Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 [client] Peer Connection Initiated with [AF_INET]80.177.6.180:27937
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI: Learn: 10.8.0.2 -> client/80.177.6.180:27937
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI: primary virtual IP for client/80.177.6.180:27937: 10.8.0.2
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 PUSH: Received control message: 'PUSH_REQUEST'
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 send_push_reply(): safe_cap=940
- Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0' (status=1)
- Jan 27 22:29:51 openvpn[1116]: client/80.177.6.180:27937 SIGTERM[soft,remote-exit] received, client-instance exiting
- Jan 28 00:10:14 openvpn[1168]: [7a7206daf2f1d123cfd08cdc98d2da2a] Inactivity timeout (--ping-restart), restarting
- Jan 28 00:10:14 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 28 00:10:14 openvpn[1168]: Restart pause, 2 second(s)
- Jan 28 00:10:16 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 28 00:10:16 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 28 00:10:16 openvpn[1168]: UDPv4 link local: [undef]
- Jan 28 00:10:16 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.228:1197
- Jan 28 00:10:17 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.228:1197, sid=378e6977 f5ec2d68
- Jan 28 00:10:17 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 28 00:10:17 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 28 00:10:17 openvpn[1168]: Validating certificate key usage
- Jan 28 00:10:17 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 28 00:10:17 openvpn[1168]: VERIFY KU OK
- Jan 28 00:10:17 openvpn[1168]: Validating certificate extended key usage
- Jan 28 00:10:17 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 28 00:10:17 openvpn[1168]: VERIFY EKU OK
- Jan 28 00:10:17 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=462ace8078c8ae6679029436ef0a3442, name=462ace8078c8ae6679029436ef0a3442
- Jan 28 00:10:20 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 00:10:20 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 00:10:20 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 00:10:20 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 00:10:20 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 28 00:10:20 openvpn[1168]: [462ace8078c8ae6679029436ef0a3442] Peer Connection Initiated with [AF_INET]109.201.152.228:1197
- Jan 28 00:10:22 openvpn[1168]: SENT CONTROL [462ace8078c8ae6679029436ef0a3442]: 'PUSH_REQUEST' (status=1)
- Jan 28 00:10:22 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.9.10.1,topology net30,ifconfig 10.9.10.6 10.9.10.5'
- Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 28 00:10:22 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 28 00:10:22 openvpn[1168]: Initialization Sequence Completed
- Jan 28 08:00:37 ntp: start NTP update
- Jan 28 09:32:48 openvpn[1168]: [462ace8078c8ae6679029436ef0a3442] Inactivity timeout (--ping-restart), restarting
- Jan 28 09:32:48 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 28 09:32:48 openvpn[1168]: Restart pause, 2 second(s)
- Jan 28 09:32:50 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 28 09:32:50 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 28 09:32:50 openvpn[1168]: UDPv4 link local: [undef]
- Jan 28 09:32:50 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.240:1197
- Jan 28 09:32:50 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.240:1197, sid=90725f79 0b4f976e
- Jan 28 09:32:50 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 28 09:32:50 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 28 09:32:50 openvpn[1168]: Validating certificate key usage
- Jan 28 09:32:50 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 28 09:32:50 openvpn[1168]: VERIFY KU OK
- Jan 28 09:32:50 openvpn[1168]: Validating certificate extended key usage
- Jan 28 09:32:50 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 28 09:32:50 openvpn[1168]: VERIFY EKU OK
- Jan 28 09:32:50 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=1fccd28f8872a8dff44af63c23f9c68e, name=1fccd28f8872a8dff44af63c23f9c68e
- Jan 28 09:32:53 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 09:32:53 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 09:32:53 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 09:32:53 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 09:32:53 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 28 09:32:53 openvpn[1168]: [1fccd28f8872a8dff44af63c23f9c68e] Peer Connection Initiated with [AF_INET]109.201.152.240:1197
- Jan 28 09:32:56 openvpn[1168]: SENT CONTROL [1fccd28f8872a8dff44af63c23f9c68e]: 'PUSH_REQUEST' (status=1)
- Jan 28 09:32:56 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.43.10.1,topology net30,ifconfig 10.43.10.6 10.43.10.5'
- Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 28 09:32:56 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 28 09:32:56 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 28 09:32:56 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.9.10.6 10.9.10.5 init
- Jan 28 09:32:57 openvpn-routing: Configuring policy rules for client 1
- Jan 28 09:32:57 openvpn-routing: Removing rule 10001 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10002 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10003 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10004 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10005 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10006 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10007 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10008 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10009 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10010 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10011 from routing policy
- Jan 28 09:32:57 openvpn-routing: Removing rule 10101 from routing policy
- Jan 28 09:32:58 openvpn-routing: Removing rule 10102 from routing policy
- Jan 28 09:32:58 openvpn-routing: Removing rule 10103 from routing policy
- Jan 28 09:32:58 openvpn-routing: Removing rule 10104 from routing policy
- Jan 28 09:32:58 openvpn-routing: Flushing client routing table
- Jan 28 09:32:58 openvpn-routing: Completed routing policy configuration for client 1
- Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 10.9.10.1/32
- Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 46.166.188.225/32
- Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 09:32:58 openvpn[1168]: Closing TUN/TAP interface
- Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.9.10.6 peer 10.9.10.5
- Jan 28 09:32:58 openvpn[1168]: updown.sh tun11 1500 1570 10.9.10.6 10.9.10.5 init
- Jan 28 09:32:59 rc_service: service 7935:notify_rc updateresolv
- Jan 28 09:32:59 rc_service: service 7936:notify_rc restart_dnsmasq
- Jan 28 09:32:59 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 28 09:32:59 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 28 09:33:00 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 28 09:33:01 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 28 09:33:01 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 28 09:33:01 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 28 09:33:01 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 28 09:33:01 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.43.10.6 peer 10.43.10.5
- Jan 28 09:33:01 openvpn[1168]: updown.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
- Jan 28 09:33:01 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 28 09:33:03 rc_service: service 8120:notify_rc updateresolv
- Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 109.201.152.240/32 via 60.226.64.1
- Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.43.10.5
- Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.43.10.5
- Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 10.43.10.1/32 via 10.43.10.5
- Jan 28 09:33:06 openvpn-routing: Configuring policy rules for client 1
- Jan 28 09:33:06 openvpn-routing: Creating VPN routing table
- Jan 28 09:33:06 openvpn-routing: Removing route for 10.43.10.1 to tun11 from main routing table
- Jan 28 09:33:06 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 28 09:33:06 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 28 09:33:08 openvpn-routing: Completed routing policy configuration for client 1
- Jan 28 09:33:08 openvpn[1168]: Initialization Sequence Completed
- Jan 28 17:34:43 openvpn[1168]: [1fccd28f8872a8dff44af63c23f9c68e] Inactivity timeout (--ping-restart), restarting
- Jan 28 17:34:43 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 28 17:34:43 openvpn[1168]: Restart pause, 2 second(s)
- Jan 28 17:34:45 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 28 17:34:45 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 28 17:34:45 openvpn[1168]: UDPv4 link local: [undef]
- Jan 28 17:34:45 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.143:1197
- Jan 28 17:34:46 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.143:1197, sid=9912fcc4 62ada3ce
- Jan 28 17:34:46 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 28 17:34:46 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 28 17:34:46 openvpn[1168]: Validating certificate key usage
- Jan 28 17:34:46 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 28 17:34:46 openvpn[1168]: VERIFY KU OK
- Jan 28 17:34:46 openvpn[1168]: Validating certificate extended key usage
- Jan 28 17:34:46 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 28 17:34:46 openvpn[1168]: VERIFY EKU OK
- Jan 28 17:34:46 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=207e0a00cbd3147ef5813cf5c8762d98, name=207e0a00cbd3147ef5813cf5c8762d98
- Jan 28 17:34:49 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 17:34:49 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 17:34:49 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 28 17:34:49 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 28 17:34:49 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 28 17:34:49 openvpn[1168]: [207e0a00cbd3147ef5813cf5c8762d98] Peer Connection Initiated with [AF_INET]46.166.138.143:1197
- Jan 28 17:34:51 openvpn[1168]: SENT CONTROL [207e0a00cbd3147ef5813cf5c8762d98]: 'PUSH_REQUEST' (status=1)
- Jan 28 17:34:52 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.35.10.1,topology net30,ifconfig 10.35.10.6 10.35.10.5'
- Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 28 17:34:52 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 28 17:34:52 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 28 17:34:52 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
- Jan 28 17:34:52 openvpn-routing: Configuring policy rules for client 1
- Jan 28 17:34:52 openvpn-routing: Removing rule 10001 from routing policy
- Jan 28 17:34:52 openvpn-routing: Removing rule 10002 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10003 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10004 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10005 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10006 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10007 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10008 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10009 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10010 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10011 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10101 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10102 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10103 from routing policy
- Jan 28 17:34:53 openvpn-routing: Removing rule 10104 from routing policy
- Jan 28 17:34:53 openvpn-routing: Flushing client routing table
- Jan 28 17:34:53 openvpn-routing: Completed routing policy configuration for client 1
- Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 10.43.10.1/32
- Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 109.201.152.240/32
- Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 28 17:34:53 openvpn[1168]: Closing TUN/TAP interface
- Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.43.10.6 peer 10.43.10.5
- Jan 28 17:34:53 openvpn[1168]: updown.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
- Jan 28 17:34:54 rc_service: service 8746:notify_rc updateresolv
- Jan 28 17:34:55 rc_service: service 8747:notify_rc restart_dnsmasq
- Jan 28 17:34:55 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 28 17:34:55 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 28 17:34:55 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 28 17:34:57 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 28 17:34:57 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 28 17:34:57 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 28 17:34:57 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 28 17:34:57 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.35.10.6 peer 10.35.10.5
- Jan 28 17:34:57 openvpn[1168]: updown.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
- Jan 28 17:34:57 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 28 17:34:59 rc_service: service 8931:notify_rc updateresolv
- Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 46.166.138.143/32 via 60.226.64.1
- Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.35.10.5
- Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.35.10.5
- Jan 28 17:35:02 openvpn[1168]: /usr/sbin/ip route add 10.35.10.1/32 via 10.35.10.5
- Jan 28 17:35:02 openvpn-routing: Configuring policy rules for client 1
- Jan 28 17:35:02 openvpn-routing: Creating VPN routing table
- Jan 28 17:35:02 openvpn-routing: Removing route for 10.35.10.1 to tun11 from main routing table
- Jan 28 17:35:02 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 28 17:35:02 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 28 17:35:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 28 17:35:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 28 17:35:03 openvpn-routing: Completed routing policy configuration for client 1
- Jan 28 17:35:03 openvpn[1168]: Initialization Sequence Completed
- Jan 28 20:00:37 ntp: start NTP update
- Jan 29 01:36:44 openvpn[1168]: [207e0a00cbd3147ef5813cf5c8762d98] Inactivity timeout (--ping-restart), restarting
- Jan 29 01:36:44 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 29 01:36:44 openvpn[1168]: Restart pause, 2 second(s)
- Jan 29 01:36:46 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 29 01:36:46 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 29 01:36:46 openvpn[1168]: UDPv4 link local: [undef]
- Jan 29 01:36:46 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.240:1197
- Jan 29 01:36:46 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.240:1197, sid=e9c17963 dded6976
- Jan 29 01:36:46 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 29 01:36:46 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 29 01:36:46 openvpn[1168]: Validating certificate key usage
- Jan 29 01:36:46 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 29 01:36:46 openvpn[1168]: VERIFY KU OK
- Jan 29 01:36:46 openvpn[1168]: Validating certificate extended key usage
- Jan 29 01:36:46 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 29 01:36:46 openvpn[1168]: VERIFY EKU OK
- Jan 29 01:36:46 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=0ea0451b21ee6ccf758f044d804855a3, name=0ea0451b21ee6ccf758f044d804855a3
- Jan 29 01:36:49 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 01:36:49 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 01:36:49 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 01:36:49 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 01:36:49 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 29 01:36:49 openvpn[1168]: [0ea0451b21ee6ccf758f044d804855a3] Peer Connection Initiated with [AF_INET]46.166.186.240:1197
- Jan 29 01:36:51 openvpn[1168]: SENT CONTROL [0ea0451b21ee6ccf758f044d804855a3]: 'PUSH_REQUEST' (status=1)
- Jan 29 01:36:52 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.41.10.1,topology net30,ifconfig 10.41.10.6 10.41.10.5'
- Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 29 01:36:52 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 29 01:36:52 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 29 01:36:52 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
- Jan 29 01:36:52 openvpn-routing: Configuring policy rules for client 1
- Jan 29 01:36:53 openvpn-routing: Removing rule 10001 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10002 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10003 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10004 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10005 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10006 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10007 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10008 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10009 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10010 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10011 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10101 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10102 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10103 from routing policy
- Jan 29 01:36:53 openvpn-routing: Removing rule 10104 from routing policy
- Jan 29 01:36:53 openvpn-routing: Flushing client routing table
- Jan 29 01:36:53 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 10.35.10.1/32
- Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 46.166.138.143/32
- Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 01:36:53 openvpn[1168]: Closing TUN/TAP interface
- Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.35.10.6 peer 10.35.10.5
- Jan 29 01:36:53 openvpn[1168]: updown.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
- Jan 29 01:36:54 rc_service: service 9557:notify_rc updateresolv
- Jan 29 01:36:55 rc_service: service 9558:notify_rc restart_dnsmasq
- Jan 29 01:36:55 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 29 01:36:55 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 29 01:36:55 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 29 01:36:56 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 29 01:36:56 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 29 01:36:56 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 29 01:36:56 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 29 01:36:56 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.41.10.6 peer 10.41.10.5
- Jan 29 01:36:56 openvpn[1168]: updown.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
- Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 29 01:36:59 rc_service: service 9742:notify_rc updateresolv
- Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 46.166.186.240/32 via 60.226.64.1
- Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.41.10.5
- Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.41.10.5
- Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 10.41.10.1/32 via 10.41.10.5
- Jan 29 01:37:01 openvpn-routing: Configuring policy rules for client 1
- Jan 29 01:37:01 openvpn-routing: Creating VPN routing table
- Jan 29 01:37:02 openvpn-routing: Removing route for 10.41.10.1 to tun11 from main routing table
- Jan 29 01:37:02 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 29 01:37:02 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 29 01:37:03 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 01:37:03 openvpn[1168]: Initialization Sequence Completed
- Jan 29 08:00:35 ntp: start NTP update
- Jan 29 09:38:42 openvpn[1168]: [0ea0451b21ee6ccf758f044d804855a3] Inactivity timeout (--ping-restart), restarting
- Jan 29 09:38:42 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 29 09:38:42 openvpn[1168]: Restart pause, 2 second(s)
- Jan 29 09:38:44 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 29 09:38:44 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 29 09:38:44 openvpn[1168]: UDPv4 link local: [undef]
- Jan 29 09:38:44 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.248:1197
- Jan 29 09:38:44 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.248:1197, sid=2eddb89d 0a06d0f2
- Jan 29 09:38:44 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 29 09:38:44 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 29 09:38:44 openvpn[1168]: Validating certificate key usage
- Jan 29 09:38:44 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 29 09:38:44 openvpn[1168]: VERIFY KU OK
- Jan 29 09:38:44 openvpn[1168]: Validating certificate extended key usage
- Jan 29 09:38:44 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 29 09:38:44 openvpn[1168]: VERIFY EKU OK
- Jan 29 09:38:44 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fdb0b15ef89f11c7bfa345e44c5e23fd, name=fdb0b15ef89f11c7bfa345e44c5e23fd
- Jan 29 09:38:47 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 09:38:47 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 09:38:47 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 09:38:47 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 09:38:47 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 29 09:38:47 openvpn[1168]: [fdb0b15ef89f11c7bfa345e44c5e23fd] Peer Connection Initiated with [AF_INET]46.166.137.248:1197
- Jan 29 09:38:50 openvpn[1168]: SENT CONTROL [fdb0b15ef89f11c7bfa345e44c5e23fd]: 'PUSH_REQUEST' (status=1)
- Jan 29 09:38:50 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.66.10.1,topology net30,ifconfig 10.66.10.6 10.66.10.5'
- Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 29 09:38:50 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 29 09:38:50 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 29 09:38:50 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
- Jan 29 09:38:50 openvpn-routing: Configuring policy rules for client 1
- Jan 29 09:38:51 openvpn-routing: Removing rule 10001 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10002 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10003 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10004 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10005 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10006 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10007 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10008 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10009 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10010 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10011 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10101 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10102 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10103 from routing policy
- Jan 29 09:38:51 openvpn-routing: Removing rule 10104 from routing policy
- Jan 29 09:38:51 openvpn-routing: Flushing client routing table
- Jan 29 09:38:51 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 10.41.10.1/32
- Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 46.166.186.240/32
- Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 09:38:52 openvpn[1168]: Closing TUN/TAP interface
- Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.41.10.6 peer 10.41.10.5
- Jan 29 09:38:52 openvpn[1168]: updown.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
- Jan 29 09:38:52 rc_service: service 10513:notify_rc updateresolv
- Jan 29 09:38:53 rc_service: service 10514:notify_rc restart_dnsmasq
- Jan 29 09:38:53 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 29 09:38:54 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 29 09:38:54 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 29 09:38:55 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 29 09:38:55 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 29 09:38:55 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 29 09:38:55 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 29 09:38:55 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.66.10.6 peer 10.66.10.5
- Jan 29 09:38:55 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 29 09:38:57 rc_service: service 10698:notify_rc updateresolv
- Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 46.166.137.248/32 via 60.226.64.1
- Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.66.10.5
- Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.66.10.5
- Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 10.66.10.1/32 via 10.66.10.5
- Jan 29 09:39:00 openvpn-routing: Configuring policy rules for client 1
- Jan 29 09:39:00 openvpn-routing: Creating VPN routing table
- Jan 29 09:39:00 openvpn-routing: Removing route for 10.66.10.1 to tun11 from main routing table
- Jan 29 09:39:00 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 29 09:39:00 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 29 09:39:01 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 09:39:01 openvpn[1168]: Initialization Sequence Completed
- Jan 29 17:40:35 openvpn[1168]: [fdb0b15ef89f11c7bfa345e44c5e23fd] Inactivity timeout (--ping-restart), restarting
- Jan 29 17:40:35 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 29 17:40:35 openvpn[1168]: Restart pause, 2 second(s)
- Jan 29 17:40:37 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 29 17:40:37 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 29 17:40:37 openvpn[1168]: UDPv4 link local: [undef]
- Jan 29 17:40:37 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.220:1197
- Jan 29 17:40:37 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.220:1197, sid=65af00eb 51aee261
- Jan 29 17:40:38 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 29 17:40:38 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 29 17:40:38 openvpn[1168]: Validating certificate key usage
- Jan 29 17:40:38 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 29 17:40:38 openvpn[1168]: VERIFY KU OK
- Jan 29 17:40:38 openvpn[1168]: Validating certificate extended key usage
- Jan 29 17:40:38 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 29 17:40:38 openvpn[1168]: VERIFY EKU OK
- Jan 29 17:40:38 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c68400533af8cb5c065f111c45e7e68, name=3c68400533af8cb5c065f111c45e7e68
- Jan 29 17:40:41 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 17:40:41 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 17:40:41 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 29 17:40:41 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 29 17:40:41 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 29 17:40:41 openvpn[1168]: [3c68400533af8cb5c065f111c45e7e68] Peer Connection Initiated with [AF_INET]46.166.190.220:1197
- Jan 29 17:40:43 openvpn[1168]: SENT CONTROL [3c68400533af8cb5c065f111c45e7e68]: 'PUSH_REQUEST' (status=1)
- Jan 29 17:40:43 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.36.10.1,topology net30,ifconfig 10.36.10.6 10.36.10.5'
- Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 29 17:40:43 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 29 17:40:43 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 29 17:40:43 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Jan 29 17:40:43 openvpn-routing: Configuring policy rules for client 1
- Jan 29 17:40:43 openvpn-routing: Removing rule 10001 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10002 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10003 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10004 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10005 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10006 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10007 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10008 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10009 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10010 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10011 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10101 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10102 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10103 from routing policy
- Jan 29 17:40:44 openvpn-routing: Removing rule 10104 from routing policy
- Jan 29 17:40:44 openvpn-routing: Flushing client routing table
- Jan 29 17:40:44 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 10.66.10.1/32
- Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 46.166.137.248/32
- Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 29 17:40:44 openvpn[1168]: Closing TUN/TAP interface
- Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.66.10.6 peer 10.66.10.5
- Jan 29 17:40:44 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Jan 29 17:40:45 rc_service: service 11328:notify_rc updateresolv
- Jan 29 17:40:46 rc_service: service 11329:notify_rc restart_dnsmasq
- Jan 29 17:40:46 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 29 17:40:47 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 29 17:40:47 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 29 17:40:48 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 29 17:40:48 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 29 17:40:48 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 29 17:40:48 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 29 17:40:48 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.36.10.6 peer 10.36.10.5
- Jan 29 17:40:48 openvpn[1168]: updown.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
- Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 29 17:40:50 rc_service: service 11513:notify_rc updateresolv
- Jan 29 17:40:52 openvpn[1168]: /usr/sbin/ip route add 46.166.190.220/32 via 60.226.64.1
- Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.36.10.5
- Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.36.10.5
- Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 10.36.10.1/32 via 10.36.10.5
- Jan 29 17:40:53 openvpn-routing: Configuring policy rules for client 1
- Jan 29 17:40:53 openvpn-routing: Creating VPN routing table
- Jan 29 17:40:53 openvpn-routing: Removing route for 10.36.10.1 to tun11 from main routing table
- Jan 29 17:40:53 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 29 17:40:53 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 29 17:40:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 29 17:40:54 openvpn-routing: Completed routing policy configuration for client 1
- Jan 29 17:40:54 openvpn[1168]: Initialization Sequence Completed
- Jan 29 20:00:33 ntp: start NTP update
- Jan 30 01:42:33 openvpn[1168]: [3c68400533af8cb5c065f111c45e7e68] Inactivity timeout (--ping-restart), restarting
- Jan 30 01:42:33 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 30 01:42:33 openvpn[1168]: Restart pause, 2 second(s)
- Jan 30 01:42:35 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 30 01:42:35 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 30 01:42:35 openvpn[1168]: UDPv4 link local: [undef]
- Jan 30 01:42:35 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.170:1197
- Jan 30 01:42:36 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.170:1197, sid=4fc480ca e3faf9a4
- Jan 30 01:42:37 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 30 01:42:37 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 30 01:42:37 openvpn[1168]: Validating certificate key usage
- Jan 30 01:42:37 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 30 01:42:37 openvpn[1168]: VERIFY KU OK
- Jan 30 01:42:37 openvpn[1168]: Validating certificate extended key usage
- Jan 30 01:42:37 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 30 01:42:37 openvpn[1168]: VERIFY EKU OK
- Jan 30 01:42:37 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=12eb3b99272fa03c619a101c007c050a, name=12eb3b99272fa03c619a101c007c050a
- Jan 30 01:42:40 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 01:42:40 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 01:42:40 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 01:42:40 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 01:42:40 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 30 01:42:40 openvpn[1168]: [12eb3b99272fa03c619a101c007c050a] Peer Connection Initiated with [AF_INET]46.166.138.170:1197
- Jan 30 01:42:43 openvpn[1168]: SENT CONTROL [12eb3b99272fa03c619a101c007c050a]: 'PUSH_REQUEST' (status=1)
- Jan 30 01:42:43 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.40.10.1,topology net30,ifconfig 10.40.10.6 10.40.10.5'
- Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 30 01:42:43 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 30 01:42:43 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 30 01:42:43 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
- Jan 30 01:42:43 openvpn-routing: Configuring policy rules for client 1
- Jan 30 01:42:44 openvpn-routing: Removing rule 10001 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10002 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10003 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10004 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10005 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10006 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10007 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10008 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10009 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10010 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10011 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10101 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10102 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10103 from routing policy
- Jan 30 01:42:44 openvpn-routing: Removing rule 10104 from routing policy
- Jan 30 01:42:44 openvpn-routing: Flushing client routing table
- Jan 30 01:42:44 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 10.36.10.1/32
- Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 46.166.190.220/32
- Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 01:42:44 openvpn[1168]: Closing TUN/TAP interface
- Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.36.10.6 peer 10.36.10.5
- Jan 30 01:42:45 openvpn[1168]: updown.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
- Jan 30 01:42:45 rc_service: service 12141:notify_rc updateresolv
- Jan 30 01:42:46 rc_service: service 12142:notify_rc restart_dnsmasq
- Jan 30 01:42:46 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 30 01:42:46 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 30 01:42:46 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 30 01:42:47 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 30 01:42:47 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 30 01:42:47 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 30 01:42:47 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 30 01:42:48 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.40.10.6 peer 10.40.10.5
- Jan 30 01:42:48 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 30 01:42:50 rc_service: service 12326:notify_rc updateresolv
- Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 46.166.138.170/32 via 60.226.64.1
- Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.40.10.5
- Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.40.10.5
- Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 10.40.10.1/32 via 10.40.10.5
- Jan 30 01:42:52 openvpn-routing: Configuring policy rules for client 1
- Jan 30 01:42:52 openvpn-routing: Creating VPN routing table
- Jan 30 01:42:53 openvpn-routing: Removing route for 10.40.10.1 to tun11 from main routing table
- Jan 30 01:42:53 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 30 01:42:53 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 30 01:42:54 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 01:42:54 openvpn[1168]: Initialization Sequence Completed
- Jan 30 08:00:31 ntp: start NTP update
- Jan 30 09:44:29 openvpn[1168]: [12eb3b99272fa03c619a101c007c050a] Inactivity timeout (--ping-restart), restarting
- Jan 30 09:44:29 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 30 09:44:29 openvpn[1168]: Restart pause, 2 second(s)
- Jan 30 09:44:31 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 30 09:44:31 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 30 09:44:31 openvpn[1168]: UDPv4 link local: [undef]
- Jan 30 09:44:31 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.195:1197
- Jan 30 09:44:31 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.195:1197, sid=f5f3e314 9bf74697
- Jan 30 09:44:31 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 30 09:44:31 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 30 09:44:31 openvpn[1168]: Validating certificate key usage
- Jan 30 09:44:31 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 30 09:44:31 openvpn[1168]: VERIFY KU OK
- Jan 30 09:44:31 openvpn[1168]: Validating certificate extended key usage
- Jan 30 09:44:31 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 30 09:44:31 openvpn[1168]: VERIFY EKU OK
- Jan 30 09:44:31 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fe5bdb4445d410a5d73209fb0ac36d2f, name=fe5bdb4445d410a5d73209fb0ac36d2f
- Jan 30 09:44:35 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 09:44:35 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 09:44:35 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 09:44:35 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 09:44:35 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 30 09:44:35 openvpn[1168]: [fe5bdb4445d410a5d73209fb0ac36d2f] Peer Connection Initiated with [AF_INET]46.166.188.195:1197
- Jan 30 09:44:37 openvpn[1168]: SENT CONTROL [fe5bdb4445d410a5d73209fb0ac36d2f]: 'PUSH_REQUEST' (status=1)
- Jan 30 09:44:37 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.20.10.1,topology net30,ifconfig 10.20.10.6 10.20.10.5'
- Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 30 09:44:37 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 30 09:44:37 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 30 09:44:37 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Jan 30 09:44:37 openvpn-routing: Configuring policy rules for client 1
- Jan 30 09:44:38 openvpn-routing: Removing rule 10001 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10002 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10003 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10004 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10005 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10006 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10007 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10008 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10009 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10010 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10011 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10101 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10102 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10103 from routing policy
- Jan 30 09:44:38 openvpn-routing: Removing rule 10104 from routing policy
- Jan 30 09:44:38 openvpn-routing: Flushing client routing table
- Jan 30 09:44:38 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 10.40.10.1/32
- Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 46.166.138.170/32
- Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 09:44:38 openvpn[1168]: Closing TUN/TAP interface
- Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.40.10.6 peer 10.40.10.5
- Jan 30 09:44:39 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Jan 30 09:44:39 rc_service: service 12957:notify_rc updateresolv
- Jan 30 09:44:40 rc_service: service 12958:notify_rc restart_dnsmasq
- Jan 30 09:44:41 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 30 09:44:41 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 30 09:44:41 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 30 09:44:42 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 30 09:44:42 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 30 09:44:42 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 30 09:44:42 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 30 09:44:42 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.20.10.6 peer 10.20.10.5
- Jan 30 09:44:42 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 30 09:44:44 rc_service: service 13143:notify_rc updateresolv
- Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 46.166.188.195/32 via 60.226.64.1
- Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.20.10.5
- Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.20.10.5
- Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 10.20.10.1/32 via 10.20.10.5
- Jan 30 09:44:47 openvpn-routing: Configuring policy rules for client 1
- Jan 30 09:44:47 openvpn-routing: Creating VPN routing table
- Jan 30 09:44:48 openvpn-routing: Removing route for 10.20.10.1 to tun11 from main routing table
- Jan 30 09:44:48 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 30 09:44:48 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 30 09:44:49 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 09:44:49 openvpn[1168]: Initialization Sequence Completed
- Jan 30 18:01:12 openvpn[1168]: [fe5bdb4445d410a5d73209fb0ac36d2f] Inactivity timeout (--ping-restart), restarting
- Jan 30 18:01:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 30 18:01:12 openvpn[1168]: Restart pause, 2 second(s)
- Jan 30 18:01:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 30 18:01:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 30 18:01:14 openvpn[1168]: UDPv4 link local: [undef]
- Jan 30 18:01:14 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.228:1197
- Jan 30 18:01:15 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.228:1197, sid=e6185acd 4b485b7c
- Jan 30 18:01:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 30 18:01:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 30 18:01:15 openvpn[1168]: Validating certificate key usage
- Jan 30 18:01:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 30 18:01:15 openvpn[1168]: VERIFY KU OK
- Jan 30 18:01:15 openvpn[1168]: Validating certificate extended key usage
- Jan 30 18:01:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 30 18:01:15 openvpn[1168]: VERIFY EKU OK
- Jan 30 18:01:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=644c634def4a8a98067fa0b32f5b5b9d, name=644c634def4a8a98067fa0b32f5b5b9d
- Jan 30 18:01:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 18:01:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 18:01:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 30 18:01:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 30 18:01:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 30 18:01:18 openvpn[1168]: [644c634def4a8a98067fa0b32f5b5b9d] Peer Connection Initiated with [AF_INET]46.166.137.228:1197
- Jan 30 18:01:20 openvpn[1168]: SENT CONTROL [644c634def4a8a98067fa0b32f5b5b9d]: 'PUSH_REQUEST' (status=1)
- Jan 30 18:01:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.5.10.1,topology net30,ifconfig 10.5.10.6 10.5.10.5'
- Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 30 18:01:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 30 18:01:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 30 18:01:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Jan 30 18:01:21 openvpn-routing: Configuring policy rules for client 1
- Jan 30 18:01:21 openvpn-routing: Removing rule 10001 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10002 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10003 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10004 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10005 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10006 from routing policy
- Jan 30 18:01:21 openvpn-routing: Removing rule 10007 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10008 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10009 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10010 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10011 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10101 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10102 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10103 from routing policy
- Jan 30 18:01:22 openvpn-routing: Removing rule 10104 from routing policy
- Jan 30 18:01:22 openvpn-routing: Flushing client routing table
- Jan 30 18:01:22 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 10.20.10.1/32
- Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 46.166.188.195/32
- Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 30 18:01:22 openvpn[1168]: Closing TUN/TAP interface
- Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.20.10.6 peer 10.20.10.5
- Jan 30 18:01:22 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Jan 30 18:01:23 rc_service: service 13782:notify_rc updateresolv
- Jan 30 18:01:24 rc_service: service 13783:notify_rc restart_dnsmasq
- Jan 30 18:01:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 30 18:01:24 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 30 18:01:24 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 30 18:01:25 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 30 18:01:25 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 30 18:01:25 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 30 18:01:25 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 30 18:01:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.5.10.6 peer 10.5.10.5
- Jan 30 18:01:26 openvpn[1168]: updown.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
- Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 30 18:01:28 rc_service: service 13967:notify_rc updateresolv
- Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 46.166.137.228/32 via 60.226.64.1
- Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.5.10.5
- Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.5.10.5
- Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 10.5.10.1/32 via 10.5.10.5
- Jan 30 18:01:31 openvpn-routing: Configuring policy rules for client 1
- Jan 30 18:01:31 openvpn-routing: Creating VPN routing table
- Jan 30 18:01:31 openvpn-routing: Removing route for 10.5.10.1 to tun11 from main routing table
- Jan 30 18:01:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 30 18:01:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 30 18:01:32 openvpn-routing: Completed routing policy configuration for client 1
- Jan 30 18:01:32 openvpn[1168]: Initialization Sequence Completed
- Jan 30 20:00:29 ntp: start NTP update
- Jan 31 02:03:11 openvpn[1168]: [644c634def4a8a98067fa0b32f5b5b9d] Inactivity timeout (--ping-restart), restarting
- Jan 31 02:03:11 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 31 02:03:11 openvpn[1168]: Restart pause, 2 second(s)
- Jan 31 02:03:13 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 31 02:03:13 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 31 02:03:13 openvpn[1168]: UDPv4 link local: [undef]
- Jan 31 02:03:13 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.239:1197
- Jan 31 02:03:14 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.239:1197, sid=0fc5d627 e11028d8
- Jan 31 02:03:14 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 31 02:03:14 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 31 02:03:14 openvpn[1168]: Validating certificate key usage
- Jan 31 02:03:14 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 31 02:03:14 openvpn[1168]: VERIFY KU OK
- Jan 31 02:03:14 openvpn[1168]: Validating certificate extended key usage
- Jan 31 02:03:14 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 31 02:03:14 openvpn[1168]: VERIFY EKU OK
- Jan 31 02:03:14 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=95f1cbd3ef654fc24962cd6cf84f8d98, name=95f1cbd3ef654fc24962cd6cf84f8d98
- Jan 31 02:03:17 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 02:03:17 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 02:03:17 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 02:03:17 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 02:03:17 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 31 02:03:17 openvpn[1168]: [95f1cbd3ef654fc24962cd6cf84f8d98] Peer Connection Initiated with [AF_INET]46.166.188.239:1197
- Jan 31 02:03:19 openvpn[1168]: SENT CONTROL [95f1cbd3ef654fc24962cd6cf84f8d98]: 'PUSH_REQUEST' (status=1)
- Jan 31 02:03:19 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.37.10.1,topology net30,ifconfig 10.37.10.6 10.37.10.5'
- Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 31 02:03:19 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 31 02:03:19 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 31 02:03:19 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
- Jan 31 02:03:20 openvpn-routing: Configuring policy rules for client 1
- Jan 31 02:03:20 openvpn-routing: Removing rule 10001 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10002 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10003 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10004 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10005 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10006 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10007 from routing policy
- Jan 31 02:03:20 openvpn-routing: Removing rule 10008 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10009 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10010 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10011 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10101 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10102 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10103 from routing policy
- Jan 31 02:03:21 openvpn-routing: Removing rule 10104 from routing policy
- Jan 31 02:03:21 openvpn-routing: Flushing client routing table
- Jan 31 02:03:21 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 10.5.10.1/32
- Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 46.166.137.228/32
- Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 02:03:21 openvpn[1168]: Closing TUN/TAP interface
- Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.5.10.6 peer 10.5.10.5
- Jan 31 02:03:21 openvpn[1168]: updown.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
- Jan 31 02:03:22 rc_service: service 14599:notify_rc updateresolv
- Jan 31 02:03:22 rc_service: service 14600:notify_rc restart_dnsmasq
- Jan 31 02:03:22 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 31 02:03:23 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 31 02:03:23 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 31 02:03:24 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 31 02:03:24 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 31 02:03:24 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 31 02:03:24 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 31 02:03:24 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.37.10.6 peer 10.37.10.5
- Jan 31 02:03:24 openvpn[1168]: updown.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
- Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 31 02:03:26 rc_service: service 14784:notify_rc updateresolv
- Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 46.166.188.239/32 via 60.226.64.1
- Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.37.10.5
- Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.37.10.5
- Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 10.37.10.1/32 via 10.37.10.5
- Jan 31 02:03:29 openvpn-routing: Configuring policy rules for client 1
- Jan 31 02:03:29 openvpn-routing: Creating VPN routing table
- Jan 31 02:03:29 openvpn-routing: Removing route for 10.37.10.1 to tun11 from main routing table
- Jan 31 02:03:29 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 31 02:03:29 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 31 02:03:29 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 31 02:03:29 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 31 02:03:30 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 31 02:03:30 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 31 02:03:31 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 02:03:31 openvpn[1168]: Initialization Sequence Completed
- Jan 31 08:00:27 ntp: start NTP update
- Jan 31 10:05:12 openvpn[1168]: [95f1cbd3ef654fc24962cd6cf84f8d98] Inactivity timeout (--ping-restart), restarting
- Jan 31 10:05:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 31 10:05:12 openvpn[1168]: Restart pause, 2 second(s)
- Jan 31 10:05:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 31 10:05:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 31 10:05:14 openvpn[1168]: UDPv4 link local: [undef]
- Jan 31 10:05:14 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.209:1197
- Jan 31 10:05:14 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.209:1197, sid=bb0d3b8e b1471730
- Jan 31 10:05:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 31 10:05:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 31 10:05:15 openvpn[1168]: Validating certificate key usage
- Jan 31 10:05:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 31 10:05:15 openvpn[1168]: VERIFY KU OK
- Jan 31 10:05:15 openvpn[1168]: Validating certificate extended key usage
- Jan 31 10:05:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 31 10:05:15 openvpn[1168]: VERIFY EKU OK
- Jan 31 10:05:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=5835f8b1ec9fd01ec93fd82eb2200e03, name=5835f8b1ec9fd01ec93fd82eb2200e03
- Jan 31 10:05:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 10:05:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 10:05:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 10:05:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 10:05:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 31 10:05:18 openvpn[1168]: [5835f8b1ec9fd01ec93fd82eb2200e03] Peer Connection Initiated with [AF_INET]46.166.188.209:1197
- Jan 31 10:05:20 openvpn[1168]: SENT CONTROL [5835f8b1ec9fd01ec93fd82eb2200e03]: 'PUSH_REQUEST' (status=1)
- Jan 31 10:05:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.4.10.1,topology net30,ifconfig 10.4.10.6 10.4.10.5'
- Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 31 10:05:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 31 10:05:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 31 10:05:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
- Jan 31 10:05:21 openvpn-routing: Configuring policy rules for client 1
- Jan 31 10:05:21 openvpn-routing: Removing rule 10001 from routing policy
- Jan 31 10:05:21 openvpn-routing: Removing rule 10002 from routing policy
- Jan 31 10:05:21 openvpn-routing: Removing rule 10003 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10004 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10005 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10006 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10007 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10008 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10009 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10010 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10011 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10101 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10102 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10103 from routing policy
- Jan 31 10:05:22 openvpn-routing: Removing rule 10104 from routing policy
- Jan 31 10:05:22 openvpn-routing: Flushing client routing table
- Jan 31 10:05:22 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 10.37.10.1/32
- Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 46.166.188.239/32
- Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 10:05:22 openvpn[1168]: Closing TUN/TAP interface
- Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.37.10.6 peer 10.37.10.5
- Jan 31 10:05:22 openvpn[1168]: updown.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
- Jan 31 10:05:23 rc_service: service 15554:notify_rc updateresolv
- Jan 31 10:05:24 rc_service: service 15555:notify_rc restart_dnsmasq
- Jan 31 10:05:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 31 10:05:24 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 31 10:05:25 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 31 10:05:26 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 31 10:05:26 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 31 10:05:26 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 31 10:05:26 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 31 10:05:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.4.10.6 peer 10.4.10.5
- Jan 31 10:05:26 openvpn[1168]: updown.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
- Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 31 10:05:28 rc_service: service 15739:notify_rc updateresolv
- Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 46.166.188.209/32 via 60.226.64.1
- Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.10.5
- Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.10.5
- Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 10.4.10.1/32 via 10.4.10.5
- Jan 31 10:05:31 openvpn-routing: Configuring policy rules for client 1
- Jan 31 10:05:31 openvpn-routing: Creating VPN routing table
- Jan 31 10:05:31 openvpn-routing: Removing route for 10.4.10.1 to tun11 from main routing table
- Jan 31 10:05:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 31 10:05:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 31 10:05:31 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 31 10:05:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 31 10:05:32 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 10:05:32 openvpn[1168]: Initialization Sequence Completed
- Jan 31 18:07:12 openvpn[1168]: [5835f8b1ec9fd01ec93fd82eb2200e03] Inactivity timeout (--ping-restart), restarting
- Jan 31 18:07:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Jan 31 18:07:12 openvpn[1168]: Restart pause, 2 second(s)
- Jan 31 18:07:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jan 31 18:07:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jan 31 18:07:15 openvpn[1168]: UDPv4 link local: [undef]
- Jan 31 18:07:15 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.220:1197
- Jan 31 18:07:15 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.220:1197, sid=cb0ae980 8077a490
- Jan 31 18:07:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jan 31 18:07:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Jan 31 18:07:15 openvpn[1168]: Validating certificate key usage
- Jan 31 18:07:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Jan 31 18:07:15 openvpn[1168]: VERIFY KU OK
- Jan 31 18:07:15 openvpn[1168]: Validating certificate extended key usage
- Jan 31 18:07:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jan 31 18:07:15 openvpn[1168]: VERIFY EKU OK
- Jan 31 18:07:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=a7557f3ab52e83fab21f23653f1a64d8, name=a7557f3ab52e83fab21f23653f1a64d8
- Jan 31 18:07:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 18:07:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 18:07:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Jan 31 18:07:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Jan 31 18:07:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Jan 31 18:07:18 openvpn[1168]: [a7557f3ab52e83fab21f23653f1a64d8] Peer Connection Initiated with [AF_INET]46.166.188.220:1197
- Jan 31 18:07:21 openvpn[1168]: SENT CONTROL [a7557f3ab52e83fab21f23653f1a64d8]: 'PUSH_REQUEST' (status=1)
- Jan 31 18:07:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.40.10.1,topology net30,ifconfig 10.40.10.6 10.40.10.5'
- Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: route options modified
- Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Jan 31 18:07:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Jan 31 18:07:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jan 31 18:07:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
- Jan 31 18:07:22 openvpn-routing: Configuring policy rules for client 1
- Jan 31 18:07:22 openvpn-routing: Removing rule 10001 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10002 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10003 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10004 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10005 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10006 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10007 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10008 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10009 from routing policy
- Jan 31 18:07:22 openvpn-routing: Removing rule 10010 from routing policy
- Jan 31 18:07:23 openvpn-routing: Removing rule 10011 from routing policy
- Jan 31 18:07:23 openvpn-routing: Removing rule 10101 from routing policy
- Jan 31 18:07:23 openvpn-routing: Removing rule 10102 from routing policy
- Jan 31 18:07:23 openvpn-routing: Removing rule 10103 from routing policy
- Jan 31 18:07:23 openvpn-routing: Removing rule 10104 from routing policy
- Jan 31 18:07:23 openvpn-routing: Flushing client routing table
- Jan 31 18:07:23 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 10.4.10.1/32
- Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 46.166.188.209/32
- Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Jan 31 18:07:23 openvpn[1168]: Closing TUN/TAP interface
- Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.4.10.6 peer 10.4.10.5
- Jan 31 18:07:23 openvpn[1168]: updown.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
- Jan 31 18:07:24 rc_service: service 16366:notify_rc updateresolv
- Jan 31 18:07:24 rc_service: service 16367:notify_rc restart_dnsmasq
- Jan 31 18:07:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Jan 31 18:07:25 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Jan 31 18:07:25 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Jan 31 18:07:26 openvpn[1168]: TUN/TAP device tun11 opened
- Jan 31 18:07:26 openvpn[1168]: TUN/TAP TX queue length set to 100
- Jan 31 18:07:26 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Jan 31 18:07:26 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Jan 31 18:07:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.40.10.6 peer 10.40.10.5
- Jan 31 18:07:26 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Jan 31 18:07:28 rc_service: service 16551:notify_rc updateresolv
- Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 46.166.188.220/32 via 60.226.64.1
- Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.40.10.5
- Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.40.10.5
- Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 10.40.10.1/32 via 10.40.10.5
- Jan 31 18:07:31 openvpn-routing: Configuring policy rules for client 1
- Jan 31 18:07:31 openvpn-routing: Creating VPN routing table
- Jan 31 18:07:31 openvpn-routing: Removing route for 10.40.10.1 to tun11 from main routing table
- Jan 31 18:07:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Jan 31 18:07:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Jan 31 18:07:32 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Jan 31 18:07:32 openvpn-routing: Completed routing policy configuration for client 1
- Jan 31 18:07:32 openvpn[1168]: Initialization Sequence Completed
- Jan 31 20:00:25 ntp: start NTP update
- Feb 1 02:09:09 openvpn[1168]: [a7557f3ab52e83fab21f23653f1a64d8] Inactivity timeout (--ping-restart), restarting
- Feb 1 02:09:09 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 1 02:09:09 openvpn[1168]: Restart pause, 2 second(s)
- Feb 1 02:09:11 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 1 02:09:11 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 1 02:09:11 openvpn[1168]: UDPv4 link local: [undef]
- Feb 1 02:09:11 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.226:1197
- Feb 1 02:09:11 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.226:1197, sid=b6e826cb e38353b5
- Feb 1 02:09:11 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 1 02:09:11 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 1 02:09:11 openvpn[1168]: Validating certificate key usage
- Feb 1 02:09:11 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 1 02:09:11 openvpn[1168]: VERIFY KU OK
- Feb 1 02:09:11 openvpn[1168]: Validating certificate extended key usage
- Feb 1 02:09:11 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 1 02:09:11 openvpn[1168]: VERIFY EKU OK
- Feb 1 02:09:11 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=237dce7889fc9a964f36f065f7e6cd4e, name=237dce7889fc9a964f36f065f7e6cd4e
- Feb 1 02:09:15 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 02:09:15 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 02:09:15 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 02:09:15 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 02:09:15 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 1 02:09:15 openvpn[1168]: [237dce7889fc9a964f36f065f7e6cd4e] Peer Connection Initiated with [AF_INET]109.201.152.226:1197
- Feb 1 02:09:17 openvpn[1168]: SENT CONTROL [237dce7889fc9a964f36f065f7e6cd4e]: 'PUSH_REQUEST' (status=1)
- Feb 1 02:09:17 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.11.10.1,topology net30,ifconfig 10.11.10.6 10.11.10.5'
- Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 1 02:09:17 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 1 02:09:17 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 1 02:09:17 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Feb 1 02:09:17 openvpn-routing: Configuring policy rules for client 1
- Feb 1 02:09:18 openvpn-routing: Removing rule 10001 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10002 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10003 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10004 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10005 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10006 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10007 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10008 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10009 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10010 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10011 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10101 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10102 from routing policy
- Feb 1 02:09:18 openvpn-routing: Removing rule 10103 from routing policy
- Feb 1 02:09:19 openvpn-routing: Removing rule 10104 from routing policy
- Feb 1 02:09:19 openvpn-routing: Flushing client routing table
- Feb 1 02:09:19 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 10.40.10.1/32
- Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 46.166.188.220/32
- Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 02:09:19 openvpn[1168]: Closing TUN/TAP interface
- Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.40.10.6 peer 10.40.10.5
- Feb 1 02:09:19 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
- Feb 1 02:09:20 rc_service: service 17177:notify_rc updateresolv
- Feb 1 02:09:20 rc_service: service 17178:notify_rc restart_dnsmasq
- Feb 1 02:09:20 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 1 02:09:20 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 1 02:09:20 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 1 02:09:21 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 1 02:09:21 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 1 02:09:21 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 1 02:09:21 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 1 02:09:22 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.11.10.6 peer 10.11.10.5
- Feb 1 02:09:22 openvpn[1168]: updown.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
- Feb 1 02:09:22 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 1 02:09:22 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 1 02:09:23 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 1 02:09:23 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 1 02:09:24 rc_service: service 17362:notify_rc updateresolv
- Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 109.201.152.226/32 via 60.226.64.1
- Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.11.10.5
- Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.11.10.5
- Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 10.11.10.1/32 via 10.11.10.5
- Feb 1 02:09:27 openvpn-routing: Configuring policy rules for client 1
- Feb 1 02:09:27 openvpn-routing: Creating VPN routing table
- Feb 1 02:09:27 openvpn-routing: Removing route for 10.11.10.1 to tun11 from main routing table
- Feb 1 02:09:27 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 1 02:09:27 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 1 02:09:28 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 02:09:28 openvpn[1168]: Initialization Sequence Completed
- Feb 1 08:00:25 ntp: start NTP update
- Feb 1 10:18:06 openvpn[1168]: [237dce7889fc9a964f36f065f7e6cd4e] Inactivity timeout (--ping-restart), restarting
- Feb 1 10:18:06 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 1 10:18:06 openvpn[1168]: Restart pause, 2 second(s)
- Feb 1 10:18:08 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 1 10:18:08 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 1 10:18:08 openvpn[1168]: UDPv4 link local: [undef]
- Feb 1 10:18:08 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.221:1197
- Feb 1 10:18:09 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.221:1197, sid=2c86272d a5298454
- Feb 1 10:18:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 1 10:18:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 1 10:18:09 openvpn[1168]: Validating certificate key usage
- Feb 1 10:18:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 1 10:18:09 openvpn[1168]: VERIFY KU OK
- Feb 1 10:18:09 openvpn[1168]: Validating certificate extended key usage
- Feb 1 10:18:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 1 10:18:09 openvpn[1168]: VERIFY EKU OK
- Feb 1 10:18:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fd3b30e31762ee4eaddb35639543e5a2, name=fd3b30e31762ee4eaddb35639543e5a2
- Feb 1 10:18:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 10:18:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 10:18:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 10:18:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 10:18:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 1 10:18:12 openvpn[1168]: [fd3b30e31762ee4eaddb35639543e5a2] Peer Connection Initiated with [AF_INET]46.166.137.221:1197
- Feb 1 10:18:14 openvpn[1168]: SENT CONTROL [fd3b30e31762ee4eaddb35639543e5a2]: 'PUSH_REQUEST' (status=1)
- Feb 1 10:18:15 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.20.10.1,topology net30,ifconfig 10.20.10.6 10.20.10.5'
- Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 1 10:18:15 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 1 10:18:15 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 1 10:18:15 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
- Feb 1 10:18:15 openvpn-routing: Configuring policy rules for client 1
- Feb 1 10:18:15 openvpn-routing: Removing rule 10001 from routing policy
- Feb 1 10:18:15 openvpn-routing: Removing rule 10002 from routing policy
- Feb 1 10:18:15 openvpn-routing: Removing rule 10003 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10004 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10005 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10006 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10007 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10008 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10009 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10010 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10011 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10101 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10102 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10103 from routing policy
- Feb 1 10:18:16 openvpn-routing: Removing rule 10104 from routing policy
- Feb 1 10:18:16 openvpn-routing: Flushing client routing table
- Feb 1 10:18:16 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 10.11.10.1/32
- Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 109.201.152.226/32
- Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 10:18:16 openvpn[1168]: Closing TUN/TAP interface
- Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.11.10.6 peer 10.11.10.5
- Feb 1 10:18:16 openvpn[1168]: updown.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
- Feb 1 10:18:17 rc_service: service 17992:notify_rc updateresolv
- Feb 1 10:18:17 rc_service: service 17993:notify_rc restart_dnsmasq
- Feb 1 10:18:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 1 10:18:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 1 10:18:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 1 10:18:19 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 1 10:18:19 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 1 10:18:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 1 10:18:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 1 10:18:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.20.10.6 peer 10.20.10.5
- Feb 1 10:18:19 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 1 10:18:21 rc_service: service 18177:notify_rc updateresolv
- Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 46.166.137.221/32 via 60.226.64.1
- Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.20.10.5
- Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.20.10.5
- Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 10.20.10.1/32 via 10.20.10.5
- Feb 1 10:18:24 openvpn-routing: Configuring policy rules for client 1
- Feb 1 10:18:24 openvpn-routing: Creating VPN routing table
- Feb 1 10:18:24 openvpn-routing: Removing route for 10.20.10.1 to tun11 from main routing table
- Feb 1 10:18:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 1 10:18:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 1 10:18:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 1 10:18:24 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 1 10:18:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 1 10:18:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 1 10:18:26 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 10:18:26 openvpn[1168]: Initialization Sequence Completed
- Feb 1 18:20:00 openvpn[1168]: [fd3b30e31762ee4eaddb35639543e5a2] Inactivity timeout (--ping-restart), restarting
- Feb 1 18:20:00 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 1 18:20:00 openvpn[1168]: Restart pause, 2 second(s)
- Feb 1 18:20:02 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 1 18:20:02 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 1 18:20:02 openvpn[1168]: UDPv4 link local: [undef]
- Feb 1 18:20:02 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.201:1197
- Feb 1 18:20:02 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.201:1197, sid=cf040fab 5f4478d2
- Feb 1 18:20:03 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 1 18:20:03 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 1 18:20:03 openvpn[1168]: Validating certificate key usage
- Feb 1 18:20:03 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 1 18:20:03 openvpn[1168]: VERIFY KU OK
- Feb 1 18:20:03 openvpn[1168]: Validating certificate extended key usage
- Feb 1 18:20:03 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 1 18:20:03 openvpn[1168]: VERIFY EKU OK
- Feb 1 18:20:03 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f065e2da53b248387311e7569f9bf0d9, name=f065e2da53b248387311e7569f9bf0d9
- Feb 1 18:20:06 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 18:20:06 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 18:20:06 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 18:20:06 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 18:20:06 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 1 18:20:06 openvpn[1168]: [f065e2da53b248387311e7569f9bf0d9] Peer Connection Initiated with [AF_INET]46.166.188.201:1197
- Feb 1 18:20:08 openvpn[1168]: SENT CONTROL [f065e2da53b248387311e7569f9bf0d9]: 'PUSH_REQUEST' (status=1)
- Feb 1 18:20:08 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.51.10.1,topology net30,ifconfig 10.51.10.6 10.51.10.5'
- Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 1 18:20:08 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 1 18:20:08 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 1 18:20:08 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Feb 1 18:20:09 openvpn-routing: Configuring policy rules for client 1
- Feb 1 18:20:09 openvpn-routing: Removing rule 10001 from routing policy
- Feb 1 18:20:09 openvpn-routing: Removing rule 10002 from routing policy
- Feb 1 18:20:09 openvpn-routing: Removing rule 10003 from routing policy
- Feb 1 18:20:09 openvpn-routing: Removing rule 10004 from routing policy
- Feb 1 18:20:09 openvpn-routing: Removing rule 10005 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10006 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10007 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10008 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10009 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10010 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10011 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10101 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10102 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10103 from routing policy
- Feb 1 18:20:10 openvpn-routing: Removing rule 10104 from routing policy
- Feb 1 18:20:10 openvpn-routing: Flushing client routing table
- Feb 1 18:20:10 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 10.20.10.1/32
- Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 46.166.137.221/32
- Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 18:20:10 openvpn[1168]: Closing TUN/TAP interface
- Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.20.10.6 peer 10.20.10.5
- Feb 1 18:20:10 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
- Feb 1 18:20:11 rc_service: service 18804:notify_rc updateresolv
- Feb 1 18:20:12 rc_service: service 18805:notify_rc restart_dnsmasq
- Feb 1 18:20:12 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 1 18:20:12 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 1 18:20:12 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 1 18:20:13 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 1 18:20:13 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 1 18:20:13 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 1 18:20:13 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 1 18:20:14 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.51.10.6 peer 10.51.10.5
- Feb 1 18:20:14 openvpn[1168]: updown.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
- Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 1 18:20:16 rc_service: service 18989:notify_rc updateresolv
- Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 46.166.188.201/32 via 60.226.64.1
- Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.51.10.5
- Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.51.10.5
- Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 10.51.10.1/32 via 10.51.10.5
- Feb 1 18:20:19 openvpn-routing: Configuring policy rules for client 1
- Feb 1 18:20:19 openvpn-routing: Creating VPN routing table
- Feb 1 18:20:19 openvpn-routing: Removing route for 10.51.10.1 to tun11 from main routing table
- Feb 1 18:20:19 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 1 18:20:19 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 1 18:20:20 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 18:20:20 openvpn[1168]: Initialization Sequence Completed
- Feb 1 19:09:06 openvpn[1168]: [f065e2da53b248387311e7569f9bf0d9] Inactivity timeout (--ping-restart), restarting
- Feb 1 19:09:06 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 1 19:09:06 openvpn[1168]: Restart pause, 2 second(s)
- Feb 1 19:09:08 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 1 19:09:08 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 1 19:09:08 openvpn[1168]: UDPv4 link local: [undef]
- Feb 1 19:09:08 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.227:1197
- Feb 1 19:09:08 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.227:1197, sid=3db2d896 6862839e
- Feb 1 19:09:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 1 19:09:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 1 19:09:09 openvpn[1168]: Validating certificate key usage
- Feb 1 19:09:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 1 19:09:09 openvpn[1168]: VERIFY KU OK
- Feb 1 19:09:09 openvpn[1168]: Validating certificate extended key usage
- Feb 1 19:09:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 1 19:09:09 openvpn[1168]: VERIFY EKU OK
- Feb 1 19:09:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=826204f33bf831019b3d4123ef9781a8, name=826204f33bf831019b3d4123ef9781a8
- Feb 1 19:09:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 19:09:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 19:09:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 1 19:09:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 1 19:09:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 1 19:09:12 openvpn[1168]: [826204f33bf831019b3d4123ef9781a8] Peer Connection Initiated with [AF_INET]46.166.190.227:1197
- Feb 1 19:09:14 openvpn[1168]: SENT CONTROL [826204f33bf831019b3d4123ef9781a8]: 'PUSH_REQUEST' (status=1)
- Feb 1 19:09:14 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.0.10.1,topology net30,ifconfig 10.0.10.10 10.0.10.9'
- Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 1 19:09:14 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 1 19:09:14 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 1 19:09:14 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
- Feb 1 19:09:15 openvpn-routing: Configuring policy rules for client 1
- Feb 1 19:09:15 openvpn-routing: Removing rule 10001 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10002 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10003 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10004 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10005 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10006 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10007 from routing policy
- Feb 1 19:09:15 openvpn-routing: Removing rule 10008 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10009 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10010 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10011 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10101 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10102 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10103 from routing policy
- Feb 1 19:09:16 openvpn-routing: Removing rule 10104 from routing policy
- Feb 1 19:09:16 openvpn-routing: Flushing client routing table
- Feb 1 19:09:16 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 10.51.10.1/32
- Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 46.166.188.201/32
- Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 1 19:09:16 openvpn[1168]: Closing TUN/TAP interface
- Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.51.10.6 peer 10.51.10.5
- Feb 1 19:09:16 openvpn[1168]: updown.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
- Feb 1 19:09:17 rc_service: service 19424:notify_rc updateresolv
- Feb 1 19:09:18 rc_service: service 19425:notify_rc restart_dnsmasq
- Feb 1 19:09:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 1 19:09:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 1 19:09:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 1 19:09:19 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 1 19:09:19 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 1 19:09:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 1 19:09:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 1 19:09:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.0.10.10 peer 10.0.10.9
- Feb 1 19:09:19 openvpn[1168]: updown.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
- Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 1 19:09:21 rc_service: service 19609:notify_rc updateresolv
- Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 46.166.190.227/32 via 60.226.64.1
- Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.0.10.9
- Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.0.10.9
- Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 10.0.10.1/32 via 10.0.10.9
- Feb 1 19:09:24 openvpn-routing: Configuring policy rules for client 1
- Feb 1 19:09:24 openvpn-routing: Creating VPN routing table
- Feb 1 19:09:24 openvpn-routing: Removing route for 10.0.10.1 to tun11 from main routing table
- Feb 1 19:09:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 1 19:09:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 1 19:09:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 1 19:09:26 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 1 19:09:26 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 1 19:09:26 openvpn-routing: Completed routing policy configuration for client 1
- Feb 1 19:09:26 openvpn[1168]: Initialization Sequence Completed
- Feb 1 20:00:23 ntp: start NTP update
- Feb 2 03:11:07 openvpn[1168]: [826204f33bf831019b3d4123ef9781a8] Inactivity timeout (--ping-restart), restarting
- Feb 2 03:11:07 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 2 03:11:07 openvpn[1168]: Restart pause, 2 second(s)
- Feb 2 03:11:09 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 2 03:11:09 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 2 03:11:09 openvpn[1168]: UDPv4 link local: [undef]
- Feb 2 03:11:09 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.214:1197
- Feb 2 03:11:09 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.214:1197, sid=5080ef59 7eb5f34a
- Feb 2 03:11:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 2 03:11:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 2 03:11:09 openvpn[1168]: Validating certificate key usage
- Feb 2 03:11:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 2 03:11:09 openvpn[1168]: VERIFY KU OK
- Feb 2 03:11:09 openvpn[1168]: Validating certificate extended key usage
- Feb 2 03:11:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 2 03:11:09 openvpn[1168]: VERIFY EKU OK
- Feb 2 03:11:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=7fcde3616172a98cb920042ced73e882, name=7fcde3616172a98cb920042ced73e882
- Feb 2 03:11:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 03:11:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 03:11:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 03:11:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 03:11:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 2 03:11:12 openvpn[1168]: [7fcde3616172a98cb920042ced73e882] Peer Connection Initiated with [AF_INET]46.166.186.214:1197
- Feb 2 03:11:15 openvpn[1168]: SENT CONTROL [7fcde3616172a98cb920042ced73e882]: 'PUSH_REQUEST' (status=1)
- Feb 2 03:11:15 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.42.10.1,topology net30,ifconfig 10.42.10.6 10.42.10.5'
- Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 2 03:11:15 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 2 03:11:15 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 2 03:11:15 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
- Feb 2 03:11:15 openvpn-routing: Configuring policy rules for client 1
- Feb 2 03:11:15 openvpn-routing: Removing rule 10001 from routing policy
- Feb 2 03:11:15 openvpn-routing: Removing rule 10002 from routing policy
- Feb 2 03:11:15 openvpn-routing: Removing rule 10003 from routing policy
- Feb 2 03:11:15 openvpn-routing: Removing rule 10004 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10005 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10006 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10007 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10008 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10009 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10010 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10011 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10101 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10102 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10103 from routing policy
- Feb 2 03:11:16 openvpn-routing: Removing rule 10104 from routing policy
- Feb 2 03:11:16 openvpn-routing: Flushing client routing table
- Feb 2 03:11:16 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 10.0.10.1/32
- Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 46.166.190.227/32
- Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 03:11:16 openvpn[1168]: Closing TUN/TAP interface
- Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.0.10.10 peer 10.0.10.9
- Feb 2 03:11:16 openvpn[1168]: updown.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
- Feb 2 03:11:17 rc_service: service 20240:notify_rc updateresolv
- Feb 2 03:11:17 rc_service: service 20241:notify_rc restart_dnsmasq
- Feb 2 03:11:17 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 2 03:11:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 2 03:11:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 2 03:11:19 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 2 03:11:19 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 2 03:11:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 2 03:11:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 2 03:11:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.42.10.6 peer 10.42.10.5
- Feb 2 03:11:19 openvpn[1168]: updown.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
- Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 2 03:11:21 rc_service: service 20425:notify_rc updateresolv
- Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 46.166.186.214/32 via 60.226.64.1
- Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.42.10.5
- Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.42.10.5
- Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 10.42.10.1/32 via 10.42.10.5
- Feb 2 03:11:24 openvpn-routing: Configuring policy rules for client 1
- Feb 2 03:11:24 openvpn-routing: Creating VPN routing table
- Feb 2 03:11:24 openvpn-routing: Removing route for 10.42.10.1 to tun11 from main routing table
- Feb 2 03:11:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 2 03:11:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 2 03:11:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 2 03:11:26 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 2 03:11:26 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 2 03:11:26 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 03:11:26 openvpn[1168]: Initialization Sequence Completed
- Feb 2 08:00:21 ntp: start NTP update
- Feb 2 11:13:05 openvpn[1168]: [7fcde3616172a98cb920042ced73e882] Inactivity timeout (--ping-restart), restarting
- Feb 2 11:13:05 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 2 11:13:05 openvpn[1168]: Restart pause, 2 second(s)
- Feb 2 11:13:07 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 2 11:13:07 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 2 11:13:07 openvpn[1168]: UDPv4 link local: [undef]
- Feb 2 11:13:07 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.154.176:1197
- Feb 2 11:13:07 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.154.176:1197, sid=9a40c905 793a399a
- Feb 2 11:13:07 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 2 11:13:07 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 2 11:13:07 openvpn[1168]: Validating certificate key usage
- Feb 2 11:13:07 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 2 11:13:07 openvpn[1168]: VERIFY KU OK
- Feb 2 11:13:07 openvpn[1168]: Validating certificate extended key usage
- Feb 2 11:13:07 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 2 11:13:07 openvpn[1168]: VERIFY EKU OK
- Feb 2 11:13:07 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=cea746126e54b708370ac7ac18bc4e90, name=cea746126e54b708370ac7ac18bc4e90
- Feb 2 11:13:10 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 11:13:10 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 11:13:10 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 11:13:10 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 11:13:10 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 2 11:13:10 openvpn[1168]: [cea746126e54b708370ac7ac18bc4e90] Peer Connection Initiated with [AF_INET]109.201.154.176:1197
- Feb 2 11:13:12 openvpn[1168]: SENT CONTROL [cea746126e54b708370ac7ac18bc4e90]: 'PUSH_REQUEST' (status=1)
- Feb 2 11:13:13 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.2.10.1,topology net30,ifconfig 10.2.10.10 10.2.10.9'
- Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 2 11:13:13 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 2 11:13:13 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 2 11:13:13 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
- Feb 2 11:13:13 openvpn-routing: Configuring policy rules for client 1
- Feb 2 11:13:14 openvpn-routing: Removing rule 10001 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10002 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10003 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10004 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10005 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10006 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10007 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10008 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10009 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10010 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10011 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10101 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10102 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10103 from routing policy
- Feb 2 11:13:14 openvpn-routing: Removing rule 10104 from routing policy
- Feb 2 11:13:14 openvpn-routing: Flushing client routing table
- Feb 2 11:13:14 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 10.42.10.1/32
- Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 46.166.186.214/32
- Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 11:13:14 openvpn[1168]: Closing TUN/TAP interface
- Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.42.10.6 peer 10.42.10.5
- Feb 2 11:13:14 openvpn[1168]: updown.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
- Feb 2 11:13:15 rc_service: service 21194:notify_rc updateresolv
- Feb 2 11:13:16 rc_service: service 21195:notify_rc restart_dnsmasq
- Feb 2 11:13:16 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 2 11:13:17 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 2 11:13:17 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 2 11:13:18 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 2 11:13:18 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 2 11:13:18 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 2 11:13:18 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 2 11:13:18 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.2.10.10 peer 10.2.10.9
- Feb 2 11:13:18 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
- Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 2 11:13:20 rc_service: service 21379:notify_rc updateresolv
- Feb 2 11:13:22 openvpn[1168]: /usr/sbin/ip route add 109.201.154.176/32 via 60.226.64.1
- Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.2.10.9
- Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.2.10.9
- Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 10.2.10.1/32 via 10.2.10.9
- Feb 2 11:13:23 openvpn-routing: Configuring policy rules for client 1
- Feb 2 11:13:23 openvpn-routing: Creating VPN routing table
- Feb 2 11:13:23 openvpn-routing: Removing route for 10.2.10.1 to tun11 from main routing table
- Feb 2 11:13:23 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 2 11:13:23 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 2 11:13:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 2 11:13:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 2 11:13:24 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 11:13:24 openvpn[1168]: Initialization Sequence Completed
- Feb 2 19:15:03 openvpn[1168]: [cea746126e54b708370ac7ac18bc4e90] Inactivity timeout (--ping-restart), restarting
- Feb 2 19:15:03 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 2 19:15:03 openvpn[1168]: Restart pause, 2 second(s)
- Feb 2 19:15:05 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 2 19:15:05 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 2 19:15:05 openvpn[1168]: UDPv4 link local: [undef]
- Feb 2 19:15:05 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.232:1197
- Feb 2 19:15:05 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.232:1197, sid=ffe7cda7 bb7192b6
- Feb 2 19:15:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 2 19:15:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 2 19:15:06 openvpn[1168]: Validating certificate key usage
- Feb 2 19:15:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 2 19:15:06 openvpn[1168]: VERIFY KU OK
- Feb 2 19:15:06 openvpn[1168]: Validating certificate extended key usage
- Feb 2 19:15:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 2 19:15:06 openvpn[1168]: VERIFY EKU OK
- Feb 2 19:15:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f0c9fac8c0ceb7aa64f2952318eb7423, name=f0c9fac8c0ceb7aa64f2952318eb7423
- Feb 2 19:15:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 19:15:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 19:15:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 2 19:15:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 2 19:15:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 2 19:15:09 openvpn[1168]: [f0c9fac8c0ceb7aa64f2952318eb7423] Peer Connection Initiated with [AF_INET]46.166.186.232:1197
- Feb 2 19:15:11 openvpn[1168]: SENT CONTROL [f0c9fac8c0ceb7aa64f2952318eb7423]: 'PUSH_REQUEST' (status=1)
- Feb 2 19:15:11 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.66.10.1,topology net30,ifconfig 10.66.10.6 10.66.10.5'
- Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 2 19:15:11 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 2 19:15:11 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 2 19:15:11 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
- Feb 2 19:15:12 openvpn-routing: Configuring policy rules for client 1
- Feb 2 19:15:12 openvpn-routing: Removing rule 10001 from routing policy
- Feb 2 19:15:12 openvpn-routing: Removing rule 10002 from routing policy
- Feb 2 19:15:12 openvpn-routing: Removing rule 10003 from routing policy
- Feb 2 19:15:12 openvpn-routing: Removing rule 10004 from routing policy
- Feb 2 19:15:12 openvpn-routing: Removing rule 10005 from routing policy
- Feb 2 19:15:12 openvpn-routing: Removing rule 10006 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10007 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10008 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10009 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10010 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10011 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10101 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10102 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10103 from routing policy
- Feb 2 19:15:13 openvpn-routing: Removing rule 10104 from routing policy
- Feb 2 19:15:13 openvpn-routing: Flushing client routing table
- Feb 2 19:15:13 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 10.2.10.1/32
- Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 109.201.154.176/32
- Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 2 19:15:13 openvpn[1168]: Closing TUN/TAP interface
- Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.2.10.10 peer 10.2.10.9
- Feb 2 19:15:13 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
- Feb 2 19:15:14 rc_service: service 22007:notify_rc updateresolv
- Feb 2 19:15:14 rc_service: service 22008:notify_rc restart_dnsmasq
- Feb 2 19:15:14 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 2 19:15:15 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 2 19:15:15 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 2 19:15:16 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 2 19:15:16 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 2 19:15:16 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 2 19:15:16 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 2 19:15:16 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.66.10.6 peer 10.66.10.5
- Feb 2 19:15:16 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 2 19:15:18 rc_service: service 22192:notify_rc updateresolv
- Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 46.166.186.232/32 via 60.226.64.1
- Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.66.10.5
- Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.66.10.5
- Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 10.66.10.1/32 via 10.66.10.5
- Feb 2 19:15:21 openvpn-routing: Configuring policy rules for client 1
- Feb 2 19:15:21 openvpn-routing: Creating VPN routing table
- Feb 2 19:15:21 openvpn-routing: Removing route for 10.66.10.1 to tun11 from main routing table
- Feb 2 19:15:21 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 2 19:15:21 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 2 19:15:23 openvpn-routing: Completed routing policy configuration for client 1
- Feb 2 19:15:23 openvpn[1168]: Initialization Sequence Completed
- Feb 2 20:00:19 ntp: start NTP update
- Feb 3 03:17:03 openvpn[1168]: [f0c9fac8c0ceb7aa64f2952318eb7423] Inactivity timeout (--ping-restart), restarting
- Feb 3 03:17:03 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 3 03:17:03 openvpn[1168]: Restart pause, 2 second(s)
- Feb 3 03:17:05 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 3 03:17:05 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 3 03:17:05 openvpn[1168]: UDPv4 link local: [undef]
- Feb 3 03:17:05 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.223:1197
- Feb 3 03:17:06 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.223:1197, sid=6d20081c 7a4add69
- Feb 3 03:17:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 3 03:17:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 3 03:17:06 openvpn[1168]: Validating certificate key usage
- Feb 3 03:17:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 3 03:17:06 openvpn[1168]: VERIFY KU OK
- Feb 3 03:17:06 openvpn[1168]: Validating certificate extended key usage
- Feb 3 03:17:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 3 03:17:06 openvpn[1168]: VERIFY EKU OK
- Feb 3 03:17:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=d08991d88aa94663f66b017ff5766e4b, name=d08991d88aa94663f66b017ff5766e4b
- Feb 3 03:17:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 03:17:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 03:17:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 03:17:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 03:17:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 3 03:17:09 openvpn[1168]: [d08991d88aa94663f66b017ff5766e4b] Peer Connection Initiated with [AF_INET]46.166.137.223:1197
- Feb 3 03:17:11 openvpn[1168]: SENT CONTROL [d08991d88aa94663f66b017ff5766e4b]: 'PUSH_REQUEST' (status=1)
- Feb 3 03:17:11 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.28.10.1,topology net30,ifconfig 10.28.10.6 10.28.10.5'
- Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 3 03:17:11 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 3 03:17:11 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 3 03:17:11 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Feb 3 03:17:12 openvpn-routing: Configuring policy rules for client 1
- Feb 3 03:17:12 openvpn-routing: Removing rule 10001 from routing policy
- Feb 3 03:17:12 openvpn-routing: Removing rule 10002 from routing policy
- Feb 3 03:17:12 openvpn-routing: Removing rule 10003 from routing policy
- Feb 3 03:17:12 openvpn-routing: Removing rule 10004 from routing policy
- Feb 3 03:17:12 openvpn-routing: Removing rule 10005 from routing policy
- Feb 3 03:17:12 openvpn-routing: Removing rule 10006 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10007 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10008 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10009 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10010 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10011 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10101 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10102 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10103 from routing policy
- Feb 3 03:17:13 openvpn-routing: Removing rule 10104 from routing policy
- Feb 3 03:17:13 openvpn-routing: Flushing client routing table
- Feb 3 03:17:13 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 10.66.10.1/32
- Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 46.166.186.232/32
- Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 03:17:13 openvpn[1168]: Closing TUN/TAP interface
- Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.66.10.6 peer 10.66.10.5
- Feb 3 03:17:13 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
- Feb 3 03:17:14 rc_service: service 22820:notify_rc updateresolv
- Feb 3 03:17:14 rc_service: service 22821:notify_rc restart_dnsmasq
- Feb 3 03:17:14 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 3 03:17:15 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 3 03:17:15 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 3 03:17:16 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 3 03:17:16 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 3 03:17:16 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 3 03:17:16 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 3 03:17:16 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.28.10.6 peer 10.28.10.5
- Feb 3 03:17:16 openvpn[1168]: updown.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
- Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 3 03:17:18 rc_service: service 23005:notify_rc updateresolv
- Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 46.166.137.223/32 via 60.226.64.1
- Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.28.10.5
- Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.28.10.5
- Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 10.28.10.1/32 via 10.28.10.5
- Feb 3 03:17:21 openvpn-routing: Configuring policy rules for client 1
- Feb 3 03:17:21 openvpn-routing: Creating VPN routing table
- Feb 3 03:17:21 openvpn-routing: Removing route for 10.28.10.1 to tun11 from main routing table
- Feb 3 03:17:21 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 3 03:17:21 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 3 03:17:21 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 3 03:17:23 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 3 03:17:23 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 03:17:23 openvpn[1168]: Initialization Sequence Completed
- Feb 3 08:00:17 ntp: start NTP update
- Feb 3 11:19:04 openvpn[1168]: [d08991d88aa94663f66b017ff5766e4b] Inactivity timeout (--ping-restart), restarting
- Feb 3 11:19:04 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 3 11:19:04 openvpn[1168]: Restart pause, 2 second(s)
- Feb 3 11:19:06 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 3 11:19:06 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 3 11:19:06 openvpn[1168]: UDPv4 link local: [undef]
- Feb 3 11:19:06 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.161:1197
- Feb 3 11:19:06 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.161:1197, sid=a7505161 d89588b3
- Feb 3 11:19:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 3 11:19:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 3 11:19:06 openvpn[1168]: Validating certificate key usage
- Feb 3 11:19:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 3 11:19:06 openvpn[1168]: VERIFY KU OK
- Feb 3 11:19:06 openvpn[1168]: Validating certificate extended key usage
- Feb 3 11:19:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 3 11:19:06 openvpn[1168]: VERIFY EKU OK
- Feb 3 11:19:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=b80d93afa23029065af8f8c064043989, name=b80d93afa23029065af8f8c064043989
- Feb 3 11:19:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 11:19:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 11:19:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 11:19:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 11:19:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 3 11:19:09 openvpn[1168]: [b80d93afa23029065af8f8c064043989] Peer Connection Initiated with [AF_INET]46.166.138.161:1197
- Feb 3 11:19:12 openvpn[1168]: SENT CONTROL [b80d93afa23029065af8f8c064043989]: 'PUSH_REQUEST' (status=1)
- Feb 3 11:19:12 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.2.10.1,topology net30,ifconfig 10.2.10.6 10.2.10.5'
- Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 3 11:19:12 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 3 11:19:12 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 3 11:19:12 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
- Feb 3 11:19:13 openvpn-routing: Configuring policy rules for client 1
- Feb 3 11:19:13 openvpn-routing: Removing rule 10001 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10002 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10003 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10004 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10005 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10006 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10007 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10008 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10009 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10010 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10011 from routing policy
- Feb 3 11:19:13 openvpn-routing: Removing rule 10101 from routing policy
- Feb 3 11:19:14 openvpn-routing: Removing rule 10102 from routing policy
- Feb 3 11:19:14 openvpn-routing: Removing rule 10103 from routing policy
- Feb 3 11:19:14 openvpn-routing: Removing rule 10104 from routing policy
- Feb 3 11:19:14 openvpn-routing: Flushing client routing table
- Feb 3 11:19:14 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 10.28.10.1/32
- Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 46.166.137.223/32
- Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 11:19:14 openvpn[1168]: Closing TUN/TAP interface
- Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.28.10.6 peer 10.28.10.5
- Feb 3 11:19:14 openvpn[1168]: updown.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
- Feb 3 11:19:15 rc_service: service 23634:notify_rc updateresolv
- Feb 3 11:19:15 rc_service: service 23635:notify_rc restart_dnsmasq
- Feb 3 11:19:15 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 3 11:19:16 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 3 11:19:16 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 3 11:19:17 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 3 11:19:17 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 3 11:19:17 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 3 11:19:17 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 3 11:19:17 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.2.10.6 peer 10.2.10.5
- Feb 3 11:19:17 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
- Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 3 11:19:19 rc_service: service 23819:notify_rc updateresolv
- Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 46.166.138.161/32 via 60.226.64.1
- Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.2.10.5
- Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.2.10.5
- Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 10.2.10.1/32 via 10.2.10.5
- Feb 3 11:19:22 openvpn-routing: Configuring policy rules for client 1
- Feb 3 11:19:22 openvpn-routing: Creating VPN routing table
- Feb 3 11:19:22 openvpn-routing: Removing route for 10.2.10.1 to tun11 from main routing table
- Feb 3 11:19:22 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 3 11:19:22 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 3 11:19:22 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 3 11:19:24 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 3 11:19:24 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 11:19:24 openvpn[1168]: Initialization Sequence Completed
- Feb 3 19:20:57 openvpn[1168]: [b80d93afa23029065af8f8c064043989] Inactivity timeout (--ping-restart), restarting
- Feb 3 19:20:57 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 3 19:20:57 openvpn[1168]: Restart pause, 2 second(s)
- Feb 3 19:20:59 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 3 19:20:59 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 3 19:21:00 openvpn[1168]: UDPv4 link local: [undef]
- Feb 3 19:21:00 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.181:1197
- Feb 3 19:21:00 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.181:1197, sid=c00a9f78 3e3e2cd7
- Feb 3 19:21:00 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 3 19:21:00 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 3 19:21:00 openvpn[1168]: Validating certificate key usage
- Feb 3 19:21:00 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 3 19:21:00 openvpn[1168]: VERIFY KU OK
- Feb 3 19:21:00 openvpn[1168]: Validating certificate extended key usage
- Feb 3 19:21:00 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 3 19:21:00 openvpn[1168]: VERIFY EKU OK
- Feb 3 19:21:00 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e74d3ca8b512011f9c6a17cd33226de2, name=e74d3ca8b512011f9c6a17cd33226de2
- Feb 3 19:21:03 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 19:21:03 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 19:21:03 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 3 19:21:03 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 3 19:21:03 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 3 19:21:03 openvpn[1168]: [e74d3ca8b512011f9c6a17cd33226de2] Peer Connection Initiated with [AF_INET]46.166.190.181:1197
- Feb 3 19:21:06 openvpn[1168]: SENT CONTROL [e74d3ca8b512011f9c6a17cd33226de2]: 'PUSH_REQUEST' (status=1)
- Feb 3 19:21:06 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.24.10.1,topology net30,ifconfig 10.24.10.6 10.24.10.5'
- Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 3 19:21:06 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 3 19:21:06 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 3 19:21:06 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
- Feb 3 19:21:06 openvpn-routing: Configuring policy rules for client 1
- Feb 3 19:21:06 openvpn-routing: Removing rule 10001 from routing policy
- Feb 3 19:21:06 openvpn-routing: Removing rule 10002 from routing policy
- Feb 3 19:21:06 openvpn-routing: Removing rule 10003 from routing policy
- Feb 3 19:21:06 openvpn-routing: Removing rule 10004 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10005 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10006 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10007 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10008 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10009 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10010 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10011 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10101 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10102 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10103 from routing policy
- Feb 3 19:21:07 openvpn-routing: Removing rule 10104 from routing policy
- Feb 3 19:21:07 openvpn-routing: Flushing client routing table
- Feb 3 19:21:07 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 10.2.10.1/32
- Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 46.166.138.161/32
- Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 3 19:21:07 openvpn[1168]: Closing TUN/TAP interface
- Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.2.10.6 peer 10.2.10.5
- Feb 3 19:21:07 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
- Feb 3 19:21:08 rc_service: service 24448:notify_rc updateresolv
- Feb 3 19:21:09 rc_service: service 24449:notify_rc restart_dnsmasq
- Feb 3 19:21:09 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 3 19:21:09 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 3 19:21:09 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 3 19:21:10 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 3 19:21:10 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 3 19:21:10 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 3 19:21:10 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 3 19:21:10 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.24.10.6 peer 10.24.10.5
- Feb 3 19:21:10 openvpn[1168]: updown.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
- Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 3 19:21:12 rc_service: service 24633:notify_rc updateresolv
- Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 46.166.190.181/32 via 60.226.64.1
- Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.24.10.5
- Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.24.10.5
- Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 10.24.10.1/32 via 10.24.10.5
- Feb 3 19:21:16 openvpn-routing: Configuring policy rules for client 1
- Feb 3 19:21:16 openvpn-routing: Creating VPN routing table
- Feb 3 19:21:16 openvpn-routing: Removing route for 10.24.10.1 to tun11 from main routing table
- Feb 3 19:21:16 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 3 19:21:16 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 3 19:21:17 openvpn-routing: Completed routing policy configuration for client 1
- Feb 3 19:21:17 openvpn[1168]: Initialization Sequence Completed
- Feb 3 20:00:15 ntp: start NTP update
- Feb 4 03:22:52 openvpn[1168]: [e74d3ca8b512011f9c6a17cd33226de2] Inactivity timeout (--ping-restart), restarting
- Feb 4 03:22:52 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 4 03:22:52 openvpn[1168]: Restart pause, 2 second(s)
- Feb 4 03:22:54 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 4 03:22:54 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 4 03:22:54 openvpn[1168]: UDPv4 link local: [undef]
- Feb 4 03:22:54 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.243:1197
- Feb 4 03:22:55 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.243:1197, sid=c3ac0bee fa4510cc
- Feb 4 03:22:55 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 4 03:22:55 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 4 03:22:55 openvpn[1168]: Validating certificate key usage
- Feb 4 03:22:55 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 4 03:22:55 openvpn[1168]: VERIFY KU OK
- Feb 4 03:22:55 openvpn[1168]: Validating certificate extended key usage
- Feb 4 03:22:55 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 4 03:22:55 openvpn[1168]: VERIFY EKU OK
- Feb 4 03:22:55 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f74d6d45d247c56c4d71e2587a31f408, name=f74d6d45d247c56c4d71e2587a31f408
- Feb 4 03:22:58 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 4 03:22:58 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 4 03:22:58 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 4 03:22:58 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 4 03:22:58 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 4 03:22:58 openvpn[1168]: [f74d6d45d247c56c4d71e2587a31f408] Peer Connection Initiated with [AF_INET]46.166.137.243:1197
- Feb 4 03:23:00 openvpn[1168]: SENT CONTROL [f74d6d45d247c56c4d71e2587a31f408]: 'PUSH_REQUEST' (status=1)
- Feb 4 03:23:01 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.16.10.1,topology net30,ifconfig 10.16.10.6 10.16.10.5'
- Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 4 03:23:01 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 4 03:23:01 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 4 03:23:01 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
- Feb 4 03:23:01 openvpn-routing: Configuring policy rules for client 1
- Feb 4 03:23:01 openvpn-routing: Removing rule 10001 from routing policy
- Feb 4 03:23:01 openvpn-routing: Removing rule 10002 from routing policy
- Feb 4 03:23:01 openvpn-routing: Removing rule 10003 from routing policy
- Feb 4 03:23:01 openvpn-routing: Removing rule 10004 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10005 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10006 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10007 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10008 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10009 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10010 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10011 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10101 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10102 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10103 from routing policy
- Feb 4 03:23:02 openvpn-routing: Removing rule 10104 from routing policy
- Feb 4 03:23:02 openvpn-routing: Flushing client routing table
- Feb 4 03:23:02 openvpn-routing: Completed routing policy configuration for client 1
- Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 10.24.10.1/32
- Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 46.166.190.181/32
- Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 03:23:02 openvpn[1168]: Closing TUN/TAP interface
- Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.24.10.6 peer 10.24.10.5
- Feb 4 03:23:02 openvpn[1168]: updown.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
- Feb 4 03:23:03 rc_service: service 25263:notify_rc updateresolv
- Feb 4 03:23:04 rc_service: service 25264:notify_rc restart_dnsmasq
- Feb 4 03:23:04 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 4 03:23:04 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 4 03:23:04 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 4 03:23:05 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 4 03:23:05 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 4 03:23:05 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 4 03:23:05 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 4 03:23:06 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.16.10.6 peer 10.16.10.5
- Feb 4 03:23:06 openvpn[1168]: updown.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
- Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 4 03:23:07 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 4 03:23:08 rc_service: service 25448:notify_rc updateresolv
- Feb 4 03:23:10 openvpn[1168]: /usr/sbin/ip route add 46.166.137.243/32 via 60.226.64.1
- Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.16.10.5
- Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.16.10.5
- Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 10.16.10.1/32 via 10.16.10.5
- Feb 4 03:23:11 openvpn-routing: Configuring policy rules for client 1
- Feb 4 03:23:11 openvpn-routing: Creating VPN routing table
- Feb 4 03:23:11 openvpn-routing: Removing route for 10.16.10.1 to tun11 from main routing table
- Feb 4 03:23:11 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 4 03:23:11 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 4 03:23:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 4 03:23:11 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 4 03:23:12 openvpn-routing: Completed routing policy configuration for client 1
- Feb 4 03:23:12 openvpn[1168]: Initialization Sequence Completed
- Feb 4 08:00:13 ntp: start NTP update
- Feb 4 11:24:51 openvpn[1168]: [f74d6d45d247c56c4d71e2587a31f408] Inactivity timeout (--ping-restart), restarting
- Feb 4 11:24:51 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
- Feb 4 11:24:51 openvpn[1168]: Restart pause, 2 second(s)
- Feb 4 11:24:53 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 4 11:24:53 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 4 11:24:53 openvpn[1168]: UDPv4 link local: [undef]
- Feb 4 11:24:53 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.225:1197
- Feb 4 11:24:54 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.225:1197, sid=adaae46d 27715e9c
- Feb 4 11:24:54 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 4 11:24:54 openvpn[1168]: VERIFY OK: nsCertType=SERVER
- Feb 4 11:24:54 openvpn[1168]: Validating certificate key usage
- Feb 4 11:24:54 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 4 11:24:54 openvpn[1168]: VERIFY KU OK
- Feb 4 11:24:54 openvpn[1168]: Validating certificate extended key usage
- Feb 4 11:24:54 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 4 11:24:54 openvpn[1168]: VERIFY EKU OK
- Feb 4 11:24:54 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=acede04be2333ca8ff1493afdb53a60d, name=acede04be2333ca8ff1493afdb53a60d
- Feb 4 11:24:57 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 4 11:24:57 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 4 11:24:57 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 4 11:24:57 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 4 11:24:57 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 4 11:24:57 openvpn[1168]: [acede04be2333ca8ff1493afdb53a60d] Peer Connection Initiated with [AF_INET]46.166.186.225:1197
- Feb 4 11:25:00 openvpn[1168]: SENT CONTROL [acede04be2333ca8ff1493afdb53a60d]: 'PUSH_REQUEST' (status=1)
- Feb 4 11:25:00 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.12.10.1,topology net30,ifconfig 10.12.10.6 10.12.10.5'
- Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
- Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: route options modified
- Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 4 11:25:00 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
- Feb 4 11:25:00 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Feb 4 11:25:00 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
- Feb 4 11:25:00 openvpn-routing: Configuring policy rules for client 1
- Feb 4 11:25:01 openvpn-routing: Removing rule 10001 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10002 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10003 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10004 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10005 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10006 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10007 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10008 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10009 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10010 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10011 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10101 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10102 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10103 from routing policy
- Feb 4 11:25:01 openvpn-routing: Removing rule 10104 from routing policy
- Feb 4 11:25:01 openvpn-routing: Flushing client routing table
- Feb 4 11:25:01 openvpn-routing: Completed routing policy configuration for client 1
- Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 10.16.10.1/32
- Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 46.166.137.243/32
- Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
- Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
- Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Feb 4 11:25:01 openvpn[1168]: Closing TUN/TAP interface
- Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.16.10.6 peer 10.16.10.5
- Feb 4 11:25:01 openvpn[1168]: updown.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
- Feb 4 11:25:02 rc_service: service 26219:notify_rc updateresolv
- Feb 4 11:25:03 rc_service: service 26220:notify_rc restart_dnsmasq
- Feb 4 11:25:03 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Feb 4 11:25:03 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Feb 4 11:25:03 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Feb 4 11:25:04 openvpn[1168]: TUN/TAP device tun11 opened
- Feb 4 11:25:04 openvpn[1168]: TUN/TAP TX queue length set to 100
- Feb 4 11:25:04 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 4 11:25:04 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 4 11:25:05 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.12.10.6 peer 10.12.10.5
- Feb 4 11:25:05 openvpn[1168]: updown.sh tun11 1500 1570 10.12.10.6 10.12.10.5 init
- Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 4 11:25:07 rc_service: service 26404:notify_rc updateresolv
- Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 46.166.186.225/32 via 60.226.64.1
- Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.12.10.5
- Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.12.10.5
- Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 10.12.10.1/32 via 10.12.10.5
- Feb 4 11:25:09 openvpn-routing: Configuring policy rules for client 1
- Feb 4 11:25:10 openvpn-routing: Creating VPN routing table
- Feb 4 11:25:10 openvpn-routing: Removing route for 10.12.10.1 to tun11 from main routing table
- Feb 4 11:25:10 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 4 11:25:10 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 4 11:25:11 openvpn-routing: Completed routing policy configuration for client 1
- Feb 4 11:25:11 openvpn[1168]: Initialization Sequence Completed
- Feb 4 20:00:11 ntp: start NTP update
- Feb 5 08:00:09 ntp: start NTP update
- Feb 5 17:41:29 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
- Feb 5 17:41:29 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
- Feb 5 20:00:07 ntp: start NTP update
- Feb 6 08:00:05 ntp: start NTP update
- Feb 6 09:51:31 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
- Feb 6 09:51:31 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
- Feb 6 13:48:35 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
- Feb 6 13:48:35 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
- Feb 6 15:46:34 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
- Feb 6 15:46:34 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
- Feb 6 20:00:03 ntp: start NTP update
- Aug 1 10:00:13 syslogd started: BusyBox v1.20.2
- Aug 1 10:00:13 kernel: klogd started: BusyBox v1.20.2 (2017-01-07 19:19:06 EST)
- Aug 1 10:00:13 kernel: Linux version 2.6.36.4brcmarm (merlin@ubuntu-dev) (gcc version 4.5.3 (Buildroot 2012.02) ) #3 SMP PREEMPT Sat Jan 7 19:33:39 EST 2017
- Aug 1 10:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 10:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 10:00:13 kernel: Machine: Northstar Prototype
- Aug 1 10:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 10:00:13 kernel: bootconsole [earlycon0] enabled
- Aug 1 10:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 10:00:13 kernel: MPCORE found at 19020000
- Aug 1 10:00:13 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536
- Aug 1 10:00:13 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096
- Aug 1 10:00:13 kernel: pcpu-alloc: [0] 0 [0] 1
- Aug 1 10:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 10:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 10:00:13 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes)
- Aug 1 10:00:13 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
- Aug 1 10:00:13 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
- Aug 1 10:00:13 kernel: Memory: 128MB 128MB = 256MB total
- Aug 1 10:00:13 kernel: Memory: 255488k/255488k available, 6656k reserved, 0K highmem
- Aug 1 10:00:13 kernel: Virtual kernel memory layout:
- Aug 1 10:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 10:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 10:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 10:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 10:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 10:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 10:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 10:00:13 kernel: .text : 0xc003d000 - 0xc03a9000 (3504 kB)
- Aug 1 10:00:13 kernel: .data : 0xc03c0000 - 0xc03e32a0 ( 141 kB)
- Aug 1 10:00:13 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
- Aug 1 10:00:13 kernel: Hierarchical RCU implementation.
- Aug 1 10:00:13 kernel: RCU-based detection of stalled CPUs is disabled.
- Aug 1 10:00:13 kernel: Verbose stalled-CPUs detection is disabled.
- Aug 1 10:00:13 kernel: NR_IRQS:256
- Aug 1 10:00:13 kernel: MPCORE GIC init
- Aug 1 10:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 10:00:14 kernel: MPCORE Global Timer Clock 400000000Hz
- Aug 1 10:00:14 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008)
- Aug 1 10:00:14 kernel: pid_max: default: 32768 minimum: 301
- Aug 1 10:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 10:00:14 kernel: CPU: Testing write buffer coherency: ok
- Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU0
- Aug 1 10:00:14 kernel: Calibrating local timer... 399.869MHz.
- Aug 1 10:00:14 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000
- Aug 1 10:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU1
- Aug 1 10:00:14 kernel: Brought up 2 CPUs
- Aug 1 10:00:14 kernel: SMP: Total of 2 processors activated (3194.88 BogoMIPS).
- Aug 1 10:00:14 kernel: devtmpfs: initialized
- Aug 1 10:00:14 kernel: atomic64 test passed
- Aug 1 10:00:14 kernel: NET: Registered protocol family 16
- Aug 1 10:00:14 kernel: Found a AMD NAND flash:
- Aug 1 10:00:14 kernel: Total size: 128MB
- Aug 1 10:00:14 kernel: Block size: 128KB
- Aug 1 10:00:14 kernel: Page Size: 2048B
- Aug 1 10:00:14 kernel: OOB Size: 64B
- Aug 1 10:00:14 kernel: Sector size: 512B
- Aug 1 10:00:14 kernel: Spare size: 16B
- Aug 1 10:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 10:00:14 kernel: Device ID: 0x 1 0xf1 0x 0 0x1d 0x 1 0xf1
- Aug 1 10:00:14 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48
- Aug 1 10:00:14 kernel: CCA UART Clock rate 100000000Hz
- Aug 1 10:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 10:00:14 kernel: Switching to clocksource mpcore_gtimer
- Aug 1 10:00:14 kernel: NET: Registered protocol family 2
- Aug 1 10:00:14 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes)
- Aug 1 10:00:14 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes)
- Aug 1 10:00:14 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes)
- Aug 1 10:00:14 kernel: TCP: Hash tables configured (established 8192 bind 8192)
- Aug 1 10:00:14 kernel: TCP reno registered
- Aug 1 10:00:14 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes)
- Aug 1 10:00:14 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes)
- Aug 1 10:00:14 kernel: NET: Registered protocol family 1
- Aug 1 10:00:14 kernel: PCI: no core
- Aug 1 10:00:14 kernel: PCI: no core
- Aug 1 10:00:14 kernel: PCI: scanning bus 0
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCIE1 link=1
- Aug 1 10:00:14 kernel: PCIE1 switching to GEN2
- Aug 1 10:00:14 kernel: PCIE1 link=1
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 10:00:14 kernel: PCI: bus1: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
- Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
- Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [io disabled]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem pref disabled]
- Aug 1 10:00:14 kernel: PCIE2 link=1
- Aug 1 10:00:14 kernel: PCIE2 switching to GEN2
- Aug 1 10:00:14 kernel: PCIE2 link=1
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 10:00:14 kernel: PCI: bus2: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
- Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit]
- Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [io disabled]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem pref disabled]
- Aug 1 10:00:14 kernel: PCIE3 link=0
- Aug 1 10:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 10:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 10:00:14 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
- Aug 1 10:00:14 kernel: fuse init (API version 7.15)
- Aug 1 10:00:14 kernel: msgmni has been set to 499
- Aug 1 10:00:14 kernel: io scheduler noop registered (default)
- Aug 1 10:00:14 kernel: io scheduler deadline registered
- Aug 1 10:00:14 kernel: io scheduler cfq registered
- Aug 1 10:00:14 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
- Aug 1 10:00:14 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550
- Aug 1 10:00:14 kernel: console [ttyS0] enabled, bootconsole disabled
- Aug 1 10:00:14 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550
- Aug 1 10:00:14 kernel: brd: module loaded
- Aug 1 10:00:14 kernel: loop: module loaded
- Aug 1 10:00:14 kernel: pflash: found no supported devices
- Aug 1 10:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 10:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 10:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 10:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 10:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 10:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 10:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 10:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 10:00:14 kernel: 0x00000039d3d8-0x000004000000 : "rootfs"
- Aug 1 10:00:14 kernel: PPP generic driver version 2.4.2
- Aug 1 10:00:14 kernel: PPP MPPE Compression module registered
- Aug 1 10:00:14 kernel: NET: Registered protocol family 24
- Aug 1 10:00:14 kernel: PPTP driver version 0.8.5
- Aug 1 10:00:14 kernel: Mirror/redirect action on
- Aug 1 10:00:14 kernel: u32 classifier
- Aug 1 10:00:14 kernel: Actions configured
- Aug 1 10:00:14 kernel: Netfilter messages via NETLINK v0.30.
- Aug 1 10:00:14 kernel: nf_conntrack version 0.5.0 (3992 buckets, 15968 max)
- Aug 1 10:00:14 kernel: xt_time: kernel timezone is -0000
- Aug 1 10:00:14 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
- Aug 1 10:00:14 kernel: TCP cubic registered
- Aug 1 10:00:14 kernel: NET: Registered protocol family 10
- Aug 1 10:00:14 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
- Aug 1 10:00:14 kernel: NET: Registered protocol family 17
- Aug 1 10:00:15 kernel: L2TP core driver, V2.0
- Aug 1 10:00:15 kernel: PPPoL2TP kernel driver, V2.0
- Aug 1 10:00:15 kernel: 802.1Q VLAN Support v1.8 Ben Greear <greearb@candelatech.com>
- Aug 1 10:00:15 kernel: All bugs added by David S. Miller <davem@redhat.com>
- Aug 1 10:00:15 kernel: Registering the dns_resolver key type
- Aug 1 10:00:15 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
- Aug 1 10:00:15 kernel: NAND device: Manufacturer ID: 0x01, Chip ID: 0xf1 (AMD NAND 128MiB 3,3V 8-bit)
- Aug 1 10:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 10:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 10:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 10:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 10:00:15 kernel: Scanning device for bad blocks
- Aug 1 10:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 10:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 10:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 10:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 10:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 10:00:15 kernel: devtmpfs: mounted
- Aug 1 10:00:15 kernel: Freeing init memory: 212K
- Aug 1 10:00:15 kernel: cfe_commit: do nothing
- Aug 1 10:00:15 kernel: et: module license 'Proprietary' taints kernel.
- Aug 1 10:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 10:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 10:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 10:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 10:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 10:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 10:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 10:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 10:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 10:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 10:00:15 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
- Aug 1 10:00:15 WAN Connection: ISP's DHCP did not function properly.
- Aug 1 10:00:15 kernel: _ Reboot message ... _______________________________________________________
- Aug 1 10:00:15 kernel: <1>Unable to handle kernel NULL pointer derefere�U�at virtual address 000000dc
- Aug 1 10:00:15 kernel: <1>pgd = c0004000
- Aug 1 10:00:15 kernel: <1>[000000dc] *pgds: 17 [#1] PREEMPT SMP
- Aug 1 10:00:15 kernel: <0>last sread_ahead_kb
- Aug 1 10:00:15 kernel: <4>module: tun bt_sip bf73a000 5031
- Aug 1 10:00:15 kernel: <4>module: nf_conntrack_sip bf731000 15713
- Aug 1 10:00:15 kernel: <4>module: nf_nat_h323 bf72a000 4761
- Aug 1 10:00:15 kernel: <4>module: nf_conntdule: nf_nat_rtsp bf716000 32 bf710000 4067
- Aug 1 10:00:15 kernel: <4>module: nf_nat_ftp bf70a000 1144
- Aug 1 10:00:15 kernel: <4>module: nf_conntrack_ftp bf703000 4909
- Aug 1 10:00:15 kernel: <4>module: ebt_mark bf6fd000 814
- Aug 1 10:00:15 kernel: <4>module: ip6table_maebtable_nat bf6f1000 1056
- Aug 1 10:00:15 kernel: <4>module: ebtables bf6e8000 15649000 10842
- Aug 1 10:00:15 kernel: <4>module: cdrom bf6cc000 30901
- Aug 1 10:00:15 kernel: <4>module: cdc_mbim bf6c6000 3129
- Aug 1 10:00:15 kernel: <4>module: qmi_wwan bf6bf000 5780
- Aug 1 10:00:15 kernel: <4>modu0 4936
- Aug 1 10:00:15 kernel: <4>module: cdc_ether bmii bf68c000 3367
- Aug 1 10:00:15 kernel: <4>module: usblp bf684000 10321
- Aug 1 10:00:15 kernel: <4>module0 81793
- Aug 1 10:00:15 kernel: <4>module: tntfs bf5d
- Aug 1 10:00:15 kernel: <4>module: usb_storage bf4e5000 19855
- Aug 1 10:00:15 kernel: <4>module: sd_mod bfe: scsi_mod bf4a3000 108738
- Aug 1 10:00:15 dropbear[435]: Running in background
- Aug 1 10:00:15 kernel: <1810
- Aug 1 10:00:15 kernel: <4>module: ip6t_LOG bf479: wl bf027000 3991991
- Aug 1 10:00:15 kernel: <4>module: igs bf01f000 11887
- Aug 1 10:00:15 kernel: <4>modnntrack_rtsp nf_nat_ftp nf_conntcdc_wdm cdc_ncm rndis_host cdc_ether asix usbnet mii usblp ohci_fat(P) ext2 ext4 crc16 jbd2 ext3 jbd mbcache usb_storage sg sd_mod scsi_wait_scan scsi_mod usbco) emf(P) et(P) [last unloaded: nf_conntrack_ftp]
- Aug 1 10:00:15 kernel: <4>CPU: 1 Tapdu+0x44/0x10c [wl]
- Aug 1 10:00:15 kernel: ISA ARM Segment kernel
- Aug 1 10:00:15 kernel: <4>Contr
- Aug 1 10:00:15 kernel: ____________________________________________________________________________
- Aug 1 10:00:15 kernel: device vlan1 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth0 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth1 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth2 entered promiscuous mode
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
- Aug 1 10:00:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Aug 1 10:00:18 dnsmasq[450]: started, version 2.76 cachesize 1500
- Aug 1 10:00:18 dnsmasq[450]: asynchronous logging enabled, queue limit is 5 messages
- Aug 1 10:00:18 dnsmasq-dhcp[450]: DHCP, IP range 10.1.1.1 -- 10.1.1.254, lease time 1d
- Aug 1 10:00:18 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:18 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:18 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:18 RT-AC68U: start httpd
- Aug 1 10:00:19 crond[458]: crond: crond (busybox 1.20.2) started, log level 8
- Aug 1 10:00:19 custom script: Running /jffs/scripts/services-start
- Aug 1 10:00:19 jffs2: valid logs(1)
- Aug 1 10:00:19 disk monitor: be idle
- Aug 1 10:00:19 hour monitor: daemon is starting
- Aug 1 10:00:19 hour monitor: daemon terminates
- Aug 1 10:00:20 miniupnpd[529]: HTTP listening on port 37674
- Aug 1 10:00:20 miniupnpd[529]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 10:00:20 miniupnpd[529]: chain VUPNP not found
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:20 kernel: usbcore: registered new interface driver usbfs
- Aug 1 10:00:20 kernel: usbcore: registered new interface driver hub
- Aug 1 10:00:20 kernel: usbcore: registered new device driver usb
- Aug 1 10:00:20 syslog: module ledtrig-usbdev not found in modules.dep
- Aug 1 10:00:20 syslog: module leds-usb not found in modules.dep
- Aug 1 10:00:20 kernel: SCSI subsystem initialized
- Aug 1 10:00:20 kernel: csw_retry 100
- Aug 1 10:00:20 kernel: Initializing USB Mass Storage driver...
- Aug 1 10:00:20 kernel: usbcore: registered new interface driver usb-storage
- Aug 1 10:00:20 kernel: USB Mass Storage support registered.
- Aug 1 10:00:20 rc_service: udhcpc 558:notify_rc start_firewall
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.1#53
- Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.33#53
- Aug 1 10:00:20 wan: finish adding multi routes
- Aug 1 10:00:21 rc_service: udhcpc 558:notify_rc stop_upnp
- Aug 1 10:00:21 rc_service: waitting "start_firewall" via udhcpc ...
- Aug 1 10:00:21 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE].
- Aug 1 10:00:21 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Wed Dec 2 11:17:39 CST 2015 arm
- Aug 1 10:00:21 kernel: Running on kernel 2.6.36.4brcmarm #3 SMP PREEMPT Sat Jan 7 19:33:39 EST 2017 armv7l
- Aug 1 10:00:21 kernel: Tuxera NTFS driver 3015.1.29.8_1 [Flags: R/W MODULE].
- Aug 1 10:00:21 kernel: Tuxera HFS+ driver 3014.7.28
- Aug 1 10:00:21 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
- Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller
- Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 1
- Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000
- Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00
- Aug 1 10:00:21 kernel: hub 1-0:1.0: USB hub found
- Aug 1 10:00:21 kernel: hub 1-0:1.0: 2 ports detected
- Aug 1 10:00:21 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
- Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller
- Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 2
- Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000
- Aug 1 10:00:21 kernel: hub 2-0:1.0: USB hub found
- Aug 1 10:00:21 kernel: hub 2-0:1.0: 2 ports detected
- Aug 1 10:00:21 kernel: usbcore: registered new interface driver usblp
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver asix
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_ether
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver rndis_host
- Aug 1 10:00:22 kernel: usb 1-1: new high speed USB device using ehci_hcd and address 2
- Aug 1 10:00:22 kernel: cdc_ncm: 14-Mar-2012
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_ncm
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_wdm
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver qmi_wwan
- Aug 1 10:00:22 kernel: cdc_mbim: loaded
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_mbim
- Aug 1 10:00:22 kernel: scsi0 : usb-storage 1-1:1.0
- Aug 1 10:00:22 kernel: usb 1-2: new high speed USB device using ehci_hcd and address 3
- Aug 1 10:00:22 kernel: scsi1 : usb-storage 1-2:1.0
- Aug 1 10:00:23 kernel: scsi 0:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
- Aug 1 10:00:23 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Write Protect is off
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sda: sda1
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Attached SCSI removable disk
- Aug 1 10:00:23 kernel: scsi 1:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
- Aug 1 10:00:23 kernel: sd 1:0:0:0: Attached scsi generic sg1 type 0
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Write Protect is off
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sdb: sdb1
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Attached SCSI removable disk
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Aug 1 10:00:24 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Aug 1 10:00:25 WAN Connection: WAN was restored.
- Aug 1 10:00:25 kernel: EXT3-fs: barriers not enabled
- Aug 1 10:00:25 kernel: Ebtables v2.0 registered
- Aug 1 10:00:25 kernel: xt_connbytes: Forcing CT accounting to be enabled
- Aug 1 10:00:26 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 10:00:26 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 10:00:27 rc_service: udhcpc 558:notify_rc start_upnp
- Aug 1 10:00:27 rc_service: waitting "stop_upnp" via udhcpc ...
- Aug 1 10:00:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Aug 1 10:00:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Aug 1 10:00:31 kernel: kjournald starting. Commit interval 5 seconds
- Aug 1 10:00:31 kernel: EXT3-fs (sda1): using internal journal
- Aug 1 10:00:31 kernel: EXT3-fs (sda1): recovery complete
- Aug 1 10:00:31 kernel: EXT3-fs (sda1): mounted filesystem with ordered data mode
- Aug 1 10:00:31 hotplug[780]: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1
- Aug 1 10:00:31 usb: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1.
- Aug 1 10:00:31 miniupnpd[529]: shutting down MiniUPnPd
- Aug 1 10:00:32 miniupnpd[897]: HTTP listening on port 49309
- Aug 1 10:00:32 miniupnpd[897]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 10:00:32 ddns update: ez-ipupdate: starting...
- Aug 1 10:00:33 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/sda1)
- Aug 1 10:00:33 rc_service: hotplug 780:notify_rc restart_nasapps
- Aug 1 10:00:33 iTunes: daemon is stopped
- Aug 1 10:00:33 FTP Server: daemon is stopped
- Aug 1 10:00:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
- Aug 1 10:00:33 Samba Server: smb daemon is stopped
- Aug 1 10:00:33 kernel: gro disabled
- Aug 1 10:00:33 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 06 Feb 2017 21:27:00 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
- Aug 1 10:00:33 ddns update: retval= 0, ddns_return_code (,200)
- Aug 1 10:00:33 ddns update: asusddns_update: 0
- Aug 1 10:00:34 Timemachine: daemon is stopped
- Aug 1 10:00:34 miniupnpd[897]: shutting down MiniUPnPd
- Aug 1 10:00:34 kernel: gro enabled with interval 2
- Aug 1 10:00:34 ddns: ddns update ok
- Aug 1 10:00:34 files: Started privoxy from .
- Aug 1 10:00:34 rc_service: udhcpc 558:notify_rc start_vpnserver1
- Aug 1 10:00:34 rc_service: waitting "restart_nasapps" via hotplug ...
- Aug 1 10:00:34 ntp: start NTP update
- Feb 7 07:27:02 rc_service: ntp 942:notify_rc restart_upnp
- Feb 7 07:27:02 rc_service: waitting "restart_nasapps" via hotplug ...
- Feb 7 07:27:04 Samba Server: daemon is started
- Feb 7 07:27:05 rc_service: ntp 942:notify_rc restart_diskmon
- Feb 7 07:27:05 rc_service: waitting "start_vpnserver1" via udhcpc ...
- Feb 7 07:27:06 miniupnpd[974]: HTTP listening on port 42791
- Feb 7 07:27:06 miniupnpd[974]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 7 07:27:07 kernel: tfat: fail_safe is enabled
- Feb 7 07:27:07 kernel: tfat: cluster_heap_lbo 0x3bc000
- Feb 7 07:27:07 kernel: tfat: 12 blkbits for normal inodes
- Feb 7 07:27:07 kernel: tfat: fat start lbo 0x2400
- Feb 7 07:27:07 kernel: tfat: 9 blkbits for main FAT32 inode
- Feb 7 07:27:07 kernel: tfat: cluster size 16384
- Feb 7 07:27:07 kernel: tfat info: FAT32 volume name 'ASUS', version 0.0.
- Feb 7 07:27:07 kernel: tfat warning (device sdb1, pid 986): fat_fill_super(): FAT volume ASUS is dirty. You should unmount and repair it.
- Feb 7 07:27:07 hotplug[781]: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS
- Feb 7 07:27:07 usb: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS.
- Feb 7 07:27:07 kernel: tun: Universal TUN/TAP device driver, 1.6
- Feb 7 07:27:07 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Feb 7 07:27:07 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/ASUS)
- Feb 7 07:27:07 openvpn-routing: Refreshing policy rules for client 1
- Feb 7 07:27:07 rc_service: hotplug 781:notify_rc restart_nasapps
- Feb 7 07:27:07 rc_service: waitting "start_vpnserver1" via udhcpc ...
- Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
- Feb 7 07:27:08 openvpn-routing: Refreshing policy rules for client 2
- Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
- Feb 7 07:27:08 openvpn-routing: Refreshing policy rules for client 3
- Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
- Feb 7 07:27:09 openvpn-routing: Refreshing policy rules for client 4
- Feb 7 07:27:09 openvpn-routing: Allow WAN access to all VPN clients
- Feb 7 07:27:09 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
- Feb 7 07:27:09 kernel: device tun21 entered promiscuous mode
- Feb 7 07:27:09 openvpn-routing: Refreshing policy rules for client 5
- Feb 7 07:27:09 openvpn-routing: Allow WAN access to all VPN clients
- Feb 7 07:27:09 rc_service: udhcpc 558:notify_rc start_vpnclient1
- Feb 7 07:27:09 rc_service: waitting "start_vpnserver1" via udhcpc ...
- Feb 7 07:27:10 openvpn[1136]: OpenVPN 2.3.14 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan 7 2017
- Feb 7 07:27:10 openvpn[1136]: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.08
- Feb 7 07:27:10 openvpn[1137]: Diffie-Hellman initialized with 2048 bit key
- Feb 7 07:27:10 openvpn[1137]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 7 07:27:10 openvpn[1137]: TUN/TAP device tun21 opened
- Feb 7 07:27:10 openvpn[1137]: TUN/TAP TX queue length set to 100
- Feb 7 07:27:10 openvpn[1137]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 7 07:27:10 openvpn[1137]: /usr/sbin/ip link set dev tun21 up mtu 1500
- Feb 7 07:27:10 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
- Feb 7 07:27:10 openvpn[1137]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
- Feb 7 07:27:10 openvpn[1137]: UDPv4 link local (bound): [undef]
- Feb 7 07:27:10 openvpn[1137]: UDPv4 link remote: [undef]
- Feb 7 07:27:10 openvpn[1137]: MULTI: multi_init called, r=256 v=256
- Feb 7 07:27:10 openvpn[1137]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Feb 7 07:27:10 openvpn[1137]: Initialization Sequence Completed
- Feb 7 07:27:11 iTunes: daemon is stopped
- Feb 7 07:27:11 FTP Server: daemon is stopped
- Feb 7 07:27:12 Samba Server: smb daemon is stopped
- Feb 7 07:27:12 kernel: gro disabled
- Feb 7 07:27:13 Timemachine: daemon is stopped
- Feb 7 07:27:13 miniupnpd[974]: shutting down MiniUPnPd
- Feb 7 07:27:13 kernel: gro enabled with interval 2
- Feb 7 07:27:14 Samba Server: daemon is started
- Feb 7 07:27:14 disk_monitor: Finish
- Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 7 07:27:15 miniupnpd[1167]: HTTP listening on port 33966
- Feb 7 07:27:15 miniupnpd[1167]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 7 07:27:17 disk monitor: be idle
- Feb 7 07:27:17 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Feb 7 07:27:17 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Feb 7 07:27:18 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 77801 seconds.
- Feb 7 07:27:18 openvpn[1214]: OpenVPN 2.3.14 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan 7 2017
- Feb 7 07:27:18 openvpn[1214]: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.08
- Feb 7 07:27:18 openvpn[1215]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 7 07:27:18 openvpn[1215]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 7 07:27:19 openvpn[1215]: UDPv4 link local: [undef]
- Feb 7 07:27:19 openvpn[1215]: UDPv4 link remote: [AF_INET]46.166.188.204:1197
- Feb 7 07:27:19 openvpn[1215]: TLS: Initial packet from [AF_INET]46.166.188.204:1197, sid=290bafb0 53882e09
- Feb 7 07:27:19 openvpn[1215]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 7 07:27:19 openvpn[1215]: VERIFY OK: nsCertType=SERVER
- Feb 7 07:27:19 openvpn[1215]: Validating certificate key usage
- Feb 7 07:27:19 openvpn[1215]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 7 07:27:19 openvpn[1215]: VERIFY KU OK
- Feb 7 07:27:19 openvpn[1215]: Validating certificate extended key usage
- Feb 7 07:27:19 openvpn[1215]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 7 07:27:19 openvpn[1215]: VERIFY EKU OK
- Feb 7 07:27:19 openvpn[1215]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=089eadaf1f154eab1712c10dd9007339, name=089eadaf1f154eab1712c10dd9007339
- Feb 7 07:27:23 openvpn[1215]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 7 07:27:23 openvpn[1215]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 7 07:27:23 openvpn[1215]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 7 07:27:23 openvpn[1215]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 7 07:27:23 openvpn[1215]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 7 07:27:23 openvpn[1215]: [089eadaf1f154eab1712c10dd9007339] Peer Connection Initiated with [AF_INET]46.166.188.204:1197
- Feb 7 07:27:26 openvpn[1215]: SENT CONTROL [089eadaf1f154eab1712c10dd9007339]: 'PUSH_REQUEST' (status=1)
- Feb 7 07:27:26 openvpn[1215]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.77.10.1,topology net30,ifconfig 10.77.10.6 10.77.10.5'
- Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: LZO parms modified
- Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: route options modified
- Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 7 07:27:26 openvpn[1215]: TUN/TAP device tun11 opened
- Feb 7 07:27:26 openvpn[1215]: TUN/TAP TX queue length set to 100
- Feb 7 07:27:26 openvpn[1215]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 7 07:27:26 openvpn[1215]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 7 07:27:26 openvpn[1215]: /usr/sbin/ip addr add dev tun11 local 10.77.10.6 peer 10.77.10.5
- Feb 7 07:27:26 openvpn[1215]: updown.sh tun11 1500 1570 10.77.10.6 10.77.10.5 init
- Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 7 07:27:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 7 07:27:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 7 07:27:27 rc_service: service 1394:notify_rc updateresolv
- Feb 7 07:27:28 dnsmasq[450]: read /etc/hosts - 5 addresses
- Feb 7 07:27:28 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Feb 7 07:27:28 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.1#53
- Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.33#53
- Feb 7 07:27:28 crond[458]: time disparity of 800487 minutes detected
- Feb 7 07:27:30 openvpn[1215]: /usr/sbin/ip route add 46.166.188.204/32 via 60.226.64.1
- Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 0.0.0.0/1 via 10.77.10.5
- Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 128.0.0.0/1 via 10.77.10.5
- Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 10.77.10.1/32 via 10.77.10.5
- Feb 7 07:27:31 openvpn-routing: Configuring policy rules for client 1
- Feb 7 07:27:31 openvpn-routing: Creating VPN routing table
- Feb 7 07:27:31 openvpn-routing: Removing route for 10.77.10.1 to tun11 from main routing table
- Feb 7 07:27:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 7 07:27:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 7 07:27:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 7 07:27:33 openvpn-routing: Completed routing policy configuration for client 1
- Feb 7 07:27:33 openvpn[1215]: Initialization Sequence Completed
- Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
- Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 07:33:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 7 07:33:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 7 08:00:17 disk_monitor: Got SIGALRM...
- Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 7 09:53:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 7 09:53:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 7 10:20:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 7 10:20:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 7 12:09:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 12:09:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 12:41:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 7 12:41:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 7 14:40:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 14:40:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 7 14:49:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 7 14:49:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 7 15:31:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 15:31:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 7 17:16:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 7 17:16:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 7 17:19:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 17:19:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 7 17:58:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 17:58:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 18:09:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 18:09:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 7 19:27:11 ntp: start NTP update
- Feb 7 19:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 7 19:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 7 19:27:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 7 19:27:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 7 20:37:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 20:37:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 7 20:40:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 7 20:40:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 7 20:40:49 miniupnpd[1167]: remove port mapping 32518 TCP because it has expired
- Feb 7 20:40:49 miniupnpd[1167]: remove port mapping 32518 UDP because it has expired
- Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 7 20:57:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 7 20:57:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
- Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 21:12:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:12:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 21:27:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:27:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 21:31:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 7 21:31:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 7 21:45:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:45:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 21:51:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 21:51:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 7 23:00:17 disk_monitor: Got SIGALRM...
- Feb 7 23:01:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 7 23:01:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 7 23:01:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 7 23:01:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 7 23:20:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 7 23:20:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 01:34:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 8 01:34:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 8 01:45:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 8 01:45:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 8 04:26:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 8 04:26:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 8 05:35:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 05:35:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 05:58:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 8 05:58:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 8 06:20:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 8 06:20:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
- Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 8 07:26:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 07:26:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 07:27:11 ntp: start NTP update
- Feb 8 07:27:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 8 07:27:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 8 07:41:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 07:41:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 07:47:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 8 07:47:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
- Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 08:42:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 8 08:42:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 8 09:29:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 09:29:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 09:41:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
- Feb 8 09:41:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
- Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 8 12:58:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 8 12:58:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 8 13:49:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 8 13:49:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 8 15:16:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 8 15:16:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
- Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
- Feb 8 15:21:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 8 15:21:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 8 17:28:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 8 17:28:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 8 18:55:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 8 18:55:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 8 19:19:58 miniupnpd[1167]: remove port mapping 20806 TCP because it has expired
- Feb 8 19:19:58 miniupnpd[1167]: remove port mapping 20806 UDP because it has expired
- Feb 8 19:27:09 ntp: start NTP update
- Feb 8 19:27:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 8 19:27:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 8 19:49:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 8 19:49:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 8 23:32:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 8 23:32:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 9 05:05:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 9 05:05:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 9 05:51:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 9 05:51:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 9 06:11:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 9 06:11:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 9 06:44:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 9 06:44:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 9 07:25:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 9 07:25:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 9 07:27:07 ntp: start NTP update
- Feb 9 07:27:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 9 07:27:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Aug 1 10:00:14 syslogd started: BusyBox v1.25.1
- Aug 1 10:00:14 kernel: klogd started: BusyBox v1.25.1 (2017-02-03 00:18:59 EST)
- Aug 1 10:00:14 kernel: Linux version 2.6.36.4brcmarm (merlin@ubuntu-dev) (gcc version 4.5.3 (Buildroot 2012.02) ) #2 SMP PREEMPT Fri Feb 3 00:27:49 EST 2017
- Aug 1 10:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 10:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 10:00:14 kernel: Machine: Northstar Prototype
- Aug 1 10:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 10:00:14 kernel: bootconsole [earlycon0] enabled
- Aug 1 10:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 10:00:14 kernel: MPCORE found at 19020000
- Aug 1 10:00:14 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536
- Aug 1 10:00:14 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096
- Aug 1 10:00:14 kernel: pcpu-alloc: [0] 0 [0] 1
- Aug 1 10:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 10:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 10:00:14 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes)
- Aug 1 10:00:14 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
- Aug 1 10:00:14 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
- Aug 1 10:00:14 kernel: Memory: 128MB 128MB = 256MB total
- Aug 1 10:00:14 kernel: Memory: 255488k/255488k available, 6656k reserved, 0K highmem
- Aug 1 10:00:14 kernel: Virtual kernel memory layout:
- Aug 1 10:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 10:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 10:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 10:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 10:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 10:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 10:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 10:00:14 kernel: .text : 0xc003d000 - 0xc03a9000 (3504 kB)
- Aug 1 10:00:14 kernel: .data : 0xc03c0000 - 0xc03e32a0 ( 141 kB)
- Aug 1 10:00:14 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
- Aug 1 10:00:14 kernel: Hierarchical RCU implementation.
- Aug 1 10:00:14 kernel: RCU-based detection of stalled CPUs is disabled.
- Aug 1 10:00:14 kernel: Verbose stalled-CPUs detection is disabled.
- Aug 1 10:00:14 kernel: NR_IRQS:256
- Aug 1 10:00:14 kernel: MPCORE GIC init
- Aug 1 10:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 10:00:14 kernel: MPCORE Global Timer Clock 400000000Hz
- Aug 1 10:00:14 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008)
- Aug 1 10:00:14 kernel: pid_max: default: 32768 minimum: 301
- Aug 1 10:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 10:00:14 kernel: CPU: Testing write buffer coherency: ok
- Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU0
- Aug 1 10:00:14 kernel: Calibrating local timer... 399.872MHz.
- Aug 1 10:00:14 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000
- Aug 1 10:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU1
- Aug 1 10:00:14 kernel: Brought up 2 CPUs
- Aug 1 10:00:14 kernel: SMP: Total of 2 processors activated (3194.88 BogoMIPS).
- Aug 1 10:00:14 kernel: devtmpfs: initialized
- Aug 1 10:00:14 kernel: atomic64 test passed
- Aug 1 10:00:14 kernel: NET: Registered protocol family 16
- Aug 1 10:00:14 kernel: Found a AMD NAND flash:
- Aug 1 10:00:14 kernel: Total size: 128MB
- Aug 1 10:00:14 kernel: Block size: 128KB
- Aug 1 10:00:14 kernel: Page Size: 2048B
- Aug 1 10:00:14 kernel: OOB Size: 64B
- Aug 1 10:00:14 kernel: Sector size: 512B
- Aug 1 10:00:14 kernel: Spare size: 16B
- Aug 1 10:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 10:00:14 kernel: Device ID: 0x 1 0xf1 0x 0 0x1d 0x 1 0xf1
- Aug 1 10:00:14 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48
- Aug 1 10:00:14 kernel: CCA UART Clock rate 100000000Hz
- Aug 1 10:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 10:00:14 kernel: Switching to clocksource mpcore_gtimer
- Aug 1 10:00:14 kernel: NET: Registered protocol family 2
- Aug 1 10:00:14 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes)
- Aug 1 10:00:14 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes)
- Aug 1 10:00:14 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes)
- Aug 1 10:00:14 kernel: TCP: Hash tables configured (established 8192 bind 8192)
- Aug 1 10:00:14 kernel: TCP reno registered
- Aug 1 10:00:14 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes)
- Aug 1 10:00:14 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes)
- Aug 1 10:00:14 kernel: NET: Registered protocol family 1
- Aug 1 10:00:14 kernel: PCI: no core
- Aug 1 10:00:14 kernel: PCI: no core
- Aug 1 10:00:14 kernel: PCI: scanning bus 0
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCIE1 link=1
- Aug 1 10:00:14 kernel: PCIE1 switching to GEN2
- Aug 1 10:00:14 kernel: PCIE1 link=1
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 10:00:14 kernel: PCI: bus1: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
- Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
- Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [io disabled]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
- Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem pref disabled]
- Aug 1 10:00:14 kernel: PCIE2 link=1
- Aug 1 10:00:14 kernel: PCIE2 switching to GEN2
- Aug 1 10:00:14 kernel: PCIE2 link=1
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 10:00:14 kernel: PCI: bus2: Fast back to back transfers disabled
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
- Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit]
- Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [io disabled]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
- Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem pref disabled]
- Aug 1 10:00:14 kernel: PCIE3 link=0
- Aug 1 10:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 10:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 10:00:14 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
- Aug 1 10:00:14 kernel: fuse init (API version 7.15)
- Aug 1 10:00:14 kernel: msgmni has been set to 499
- Aug 1 10:00:14 kernel: io scheduler noop registered (default)
- Aug 1 10:00:14 kernel: io scheduler deadline registered
- Aug 1 10:00:14 kernel: io scheduler cfq registered
- Aug 1 10:00:14 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
- Aug 1 10:00:14 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550
- Aug 1 10:00:14 kernel: console [ttyS0] enabled, bootconsole disabled
- Aug 1 10:00:14 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550
- Aug 1 10:00:14 kernel: brd: module loaded
- Aug 1 10:00:14 kernel: loop: module loaded
- Aug 1 10:00:14 kernel: pflash: found no supported devices
- Aug 1 10:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 10:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 10:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 10:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 10:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 10:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 10:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 10:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 10:00:14 kernel: 0x00000039d3d8-0x000004000000 : "rootfs"
- Aug 1 10:00:14 kernel: PPP generic driver version 2.4.2
- Aug 1 10:00:14 kernel: PPP MPPE Compression module registered
- Aug 1 10:00:14 kernel: NET: Registered protocol family 24
- Aug 1 10:00:14 kernel: PPTP driver version 0.8.5
- Aug 1 10:00:14 kernel: Mirror/redirect action on
- Aug 1 10:00:14 kernel: u32 classifier
- Aug 1 10:00:14 kernel: Actions configured
- Aug 1 10:00:14 kernel: Netfilter messages via NETLINK v0.30.
- Aug 1 10:00:14 kernel: nf_conntrack version 0.5.0 (3992 buckets, 15968 max)
- Aug 1 10:00:14 kernel: xt_time: kernel timezone is -0000
- Aug 1 10:00:14 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
- Aug 1 10:00:14 kernel: TCP cubic registered
- Aug 1 10:00:14 kernel: NET: Registered protocol family 10
- Aug 1 10:00:14 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
- Aug 1 10:00:14 kernel: NET: Registered protocol family 17
- Aug 1 10:00:14 kernel: L2TP core driver, V2.0
- Aug 1 10:00:14 kernel: PPPoL2TP kernel driver, V2.0
- Aug 1 10:00:14 kernel: 802.1Q VLAN Support v1.8 Ben Greear <greearb@candelatech.com>
- Aug 1 10:00:14 kernel: All bugs added by David S. Miller <davem@redhat.com>
- Aug 1 10:00:14 kernel: Registering the dns_resolver key type
- Aug 1 10:00:14 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
- Aug 1 10:00:14 kernel: NAND device: Manufacturer ID: 0x01, Chip ID: 0xf1 (AMD NAND 128MiB 3,3V 8-bit)
- Aug 1 10:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 10:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 10:00:14 kernel: Available 7 bytes at (off,len):
- Aug 1 10:00:14 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 10:00:14 kernel: Scanning device for bad blocks
- Aug 1 10:00:14 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 10:00:14 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 10:00:14 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 10:00:14 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 10:00:14 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 10:00:14 kernel: devtmpfs: mounted
- Aug 1 10:00:14 kernel: Freeing init memory: 212K
- Aug 1 10:00:14 kernel: cfe_commit: do nothing
- Aug 1 10:00:14 kernel: et: module license 'Proprietary' taints kernel.
- Aug 1 10:00:14 kernel: Disabling lock debugging due to kernel taint
- Aug 1 10:00:14 kernel: et_module_init: passivemode set to 0x0
- Aug 1 10:00:14 kernel: et_module_init: txworkq set to 0x0
- Aug 1 10:00:14 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 10:00:14 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 10:00:14 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 10:00:14 kernel: wl_module_init: igs set to 0x0
- Aug 1 10:00:14 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 10:00:14 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 10:00:14 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 10:00:14 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
- Aug 1 10:00:15 kernel: device vlan1 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth0 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth1 entered promiscuous mode
- Aug 1 10:00:15 kernel: device eth2 entered promiscuous mode
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: topology change detected, propagating
- Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
- Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
- Aug 1 10:00:15 WAN Connection: ISP's DHCP did not function properly.
- Aug 1 10:00:16 dropbear[435]: Running in background
- Aug 1 10:00:19 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Aug 1 10:00:19 dnsmasq[450]: started, version 2.76 cachesize 1500
- Aug 1 10:00:19 dnsmasq[450]: asynchronous logging enabled, queue limit is 5 messages
- Aug 1 10:00:19 dnsmasq-dhcp[450]: DHCP, IP range 10.1.1.1 -- 10.1.1.254, lease time 1d
- Aug 1 10:00:19 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:19 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:19 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:19 RT-AC68U: start httpd
- Aug 1 10:00:19 crond[458]: crond (busybox 1.25.1) started, log level 8
- Aug 1 10:00:20 custom script: Running /jffs/scripts/services-start
- Aug 1 10:00:20 jffs2: valid logs(1)
- Aug 1 10:00:20 disk monitor: be idle
- Aug 1 10:00:20 hour monitor: daemon is starting
- Aug 1 10:00:20 hour monitor: daemon terminates
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:21 rc_service: udhcpc 527:notify_rc start_firewall
- Aug 1 10:00:21 dnsmasq[450]: read /etc/hosts - 5 addresses
- Aug 1 10:00:21 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Aug 1 10:00:21 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.1#53
- Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.33#53
- Aug 1 10:00:21 wan: finish adding multi routes
- Aug 1 10:00:21 rc_service: udhcpc 527:notify_rc stop_upnp
- Aug 1 10:00:21 rc_service: waitting "start_firewall" via udhcpc ...
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver usbfs
- Aug 1 10:00:22 kernel: usbcore: registered new interface driver hub
- Aug 1 10:00:22 kernel: usbcore: registered new device driver usb
- Aug 1 10:00:22 syslog: module ledtrig-usbdev not found in modules.dep
- Aug 1 10:00:22 syslog: module leds-usb not found in modules.dep
- Aug 1 10:00:22 kernel: SCSI subsystem initialized
- Aug 1 10:00:23 kernel: csw_retry 100
- Aug 1 10:00:23 kernel: Initializing USB Mass Storage driver...
- Aug 1 10:00:23 kernel: usbcore: registered new interface driver usb-storage
- Aug 1 10:00:23 kernel: USB Mass Storage support registered.
- Aug 1 10:00:23 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE].
- Aug 1 10:00:23 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Wed Dec 2 11:17:39 CST 2015 arm
- Aug 1 10:00:23 kernel: Running on kernel 2.6.36.4brcmarm #2 SMP PREEMPT Fri Feb 3 00:27:49 EST 2017 armv7l
- Aug 1 10:00:24 kernel: Tuxera NTFS driver 3015.1.29.8_1 [Flags: R/W MODULE].
- Aug 1 10:00:24 kernel: Tuxera HFS+ driver 3014.7.28
- Aug 1 10:00:24 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
- Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller
- Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 1
- Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000
- Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00
- Aug 1 10:00:24 kernel: hub 1-0:1.0: USB hub found
- Aug 1 10:00:24 kernel: hub 1-0:1.0: 2 ports detected
- Aug 1 10:00:24 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
- Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller
- Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 2
- Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000
- Aug 1 10:00:24 kernel: hub 2-0:1.0: USB hub found
- Aug 1 10:00:24 kernel: hub 2-0:1.0: 2 ports detected
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver usblp
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver asix
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_ether
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver rndis_host
- Aug 1 10:00:24 kernel: cdc_ncm: 14-Mar-2012
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_ncm
- Aug 1 10:00:24 kernel: usb 1-1: new high speed USB device using ehci_hcd and address 2
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_wdm
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver qmi_wwan
- Aug 1 10:00:24 kernel: cdc_mbim: loaded
- Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_mbim
- Aug 1 10:00:24 kernel: scsi0 : usb-storage 1-1:1.0
- Aug 1 10:00:24 kernel: usb 1-2: new high speed USB device using ehci_hcd and address 3
- Aug 1 10:00:24 kernel: scsi1 : usb-storage 1-2:1.0
- Aug 1 10:00:25 kernel: scsi 0:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
- Aug 1 10:00:25 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Write Protect is off
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sda: sda1
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Attached SCSI removable disk
- Aug 1 10:00:25 WAN Connection: WAN was restored.
- Aug 1 10:00:25 kernel: scsi 1:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
- Aug 1 10:00:25 kernel: sd 1:0:0:0: Attached scsi generic sg1 type 0
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Write Protect is off
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sdb: sdb1
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
- Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Attached SCSI removable disk
- Aug 1 10:00:25 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Aug 1 10:00:27 kernel: EXT3-fs: barriers not enabled
- Aug 1 10:00:27 kernel: Ebtables v2.0 registered
- Aug 1 10:00:27 hotplug[777]: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1
- Aug 1 10:00:27 usb: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1.
- Aug 1 10:00:27 kernel: kjournald starting. Commit interval 5 seconds
- Aug 1 10:00:27 kernel: EXT3-fs (sda1): using internal journal
- Aug 1 10:00:27 kernel: EXT3-fs (sda1): recovery complete
- Aug 1 10:00:27 kernel: EXT3-fs (sda1): mounted filesystem with ordered data mode
- Aug 1 10:00:27 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Aug 1 10:00:27 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/sda1)
- Aug 1 10:00:28 rc_service: hotplug 777:notify_rc restart_nasapps
- Aug 1 10:00:28 rc_service: waitting "start_firewall" via udhcpc ...
- Aug 1 10:00:28 kernel: xt_connbytes: Forcing CT accounting to be enabled
- Aug 1 10:00:28 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 10:00:28 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 10:00:28 rc_service: udhcpc 527:notify_rc start_upnp
- Aug 1 10:00:28 rc_service: waitting "stop_upnp" via udhcpc ...
- Aug 1 10:00:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Aug 1 10:00:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Aug 1 10:00:29 iTunes: daemon is stopped
- Aug 1 10:00:29 FTP Server: daemon is stopped
- Aug 1 10:00:29 Samba Server: smb daemon is stopped
- Aug 1 10:00:29 kernel: gro disabled
- Aug 1 10:00:30 files: Started privoxy from .
- Aug 1 10:00:30 Timemachine: daemon is stopped
- Aug 1 10:00:30 kernel: gro enabled with interval 2
- Aug 1 10:00:32 Samba Server: daemon is started
- Aug 1 10:00:34 ddns update: ez-ipupdate: starting...
- Aug 1 10:00:34 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
- Aug 1 10:00:35 miniupnpd[937]: HTTP listening on port 47991
- Aug 1 10:00:35 miniupnpd[937]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 10:00:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 08 Feb 2017 23:26:29 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
- Aug 1 10:00:35 ddns update: retval= 0, ddns_return_code (,200)
- Aug 1 10:00:35 ddns update: asusddns_update: 0
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Aug 1 10:00:36 kernel: tfat: fail_safe is enabled
- Aug 1 10:00:36 kernel: tfat: cluster_heap_lbo 0x3bc000
- Aug 1 10:00:36 kernel: tfat: 12 blkbits for normal inodes
- Aug 1 10:00:36 kernel: tfat: fat start lbo 0x2400
- Aug 1 10:00:36 kernel: tfat: 9 blkbits for main FAT32 inode
- Aug 1 10:00:36 kernel: tfat: cluster size 16384
- Aug 1 10:00:36 kernel: tfat info: FAT32 volume name 'ASUS', version 0.0.
- Aug 1 10:00:36 kernel: tfat warning (device sdb1, pid 933): fat_fill_super(): FAT volume ASUS is dirty. You should unmount and repair it.
- Aug 1 10:00:36 hotplug[779]: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS
- Aug 1 10:00:36 usb: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS.
- Aug 1 10:00:36 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/ASUS)
- Aug 1 10:00:36 rc_service: hotplug 779:notify_rc restart_nasapps
- Aug 1 10:00:36 iTunes: daemon is stopped
- Aug 1 10:00:37 FTP Server: daemon is stopped
- Aug 1 10:00:39 ddns: ddns update ok
- Aug 1 10:00:39 Samba Server: smb daemon is stopped
- Aug 1 10:00:39 kernel: gro disabled
- Aug 1 10:00:40 rc_service: udhcpc 527:notify_rc start_vpnserver1
- Aug 1 10:00:40 rc_service: waitting "restart_nasapps" via hotplug ...
- Aug 1 10:00:40 Timemachine: daemon is stopped
- Aug 1 10:00:40 miniupnpd[937]: shutting down MiniUPnPd
- Aug 1 10:00:41 kernel: gro enabled with interval 2
- Aug 1 10:00:41 ntp: start NTP update
- Feb 9 09:26:36 rc_service: ntp 988:notify_rc restart_upnp
- Feb 9 09:26:36 rc_service: waitting "restart_nasapps" via hotplug ...
- Feb 9 09:26:37 Samba Server: daemon is started
- Feb 9 09:26:38 miniupnpd[1018]: HTTP listening on port 59429
- Feb 9 09:26:38 miniupnpd[1018]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 9 09:26:40 kernel: tun: Universal TUN/TAP device driver, 1.6
- Feb 9 09:26:40 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Feb 9 09:26:41 openvpn-routing: Refreshing policy rules for client 1
- Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
- Feb 9 09:26:42 openvpn-routing: Refreshing policy rules for client 2
- Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
- Feb 9 09:26:42 openvpn-routing: Refreshing policy rules for client 3
- Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
- Feb 9 09:26:43 openvpn-routing: Refreshing policy rules for client 4
- Feb 9 09:26:43 openvpn-routing: Allow WAN access to all VPN clients
- Feb 9 09:26:43 openvpn-routing: Refreshing policy rules for client 5
- Feb 9 09:26:43 openvpn-routing: Allow WAN access to all VPN clients
- Feb 9 09:26:44 rc_service: udhcpc 527:notify_rc start_vpnclient1
- Feb 9 09:26:44 rc_service: waitting "start_vpnserver1" via udhcpc ...
- Feb 9 09:26:44 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
- Feb 9 09:26:44 kernel: device tun21 entered promiscuous mode
- Feb 9 09:26:46 openvpn[1148]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Feb 9 09:26:46 openvpn[1148]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Feb 9 09:26:46 openvpn[1149]: Diffie-Hellman initialized with 2048 bit key
- Feb 9 09:26:46 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
- Feb 9 09:26:46 openvpn[1149]: TUN/TAP device tun21 opened
- Feb 9 09:26:46 openvpn[1149]: TUN/TAP TX queue length set to 100
- Feb 9 09:26:46 openvpn[1149]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Feb 9 09:26:46 openvpn[1149]: /usr/sbin/ip link set dev tun21 up mtu 1500
- Feb 9 09:26:46 openvpn[1149]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
- Feb 9 09:26:46 openvpn[1149]: Could not determine IPv4/IPv6 protocol. Using AF_INET6
- Feb 9 09:26:46 openvpn[1149]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 9 09:26:46 openvpn[1149]: setsockopt(IPV6_V6ONLY=0)
- Feb 9 09:26:46 openvpn[1149]: UDPv6 link local (bound): [AF_INET6][undef]:1194
- Feb 9 09:26:46 openvpn[1149]: UDPv6 link remote: [AF_UNSPEC]
- Feb 9 09:26:46 openvpn[1149]: MULTI: multi_init called, r=256 v=256
- Feb 9 09:26:46 openvpn[1149]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Feb 9 09:26:46 openvpn[1149]: Initialization Sequence Completed
- Feb 9 09:26:48 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Feb 9 09:26:48 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Feb 9 09:26:48 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 3600 seconds.
- Feb 9 09:26:50 openvpn[1192]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Feb 9 09:26:50 openvpn[1192]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Feb 9 09:26:50 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 9 09:26:51 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.188.197:1197
- Feb 9 09:26:51 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 9 09:26:51 openvpn[1193]: UDP link local: (not bound)
- Feb 9 09:26:51 openvpn[1193]: UDP link remote: [AF_INET]46.166.188.197:1197
- Feb 9 09:26:51 openvpn[1193]: TLS: Initial packet from [AF_INET]46.166.188.197:1197, sid=5d95de34 b7003d9b
- Feb 9 09:26:51 miniupnpd[1018]: shutting down MiniUPnPd
- Feb 9 09:26:52 miniupnpd[1195]: HTTP listening on port 56831
- Feb 9 09:26:52 miniupnpd[1195]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 9 09:26:52 rc_service: ntp 988:notify_rc restart_diskmon
- Feb 9 09:26:52 disk_monitor: Finish
- Feb 9 09:26:54 openvpn[1193]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 9 09:26:54 openvpn[1193]: VERIFY OK: nsCertType=SERVER
- Feb 9 09:26:54 openvpn[1193]: Validating certificate key usage
- Feb 9 09:26:54 openvpn[1193]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 9 09:26:54 openvpn[1193]: VERIFY KU OK
- Feb 9 09:26:54 openvpn[1193]: Validating certificate extended key usage
- Feb 9 09:26:54 openvpn[1193]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 9 09:26:54 openvpn[1193]: VERIFY EKU OK
- Feb 9 09:26:54 openvpn[1193]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=29bcd4910986d3292bd023417f90d95e, name=29bcd4910986d3292bd023417f90d95e
- Feb 9 09:26:55 crond[458]: time disparity of 803486 minutes detected
- Feb 9 09:26:56 disk monitor: be idle
- Feb 9 09:26:59 openvpn[1193]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 9 09:26:59 openvpn[1193]: [29bcd4910986d3292bd023417f90d95e] Peer Connection Initiated with [AF_INET]46.166.188.197:1197
- Feb 9 09:27:00 openvpn[1193]: SENT CONTROL [29bcd4910986d3292bd023417f90d95e]: 'PUSH_REQUEST' (status=1)
- Feb 9 09:27:00 openvpn[1193]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.27.10.1,topology net30,ifconfig 10.27.10.6 10.27.10.5'
- Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: compression parms modified
- Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: route options modified
- Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 9 09:27:00 openvpn[1193]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 9 09:27:00 openvpn[1193]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 9 09:27:00 openvpn[1193]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 9 09:27:00 openvpn[1193]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Feb 9 09:27:00 openvpn[1193]: TUN/TAP device tun11 opened
- Feb 9 09:27:00 openvpn[1193]: TUN/TAP TX queue length set to 100
- Feb 9 09:27:00 openvpn[1193]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Feb 9 09:27:00 openvpn[1193]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 9 09:27:01 openvpn[1193]: /usr/sbin/ip addr add dev tun11 local 10.27.10.6 peer 10.27.10.5
- Feb 9 09:27:01 openvpn[1193]: updown.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
- Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Feb 9 09:27:03 rc_service: service 1367:notify_rc updateresolv
- Feb 9 09:27:03 dnsmasq[450]: read /etc/hosts - 5 addresses
- Feb 9 09:27:03 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Feb 9 09:27:03 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.1#53
- Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.33#53
- Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 46.166.188.197/32 via 60.226.64.1
- Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 0.0.0.0/1 via 10.27.10.5
- Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 128.0.0.0/1 via 10.27.10.5
- Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 10.27.10.1/32 via 10.27.10.5
- Feb 9 09:27:07 openvpn-routing: Configuring policy rules for client 1
- Feb 9 09:27:07 openvpn-routing: Creating VPN routing table
- Feb 9 09:27:07 openvpn-routing: Removing route for 10.27.10.1 to tun11 from main routing table
- Feb 9 09:27:07 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 9 09:27:07 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 9 09:27:07 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Feb 9 09:27:09 openvpn-routing: Completed routing policy configuration for client 1
- Feb 9 09:27:09 openvpn[1193]: Initialization Sequence Completed
- Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 9 10:00:56 disk_monitor: Got SIGALRM...
- Feb 9 10:20:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 9 10:20:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 9 13:39:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 9 13:39:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 9 16:40:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.111 00:9c:02:94:2d:68
- Feb 9 16:40:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.111 00:9c:02:94:2d:68
- Feb 9 16:40:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.111 00:9c:02:94:2d:68
- Feb 9 16:40:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.111 00:9c:02:94:2d:68 DESKTOP-S3EOB7P
- Feb 9 16:54:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 9 16:54:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 9 17:03:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 9 17:03:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 9 17:33:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 9 17:33:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 9 17:41:26 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 9 17:41:26 miniupnpd[1195]: remove port mapping 20807 UDP because it has expired
- Feb 9 17:56:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 9 17:56:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 9 18:11:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 9 18:11:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 9 18:24:44 miniupnpd[1195]: remove port mapping 20807 TCP because it has expired
- Feb 9 18:54:44 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 9 18:54:44 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 9 20:59:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 9 20:59:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 9 21:26:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 9 21:26:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 9 21:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 9 21:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 9 21:26:49 ntp: start NTP update
- Feb 9 21:33:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 9 21:33:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 9 21:47:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 9 21:47:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 9 23:00:56 disk_monitor: Got SIGALRM...
- Feb 10 04:15:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 10 04:15:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 10 04:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 10 04:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 10 05:03:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 10 05:03:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 10 05:42:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 10 05:42:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 10 07:47:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 10 07:47:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 10 08:12:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 10 08:12:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 10 08:39:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 10 08:39:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 10 09:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 10 09:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 10 09:26:47 ntp: start NTP update
- Feb 10 09:47:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 09:47:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 10:31:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 10 10:31:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 10 11:20:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 10 11:20:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 14:53:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 10 14:53:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 16:17:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 10 16:17:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 10 16:41:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 16:41:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 17:16:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 17:16:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 17:35:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 17:35:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 17:40:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 17:40:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 17:40:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 10 17:40:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 10 17:47:44 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 10 17:47:44 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 10 19:06:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 10 19:06:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 10 19:13:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 10 19:13:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 10 19:56:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 10 19:56:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 10 21:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 10 21:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 10 21:26:45 ntp: start NTP update
- Feb 11 02:06:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 11 02:06:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 11 03:23:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 11 03:23:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 11 05:11:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 05:11:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 05:51:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 11 05:51:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 11 06:11:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 11 06:11:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 11 07:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 11 07:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 11 08:16:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 08:16:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 09:26:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 11 09:26:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 11 09:26:42 ntp: start NTP update
- Feb 11 12:18:27 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 11 12:18:27 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 11 12:18:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 11 12:18:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 11 12:18:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 12:18:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 11 13:15:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 11 13:15:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 11 13:16:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 13:16:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 14:33:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 11 14:33:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 11 16:43:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 11 16:43:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 11 17:00:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 11 17:00:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 11 17:32:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 17:32:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 19:44:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 19:44:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 11 20:54:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 20:54:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 11 21:26:40 ntp: start NTP update
- Feb 11 21:58:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 21:58:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 22:02:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 22:02:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 11 22:10:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 11 22:10:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 00:22:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 12 00:22:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 12 01:42:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 12 01:42:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 12 03:28:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 12 03:28:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 12 03:40:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 12 03:40:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 12 04:12:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 12 04:12:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 12 08:27:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 08:27:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 12 08:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 12 08:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 12 09:26:38 ntp: start NTP update
- Feb 12 09:42:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 12 09:42:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 11:20:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 12 11:20:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 12 12:32:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 12 12:32:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 12 12:48:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 12 12:48:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 12 14:42:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 12 14:42:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 12 14:49:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 12 14:49:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 12 14:55:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 12 14:55:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 12 18:20:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 12 18:20:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 18:50:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 12 18:50:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 12 18:50:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 12 18:50:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 12 18:52:17 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
- Feb 12 18:52:17 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
- Feb 12 20:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 12 20:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 12 21:26:35 ntp: start NTP update
- Feb 12 22:12:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 12 22:12:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 12 23:19:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 12 23:19:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 13 01:30:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 13 01:30:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 13 01:54:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 13 01:54:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 13 06:21:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 13 06:21:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 13 06:22:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 13 06:22:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 13 08:41:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 13 08:41:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 13 08:52:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 13 08:52:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 13 08:53:11 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 13 08:53:11 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 13 09:26:33 ntp: start NTP update
- Feb 13 09:52:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 13 09:52:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 13 12:26:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 13 12:26:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 13 13:03:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 13 13:03:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 13 15:15:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 13 15:15:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 13 15:31:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 13 15:31:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 13 17:36:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 13 17:36:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 13 18:01:19 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 13 18:01:19 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 13 19:59:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 13 19:59:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 13 20:41:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 13 20:41:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 13 20:59:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 13 20:59:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 13 21:26:31 ntp: start NTP update
- Feb 13 23:00:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 13 23:00:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 14 00:14:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 00:14:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 05:06:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 14 05:06:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 14 05:07:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 14 05:07:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 14 06:32:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 06:32:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 06:36:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 14 06:36:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 14 07:22:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 07:22:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 07:24:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 07:24:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 07:42:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 14 07:42:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 14 08:41:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 14 08:41:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 14 09:26:28 ntp: start NTP update
- Feb 14 09:35:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 14 09:35:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 14 11:18:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 11:18:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 12:24:55 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 14 12:24:55 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 14 13:34:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 14 13:34:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 14 13:38:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 13:38:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 17:09:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 17:09:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 17:09:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 14 17:09:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 14 17:14:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 17:14:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 17:30:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 14 17:30:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 14 18:24:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 14 18:24:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 14 18:41:57 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
- Feb 14 18:41:57 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
- Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 14 18:54:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 18:54:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 14 19:05:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 19:05:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 19:55:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 19:55:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 19:55:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 19:55:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 20:13:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 14 20:13:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 14 20:32:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 20:32:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 20:36:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 20:36:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 20:39:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 14 20:39:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 14 20:41:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 14 20:41:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 14 21:26:26 ntp: start NTP update
- Feb 14 22:22:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 22:22:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 14 22:38:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 22:38:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 22:38:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 22:38:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 14 22:38:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 14 22:38:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 04:05:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 15 04:05:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 15 04:41:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 15 04:41:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 15 05:21:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 15 05:21:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 15 06:14:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 06:14:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 06:20:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 15 06:20:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 15 06:20:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 06:20:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 06:27:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 06:27:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 15 07:16:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 15 07:16:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 15 07:18:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 07:18:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 08:41:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 15 08:41:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 15 08:55:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 08:55:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 09:00:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 09:00:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 09:13:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 15 09:13:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 15 09:15:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 15 09:15:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 09:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 09:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 09:20:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 09:20:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 09:26:24 ntp: start NTP update
- Feb 15 09:30:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 09:30:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 11:59:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 15 11:59:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 14:42:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 15 14:42:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 14:42:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 15 14:42:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 15:16:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 15 15:16:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 15 15:35:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 15:35:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 16:04:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 15 16:04:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 15 16:04:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 15 16:04:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 15 16:39:06 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 15 16:39:06 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 15 17:15:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 15 17:15:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 15 18:09:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 15 18:09:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 15 20:06:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 15 20:06:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 15 20:41:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 15 20:41:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 15 21:02:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 15 21:02:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 15 21:18:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 15 21:18:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 15 21:26:24 ntp: start NTP update
- Feb 15 22:02:47 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 15 22:02:47 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 16 02:00:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 16 02:00:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 16 03:53:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 16 03:53:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 16 05:20:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 16 05:20:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 16 06:39:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 16 06:39:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 16 06:43:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 06:43:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 16 06:53:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 16 06:53:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 16 07:33:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 16 07:33:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 16 08:24:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 16 08:24:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 16 08:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 16 08:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 16 09:26:22 ntp: start NTP update
- Feb 16 13:09:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 16 13:09:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 16 14:50:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 16 14:50:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 16 16:21:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 16 16:21:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 16 17:06:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 16 17:06:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 16 17:55:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 16 17:55:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 16 18:15:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 18:15:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 16 18:41:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 16 18:41:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 16 19:03:25 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 16 19:03:25 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 16 20:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 16 20:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 16 20:45:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 16 20:45:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 16 21:26:20 ntp: start NTP update
- Feb 16 23:51:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 16 23:51:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 17 01:55:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 17 01:55:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 17 03:05:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 17 03:05:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 17 04:49:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 17 04:49:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 17 06:26:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 17 06:26:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 17 07:05:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 17 07:05:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 17 08:18:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 17 08:18:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 17 08:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 17 08:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 17 08:54:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 17 08:54:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 17 09:26:18 ntp: start NTP update
- Feb 17 10:46:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 17 10:46:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 17 11:34:59 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 17 11:34:59 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 17 13:09:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 17 13:09:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 17 13:53:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 17 13:53:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 17 13:58:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 17 13:58:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 17 14:03:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 17 14:03:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 17 15:38:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 17 15:38:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 17 16:39:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 17 16:39:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 17 16:40:21 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
- Feb 17 16:40:21 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
- Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
- Feb 17 17:39:16 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 17 17:39:16 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 17 20:41:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 17 20:41:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 17 20:56:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 17 20:56:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 17 21:25:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 17 21:25:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 17 21:26:16 ntp: start NTP update
- Feb 17 21:56:05 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Feb 17 21:56:05 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Feb 18 00:08:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 18 00:08:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 18 01:07:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 18 01:07:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 18 02:25:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 18 02:25:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 18 07:14:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 18 07:14:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 18 08:13:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 18 08:13:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 18 08:34:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 18 08:34:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 18 09:26:14 ntp: start NTP update
- Feb 18 11:04:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 18 11:04:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 18 11:32:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 18 11:32:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 18 12:15:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 18 12:15:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 18 12:55:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 18 12:55:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 18 15:42:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 18 15:42:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 18 18:32:01 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:55544, sid=010ee3a3 e1fa50b4
- Feb 18 18:32:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 18 18:32:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:55544
- Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
- Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
- Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
- Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
- Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 18 18:40:42 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
- Feb 18 18:40:42 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Feb 18 19:34:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 18 19:34:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 18 20:28:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 18 20:28:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 18 21:26:12 ntp: start NTP update
- Feb 18 21:58:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 18 21:58:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 18 23:07:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 18 23:07:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 18 23:44:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 18 23:44:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 19 00:14:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 00:14:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 19 06:29:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 19 06:29:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 19 08:28:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 19 08:28:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 19 08:53:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 19 08:53:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 19 09:07:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 19 09:07:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 19 09:26:10 ntp: start NTP update
- Feb 19 09:58:19 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:54938, sid=2c2b239e cb123222
- Feb 19 09:58:21 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 09:58:21 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 09:58:25 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 09:58:25 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:54938
- Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
- Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
- Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
- Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
- Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 10:16:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 19 10:16:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 19 10:46:04 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
- Feb 19 10:46:04 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Feb 19 10:57:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 19 10:57:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 19 11:54:12 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:56906, sid=ceae4080 721ed74c
- Feb 19 11:54:13 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 11:54:13 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 11:54:15 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 11:54:15 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:56906
- Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
- Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
- Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
- Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
- Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 12:54:17 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 13:54:14 openvpn[1149]: client/103.21.230.246 TLS: tls_process: killed expiring key
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 13:54:19 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 14:54:16 openvpn[1149]: client/103.21.230.246 TLS: tls_process: killed expiring key
- Feb 19 14:54:19 openvpn[1149]: client/103.21.230.246 TLS: soft reset sec=0 bytes=23026403/-1 pkts=44223/0
- Feb 19 14:54:22 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 14:54:22 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 14:54:24 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 14:58:01 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
- Feb 19 14:58:01 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Feb 19 15:01:02 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:53318, sid=8a3ff108 ec516f6d
- Feb 19 15:01:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
- Feb 19 15:01:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:53318
- Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
- Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
- Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
- Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
- Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Feb 19 15:05:23 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
- Feb 19 15:05:23 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 19 17:03:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 19 17:03:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 19 19:57:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 19 19:57:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 19 20:28:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 19 20:28:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 19 21:14:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 19 21:14:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 19 21:26:08 ntp: start NTP update
- Feb 19 22:21:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 19 22:21:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 20 03:19:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 20 03:19:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 20 03:43:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 20 03:43:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 20 05:31:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 20 05:31:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 20 07:09:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 20 07:09:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 20 08:14:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 20 08:14:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 20 08:28:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 20 08:28:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 20 09:23:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 20 09:23:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 20 09:26:06 ntp: start NTP update
- Feb 20 14:55:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 20 14:55:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 20 18:23:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 20 18:23:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 20 19:15:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 20 19:15:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 20 19:57:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 20 19:57:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 20 20:28:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 20 20:28:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 20 20:49:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 20 20:49:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 20 21:01:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 20 21:01:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 20 21:26:03 ntp: start NTP update
- Feb 21 02:10:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 21 02:10:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 21 03:58:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 21 03:58:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 21 05:25:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 21 05:25:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 21 05:37:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 21 05:37:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 21 06:14:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 21 06:14:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 21 07:23:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 21 07:23:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 21 08:28:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 21 08:28:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 21 09:26:01 ntp: start NTP update
- Feb 21 13:10:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 21 13:10:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 21 16:44:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 21 16:44:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 21 16:55:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 21 16:55:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 21 17:16:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 21 17:16:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 21 18:14:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 21 18:14:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 21 20:28:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 21 20:28:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 21 20:36:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 21 20:36:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 21 21:25:59 ntp: start NTP update
- Feb 22 00:01:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 22 00:01:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 22 03:23:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 22 03:23:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 22 04:26:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 22 04:26:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 22 05:19:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 22 05:19:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 22 08:28:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 22 08:28:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 22 08:36:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 22 08:36:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 22 09:25:57 ntp: start NTP update
- Feb 22 11:14:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 22 11:14:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 22 14:49:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 22 14:49:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 22 16:50:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 22 16:50:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 22 16:59:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 22 16:59:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 22 19:51:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 22 19:51:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 22 20:28:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 22 20:28:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 22 21:25:55 ntp: start NTP update
- Feb 22 22:16:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 22 22:16:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 23 01:21:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 23 01:21:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 23 03:58:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 23 03:58:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 23 04:21:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 23 04:21:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 23 06:52:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 23 06:52:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 23 08:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 23 08:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 23 08:55:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 23 08:55:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 23 09:25:53 ntp: start NTP update
- Feb 23 12:27:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 23 12:27:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 23 13:57:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 23 13:57:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 23 15:12:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 23 15:12:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 23 17:58:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 23 17:58:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 23 20:03:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 23 20:03:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 23 20:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 23 20:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 23 21:25:51 ntp: start NTP update
- Feb 23 23:25:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 23 23:25:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 24 01:28:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 24 01:28:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 24 02:13:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 24 02:13:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 24 05:00:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 24 05:00:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 24 05:34:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Feb 24 05:34:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Feb 24 07:05:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 24 07:05:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 24 08:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 24 08:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 24 09:25:49 ntp: start NTP update
- Feb 24 10:32:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 24 10:32:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 24 13:17:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 24 13:17:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 24 16:31:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 24 16:31:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 24 16:36:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 24 16:36:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 24 17:41:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 24 17:41:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 24 18:17:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 24 18:17:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 24 18:30:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 24 18:30:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 24 18:54:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 24 18:54:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 24 20:28:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 24 20:28:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 24 21:25:47 ntp: start NTP update
- Feb 24 21:30:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 24 21:30:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 25 00:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 25 00:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 25 03:45:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 25 03:45:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 25 04:59:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 25 04:59:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 25 05:21:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 25 05:21:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 25 08:01:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 25 08:01:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 25 08:28:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 25 08:28:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 25 09:25:45 ntp: start NTP update
- Feb 25 11:02:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 25 11:02:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
- Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
- Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 25 14:26:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 25 14:26:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 25 15:48:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 25 15:48:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 25 17:39:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 25 17:39:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 25 18:42:36 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
- Feb 25 18:42:36 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
- Feb 25 19:11:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 25 19:11:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 25 19:24:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 25 19:24:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 19:24:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 19:24:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 25 19:50:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 25 19:50:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 25 19:51:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 25 19:51:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 25 20:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 25 20:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 25 21:25:43 ntp: start NTP update
- Feb 25 22:02:46 miniupnpd[1195]: remove port mapping 1865 TCP because it has expired
- Feb 25 22:02:46 miniupnpd[1195]: remove port mapping 1865 UDP because it has expired
- Feb 25 22:11:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 25 22:11:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 26 01:34:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 26 01:34:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 26 02:27:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 26 02:27:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 26 02:28:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 26 02:28:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 26 03:02:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 26 03:02:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 26 06:09:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 26 06:09:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 26 08:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 26 08:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 26 08:49:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 26 08:49:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 26 09:25:41 ntp: start NTP update
- Feb 26 12:37:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 26 12:37:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 26 13:43:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 26 13:43:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 26 15:25:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 26 15:25:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 26 15:26:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 26 15:26:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 26 15:29:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 26 15:29:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 26 16:59:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 26 16:59:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 26 18:05:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 26 18:05:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 26 18:21:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 26 18:21:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 26 19:59:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 26 19:59:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 26 20:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 26 20:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 26 21:25:39 ntp: start NTP update
- Feb 26 23:38:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 26 23:38:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 27 00:39:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 27 00:39:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 27 03:48:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 27 03:48:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 27 05:52:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 27 05:52:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 27 06:39:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 27 06:39:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 27 08:07:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 08:07:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 27 08:28:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 27 08:28:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 27 09:22:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 09:22:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 09:25:37 ntp: start NTP update
- Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 27 10:48:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 27 10:48:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 27 11:49:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 27 11:49:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 27 14:02:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 27 14:02:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 27 14:02:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 27 14:02:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 27 14:53:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 27 14:53:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 27 16:30:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 16:30:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 16:52:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 16:52:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 16:53:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 16:53:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 17:49:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 27 17:49:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 27 20:28:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 27 20:28:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 27 20:38:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 20:38:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 27 21:25:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 27 21:25:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 27 21:25:35 ntp: start NTP update
- Feb 27 21:46:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 27 21:46:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 27 22:45:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 27 22:45:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 28 01:34:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 01:34:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 28 02:04:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 28 02:04:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 28 04:44:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 28 04:44:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 28 08:11:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 28 08:11:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 28 08:25:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 28 08:25:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 28 08:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 28 08:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 28 08:32:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 08:32:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 28 09:25:33 ntp: start NTP update
- Feb 28 09:36:00 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
- Feb 28 09:36:00 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
- Feb 28 09:37:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 28 09:37:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 28 09:50:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Feb 28 09:50:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Feb 28 09:56:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 28 09:56:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Feb 28 13:05:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Feb 28 13:05:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Feb 28 13:17:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 28 13:17:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
- Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:5f:bb:23
- Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:5f:bb:23
- Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 13:51:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Feb 28 13:51:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Feb 28 13:55:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
- Feb 28 13:55:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
- Feb 28 15:30:19 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
- Feb 28 15:30:19 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
- Feb 28 15:41:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 28 15:41:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Feb 28 16:03:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 16:03:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 16:30:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 16:30:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 16:46:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 16:46:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Feb 28 17:22:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Feb 28 17:22:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Feb 28 19:33:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Feb 28 19:33:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Feb 28 20:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Feb 28 20:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Feb 28 20:33:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Feb 28 20:33:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Feb 28 21:25:31 ntp: start NTP update
- Mar 1 00:12:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 1 00:12:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 1 00:50:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 1 00:50:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 1 02:13:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 1 02:13:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 1 04:53:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 1 04:53:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Mar 1 06:10:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Mar 1 06:10:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Mar 1 06:35:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 1 06:35:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 1 06:37:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 1 06:37:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 1 07:42:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 1 07:42:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 1 08:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 1 08:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 1 09:25:29 ntp: start NTP update
- Mar 1 09:32:37 miniupnpd[1195]: remove port mapping 46508 TCP because it has expired
- Mar 1 09:32:37 miniupnpd[1195]: remove port mapping 46508 UDP because it has expired
- Mar 1 11:07:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 1 11:07:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 1 12:55:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 1 12:55:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 1 16:43:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 1 16:43:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 1 17:42:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 1 17:42:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 1 18:33:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 1 18:33:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 1 18:51:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 1 18:51:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 1 20:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 1 20:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 1 21:25:27 ntp: start NTP update
- Mar 1 21:47:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 1 21:47:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 1 23:50:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 1 23:50:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 2 04:14:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 2 04:14:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 2 04:17:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 2 04:17:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 2 06:04:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 2 06:04:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 2 06:06:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 2 06:06:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
- Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
- Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
- Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 2 08:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 2 08:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 2 08:31:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 08:31:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 2 08:31:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 08:31:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
- Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
- Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
- Mar 2 08:53:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 2 08:53:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 2 09:25:24 ntp: start NTP update
- Mar 2 10:50:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 2 10:50:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 2 14:20:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 14:20:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 2 15:02:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 2 15:02:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 2 16:56:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 2 16:56:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 2 17:17:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 2 17:17:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 2 17:35:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 2 17:35:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 2 18:49:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 2 18:49:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 2 19:43:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 2 19:43:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 2 21:25:23 ntp: start NTP update
- Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 2 21:42:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 2 21:42:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 3 02:14:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 3 02:14:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 3 04:02:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 3 04:02:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 3 05:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 3 05:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 3 06:20:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 3 06:20:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 3 06:40:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 3 06:40:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 3 07:06:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 3 07:06:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 3 08:14:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 3 08:14:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 3 09:25:21 ntp: start NTP update
- Mar 3 12:36:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 3 12:36:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 3 13:14:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 3 13:14:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 3 14:55:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 3 14:55:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 3 17:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 3 17:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 3 17:40:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 3 17:40:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 3 19:20:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 3 19:20:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 3 21:25:19 ntp: start NTP update
- Mar 3 23:56:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 3 23:56:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 4 00:07:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 4 00:07:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 4 02:03:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 4 02:03:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 4 03:58:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 03:58:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 4 04:35:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 4 04:35:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 4 05:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 4 05:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 4 06:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 4 06:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 4 09:25:17 ntp: start NTP update
- Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 4 11:00:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 4 11:00:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 4 12:23:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 4 12:23:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Mar 4 13:06:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 4 13:06:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 4 15:46:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 4 15:46:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 4 17:05:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 4 17:05:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 4 17:09:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 4 17:09:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 4 17:48:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 4 17:48:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 4 18:16:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 4 18:16:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 4 19:18:39 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
- Mar 4 19:18:39 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
- Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 4 21:25:15 ntp: start NTP update
- Mar 4 21:54:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 4 21:54:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 4 23:54:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 4 23:54:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 4 23:54:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 4 23:54:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 5 00:49:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 5 00:49:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 5 02:55:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 5 02:55:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 5 03:54:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 5 03:54:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 5 07:09:39 openvpn[1193]: [29bcd4910986d3292bd023417f90d95e] Inactivity timeout (--ping-restart), restarting
- Mar 5 07:09:39 openvpn[1193]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 5 07:09:39 openvpn[1193]: Restart pause, 5 second(s)
- Mar 5 07:09:44 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 5 07:09:44 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.188.197:1197
- Mar 5 07:09:44 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 5 07:09:44 openvpn[1193]: UDP link local: (not bound)
- Mar 5 07:09:44 openvpn[1193]: UDP link remote: [AF_INET]46.166.188.197:1197
- Mar 5 07:10:44 openvpn[1193]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Mar 5 07:10:44 openvpn[1193]: TLS Error: TLS handshake failed
- Mar 5 07:10:44 openvpn[1193]: SIGUSR1[soft,tls-error] received, process restarting
- Mar 5 07:10:44 openvpn[1193]: Restart pause, 5 second(s)
- Mar 5 07:10:49 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 5 07:10:49 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.154.192:1197
- Mar 5 07:10:49 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 5 07:10:49 openvpn[1193]: UDP link local: (not bound)
- Mar 5 07:10:49 openvpn[1193]: UDP link remote: [AF_INET]109.201.154.192:1197
- Mar 5 07:10:49 openvpn[1193]: TLS: Initial packet from [AF_INET]109.201.154.192:1197, sid=eec874a6 cbc685c3
- Mar 5 07:10:50 openvpn[1193]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 5 07:10:50 openvpn[1193]: VERIFY OK: nsCertType=SERVER
- Mar 5 07:10:50 openvpn[1193]: Validating certificate key usage
- Mar 5 07:10:50 openvpn[1193]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 5 07:10:50 openvpn[1193]: VERIFY KU OK
- Mar 5 07:10:50 openvpn[1193]: Validating certificate extended key usage
- Mar 5 07:10:50 openvpn[1193]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 5 07:10:50 openvpn[1193]: VERIFY EKU OK
- Mar 5 07:10:50 openvpn[1193]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=14162b986ea31b50fccaa9bd5e3c8e87, name=14162b986ea31b50fccaa9bd5e3c8e87
- Mar 5 07:10:53 openvpn[1193]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 5 07:10:53 openvpn[1193]: [14162b986ea31b50fccaa9bd5e3c8e87] Peer Connection Initiated with [AF_INET]109.201.154.192:1197
- Mar 5 07:10:54 openvpn[1193]: SENT CONTROL [14162b986ea31b50fccaa9bd5e3c8e87]: 'PUSH_REQUEST' (status=1)
- Mar 5 07:10:55 openvpn[1193]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.16.10.1,topology net30,ifconfig 10.16.10.6 10.16.10.5'
- Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: compression parms modified
- Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: route options modified
- Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 5 07:10:55 openvpn[1193]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 07:10:55 openvpn[1193]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 07:10:55 openvpn[1193]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 07:10:55 openvpn[1193]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 07:10:55 openvpn[1193]: Preserving previous TUN/TAP instance: tun11
- Mar 5 07:10:55 openvpn[1193]: Initialization Sequence Completed
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
- Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
- Mar 5 09:05:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
- Mar 5 09:05:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
- Mar 5 09:09:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 5 09:09:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 5 09:25:13 ntp: start NTP update
- Mar 5 11:41:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
- Mar 5 11:41:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
- Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
- Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
- Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
- Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
- Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
- Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
- Mar 5 12:54:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
- Mar 5 12:54:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
- Mar 5 13:51:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
- Mar 5 13:51:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
- Mar 5 14:07:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
- Mar 5 14:07:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
- Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
- Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
- Mar 5 14:52:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 5 14:52:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
- Mar 5 16:41:56 rc_service: httpd 456:notify_rc stop_vpnclient1
- Mar 5 16:41:56 openvpn[1193]: event_wait : Interrupted system call (code=4)
- Mar 5 16:41:56 openvpn[1193]: vpnrouting.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
- Mar 5 16:41:56 openvpn-routing: Configuring policy rules for client 1
- Mar 5 16:41:57 openvpn-routing: Removing rule 10001 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10002 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10003 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10004 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10005 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10006 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10007 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10008 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10009 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10010 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10011 from routing policy
- Mar 5 16:41:57 openvpn-routing: Removing rule 10101 from routing policy
- Mar 5 16:41:58 openvpn-routing: Removing rule 10102 from routing policy
- Mar 5 16:41:58 openvpn-routing: Removing rule 10103 from routing policy
- Mar 5 16:41:58 openvpn-routing: Removing rule 10104 from routing policy
- Mar 5 16:41:58 openvpn-routing: Flushing client routing table
- Mar 5 16:41:58 openvpn-routing: Completed routing policy configuration for client 1
- Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 10.27.10.1/32
- Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 46.166.188.197/32
- Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 0.0.0.0/1
- Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 128.0.0.0/1
- Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:41:58 openvpn[1193]: Closing TUN/TAP interface
- Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip addr del dev tun11 local 10.27.10.6 peer 10.27.10.5
- Mar 5 16:41:58 openvpn[1193]: updown.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
- Mar 5 16:41:59 rc_service: service 18319:notify_rc updateresolv
- Mar 5 16:41:59 rc_service: waitting "stop_vpnclient1" via httpd ...
- Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts - 5 addresses
- Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Mar 5 16:42:09 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53
- Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts - 5 addresses
- Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Mar 5 16:42:09 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53
- Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53
- Mar 5 16:42:16 rc_service: httpd 456:notify_rc start_vpnclient1
- Mar 5 16:42:19 openvpn[18357]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Mar 5 16:42:19 openvpn[18357]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Mar 5 16:42:19 openvpn[18358]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 5 16:42:19 openvpn[18358]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.163:1197
- Mar 5 16:42:19 openvpn[18358]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 5 16:42:19 openvpn[18358]: UDP link local: (not bound)
- Mar 5 16:42:19 openvpn[18358]: UDP link remote: [AF_INET]46.166.138.163:1197
- Mar 5 16:42:19 openvpn[18358]: TLS: Initial packet from [AF_INET]46.166.138.163:1197, sid=10a77258 df37d728
- Mar 5 16:42:20 openvpn[18358]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 5 16:42:20 openvpn[18358]: VERIFY OK: nsCertType=SERVER
- Mar 5 16:42:20 openvpn[18358]: Validating certificate key usage
- Mar 5 16:42:20 openvpn[18358]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 5 16:42:20 openvpn[18358]: VERIFY KU OK
- Mar 5 16:42:20 openvpn[18358]: Validating certificate extended key usage
- Mar 5 16:42:20 openvpn[18358]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 5 16:42:20 openvpn[18358]: VERIFY EKU OK
- Mar 5 16:42:20 openvpn[18358]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=5d9250ee5e356c71b846d7648cb82217, name=5d9250ee5e356c71b846d7648cb82217
- Mar 5 16:42:23 openvpn[18358]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 5 16:42:23 openvpn[18358]: [5d9250ee5e356c71b846d7648cb82217] Peer Connection Initiated with [AF_INET]46.166.138.163:1197
- Mar 5 16:42:24 openvpn[18358]: SENT CONTROL [5d9250ee5e356c71b846d7648cb82217]: 'PUSH_REQUEST' (status=1)
- Mar 5 16:42:24 openvpn[18358]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.18.10.1,topology net30,ifconfig 10.18.10.6 10.18.10.5'
- Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: compression parms modified
- Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: route options modified
- Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 5 16:42:24 openvpn[18358]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 16:42:24 openvpn[18358]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 16:42:24 openvpn[18358]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 16:42:24 openvpn[18358]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 16:42:24 openvpn[18358]: TUN/TAP device tun11 opened
- Mar 5 16:42:24 openvpn[18358]: TUN/TAP TX queue length set to 100
- Mar 5 16:42:24 openvpn[18358]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mar 5 16:42:24 openvpn[18358]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Mar 5 16:42:25 openvpn[18358]: /usr/sbin/ip addr add dev tun11 local 10.18.10.6 peer 10.18.10.5
- Mar 5 16:42:25 openvpn[18358]: updown.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
- Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Mar 5 16:42:26 rc_service: service 18529:notify_rc updateresolv
- Mar 5 16:42:26 dnsmasq[450]: read /etc/hosts - 5 addresses
- Mar 5 16:42:26 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
- Mar 5 16:42:26 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
- Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
- Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
- Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.1#53
- Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.33#53
- Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 46.166.138.163/32 via 60.226.64.1
- Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 0.0.0.0/1 via 10.18.10.5
- Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 128.0.0.0/1 via 10.18.10.5
- Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 10.18.10.1/32 via 10.18.10.5
- Mar 5 16:42:29 openvpn-routing: Configuring policy rules for client 1
- Mar 5 16:42:29 openvpn-routing: Creating VPN routing table
- Mar 5 16:42:29 openvpn-routing: Removing route for 10.18.10.1 to tun11 from main routing table
- Mar 5 16:42:29 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Mar 5 16:42:29 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Mar 5 16:42:29 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Mar 5 16:42:31 openvpn-routing: Completed routing policy configuration for client 1
- Mar 5 16:42:31 openvpn[18358]: Initialization Sequence Completed
- Mar 5 16:51:43 rc_service: httpd 456:notify_rc restart_net
- Mar 5 16:51:46 dropbear[435]: Early exit: Terminated by signal
- Mar 5 16:51:46 dnsmasq[450]: exiting on receipt of SIGTERM
- Mar 5 16:51:46 miniupnpd[1195]: shutting down MiniUPnPd
- Mar 5 16:51:48 kernel: Attempt to kill tasklet from interrupt
- Mar 5 16:51:48 kernel: device eth0 left promiscuous mode
- Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:51:48 kernel: device eth0 entered promiscuous mode
- Mar 5 16:51:48 kernel: br0: topology change detected, propagating
- Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:51:50 openvpn[1149]: event_wait : Interrupted system call (code=4)
- Mar 5 16:51:50 openvpn[1149]: Closing TUN/TAP interface
- Mar 5 16:51:50 openvpn[1149]: /usr/sbin/ip addr del dev tun21 10.8.0.1/24
- Mar 5 16:51:50 openvpn[1149]: SIGTERM[hard,] received, process exiting
- Mar 5 16:51:52 openvpn[18358]: write UDP: Network is unreachable (code=101)
- Mar 5 16:51:52 openvpn[18358]: event_wait : Interrupted system call (code=4)
- Mar 5 16:51:52 openvpn[18358]: vpnrouting.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
- Mar 5 16:51:52 openvpn-routing: Configuring policy rules for client 1
- Mar 5 16:51:52 openvpn-routing: Removing rule 10001 from routing policy
- Mar 5 16:51:52 openvpn-routing: Removing rule 10002 from routing policy
- Mar 5 16:51:52 openvpn-routing: Removing rule 10003 from routing policy
- Mar 5 16:51:52 openvpn-routing: Removing rule 10004 from routing policy
- Mar 5 16:51:52 openvpn-routing: Removing rule 10005 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10006 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10007 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10008 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10009 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10010 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10011 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10101 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10102 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10103 from routing policy
- Mar 5 16:51:53 openvpn-routing: Removing rule 10104 from routing policy
- Mar 5 16:51:53 openvpn-routing: Flushing client routing table
- Mar 5 16:51:53 openvpn-routing: Completed routing policy configuration for client 1
- Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 10.18.10.1/32
- Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 46.166.138.163/32
- Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 0.0.0.0/1
- Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 128.0.0.0/1
- Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 5 16:51:53 openvpn[18358]: Closing TUN/TAP interface
- Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip addr del dev tun11 local 10.18.10.6 peer 10.18.10.5
- Mar 5 16:51:53 openvpn[18358]: updown.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
- Mar 5 16:51:53 rc_service: service 18995:notify_rc updateresolv
- Mar 5 16:51:53 rc_service: waitting "restart_net" via ...
- Mar 5 16:51:57 watchdog: restart httpd
- Mar 5 16:51:57 rc_service: watchdog 461:notify_rc stop_httpd
- Mar 5 16:51:57 rc_service: waitting "restart_net" via ...
- Mar 5 16:52:00 WAN Connection: ISP's DHCP did not function properly.
- Mar 5 16:52:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Mar 5 16:52:03 kernel: br0: port 3(eth2) entering forwarding state
- Mar 5 16:52:03 kernel: br0: port 2(eth1) entering forwarding state
- Mar 5 16:52:03 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:52:03 kernel: device eth0 left promiscuous mode
- Mar 5 16:52:03 kernel: device vlan1 left promiscuous mode
- Mar 5 16:52:03 kernel: br0: port 1(vlan1) entering disabled state
- Mar 5 16:52:03 kernel: device eth1 left promiscuous mode
- Mar 5 16:52:03 kernel: br0: port 2(eth1) entering disabled state
- Mar 5 16:52:03 kernel: device eth2 left promiscuous mode
- Mar 5 16:52:03 kernel: br0: port 3(eth2) entering disabled state
- Mar 5 16:52:05 kernel: wl_module_init: passivemode set to 0x0
- Mar 5 16:52:05 kernel: wl_module_init: igs set to 0x0
- Mar 5 16:52:05 kernel: wl_module_init: txworkq set to 0x0
- Mar 5 16:52:05 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Mar 5 16:52:05 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Mar 5 16:52:05 kernel: device vlan1 entered promiscuous mode
- Mar 5 16:52:05 kernel: device eth0 entered promiscuous mode
- Mar 5 16:52:06 kernel: device eth1 entered promiscuous mode
- Mar 5 16:52:06 kernel: device eth2 entered promiscuous mode
- Mar 5 16:52:06 kernel: br0: topology change detected, propagating
- Mar 5 16:52:06 kernel: br0: port 3(eth2) entering forwarding state
- Mar 5 16:52:06 kernel: br0: port 3(eth2) entering forwarding state
- Mar 5 16:52:06 kernel: br0: topology change detected, propagating
- Mar 5 16:52:06 kernel: br0: port 2(eth1) entering forwarding state
- Mar 5 16:52:06 kernel: br0: port 2(eth1) entering forwarding state
- Mar 5 16:52:06 kernel: br0: topology change detected, propagating
- Mar 5 16:52:06 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:52:06 kernel: br0: port 1(vlan1) entering forwarding state
- Mar 5 16:52:06 kernel: ADDRCONF(NETDEV_UP): ifb0: link is not ready
- Mar 5 16:52:06 kernel: ADDRCONF(NETDEV_UP): ifb1: link is not ready
- Mar 5 16:52:06 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
- Mar 5 16:52:06 WAN Connection: ISP's DHCP did not function properly.
- Mar 5 16:52:06 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
- Mar 5 16:52:06 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
- Mar 5 16:52:07 rc_service: udhcpc 19137:notify_rc start_firewall
- Mar 5 16:52:07 rc_service: waitting "restart_net" via ...
- Mar 5 16:52:09 RT-AC68U: start httpd
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 1866 -> 10.1.1.37:1865 protocol UDP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 17246 -> 10.1.1.37:17246 protocol UDP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 17246 -> 10.1.1.37:17246 protocol TCP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 20806 -> 10.1.1.145:20806 protocol UDP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 20806 -> 10.1.1.145:20806 protocol TCP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 16187 -> 10.1.1.6:16187 protocol TCP
- Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
- Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 16187 -> 10.1.1.6:16187 protocol UDP
- Mar 5 16:52:10 miniupnpd[19149]: HTTP listening on port 52406
- Mar 5 16:52:10 miniupnpd[19149]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 5 16:52:10 dropbear[19152]: Running in background
- Mar 5 16:52:12 miniupnpd[19149]: shutting down MiniUPnPd
- Mar 5 16:52:12 wan: finish adding multi routes
- Mar 5 16:52:12 rc_service: udhcpc 19137:notify_rc stop_upnp
- Mar 5 16:52:12 rc_service: waitting "start_firewall" via udhcpc ...
- Mar 5 16:52:13 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Mar 5 16:52:14 rc_service: watchdog 461:notify_rc start_httpd
- Mar 5 16:52:14 rc_service: waitting "stop_httpd" via watchdog ...
- Mar 5 16:52:14 miniupnpd[19234]: HTTP listening on port 58199
- Mar 5 16:52:14 miniupnpd[19234]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 5 16:52:14 rc_service: udhcpc 19137:notify_rc start_upnp
- Mar 5 16:52:14 rc_service: waitting "stop_upnp" via udhcpc ...
- Mar 5 16:52:14 miniupnpd[19234]: shutting down MiniUPnPd
- Mar 5 16:52:15 RT-AC68U: start httpd
- Mar 5 16:52:16 WAN Connection: WAN was restored.
- Mar 5 16:52:17 ddns update: ez-ipupdate: starting...
- Mar 5 16:52:17 miniupnpd[19243]: HTTP listening on port 58548
- Mar 5 16:52:17 miniupnpd[19243]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 5 16:52:18 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
- Mar 5 16:52:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 05 Mar 2017 06:52:17 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
- Mar 5 16:52:18 ddns update: retval= 0, ddns_return_code (,200)
- Mar 5 16:52:18 ddns update: asusddns_update: 0
- Mar 5 16:52:19 ddns: ddns update ok
- Mar 5 16:52:19 ntp: start NTP update
- Mar 5 16:52:19 rc_service: udhcpc 19137:notify_rc start_vpnserver1
- Mar 5 16:52:20 kernel: tun: Universal TUN/TAP device driver, 1.6
- Mar 5 16:52:20 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Mar 5 16:52:20 openvpn-routing: Refreshing policy rules for client 1
- Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
- Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 2
- Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
- Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 3
- Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
- Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 4
- Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
- Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 5
- Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
- Mar 5 16:52:21 rc_service: udhcpc 19137:notify_rc start_vpnclient1
- Mar 5 16:52:21 rc_service: waitting "start_vpnserver1" via udhcpc ...
- Mar 5 16:52:22 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
- Mar 5 16:52:22 kernel: device tun21 entered promiscuous mode
- Mar 5 16:52:23 openvpn[19376]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Mar 5 16:52:23 openvpn[19376]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Mar 5 16:52:23 openvpn[19377]: Diffie-Hellman initialized with 2048 bit key
- Mar 5 16:52:23 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
- Mar 5 16:52:23 openvpn[19377]: TUN/TAP device tun21 opened
- Mar 5 16:52:23 openvpn[19377]: TUN/TAP TX queue length set to 100
- Mar 5 16:52:23 openvpn[19377]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mar 5 16:52:23 openvpn[19377]: /usr/sbin/ip link set dev tun21 up mtu 1500
- Mar 5 16:52:23 openvpn[19377]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
- Mar 5 16:52:23 openvpn[19377]: Could not determine IPv4/IPv6 protocol. Using AF_INET6
- Mar 5 16:52:23 openvpn[19377]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 5 16:52:23 openvpn[19377]: setsockopt(IPV6_V6ONLY=0)
- Mar 5 16:52:23 openvpn[19377]: UDPv6 link local (bound): [AF_INET6][undef]:1194
- Mar 5 16:52:23 openvpn[19377]: UDPv6 link remote: [AF_UNSPEC]
- Mar 5 16:52:23 openvpn[19377]: MULTI: multi_init called, r=256 v=256
- Mar 5 16:52:23 openvpn[19377]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Mar 5 16:52:23 openvpn[19377]: Initialization Sequence Completed
- Mar 5 16:52:25 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Mar 5 16:52:25 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Mar 5 16:52:25 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 3600 seconds.
- Mar 5 16:52:27 openvpn[19420]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Mar 5 16:52:27 openvpn[19420]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Mar 5 16:52:27 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 5 16:52:27 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
- Mar 5 16:52:27 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 5 16:52:27 openvpn[19421]: UDP link local: (not bound)
- Mar 5 16:52:27 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
- Mar 5 16:52:27 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=2daa738f 93fa0ae1
- Mar 5 16:52:28 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 5 16:52:28 openvpn[19421]: VERIFY OK: nsCertType=SERVER
- Mar 5 16:52:28 openvpn[19421]: Validating certificate key usage
- Mar 5 16:52:28 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 5 16:52:28 openvpn[19421]: VERIFY KU OK
- Mar 5 16:52:28 openvpn[19421]: Validating certificate extended key usage
- Mar 5 16:52:28 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 5 16:52:28 openvpn[19421]: VERIFY EKU OK
- Mar 5 16:52:28 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
- Mar 5 16:52:31 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 5 16:52:31 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
- Mar 5 16:52:32 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
- Mar 5 16:52:32 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.39.10.1,topology net30,ifconfig 10.39.10.6 10.39.10.5'
- Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: compression parms modified
- Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: route options modified
- Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 5 16:52:32 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 16:52:32 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 16:52:32 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 5 16:52:32 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 5 16:52:32 openvpn[19421]: TUN/TAP device tun11 opened
- Mar 5 16:52:32 openvpn[19421]: TUN/TAP TX queue length set to 100
- Mar 5 16:52:32 openvpn[19421]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mar 5 16:52:32 openvpn[19421]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Mar 5 16:52:33 openvpn[19421]: /usr/sbin/ip addr add dev tun11 local 10.39.10.6 peer 10.39.10.5
- Mar 5 16:52:33 openvpn[19421]: updown.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
- Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Mar 5 16:52:34 rc_service: service 19592:notify_rc updateresolv
- Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 46.166.138.136/32 via 60.226.64.1
- Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 0.0.0.0/1 via 10.39.10.5
- Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 128.0.0.0/1 via 10.39.10.5
- Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 10.39.10.1/32 via 10.39.10.5
- Mar 5 16:52:37 openvpn-routing: Configuring policy rules for client 1
- Mar 5 16:52:37 openvpn-routing: Creating VPN routing table
- Mar 5 16:52:37 openvpn-routing: Removing route for 10.39.10.1 to tun11 from main routing table
- Mar 5 16:52:37 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Mar 5 16:52:37 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Mar 5 16:52:37 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Mar 5 16:52:38 openvpn-routing: Completed routing policy configuration for client 1
- Mar 5 16:52:38 openvpn[19421]: Initialization Sequence Completed
- Mar 5 17:01:15 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Mar 5 17:01:16 kernel: IDPfw: TrendMicro forward module ver-1.0.34
- Mar 5 17:01:16 kernel: IDPfw: Apply module param dev_wan=eth0
- Mar 5 17:01:16 kernel: IDPfw: Apply module param sess_num=30000
- Mar 5 17:01:16 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
- Mar 5 17:01:16 kernel: IDPfw: IDPfw is ready
- Mar 5 17:01:16 kernel: sizeof forward param = 160
- Mar 5 17:01:16 signature: rollback signature from /usr/bwdpi/
- Mar 5 17:01:30 kernel: mod epilog takes 0 jiffies
- Mar 5 17:01:30 kernel: IDPfw: Exit IDPfw
- Mar 5 17:01:30 kernel: Stop the IPS/AppID engine...
- Mar 5 17:01:30 kernel: IDPfw: Exit chrdev /dev/idpfw with major 191
- Mar 5 17:01:31 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Mar 5 17:01:31 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Mar 5 17:01:31 rc_service: bwdpi_check 487:notify_rc start_firewall
- Mar 5 17:01:31 miniupnpd[19243]: shutting down MiniUPnPd
- Mar 5 17:01:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Mar 5 17:01:33 miniupnpd[20102]: HTTP listening on port 51578
- Mar 5 17:01:33 miniupnpd[20102]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 5 18:07:12 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
- Mar 5 18:07:12 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
- Mar 6 04:52:17 ntp: start NTP update
- Mar 6 12:32:29 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 6 14:31:53 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 6 15:21:53 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 6 16:51:55 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 6 16:52:15 ntp: start NTP update
- Mar 6 18:40:58 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 6 21:52:37 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
- Mar 6 21:52:37 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
- Mar 7 04:52:13 ntp: start NTP update
- Mar 7 12:41:15 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 7 13:14:18 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 7 14:17:20 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 7 14:40:21 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 7 16:23:41 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
- Mar 7 16:23:41 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
- Mar 7 16:52:11 ntp: start NTP update
- Mar 7 17:55:27 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
- Mar 7 17:55:27 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 7 17:55:27 openvpn[19421]: Restart pause, 5 second(s)
- Mar 7 17:55:32 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 7 17:55:32 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
- Mar 7 17:55:32 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 7 17:55:32 openvpn[19421]: UDP link local: (not bound)
- Mar 7 17:55:32 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
- Mar 7 17:55:32 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=3eed74f8 02c8a082
- Mar 7 17:55:32 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 7 17:55:32 openvpn[19421]: VERIFY OK: nsCertType=SERVER
- Mar 7 17:55:32 openvpn[19421]: Validating certificate key usage
- Mar 7 17:55:32 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 7 17:55:32 openvpn[19421]: VERIFY KU OK
- Mar 7 17:55:32 openvpn[19421]: Validating certificate extended key usage
- Mar 7 17:55:32 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 7 17:55:32 openvpn[19421]: VERIFY EKU OK
- Mar 7 17:55:32 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
- Mar 7 17:55:35 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 7 17:55:35 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
- Mar 7 17:55:36 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
- Mar 7 17:55:36 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.9.10.1,topology net30,ifconfig 10.9.10.6 10.9.10.5'
- Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: compression parms modified
- Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: route options modified
- Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 7 17:55:36 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 7 17:55:36 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 7 17:55:36 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 7 17:55:36 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 7 17:55:36 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
- Mar 7 17:55:36 openvpn[19421]: Initialization Sequence Completed
- Mar 7 20:01:45 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
- Mar 7 20:01:45 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
- Mar 7 20:02:25 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 01:57:22 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
- Mar 8 01:57:22 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 8 01:57:22 openvpn[19421]: Restart pause, 5 second(s)
- Mar 8 01:57:27 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 8 01:57:27 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
- Mar 8 01:57:27 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 8 01:57:27 openvpn[19421]: UDP link local: (not bound)
- Mar 8 01:57:27 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
- Mar 8 01:57:28 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=cbff5ffc 591ad418
- Mar 8 01:57:28 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 8 01:57:28 openvpn[19421]: VERIFY OK: nsCertType=SERVER
- Mar 8 01:57:28 openvpn[19421]: Validating certificate key usage
- Mar 8 01:57:28 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 8 01:57:28 openvpn[19421]: VERIFY KU OK
- Mar 8 01:57:28 openvpn[19421]: Validating certificate extended key usage
- Mar 8 01:57:28 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 8 01:57:28 openvpn[19421]: VERIFY EKU OK
- Mar 8 01:57:28 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
- Mar 8 01:57:31 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 8 01:57:31 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
- Mar 8 01:57:32 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
- Mar 8 01:57:33 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.53.10.1,topology net30,ifconfig 10.53.10.6 10.53.10.5'
- Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: compression parms modified
- Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: route options modified
- Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 8 01:57:33 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 01:57:33 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 01:57:33 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 01:57:33 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 01:57:33 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
- Mar 8 01:57:33 openvpn[19421]: Initialization Sequence Completed
- Mar 8 04:52:09 ntp: start NTP update
- Mar 8 06:04:42 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 06:16:40 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 06:41:42 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 08:20:43 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 09:59:20 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
- Mar 8 09:59:20 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 8 09:59:20 openvpn[19421]: Restart pause, 5 second(s)
- Mar 8 09:59:25 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 8 09:59:25 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
- Mar 8 09:59:25 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 8 09:59:25 openvpn[19421]: UDP link local: (not bound)
- Mar 8 09:59:25 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
- Mar 8 09:59:25 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=370f0fac f6c82d6d
- Mar 8 09:59:26 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 8 09:59:26 openvpn[19421]: VERIFY OK: nsCertType=SERVER
- Mar 8 09:59:26 openvpn[19421]: Validating certificate key usage
- Mar 8 09:59:26 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 8 09:59:26 openvpn[19421]: VERIFY KU OK
- Mar 8 09:59:26 openvpn[19421]: Validating certificate extended key usage
- Mar 8 09:59:26 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 8 09:59:26 openvpn[19421]: VERIFY EKU OK
- Mar 8 09:59:26 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
- Mar 8 09:59:29 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 8 09:59:29 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
- Mar 8 09:59:30 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
- Mar 8 09:59:31 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.5.10.1,topology net30,ifconfig 10.5.10.6 10.5.10.5'
- Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: compression parms modified
- Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: route options modified
- Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 8 09:59:31 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 09:59:31 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 09:59:31 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 09:59:31 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 09:59:31 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
- Mar 8 09:59:31 openvpn[19421]: Initialization Sequence Completed
- Mar 8 10:21:43 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 12:03:44 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 13:36:51 miniupnpd[20102]: recv (state0): Connection reset by peer
- Mar 8 14:03:03 rc_service: httpd 19235:notify_rc stop_vpnclient1
- Mar 8 14:03:04 openvpn[19421]: event_wait : Interrupted system call (code=4)
- Mar 8 14:03:04 openvpn[19421]: vpnrouting.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
- Mar 8 14:03:04 openvpn-routing: Configuring policy rules for client 1
- Mar 8 14:03:04 openvpn-routing: Removing rule 10001 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10002 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10003 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10004 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10005 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10006 from routing policy
- Mar 8 14:03:04 openvpn-routing: Removing rule 10007 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10008 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10009 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10010 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10011 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10101 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10102 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10103 from routing policy
- Mar 8 14:03:05 openvpn-routing: Removing rule 10104 from routing policy
- Mar 8 14:03:05 openvpn-routing: Flushing client routing table
- Mar 8 14:03:05 openvpn-routing: Completed routing policy configuration for client 1
- Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 10.39.10.1/32
- Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 46.166.138.136/32
- Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 0.0.0.0/1
- Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 128.0.0.0/1
- Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
- Mar 8 14:03:05 openvpn[19421]: Closing TUN/TAP interface
- Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip addr del dev tun11 local 10.39.10.6 peer 10.39.10.5
- Mar 8 14:03:05 openvpn[19421]: updown.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
- Mar 8 14:03:06 rc_service: service 22193:notify_rc updateresolv
- Mar 8 14:03:06 rc_service: waitting "stop_vpnclient1" via httpd ...
- Mar 8 14:03:21 rc_service: httpd 19235:notify_rc start_vpnclient1
- Mar 8 14:03:24 openvpn[22232]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
- Mar 8 14:03:24 openvpn[22232]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
- Mar 8 14:03:24 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 8 14:03:24 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.226:1197
- Mar 8 14:03:24 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 8 14:03:24 openvpn[22233]: UDP link local: (not bound)
- Mar 8 14:03:24 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.226:1197
- Mar 8 14:03:25 openvpn[22233]: TLS: Initial packet from [AF_INET]109.201.152.226:1197, sid=8b2fc6ff 4d156737
- Mar 8 14:03:25 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 8 14:03:25 openvpn[22233]: VERIFY OK: nsCertType=SERVER
- Mar 8 14:03:25 openvpn[22233]: Validating certificate key usage
- Mar 8 14:03:25 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 8 14:03:25 openvpn[22233]: VERIFY KU OK
- Mar 8 14:03:25 openvpn[22233]: Validating certificate extended key usage
- Mar 8 14:03:25 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 8 14:03:25 openvpn[22233]: VERIFY EKU OK
- Mar 8 14:03:25 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=237dce7889fc9a964f36f065f7e6cd4e, name=237dce7889fc9a964f36f065f7e6cd4e
- Mar 8 14:03:29 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 8 14:03:29 openvpn[22233]: [237dce7889fc9a964f36f065f7e6cd4e] Peer Connection Initiated with [AF_INET]109.201.152.226:1197
- Mar 8 14:03:30 openvpn[22233]: SENT CONTROL [237dce7889fc9a964f36f065f7e6cd4e]: 'PUSH_REQUEST' (status=1)
- Mar 8 14:03:30 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.22.10.1,topology net30,ifconfig 10.22.10.6 10.22.10.5'
- Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: compression parms modified
- Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: route options modified
- Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 8 14:03:30 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 14:03:30 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 14:03:30 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 8 14:03:30 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 8 14:03:30 openvpn[22233]: TUN/TAP device tun11 opened
- Mar 8 14:03:30 openvpn[22233]: TUN/TAP TX queue length set to 100
- Mar 8 14:03:30 openvpn[22233]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mar 8 14:03:30 openvpn[22233]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Mar 8 14:03:30 openvpn[22233]: /usr/sbin/ip addr add dev tun11 local 10.22.10.6 peer 10.22.10.5
- Mar 8 14:03:30 openvpn[22233]: updown.sh tun11 1500 1570 10.22.10.6 10.22.10.5 init
- Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
- Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
- Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
- Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
- Mar 8 14:03:32 rc_service: service 22404:notify_rc updateresolv
- Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 109.201.152.226/32 via 60.226.64.1
- Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 0.0.0.0/1 via 10.22.10.5
- Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 128.0.0.0/1 via 10.22.10.5
- Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 10.22.10.1/32 via 10.22.10.5
- Mar 8 14:03:34 openvpn-routing: Configuring policy rules for client 1
- Mar 8 14:03:34 openvpn-routing: Creating VPN routing table
- Mar 8 14:03:35 openvpn-routing: Removing route for 10.22.10.1 to tun11 from main routing table
- Mar 8 14:03:35 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Mar 8 14:03:35 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
- Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
- Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
- Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
- Mar 8 14:03:35 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
- Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
- Mar 8 14:03:37 openvpn-routing: Completed routing policy configuration for client 1
- Mar 8 14:03:37 openvpn[22233]: Initialization Sequence Completed
- Mar 8 14:09:43 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Mar 8 14:09:45 kernel: IDPfw: TrendMicro forward module ver-1.0.34
- Mar 8 14:09:45 kernel: IDPfw: Apply module param dev_wan=eth0
- Mar 8 14:09:45 kernel: IDPfw: Apply module param sess_num=30000
- Mar 8 14:09:45 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
- Mar 8 14:09:45 kernel: IDPfw: IDPfw is ready
- Mar 8 14:09:45 kernel: sizeof forward param = 160
- Mar 8 14:09:55 kernel: mod epilog takes 0 jiffies
- Mar 8 14:09:55 kernel: IDPfw: Exit IDPfw
- Mar 8 14:09:55 kernel: Stop the IPS/AppID engine...
- Mar 8 14:09:56 kernel: IDPfw: Exit chrdev /dev/idpfw with major 191
- Mar 8 14:09:57 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Mar 8 14:09:57 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Mar 8 14:09:57 rc_service: bwdpi_check 487:notify_rc start_firewall
- Mar 8 14:09:58 miniupnpd[20102]: shutting down MiniUPnPd
- Mar 8 14:09:58 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Mar 8 14:10:00 miniupnpd[22926]: HTTP listening on port 55508
- Mar 8 14:10:00 miniupnpd[22926]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 8 14:10:04 miniupnpd[22926]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 14:10:44 rc_service: httpd 19235:notify_rc restart_qos;restart_firewall
- Mar 8 14:10:46 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
- Mar 8 14:10:46 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
- Mar 8 14:10:46 miniupnpd[22926]: shutting down MiniUPnPd
- Mar 8 14:10:47 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Mar 8 14:10:48 miniupnpd[23042]: HTTP listening on port 35042
- Mar 8 14:10:48 miniupnpd[23042]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 8 14:10:52 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 15:03:07 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
- Mar 8 15:03:07 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
- Mar 8 15:35:01 miniupnpd[23042]: remove port mapping 20807 TCP because it has expired
- Mar 8 15:35:01 miniupnpd[23042]: remove port mapping 20807 UDP because it has expired
- Mar 8 16:43:53 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 16:52:07 ntp: start NTP update
- Mar 8 17:35:02 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
- Mar 8 17:35:02 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
- Mar 8 18:38:57 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 19:16:57 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 8 19:58:33 miniupnpd[23042]: remove port mapping 46508 TCP because it has expired
- Mar 8 19:58:33 miniupnpd[23042]: remove port mapping 46508 UDP because it has expired
- Mar 8 20:32:01 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 04:52:05 ntp: start NTP update
- Mar 9 06:02:11 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 07:50:23 rc_service: httpd 19235:notify_rc start_webs_update
- Mar 9 08:23:13 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 09:36:15 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 09:50:17 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 16:52:03 ntp: start NTP update
- Mar 9 18:06:21 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 20:47:23 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 9 21:43:16 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
- Mar 9 21:43:16 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
- Mar 10 04:52:01 ntp: start NTP update
- Mar 10 07:37:39 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 10 09:25:41 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 10 16:52:01 ntp: start NTP update
- Mar 10 18:54:52 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 10 19:04:54 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 10 19:28:46 openvpn[22233]: [237dce7889fc9a964f36f065f7e6cd4e] Inactivity timeout (--ping-restart), restarting
- Mar 10 19:28:46 openvpn[22233]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 10 19:28:46 openvpn[22233]: Restart pause, 5 second(s)
- Mar 10 19:28:51 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 10 19:28:51 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.226:1197
- Mar 10 19:28:51 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 10 19:28:51 openvpn[22233]: UDP link local: (not bound)
- Mar 10 19:28:51 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.226:1197
- Mar 10 19:29:51 openvpn[22233]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Mar 10 19:29:51 openvpn[22233]: TLS Error: TLS handshake failed
- Mar 10 19:29:51 openvpn[22233]: SIGUSR1[soft,tls-error] received, process restarting
- Mar 10 19:29:51 openvpn[22233]: Restart pause, 5 second(s)
- Mar 10 19:29:56 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 10 19:29:56 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.190.208:1197
- Mar 10 19:29:56 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 10 19:29:56 openvpn[22233]: UDP link local: (not bound)
- Mar 10 19:29:56 openvpn[22233]: UDP link remote: [AF_INET]46.166.190.208:1197
- Mar 10 19:29:56 openvpn[22233]: TLS: Initial packet from [AF_INET]46.166.190.208:1197, sid=98c335d5 4d88aec8
- Mar 10 19:29:56 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 10 19:29:56 openvpn[22233]: VERIFY OK: nsCertType=SERVER
- Mar 10 19:29:56 openvpn[22233]: Validating certificate key usage
- Mar 10 19:29:56 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 10 19:29:56 openvpn[22233]: VERIFY KU OK
- Mar 10 19:29:56 openvpn[22233]: Validating certificate extended key usage
- Mar 10 19:29:56 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 10 19:29:56 openvpn[22233]: VERIFY EKU OK
- Mar 10 19:29:56 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=a86e3a7799a7e7d74534209194da9524, name=a86e3a7799a7e7d74534209194da9524
- Mar 10 19:29:59 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 10 19:29:59 openvpn[22233]: [a86e3a7799a7e7d74534209194da9524] Peer Connection Initiated with [AF_INET]46.166.190.208:1197
- Mar 10 19:30:00 openvpn[22233]: SENT CONTROL [a86e3a7799a7e7d74534209194da9524]: 'PUSH_REQUEST' (status=1)
- Mar 10 19:30:01 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.12.10.1,topology net30,ifconfig 10.12.10.6 10.12.10.5'
- Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: compression parms modified
- Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: route options modified
- Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 10 19:30:01 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 10 19:30:01 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 10 19:30:01 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 10 19:30:01 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 10 19:30:01 openvpn[22233]: Preserving previous TUN/TAP instance: tun11
- Mar 10 19:30:01 openvpn[22233]: Initialization Sequence Completed
- Mar 10 21:31:55 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 11 03:42:06 openvpn[22233]: [a86e3a7799a7e7d74534209194da9524] Inactivity timeout (--ping-restart), restarting
- Mar 11 03:42:06 openvpn[22233]: SIGUSR1[soft,ping-restart] received, process restarting
- Mar 11 03:42:06 openvpn[22233]: Restart pause, 5 second(s)
- Mar 11 03:42:11 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 11 03:42:11 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.190.208:1197
- Mar 11 03:42:11 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 11 03:42:11 openvpn[22233]: UDP link local: (not bound)
- Mar 11 03:42:11 openvpn[22233]: UDP link remote: [AF_INET]46.166.190.208:1197
- Mar 11 03:43:11 openvpn[22233]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Mar 11 03:43:11 openvpn[22233]: TLS Error: TLS handshake failed
- Mar 11 03:43:11 openvpn[22233]: SIGUSR1[soft,tls-error] received, process restarting
- Mar 11 03:43:11 openvpn[22233]: Restart pause, 5 second(s)
- Mar 11 03:43:16 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mar 11 03:43:16 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.245:1197
- Mar 11 03:43:16 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Mar 11 03:43:16 openvpn[22233]: UDP link local: (not bound)
- Mar 11 03:43:16 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.245:1197
- Mar 11 03:43:17 openvpn[22233]: TLS: Initial packet from [AF_INET]109.201.152.245:1197, sid=9f7b6c46 ebe6e914
- Mar 11 03:43:17 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Mar 11 03:43:17 openvpn[22233]: VERIFY OK: nsCertType=SERVER
- Mar 11 03:43:17 openvpn[22233]: Validating certificate key usage
- Mar 11 03:43:17 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
- Mar 11 03:43:17 openvpn[22233]: VERIFY KU OK
- Mar 11 03:43:17 openvpn[22233]: Validating certificate extended key usage
- Mar 11 03:43:17 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mar 11 03:43:17 openvpn[22233]: VERIFY EKU OK
- Mar 11 03:43:17 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=da4cf1fc7a5c33e9749fbd1ed3990382, name=da4cf1fc7a5c33e9749fbd1ed3990382
- Mar 11 03:43:20 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Mar 11 03:43:20 openvpn[22233]: [da4cf1fc7a5c33e9749fbd1ed3990382] Peer Connection Initiated with [AF_INET]109.201.152.245:1197
- Mar 11 03:43:22 openvpn[22233]: SENT CONTROL [da4cf1fc7a5c33e9749fbd1ed3990382]: 'PUSH_REQUEST' (status=1)
- Mar 11 03:43:22 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.32.10.1,topology net30,ifconfig 10.32.10.6 10.32.10.5'
- Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
- Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: compression parms modified
- Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
- Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: route options modified
- Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mar 11 03:43:22 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 11 03:43:22 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 11 03:43:22 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Mar 11 03:43:22 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mar 11 03:43:22 openvpn[22233]: Preserving previous TUN/TAP instance: tun11
- Mar 11 03:43:22 openvpn[22233]: Initialization Sequence Completed
- Mar 11 04:51:59 ntp: start NTP update
- Mar 11 06:04:08 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
- Mar 11 12:19:31 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement