Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Nov 13 16:27:42 kernel: ubi1: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
- Nov 13 16:27:42 kernel: ubi1: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
- Nov 13 16:27:42 kernel: ubi1: VID header offset: 2048 (aligned 2048), data offset: 4096
- Nov 13 16:27:42 kernel: ubi1: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
- Nov 13 16:27:42 kernel: ubi1: user volume: 1, internal volumes: 1, max. volumes count: 128
- Nov 13 16:27:42 kernel: ubi1: max/mean erase counter: 3/2, WL threshold: 4096, image sequence number: 1960956644
- Nov 13 16:27:42 kernel: ubi1: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
- Nov 13 16:27:42 kernel: ubi1: background thread "ubi_bgt1d" started, PID 16739
- Nov 13 16:27:43 kernel: UBIFS (ubi1:0): UBIFS: mounted UBI device 1, volume 0, name "nvram", R/O mode
- Nov 13 16:27:43 kernel: UBIFS (ubi1:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
- Nov 13 16:27:43 kernel: UBIFS (ubi1:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1015809 bytes (0 MiB, 6 LEBs)
- Nov 13 16:27:43 kernel: UBIFS (ubi1:0): reserved for root: 275879 bytes (269 KiB)
- Nov 13 16:27:43 kernel: UBIFS (ubi1:0): media format: w4/r0 (latest is w4/r0), UUID 700E756D-208E-4C91-B256-B51AA3EDE77F, small LPT model
- Nov 13 16:27:44 kernel: UBIFS (ubi1:0): un-mount UBI device 1
- Nov 13 16:27:44 kernel: ubi1: detaching mtd9
- Nov 13 16:27:44 kernel: ubi1: mtd9 is detached
- Nov 13 16:27:45 kernel: device eth5 entered promiscuous mode
- Nov 13 16:27:45 kernel: br0: port 5(eth5) entered listening state
- Nov 13 16:27:45 kernel: br0: port 5(eth5) entered listening state
- Nov 13 16:27:46 kernel: device eth6 entered promiscuous mode
- Nov 13 16:27:46 kernel: br0: port 6(eth6) entered listening state
- Nov 13 16:27:46 kernel: br0: port 6(eth6) entered listening state
- Nov 13 16:27:47 kernel: br0: port 5(eth5) entered learning state
- Nov 13 16:27:48 kernel: br0: port 6(eth6) entered learning state
- Nov 13 16:27:49 kernel: br0: topology change detected, propagating
- Nov 13 16:27:49 kernel: br0: port 5(eth5) entered forwarding state
- Nov 13 16:27:50 kernel: br0: topology change detected, propagating
- Nov 13 16:27:50 kernel: br0: port 6(eth6) entered forwarding state
- Nov 13 16:27:51 kernel: ubi1: attaching mtd9
- Nov 13 16:27:51 kernel: ubi1: scanning is finished
- Nov 13 16:27:51 kernel: ubi1: attached mtd9 (name "misc1", size 8 MiB)
- Nov 13 16:27:51 kernel: ubi1: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
- Nov 13 16:27:51 kernel: ubi1: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
- Nov 13 16:27:51 kernel: ubi1: VID header offset: 2048 (aligned 2048), data offset: 4096
- Nov 13 16:27:51 kernel: ubi1: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
- Nov 13 16:27:51 kernel: ubi1: user volume: 1, internal volumes: 1, max. volumes count: 128
- Nov 13 16:27:51 kernel: ubi1: max/mean erase counter: 3/2, WL threshold: 4096, image sequence number: 1960956644
- Nov 13 16:27:51 kernel: ubi1: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
- Nov 13 16:27:51 kernel: ubi1: background thread "ubi_bgt1d" started, PID 16953
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): UBIFS: mounted UBI device 1, volume 0, name "nvram", R/O mode
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1015809 bytes (0 MiB, 6 LEBs)
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): reserved for root: 275879 bytes (269 KiB)
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): media format: w4/r0 (latest is w4/r0), UUID 700E756D-208E-4C91-B256-B51AA3EDE77F, small LPT model
- Nov 13 16:27:52 kernel: UBIFS (ubi1:0): un-mount UBI device 1
- Nov 13 16:27:52 kernel: ubi1: detaching mtd9
- Nov 13 16:27:52 kernel: ubi1: mtd9 is detached
- Nov 13 16:52:26 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 17:01:56 miniupnpd[14878]: upnp_event_recv: recv(): Connection reset by peer
- Nov 13 17:01:58 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 17:01:59 openvpn[13687]: TLS: soft reset sec=0 bytes=314897190/-1 pkts=363760/0
- Nov 13 17:01:59 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 17:01:59 openvpn[13687]: VERIFY KU OK
- Nov 13 17:01:59 openvpn[13687]: Validating certificate extended key usage
- Nov 13 17:01:59 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 17:01:59 openvpn[13687]: VERIFY EKU OK
- Nov 13 17:01:59 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 17:02:00 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 17:02:00 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 17:02:00 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 17:02:00 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 17:02:00 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 17:07:05 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 13 17:07:05 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON2685CB
- Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 17:14:01 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 17:14:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 13 17:14:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 13 17:14:18 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 17:29:32 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 17:29:46 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) a0:91:69:fe:7e:8b
- Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 13 17:42:35 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 13 17:51:02 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 18:01:59 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 18:02:00 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 18:02:00 openvpn[13687]: VERIFY KU OK
- Nov 13 18:02:00 openvpn[13687]: Validating certificate extended key usage
- Nov 13 18:02:00 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 18:02:00 openvpn[13687]: VERIFY EKU OK
- Nov 13 18:02:00 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 18:02:01 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 18:02:01 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 18:02:01 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 18:02:01 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 18:02:01 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 18:02:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 13 18:03:13 miniupnpd[14878]: upnp_event_process_notify: connect(192.168.1.250:2869): Connection timed out
- Nov 13 18:03:18 miniupnpd[14878]: HTTP Connection from 192.168.1.104 closed unexpectedly
- Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 18:09:16 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 18:40:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 19:02:00 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 19:02:01 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 19:02:01 openvpn[13687]: VERIFY KU OK
- Nov 13 19:02:01 openvpn[13687]: Validating certificate extended key usage
- Nov 13 19:02:01 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 19:02:01 openvpn[13687]: VERIFY EKU OK
- Nov 13 19:02:01 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 19:02:02 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 19:02:02 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 19:02:02 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 19:02:02 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 19:02:02 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 19:26:28 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 19:27:44 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 19:52:59 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 20:02:01 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 20:02:02 openvpn[13687]: TLS: soft reset sec=0 bytes=20808425/-1 pkts=35590/0
- Nov 13 20:02:02 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 20:02:02 openvpn[13687]: VERIFY KU OK
- Nov 13 20:02:02 openvpn[13687]: Validating certificate extended key usage
- Nov 13 20:02:02 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 20:02:02 openvpn[13687]: VERIFY EKU OK
- Nov 13 20:02:02 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 20:02:03 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 20:02:03 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 20:02:03 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 20:02:03 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 20:02:03 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 20:21:03 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 13 20:23:04 miniupnpd[14878]: HTTP Connection from 192.168.1.102 closed unexpectedly
- Nov 13 20:29:30 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 20:45:40 miniupnpd[14878]: HTTP Connection from 192.168.1.103 closed unexpectedly
- Nov 13 21:02:02 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 21:02:03 openvpn[13687]: TLS: soft reset sec=0 bytes=82297237/-1 pkts=92318/0
- Nov 13 21:02:03 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 21:02:03 openvpn[13687]: VERIFY KU OK
- Nov 13 21:02:03 openvpn[13687]: Validating certificate extended key usage
- Nov 13 21:02:03 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 21:02:03 openvpn[13687]: VERIFY EKU OK
- Nov 13 21:02:03 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 21:02:03 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 21:02:03 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 21:02:03 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 21:02:03 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 21:02:03 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 21:25:15 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 13 21:32:23 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:32:23 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:32:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:32:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:32:37 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:32:37 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) bc:ee:7b:13:b6:89
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.41 bc:ee:7b:13:b6:89
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) bc:ee:7b:13:b6:89
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.41 bc:ee:7b:13:b6:89
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.41 bc:ee:7b:13:b6:89
- Nov 13 21:35:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.41 bc:ee:7b:13:b6:89 android-11c9bc1f6749fb15
- Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 80:d2:1d:0a:c1:55
- Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.213 80:d2:1d:0a:c1:55
- Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.213 80:d2:1d:0a:c1:55
- Nov 13 21:39:19 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.213 80:d2:1d:0a:c1:55 android-f22b94c256a3ffc0
- Nov 13 21:55:08 miniupnpd[14878]: HTTP Connection from 192.168.1.103 closed unexpectedly
- Nov 13 22:02:03 openvpn[13687]: TLS: soft reset sec=0 bytes=151649708/-1 pkts=133882/0
- Nov 13 22:02:03 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 22:02:03 openvpn[13687]: VERIFY KU OK
- Nov 13 22:02:03 openvpn[13687]: Validating certificate extended key usage
- Nov 13 22:02:03 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 22:02:03 openvpn[13687]: VERIFY EKU OK
- Nov 13 22:02:03 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 22:02:04 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 22:02:04 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 22:02:04 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 22:02:04 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 22:02:04 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 22:06:21 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
- Nov 13 22:06:21 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
- Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
- Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 13 22:06:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
- Nov 13 22:31:04 kernel: br0: received packet on eth5 with own address as source address
- Nov 13 22:31:07 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.213 80:d2:1d:0a:c1:55
- Nov 13 22:31:07 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.213 80:d2:1d:0a:c1:55 android-f22b94c256a3ffc0
- Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 13 22:48:39 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 13 23:00:40 disk_monitor: Got SIGALRM...
- Nov 13 23:02:03 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 13 23:02:04 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 13 23:02:04 openvpn[13687]: VERIFY KU OK
- Nov 13 23:02:04 openvpn[13687]: Validating certificate extended key usage
- Nov 13 23:02:04 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 13 23:02:04 openvpn[13687]: VERIFY EKU OK
- Nov 13 23:02:04 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 13 23:02:05 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 23:02:05 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 23:02:05 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 13 23:02:05 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 23:02:05 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 13 23:18:23 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:18:23 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:18:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:18:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:18:36 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:18:36 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 13 23:28:13 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 14 00:02:04 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 00:02:05 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 00:02:05 openvpn[13687]: VERIFY KU OK
- Nov 14 00:02:05 openvpn[13687]: Validating certificate extended key usage
- Nov 14 00:02:05 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 00:02:05 openvpn[13687]: VERIFY EKU OK
- Nov 14 00:02:05 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 00:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 00:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 00:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 00:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 00:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 00:11:17 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 00:11:17 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 00:26:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
- Nov 14 00:26:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
- Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
- Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
- Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
- Nov 14 00:26:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.61 8c:3a:e3:56:a9:b2 android-fadf4e59f7cc447b
- Nov 14 00:41:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 00:41:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 00:41:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 00:41:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 00:41:14 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 00:41:14 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.21 78:45:61:72:29:9d
- Nov 14 01:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 01:02:06 openvpn[13687]: VERIFY KU OK
- Nov 14 01:02:06 openvpn[13687]: Validating certificate extended key usage
- Nov 14 01:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 01:02:06 openvpn[13687]: VERIFY EKU OK
- Nov 14 01:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 01:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 01:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 01:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 01:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 01:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 02:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 02:02:06 openvpn[13687]: VERIFY KU OK
- Nov 14 02:02:06 openvpn[13687]: Validating certificate extended key usage
- Nov 14 02:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 02:02:06 openvpn[13687]: VERIFY EKU OK
- Nov 14 02:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 02:02:06 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 02:02:06 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 02:02:06 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 02:02:06 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 02:02:06 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
- Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 14 02:57:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
- Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 02:58:04 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 14 03:02:06 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 03:02:06 openvpn[13687]: VERIFY KU OK
- Nov 14 03:02:06 openvpn[13687]: Validating certificate extended key usage
- Nov 14 03:02:06 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 03:02:06 openvpn[13687]: VERIFY EKU OK
- Nov 14 03:02:06 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 03:02:07 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 03:02:07 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 03:02:07 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 03:02:07 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 03:02:07 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 04:02:06 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 04:02:07 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 04:02:07 openvpn[13687]: VERIFY KU OK
- Nov 14 04:02:07 openvpn[13687]: Validating certificate extended key usage
- Nov 14 04:02:07 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 04:02:07 openvpn[13687]: VERIFY EKU OK
- Nov 14 04:02:07 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 04:02:08 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 04:02:08 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 04:02:08 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 04:02:08 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 04:02:08 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
- Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 14 04:58:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
- Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 04:58:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 14 05:02:07 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 05:02:08 openvpn[13687]: TLS: soft reset sec=0 bytes=1381080/-1 pkts=2522/0
- Nov 14 05:02:08 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 05:02:08 openvpn[13687]: VERIFY KU OK
- Nov 14 05:02:08 openvpn[13687]: Validating certificate extended key usage
- Nov 14 05:02:08 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 05:02:08 openvpn[13687]: VERIFY EKU OK
- Nov 14 05:02:08 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 05:02:09 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 05:02:09 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 05:02:09 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 05:02:09 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 05:02:09 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 05:07:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 05:07:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON2685CB
- Nov 14 05:13:49 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 14 05:13:49 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 14 06:02:08 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 06:02:09 openvpn[13687]: TLS: soft reset sec=0 bytes=207998/-1 pkts=1252/0
- Nov 14 06:02:09 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 06:02:09 openvpn[13687]: VERIFY KU OK
- Nov 14 06:02:09 openvpn[13687]: Validating certificate extended key usage
- Nov 14 06:02:09 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 06:02:09 openvpn[13687]: VERIFY EKU OK
- Nov 14 06:02:09 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 06:02:10 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 06:02:10 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 06:02:10 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 06:02:10 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 06:02:10 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 07:02:09 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 07:02:10 openvpn[13687]: TLS: soft reset sec=0 bytes=143814/-1 pkts=958/0
- Nov 14 07:02:10 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 07:02:10 openvpn[13687]: VERIFY KU OK
- Nov 14 07:02:10 openvpn[13687]: Validating certificate extended key usage
- Nov 14 07:02:10 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 07:02:10 openvpn[13687]: VERIFY EKU OK
- Nov 14 07:02:10 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 07:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 07:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 07:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 07:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 07:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 08:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=1937414/-1 pkts=3802/0
- Nov 14 08:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 08:02:11 openvpn[13687]: VERIFY KU OK
- Nov 14 08:02:11 openvpn[13687]: Validating certificate extended key usage
- Nov 14 08:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 08:02:11 openvpn[13687]: VERIFY EKU OK
- Nov 14 08:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 08:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 08:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 08:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 08:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 08:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 08:04:57 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 08:56:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 14 09:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=2251269737/-1 pkts=2331295/0
- Nov 14 09:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 09:02:11 openvpn[13687]: VERIFY KU OK
- Nov 14 09:02:11 openvpn[13687]: Validating certificate extended key usage
- Nov 14 09:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 09:02:11 openvpn[13687]: VERIFY EKU OK
- Nov 14 09:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 09:02:11 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 09:02:11 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 09:02:11 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 09:02:11 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 09:02:11 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 09:38:01 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
- Nov 14 09:38:01 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
- Nov 14 10:02:11 openvpn[13687]: TLS: soft reset sec=0 bytes=1294105565/-1 pkts=1369574/0
- Nov 14 10:02:11 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 10:02:11 openvpn[13687]: VERIFY KU OK
- Nov 14 10:02:11 openvpn[13687]: Validating certificate extended key usage
- Nov 14 10:02:11 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 10:02:11 openvpn[13687]: VERIFY EKU OK
- Nov 14 10:02:11 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 10:02:12 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 10:02:12 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 10:02:12 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 10:02:12 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 10:02:12 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 11:02:11 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 11:02:12 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 11:02:12 openvpn[13687]: VERIFY KU OK
- Nov 14 11:02:12 openvpn[13687]: Validating certificate extended key usage
- Nov 14 11:02:12 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 11:02:12 openvpn[13687]: VERIFY EKU OK
- Nov 14 11:02:12 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 11:02:12 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 11:02:12 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 11:02:12 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 11:02:12 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 11:02:12 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 11:03:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 11:03:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 12:02:12 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 12:02:12 openvpn[13687]: VERIFY KU OK
- Nov 14 12:02:12 openvpn[13687]: Validating certificate extended key usage
- Nov 14 12:02:12 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 12:02:12 openvpn[13687]: VERIFY EKU OK
- Nov 14 12:02:12 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 12:02:13 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 12:02:13 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 12:02:13 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 12:02:13 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 12:02:13 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 12:33:00 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
- Nov 14 12:33:00 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:33:00 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:33:02 kernel: br0: port 1(eth1) entered learning state
- Nov 14 12:33:04 kernel: br0: topology change detected, propagating
- Nov 14 12:33:04 kernel: br0: port 1(eth1) entered forwarding state
- Nov 14 12:33:07 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
- Nov 14 12:33:07 kernel: br0: port 1(eth1) entered disabled state
- Nov 14 12:33:10 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
- Nov 14 12:33:10 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:33:10 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:33:12 kernel: br0: port 1(eth1) entered learning state
- Nov 14 12:33:12 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
- Nov 14 12:33:12 kernel: br0: port 1(eth1) entered disabled state
- Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
- Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 12:33:19 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
- Nov 14 12:38:16 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link UP 100 mbps full duplex
- Nov 14 12:38:16 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:38:16 kernel: br0: port 1(eth1) entered listening state
- Nov 14 12:38:18 kernel: br0: port 1(eth1) entered learning state
- Nov 14 12:38:20 kernel: br0: topology change detected, propagating
- Nov 14 12:38:20 kernel: br0: port 1(eth1) entered forwarding state
- Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
- Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 12:38:24 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
- Nov 14 12:39:51 rc_service: httpd 760:notify_rc start_lltdc
- Nov 14 13:02:12 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 13:02:13 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 13:02:13 openvpn[13687]: VERIFY KU OK
- Nov 14 13:02:13 openvpn[13687]: Validating certificate extended key usage
- Nov 14 13:02:13 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 13:02:13 openvpn[13687]: VERIFY EKU OK
- Nov 14 13:02:13 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 13:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 13:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 13:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 13:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 13:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 14:02:13 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 14:02:14 openvpn[13687]: TLS: soft reset sec=0 bytes=2409391571/-1 pkts=2506663/0
- Nov 14 14:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 14:02:14 openvpn[13687]: VERIFY KU OK
- Nov 14 14:02:14 openvpn[13687]: Validating certificate extended key usage
- Nov 14 14:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 14:02:14 openvpn[13687]: VERIFY EKU OK
- Nov 14 14:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 14:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 14:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 14:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 14:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 14:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 15:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 15:02:14 openvpn[13687]: VERIFY KU OK
- Nov 14 15:02:14 openvpn[13687]: Validating certificate extended key usage
- Nov 14 15:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 15:02:14 openvpn[13687]: VERIFY EKU OK
- Nov 14 15:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 15:02:14 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 15:02:14 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 15:02:14 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 15:02:14 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 15:02:14 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 15:52:11 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 14 15:52:11 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 14 16:02:14 openvpn[13687]: TLS: soft reset sec=0 bytes=17160118/-1 pkts=22342/0
- Nov 14 16:02:14 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 16:02:14 openvpn[13687]: VERIFY KU OK
- Nov 14 16:02:14 openvpn[13687]: Validating certificate extended key usage
- Nov 14 16:02:14 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 16:02:14 openvpn[13687]: VERIFY EKU OK
- Nov 14 16:02:14 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 16:02:15 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 16:02:15 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 16:02:15 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 16:02:15 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 16:02:15 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 16:28:37 kernel: br0: received packet on eth5 with own address as source address
- Nov 14 16:29:13 kernel: br0: received packet on eth6 with own address as source address
- Nov 14 17:02:14 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 17:02:15 openvpn[13687]: TLS: soft reset sec=0 bytes=142014070/-1 pkts=160204/0
- Nov 14 17:02:15 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 17:02:15 openvpn[13687]: VERIFY KU OK
- Nov 14 17:02:15 openvpn[13687]: Validating certificate extended key usage
- Nov 14 17:02:15 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 17:02:15 openvpn[13687]: VERIFY EKU OK
- Nov 14 17:02:15 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 17:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 17:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 17:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 17:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 17:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 17:33:33 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 14 17:33:33 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 14 17:50:03 kernel: eth1 (Ext switch port: 0) (Logical Port: 8) Link DOWN.
- Nov 14 17:50:03 kernel: br0: port 1(eth1) entered disabled state
- Nov 14 17:50:15 kernel: eth3 (Ext switch port: 2) (Logical Port: 10) Link UP 100 mbps full duplex
- Nov 14 17:50:15 kernel: br0: port 3(eth3) entered listening state
- Nov 14 17:50:15 kernel: br0: port 3(eth3) entered listening state
- Nov 14 17:50:17 kernel: br0: port 3(eth3) entered learning state
- Nov 14 17:50:19 kernel: br0: topology change detected, propagating
- Nov 14 17:50:19 kernel: br0: port 3(eth3) entered forwarding state
- Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 44:d2:44:26:85:cb
- Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 14 17:50:30 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
- Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 17:53:45 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 14 18:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 18:02:16 openvpn[13687]: VERIFY KU OK
- Nov 14 18:02:16 openvpn[13687]: Validating certificate extended key usage
- Nov 14 18:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 18:02:16 openvpn[13687]: VERIFY EKU OK
- Nov 14 18:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 18:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 18:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 18:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 18:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 18:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 18:30:48 kernel: br0: received packet on eth5 with own address as source address
- Nov 14 18:37:41 miniupnpd[14878]: HTTP Connection from 192.168.1.105 closed unexpectedly
- Nov 14 18:48:26 miniupnpd[14878]: HTTP Connection from 192.168.1.100 closed unexpectedly
- Nov 14 19:02:16 openvpn[13687]: TLS: soft reset sec=0 bytes=198540762/-1 pkts=203798/0
- Nov 14 19:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 19:02:16 openvpn[13687]: VERIFY KU OK
- Nov 14 19:02:16 openvpn[13687]: Validating certificate extended key usage
- Nov 14 19:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 19:02:16 openvpn[13687]: VERIFY EKU OK
- Nov 14 19:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 19:02:16 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 19:02:16 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 19:02:16 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 19:02:16 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 19:02:16 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 20:02:16 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 20:02:16 openvpn[13687]: VERIFY KU OK
- Nov 14 20:02:16 openvpn[13687]: Validating certificate extended key usage
- Nov 14 20:02:16 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 20:02:16 openvpn[13687]: VERIFY EKU OK
- Nov 14 20:02:16 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 20:02:17 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 20:02:17 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 20:02:17 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 20:02:17 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 20:02:17 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 20:08:38 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 14 20:49:43 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 14 21:02:17 openvpn[13687]: TLS: soft reset sec=0 bytes=44059960/-1 pkts=56852/0
- Nov 14 21:02:17 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 21:02:17 openvpn[13687]: VERIFY KU OK
- Nov 14 21:02:17 openvpn[13687]: Validating certificate extended key usage
- Nov 14 21:02:17 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 21:02:17 openvpn[13687]: VERIFY EKU OK
- Nov 14 21:02:17 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 21:02:17 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 21:02:17 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 21:02:17 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 21:02:17 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 21:02:17 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 21:09:42 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
- Nov 14 21:09:42 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
- Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 14 21:32:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 14 22:02:17 openvpn[13687]: TLS: soft reset sec=0 bytes=27507740/-1 pkts=40269/0
- Nov 14 22:02:17 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 22:02:17 openvpn[13687]: VERIFY KU OK
- Nov 14 22:02:17 openvpn[13687]: Validating certificate extended key usage
- Nov 14 22:02:17 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 22:02:17 openvpn[13687]: VERIFY EKU OK
- Nov 14 22:02:17 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 22:02:18 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 22:02:18 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 22:02:18 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 22:02:18 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 22:02:18 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 14 22:14:27 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 22:14:27 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:3a:e3:56:a9:b2
- Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
- Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.61 8c:3a:e3:56:a9:b2
- Nov 14 22:46:10 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.61 8c:3a:e3:56:a9:b2 android-fadf4e59f7cc447b
- Nov 14 23:02:17 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 14 23:02:18 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 14 23:02:18 openvpn[13687]: VERIFY KU OK
- Nov 14 23:02:18 openvpn[13687]: Validating certificate extended key usage
- Nov 14 23:02:18 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 14 23:02:18 openvpn[13687]: VERIFY EKU OK
- Nov 14 23:02:18 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 14 23:02:19 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 23:02:19 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 23:02:19 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 14 23:02:19 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 23:02:19 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 00:02:18 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 00:02:19 openvpn[13687]: TLS: soft reset sec=0 bytes=300745/-1 pkts=1369/0
- Nov 15 00:02:19 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 00:02:19 openvpn[13687]: VERIFY KU OK
- Nov 15 00:02:19 openvpn[13687]: Validating certificate extended key usage
- Nov 15 00:02:19 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 00:02:19 openvpn[13687]: VERIFY EKU OK
- Nov 15 00:02:19 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 00:02:20 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 00:02:20 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 00:02:20 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 00:02:20 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 00:02:20 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 01:02:19 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 01:02:20 openvpn[13687]: TLS: soft reset sec=0 bytes=8413819/-1 pkts=11611/0
- Nov 15 01:02:20 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 01:02:20 openvpn[13687]: VERIFY KU OK
- Nov 15 01:02:20 openvpn[13687]: Validating certificate extended key usage
- Nov 15 01:02:20 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 01:02:20 openvpn[13687]: VERIFY EKU OK
- Nov 15 01:02:20 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 01:02:21 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 01:02:21 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 01:02:21 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 01:02:21 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 01:02:21 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 02:02:20 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 02:02:21 openvpn[13687]: TLS: soft reset sec=0 bytes=692520/-1 pkts=1860/0
- Nov 15 02:02:21 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 02:02:21 openvpn[13687]: VERIFY KU OK
- Nov 15 02:02:21 openvpn[13687]: Validating certificate extended key usage
- Nov 15 02:02:21 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 02:02:21 openvpn[13687]: VERIFY EKU OK
- Nov 15 02:02:21 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 02:02:22 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 02:02:22 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 02:02:22 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 02:02:22 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 02:02:22 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 02:57:18 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
- Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 15 02:58:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
- Nov 15 03:02:21 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 03:02:22 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 03:02:22 openvpn[13687]: VERIFY KU OK
- Nov 15 03:02:22 openvpn[13687]: Validating certificate extended key usage
- Nov 15 03:02:22 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 03:02:22 openvpn[13687]: VERIFY EKU OK
- Nov 15 03:02:22 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 03:02:22 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 03:02:22 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 03:02:22 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 03:02:22 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 03:02:22 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 04:02:22 openvpn[13687]: TLS: soft reset sec=0 bytes=152392/-1 pkts=986/0
- Nov 15 04:02:22 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 04:02:22 openvpn[13687]: VERIFY KU OK
- Nov 15 04:02:22 openvpn[13687]: Validating certificate extended key usage
- Nov 15 04:02:22 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 04:02:22 openvpn[13687]: VERIFY EKU OK
- Nov 15 04:02:22 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 04:02:23 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 04:02:23 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 04:02:23 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 04:02:23 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 04:02:23 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 8c:c1:21:17:9c:ce
- Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.204 8c:c1:21:17:9c:ce
- Nov 15 04:57:36 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.204 8c:c1:21:17:9c:ce COM-MID1
- Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 04:58:00 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 15 05:02:22 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 05:02:23 openvpn[13687]: TLS: soft reset sec=0 bytes=158487/-1 pkts=1007/0
- Nov 15 05:02:23 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 05:02:23 openvpn[13687]: VERIFY KU OK
- Nov 15 05:02:23 openvpn[13687]: Validating certificate extended key usage
- Nov 15 05:02:23 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 05:02:23 openvpn[13687]: VERIFY EKU OK
- Nov 15 05:02:23 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 05:02:24 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 05:02:24 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 05:02:24 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 05:02:24 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 05:02:24 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 05:04:46 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.7 a0:91:69:fe:7e:8b
- Nov 15 05:04:46 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.7 a0:91:69:fe:7e:8b android-5d0f1bbf2210bb0c
- Nov 15 05:50:31 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.237 44:d2:44:26:85:cb
- Nov 15 05:50:31 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.237 44:d2:44:26:85:cb EPSON
- Nov 15 06:02:23 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 06:02:24 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 06:02:24 openvpn[13687]: VERIFY KU OK
- Nov 15 06:02:24 openvpn[13687]: Validating certificate extended key usage
- Nov 15 06:02:24 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 06:02:24 openvpn[13687]: VERIFY EKU OK
- Nov 15 06:02:24 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 06:02:24 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 06:02:24 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 06:02:24 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 06:02:24 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 06:02:24 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 07:02:24 openvpn[13687]: TLS: soft reset sec=0 bytes=156071/-1 pkts=993/0
- Nov 15 07:02:24 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 07:02:24 openvpn[13687]: VERIFY KU OK
- Nov 15 07:02:24 openvpn[13687]: Validating certificate extended key usage
- Nov 15 07:02:24 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 07:02:24 openvpn[13687]: VERIFY EKU OK
- Nov 15 07:02:24 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 07:02:25 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 07:02:25 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 07:02:25 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 07:02:25 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 07:02:25 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 08:02:24 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 08:02:25 openvpn[13687]: TLS: soft reset sec=0 bytes=621329/-1 pkts=2144/0
- Nov 15 08:02:25 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 08:02:25 openvpn[13687]: VERIFY KU OK
- Nov 15 08:02:25 openvpn[13687]: Validating certificate extended key usage
- Nov 15 08:02:25 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 08:02:25 openvpn[13687]: VERIFY EKU OK
- Nov 15 08:02:25 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 08:02:25 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 08:02:25 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 08:02:25 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 08:02:25 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 08:02:25 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 15 08:14:15 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 5c:f8:a1:09:c0:4c
- Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.77 5c:f8:a1:09:c0:4c
- Nov 15 08:31:55 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.77 5c:f8:a1:09:c0:4c android-575ee69b710a2138
- Nov 15 08:41:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.8 74:75:48:4d:4f:d5
- Nov 15 08:41:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.8 74:75:48:4d:4f:d5 amazon-14aca4140
- Nov 15 09:02:25 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 09:02:25 openvpn[13687]: VERIFY KU OK
- Nov 15 09:02:25 openvpn[13687]: Validating certificate extended key usage
- Nov 15 09:02:25 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 09:02:25 openvpn[13687]: VERIFY EKU OK
- Nov 15 09:02:25 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 09:02:26 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 09:02:26 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 09:02:26 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 09:02:26 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 09:02:26 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 09:09:06 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 15 09:09:06 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.34 2c:9e:fc:86:a6:bd
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:42:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 09:56:26 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
- Nov 15 10:02:25 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 10:02:26 openvpn[13687]: TLS: soft reset sec=0 bytes=135855709/-1 pkts=165662/0
- Nov 15 10:02:26 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 10:02:26 openvpn[13687]: VERIFY KU OK
- Nov 15 10:02:26 openvpn[13687]: Validating certificate extended key usage
- Nov 15 10:02:26 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 10:02:26 openvpn[13687]: VERIFY EKU OK
- Nov 15 10:02:26 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 10:02:27 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 10:02:27 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 10:02:27 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 10:02:27 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 10:02:27 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 10:52:34 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
- Nov 15 11:02:27 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 11:02:27 openvpn[13687]: VERIFY KU OK
- Nov 15 11:02:27 openvpn[13687]: Validating certificate extended key usage
- Nov 15 11:02:27 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 11:02:27 openvpn[13687]: VERIFY EKU OK
- Nov 15 11:02:27 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 11:02:27 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 11:02:27 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 11:02:27 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 11:02:27 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 11:02:27 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) cc:7e:e7:82:6e:2c
- Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.235 cc:7e:e7:82:6e:2c
- Nov 15 11:27:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.235 cc:7e:e7:82:6e:2c COM-MID1
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) ac:af:b9:c5:7d:f2
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.147 ac:af:b9:c5:7d:f2
- Nov 15 11:52:22 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.147 ac:af:b9:c5:7d:f2 Galaxy-J3
- Nov 15 12:02:27 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 12:02:27 openvpn[13687]: VERIFY KU OK
- Nov 15 12:02:27 openvpn[13687]: Validating certificate extended key usage
- Nov 15 12:02:27 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 12:02:27 openvpn[13687]: VERIFY EKU OK
- Nov 15 12:02:27 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 12:02:28 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 12:02:28 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 12:02:28 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 12:02:28 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 12:02:28 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
- Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
- Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
- Nov 15 12:24:35 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
- Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
- Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
- Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) b8:53:ac:c1:71:27
- Nov 15 12:25:23 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.230 b8:53:ac:c1:71:27
- Nov 15 12:25:24 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.230 b8:53:ac:c1:71:27
- Nov 15 12:25:24 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.230 b8:53:ac:c1:71:27 iPhone
- Nov 15 13:02:27 openvpn[13687]: TLS: tls_process: killed expiring key
- Nov 15 13:02:28 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 13:02:28 openvpn[13687]: VERIFY KU OK
- Nov 15 13:02:28 openvpn[13687]: Validating certificate extended key usage
- Nov 15 13:02:28 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 13:02:28 openvpn[13687]: VERIFY EKU OK
- Nov 15 13:02:28 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 13:02:28 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 13:02:28 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 13:02:28 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 13:02:28 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 13:02:28 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 14:02:28 openvpn[13687]: TLS: soft reset sec=0 bytes=9081655/-1 pkts=18180/0
- Nov 15 14:02:28 openvpn[13687]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Nov 15 14:02:28 openvpn[13687]: VERIFY KU OK
- Nov 15 14:02:28 openvpn[13687]: Validating certificate extended key usage
- Nov 15 14:02:28 openvpn[13687]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 15 14:02:28 openvpn[13687]: VERIFY EKU OK
- Nov 15 14:02:28 openvpn[13687]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Nov 15 14:02:29 openvpn[13687]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 14:02:29 openvpn[13687]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 14:02:29 openvpn[13687]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 15 14:02:29 openvpn[13687]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 15 14:02:29 openvpn[13687]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPDISCOVER(br0) 08:d8:33:ad:c3:0f
- Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPOFFER(br0) 192.168.1.193 08:d8:33:ad:c3:0f
- Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPREQUEST(br0) 192.168.1.193 08:d8:33:ad:c3:0f
- Nov 15 14:45:09 dnsmasq-dhcp[4710]: DHCPACK(br0) 192.168.1.193 08:d8:33:ad:c3:0f Dell-Tablet
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement