.174565] Mirror/redirect action on
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.217783] fuse init (API version 7.26)
- Sat Jul 4 18:32:54 2020 kern.notice kernel: [ 16.230432] Bridge firewalling registered
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.238080] usbcore: registered new interface driver cdc_acm
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.243868] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.254784] usbcore: registered new interface driver cdc_wdm
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.263664] Loading modules backported from Linux version wt-2017-11-01-0-gfe248fc2c180
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.271784] Backport generated by backports.git v4.14-rc2-1-31-g86cf0e5d
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.308323] Ebtables v2.0 registered
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.328648] ip_tables: (C) 2000-2006 Netfilter Core Team
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.355071] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.455391] ctnetlink v0.93: registering with nfnetlink.
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.582354] nf_tables: (c) 2007-2009 Patrick McHardy <kaber@trash.net>
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.714672] usbcore: registered new interface driver ums-alauda
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.736492] usbcore: registered new interface driver ums-cypress
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.755448] usbcore: registered new interface driver ums-datafab
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.775283] usbcore: registered new interface driver ums-freecom
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.795124] usbcore: registered new interface driver ums-isd200
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.815431] usbcore: registered new interface driver ums-jumpshot
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.829231] usbcore: registered new interface driver ums-karma
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.847675] usbcore: registered new interface driver ums-sddr09
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.865221] usbcore: registered new interface driver ums-sddr55
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.885943] usbcore: registered new interface driver ums-usbat
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.906437] usbcore: registered new interface driver usblp
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.951786] usbcore: registered new interface driver usbserial
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.957840] usbcore: registered new interface driver usbserial_generic
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 16.964564] usbserial: USB Serial support registered for generic
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.140746] xt_time: kernel timezone is -0000
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.166060] usbcore: registered new interface driver cdc_ether
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.198339] usbcore: registered new interface driver cdc_ncm
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.363810] gspca_main: v2.14.0 registered
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.383772] usbcore: registered new interface driver ov534
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.430664] usbcore: registered new interface driver gspca_zc3xx
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.476170] usbcore: registered new interface driver huawei_cdc_ncm
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.785996] PPP generic driver version 2.4.2
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.793417] PPP MPPE Compression module registered
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.800569] NET: Registered protocol family 24
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.807104] PPTP driver version 0.8.5
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.826183] usbcore: registered new interface driver qmi_wwan
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.836995] usbcore: registered new interface driver rndis_host
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.860494] usbcore: registered new interface driver sierra
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.866270] usbserial: USB Serial support registered for Sierra USB modem
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.891031] usbcore: registered new interface driver sierra_net
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.936972] usbcore: registered new interface driver uvcvideo
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 17.942844] USB Video Class driver (1.1.1)
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 18.039870] PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 18.045806] ath10k_pci 0000:01:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 18.355161] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin failed with error -2
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 18.366051] ath10k_pci 0000:01:00.0: Falling back to user helper
- Sat Jul 4 18:32:54 2020 kern.err kernel: [ 19.446981] firmware ath10k!pre-cal-pci-0000:01:00.0.bin: firmware_loading_store: map pages failed
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 19.459149] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/firmware-6.bin failed with error -2
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 19.470037] ath10k_pci 0000:01:00.0: Falling back to user helper
- Sat Jul 4 18:32:54 2020 kern.err kernel: [ 19.608040] firmware ath10k!QCA988X!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 19.999827] ath10k_pci 0000:01:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043202ff sub 0000:0000
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 20.009225] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 20.022286] ath10k_pci 0000:01:00.0: firmware ver 10.2.4-1.0-00037 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 a4a52adb
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 20.067312] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
- Sat Jul 4 18:32:54 2020 kern.warn kernel: [ 20.077923] ath10k_pci 0000:01:00.0: Falling back to user helper
- Sat Jul 4 18:32:54 2020 kern.err kernel: [ 20.147051] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 20.165326] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.288356] ath10k_pci 0000:01:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423497] ath: EEPROM regdomain: 0x0
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423503] ath: EEPROM indicates default country code should be used
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423506] ath: doing EEPROM country->regdmn map search
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423517] ath: country maps to regdmn code: 0x3a
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423521] ath: Country alpha2 being used: US
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.423524] ath: Regpair used: 0x3a
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.530988] usbcore: registered new interface driver cdc_mbim
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.539693] usbcore: registered new interface driver option
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.545477] usbserial: USB Serial support registered for GSM modem (1-port)
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.617746] usbcore: registered new interface driver qcserial
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.623708] usbserial: USB Serial support registered for Qualcomm USB modem
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653535] ath: EEPROM regdomain: 0x0
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653541] ath: EEPROM indicates default country code should be used
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653544] ath: doing EEPROM country->regdmn map search
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653556] ath: country maps to regdmn code: 0x3a
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653561] ath: Country alpha2 being used: US
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.653564] ath: Regpair used: 0x3a
- Sat Jul 4 18:32:54 2020 kern.debug kernel: [ 21.669537] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
- Sat Jul 4 18:32:54 2020 kern.info kernel: [ 21.672721] ieee80211 phy1: Atheros AR9550 Rev:0 mem=0xb8100000, irq=47
- Sat Jul 4 18:32:54 2020 user.info kernel: [ 21.692846] kmodloader: done loading kernel modules from /etc/modules.d/*
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Sat Jul 4 18:32:55 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bit
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .glue
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .parody
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .dyn
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .bbs
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .free
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .fur
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .geek
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .gopher
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .indy
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .ing
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .null
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .oss
- Sat Jul 4 18:32:55 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain .micro
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: started, version 2.80 cachesize 150
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: DNS service limited to local subnets
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: using 12 more nameservers
- Sat Jul 4 18:32:56 2020 daemon.warn dnsmasq[1525]: no servers found in /tmp/resolv.conf.auto, will retry
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: read /etc/hosts - 5 addresses
- Sat Jul 4 18:32:56 2020 daemon.info dnsmasq[1525]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
- Sat Jul 4 18:32:56 2020 authpriv.info dropbear[1552]: Not backgrounding
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: tunnel
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: Network device
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: bridge
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: veth
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: macvlan
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: 8021ad
- Sat Jul 4 18:33:01 2020 user.notice : Added device handler type: 8021q
- Sat Jul 4 18:33:03 2020 daemon.err block: /dev/mtdblock2 is already mounted on /rom
- Sat Jul 4 18:33:03 2020 daemon.err block: /dev/mtdblock3 is already mounted on /overlay
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.949650] eth1: link up (1000Mbps/Full duplex)
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.954442] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.976213] br-lan: port 1(eth1.1) entered blocking state
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.981700] br-lan: port 1(eth1.1) entered disabled state
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.987508] device eth1.1 entered promiscuous mode
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 33.992403] device eth1 entered promiscuous mode
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 34.045518] br-lan: port 1(eth1.1) entered blocking state
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 34.051000] br-lan: port 1(eth1.1) entered forwarding state
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 34.056800] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is enabled
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is setting up now
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'lan' is now up
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: reading /tmp/resolv.conf.auto
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is enabled
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is setting up now
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' is now up
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
- Sat Jul 4 18:33:05 2020 kern.info kernel: [ 34.121658] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
- Sat Jul 4 18:33:05 2020 daemon.warn dnsmasq[1525]: ignoring nameserver 192.168.1.1 - local interface
- Sat Jul 4 18:33:05 2020 daemon.info dnsmasq[1525]: using 12 more nameservers
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'wan' is enabled
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'wan6' is enabled
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: bridge 'br-lan' link is up
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'lan' has link connectivity
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Network device 'eth1' link is up
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: VLAN 'eth1.1' link is up
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Network device 'lo' link is up
- Sat Jul 4 18:33:05 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
- Sat Jul 4 18:33:06 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
- Sat Jul 4 18:33:06 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:07 2020 kern.info kernel: [ 35.492268] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
- Sat Jul 4 18:33:07 2020 kern.info kernel: [ 35.498999] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
- Sat Jul 4 18:33:07 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:07 2020 kern.info kernel: [ 35.680683] eth0: link up (1000Mbps/Full duplex)
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Network device 'eth0' link is up
- Sat Jul 4 18:33:07 2020 kern.info kernel: [ 35.782141] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: VLAN 'eth0.2' link is up
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Interface 'wan' has link connectivity
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Interface 'wan' is setting up now
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' is setting up now
- Sat Jul 4 18:33:07 2020 daemon.notice netifd: Interface 'wan6' is now up
- Sat Jul 4 18:33:07 2020 cron.info crond[2046]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:33:07 2020 daemon.err insmod: module is already loaded - slhc
- Sat Jul 4 18:33:07 2020 daemon.err insmod: module is already loaded - ppp_generic
- Sat Jul 4 18:33:07 2020 daemon.err insmod: module is already loaded - pppox
- Sat Jul 4 18:33:08 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:08 2020 daemon.err insmod: module is already loaded - pppoe
- Sat Jul 4 18:33:08 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:09 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:09 2020 daemon.info pppd[2095]: Plugin rp-pppoe.so loaded.
- Sat Jul 4 18:33:09 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:09 2020 daemon.info pppd[2095]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: pppd 2.4.7 started by root, uid 0
- Sat Jul 4 18:33:09 2020 daemon.info pppd[2095]: PPP session is 24135
- Sat Jul 4 18:33:09 2020 daemon.warn pppd[2095]: Connected to 04:b0:e7:86:2f:09 via interface eth0.2
- Sat Jul 4 18:33:09 2020 kern.info kernel: [ 37.977540] pppoe-wan: renamed from ppp0
- Sat Jul 4 18:33:09 2020 daemon.info pppd[2095]: Using interface pppoe-wan
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: Connect: pppoe-wan <--> eth0.2
- Sat Jul 4 18:33:09 2020 daemon.info pppd[2095]: Remote message: Authentication success,Welcome!
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: PAP authentication succeeded
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: peer from calling number 04:B0:E7:86:2F:09 authorized
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: local IP address 201.13.76.52
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: remote IP address 187.100.231.38
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: primary DNS address 200.204.0.10
- Sat Jul 4 18:33:09 2020 daemon.notice pppd[2095]: secondary DNS address 200.204.0.138
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742799] ath: EEPROM regdomain: 0x804c
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742806] ath: EEPROM indicates we should expect a country code
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742810] ath: doing EEPROM country->regdmn map search
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742814] ath: country maps to regdmn code: 0x3b
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742818] ath: Country alpha2 being used: BR
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742821] ath: Regpair used: 0x3b
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742826] ath: regdomain 0x804c dynamically updated by user
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742905] ath: EEPROM regdomain: 0x804c
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742908] ath: EEPROM indicates we should expect a country code
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742910] ath: doing EEPROM country->regdmn map search
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742914] ath: country maps to regdmn code: 0x3b
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742917] ath: Country alpha2 being used: BR
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742920] ath: Regpair used: 0x3b
- Sat Jul 4 18:33:10 2020 kern.debug kernel: [ 38.742924] ath: regdomain 0x804c dynamically updated by user
- Sat Jul 4 18:33:10 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:10 2020 daemon.notice netifd: Network device 'pppoe-wan' link is up
- Sat Jul 4 18:33:10 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:10 2020 daemon.notice netifd: Interface 'wan' is now up
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: reading /tmp/resolv.conf.auto
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain test
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain onion
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain localhost
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain local
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain invalid
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using local addresses only for domain bind
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain micro
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain micro
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain micro
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain oss
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain oss
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain oss
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain null
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain null
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain null
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain ing
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain ing
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain ing
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain indy
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain indy
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain indy
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain gopher
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain gopher
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain gopher
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain geek
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain geek
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain geek
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain fur
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain fur
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain fur
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain free
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain free
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain free
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.142.171.235#53 for domain bbs
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 95.211.32.162#53 for domain bbs
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using nameserver 66.244.95.20#53 for domain bbs
- Sat Jul 4 18:33:10 2020 daemon.warn dnsmasq[1525]: ignoring nameserver 192.168.1.1 - local interface
- Sat Jul 4 18:33:10 2020 daemon.info dnsmasq[1525]: using 14 more nameservers
- Sat Jul 4 18:33:11 2020 user.notice mac80211: Failed command: iw phy phy1 set antenna all all
- Sat Jul 4 18:33:11 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:11 2020 user.notice mac80211: Failed command: iw phy phy0 set antenna all all
- Sat Jul 4 18:33:11 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:12 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
- Sat Jul 4 18:33:12 2020 daemon.notice hostapd: rfkill: Cannot open RFKILL control device
- Sat Jul 4 18:33:12 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:13 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
- Sat Jul 4 18:33:13 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:13 2020 user.err : error starting threads: errno 89 (Function not implemented)
- Sat Jul 4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: could not open /var/lib/nfs/.etab.lock for locking: errno 2 (No such file or directory)
- Sat Jul 4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: can't lock /var/lib/nfs/etab for writing
- Sat Jul 4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: could not open /var/lib/nfs/.xtab.lock for locking: errno 2 (No such file or directory)
- Sat Jul 4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: exportfs: can't lock /var/lib/nfs/xtab for writing
- Sat Jul 4 18:33:45 2020 daemon.notice procd: /etc/rc.d/S60nfsd: Command failed: Not found
- Sat Jul 4 18:33:45 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[1525]: exiting on receipt of SIGTERM
- Sat Jul 4 18:33:47 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:47 2020 daemon.notice hostapd: rfkill: Cannot open RFKILL control device
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.072097] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: started, version 2.80 cachesize 150
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: DNS service limited to local subnets
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq-dhcp[2488]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain test
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain onion
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain localhost
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.111749] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain local
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain invalid
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain bind
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain oss
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain oss
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain oss
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain null
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain null
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain null
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.141619] br-lan: port 2(wlan0) entered blocking state
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.147058] br-lan: port 2(wlan0) entered disabled state
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.152783] device wlan0 entered promiscuous mode
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.157702] br-lan: port 2(wlan0) entered blocking state
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.163141] br-lan: port 2(wlan0) entered forwarding state
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using 12 more nameservers
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: reading /tmp/resolv.conf.auto
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain test
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain onion
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain localhost
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain local
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain invalid
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using local addresses only for domain bind
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain micro
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain oss
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain oss
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.202859] br-lan: port 2(wlan0) entered disabled state
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain oss
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain null
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain null
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain null
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain ing
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain indy
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain gopher
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain geek
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain fur
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain free
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.142.171.235#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 95.211.32.162#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using nameserver 66.244.95.20#53 for domain bbs
- Sat Jul 4 18:33:47 2020 daemon.warn dnsmasq[2488]: ignoring nameserver 192.168.1.1 - local interface
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: using 14 more nameservers
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: read /etc/hosts - 5 addresses
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq[2488]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
- Sat Jul 4 18:33:47 2020 daemon.info dnsmasq-dhcp[2488]: read /etc/ethers - 0 addresses
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.290228] br-lan: port 3(wlan1) entered blocking state
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.295666] br-lan: port 3(wlan1) entered disabled state
- Sat Jul 4 18:33:47 2020 kern.info kernel: [ 44.301425] device wlan1 entered promiscuous mode
- Sat Jul 4 18:33:47 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
- Sat Jul 4 18:33:47 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
- Sat Jul 4 18:33:47 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
- Sat Jul 4 18:33:47 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
- Sat Jul 4 18:33:48 2020 daemon.err hostapd: Using interface wlan0 with hwaddr ec:08:6b:5b:22:1d and ssid "IMPOSTO EH ROUBO 5GHz"
- Sat Jul 4 18:33:48 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:49 2020 kern.info kernel: [ 45.844005] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
- Sat Jul 4 18:33:49 2020 kern.info kernel: [ 45.850583] br-lan: port 2(wlan0) entered blocking state
- Sat Jul 4 18:33:49 2020 kern.info kernel: [ 45.856013] br-lan: port 2(wlan0) entered forwarding state
- Sat Jul 4 18:33:49 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:49 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
- Sat Jul 4 18:33:49 2020 daemon.notice hostapd: wlan0: AP-ENABLED
- Sat Jul 4 18:33:49 2020 daemon.info ddns_gargoyle[2523]: Forcing update:
- Sat Jul 4 18:33:49 2020 daemon.info ddns_gargoyle[2523]: service provider=duckdns.org
- Sat Jul 4 18:33:49 2020 daemon.info ddns_gargoyle[2523]: domain=cybereu.duckdns.org
- Sat Jul 4 18:33:49 2020 daemon.info ddns_gargoyle[2523]: Could not determine local ip from url: http://www.ipchicken.com
- Sat Jul 4 18:33:49 2020 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=11 sec=7 based on overlapping BSSes
- Sat Jul 4 18:33:49 2020 daemon.err hostapd: Using interface wlan1 with hwaddr ec:08:6b:5b:22:1e and ssid "IMPOSTO EH ROUBO"
- Sat Jul 4 18:33:49 2020 daemon.notice netifd: Network device 'wlan0' link is up
- Sat Jul 4 18:33:50 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:50 2020 daemon.info ddns_gargoyle[2523]: Could not determine local ip from url: http://www.tracemyip.org
- Sat Jul 4 18:33:50 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:50 2020 kern.info kernel: [ 47.107939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
- Sat Jul 4 18:33:50 2020 kern.info kernel: [ 47.114565] br-lan: port 3(wlan1) entered blocking state
- Sat Jul 4 18:33:50 2020 kern.info kernel: [ 47.119974] br-lan: port 3(wlan1) entered forwarding state
- Sat Jul 4 18:33:50 2020 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
- Sat Jul 4 18:33:50 2020 daemon.notice hostapd: wlan1: AP-ENABLED
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.10
- Sat Jul 4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
- Sat Jul 4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Sat Jul 4 18:33:50 2020 daemon.info ddns_gargoyle[2523]: Successfully retrieved local ip from url: http://checkip.dyndns.org
- Sat Jul 4 18:33:50 2020 daemon.info ddns_gargoyle[2523]: local IP = 201.13.76.52
- Sat Jul 4 18:33:50 2020 daemon.info ddns_gargoyle[2523]: remote IP cannot be determined
- Sat Jul 4 18:33:50 2020 daemon.notice netifd: Network device 'wlan1' link is up
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Diffie-Hellman initialized with 1024 bit key
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: TUN/TAP device tun0 opened
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: TUN/TAP TX queue length set to 100
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: /sbin/ifconfig tun0 10.0.8.1 netmask 255.255.255.0 mtu 1500 broadcast 10.0.8.255
- Sat Jul 4 18:33:50 2020 daemon.warn openvpn(custom_config)[2605]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Socket Buffers: R=[163840->163840] S=[163840->163840]
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: UDPv4 link local (bound): [AF_INET][undef]:443
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: UDPv4 link remote: [AF_UNSPEC]
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: MULTI: multi_init called, r=256 v=256
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: IFCONFIG POOL: base=10.0.8.2 size=253, ipv6=0
- Sat Jul 4 18:33:50 2020 daemon.notice openvpn(custom_config)[2605]: Initialization Sequence Completed
- Sat Jul 4 18:33:51 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:52 2020 daemon.info ddns_gargoyle[2523]: Update successful
- Sat Jul 4 18:33:52 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:52 2020 kern.warn kernel: [ 48.942378] ipt_bandwidth: timezone shift of 180 minutes detected, adjusting
- Sat Jul 4 18:33:52 2020 kern.warn kernel: [ 48.949541] old minutes west=0, new minutes west=180
- Sat Jul 4 18:33:53 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 IEEE 802.11: authenticated
- Sat Jul 4 18:33:53 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 IEEE 802.11: associated (aid 1)
- Sat Jul 4 18:33:53 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED a8:47:4a:ed:84:03
- Sat Jul 4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 RADIUS: starting accounting session E4B65D83B0DC4256
- Sat Jul 4 18:33:53 2020 daemon.info hostapd: wlan0: STA a8:47:4a:ed:84:03 WPA: pairwise key handshake completed (RSN)
- Sat Jul 4 18:33:53 2020 cron.info crond[2948]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:33:54 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:56 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:56 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.101 a8:47:4a:ed:84:03
- Sat Jul 4 18:33:57 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 IEEE 802.11: authenticated
- Sat Jul 4 18:34:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 IEEE 802.11: associated (aid 2)
- Sat Jul 4 18:34:00 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 7e:03:29:2d:49:07
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 RADIUS: starting accounting session 815A24B70EEDA8C2
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA 7e:03:29:2d:49:07 WPA: pairwise key handshake completed (RSN)
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb IEEE 802.11: authenticated
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb IEEE 802.11: associated (aid 3)
- Sat Jul 4 18:34:00 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb RADIUS: starting accounting session AE0AF036AFF6C13E
- Sat Jul 4 18:34:00 2020 daemon.info hostapd: wlan0: STA f8:e4:e3:7b:01:fb WPA: pairwise key handshake completed (RSN)
- Sat Jul 4 18:34:00 2020 cron.info crond[2948]: USER root pid 3031 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:34:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 IEEE 802.11: authenticated
- Sat Jul 4 18:34:01 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 IEEE 802.11: associated (aid 4)
- Sat Jul 4 18:34:01 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 RADIUS: starting accounting session 1C35791BD823A76D
- Sat Jul 4 18:34:01 2020 daemon.info hostapd: wlan0: STA 50:8f:4c:ca:eb:55 WPA: pairwise key handshake completed (RSN)
- Sat Jul 4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a IEEE 802.11: authenticated
- Sat Jul 4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a IEEE 802.11: associated (aid 5)
- Sat Jul 4 18:34:02 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED c0:97:27:30:39:5a
- Sat Jul 4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a RADIUS: starting accounting session 12A4AB4EF2F67928
- Sat Jul 4 18:34:02 2020 daemon.info hostapd: wlan0: STA c0:97:27:30:39:5a WPA: pairwise key handshake completed (RSN)
- Sat Jul 4 18:34:02 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 7e:03:29:2d:49:07
- Sat Jul 4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:03 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb desktop-01
- Sat Jul 4 18:34:03 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:04 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 7e:03:29:2d:49:07
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:07 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:07 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:08 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55
- Sat Jul 4 18:34:10 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.177 50:8f:4c:ca:eb:55 MIPAD3-MiPad3
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.167 7e:03:29:2d:49:07
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.127 c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPDISCOVER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPOFFER(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.100 f8:e4:e3:7b:01:fb desktop-01
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPREQUEST(br-lan) 192.168.1.127 c0:97:27:30:39:5a
- Sat Jul 4 18:34:10 2020 daemon.info dnsmasq-dhcp[2488]: DHCPACK(br-lan) 192.168.1.127 c0:97:27:30:39:5a
- Sat Jul 4 18:34:11 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:11 2020 daemon.err uhttpd[2133]: sh: write error: Broken pipe
- Sat Jul 4 18:34:12 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:15 2020 user.notice root: vsftpd init: mounted = 0
- Sat Jul 4 18:34:15 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S90vsftpd: ERROR: No drives attached, no directories to share!
- Sat Jul 4 18:34:15 2020 kern.notice kernel: [ 71.966720] random: crng init done
- Sat Jul 4 18:34:15 2020 kern.notice kernel: [ 71.970178] random: 6 urandom warning(s) missed due to ratelimiting
- Sat Jul 4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led USB1
- Sat Jul 4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led USB2
- Sat Jul 4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN2G
- Sat Jul 4 18:34:15 2020 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN5G
- Sat Jul 4 18:34:16 2020 user.info Gargoyle STA Manager: Starting...
- Sat Jul 4 18:34:16 2020 user.info Gargoyle STA Manager: No STA Config found in Wireless CFG. Exiting...
- Sat Jul 4 18:34:16 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:16 2020 daemon.info procd: - init complete -
- Sat Jul 4 18:34:16 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:17 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:26 2020 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
- Sat Jul 4 18:34:26 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:27 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:37 2020 cron.info crond[3611]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:37 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:38 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:39 2020 cron.info crond[3867]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:39 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:40 2020 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
- Sat Jul 4 18:34:40 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:40 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:41 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:50 2020 cron.info crond[4095]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:50 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:51 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:52 2020 cron.info crond[4351]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:52 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:53 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:56 2020 cron.info crond[4501]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:56 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:57 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:34:58 2020 cron.info crond[4876]: crond (busybox 1.28.4) started, log level 7
- Sat Jul 4 18:34:58 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:34:59 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:35:00 2020 cron.info crond[4876]: USER root pid 4889 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:35:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:35:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: Checking whether update needed:
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: service provider=duckdns.org
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: domain=cybereu.duckdns.org
- Sat Jul 4 18:35:04 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: Successfully retrieved local ip from url: http://checkip.org
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: local IP = 201.13.76.52
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: remote IP = 201.13.76.52
- Sat Jul 4 18:35:04 2020 daemon.info ddns_gargoyle[2523]: Update not needed, IPs match
- Sat Jul 4 18:35:05 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:35:19 2020 daemon.err openvpn(custom_config)[2605]: event_wait : Interrupted system call (code=4)
- Sat Jul 4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: Closing TUN/TAP interface
- Sat Jul 4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: /sbin/ifconfig tun0 0.0.0.0
- Sat Jul 4 18:35:19 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:35:19 2020 daemon.notice openvpn(custom_config)[2605]: SIGTERM[hard,] received, process exiting
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: OpenVPN 2.4.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.10
- Sat Jul 4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want
- Sat Jul 4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Diffie-Hellman initialized with 1024 bit key
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: TUN/TAP device tun0 opened
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: TUN/TAP TX queue length set to 100
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: /sbin/ifconfig tun0 10.0.8.1 netmask 255.255.255.0 mtu 1500 broadcast 10.0.8.255
- Sat Jul 4 18:35:20 2020 daemon.warn openvpn(custom_config)[4933]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Socket Buffers: R=[163840->163840] S=[163840->163840]
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: UDPv4 link local (bound): [AF_INET][undef]:443
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: UDPv4 link remote: [AF_UNSPEC]
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: MULTI: multi_init called, r=256 v=256
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: IFCONFIG POOL: base=10.0.8.2 size=253, ipv6=0
- Sat Jul 4 18:35:20 2020 daemon.notice openvpn(custom_config)[4933]: Initialization Sequence Completed
- Sat Jul 4 18:35:20 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:36:00 2020 cron.info crond[4876]: USER root pid 4975 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:36:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:36:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:37:00 2020 cron.info crond[4876]: USER root pid 4979 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:37:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:37:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:38:00 2020 cron.info crond[4876]: USER root pid 4983 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:38:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:38:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:39:00 2020 cron.info crond[4876]: USER root pid 4987 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:39:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:39:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:40:00 2020 cron.info crond[4876]: USER root pid 4991 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:40:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:40:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:41:00 2020 cron.info crond[4876]: USER root pid 4995 cmd /usr/bin/set_kernel_timezone >/dev/null 2>&1
- Sat Jul 4 18:41:00 2020 cron.info crond[4876]: USER root pid 4996 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:41:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:41:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:42:00 2020 cron.info crond[4876]: USER root pid 5000 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:42:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:42:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:43:00 2020 cron.info crond[4876]: USER root pid 5004 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:43:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:43:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:44:00 2020 cron.info crond[4876]: USER root pid 5008 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:44:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:44:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:45:00 2020 cron.info crond[4876]: USER root pid 5012 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:45:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:45:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:46:00 2020 cron.info crond[4876]: USER root pid 5024 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:46:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:46:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:46:46 2020 authpriv.info dropbear[5028]: Child connection from 192.168.1.100:41080
- Sat Jul 4 18:46:46 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:46:47 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:46:49 2020 authpriv.notice dropbear[5028]: Password auth succeeded for 'root' from 192.168.1.100:41080
- Sat Jul 4 18:46:49 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:46:50 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:47:00 2020 cron.info crond[4876]: USER root pid 5038 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:47:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:47:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:48:00 2020 cron.info crond[4876]: USER root pid 5045 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:48:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:48:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
- Sat Jul 4 18:49:00 2020 cron.info crond[4876]: USER root pid 5049 cmd if [ -z "$(ifconfig | grep tun 2>/dev/null)" ] ; then logger "openvpn stopped, restarting" ; /etc/init.d/openvpn restart ; fi
- Sat Jul 4 18:49:00 2020 daemon.info logread[1451]: failed to send log data to 192.168.1.1:514 via udp
- Sat Jul 4 18:49:01 2020 daemon.info logread[1451]: Logread connected to 192.168.1.1:514
Add Comment
Please, Sign In to add comment