Advertisement
Guest User

General log Asus

a guest
Nov 15th, 2017
334
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 82.78 KB | None | 0 0
  1.  
  2. Nov 13 16:27:42 kernel: ubi1: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
  3. Nov 13 16:27:42 kernel: ubi1: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
  4. Nov 13 16:27:42 kernel: ubi1: VID header offset: 2048 (aligned 2048), data offset: 4096
  5. Nov 13 16:27:42 kernel: ubi1: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
  6. Nov 13 16:27:42 kernel: ubi1: user volume: 1, internal volumes: 1, max. volumes count: 128
  7. Nov 13 16:27:42 kernel: ubi1: max/mean erase counter: 3/2, WL threshold: 4096, image sequence number: 1960956644
  8. Nov 13 16:27:42 kernel: ubi1: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
  9. Nov 13 16:27:42 kernel: ubi1: background thread "ubi_bgt1d" started, PID 16739
  10. Nov 13 16:27:43 kernel: UBIFS (ubi1:0): UBIFS: mounted UBI device 1, volume 0, name "nvram", R/O mode
  11. Nov 13 16:27:43 kernel: UBIFS (ubi1:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  12. Nov 13 16:27:43 kernel: UBIFS (ubi1:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1015809 bytes (0 MiB, 6 LEBs)
  13. Nov 13 16:27:43 kernel: UBIFS (ubi1:0): reserved for root: 275879 bytes (269 KiB)
  14. Nov 13 16:27:43 kernel: UBIFS (ubi1:0): media format: w4/r0 (latest is w4/r0), UUID 700E756D-208E-4C91-B256-B51AA3EDE77F, small LPT model
  15. Nov 13 16:27:44 kernel: UBIFS (ubi1:0): un-mount UBI device 1
  16. Nov 13 16:27:44 kernel: ubi1: detaching mtd9
  17. Nov 13 16:27:44 kernel: ubi1: mtd9 is detached
  18. Nov 13 16:27:45 kernel: device eth5 entered promiscuous mode
  19. Nov 13 16:27:45 kernel: br0: port 5(eth5) entered listening state
  20. Nov 13 16:27:45 kernel: br0: port 5(eth5) entered listening state
  21. Nov 13 16:27:46 kernel: device eth6 entered promiscuous mode
  22. Nov 13 16:27:46 kernel: br0: port 6(eth6) entered listening state
  23. Nov 13 16:27:46 kernel: br0: port 6(eth6) entered listening state
  24. Nov 13 16:27:47 kernel: br0: port 5(eth5) entered learning state
  25. Nov 13 16:27:48 kernel: br0: port 6(eth6) entered learning state
  26. Nov 13 16:27:49 kernel: br0: topology change detected, propagating
  27. Nov 13 16:27:49 kernel: br0: port 5(eth5) entered forwarding state
  28. Nov 13 16:27:50 kernel: br0: topology change detected, propagating
  29. Nov 13 16:27:50 kernel: br0: port 6(eth6) entered forwarding state
  30. Nov 13 16:27:51 kernel: ubi1: attaching mtd9
  31. Nov 13 16:27:51 kernel: ubi1: scanning is finished
  32. Nov 13 16:27:51 kernel: ubi1: attached mtd9 (name "misc1", size 8 MiB)
  33. Nov 13 16:27:51 kernel: ubi1: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
  34. Nov 13 16:27:51 kernel: ubi1: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
  35. Nov 13 16:27:51 kernel: ubi1: VID header offset: 2048 (aligned 2048), data offset: 4096
  36. Nov 13 16:27:51 kernel: ubi1: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
  37. Nov 13 16:27:51 kernel: ubi1: user volume: 1, internal volumes: 1, max. volumes count: 128
  38. Nov 13 16:27:51 kernel: ubi1: max/mean erase counter: 3/2, WL threshold: 4096, image sequence number: 1960956644
  39. Nov 13 16:27:51 kernel: ubi1: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
  40. Nov 13 16:27:51 kernel: ubi1: background thread "ubi_bgt1d" started, PID 16953
  41. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): UBIFS: mounted UBI device 1, volume 0, name "nvram", R/O mode
  42. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
  43. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1015809 bytes (0 MiB, 6 LEBs)
  44. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): reserved for root: 275879 bytes (269 KiB)
  45. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): media format: w4/r0 (latest is w4/r0), UUID 700E756D-208E-4C91-B256-B51AA3EDE77F, small LPT model
  46. Nov 13 16:27:52 kernel: UBIFS (ubi1:0): un-mount UBI device 1
  47. Nov 13 16:27:52 kernel: ubi1: detaching mtd9
  48. Nov 13 16:27:52 kernel: ubi1: mtd9 is detached
  49. Nov 13 16:52:26 kernel: br0: received packet on eth5 with own address as source address
  50. Nov 13 17:01:56 miniupnpd[14878]: upnp_event_recv: recv(): Connection reset by peer
  51. Nov 13 17:01:58 openvpn[13687]: TLS: tls_process: killed expiring key
  52. Nov 13 17:01:59 openvpn[13687]: TLS: soft reset sec=0 bytes=314897190/-1 pkts=363760/0
  53. Nov 13 17:01:59 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  54. Nov 13 17:01:59 openvpn[13687]: VERIFY KU OK
  55. Nov 13 17:01:59 openvpn[13687]: Validating certificate extended key usage
  56. Nov 13 17:01:59 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  57. Nov 13 17:01:59 openvpn[13687]: VERIFY EKU OK
  58. Nov 13 17:01:59 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  59. Nov 13 17:02:00 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  60. Nov 13 17:02:00 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  61. Nov 13 17:02:00 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  62. Nov 13 17:02:00 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  63. Nov 13 17:02:00 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  64. Nov 13 17:07:05 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  65. Nov 13 17:07:05 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON2685CB
  66. Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  67. Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  68. Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  69. Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  70. Nov 13 17:14:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  71. Nov 13 17:14:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  72. Nov 13 17:14:18 kernel: br0: received packet on eth5 with own address as source address
  73. Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  74. Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  75. Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  76. Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  77. Nov 13 17:29:46 kernel: br0: received packet on eth5 with own address as source address
  78. Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) a0:91:69:fe:7e:8b
  79. Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  80. Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  81. Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  82. Nov 13 17:51:02 kernel: br0: received packet on eth5 with own address as source address
  83. Nov 13 18:01:59 openvpn[13687]: TLS: tls_process: killed expiring key
  84. Nov 13 18:02:00 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  85. Nov 13 18:02:00 openvpn[13687]: VERIFY KU OK
  86. Nov 13 18:02:00 openvpn[13687]: Validating certificate extended key usage
  87. Nov 13 18:02:00 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  88. Nov 13 18:02:00 openvpn[13687]: VERIFY EKU OK
  89. Nov 13 18:02:00 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  90. Nov 13 18:02:01 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  91. Nov 13 18:02:01 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  92. Nov 13 18:02:01 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  93. Nov 13 18:02:01 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  94. Nov 13 18:02:01 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  95. Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  96. Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  97. Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  98. Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  99. Nov 13 18:03:13 miniupnpd[14878]: upnp_event_process_notify: connect(192.168.1.250:2869): Connection timed out
  100. Nov 13 18:03:18 miniupnpd[14878]: HTTP Connection from 192.168.1.104 closed unexpectedly
  101. Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  102. Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  103. Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  104. Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  105. Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  106. Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  107. Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  108. Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  109. Nov 13 19:02:00 openvpn[13687]: TLS: tls_process: killed expiring key
  110. Nov 13 19:02:01 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  111. Nov 13 19:02:01 openvpn[13687]: VERIFY KU OK
  112. Nov 13 19:02:01 openvpn[13687]: Validating certificate extended key usage
  113. Nov 13 19:02:01 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  114. Nov 13 19:02:01 openvpn[13687]: VERIFY EKU OK
  115. Nov 13 19:02:01 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  116. Nov 13 19:02:02 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  117. Nov 13 19:02:02 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  118. Nov 13 19:02:02 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  119. Nov 13 19:02:02 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  120. Nov 13 19:02:02 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  121. Nov 13 19:26:28 kernel: br0: received packet on eth5 with own address as source address
  122. Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  123. Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  124. Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  125. Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  126. Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  127. Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  128. Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  129. Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  130. Nov 13 20:02:01 openvpn[13687]: TLS: tls_process: killed expiring key
  131. Nov 13 20:02:02 openvpn[13687]: TLS: soft reset sec=0 bytes=20808425/-1 pkts=35590/0
  132. Nov 13 20:02:02 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  133. Nov 13 20:02:02 openvpn[13687]: VERIFY KU OK
  134. Nov 13 20:02:02 openvpn[13687]: Validating certificate extended key usage
  135. Nov 13 20:02:02 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  136. Nov 13 20:02:02 openvpn[13687]: VERIFY EKU OK
  137. Nov 13 20:02:02 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  138. Nov 13 20:02:03 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  139. Nov 13 20:02:03 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  140. Nov 13 20:02:03 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  141. Nov 13 20:02:03 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  142. Nov 13 20:02:03 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  143. Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  144. Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  145. Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  146. Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  147. Nov 13 20:23:04 miniupnpd[14878]: HTTP Connection from 192.168.1.102 closed unexpectedly
  148. Nov 13 20:29:30 kernel: br0: received packet on eth5 with own address as source address
  149. Nov 13 20:45:40 miniupnpd[14878]: HTTP Connection from 192.168.1.103 closed unexpectedly
  150. Nov 13 21:02:02 openvpn[13687]: TLS: tls_process: killed expiring key
  151. Nov 13 21:02:03 openvpn[13687]: TLS: soft reset sec=0 bytes=82297237/-1 pkts=92318/0
  152. Nov 13 21:02:03 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  153. Nov 13 21:02:03 openvpn[13687]: VERIFY KU OK
  154. Nov 13 21:02:03 openvpn[13687]: Validating certificate extended key usage
  155. Nov 13 21:02:03 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  156. Nov 13 21:02:03 openvpn[13687]: VERIFY EKU OK
  157. Nov 13 21:02:03 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  158. Nov 13 21:02:03 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  159. Nov 13 21:02:03 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  160. Nov 13 21:02:03 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  161. Nov 13 21:02:03 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  162. Nov 13 21:02:03 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  163. Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  164. Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  165. Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  166. Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  167. Nov 13 21:32:23 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  168. Nov 13 21:32:23 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  169. Nov 13 21:32:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  170. Nov 13 21:32:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  171. Nov 13 21:32:37 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  172. Nov 13 21:32:37 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  173. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) bc:ee:7b:13:b6:89
  174. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.41 bc:ee:7b:13:b6:89
  175. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) bc:ee:7b:13:b6:89
  176. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.41 bc:ee:7b:13:b6:89
  177. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.41 bc:ee:7b:13:b6:89
  178. Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.41 bc:ee:7b:13:b6:89 android-11c9bc1f6749fb15
  179. Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 80:d2:1d:0a:c1:55
  180. Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.213 80:d2:1d:0a:c1:55
  181. Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.213 80:d2:1d:0a:c1:55
  182. Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.213 80:d2:1d:0a:c1:55 android-f22b94c256a3ffc0
  183. Nov 13 21:55:08 miniupnpd[14878]: HTTP Connection from 192.168.1.103 closed unexpectedly
  184. Nov 13 22:02:03 openvpn[13687]: TLS: soft reset sec=0 bytes=151649708/-1 pkts=133882/0
  185. Nov 13 22:02:03 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  186. Nov 13 22:02:03 openvpn[13687]: VERIFY KU OK
  187. Nov 13 22:02:03 openvpn[13687]: Validating certificate extended key usage
  188. Nov 13 22:02:03 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  189. Nov 13 22:02:03 openvpn[13687]: VERIFY EKU OK
  190. Nov 13 22:02:03 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  191. Nov 13 22:02:04 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  192. Nov 13 22:02:04 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  193. Nov 13 22:02:04 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  194. Nov 13 22:02:04 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  195. Nov 13 22:02:04 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  196. Nov 13 22:06:21 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
  197. Nov 13 22:06:21 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
  198. Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
  199. Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  200. Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  201. Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
  202. Nov 13 22:31:04 kernel: br0: received packet on eth5 with own address as source address
  203. Nov 13 22:31:07 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.213 80:d2:1d:0a:c1:55
  204. Nov 13 22:31:07 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.213 80:d2:1d:0a:c1:55 android-f22b94c256a3ffc0
  205. Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  206. Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  207. Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  208. Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  209. Nov 13 23:00:40 disk_monitor: Got SIGALRM...
  210. Nov 13 23:02:03 openvpn[13687]: TLS: tls_process: killed expiring key
  211. Nov 13 23:02:04 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  212. Nov 13 23:02:04 openvpn[13687]: VERIFY KU OK
  213. Nov 13 23:02:04 openvpn[13687]: Validating certificate extended key usage
  214. Nov 13 23:02:04 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  215. Nov 13 23:02:04 openvpn[13687]: VERIFY EKU OK
  216. Nov 13 23:02:04 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  217. Nov 13 23:02:05 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  218. Nov 13 23:02:05 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  219. Nov 13 23:02:05 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  220. Nov 13 23:02:05 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  221. Nov 13 23:02:05 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  222. Nov 13 23:18:23 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  223. Nov 13 23:18:23 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  224. Nov 13 23:18:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  225. Nov 13 23:18:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  226. Nov 13 23:18:36 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  227. Nov 13 23:18:36 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  228. Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  229. Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  230. Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  231. Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  232. Nov 14 00:02:04 openvpn[13687]: TLS: tls_process: killed expiring key
  233. Nov 14 00:02:05 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  234. Nov 14 00:02:05 openvpn[13687]: VERIFY KU OK
  235. Nov 14 00:02:05 openvpn[13687]: Validating certificate extended key usage
  236. Nov 14 00:02:05 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  237. Nov 14 00:02:05 openvpn[13687]: VERIFY EKU OK
  238. Nov 14 00:02:05 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  239. Nov 14 00:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  240. Nov 14 00:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  241. Nov 14 00:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  242. Nov 14 00:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  243. Nov 14 00:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  244. Nov 14 00:11:17 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  245. Nov 14 00:11:17 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  246. Nov 14 00:26:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
  247. Nov 14 00:26:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
  248. Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
  249. Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
  250. Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
  251. Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.61 8c:3a:e3:56:a9:b2 android-fadf4e59f7cc447b
  252. Nov 14 00:41:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  253. Nov 14 00:41:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  254. Nov 14 00:41:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  255. Nov 14 00:41:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  256. Nov 14 00:41:14 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
  257. Nov 14 00:41:14 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
  258. Nov 14 01:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  259. Nov 14 01:02:06 openvpn[13687]: VERIFY KU OK
  260. Nov 14 01:02:06 openvpn[13687]: Validating certificate extended key usage
  261. Nov 14 01:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  262. Nov 14 01:02:06 openvpn[13687]: VERIFY EKU OK
  263. Nov 14 01:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  264. Nov 14 01:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  265. Nov 14 01:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  266. Nov 14 01:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  267. Nov 14 01:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  268. Nov 14 01:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  269. Nov 14 02:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  270. Nov 14 02:02:06 openvpn[13687]: VERIFY KU OK
  271. Nov 14 02:02:06 openvpn[13687]: Validating certificate extended key usage
  272. Nov 14 02:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  273. Nov 14 02:02:06 openvpn[13687]: VERIFY EKU OK
  274. Nov 14 02:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  275. Nov 14 02:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  276. Nov 14 02:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  277. Nov 14 02:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  278. Nov 14 02:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  279. Nov 14 02:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  280. Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
  281. Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  282. Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  283. Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
  284. Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  285. Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  286. Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  287. Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  288. Nov 14 03:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  289. Nov 14 03:02:06 openvpn[13687]: VERIFY KU OK
  290. Nov 14 03:02:06 openvpn[13687]: Validating certificate extended key usage
  291. Nov 14 03:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  292. Nov 14 03:02:06 openvpn[13687]: VERIFY EKU OK
  293. Nov 14 03:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  294. Nov 14 03:02:07 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  295. Nov 14 03:02:07 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  296. Nov 14 03:02:07 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  297. Nov 14 03:02:07 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  298. Nov 14 03:02:07 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  299. Nov 14 04:02:06 openvpn[13687]: TLS: tls_process: killed expiring key
  300. Nov 14 04:02:07 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  301. Nov 14 04:02:07 openvpn[13687]: VERIFY KU OK
  302. Nov 14 04:02:07 openvpn[13687]: Validating certificate extended key usage
  303. Nov 14 04:02:07 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  304. Nov 14 04:02:07 openvpn[13687]: VERIFY EKU OK
  305. Nov 14 04:02:07 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  306. Nov 14 04:02:08 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  307. Nov 14 04:02:08 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  308. Nov 14 04:02:08 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  309. Nov 14 04:02:08 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  310. Nov 14 04:02:08 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  311. Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
  312. Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  313. Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  314. Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
  315. Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  316. Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  317. Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  318. Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  319. Nov 14 05:02:07 openvpn[13687]: TLS: tls_process: killed expiring key
  320. Nov 14 05:02:08 openvpn[13687]: TLS: soft reset sec=0 bytes=1381080/-1 pkts=2522/0
  321. Nov 14 05:02:08 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  322. Nov 14 05:02:08 openvpn[13687]: VERIFY KU OK
  323. Nov 14 05:02:08 openvpn[13687]: Validating certificate extended key usage
  324. Nov 14 05:02:08 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  325. Nov 14 05:02:08 openvpn[13687]: VERIFY EKU OK
  326. Nov 14 05:02:08 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  327. Nov 14 05:02:09 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  328. Nov 14 05:02:09 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  329. Nov 14 05:02:09 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  330. Nov 14 05:02:09 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  331. Nov 14 05:02:09 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  332. Nov 14 05:07:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  333. Nov 14 05:07:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON2685CB
  334. Nov 14 05:13:49 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  335. Nov 14 05:13:49 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  336. Nov 14 06:02:08 openvpn[13687]: TLS: tls_process: killed expiring key
  337. Nov 14 06:02:09 openvpn[13687]: TLS: soft reset sec=0 bytes=207998/-1 pkts=1252/0
  338. Nov 14 06:02:09 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  339. Nov 14 06:02:09 openvpn[13687]: VERIFY KU OK
  340. Nov 14 06:02:09 openvpn[13687]: Validating certificate extended key usage
  341. Nov 14 06:02:09 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  342. Nov 14 06:02:09 openvpn[13687]: VERIFY EKU OK
  343. Nov 14 06:02:09 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  344. Nov 14 06:02:10 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  345. Nov 14 06:02:10 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  346. Nov 14 06:02:10 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  347. Nov 14 06:02:10 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  348. Nov 14 06:02:10 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  349. Nov 14 07:02:09 openvpn[13687]: TLS: tls_process: killed expiring key
  350. Nov 14 07:02:10 openvpn[13687]: TLS: soft reset sec=0 bytes=143814/-1 pkts=958/0
  351. Nov 14 07:02:10 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  352. Nov 14 07:02:10 openvpn[13687]: VERIFY KU OK
  353. Nov 14 07:02:10 openvpn[13687]: Validating certificate extended key usage
  354. Nov 14 07:02:10 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  355. Nov 14 07:02:10 openvpn[13687]: VERIFY EKU OK
  356. Nov 14 07:02:10 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  357. Nov 14 07:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  358. Nov 14 07:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  359. Nov 14 07:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  360. Nov 14 07:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  361. Nov 14 07:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  362. Nov 14 08:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=1937414/-1 pkts=3802/0
  363. Nov 14 08:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  364. Nov 14 08:02:11 openvpn[13687]: VERIFY KU OK
  365. Nov 14 08:02:11 openvpn[13687]: Validating certificate extended key usage
  366. Nov 14 08:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  367. Nov 14 08:02:11 openvpn[13687]: VERIFY EKU OK
  368. Nov 14 08:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  369. Nov 14 08:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  370. Nov 14 08:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  371. Nov 14 08:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  372. Nov 14 08:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  373. Nov 14 08:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  374. Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  375. Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  376. Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  377. Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  378. Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  379. Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  380. Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  381. Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  382. Nov 14 09:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=2251269737/-1 pkts=2331295/0
  383. Nov 14 09:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  384. Nov 14 09:02:11 openvpn[13687]: VERIFY KU OK
  385. Nov 14 09:02:11 openvpn[13687]: Validating certificate extended key usage
  386. Nov 14 09:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  387. Nov 14 09:02:11 openvpn[13687]: VERIFY EKU OK
  388. Nov 14 09:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  389. Nov 14 09:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  390. Nov 14 09:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  391. Nov 14 09:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  392. Nov 14 09:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  393. Nov 14 09:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  394. Nov 14 09:38:01 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
  395. Nov 14 09:38:01 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
  396. Nov 14 10:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=1294105565/-1 pkts=1369574/0
  397. Nov 14 10:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  398. Nov 14 10:02:11 openvpn[13687]: VERIFY KU OK
  399. Nov 14 10:02:11 openvpn[13687]: Validating certificate extended key usage
  400. Nov 14 10:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  401. Nov 14 10:02:11 openvpn[13687]: VERIFY EKU OK
  402. Nov 14 10:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  403. Nov 14 10:02:12 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  404. Nov 14 10:02:12 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  405. Nov 14 10:02:12 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  406. Nov 14 10:02:12 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  407. Nov 14 10:02:12 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  408. Nov 14 11:02:11 openvpn[13687]: TLS: tls_process: killed expiring key
  409. Nov 14 11:02:12 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  410. Nov 14 11:02:12 openvpn[13687]: VERIFY KU OK
  411. Nov 14 11:02:12 openvpn[13687]: Validating certificate extended key usage
  412. Nov 14 11:02:12 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  413. Nov 14 11:02:12 openvpn[13687]: VERIFY EKU OK
  414. Nov 14 11:02:12 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  415. Nov 14 11:02:12 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  416. Nov 14 11:02:12 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  417. Nov 14 11:02:12 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  418. Nov 14 11:02:12 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  419. Nov 14 11:02:12 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  420. Nov 14 11:03:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  421. Nov 14 11:03:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  422. Nov 14 12:02:12 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  423. Nov 14 12:02:12 openvpn[13687]: VERIFY KU OK
  424. Nov 14 12:02:12 openvpn[13687]: Validating certificate extended key usage
  425. Nov 14 12:02:12 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  426. Nov 14 12:02:12 openvpn[13687]: VERIFY EKU OK
  427. Nov 14 12:02:12 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  428. Nov 14 12:02:13 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  429. Nov 14 12:02:13 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  430. Nov 14 12:02:13 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  431. Nov 14 12:02:13 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  432. Nov 14 12:02:13 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  433. Nov 14 12:33:00 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
  434. Nov 14 12:33:00 kernel: br0: port 1(eth1) entered listening state
  435. Nov 14 12:33:00 kernel: br0: port 1(eth1) entered listening state
  436. Nov 14 12:33:02 kernel: br0: port 1(eth1) entered learning state
  437. Nov 14 12:33:04 kernel: br0: topology change detected, propagating
  438. Nov 14 12:33:04 kernel: br0: port 1(eth1) entered forwarding state
  439. Nov 14 12:33:07 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
  440. Nov 14 12:33:07 kernel: br0: port 1(eth1) entered disabled state
  441. Nov 14 12:33:10 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
  442. Nov 14 12:33:10 kernel: br0: port 1(eth1) entered listening state
  443. Nov 14 12:33:10 kernel: br0: port 1(eth1) entered listening state
  444. Nov 14 12:33:12 kernel: br0: port 1(eth1) entered learning state
  445. Nov 14 12:33:12 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
  446. Nov 14 12:33:12 kernel: br0: port 1(eth1) entered disabled state
  447. Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
  448. Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
  449. Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  450. Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
  451. Nov 14 12:38:16 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
  452. Nov 14 12:38:16 kernel: br0: port 1(eth1) entered listening state
  453. Nov 14 12:38:16 kernel: br0: port 1(eth1) entered listening state
  454. Nov 14 12:38:18 kernel: br0: port 1(eth1) entered learning state
  455. Nov 14 12:38:20 kernel: br0: topology change detected, propagating
  456. Nov 14 12:38:20 kernel: br0: port 1(eth1) entered forwarding state
  457. Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
  458. Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
  459. Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  460. Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
  461. Nov 14 12:39:51 rc_service: httpd 760:notify_rc start_lltdc
  462. Nov 14 13:02:12 openvpn[13687]: TLS: tls_process: killed expiring key
  463. Nov 14 13:02:13 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  464. Nov 14 13:02:13 openvpn[13687]: VERIFY KU OK
  465. Nov 14 13:02:13 openvpn[13687]: Validating certificate extended key usage
  466. Nov 14 13:02:13 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  467. Nov 14 13:02:13 openvpn[13687]: VERIFY EKU OK
  468. Nov 14 13:02:13 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  469. Nov 14 13:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  470. Nov 14 13:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  471. Nov 14 13:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  472. Nov 14 13:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  473. Nov 14 13:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  474. Nov 14 14:02:13 openvpn[13687]: TLS: tls_process: killed expiring key
  475. Nov 14 14:02:14 openvpn[13687]: TLS: soft reset sec=0 bytes=2409391571/-1 pkts=2506663/0
  476. Nov 14 14:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  477. Nov 14 14:02:14 openvpn[13687]: VERIFY KU OK
  478. Nov 14 14:02:14 openvpn[13687]: Validating certificate extended key usage
  479. Nov 14 14:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  480. Nov 14 14:02:14 openvpn[13687]: VERIFY EKU OK
  481. Nov 14 14:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  482. Nov 14 14:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  483. Nov 14 14:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  484. Nov 14 14:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  485. Nov 14 14:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  486. Nov 14 14:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  487. Nov 14 15:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  488. Nov 14 15:02:14 openvpn[13687]: VERIFY KU OK
  489. Nov 14 15:02:14 openvpn[13687]: Validating certificate extended key usage
  490. Nov 14 15:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  491. Nov 14 15:02:14 openvpn[13687]: VERIFY EKU OK
  492. Nov 14 15:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  493. Nov 14 15:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  494. Nov 14 15:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  495. Nov 14 15:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  496. Nov 14 15:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  497. Nov 14 15:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  498. Nov 14 15:52:11 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  499. Nov 14 15:52:11 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  500. Nov 14 16:02:14 openvpn[13687]: TLS: soft reset sec=0 bytes=17160118/-1 pkts=22342/0
  501. Nov 14 16:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  502. Nov 14 16:02:14 openvpn[13687]: VERIFY KU OK
  503. Nov 14 16:02:14 openvpn[13687]: Validating certificate extended key usage
  504. Nov 14 16:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  505. Nov 14 16:02:14 openvpn[13687]: VERIFY EKU OK
  506. Nov 14 16:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  507. Nov 14 16:02:15 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  508. Nov 14 16:02:15 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  509. Nov 14 16:02:15 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  510. Nov 14 16:02:15 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  511. Nov 14 16:02:15 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  512. Nov 14 16:28:37 kernel: br0: received packet on eth5 with own address as source address
  513. Nov 14 16:29:13 kernel: br0: received packet on eth6 with own address as source address
  514. Nov 14 17:02:14 openvpn[13687]: TLS: tls_process: killed expiring key
  515. Nov 14 17:02:15 openvpn[13687]: TLS: soft reset sec=0 bytes=142014070/-1 pkts=160204/0
  516. Nov 14 17:02:15 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  517. Nov 14 17:02:15 openvpn[13687]: VERIFY KU OK
  518. Nov 14 17:02:15 openvpn[13687]: Validating certificate extended key usage
  519. Nov 14 17:02:15 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  520. Nov 14 17:02:15 openvpn[13687]: VERIFY EKU OK
  521. Nov 14 17:02:15 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  522. Nov 14 17:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  523. Nov 14 17:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  524. Nov 14 17:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  525. Nov 14 17:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  526. Nov 14 17:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  527. Nov 14 17:33:33 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  528. Nov 14 17:33:33 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  529. Nov 14 17:50:03 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
  530. Nov 14 17:50:03 kernel: br0: port 1(eth1) entered disabled state
  531. Nov 14 17:50:15 kernel: eth3 (Ext switch port: 2) (Logical Port: 10) Link UP 100 mbps full duplex
  532. Nov 14 17:50:15 kernel: br0: port 3(eth3) entered listening state
  533. Nov 14 17:50:15 kernel: br0: port 3(eth3) entered listening state
  534. Nov 14 17:50:17 kernel: br0: port 3(eth3) entered learning state
  535. Nov 14 17:50:19 kernel: br0: topology change detected, propagating
  536. Nov 14 17:50:19 kernel: br0: port 3(eth3) entered forwarding state
  537. Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
  538. Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
  539. Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  540. Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
  541. Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  542. Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  543. Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  544. Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  545. Nov 14 18:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  546. Nov 14 18:02:16 openvpn[13687]: VERIFY KU OK
  547. Nov 14 18:02:16 openvpn[13687]: Validating certificate extended key usage
  548. Nov 14 18:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  549. Nov 14 18:02:16 openvpn[13687]: VERIFY EKU OK
  550. Nov 14 18:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  551. Nov 14 18:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  552. Nov 14 18:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  553. Nov 14 18:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  554. Nov 14 18:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  555. Nov 14 18:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  556. Nov 14 18:30:48 kernel: br0: received packet on eth5 with own address as source address
  557. Nov 14 18:37:41 miniupnpd[14878]: HTTP Connection from 192.168.1.105 closed unexpectedly
  558. Nov 14 18:48:26 miniupnpd[14878]: HTTP Connection from 192.168.1.100 closed unexpectedly
  559. Nov 14 19:02:16 openvpn[13687]: TLS: soft reset sec=0 bytes=198540762/-1 pkts=203798/0
  560. Nov 14 19:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  561. Nov 14 19:02:16 openvpn[13687]: VERIFY KU OK
  562. Nov 14 19:02:16 openvpn[13687]: Validating certificate extended key usage
  563. Nov 14 19:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  564. Nov 14 19:02:16 openvpn[13687]: VERIFY EKU OK
  565. Nov 14 19:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  566. Nov 14 19:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  567. Nov 14 19:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  568. Nov 14 19:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  569. Nov 14 19:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  570. Nov 14 19:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  571. Nov 14 20:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  572. Nov 14 20:02:16 openvpn[13687]: VERIFY KU OK
  573. Nov 14 20:02:16 openvpn[13687]: Validating certificate extended key usage
  574. Nov 14 20:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  575. Nov 14 20:02:16 openvpn[13687]: VERIFY EKU OK
  576. Nov 14 20:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  577. Nov 14 20:02:17 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  578. Nov 14 20:02:17 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  579. Nov 14 20:02:17 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  580. Nov 14 20:02:17 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  581. Nov 14 20:02:17 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  582. Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  583. Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  584. Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  585. Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  586. Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  587. Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  588. Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  589. Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  590. Nov 14 21:02:17 openvpn[13687]: TLS: soft reset sec=0 bytes=44059960/-1 pkts=56852/0
  591. Nov 14 21:02:17 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  592. Nov 14 21:02:17 openvpn[13687]: VERIFY KU OK
  593. Nov 14 21:02:17 openvpn[13687]: Validating certificate extended key usage
  594. Nov 14 21:02:17 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  595. Nov 14 21:02:17 openvpn[13687]: VERIFY EKU OK
  596. Nov 14 21:02:17 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  597. Nov 14 21:02:17 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  598. Nov 14 21:02:17 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  599. Nov 14 21:02:17 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  600. Nov 14 21:02:17 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  601. Nov 14 21:02:17 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  602. Nov 14 21:09:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
  603. Nov 14 21:09:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
  604. Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  605. Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  606. Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  607. Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  608. Nov 14 22:02:17 openvpn[13687]: TLS: soft reset sec=0 bytes=27507740/-1 pkts=40269/0
  609. Nov 14 22:02:17 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  610. Nov 14 22:02:17 openvpn[13687]: VERIFY KU OK
  611. Nov 14 22:02:17 openvpn[13687]: Validating certificate extended key usage
  612. Nov 14 22:02:17 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  613. Nov 14 22:02:17 openvpn[13687]: VERIFY EKU OK
  614. Nov 14 22:02:17 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  615. Nov 14 22:02:18 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  616. Nov 14 22:02:18 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  617. Nov 14 22:02:18 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  618. Nov 14 22:02:18 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  619. Nov 14 22:02:18 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  620. Nov 14 22:14:27 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  621. Nov 14 22:14:27 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  622. Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
  623. Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
  624. Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
  625. Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.61 8c:3a:e3:56:a9:b2 android-fadf4e59f7cc447b
  626. Nov 14 23:02:17 openvpn[13687]: TLS: tls_process: killed expiring key
  627. Nov 14 23:02:18 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  628. Nov 14 23:02:18 openvpn[13687]: VERIFY KU OK
  629. Nov 14 23:02:18 openvpn[13687]: Validating certificate extended key usage
  630. Nov 14 23:02:18 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  631. Nov 14 23:02:18 openvpn[13687]: VERIFY EKU OK
  632. Nov 14 23:02:18 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  633. Nov 14 23:02:19 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  634. Nov 14 23:02:19 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  635. Nov 14 23:02:19 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  636. Nov 14 23:02:19 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  637. Nov 14 23:02:19 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  638. Nov 15 00:02:18 openvpn[13687]: TLS: tls_process: killed expiring key
  639. Nov 15 00:02:19 openvpn[13687]: TLS: soft reset sec=0 bytes=300745/-1 pkts=1369/0
  640. Nov 15 00:02:19 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  641. Nov 15 00:02:19 openvpn[13687]: VERIFY KU OK
  642. Nov 15 00:02:19 openvpn[13687]: Validating certificate extended key usage
  643. Nov 15 00:02:19 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  644. Nov 15 00:02:19 openvpn[13687]: VERIFY EKU OK
  645. Nov 15 00:02:19 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  646. Nov 15 00:02:20 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  647. Nov 15 00:02:20 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  648. Nov 15 00:02:20 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  649. Nov 15 00:02:20 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  650. Nov 15 00:02:20 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  651. Nov 15 01:02:19 openvpn[13687]: TLS: tls_process: killed expiring key
  652. Nov 15 01:02:20 openvpn[13687]: TLS: soft reset sec=0 bytes=8413819/-1 pkts=11611/0
  653. Nov 15 01:02:20 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  654. Nov 15 01:02:20 openvpn[13687]: VERIFY KU OK
  655. Nov 15 01:02:20 openvpn[13687]: Validating certificate extended key usage
  656. Nov 15 01:02:20 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  657. Nov 15 01:02:20 openvpn[13687]: VERIFY EKU OK
  658. Nov 15 01:02:20 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  659. Nov 15 01:02:21 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  660. Nov 15 01:02:21 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  661. Nov 15 01:02:21 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  662. Nov 15 01:02:21 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  663. Nov 15 01:02:21 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  664. Nov 15 02:02:20 openvpn[13687]: TLS: tls_process: killed expiring key
  665. Nov 15 02:02:21 openvpn[13687]: TLS: soft reset sec=0 bytes=692520/-1 pkts=1860/0
  666. Nov 15 02:02:21 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  667. Nov 15 02:02:21 openvpn[13687]: VERIFY KU OK
  668. Nov 15 02:02:21 openvpn[13687]: Validating certificate extended key usage
  669. Nov 15 02:02:21 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  670. Nov 15 02:02:21 openvpn[13687]: VERIFY EKU OK
  671. Nov 15 02:02:21 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  672. Nov 15 02:02:22 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  673. Nov 15 02:02:22 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  674. Nov 15 02:02:22 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  675. Nov 15 02:02:22 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  676. Nov 15 02:02:22 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  677. Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  678. Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  679. Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  680. Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  681. Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
  682. Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  683. Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  684. Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
  685. Nov 15 03:02:21 openvpn[13687]: TLS: tls_process: killed expiring key
  686. Nov 15 03:02:22 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  687. Nov 15 03:02:22 openvpn[13687]: VERIFY KU OK
  688. Nov 15 03:02:22 openvpn[13687]: Validating certificate extended key usage
  689. Nov 15 03:02:22 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  690. Nov 15 03:02:22 openvpn[13687]: VERIFY EKU OK
  691. Nov 15 03:02:22 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  692. Nov 15 03:02:22 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  693. Nov 15 03:02:22 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  694. Nov 15 03:02:22 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  695. Nov 15 03:02:22 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  696. Nov 15 03:02:22 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  697. Nov 15 04:02:22 openvpn[13687]: TLS: soft reset sec=0 bytes=152392/-1 pkts=986/0
  698. Nov 15 04:02:22 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  699. Nov 15 04:02:22 openvpn[13687]: VERIFY KU OK
  700. Nov 15 04:02:22 openvpn[13687]: Validating certificate extended key usage
  701. Nov 15 04:02:22 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  702. Nov 15 04:02:22 openvpn[13687]: VERIFY EKU OK
  703. Nov 15 04:02:22 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  704. Nov 15 04:02:23 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  705. Nov 15 04:02:23 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  706. Nov 15 04:02:23 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  707. Nov 15 04:02:23 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  708. Nov 15 04:02:23 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  709. Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
  710. Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  711. Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
  712. Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
  713. Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  714. Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  715. Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  716. Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  717. Nov 15 05:02:22 openvpn[13687]: TLS: tls_process: killed expiring key
  718. Nov 15 05:02:23 openvpn[13687]: TLS: soft reset sec=0 bytes=158487/-1 pkts=1007/0
  719. Nov 15 05:02:23 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  720. Nov 15 05:02:23 openvpn[13687]: VERIFY KU OK
  721. Nov 15 05:02:23 openvpn[13687]: Validating certificate extended key usage
  722. Nov 15 05:02:23 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  723. Nov 15 05:02:23 openvpn[13687]: VERIFY EKU OK
  724. Nov 15 05:02:23 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  725. Nov 15 05:02:24 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  726. Nov 15 05:02:24 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  727. Nov 15 05:02:24 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  728. Nov 15 05:02:24 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  729. Nov 15 05:02:24 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  730. Nov 15 05:04:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
  731. Nov 15 05:04:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
  732. Nov 15 05:50:31 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
  733. Nov 15 05:50:31 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
  734. Nov 15 06:02:23 openvpn[13687]: TLS: tls_process: killed expiring key
  735. Nov 15 06:02:24 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  736. Nov 15 06:02:24 openvpn[13687]: VERIFY KU OK
  737. Nov 15 06:02:24 openvpn[13687]: Validating certificate extended key usage
  738. Nov 15 06:02:24 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  739. Nov 15 06:02:24 openvpn[13687]: VERIFY EKU OK
  740. Nov 15 06:02:24 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  741. Nov 15 06:02:24 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  742. Nov 15 06:02:24 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  743. Nov 15 06:02:24 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  744. Nov 15 06:02:24 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  745. Nov 15 06:02:24 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  746. Nov 15 07:02:24 openvpn[13687]: TLS: soft reset sec=0 bytes=156071/-1 pkts=993/0
  747. Nov 15 07:02:24 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  748. Nov 15 07:02:24 openvpn[13687]: VERIFY KU OK
  749. Nov 15 07:02:24 openvpn[13687]: Validating certificate extended key usage
  750. Nov 15 07:02:24 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  751. Nov 15 07:02:24 openvpn[13687]: VERIFY EKU OK
  752. Nov 15 07:02:24 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  753. Nov 15 07:02:25 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  754. Nov 15 07:02:25 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  755. Nov 15 07:02:25 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  756. Nov 15 07:02:25 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  757. Nov 15 07:02:25 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  758. Nov 15 08:02:24 openvpn[13687]: TLS: tls_process: killed expiring key
  759. Nov 15 08:02:25 openvpn[13687]: TLS: soft reset sec=0 bytes=621329/-1 pkts=2144/0
  760. Nov 15 08:02:25 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  761. Nov 15 08:02:25 openvpn[13687]: VERIFY KU OK
  762. Nov 15 08:02:25 openvpn[13687]: Validating certificate extended key usage
  763. Nov 15 08:02:25 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  764. Nov 15 08:02:25 openvpn[13687]: VERIFY EKU OK
  765. Nov 15 08:02:25 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  766. Nov 15 08:02:25 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  767. Nov 15 08:02:25 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  768. Nov 15 08:02:25 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  769. Nov 15 08:02:25 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  770. Nov 15 08:02:25 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  771. Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  772. Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  773. Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  774. Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  775. Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
  776. Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  777. Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
  778. Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
  779. Nov 15 08:41:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
  780. Nov 15 08:41:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
  781. Nov 15 09:02:25 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  782. Nov 15 09:02:25 openvpn[13687]: VERIFY KU OK
  783. Nov 15 09:02:25 openvpn[13687]: Validating certificate extended key usage
  784. Nov 15 09:02:25 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  785. Nov 15 09:02:25 openvpn[13687]: VERIFY EKU OK
  786. Nov 15 09:02:25 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  787. Nov 15 09:02:26 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  788. Nov 15 09:02:26 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  789. Nov 15 09:02:26 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  790. Nov 15 09:02:26 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  791. Nov 15 09:02:26 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  792. Nov 15 09:09:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  793. Nov 15 09:09:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
  794. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  795. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  796. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  797. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  798. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  799. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  800. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  801. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  802. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  803. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  804. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  805. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  806. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  807. Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
  808. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  809. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  810. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  811. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  812. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  813. Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
  814. Nov 15 10:02:25 openvpn[13687]: TLS: tls_process: killed expiring key
  815. Nov 15 10:02:26 openvpn[13687]: TLS: soft reset sec=0 bytes=135855709/-1 pkts=165662/0
  816. Nov 15 10:02:26 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  817. Nov 15 10:02:26 openvpn[13687]: VERIFY KU OK
  818. Nov 15 10:02:26 openvpn[13687]: Validating certificate extended key usage
  819. Nov 15 10:02:26 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  820. Nov 15 10:02:26 openvpn[13687]: VERIFY EKU OK
  821. Nov 15 10:02:26 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  822. Nov 15 10:02:27 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  823. Nov 15 10:02:27 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  824. Nov 15 10:02:27 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  825. Nov 15 10:02:27 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  826. Nov 15 10:02:27 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  827. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  828. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  829. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  830. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  831. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  832. Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
  833. Nov 15 11:02:27 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  834. Nov 15 11:02:27 openvpn[13687]: VERIFY KU OK
  835. Nov 15 11:02:27 openvpn[13687]: Validating certificate extended key usage
  836. Nov 15 11:02:27 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  837. Nov 15 11:02:27 openvpn[13687]: VERIFY EKU OK
  838. Nov 15 11:02:27 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  839. Nov 15 11:02:27 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  840. Nov 15 11:02:27 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  841. Nov 15 11:02:27 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  842. Nov 15 11:02:27 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  843. Nov 15 11:02:27 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  844. Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
  845. Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  846. Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
  847. Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
  848. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  849. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  850. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
  851. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  852. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
  853. Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
  854. Nov 15 12:02:27 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  855. Nov 15 12:02:27 openvpn[13687]: VERIFY KU OK
  856. Nov 15 12:02:27 openvpn[13687]: Validating certificate extended key usage
  857. Nov 15 12:02:27 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  858. Nov 15 12:02:27 openvpn[13687]: VERIFY EKU OK
  859. Nov 15 12:02:27 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  860. Nov 15 12:02:28 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  861. Nov 15 12:02:28 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  862. Nov 15 12:02:28 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  863. Nov 15 12:02:28 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  864. Nov 15 12:02:28 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  865. Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
  866. Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
  867. Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
  868. Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
  869. Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
  870. Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
  871. Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
  872. Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
  873. Nov 15 12:25:24 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.230 b8:53:ac:c1:71:27
  874. Nov 15 12:25:24 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.230 b8:53:ac:c1:71:27 iPhone
  875. Nov 15 13:02:27 openvpn[13687]: TLS: tls_process: killed expiring key
  876. Nov 15 13:02:28 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  877. Nov 15 13:02:28 openvpn[13687]: VERIFY KU OK
  878. Nov 15 13:02:28 openvpn[13687]: Validating certificate extended key usage
  879. Nov 15 13:02:28 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  880. Nov 15 13:02:28 openvpn[13687]: VERIFY EKU OK
  881. Nov 15 13:02:28 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  882. Nov 15 13:02:28 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  883. Nov 15 13:02:28 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  884. Nov 15 13:02:28 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  885. Nov 15 13:02:28 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  886. Nov 15 13:02:28 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  887. Nov 15 14:02:28 openvpn[13687]: TLS: soft reset sec=0 bytes=9081655/-1 pkts=18180/0
  888. Nov 15 14:02:28 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  889. Nov 15 14:02:28 openvpn[13687]: VERIFY KU OK
  890. Nov 15 14:02:28 openvpn[13687]: Validating certificate extended key usage
  891. Nov 15 14:02:28 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  892. Nov 15 14:02:28 openvpn[13687]: VERIFY EKU OK
  893. Nov 15 14:02:28 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  894. Nov 15 14:02:29 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  895. Nov 15 14:02:29 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  896. Nov 15 14:02:29 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  897. Nov 15 14:02:29 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  898. Nov 15 14:02:29 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  899. Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 08:d8:33:ad:c3:0f
  900. Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.193 08:d8:33:ad:c3:0f
  901. Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.193 08:d8:33:ad:c3:0f
  902. Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.193 08:d8:33:ad:c3:0f Dell-Tablet
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement