Advertisement
Guest User

Untitled

a guest
Mar 10th, 2017
945
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 499.71 KB | None | 0 0
  1. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  2. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  3. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  5. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  6. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  7. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
  8. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  9. Jan 27 22:25:51 openvpn[1116]: 80.177.6.180:27937 [client] Peer Connection Initiated with [AF_INET]80.177.6.180:27937
  10. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  11. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI: Learn: 10.8.0.2 -> client/80.177.6.180:27937
  12. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 MULTI: primary virtual IP for client/80.177.6.180:27937: 10.8.0.2
  13. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 PUSH: Received control message: 'PUSH_REQUEST'
  14. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 send_push_reply(): safe_cap=940
  15. Jan 27 22:25:51 openvpn[1116]: client/80.177.6.180:27937 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0' (status=1)
  16. Jan 27 22:29:51 openvpn[1116]: client/80.177.6.180:27937 SIGTERM[soft,remote-exit] received, client-instance exiting
  17. Jan 28 00:10:14 openvpn[1168]: [7a7206daf2f1d123cfd08cdc98d2da2a] Inactivity timeout (--ping-restart), restarting
  18. Jan 28 00:10:14 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  19. Jan 28 00:10:14 openvpn[1168]: Restart pause, 2 second(s)
  20. Jan 28 00:10:16 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  21. Jan 28 00:10:16 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  22. Jan 28 00:10:16 openvpn[1168]: UDPv4 link local: [undef]
  23. Jan 28 00:10:16 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.228:1197
  24. Jan 28 00:10:17 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.228:1197, sid=378e6977 f5ec2d68
  25. Jan 28 00:10:17 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  26. Jan 28 00:10:17 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  27. Jan 28 00:10:17 openvpn[1168]: Validating certificate key usage
  28. Jan 28 00:10:17 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  29. Jan 28 00:10:17 openvpn[1168]: VERIFY KU OK
  30. Jan 28 00:10:17 openvpn[1168]: Validating certificate extended key usage
  31. Jan 28 00:10:17 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  32. Jan 28 00:10:17 openvpn[1168]: VERIFY EKU OK
  33. Jan 28 00:10:17 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=462ace8078c8ae6679029436ef0a3442, name=462ace8078c8ae6679029436ef0a3442
  34. Jan 28 00:10:20 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  35. Jan 28 00:10:20 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  36. Jan 28 00:10:20 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  37. Jan 28 00:10:20 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  38. Jan 28 00:10:20 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  39. Jan 28 00:10:20 openvpn[1168]: [462ace8078c8ae6679029436ef0a3442] Peer Connection Initiated with [AF_INET]109.201.152.228:1197
  40. Jan 28 00:10:22 openvpn[1168]: SENT CONTROL [462ace8078c8ae6679029436ef0a3442]: 'PUSH_REQUEST' (status=1)
  41. Jan 28 00:10:22 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.9.10.1,topology net30,ifconfig 10.9.10.6 10.9.10.5'
  42. Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  43. Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  44. Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  45. Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: route options modified
  46. Jan 28 00:10:22 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  47. Jan 28 00:10:22 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  48. Jan 28 00:10:22 openvpn[1168]: Initialization Sequence Completed
  49. Jan 28 08:00:37 ntp: start NTP update
  50. Jan 28 09:32:48 openvpn[1168]: [462ace8078c8ae6679029436ef0a3442] Inactivity timeout (--ping-restart), restarting
  51. Jan 28 09:32:48 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  52. Jan 28 09:32:48 openvpn[1168]: Restart pause, 2 second(s)
  53. Jan 28 09:32:50 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  54. Jan 28 09:32:50 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  55. Jan 28 09:32:50 openvpn[1168]: UDPv4 link local: [undef]
  56. Jan 28 09:32:50 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.240:1197
  57. Jan 28 09:32:50 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.240:1197, sid=90725f79 0b4f976e
  58. Jan 28 09:32:50 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  59. Jan 28 09:32:50 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  60. Jan 28 09:32:50 openvpn[1168]: Validating certificate key usage
  61. Jan 28 09:32:50 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  62. Jan 28 09:32:50 openvpn[1168]: VERIFY KU OK
  63. Jan 28 09:32:50 openvpn[1168]: Validating certificate extended key usage
  64. Jan 28 09:32:50 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  65. Jan 28 09:32:50 openvpn[1168]: VERIFY EKU OK
  66. Jan 28 09:32:50 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=1fccd28f8872a8dff44af63c23f9c68e, name=1fccd28f8872a8dff44af63c23f9c68e
  67. Jan 28 09:32:53 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  68. Jan 28 09:32:53 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  69. Jan 28 09:32:53 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  70. Jan 28 09:32:53 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  71. Jan 28 09:32:53 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  72. Jan 28 09:32:53 openvpn[1168]: [1fccd28f8872a8dff44af63c23f9c68e] Peer Connection Initiated with [AF_INET]109.201.152.240:1197
  73. Jan 28 09:32:56 openvpn[1168]: SENT CONTROL [1fccd28f8872a8dff44af63c23f9c68e]: 'PUSH_REQUEST' (status=1)
  74. Jan 28 09:32:56 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.43.10.1,topology net30,ifconfig 10.43.10.6 10.43.10.5'
  75. Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  76. Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  77. Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  78. Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: route options modified
  79. Jan 28 09:32:56 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  80. Jan 28 09:32:56 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  81. Jan 28 09:32:56 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  82. Jan 28 09:32:56 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.9.10.6 10.9.10.5 init
  83. Jan 28 09:32:57 openvpn-routing: Configuring policy rules for client 1
  84. Jan 28 09:32:57 openvpn-routing: Removing rule 10001 from routing policy
  85. Jan 28 09:32:57 openvpn-routing: Removing rule 10002 from routing policy
  86. Jan 28 09:32:57 openvpn-routing: Removing rule 10003 from routing policy
  87. Jan 28 09:32:57 openvpn-routing: Removing rule 10004 from routing policy
  88. Jan 28 09:32:57 openvpn-routing: Removing rule 10005 from routing policy
  89. Jan 28 09:32:57 openvpn-routing: Removing rule 10006 from routing policy
  90. Jan 28 09:32:57 openvpn-routing: Removing rule 10007 from routing policy
  91. Jan 28 09:32:57 openvpn-routing: Removing rule 10008 from routing policy
  92. Jan 28 09:32:57 openvpn-routing: Removing rule 10009 from routing policy
  93. Jan 28 09:32:57 openvpn-routing: Removing rule 10010 from routing policy
  94. Jan 28 09:32:57 openvpn-routing: Removing rule 10011 from routing policy
  95. Jan 28 09:32:57 openvpn-routing: Removing rule 10101 from routing policy
  96. Jan 28 09:32:58 openvpn-routing: Removing rule 10102 from routing policy
  97. Jan 28 09:32:58 openvpn-routing: Removing rule 10103 from routing policy
  98. Jan 28 09:32:58 openvpn-routing: Removing rule 10104 from routing policy
  99. Jan 28 09:32:58 openvpn-routing: Flushing client routing table
  100. Jan 28 09:32:58 openvpn-routing: Completed routing policy configuration for client 1
  101. Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 10.9.10.1/32
  102. Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  103. Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 46.166.188.225/32
  104. Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  105. Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  106. Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  107. Jan 28 09:32:58 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  108. Jan 28 09:32:58 openvpn[1168]: Closing TUN/TAP interface
  109. Jan 28 09:32:58 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.9.10.6 peer 10.9.10.5
  110. Jan 28 09:32:58 openvpn[1168]: updown.sh tun11 1500 1570 10.9.10.6 10.9.10.5 init
  111. Jan 28 09:32:59 rc_service: service 7935:notify_rc updateresolv
  112. Jan 28 09:32:59 rc_service: service 7936:notify_rc restart_dnsmasq
  113. Jan 28 09:32:59 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  114. Jan 28 09:32:59 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  115. Jan 28 09:33:00 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  116. Jan 28 09:33:01 openvpn[1168]: TUN/TAP device tun11 opened
  117. Jan 28 09:33:01 openvpn[1168]: TUN/TAP TX queue length set to 100
  118. Jan 28 09:33:01 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  119. Jan 28 09:33:01 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  120. Jan 28 09:33:01 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.43.10.6 peer 10.43.10.5
  121. Jan 28 09:33:01 openvpn[1168]: updown.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
  122. Jan 28 09:33:01 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  123. Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  124. Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  125. Jan 28 09:33:02 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  126. Jan 28 09:33:03 rc_service: service 8120:notify_rc updateresolv
  127. Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 109.201.152.240/32 via 60.226.64.1
  128. Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.43.10.5
  129. Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.43.10.5
  130. Jan 28 09:33:06 openvpn[1168]: /usr/sbin/ip route add 10.43.10.1/32 via 10.43.10.5
  131. Jan 28 09:33:06 openvpn-routing: Configuring policy rules for client 1
  132. Jan 28 09:33:06 openvpn-routing: Creating VPN routing table
  133. Jan 28 09:33:06 openvpn-routing: Removing route for 10.43.10.1 to tun11 from main routing table
  134. Jan 28 09:33:06 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  135. Jan 28 09:33:06 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  136. Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  137. Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  138. Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  139. Jan 28 09:33:07 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  140. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  141. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  142. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  143. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  144. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  145. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  146. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  147. Jan 28 09:33:07 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  148. Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  149. Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  150. Jan 28 09:33:08 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  151. Jan 28 09:33:08 openvpn-routing: Completed routing policy configuration for client 1
  152. Jan 28 09:33:08 openvpn[1168]: Initialization Sequence Completed
  153. Jan 28 17:34:43 openvpn[1168]: [1fccd28f8872a8dff44af63c23f9c68e] Inactivity timeout (--ping-restart), restarting
  154. Jan 28 17:34:43 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  155. Jan 28 17:34:43 openvpn[1168]: Restart pause, 2 second(s)
  156. Jan 28 17:34:45 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  157. Jan 28 17:34:45 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  158. Jan 28 17:34:45 openvpn[1168]: UDPv4 link local: [undef]
  159. Jan 28 17:34:45 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.143:1197
  160. Jan 28 17:34:46 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.143:1197, sid=9912fcc4 62ada3ce
  161. Jan 28 17:34:46 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  162. Jan 28 17:34:46 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  163. Jan 28 17:34:46 openvpn[1168]: Validating certificate key usage
  164. Jan 28 17:34:46 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  165. Jan 28 17:34:46 openvpn[1168]: VERIFY KU OK
  166. Jan 28 17:34:46 openvpn[1168]: Validating certificate extended key usage
  167. Jan 28 17:34:46 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  168. Jan 28 17:34:46 openvpn[1168]: VERIFY EKU OK
  169. Jan 28 17:34:46 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=207e0a00cbd3147ef5813cf5c8762d98, name=207e0a00cbd3147ef5813cf5c8762d98
  170. Jan 28 17:34:49 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  171. Jan 28 17:34:49 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  172. Jan 28 17:34:49 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  173. Jan 28 17:34:49 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  174. Jan 28 17:34:49 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  175. Jan 28 17:34:49 openvpn[1168]: [207e0a00cbd3147ef5813cf5c8762d98] Peer Connection Initiated with [AF_INET]46.166.138.143:1197
  176. Jan 28 17:34:51 openvpn[1168]: SENT CONTROL [207e0a00cbd3147ef5813cf5c8762d98]: 'PUSH_REQUEST' (status=1)
  177. Jan 28 17:34:52 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.35.10.1,topology net30,ifconfig 10.35.10.6 10.35.10.5'
  178. Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  179. Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  180. Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  181. Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: route options modified
  182. Jan 28 17:34:52 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  183. Jan 28 17:34:52 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  184. Jan 28 17:34:52 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  185. Jan 28 17:34:52 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
  186. Jan 28 17:34:52 openvpn-routing: Configuring policy rules for client 1
  187. Jan 28 17:34:52 openvpn-routing: Removing rule 10001 from routing policy
  188. Jan 28 17:34:52 openvpn-routing: Removing rule 10002 from routing policy
  189. Jan 28 17:34:53 openvpn-routing: Removing rule 10003 from routing policy
  190. Jan 28 17:34:53 openvpn-routing: Removing rule 10004 from routing policy
  191. Jan 28 17:34:53 openvpn-routing: Removing rule 10005 from routing policy
  192. Jan 28 17:34:53 openvpn-routing: Removing rule 10006 from routing policy
  193. Jan 28 17:34:53 openvpn-routing: Removing rule 10007 from routing policy
  194. Jan 28 17:34:53 openvpn-routing: Removing rule 10008 from routing policy
  195. Jan 28 17:34:53 openvpn-routing: Removing rule 10009 from routing policy
  196. Jan 28 17:34:53 openvpn-routing: Removing rule 10010 from routing policy
  197. Jan 28 17:34:53 openvpn-routing: Removing rule 10011 from routing policy
  198. Jan 28 17:34:53 openvpn-routing: Removing rule 10101 from routing policy
  199. Jan 28 17:34:53 openvpn-routing: Removing rule 10102 from routing policy
  200. Jan 28 17:34:53 openvpn-routing: Removing rule 10103 from routing policy
  201. Jan 28 17:34:53 openvpn-routing: Removing rule 10104 from routing policy
  202. Jan 28 17:34:53 openvpn-routing: Flushing client routing table
  203. Jan 28 17:34:53 openvpn-routing: Completed routing policy configuration for client 1
  204. Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 10.43.10.1/32
  205. Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  206. Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 109.201.152.240/32
  207. Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  208. Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  209. Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  210. Jan 28 17:34:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  211. Jan 28 17:34:53 openvpn[1168]: Closing TUN/TAP interface
  212. Jan 28 17:34:53 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.43.10.6 peer 10.43.10.5
  213. Jan 28 17:34:53 openvpn[1168]: updown.sh tun11 1500 1570 10.43.10.6 10.43.10.5 init
  214. Jan 28 17:34:54 rc_service: service 8746:notify_rc updateresolv
  215. Jan 28 17:34:55 rc_service: service 8747:notify_rc restart_dnsmasq
  216. Jan 28 17:34:55 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  217. Jan 28 17:34:55 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  218. Jan 28 17:34:55 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  219. Jan 28 17:34:57 openvpn[1168]: TUN/TAP device tun11 opened
  220. Jan 28 17:34:57 openvpn[1168]: TUN/TAP TX queue length set to 100
  221. Jan 28 17:34:57 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  222. Jan 28 17:34:57 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  223. Jan 28 17:34:57 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.35.10.6 peer 10.35.10.5
  224. Jan 28 17:34:57 openvpn[1168]: updown.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
  225. Jan 28 17:34:57 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  226. Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  227. Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  228. Jan 28 17:34:58 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  229. Jan 28 17:34:59 rc_service: service 8931:notify_rc updateresolv
  230. Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 46.166.138.143/32 via 60.226.64.1
  231. Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.35.10.5
  232. Jan 28 17:35:01 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.35.10.5
  233. Jan 28 17:35:02 openvpn[1168]: /usr/sbin/ip route add 10.35.10.1/32 via 10.35.10.5
  234. Jan 28 17:35:02 openvpn-routing: Configuring policy rules for client 1
  235. Jan 28 17:35:02 openvpn-routing: Creating VPN routing table
  236. Jan 28 17:35:02 openvpn-routing: Removing route for 10.35.10.1 to tun11 from main routing table
  237. Jan 28 17:35:02 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  238. Jan 28 17:35:02 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  239. Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  240. Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  241. Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  242. Jan 28 17:35:02 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  243. Jan 28 17:35:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  244. Jan 28 17:35:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  245. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  246. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  247. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  248. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  249. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  250. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  251. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  252. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  253. Jan 28 17:35:03 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  254. Jan 28 17:35:03 openvpn-routing: Completed routing policy configuration for client 1
  255. Jan 28 17:35:03 openvpn[1168]: Initialization Sequence Completed
  256. Jan 28 20:00:37 ntp: start NTP update
  257. Jan 29 01:36:44 openvpn[1168]: [207e0a00cbd3147ef5813cf5c8762d98] Inactivity timeout (--ping-restart), restarting
  258. Jan 29 01:36:44 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  259. Jan 29 01:36:44 openvpn[1168]: Restart pause, 2 second(s)
  260. Jan 29 01:36:46 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  261. Jan 29 01:36:46 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  262. Jan 29 01:36:46 openvpn[1168]: UDPv4 link local: [undef]
  263. Jan 29 01:36:46 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.240:1197
  264. Jan 29 01:36:46 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.240:1197, sid=e9c17963 dded6976
  265. Jan 29 01:36:46 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  266. Jan 29 01:36:46 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  267. Jan 29 01:36:46 openvpn[1168]: Validating certificate key usage
  268. Jan 29 01:36:46 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  269. Jan 29 01:36:46 openvpn[1168]: VERIFY KU OK
  270. Jan 29 01:36:46 openvpn[1168]: Validating certificate extended key usage
  271. Jan 29 01:36:46 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  272. Jan 29 01:36:46 openvpn[1168]: VERIFY EKU OK
  273. Jan 29 01:36:46 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=0ea0451b21ee6ccf758f044d804855a3, name=0ea0451b21ee6ccf758f044d804855a3
  274. Jan 29 01:36:49 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  275. Jan 29 01:36:49 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  276. Jan 29 01:36:49 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  277. Jan 29 01:36:49 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  278. Jan 29 01:36:49 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  279. Jan 29 01:36:49 openvpn[1168]: [0ea0451b21ee6ccf758f044d804855a3] Peer Connection Initiated with [AF_INET]46.166.186.240:1197
  280. Jan 29 01:36:51 openvpn[1168]: SENT CONTROL [0ea0451b21ee6ccf758f044d804855a3]: 'PUSH_REQUEST' (status=1)
  281. Jan 29 01:36:52 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.41.10.1,topology net30,ifconfig 10.41.10.6 10.41.10.5'
  282. Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  283. Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  284. Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  285. Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: route options modified
  286. Jan 29 01:36:52 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  287. Jan 29 01:36:52 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  288. Jan 29 01:36:52 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  289. Jan 29 01:36:52 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
  290. Jan 29 01:36:52 openvpn-routing: Configuring policy rules for client 1
  291. Jan 29 01:36:53 openvpn-routing: Removing rule 10001 from routing policy
  292. Jan 29 01:36:53 openvpn-routing: Removing rule 10002 from routing policy
  293. Jan 29 01:36:53 openvpn-routing: Removing rule 10003 from routing policy
  294. Jan 29 01:36:53 openvpn-routing: Removing rule 10004 from routing policy
  295. Jan 29 01:36:53 openvpn-routing: Removing rule 10005 from routing policy
  296. Jan 29 01:36:53 openvpn-routing: Removing rule 10006 from routing policy
  297. Jan 29 01:36:53 openvpn-routing: Removing rule 10007 from routing policy
  298. Jan 29 01:36:53 openvpn-routing: Removing rule 10008 from routing policy
  299. Jan 29 01:36:53 openvpn-routing: Removing rule 10009 from routing policy
  300. Jan 29 01:36:53 openvpn-routing: Removing rule 10010 from routing policy
  301. Jan 29 01:36:53 openvpn-routing: Removing rule 10011 from routing policy
  302. Jan 29 01:36:53 openvpn-routing: Removing rule 10101 from routing policy
  303. Jan 29 01:36:53 openvpn-routing: Removing rule 10102 from routing policy
  304. Jan 29 01:36:53 openvpn-routing: Removing rule 10103 from routing policy
  305. Jan 29 01:36:53 openvpn-routing: Removing rule 10104 from routing policy
  306. Jan 29 01:36:53 openvpn-routing: Flushing client routing table
  307. Jan 29 01:36:53 openvpn-routing: Completed routing policy configuration for client 1
  308. Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 10.35.10.1/32
  309. Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  310. Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 46.166.138.143/32
  311. Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  312. Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  313. Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  314. Jan 29 01:36:53 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  315. Jan 29 01:36:53 openvpn[1168]: Closing TUN/TAP interface
  316. Jan 29 01:36:53 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.35.10.6 peer 10.35.10.5
  317. Jan 29 01:36:53 openvpn[1168]: updown.sh tun11 1500 1570 10.35.10.6 10.35.10.5 init
  318. Jan 29 01:36:54 rc_service: service 9557:notify_rc updateresolv
  319. Jan 29 01:36:55 rc_service: service 9558:notify_rc restart_dnsmasq
  320. Jan 29 01:36:55 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  321. Jan 29 01:36:55 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  322. Jan 29 01:36:55 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  323. Jan 29 01:36:56 openvpn[1168]: TUN/TAP device tun11 opened
  324. Jan 29 01:36:56 openvpn[1168]: TUN/TAP TX queue length set to 100
  325. Jan 29 01:36:56 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  326. Jan 29 01:36:56 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  327. Jan 29 01:36:56 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.41.10.6 peer 10.41.10.5
  328. Jan 29 01:36:56 openvpn[1168]: updown.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
  329. Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  330. Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  331. Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  332. Jan 29 01:36:57 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  333. Jan 29 01:36:59 rc_service: service 9742:notify_rc updateresolv
  334. Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 46.166.186.240/32 via 60.226.64.1
  335. Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.41.10.5
  336. Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.41.10.5
  337. Jan 29 01:37:01 openvpn[1168]: /usr/sbin/ip route add 10.41.10.1/32 via 10.41.10.5
  338. Jan 29 01:37:01 openvpn-routing: Configuring policy rules for client 1
  339. Jan 29 01:37:01 openvpn-routing: Creating VPN routing table
  340. Jan 29 01:37:02 openvpn-routing: Removing route for 10.41.10.1 to tun11 from main routing table
  341. Jan 29 01:37:02 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  342. Jan 29 01:37:02 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  343. Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  344. Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  345. Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  346. Jan 29 01:37:02 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  347. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  348. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  349. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  350. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  351. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  352. Jan 29 01:37:02 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  353. Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  354. Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  355. Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  356. Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  357. Jan 29 01:37:03 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  358. Jan 29 01:37:03 openvpn-routing: Completed routing policy configuration for client 1
  359. Jan 29 01:37:03 openvpn[1168]: Initialization Sequence Completed
  360. Jan 29 08:00:35 ntp: start NTP update
  361. Jan 29 09:38:42 openvpn[1168]: [0ea0451b21ee6ccf758f044d804855a3] Inactivity timeout (--ping-restart), restarting
  362. Jan 29 09:38:42 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  363. Jan 29 09:38:42 openvpn[1168]: Restart pause, 2 second(s)
  364. Jan 29 09:38:44 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  365. Jan 29 09:38:44 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  366. Jan 29 09:38:44 openvpn[1168]: UDPv4 link local: [undef]
  367. Jan 29 09:38:44 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.248:1197
  368. Jan 29 09:38:44 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.248:1197, sid=2eddb89d 0a06d0f2
  369. Jan 29 09:38:44 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  370. Jan 29 09:38:44 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  371. Jan 29 09:38:44 openvpn[1168]: Validating certificate key usage
  372. Jan 29 09:38:44 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  373. Jan 29 09:38:44 openvpn[1168]: VERIFY KU OK
  374. Jan 29 09:38:44 openvpn[1168]: Validating certificate extended key usage
  375. Jan 29 09:38:44 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  376. Jan 29 09:38:44 openvpn[1168]: VERIFY EKU OK
  377. Jan 29 09:38:44 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fdb0b15ef89f11c7bfa345e44c5e23fd, name=fdb0b15ef89f11c7bfa345e44c5e23fd
  378. Jan 29 09:38:47 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  379. Jan 29 09:38:47 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  380. Jan 29 09:38:47 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  381. Jan 29 09:38:47 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  382. Jan 29 09:38:47 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  383. Jan 29 09:38:47 openvpn[1168]: [fdb0b15ef89f11c7bfa345e44c5e23fd] Peer Connection Initiated with [AF_INET]46.166.137.248:1197
  384. Jan 29 09:38:50 openvpn[1168]: SENT CONTROL [fdb0b15ef89f11c7bfa345e44c5e23fd]: 'PUSH_REQUEST' (status=1)
  385. Jan 29 09:38:50 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.66.10.1,topology net30,ifconfig 10.66.10.6 10.66.10.5'
  386. Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  387. Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  388. Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  389. Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: route options modified
  390. Jan 29 09:38:50 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  391. Jan 29 09:38:50 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  392. Jan 29 09:38:50 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  393. Jan 29 09:38:50 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
  394. Jan 29 09:38:50 openvpn-routing: Configuring policy rules for client 1
  395. Jan 29 09:38:51 openvpn-routing: Removing rule 10001 from routing policy
  396. Jan 29 09:38:51 openvpn-routing: Removing rule 10002 from routing policy
  397. Jan 29 09:38:51 openvpn-routing: Removing rule 10003 from routing policy
  398. Jan 29 09:38:51 openvpn-routing: Removing rule 10004 from routing policy
  399. Jan 29 09:38:51 openvpn-routing: Removing rule 10005 from routing policy
  400. Jan 29 09:38:51 openvpn-routing: Removing rule 10006 from routing policy
  401. Jan 29 09:38:51 openvpn-routing: Removing rule 10007 from routing policy
  402. Jan 29 09:38:51 openvpn-routing: Removing rule 10008 from routing policy
  403. Jan 29 09:38:51 openvpn-routing: Removing rule 10009 from routing policy
  404. Jan 29 09:38:51 openvpn-routing: Removing rule 10010 from routing policy
  405. Jan 29 09:38:51 openvpn-routing: Removing rule 10011 from routing policy
  406. Jan 29 09:38:51 openvpn-routing: Removing rule 10101 from routing policy
  407. Jan 29 09:38:51 openvpn-routing: Removing rule 10102 from routing policy
  408. Jan 29 09:38:51 openvpn-routing: Removing rule 10103 from routing policy
  409. Jan 29 09:38:51 openvpn-routing: Removing rule 10104 from routing policy
  410. Jan 29 09:38:51 openvpn-routing: Flushing client routing table
  411. Jan 29 09:38:51 openvpn-routing: Completed routing policy configuration for client 1
  412. Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 10.41.10.1/32
  413. Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  414. Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 46.166.186.240/32
  415. Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  416. Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  417. Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  418. Jan 29 09:38:52 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  419. Jan 29 09:38:52 openvpn[1168]: Closing TUN/TAP interface
  420. Jan 29 09:38:52 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.41.10.6 peer 10.41.10.5
  421. Jan 29 09:38:52 openvpn[1168]: updown.sh tun11 1500 1570 10.41.10.6 10.41.10.5 init
  422. Jan 29 09:38:52 rc_service: service 10513:notify_rc updateresolv
  423. Jan 29 09:38:53 rc_service: service 10514:notify_rc restart_dnsmasq
  424. Jan 29 09:38:53 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  425. Jan 29 09:38:54 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  426. Jan 29 09:38:54 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  427. Jan 29 09:38:55 openvpn[1168]: TUN/TAP device tun11 opened
  428. Jan 29 09:38:55 openvpn[1168]: TUN/TAP TX queue length set to 100
  429. Jan 29 09:38:55 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  430. Jan 29 09:38:55 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  431. Jan 29 09:38:55 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.66.10.6 peer 10.66.10.5
  432. Jan 29 09:38:55 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  433. Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  434. Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  435. Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  436. Jan 29 09:38:56 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  437. Jan 29 09:38:57 rc_service: service 10698:notify_rc updateresolv
  438. Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 46.166.137.248/32 via 60.226.64.1
  439. Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.66.10.5
  440. Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.66.10.5
  441. Jan 29 09:39:00 openvpn[1168]: /usr/sbin/ip route add 10.66.10.1/32 via 10.66.10.5
  442. Jan 29 09:39:00 openvpn-routing: Configuring policy rules for client 1
  443. Jan 29 09:39:00 openvpn-routing: Creating VPN routing table
  444. Jan 29 09:39:00 openvpn-routing: Removing route for 10.66.10.1 to tun11 from main routing table
  445. Jan 29 09:39:00 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  446. Jan 29 09:39:00 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  447. Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  448. Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  449. Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  450. Jan 29 09:39:00 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  451. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  452. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  453. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  454. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  455. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  456. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  457. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  458. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  459. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  460. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  461. Jan 29 09:39:01 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  462. Jan 29 09:39:01 openvpn-routing: Completed routing policy configuration for client 1
  463. Jan 29 09:39:01 openvpn[1168]: Initialization Sequence Completed
  464. Jan 29 17:40:35 openvpn[1168]: [fdb0b15ef89f11c7bfa345e44c5e23fd] Inactivity timeout (--ping-restart), restarting
  465. Jan 29 17:40:35 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  466. Jan 29 17:40:35 openvpn[1168]: Restart pause, 2 second(s)
  467. Jan 29 17:40:37 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  468. Jan 29 17:40:37 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  469. Jan 29 17:40:37 openvpn[1168]: UDPv4 link local: [undef]
  470. Jan 29 17:40:37 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.220:1197
  471. Jan 29 17:40:37 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.220:1197, sid=65af00eb 51aee261
  472. Jan 29 17:40:38 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  473. Jan 29 17:40:38 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  474. Jan 29 17:40:38 openvpn[1168]: Validating certificate key usage
  475. Jan 29 17:40:38 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  476. Jan 29 17:40:38 openvpn[1168]: VERIFY KU OK
  477. Jan 29 17:40:38 openvpn[1168]: Validating certificate extended key usage
  478. Jan 29 17:40:38 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  479. Jan 29 17:40:38 openvpn[1168]: VERIFY EKU OK
  480. Jan 29 17:40:38 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c68400533af8cb5c065f111c45e7e68, name=3c68400533af8cb5c065f111c45e7e68
  481. Jan 29 17:40:41 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  482. Jan 29 17:40:41 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  483. Jan 29 17:40:41 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  484. Jan 29 17:40:41 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  485. Jan 29 17:40:41 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  486. Jan 29 17:40:41 openvpn[1168]: [3c68400533af8cb5c065f111c45e7e68] Peer Connection Initiated with [AF_INET]46.166.190.220:1197
  487. Jan 29 17:40:43 openvpn[1168]: SENT CONTROL [3c68400533af8cb5c065f111c45e7e68]: 'PUSH_REQUEST' (status=1)
  488. Jan 29 17:40:43 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.36.10.1,topology net30,ifconfig 10.36.10.6 10.36.10.5'
  489. Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  490. Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  491. Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  492. Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: route options modified
  493. Jan 29 17:40:43 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  494. Jan 29 17:40:43 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  495. Jan 29 17:40:43 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  496. Jan 29 17:40:43 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  497. Jan 29 17:40:43 openvpn-routing: Configuring policy rules for client 1
  498. Jan 29 17:40:43 openvpn-routing: Removing rule 10001 from routing policy
  499. Jan 29 17:40:44 openvpn-routing: Removing rule 10002 from routing policy
  500. Jan 29 17:40:44 openvpn-routing: Removing rule 10003 from routing policy
  501. Jan 29 17:40:44 openvpn-routing: Removing rule 10004 from routing policy
  502. Jan 29 17:40:44 openvpn-routing: Removing rule 10005 from routing policy
  503. Jan 29 17:40:44 openvpn-routing: Removing rule 10006 from routing policy
  504. Jan 29 17:40:44 openvpn-routing: Removing rule 10007 from routing policy
  505. Jan 29 17:40:44 openvpn-routing: Removing rule 10008 from routing policy
  506. Jan 29 17:40:44 openvpn-routing: Removing rule 10009 from routing policy
  507. Jan 29 17:40:44 openvpn-routing: Removing rule 10010 from routing policy
  508. Jan 29 17:40:44 openvpn-routing: Removing rule 10011 from routing policy
  509. Jan 29 17:40:44 openvpn-routing: Removing rule 10101 from routing policy
  510. Jan 29 17:40:44 openvpn-routing: Removing rule 10102 from routing policy
  511. Jan 29 17:40:44 openvpn-routing: Removing rule 10103 from routing policy
  512. Jan 29 17:40:44 openvpn-routing: Removing rule 10104 from routing policy
  513. Jan 29 17:40:44 openvpn-routing: Flushing client routing table
  514. Jan 29 17:40:44 openvpn-routing: Completed routing policy configuration for client 1
  515. Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 10.66.10.1/32
  516. Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  517. Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 46.166.137.248/32
  518. Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  519. Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  520. Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  521. Jan 29 17:40:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  522. Jan 29 17:40:44 openvpn[1168]: Closing TUN/TAP interface
  523. Jan 29 17:40:44 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.66.10.6 peer 10.66.10.5
  524. Jan 29 17:40:44 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  525. Jan 29 17:40:45 rc_service: service 11328:notify_rc updateresolv
  526. Jan 29 17:40:46 rc_service: service 11329:notify_rc restart_dnsmasq
  527. Jan 29 17:40:46 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  528. Jan 29 17:40:47 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  529. Jan 29 17:40:47 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  530. Jan 29 17:40:48 openvpn[1168]: TUN/TAP device tun11 opened
  531. Jan 29 17:40:48 openvpn[1168]: TUN/TAP TX queue length set to 100
  532. Jan 29 17:40:48 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  533. Jan 29 17:40:48 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  534. Jan 29 17:40:48 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.36.10.6 peer 10.36.10.5
  535. Jan 29 17:40:48 openvpn[1168]: updown.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
  536. Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  537. Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  538. Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  539. Jan 29 17:40:49 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  540. Jan 29 17:40:50 rc_service: service 11513:notify_rc updateresolv
  541. Jan 29 17:40:52 openvpn[1168]: /usr/sbin/ip route add 46.166.190.220/32 via 60.226.64.1
  542. Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.36.10.5
  543. Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.36.10.5
  544. Jan 29 17:40:53 openvpn[1168]: /usr/sbin/ip route add 10.36.10.1/32 via 10.36.10.5
  545. Jan 29 17:40:53 openvpn-routing: Configuring policy rules for client 1
  546. Jan 29 17:40:53 openvpn-routing: Creating VPN routing table
  547. Jan 29 17:40:53 openvpn-routing: Removing route for 10.36.10.1 to tun11 from main routing table
  548. Jan 29 17:40:53 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  549. Jan 29 17:40:53 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  550. Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  551. Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  552. Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  553. Jan 29 17:40:53 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  554. Jan 29 17:40:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  555. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  556. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  557. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  558. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  559. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  560. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  561. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  562. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  563. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  564. Jan 29 17:40:54 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  565. Jan 29 17:40:54 openvpn-routing: Completed routing policy configuration for client 1
  566. Jan 29 17:40:54 openvpn[1168]: Initialization Sequence Completed
  567. Jan 29 20:00:33 ntp: start NTP update
  568. Jan 30 01:42:33 openvpn[1168]: [3c68400533af8cb5c065f111c45e7e68] Inactivity timeout (--ping-restart), restarting
  569. Jan 30 01:42:33 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  570. Jan 30 01:42:33 openvpn[1168]: Restart pause, 2 second(s)
  571. Jan 30 01:42:35 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  572. Jan 30 01:42:35 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  573. Jan 30 01:42:35 openvpn[1168]: UDPv4 link local: [undef]
  574. Jan 30 01:42:35 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.170:1197
  575. Jan 30 01:42:36 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.170:1197, sid=4fc480ca e3faf9a4
  576. Jan 30 01:42:37 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  577. Jan 30 01:42:37 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  578. Jan 30 01:42:37 openvpn[1168]: Validating certificate key usage
  579. Jan 30 01:42:37 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  580. Jan 30 01:42:37 openvpn[1168]: VERIFY KU OK
  581. Jan 30 01:42:37 openvpn[1168]: Validating certificate extended key usage
  582. Jan 30 01:42:37 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  583. Jan 30 01:42:37 openvpn[1168]: VERIFY EKU OK
  584. Jan 30 01:42:37 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=12eb3b99272fa03c619a101c007c050a, name=12eb3b99272fa03c619a101c007c050a
  585. Jan 30 01:42:40 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  586. Jan 30 01:42:40 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  587. Jan 30 01:42:40 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  588. Jan 30 01:42:40 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  589. Jan 30 01:42:40 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  590. Jan 30 01:42:40 openvpn[1168]: [12eb3b99272fa03c619a101c007c050a] Peer Connection Initiated with [AF_INET]46.166.138.170:1197
  591. Jan 30 01:42:43 openvpn[1168]: SENT CONTROL [12eb3b99272fa03c619a101c007c050a]: 'PUSH_REQUEST' (status=1)
  592. Jan 30 01:42:43 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.40.10.1,topology net30,ifconfig 10.40.10.6 10.40.10.5'
  593. Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  594. Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  595. Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  596. Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: route options modified
  597. Jan 30 01:42:43 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  598. Jan 30 01:42:43 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  599. Jan 30 01:42:43 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  600. Jan 30 01:42:43 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
  601. Jan 30 01:42:43 openvpn-routing: Configuring policy rules for client 1
  602. Jan 30 01:42:44 openvpn-routing: Removing rule 10001 from routing policy
  603. Jan 30 01:42:44 openvpn-routing: Removing rule 10002 from routing policy
  604. Jan 30 01:42:44 openvpn-routing: Removing rule 10003 from routing policy
  605. Jan 30 01:42:44 openvpn-routing: Removing rule 10004 from routing policy
  606. Jan 30 01:42:44 openvpn-routing: Removing rule 10005 from routing policy
  607. Jan 30 01:42:44 openvpn-routing: Removing rule 10006 from routing policy
  608. Jan 30 01:42:44 openvpn-routing: Removing rule 10007 from routing policy
  609. Jan 30 01:42:44 openvpn-routing: Removing rule 10008 from routing policy
  610. Jan 30 01:42:44 openvpn-routing: Removing rule 10009 from routing policy
  611. Jan 30 01:42:44 openvpn-routing: Removing rule 10010 from routing policy
  612. Jan 30 01:42:44 openvpn-routing: Removing rule 10011 from routing policy
  613. Jan 30 01:42:44 openvpn-routing: Removing rule 10101 from routing policy
  614. Jan 30 01:42:44 openvpn-routing: Removing rule 10102 from routing policy
  615. Jan 30 01:42:44 openvpn-routing: Removing rule 10103 from routing policy
  616. Jan 30 01:42:44 openvpn-routing: Removing rule 10104 from routing policy
  617. Jan 30 01:42:44 openvpn-routing: Flushing client routing table
  618. Jan 30 01:42:44 openvpn-routing: Completed routing policy configuration for client 1
  619. Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 10.36.10.1/32
  620. Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  621. Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 46.166.190.220/32
  622. Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  623. Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  624. Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  625. Jan 30 01:42:44 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  626. Jan 30 01:42:44 openvpn[1168]: Closing TUN/TAP interface
  627. Jan 30 01:42:44 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.36.10.6 peer 10.36.10.5
  628. Jan 30 01:42:45 openvpn[1168]: updown.sh tun11 1500 1570 10.36.10.6 10.36.10.5 init
  629. Jan 30 01:42:45 rc_service: service 12141:notify_rc updateresolv
  630. Jan 30 01:42:46 rc_service: service 12142:notify_rc restart_dnsmasq
  631. Jan 30 01:42:46 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  632. Jan 30 01:42:46 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  633. Jan 30 01:42:46 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  634. Jan 30 01:42:47 openvpn[1168]: TUN/TAP device tun11 opened
  635. Jan 30 01:42:47 openvpn[1168]: TUN/TAP TX queue length set to 100
  636. Jan 30 01:42:47 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  637. Jan 30 01:42:47 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  638. Jan 30 01:42:48 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.40.10.6 peer 10.40.10.5
  639. Jan 30 01:42:48 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  640. Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  641. Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  642. Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  643. Jan 30 01:42:48 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  644. Jan 30 01:42:50 rc_service: service 12326:notify_rc updateresolv
  645. Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 46.166.138.170/32 via 60.226.64.1
  646. Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.40.10.5
  647. Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.40.10.5
  648. Jan 30 01:42:52 openvpn[1168]: /usr/sbin/ip route add 10.40.10.1/32 via 10.40.10.5
  649. Jan 30 01:42:52 openvpn-routing: Configuring policy rules for client 1
  650. Jan 30 01:42:52 openvpn-routing: Creating VPN routing table
  651. Jan 30 01:42:53 openvpn-routing: Removing route for 10.40.10.1 to tun11 from main routing table
  652. Jan 30 01:42:53 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  653. Jan 30 01:42:53 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  654. Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  655. Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  656. Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  657. Jan 30 01:42:53 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  658. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  659. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  660. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  661. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  662. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  663. Jan 30 01:42:53 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  664. Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  665. Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  666. Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  667. Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  668. Jan 30 01:42:54 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  669. Jan 30 01:42:54 openvpn-routing: Completed routing policy configuration for client 1
  670. Jan 30 01:42:54 openvpn[1168]: Initialization Sequence Completed
  671. Jan 30 08:00:31 ntp: start NTP update
  672. Jan 30 09:44:29 openvpn[1168]: [12eb3b99272fa03c619a101c007c050a] Inactivity timeout (--ping-restart), restarting
  673. Jan 30 09:44:29 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  674. Jan 30 09:44:29 openvpn[1168]: Restart pause, 2 second(s)
  675. Jan 30 09:44:31 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  676. Jan 30 09:44:31 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  677. Jan 30 09:44:31 openvpn[1168]: UDPv4 link local: [undef]
  678. Jan 30 09:44:31 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.195:1197
  679. Jan 30 09:44:31 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.195:1197, sid=f5f3e314 9bf74697
  680. Jan 30 09:44:31 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  681. Jan 30 09:44:31 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  682. Jan 30 09:44:31 openvpn[1168]: Validating certificate key usage
  683. Jan 30 09:44:31 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  684. Jan 30 09:44:31 openvpn[1168]: VERIFY KU OK
  685. Jan 30 09:44:31 openvpn[1168]: Validating certificate extended key usage
  686. Jan 30 09:44:31 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  687. Jan 30 09:44:31 openvpn[1168]: VERIFY EKU OK
  688. Jan 30 09:44:31 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fe5bdb4445d410a5d73209fb0ac36d2f, name=fe5bdb4445d410a5d73209fb0ac36d2f
  689. Jan 30 09:44:35 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  690. Jan 30 09:44:35 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  691. Jan 30 09:44:35 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  692. Jan 30 09:44:35 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  693. Jan 30 09:44:35 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  694. Jan 30 09:44:35 openvpn[1168]: [fe5bdb4445d410a5d73209fb0ac36d2f] Peer Connection Initiated with [AF_INET]46.166.188.195:1197
  695. Jan 30 09:44:37 openvpn[1168]: SENT CONTROL [fe5bdb4445d410a5d73209fb0ac36d2f]: 'PUSH_REQUEST' (status=1)
  696. Jan 30 09:44:37 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.20.10.1,topology net30,ifconfig 10.20.10.6 10.20.10.5'
  697. Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  698. Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  699. Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  700. Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: route options modified
  701. Jan 30 09:44:37 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  702. Jan 30 09:44:37 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  703. Jan 30 09:44:37 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  704. Jan 30 09:44:37 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  705. Jan 30 09:44:37 openvpn-routing: Configuring policy rules for client 1
  706. Jan 30 09:44:38 openvpn-routing: Removing rule 10001 from routing policy
  707. Jan 30 09:44:38 openvpn-routing: Removing rule 10002 from routing policy
  708. Jan 30 09:44:38 openvpn-routing: Removing rule 10003 from routing policy
  709. Jan 30 09:44:38 openvpn-routing: Removing rule 10004 from routing policy
  710. Jan 30 09:44:38 openvpn-routing: Removing rule 10005 from routing policy
  711. Jan 30 09:44:38 openvpn-routing: Removing rule 10006 from routing policy
  712. Jan 30 09:44:38 openvpn-routing: Removing rule 10007 from routing policy
  713. Jan 30 09:44:38 openvpn-routing: Removing rule 10008 from routing policy
  714. Jan 30 09:44:38 openvpn-routing: Removing rule 10009 from routing policy
  715. Jan 30 09:44:38 openvpn-routing: Removing rule 10010 from routing policy
  716. Jan 30 09:44:38 openvpn-routing: Removing rule 10011 from routing policy
  717. Jan 30 09:44:38 openvpn-routing: Removing rule 10101 from routing policy
  718. Jan 30 09:44:38 openvpn-routing: Removing rule 10102 from routing policy
  719. Jan 30 09:44:38 openvpn-routing: Removing rule 10103 from routing policy
  720. Jan 30 09:44:38 openvpn-routing: Removing rule 10104 from routing policy
  721. Jan 30 09:44:38 openvpn-routing: Flushing client routing table
  722. Jan 30 09:44:38 openvpn-routing: Completed routing policy configuration for client 1
  723. Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 10.40.10.1/32
  724. Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  725. Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 46.166.138.170/32
  726. Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  727. Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  728. Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  729. Jan 30 09:44:38 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  730. Jan 30 09:44:38 openvpn[1168]: Closing TUN/TAP interface
  731. Jan 30 09:44:38 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.40.10.6 peer 10.40.10.5
  732. Jan 30 09:44:39 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  733. Jan 30 09:44:39 rc_service: service 12957:notify_rc updateresolv
  734. Jan 30 09:44:40 rc_service: service 12958:notify_rc restart_dnsmasq
  735. Jan 30 09:44:41 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  736. Jan 30 09:44:41 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  737. Jan 30 09:44:41 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  738. Jan 30 09:44:42 openvpn[1168]: TUN/TAP device tun11 opened
  739. Jan 30 09:44:42 openvpn[1168]: TUN/TAP TX queue length set to 100
  740. Jan 30 09:44:42 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  741. Jan 30 09:44:42 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  742. Jan 30 09:44:42 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.20.10.6 peer 10.20.10.5
  743. Jan 30 09:44:42 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  744. Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  745. Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  746. Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  747. Jan 30 09:44:43 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  748. Jan 30 09:44:44 rc_service: service 13143:notify_rc updateresolv
  749. Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 46.166.188.195/32 via 60.226.64.1
  750. Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.20.10.5
  751. Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.20.10.5
  752. Jan 30 09:44:47 openvpn[1168]: /usr/sbin/ip route add 10.20.10.1/32 via 10.20.10.5
  753. Jan 30 09:44:47 openvpn-routing: Configuring policy rules for client 1
  754. Jan 30 09:44:47 openvpn-routing: Creating VPN routing table
  755. Jan 30 09:44:48 openvpn-routing: Removing route for 10.20.10.1 to tun11 from main routing table
  756. Jan 30 09:44:48 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  757. Jan 30 09:44:48 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  758. Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  759. Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  760. Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  761. Jan 30 09:44:48 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  762. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  763. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  764. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  765. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  766. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  767. Jan 30 09:44:48 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  768. Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  769. Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  770. Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  771. Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  772. Jan 30 09:44:49 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  773. Jan 30 09:44:49 openvpn-routing: Completed routing policy configuration for client 1
  774. Jan 30 09:44:49 openvpn[1168]: Initialization Sequence Completed
  775. Jan 30 18:01:12 openvpn[1168]: [fe5bdb4445d410a5d73209fb0ac36d2f] Inactivity timeout (--ping-restart), restarting
  776. Jan 30 18:01:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  777. Jan 30 18:01:12 openvpn[1168]: Restart pause, 2 second(s)
  778. Jan 30 18:01:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  779. Jan 30 18:01:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  780. Jan 30 18:01:14 openvpn[1168]: UDPv4 link local: [undef]
  781. Jan 30 18:01:14 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.228:1197
  782. Jan 30 18:01:15 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.228:1197, sid=e6185acd 4b485b7c
  783. Jan 30 18:01:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  784. Jan 30 18:01:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  785. Jan 30 18:01:15 openvpn[1168]: Validating certificate key usage
  786. Jan 30 18:01:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  787. Jan 30 18:01:15 openvpn[1168]: VERIFY KU OK
  788. Jan 30 18:01:15 openvpn[1168]: Validating certificate extended key usage
  789. Jan 30 18:01:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  790. Jan 30 18:01:15 openvpn[1168]: VERIFY EKU OK
  791. Jan 30 18:01:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=644c634def4a8a98067fa0b32f5b5b9d, name=644c634def4a8a98067fa0b32f5b5b9d
  792. Jan 30 18:01:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  793. Jan 30 18:01:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  794. Jan 30 18:01:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  795. Jan 30 18:01:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  796. Jan 30 18:01:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  797. Jan 30 18:01:18 openvpn[1168]: [644c634def4a8a98067fa0b32f5b5b9d] Peer Connection Initiated with [AF_INET]46.166.137.228:1197
  798. Jan 30 18:01:20 openvpn[1168]: SENT CONTROL [644c634def4a8a98067fa0b32f5b5b9d]: 'PUSH_REQUEST' (status=1)
  799. Jan 30 18:01:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.5.10.1,topology net30,ifconfig 10.5.10.6 10.5.10.5'
  800. Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  801. Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  802. Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  803. Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: route options modified
  804. Jan 30 18:01:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  805. Jan 30 18:01:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  806. Jan 30 18:01:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  807. Jan 30 18:01:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  808. Jan 30 18:01:21 openvpn-routing: Configuring policy rules for client 1
  809. Jan 30 18:01:21 openvpn-routing: Removing rule 10001 from routing policy
  810. Jan 30 18:01:21 openvpn-routing: Removing rule 10002 from routing policy
  811. Jan 30 18:01:21 openvpn-routing: Removing rule 10003 from routing policy
  812. Jan 30 18:01:21 openvpn-routing: Removing rule 10004 from routing policy
  813. Jan 30 18:01:21 openvpn-routing: Removing rule 10005 from routing policy
  814. Jan 30 18:01:21 openvpn-routing: Removing rule 10006 from routing policy
  815. Jan 30 18:01:21 openvpn-routing: Removing rule 10007 from routing policy
  816. Jan 30 18:01:22 openvpn-routing: Removing rule 10008 from routing policy
  817. Jan 30 18:01:22 openvpn-routing: Removing rule 10009 from routing policy
  818. Jan 30 18:01:22 openvpn-routing: Removing rule 10010 from routing policy
  819. Jan 30 18:01:22 openvpn-routing: Removing rule 10011 from routing policy
  820. Jan 30 18:01:22 openvpn-routing: Removing rule 10101 from routing policy
  821. Jan 30 18:01:22 openvpn-routing: Removing rule 10102 from routing policy
  822. Jan 30 18:01:22 openvpn-routing: Removing rule 10103 from routing policy
  823. Jan 30 18:01:22 openvpn-routing: Removing rule 10104 from routing policy
  824. Jan 30 18:01:22 openvpn-routing: Flushing client routing table
  825. Jan 30 18:01:22 openvpn-routing: Completed routing policy configuration for client 1
  826. Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 10.20.10.1/32
  827. Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  828. Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 46.166.188.195/32
  829. Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  830. Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  831. Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  832. Jan 30 18:01:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  833. Jan 30 18:01:22 openvpn[1168]: Closing TUN/TAP interface
  834. Jan 30 18:01:22 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.20.10.6 peer 10.20.10.5
  835. Jan 30 18:01:22 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  836. Jan 30 18:01:23 rc_service: service 13782:notify_rc updateresolv
  837. Jan 30 18:01:24 rc_service: service 13783:notify_rc restart_dnsmasq
  838. Jan 30 18:01:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  839. Jan 30 18:01:24 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  840. Jan 30 18:01:24 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  841. Jan 30 18:01:25 openvpn[1168]: TUN/TAP device tun11 opened
  842. Jan 30 18:01:25 openvpn[1168]: TUN/TAP TX queue length set to 100
  843. Jan 30 18:01:25 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  844. Jan 30 18:01:25 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  845. Jan 30 18:01:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.5.10.6 peer 10.5.10.5
  846. Jan 30 18:01:26 openvpn[1168]: updown.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
  847. Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  848. Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  849. Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  850. Jan 30 18:01:26 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  851. Jan 30 18:01:28 rc_service: service 13967:notify_rc updateresolv
  852. Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 46.166.137.228/32 via 60.226.64.1
  853. Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.5.10.5
  854. Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.5.10.5
  855. Jan 30 18:01:30 openvpn[1168]: /usr/sbin/ip route add 10.5.10.1/32 via 10.5.10.5
  856. Jan 30 18:01:31 openvpn-routing: Configuring policy rules for client 1
  857. Jan 30 18:01:31 openvpn-routing: Creating VPN routing table
  858. Jan 30 18:01:31 openvpn-routing: Removing route for 10.5.10.1 to tun11 from main routing table
  859. Jan 30 18:01:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  860. Jan 30 18:01:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  861. Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  862. Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  863. Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  864. Jan 30 18:01:31 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  865. Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  866. Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  867. Jan 30 18:01:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  868. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  869. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  870. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  871. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  872. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  873. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  874. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  875. Jan 30 18:01:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  876. Jan 30 18:01:32 openvpn-routing: Completed routing policy configuration for client 1
  877. Jan 30 18:01:32 openvpn[1168]: Initialization Sequence Completed
  878. Jan 30 20:00:29 ntp: start NTP update
  879. Jan 31 02:03:11 openvpn[1168]: [644c634def4a8a98067fa0b32f5b5b9d] Inactivity timeout (--ping-restart), restarting
  880. Jan 31 02:03:11 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  881. Jan 31 02:03:11 openvpn[1168]: Restart pause, 2 second(s)
  882. Jan 31 02:03:13 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  883. Jan 31 02:03:13 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  884. Jan 31 02:03:13 openvpn[1168]: UDPv4 link local: [undef]
  885. Jan 31 02:03:13 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.239:1197
  886. Jan 31 02:03:14 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.239:1197, sid=0fc5d627 e11028d8
  887. Jan 31 02:03:14 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  888. Jan 31 02:03:14 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  889. Jan 31 02:03:14 openvpn[1168]: Validating certificate key usage
  890. Jan 31 02:03:14 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  891. Jan 31 02:03:14 openvpn[1168]: VERIFY KU OK
  892. Jan 31 02:03:14 openvpn[1168]: Validating certificate extended key usage
  893. Jan 31 02:03:14 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  894. Jan 31 02:03:14 openvpn[1168]: VERIFY EKU OK
  895. Jan 31 02:03:14 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=95f1cbd3ef654fc24962cd6cf84f8d98, name=95f1cbd3ef654fc24962cd6cf84f8d98
  896. Jan 31 02:03:17 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  897. Jan 31 02:03:17 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  898. Jan 31 02:03:17 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  899. Jan 31 02:03:17 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  900. Jan 31 02:03:17 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  901. Jan 31 02:03:17 openvpn[1168]: [95f1cbd3ef654fc24962cd6cf84f8d98] Peer Connection Initiated with [AF_INET]46.166.188.239:1197
  902. Jan 31 02:03:19 openvpn[1168]: SENT CONTROL [95f1cbd3ef654fc24962cd6cf84f8d98]: 'PUSH_REQUEST' (status=1)
  903. Jan 31 02:03:19 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.37.10.1,topology net30,ifconfig 10.37.10.6 10.37.10.5'
  904. Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  905. Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  906. Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  907. Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: route options modified
  908. Jan 31 02:03:19 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  909. Jan 31 02:03:19 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  910. Jan 31 02:03:19 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  911. Jan 31 02:03:19 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
  912. Jan 31 02:03:20 openvpn-routing: Configuring policy rules for client 1
  913. Jan 31 02:03:20 openvpn-routing: Removing rule 10001 from routing policy
  914. Jan 31 02:03:20 openvpn-routing: Removing rule 10002 from routing policy
  915. Jan 31 02:03:20 openvpn-routing: Removing rule 10003 from routing policy
  916. Jan 31 02:03:20 openvpn-routing: Removing rule 10004 from routing policy
  917. Jan 31 02:03:20 openvpn-routing: Removing rule 10005 from routing policy
  918. Jan 31 02:03:20 openvpn-routing: Removing rule 10006 from routing policy
  919. Jan 31 02:03:20 openvpn-routing: Removing rule 10007 from routing policy
  920. Jan 31 02:03:20 openvpn-routing: Removing rule 10008 from routing policy
  921. Jan 31 02:03:21 openvpn-routing: Removing rule 10009 from routing policy
  922. Jan 31 02:03:21 openvpn-routing: Removing rule 10010 from routing policy
  923. Jan 31 02:03:21 openvpn-routing: Removing rule 10011 from routing policy
  924. Jan 31 02:03:21 openvpn-routing: Removing rule 10101 from routing policy
  925. Jan 31 02:03:21 openvpn-routing: Removing rule 10102 from routing policy
  926. Jan 31 02:03:21 openvpn-routing: Removing rule 10103 from routing policy
  927. Jan 31 02:03:21 openvpn-routing: Removing rule 10104 from routing policy
  928. Jan 31 02:03:21 openvpn-routing: Flushing client routing table
  929. Jan 31 02:03:21 openvpn-routing: Completed routing policy configuration for client 1
  930. Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 10.5.10.1/32
  931. Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  932. Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 46.166.137.228/32
  933. Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  934. Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  935. Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  936. Jan 31 02:03:21 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  937. Jan 31 02:03:21 openvpn[1168]: Closing TUN/TAP interface
  938. Jan 31 02:03:21 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.5.10.6 peer 10.5.10.5
  939. Jan 31 02:03:21 openvpn[1168]: updown.sh tun11 1500 1570 10.5.10.6 10.5.10.5 init
  940. Jan 31 02:03:22 rc_service: service 14599:notify_rc updateresolv
  941. Jan 31 02:03:22 rc_service: service 14600:notify_rc restart_dnsmasq
  942. Jan 31 02:03:22 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  943. Jan 31 02:03:23 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  944. Jan 31 02:03:23 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  945. Jan 31 02:03:24 openvpn[1168]: TUN/TAP device tun11 opened
  946. Jan 31 02:03:24 openvpn[1168]: TUN/TAP TX queue length set to 100
  947. Jan 31 02:03:24 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  948. Jan 31 02:03:24 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  949. Jan 31 02:03:24 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.37.10.6 peer 10.37.10.5
  950. Jan 31 02:03:24 openvpn[1168]: updown.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
  951. Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  952. Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  953. Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  954. Jan 31 02:03:25 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  955. Jan 31 02:03:26 rc_service: service 14784:notify_rc updateresolv
  956. Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 46.166.188.239/32 via 60.226.64.1
  957. Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.37.10.5
  958. Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.37.10.5
  959. Jan 31 02:03:29 openvpn[1168]: /usr/sbin/ip route add 10.37.10.1/32 via 10.37.10.5
  960. Jan 31 02:03:29 openvpn-routing: Configuring policy rules for client 1
  961. Jan 31 02:03:29 openvpn-routing: Creating VPN routing table
  962. Jan 31 02:03:29 openvpn-routing: Removing route for 10.37.10.1 to tun11 from main routing table
  963. Jan 31 02:03:29 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  964. Jan 31 02:03:29 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  965. Jan 31 02:03:29 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  966. Jan 31 02:03:29 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  967. Jan 31 02:03:30 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  968. Jan 31 02:03:30 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  969. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  970. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  971. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  972. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  973. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  974. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  975. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  976. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  977. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  978. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  979. Jan 31 02:03:30 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  980. Jan 31 02:03:31 openvpn-routing: Completed routing policy configuration for client 1
  981. Jan 31 02:03:31 openvpn[1168]: Initialization Sequence Completed
  982. Jan 31 08:00:27 ntp: start NTP update
  983. Jan 31 10:05:12 openvpn[1168]: [95f1cbd3ef654fc24962cd6cf84f8d98] Inactivity timeout (--ping-restart), restarting
  984. Jan 31 10:05:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  985. Jan 31 10:05:12 openvpn[1168]: Restart pause, 2 second(s)
  986. Jan 31 10:05:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  987. Jan 31 10:05:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  988. Jan 31 10:05:14 openvpn[1168]: UDPv4 link local: [undef]
  989. Jan 31 10:05:14 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.209:1197
  990. Jan 31 10:05:14 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.209:1197, sid=bb0d3b8e b1471730
  991. Jan 31 10:05:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  992. Jan 31 10:05:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  993. Jan 31 10:05:15 openvpn[1168]: Validating certificate key usage
  994. Jan 31 10:05:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  995. Jan 31 10:05:15 openvpn[1168]: VERIFY KU OK
  996. Jan 31 10:05:15 openvpn[1168]: Validating certificate extended key usage
  997. Jan 31 10:05:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  998. Jan 31 10:05:15 openvpn[1168]: VERIFY EKU OK
  999. Jan 31 10:05:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=5835f8b1ec9fd01ec93fd82eb2200e03, name=5835f8b1ec9fd01ec93fd82eb2200e03
  1000. Jan 31 10:05:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1001. Jan 31 10:05:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1002. Jan 31 10:05:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1003. Jan 31 10:05:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1004. Jan 31 10:05:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1005. Jan 31 10:05:18 openvpn[1168]: [5835f8b1ec9fd01ec93fd82eb2200e03] Peer Connection Initiated with [AF_INET]46.166.188.209:1197
  1006. Jan 31 10:05:20 openvpn[1168]: SENT CONTROL [5835f8b1ec9fd01ec93fd82eb2200e03]: 'PUSH_REQUEST' (status=1)
  1007. Jan 31 10:05:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.4.10.1,topology net30,ifconfig 10.4.10.6 10.4.10.5'
  1008. Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1009. Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1010. Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1011. Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: route options modified
  1012. Jan 31 10:05:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1013. Jan 31 10:05:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1014. Jan 31 10:05:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1015. Jan 31 10:05:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
  1016. Jan 31 10:05:21 openvpn-routing: Configuring policy rules for client 1
  1017. Jan 31 10:05:21 openvpn-routing: Removing rule 10001 from routing policy
  1018. Jan 31 10:05:21 openvpn-routing: Removing rule 10002 from routing policy
  1019. Jan 31 10:05:21 openvpn-routing: Removing rule 10003 from routing policy
  1020. Jan 31 10:05:22 openvpn-routing: Removing rule 10004 from routing policy
  1021. Jan 31 10:05:22 openvpn-routing: Removing rule 10005 from routing policy
  1022. Jan 31 10:05:22 openvpn-routing: Removing rule 10006 from routing policy
  1023. Jan 31 10:05:22 openvpn-routing: Removing rule 10007 from routing policy
  1024. Jan 31 10:05:22 openvpn-routing: Removing rule 10008 from routing policy
  1025. Jan 31 10:05:22 openvpn-routing: Removing rule 10009 from routing policy
  1026. Jan 31 10:05:22 openvpn-routing: Removing rule 10010 from routing policy
  1027. Jan 31 10:05:22 openvpn-routing: Removing rule 10011 from routing policy
  1028. Jan 31 10:05:22 openvpn-routing: Removing rule 10101 from routing policy
  1029. Jan 31 10:05:22 openvpn-routing: Removing rule 10102 from routing policy
  1030. Jan 31 10:05:22 openvpn-routing: Removing rule 10103 from routing policy
  1031. Jan 31 10:05:22 openvpn-routing: Removing rule 10104 from routing policy
  1032. Jan 31 10:05:22 openvpn-routing: Flushing client routing table
  1033. Jan 31 10:05:22 openvpn-routing: Completed routing policy configuration for client 1
  1034. Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 10.37.10.1/32
  1035. Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1036. Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 46.166.188.239/32
  1037. Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1038. Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1039. Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1040. Jan 31 10:05:22 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1041. Jan 31 10:05:22 openvpn[1168]: Closing TUN/TAP interface
  1042. Jan 31 10:05:22 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.37.10.6 peer 10.37.10.5
  1043. Jan 31 10:05:22 openvpn[1168]: updown.sh tun11 1500 1570 10.37.10.6 10.37.10.5 init
  1044. Jan 31 10:05:23 rc_service: service 15554:notify_rc updateresolv
  1045. Jan 31 10:05:24 rc_service: service 15555:notify_rc restart_dnsmasq
  1046. Jan 31 10:05:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1047. Jan 31 10:05:24 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1048. Jan 31 10:05:25 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1049. Jan 31 10:05:26 openvpn[1168]: TUN/TAP device tun11 opened
  1050. Jan 31 10:05:26 openvpn[1168]: TUN/TAP TX queue length set to 100
  1051. Jan 31 10:05:26 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1052. Jan 31 10:05:26 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1053. Jan 31 10:05:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.4.10.6 peer 10.4.10.5
  1054. Jan 31 10:05:26 openvpn[1168]: updown.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
  1055. Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1056. Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1057. Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1058. Jan 31 10:05:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1059. Jan 31 10:05:28 rc_service: service 15739:notify_rc updateresolv
  1060. Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 46.166.188.209/32 via 60.226.64.1
  1061. Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.10.5
  1062. Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.10.5
  1063. Jan 31 10:05:30 openvpn[1168]: /usr/sbin/ip route add 10.4.10.1/32 via 10.4.10.5
  1064. Jan 31 10:05:31 openvpn-routing: Configuring policy rules for client 1
  1065. Jan 31 10:05:31 openvpn-routing: Creating VPN routing table
  1066. Jan 31 10:05:31 openvpn-routing: Removing route for 10.4.10.1 to tun11 from main routing table
  1067. Jan 31 10:05:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1068. Jan 31 10:05:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1069. Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1070. Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1071. Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1072. Jan 31 10:05:31 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1073. Jan 31 10:05:31 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1074. Jan 31 10:05:31 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1075. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1076. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1077. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1078. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1079. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1080. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1081. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1082. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1083. Jan 31 10:05:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1084. Jan 31 10:05:32 openvpn-routing: Completed routing policy configuration for client 1
  1085. Jan 31 10:05:32 openvpn[1168]: Initialization Sequence Completed
  1086. Jan 31 18:07:12 openvpn[1168]: [5835f8b1ec9fd01ec93fd82eb2200e03] Inactivity timeout (--ping-restart), restarting
  1087. Jan 31 18:07:12 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1088. Jan 31 18:07:12 openvpn[1168]: Restart pause, 2 second(s)
  1089. Jan 31 18:07:14 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1090. Jan 31 18:07:14 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1091. Jan 31 18:07:15 openvpn[1168]: UDPv4 link local: [undef]
  1092. Jan 31 18:07:15 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.220:1197
  1093. Jan 31 18:07:15 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.220:1197, sid=cb0ae980 8077a490
  1094. Jan 31 18:07:15 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1095. Jan 31 18:07:15 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1096. Jan 31 18:07:15 openvpn[1168]: Validating certificate key usage
  1097. Jan 31 18:07:15 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1098. Jan 31 18:07:15 openvpn[1168]: VERIFY KU OK
  1099. Jan 31 18:07:15 openvpn[1168]: Validating certificate extended key usage
  1100. Jan 31 18:07:15 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1101. Jan 31 18:07:15 openvpn[1168]: VERIFY EKU OK
  1102. Jan 31 18:07:15 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=a7557f3ab52e83fab21f23653f1a64d8, name=a7557f3ab52e83fab21f23653f1a64d8
  1103. Jan 31 18:07:18 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1104. Jan 31 18:07:18 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1105. Jan 31 18:07:18 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1106. Jan 31 18:07:18 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1107. Jan 31 18:07:18 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1108. Jan 31 18:07:18 openvpn[1168]: [a7557f3ab52e83fab21f23653f1a64d8] Peer Connection Initiated with [AF_INET]46.166.188.220:1197
  1109. Jan 31 18:07:21 openvpn[1168]: SENT CONTROL [a7557f3ab52e83fab21f23653f1a64d8]: 'PUSH_REQUEST' (status=1)
  1110. Jan 31 18:07:21 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.40.10.1,topology net30,ifconfig 10.40.10.6 10.40.10.5'
  1111. Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1112. Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1113. Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1114. Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: route options modified
  1115. Jan 31 18:07:21 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1116. Jan 31 18:07:21 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1117. Jan 31 18:07:21 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1118. Jan 31 18:07:21 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
  1119. Jan 31 18:07:22 openvpn-routing: Configuring policy rules for client 1
  1120. Jan 31 18:07:22 openvpn-routing: Removing rule 10001 from routing policy
  1121. Jan 31 18:07:22 openvpn-routing: Removing rule 10002 from routing policy
  1122. Jan 31 18:07:22 openvpn-routing: Removing rule 10003 from routing policy
  1123. Jan 31 18:07:22 openvpn-routing: Removing rule 10004 from routing policy
  1124. Jan 31 18:07:22 openvpn-routing: Removing rule 10005 from routing policy
  1125. Jan 31 18:07:22 openvpn-routing: Removing rule 10006 from routing policy
  1126. Jan 31 18:07:22 openvpn-routing: Removing rule 10007 from routing policy
  1127. Jan 31 18:07:22 openvpn-routing: Removing rule 10008 from routing policy
  1128. Jan 31 18:07:22 openvpn-routing: Removing rule 10009 from routing policy
  1129. Jan 31 18:07:22 openvpn-routing: Removing rule 10010 from routing policy
  1130. Jan 31 18:07:23 openvpn-routing: Removing rule 10011 from routing policy
  1131. Jan 31 18:07:23 openvpn-routing: Removing rule 10101 from routing policy
  1132. Jan 31 18:07:23 openvpn-routing: Removing rule 10102 from routing policy
  1133. Jan 31 18:07:23 openvpn-routing: Removing rule 10103 from routing policy
  1134. Jan 31 18:07:23 openvpn-routing: Removing rule 10104 from routing policy
  1135. Jan 31 18:07:23 openvpn-routing: Flushing client routing table
  1136. Jan 31 18:07:23 openvpn-routing: Completed routing policy configuration for client 1
  1137. Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 10.4.10.1/32
  1138. Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1139. Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 46.166.188.209/32
  1140. Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1141. Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1142. Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1143. Jan 31 18:07:23 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1144. Jan 31 18:07:23 openvpn[1168]: Closing TUN/TAP interface
  1145. Jan 31 18:07:23 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.4.10.6 peer 10.4.10.5
  1146. Jan 31 18:07:23 openvpn[1168]: updown.sh tun11 1500 1570 10.4.10.6 10.4.10.5 init
  1147. Jan 31 18:07:24 rc_service: service 16366:notify_rc updateresolv
  1148. Jan 31 18:07:24 rc_service: service 16367:notify_rc restart_dnsmasq
  1149. Jan 31 18:07:24 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1150. Jan 31 18:07:25 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1151. Jan 31 18:07:25 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1152. Jan 31 18:07:26 openvpn[1168]: TUN/TAP device tun11 opened
  1153. Jan 31 18:07:26 openvpn[1168]: TUN/TAP TX queue length set to 100
  1154. Jan 31 18:07:26 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1155. Jan 31 18:07:26 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1156. Jan 31 18:07:26 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.40.10.6 peer 10.40.10.5
  1157. Jan 31 18:07:26 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  1158. Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1159. Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1160. Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1161. Jan 31 18:07:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1162. Jan 31 18:07:28 rc_service: service 16551:notify_rc updateresolv
  1163. Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 46.166.188.220/32 via 60.226.64.1
  1164. Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.40.10.5
  1165. Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.40.10.5
  1166. Jan 31 18:07:31 openvpn[1168]: /usr/sbin/ip route add 10.40.10.1/32 via 10.40.10.5
  1167. Jan 31 18:07:31 openvpn-routing: Configuring policy rules for client 1
  1168. Jan 31 18:07:31 openvpn-routing: Creating VPN routing table
  1169. Jan 31 18:07:31 openvpn-routing: Removing route for 10.40.10.1 to tun11 from main routing table
  1170. Jan 31 18:07:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1171. Jan 31 18:07:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1172. Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1173. Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1174. Jan 31 18:07:31 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1175. Jan 31 18:07:32 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1176. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1177. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1178. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1179. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1180. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1181. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1182. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1183. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1184. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1185. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1186. Jan 31 18:07:32 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1187. Jan 31 18:07:32 openvpn-routing: Completed routing policy configuration for client 1
  1188. Jan 31 18:07:32 openvpn[1168]: Initialization Sequence Completed
  1189. Jan 31 20:00:25 ntp: start NTP update
  1190. Feb 1 02:09:09 openvpn[1168]: [a7557f3ab52e83fab21f23653f1a64d8] Inactivity timeout (--ping-restart), restarting
  1191. Feb 1 02:09:09 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1192. Feb 1 02:09:09 openvpn[1168]: Restart pause, 2 second(s)
  1193. Feb 1 02:09:11 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1194. Feb 1 02:09:11 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1195. Feb 1 02:09:11 openvpn[1168]: UDPv4 link local: [undef]
  1196. Feb 1 02:09:11 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.152.226:1197
  1197. Feb 1 02:09:11 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.152.226:1197, sid=b6e826cb e38353b5
  1198. Feb 1 02:09:11 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1199. Feb 1 02:09:11 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1200. Feb 1 02:09:11 openvpn[1168]: Validating certificate key usage
  1201. Feb 1 02:09:11 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1202. Feb 1 02:09:11 openvpn[1168]: VERIFY KU OK
  1203. Feb 1 02:09:11 openvpn[1168]: Validating certificate extended key usage
  1204. Feb 1 02:09:11 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1205. Feb 1 02:09:11 openvpn[1168]: VERIFY EKU OK
  1206. Feb 1 02:09:11 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=237dce7889fc9a964f36f065f7e6cd4e, name=237dce7889fc9a964f36f065f7e6cd4e
  1207. Feb 1 02:09:15 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1208. Feb 1 02:09:15 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1209. Feb 1 02:09:15 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1210. Feb 1 02:09:15 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1211. Feb 1 02:09:15 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1212. Feb 1 02:09:15 openvpn[1168]: [237dce7889fc9a964f36f065f7e6cd4e] Peer Connection Initiated with [AF_INET]109.201.152.226:1197
  1213. Feb 1 02:09:17 openvpn[1168]: SENT CONTROL [237dce7889fc9a964f36f065f7e6cd4e]: 'PUSH_REQUEST' (status=1)
  1214. Feb 1 02:09:17 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.11.10.1,topology net30,ifconfig 10.11.10.6 10.11.10.5'
  1215. Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1216. Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1217. Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1218. Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: route options modified
  1219. Feb 1 02:09:17 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1220. Feb 1 02:09:17 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1221. Feb 1 02:09:17 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1222. Feb 1 02:09:17 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  1223. Feb 1 02:09:17 openvpn-routing: Configuring policy rules for client 1
  1224. Feb 1 02:09:18 openvpn-routing: Removing rule 10001 from routing policy
  1225. Feb 1 02:09:18 openvpn-routing: Removing rule 10002 from routing policy
  1226. Feb 1 02:09:18 openvpn-routing: Removing rule 10003 from routing policy
  1227. Feb 1 02:09:18 openvpn-routing: Removing rule 10004 from routing policy
  1228. Feb 1 02:09:18 openvpn-routing: Removing rule 10005 from routing policy
  1229. Feb 1 02:09:18 openvpn-routing: Removing rule 10006 from routing policy
  1230. Feb 1 02:09:18 openvpn-routing: Removing rule 10007 from routing policy
  1231. Feb 1 02:09:18 openvpn-routing: Removing rule 10008 from routing policy
  1232. Feb 1 02:09:18 openvpn-routing: Removing rule 10009 from routing policy
  1233. Feb 1 02:09:18 openvpn-routing: Removing rule 10010 from routing policy
  1234. Feb 1 02:09:18 openvpn-routing: Removing rule 10011 from routing policy
  1235. Feb 1 02:09:18 openvpn-routing: Removing rule 10101 from routing policy
  1236. Feb 1 02:09:18 openvpn-routing: Removing rule 10102 from routing policy
  1237. Feb 1 02:09:18 openvpn-routing: Removing rule 10103 from routing policy
  1238. Feb 1 02:09:19 openvpn-routing: Removing rule 10104 from routing policy
  1239. Feb 1 02:09:19 openvpn-routing: Flushing client routing table
  1240. Feb 1 02:09:19 openvpn-routing: Completed routing policy configuration for client 1
  1241. Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 10.40.10.1/32
  1242. Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1243. Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 46.166.188.220/32
  1244. Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1245. Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1246. Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1247. Feb 1 02:09:19 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1248. Feb 1 02:09:19 openvpn[1168]: Closing TUN/TAP interface
  1249. Feb 1 02:09:19 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.40.10.6 peer 10.40.10.5
  1250. Feb 1 02:09:19 openvpn[1168]: updown.sh tun11 1500 1570 10.40.10.6 10.40.10.5 init
  1251. Feb 1 02:09:20 rc_service: service 17177:notify_rc updateresolv
  1252. Feb 1 02:09:20 rc_service: service 17178:notify_rc restart_dnsmasq
  1253. Feb 1 02:09:20 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1254. Feb 1 02:09:20 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1255. Feb 1 02:09:20 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1256. Feb 1 02:09:21 openvpn[1168]: TUN/TAP device tun11 opened
  1257. Feb 1 02:09:21 openvpn[1168]: TUN/TAP TX queue length set to 100
  1258. Feb 1 02:09:21 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1259. Feb 1 02:09:21 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1260. Feb 1 02:09:22 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.11.10.6 peer 10.11.10.5
  1261. Feb 1 02:09:22 openvpn[1168]: updown.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
  1262. Feb 1 02:09:22 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1263. Feb 1 02:09:22 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1264. Feb 1 02:09:23 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1265. Feb 1 02:09:23 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1266. Feb 1 02:09:24 rc_service: service 17362:notify_rc updateresolv
  1267. Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 109.201.152.226/32 via 60.226.64.1
  1268. Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.11.10.5
  1269. Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.11.10.5
  1270. Feb 1 02:09:26 openvpn[1168]: /usr/sbin/ip route add 10.11.10.1/32 via 10.11.10.5
  1271. Feb 1 02:09:27 openvpn-routing: Configuring policy rules for client 1
  1272. Feb 1 02:09:27 openvpn-routing: Creating VPN routing table
  1273. Feb 1 02:09:27 openvpn-routing: Removing route for 10.11.10.1 to tun11 from main routing table
  1274. Feb 1 02:09:27 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1275. Feb 1 02:09:27 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1276. Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1277. Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1278. Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1279. Feb 1 02:09:27 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1280. Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1281. Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1282. Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1283. Feb 1 02:09:27 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1284. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1285. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1286. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1287. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1288. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1289. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1290. Feb 1 02:09:28 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1291. Feb 1 02:09:28 openvpn-routing: Completed routing policy configuration for client 1
  1292. Feb 1 02:09:28 openvpn[1168]: Initialization Sequence Completed
  1293. Feb 1 08:00:25 ntp: start NTP update
  1294. Feb 1 10:18:06 openvpn[1168]: [237dce7889fc9a964f36f065f7e6cd4e] Inactivity timeout (--ping-restart), restarting
  1295. Feb 1 10:18:06 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1296. Feb 1 10:18:06 openvpn[1168]: Restart pause, 2 second(s)
  1297. Feb 1 10:18:08 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1298. Feb 1 10:18:08 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1299. Feb 1 10:18:08 openvpn[1168]: UDPv4 link local: [undef]
  1300. Feb 1 10:18:08 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.221:1197
  1301. Feb 1 10:18:09 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.221:1197, sid=2c86272d a5298454
  1302. Feb 1 10:18:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1303. Feb 1 10:18:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1304. Feb 1 10:18:09 openvpn[1168]: Validating certificate key usage
  1305. Feb 1 10:18:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1306. Feb 1 10:18:09 openvpn[1168]: VERIFY KU OK
  1307. Feb 1 10:18:09 openvpn[1168]: Validating certificate extended key usage
  1308. Feb 1 10:18:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1309. Feb 1 10:18:09 openvpn[1168]: VERIFY EKU OK
  1310. Feb 1 10:18:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=fd3b30e31762ee4eaddb35639543e5a2, name=fd3b30e31762ee4eaddb35639543e5a2
  1311. Feb 1 10:18:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1312. Feb 1 10:18:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1313. Feb 1 10:18:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1314. Feb 1 10:18:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1315. Feb 1 10:18:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1316. Feb 1 10:18:12 openvpn[1168]: [fd3b30e31762ee4eaddb35639543e5a2] Peer Connection Initiated with [AF_INET]46.166.137.221:1197
  1317. Feb 1 10:18:14 openvpn[1168]: SENT CONTROL [fd3b30e31762ee4eaddb35639543e5a2]: 'PUSH_REQUEST' (status=1)
  1318. Feb 1 10:18:15 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.20.10.1,topology net30,ifconfig 10.20.10.6 10.20.10.5'
  1319. Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1320. Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1321. Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1322. Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: route options modified
  1323. Feb 1 10:18:15 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1324. Feb 1 10:18:15 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1325. Feb 1 10:18:15 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1326. Feb 1 10:18:15 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
  1327. Feb 1 10:18:15 openvpn-routing: Configuring policy rules for client 1
  1328. Feb 1 10:18:15 openvpn-routing: Removing rule 10001 from routing policy
  1329. Feb 1 10:18:15 openvpn-routing: Removing rule 10002 from routing policy
  1330. Feb 1 10:18:15 openvpn-routing: Removing rule 10003 from routing policy
  1331. Feb 1 10:18:16 openvpn-routing: Removing rule 10004 from routing policy
  1332. Feb 1 10:18:16 openvpn-routing: Removing rule 10005 from routing policy
  1333. Feb 1 10:18:16 openvpn-routing: Removing rule 10006 from routing policy
  1334. Feb 1 10:18:16 openvpn-routing: Removing rule 10007 from routing policy
  1335. Feb 1 10:18:16 openvpn-routing: Removing rule 10008 from routing policy
  1336. Feb 1 10:18:16 openvpn-routing: Removing rule 10009 from routing policy
  1337. Feb 1 10:18:16 openvpn-routing: Removing rule 10010 from routing policy
  1338. Feb 1 10:18:16 openvpn-routing: Removing rule 10011 from routing policy
  1339. Feb 1 10:18:16 openvpn-routing: Removing rule 10101 from routing policy
  1340. Feb 1 10:18:16 openvpn-routing: Removing rule 10102 from routing policy
  1341. Feb 1 10:18:16 openvpn-routing: Removing rule 10103 from routing policy
  1342. Feb 1 10:18:16 openvpn-routing: Removing rule 10104 from routing policy
  1343. Feb 1 10:18:16 openvpn-routing: Flushing client routing table
  1344. Feb 1 10:18:16 openvpn-routing: Completed routing policy configuration for client 1
  1345. Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 10.11.10.1/32
  1346. Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1347. Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 109.201.152.226/32
  1348. Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1349. Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1350. Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1351. Feb 1 10:18:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1352. Feb 1 10:18:16 openvpn[1168]: Closing TUN/TAP interface
  1353. Feb 1 10:18:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.11.10.6 peer 10.11.10.5
  1354. Feb 1 10:18:16 openvpn[1168]: updown.sh tun11 1500 1570 10.11.10.6 10.11.10.5 init
  1355. Feb 1 10:18:17 rc_service: service 17992:notify_rc updateresolv
  1356. Feb 1 10:18:17 rc_service: service 17993:notify_rc restart_dnsmasq
  1357. Feb 1 10:18:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1358. Feb 1 10:18:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1359. Feb 1 10:18:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1360. Feb 1 10:18:19 openvpn[1168]: TUN/TAP device tun11 opened
  1361. Feb 1 10:18:19 openvpn[1168]: TUN/TAP TX queue length set to 100
  1362. Feb 1 10:18:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1363. Feb 1 10:18:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1364. Feb 1 10:18:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.20.10.6 peer 10.20.10.5
  1365. Feb 1 10:18:19 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  1366. Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1367. Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1368. Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1369. Feb 1 10:18:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1370. Feb 1 10:18:21 rc_service: service 18177:notify_rc updateresolv
  1371. Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 46.166.137.221/32 via 60.226.64.1
  1372. Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.20.10.5
  1373. Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.20.10.5
  1374. Feb 1 10:18:24 openvpn[1168]: /usr/sbin/ip route add 10.20.10.1/32 via 10.20.10.5
  1375. Feb 1 10:18:24 openvpn-routing: Configuring policy rules for client 1
  1376. Feb 1 10:18:24 openvpn-routing: Creating VPN routing table
  1377. Feb 1 10:18:24 openvpn-routing: Removing route for 10.20.10.1 to tun11 from main routing table
  1378. Feb 1 10:18:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1379. Feb 1 10:18:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1380. Feb 1 10:18:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1381. Feb 1 10:18:24 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1382. Feb 1 10:18:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1383. Feb 1 10:18:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1384. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1385. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1386. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1387. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1388. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1389. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1390. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1391. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1392. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1393. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1394. Feb 1 10:18:25 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1395. Feb 1 10:18:26 openvpn-routing: Completed routing policy configuration for client 1
  1396. Feb 1 10:18:26 openvpn[1168]: Initialization Sequence Completed
  1397. Feb 1 18:20:00 openvpn[1168]: [fd3b30e31762ee4eaddb35639543e5a2] Inactivity timeout (--ping-restart), restarting
  1398. Feb 1 18:20:00 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1399. Feb 1 18:20:00 openvpn[1168]: Restart pause, 2 second(s)
  1400. Feb 1 18:20:02 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1401. Feb 1 18:20:02 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1402. Feb 1 18:20:02 openvpn[1168]: UDPv4 link local: [undef]
  1403. Feb 1 18:20:02 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.188.201:1197
  1404. Feb 1 18:20:02 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.188.201:1197, sid=cf040fab 5f4478d2
  1405. Feb 1 18:20:03 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1406. Feb 1 18:20:03 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1407. Feb 1 18:20:03 openvpn[1168]: Validating certificate key usage
  1408. Feb 1 18:20:03 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1409. Feb 1 18:20:03 openvpn[1168]: VERIFY KU OK
  1410. Feb 1 18:20:03 openvpn[1168]: Validating certificate extended key usage
  1411. Feb 1 18:20:03 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1412. Feb 1 18:20:03 openvpn[1168]: VERIFY EKU OK
  1413. Feb 1 18:20:03 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f065e2da53b248387311e7569f9bf0d9, name=f065e2da53b248387311e7569f9bf0d9
  1414. Feb 1 18:20:06 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1415. Feb 1 18:20:06 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1416. Feb 1 18:20:06 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1417. Feb 1 18:20:06 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1418. Feb 1 18:20:06 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1419. Feb 1 18:20:06 openvpn[1168]: [f065e2da53b248387311e7569f9bf0d9] Peer Connection Initiated with [AF_INET]46.166.188.201:1197
  1420. Feb 1 18:20:08 openvpn[1168]: SENT CONTROL [f065e2da53b248387311e7569f9bf0d9]: 'PUSH_REQUEST' (status=1)
  1421. Feb 1 18:20:08 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.51.10.1,topology net30,ifconfig 10.51.10.6 10.51.10.5'
  1422. Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1423. Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1424. Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1425. Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: route options modified
  1426. Feb 1 18:20:08 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1427. Feb 1 18:20:08 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1428. Feb 1 18:20:08 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1429. Feb 1 18:20:08 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  1430. Feb 1 18:20:09 openvpn-routing: Configuring policy rules for client 1
  1431. Feb 1 18:20:09 openvpn-routing: Removing rule 10001 from routing policy
  1432. Feb 1 18:20:09 openvpn-routing: Removing rule 10002 from routing policy
  1433. Feb 1 18:20:09 openvpn-routing: Removing rule 10003 from routing policy
  1434. Feb 1 18:20:09 openvpn-routing: Removing rule 10004 from routing policy
  1435. Feb 1 18:20:09 openvpn-routing: Removing rule 10005 from routing policy
  1436. Feb 1 18:20:10 openvpn-routing: Removing rule 10006 from routing policy
  1437. Feb 1 18:20:10 openvpn-routing: Removing rule 10007 from routing policy
  1438. Feb 1 18:20:10 openvpn-routing: Removing rule 10008 from routing policy
  1439. Feb 1 18:20:10 openvpn-routing: Removing rule 10009 from routing policy
  1440. Feb 1 18:20:10 openvpn-routing: Removing rule 10010 from routing policy
  1441. Feb 1 18:20:10 openvpn-routing: Removing rule 10011 from routing policy
  1442. Feb 1 18:20:10 openvpn-routing: Removing rule 10101 from routing policy
  1443. Feb 1 18:20:10 openvpn-routing: Removing rule 10102 from routing policy
  1444. Feb 1 18:20:10 openvpn-routing: Removing rule 10103 from routing policy
  1445. Feb 1 18:20:10 openvpn-routing: Removing rule 10104 from routing policy
  1446. Feb 1 18:20:10 openvpn-routing: Flushing client routing table
  1447. Feb 1 18:20:10 openvpn-routing: Completed routing policy configuration for client 1
  1448. Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 10.20.10.1/32
  1449. Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1450. Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 46.166.137.221/32
  1451. Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1452. Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1453. Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1454. Feb 1 18:20:10 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1455. Feb 1 18:20:10 openvpn[1168]: Closing TUN/TAP interface
  1456. Feb 1 18:20:10 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.20.10.6 peer 10.20.10.5
  1457. Feb 1 18:20:10 openvpn[1168]: updown.sh tun11 1500 1570 10.20.10.6 10.20.10.5 init
  1458. Feb 1 18:20:11 rc_service: service 18804:notify_rc updateresolv
  1459. Feb 1 18:20:12 rc_service: service 18805:notify_rc restart_dnsmasq
  1460. Feb 1 18:20:12 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1461. Feb 1 18:20:12 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1462. Feb 1 18:20:12 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1463. Feb 1 18:20:13 openvpn[1168]: TUN/TAP device tun11 opened
  1464. Feb 1 18:20:13 openvpn[1168]: TUN/TAP TX queue length set to 100
  1465. Feb 1 18:20:13 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1466. Feb 1 18:20:13 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1467. Feb 1 18:20:14 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.51.10.6 peer 10.51.10.5
  1468. Feb 1 18:20:14 openvpn[1168]: updown.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
  1469. Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1470. Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1471. Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1472. Feb 1 18:20:14 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1473. Feb 1 18:20:16 rc_service: service 18989:notify_rc updateresolv
  1474. Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 46.166.188.201/32 via 60.226.64.1
  1475. Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.51.10.5
  1476. Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.51.10.5
  1477. Feb 1 18:20:18 openvpn[1168]: /usr/sbin/ip route add 10.51.10.1/32 via 10.51.10.5
  1478. Feb 1 18:20:19 openvpn-routing: Configuring policy rules for client 1
  1479. Feb 1 18:20:19 openvpn-routing: Creating VPN routing table
  1480. Feb 1 18:20:19 openvpn-routing: Removing route for 10.51.10.1 to tun11 from main routing table
  1481. Feb 1 18:20:19 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1482. Feb 1 18:20:19 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1483. Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1484. Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1485. Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1486. Feb 1 18:20:19 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1487. Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1488. Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1489. Feb 1 18:20:19 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1490. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1491. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1492. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1493. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1494. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1495. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1496. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1497. Feb 1 18:20:20 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1498. Feb 1 18:20:20 openvpn-routing: Completed routing policy configuration for client 1
  1499. Feb 1 18:20:20 openvpn[1168]: Initialization Sequence Completed
  1500. Feb 1 19:09:06 openvpn[1168]: [f065e2da53b248387311e7569f9bf0d9] Inactivity timeout (--ping-restart), restarting
  1501. Feb 1 19:09:06 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1502. Feb 1 19:09:06 openvpn[1168]: Restart pause, 2 second(s)
  1503. Feb 1 19:09:08 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1504. Feb 1 19:09:08 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1505. Feb 1 19:09:08 openvpn[1168]: UDPv4 link local: [undef]
  1506. Feb 1 19:09:08 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.227:1197
  1507. Feb 1 19:09:08 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.227:1197, sid=3db2d896 6862839e
  1508. Feb 1 19:09:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1509. Feb 1 19:09:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1510. Feb 1 19:09:09 openvpn[1168]: Validating certificate key usage
  1511. Feb 1 19:09:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1512. Feb 1 19:09:09 openvpn[1168]: VERIFY KU OK
  1513. Feb 1 19:09:09 openvpn[1168]: Validating certificate extended key usage
  1514. Feb 1 19:09:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1515. Feb 1 19:09:09 openvpn[1168]: VERIFY EKU OK
  1516. Feb 1 19:09:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=826204f33bf831019b3d4123ef9781a8, name=826204f33bf831019b3d4123ef9781a8
  1517. Feb 1 19:09:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1518. Feb 1 19:09:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1519. Feb 1 19:09:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1520. Feb 1 19:09:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1521. Feb 1 19:09:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1522. Feb 1 19:09:12 openvpn[1168]: [826204f33bf831019b3d4123ef9781a8] Peer Connection Initiated with [AF_INET]46.166.190.227:1197
  1523. Feb 1 19:09:14 openvpn[1168]: SENT CONTROL [826204f33bf831019b3d4123ef9781a8]: 'PUSH_REQUEST' (status=1)
  1524. Feb 1 19:09:14 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.0.10.1,topology net30,ifconfig 10.0.10.10 10.0.10.9'
  1525. Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1526. Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1527. Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1528. Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: route options modified
  1529. Feb 1 19:09:14 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1530. Feb 1 19:09:14 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1531. Feb 1 19:09:14 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1532. Feb 1 19:09:14 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
  1533. Feb 1 19:09:15 openvpn-routing: Configuring policy rules for client 1
  1534. Feb 1 19:09:15 openvpn-routing: Removing rule 10001 from routing policy
  1535. Feb 1 19:09:15 openvpn-routing: Removing rule 10002 from routing policy
  1536. Feb 1 19:09:15 openvpn-routing: Removing rule 10003 from routing policy
  1537. Feb 1 19:09:15 openvpn-routing: Removing rule 10004 from routing policy
  1538. Feb 1 19:09:15 openvpn-routing: Removing rule 10005 from routing policy
  1539. Feb 1 19:09:15 openvpn-routing: Removing rule 10006 from routing policy
  1540. Feb 1 19:09:15 openvpn-routing: Removing rule 10007 from routing policy
  1541. Feb 1 19:09:15 openvpn-routing: Removing rule 10008 from routing policy
  1542. Feb 1 19:09:16 openvpn-routing: Removing rule 10009 from routing policy
  1543. Feb 1 19:09:16 openvpn-routing: Removing rule 10010 from routing policy
  1544. Feb 1 19:09:16 openvpn-routing: Removing rule 10011 from routing policy
  1545. Feb 1 19:09:16 openvpn-routing: Removing rule 10101 from routing policy
  1546. Feb 1 19:09:16 openvpn-routing: Removing rule 10102 from routing policy
  1547. Feb 1 19:09:16 openvpn-routing: Removing rule 10103 from routing policy
  1548. Feb 1 19:09:16 openvpn-routing: Removing rule 10104 from routing policy
  1549. Feb 1 19:09:16 openvpn-routing: Flushing client routing table
  1550. Feb 1 19:09:16 openvpn-routing: Completed routing policy configuration for client 1
  1551. Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 10.51.10.1/32
  1552. Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1553. Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 46.166.188.201/32
  1554. Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1555. Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1556. Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1557. Feb 1 19:09:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1558. Feb 1 19:09:16 openvpn[1168]: Closing TUN/TAP interface
  1559. Feb 1 19:09:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.51.10.6 peer 10.51.10.5
  1560. Feb 1 19:09:16 openvpn[1168]: updown.sh tun11 1500 1570 10.51.10.6 10.51.10.5 init
  1561. Feb 1 19:09:17 rc_service: service 19424:notify_rc updateresolv
  1562. Feb 1 19:09:18 rc_service: service 19425:notify_rc restart_dnsmasq
  1563. Feb 1 19:09:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1564. Feb 1 19:09:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1565. Feb 1 19:09:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1566. Feb 1 19:09:19 openvpn[1168]: TUN/TAP device tun11 opened
  1567. Feb 1 19:09:19 openvpn[1168]: TUN/TAP TX queue length set to 100
  1568. Feb 1 19:09:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1569. Feb 1 19:09:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1570. Feb 1 19:09:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.0.10.10 peer 10.0.10.9
  1571. Feb 1 19:09:19 openvpn[1168]: updown.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
  1572. Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1573. Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1574. Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1575. Feb 1 19:09:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1576. Feb 1 19:09:21 rc_service: service 19609:notify_rc updateresolv
  1577. Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 46.166.190.227/32 via 60.226.64.1
  1578. Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.0.10.9
  1579. Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.0.10.9
  1580. Feb 1 19:09:24 openvpn[1168]: /usr/sbin/ip route add 10.0.10.1/32 via 10.0.10.9
  1581. Feb 1 19:09:24 openvpn-routing: Configuring policy rules for client 1
  1582. Feb 1 19:09:24 openvpn-routing: Creating VPN routing table
  1583. Feb 1 19:09:24 openvpn-routing: Removing route for 10.0.10.1 to tun11 from main routing table
  1584. Feb 1 19:09:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1585. Feb 1 19:09:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1586. Feb 1 19:09:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1587. Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1588. Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1589. Feb 1 19:09:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1590. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1591. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1592. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1593. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1594. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1595. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1596. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1597. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1598. Feb 1 19:09:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1599. Feb 1 19:09:26 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1600. Feb 1 19:09:26 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1601. Feb 1 19:09:26 openvpn-routing: Completed routing policy configuration for client 1
  1602. Feb 1 19:09:26 openvpn[1168]: Initialization Sequence Completed
  1603. Feb 1 20:00:23 ntp: start NTP update
  1604. Feb 2 03:11:07 openvpn[1168]: [826204f33bf831019b3d4123ef9781a8] Inactivity timeout (--ping-restart), restarting
  1605. Feb 2 03:11:07 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1606. Feb 2 03:11:07 openvpn[1168]: Restart pause, 2 second(s)
  1607. Feb 2 03:11:09 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1608. Feb 2 03:11:09 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1609. Feb 2 03:11:09 openvpn[1168]: UDPv4 link local: [undef]
  1610. Feb 2 03:11:09 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.214:1197
  1611. Feb 2 03:11:09 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.214:1197, sid=5080ef59 7eb5f34a
  1612. Feb 2 03:11:09 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1613. Feb 2 03:11:09 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1614. Feb 2 03:11:09 openvpn[1168]: Validating certificate key usage
  1615. Feb 2 03:11:09 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1616. Feb 2 03:11:09 openvpn[1168]: VERIFY KU OK
  1617. Feb 2 03:11:09 openvpn[1168]: Validating certificate extended key usage
  1618. Feb 2 03:11:09 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1619. Feb 2 03:11:09 openvpn[1168]: VERIFY EKU OK
  1620. Feb 2 03:11:09 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=7fcde3616172a98cb920042ced73e882, name=7fcde3616172a98cb920042ced73e882
  1621. Feb 2 03:11:12 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1622. Feb 2 03:11:12 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1623. Feb 2 03:11:12 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1624. Feb 2 03:11:12 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1625. Feb 2 03:11:12 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1626. Feb 2 03:11:12 openvpn[1168]: [7fcde3616172a98cb920042ced73e882] Peer Connection Initiated with [AF_INET]46.166.186.214:1197
  1627. Feb 2 03:11:15 openvpn[1168]: SENT CONTROL [7fcde3616172a98cb920042ced73e882]: 'PUSH_REQUEST' (status=1)
  1628. Feb 2 03:11:15 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.42.10.1,topology net30,ifconfig 10.42.10.6 10.42.10.5'
  1629. Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1630. Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1631. Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1632. Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: route options modified
  1633. Feb 2 03:11:15 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1634. Feb 2 03:11:15 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1635. Feb 2 03:11:15 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1636. Feb 2 03:11:15 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
  1637. Feb 2 03:11:15 openvpn-routing: Configuring policy rules for client 1
  1638. Feb 2 03:11:15 openvpn-routing: Removing rule 10001 from routing policy
  1639. Feb 2 03:11:15 openvpn-routing: Removing rule 10002 from routing policy
  1640. Feb 2 03:11:15 openvpn-routing: Removing rule 10003 from routing policy
  1641. Feb 2 03:11:15 openvpn-routing: Removing rule 10004 from routing policy
  1642. Feb 2 03:11:16 openvpn-routing: Removing rule 10005 from routing policy
  1643. Feb 2 03:11:16 openvpn-routing: Removing rule 10006 from routing policy
  1644. Feb 2 03:11:16 openvpn-routing: Removing rule 10007 from routing policy
  1645. Feb 2 03:11:16 openvpn-routing: Removing rule 10008 from routing policy
  1646. Feb 2 03:11:16 openvpn-routing: Removing rule 10009 from routing policy
  1647. Feb 2 03:11:16 openvpn-routing: Removing rule 10010 from routing policy
  1648. Feb 2 03:11:16 openvpn-routing: Removing rule 10011 from routing policy
  1649. Feb 2 03:11:16 openvpn-routing: Removing rule 10101 from routing policy
  1650. Feb 2 03:11:16 openvpn-routing: Removing rule 10102 from routing policy
  1651. Feb 2 03:11:16 openvpn-routing: Removing rule 10103 from routing policy
  1652. Feb 2 03:11:16 openvpn-routing: Removing rule 10104 from routing policy
  1653. Feb 2 03:11:16 openvpn-routing: Flushing client routing table
  1654. Feb 2 03:11:16 openvpn-routing: Completed routing policy configuration for client 1
  1655. Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 10.0.10.1/32
  1656. Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1657. Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 46.166.190.227/32
  1658. Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1659. Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1660. Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1661. Feb 2 03:11:16 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1662. Feb 2 03:11:16 openvpn[1168]: Closing TUN/TAP interface
  1663. Feb 2 03:11:16 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.0.10.10 peer 10.0.10.9
  1664. Feb 2 03:11:16 openvpn[1168]: updown.sh tun11 1500 1570 10.0.10.10 10.0.10.9 init
  1665. Feb 2 03:11:17 rc_service: service 20240:notify_rc updateresolv
  1666. Feb 2 03:11:17 rc_service: service 20241:notify_rc restart_dnsmasq
  1667. Feb 2 03:11:17 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1668. Feb 2 03:11:18 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1669. Feb 2 03:11:18 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1670. Feb 2 03:11:19 openvpn[1168]: TUN/TAP device tun11 opened
  1671. Feb 2 03:11:19 openvpn[1168]: TUN/TAP TX queue length set to 100
  1672. Feb 2 03:11:19 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1673. Feb 2 03:11:19 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1674. Feb 2 03:11:19 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.42.10.6 peer 10.42.10.5
  1675. Feb 2 03:11:19 openvpn[1168]: updown.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
  1676. Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1677. Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1678. Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1679. Feb 2 03:11:20 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1680. Feb 2 03:11:21 rc_service: service 20425:notify_rc updateresolv
  1681. Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 46.166.186.214/32 via 60.226.64.1
  1682. Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.42.10.5
  1683. Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.42.10.5
  1684. Feb 2 03:11:24 openvpn[1168]: /usr/sbin/ip route add 10.42.10.1/32 via 10.42.10.5
  1685. Feb 2 03:11:24 openvpn-routing: Configuring policy rules for client 1
  1686. Feb 2 03:11:24 openvpn-routing: Creating VPN routing table
  1687. Feb 2 03:11:24 openvpn-routing: Removing route for 10.42.10.1 to tun11 from main routing table
  1688. Feb 2 03:11:24 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1689. Feb 2 03:11:24 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1690. Feb 2 03:11:24 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1691. Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1692. Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1693. Feb 2 03:11:25 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1694. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1695. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1696. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1697. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1698. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1699. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1700. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1701. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1702. Feb 2 03:11:25 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1703. Feb 2 03:11:26 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1704. Feb 2 03:11:26 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1705. Feb 2 03:11:26 openvpn-routing: Completed routing policy configuration for client 1
  1706. Feb 2 03:11:26 openvpn[1168]: Initialization Sequence Completed
  1707. Feb 2 08:00:21 ntp: start NTP update
  1708. Feb 2 11:13:05 openvpn[1168]: [7fcde3616172a98cb920042ced73e882] Inactivity timeout (--ping-restart), restarting
  1709. Feb 2 11:13:05 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1710. Feb 2 11:13:05 openvpn[1168]: Restart pause, 2 second(s)
  1711. Feb 2 11:13:07 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1712. Feb 2 11:13:07 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1713. Feb 2 11:13:07 openvpn[1168]: UDPv4 link local: [undef]
  1714. Feb 2 11:13:07 openvpn[1168]: UDPv4 link remote: [AF_INET]109.201.154.176:1197
  1715. Feb 2 11:13:07 openvpn[1168]: TLS: Initial packet from [AF_INET]109.201.154.176:1197, sid=9a40c905 793a399a
  1716. Feb 2 11:13:07 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1717. Feb 2 11:13:07 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1718. Feb 2 11:13:07 openvpn[1168]: Validating certificate key usage
  1719. Feb 2 11:13:07 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1720. Feb 2 11:13:07 openvpn[1168]: VERIFY KU OK
  1721. Feb 2 11:13:07 openvpn[1168]: Validating certificate extended key usage
  1722. Feb 2 11:13:07 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1723. Feb 2 11:13:07 openvpn[1168]: VERIFY EKU OK
  1724. Feb 2 11:13:07 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=cea746126e54b708370ac7ac18bc4e90, name=cea746126e54b708370ac7ac18bc4e90
  1725. Feb 2 11:13:10 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1726. Feb 2 11:13:10 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1727. Feb 2 11:13:10 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1728. Feb 2 11:13:10 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1729. Feb 2 11:13:10 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1730. Feb 2 11:13:10 openvpn[1168]: [cea746126e54b708370ac7ac18bc4e90] Peer Connection Initiated with [AF_INET]109.201.154.176:1197
  1731. Feb 2 11:13:12 openvpn[1168]: SENT CONTROL [cea746126e54b708370ac7ac18bc4e90]: 'PUSH_REQUEST' (status=1)
  1732. Feb 2 11:13:13 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.2.10.1,topology net30,ifconfig 10.2.10.10 10.2.10.9'
  1733. Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1734. Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1735. Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1736. Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: route options modified
  1737. Feb 2 11:13:13 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1738. Feb 2 11:13:13 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1739. Feb 2 11:13:13 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1740. Feb 2 11:13:13 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
  1741. Feb 2 11:13:13 openvpn-routing: Configuring policy rules for client 1
  1742. Feb 2 11:13:14 openvpn-routing: Removing rule 10001 from routing policy
  1743. Feb 2 11:13:14 openvpn-routing: Removing rule 10002 from routing policy
  1744. Feb 2 11:13:14 openvpn-routing: Removing rule 10003 from routing policy
  1745. Feb 2 11:13:14 openvpn-routing: Removing rule 10004 from routing policy
  1746. Feb 2 11:13:14 openvpn-routing: Removing rule 10005 from routing policy
  1747. Feb 2 11:13:14 openvpn-routing: Removing rule 10006 from routing policy
  1748. Feb 2 11:13:14 openvpn-routing: Removing rule 10007 from routing policy
  1749. Feb 2 11:13:14 openvpn-routing: Removing rule 10008 from routing policy
  1750. Feb 2 11:13:14 openvpn-routing: Removing rule 10009 from routing policy
  1751. Feb 2 11:13:14 openvpn-routing: Removing rule 10010 from routing policy
  1752. Feb 2 11:13:14 openvpn-routing: Removing rule 10011 from routing policy
  1753. Feb 2 11:13:14 openvpn-routing: Removing rule 10101 from routing policy
  1754. Feb 2 11:13:14 openvpn-routing: Removing rule 10102 from routing policy
  1755. Feb 2 11:13:14 openvpn-routing: Removing rule 10103 from routing policy
  1756. Feb 2 11:13:14 openvpn-routing: Removing rule 10104 from routing policy
  1757. Feb 2 11:13:14 openvpn-routing: Flushing client routing table
  1758. Feb 2 11:13:14 openvpn-routing: Completed routing policy configuration for client 1
  1759. Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 10.42.10.1/32
  1760. Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1761. Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 46.166.186.214/32
  1762. Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1763. Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1764. Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1765. Feb 2 11:13:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1766. Feb 2 11:13:14 openvpn[1168]: Closing TUN/TAP interface
  1767. Feb 2 11:13:14 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.42.10.6 peer 10.42.10.5
  1768. Feb 2 11:13:14 openvpn[1168]: updown.sh tun11 1500 1570 10.42.10.6 10.42.10.5 init
  1769. Feb 2 11:13:15 rc_service: service 21194:notify_rc updateresolv
  1770. Feb 2 11:13:16 rc_service: service 21195:notify_rc restart_dnsmasq
  1771. Feb 2 11:13:16 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1772. Feb 2 11:13:17 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1773. Feb 2 11:13:17 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1774. Feb 2 11:13:18 openvpn[1168]: TUN/TAP device tun11 opened
  1775. Feb 2 11:13:18 openvpn[1168]: TUN/TAP TX queue length set to 100
  1776. Feb 2 11:13:18 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1777. Feb 2 11:13:18 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1778. Feb 2 11:13:18 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.2.10.10 peer 10.2.10.9
  1779. Feb 2 11:13:18 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
  1780. Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1781. Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1782. Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1783. Feb 2 11:13:19 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1784. Feb 2 11:13:20 rc_service: service 21379:notify_rc updateresolv
  1785. Feb 2 11:13:22 openvpn[1168]: /usr/sbin/ip route add 109.201.154.176/32 via 60.226.64.1
  1786. Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.2.10.9
  1787. Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.2.10.9
  1788. Feb 2 11:13:23 openvpn[1168]: /usr/sbin/ip route add 10.2.10.1/32 via 10.2.10.9
  1789. Feb 2 11:13:23 openvpn-routing: Configuring policy rules for client 1
  1790. Feb 2 11:13:23 openvpn-routing: Creating VPN routing table
  1791. Feb 2 11:13:23 openvpn-routing: Removing route for 10.2.10.1 to tun11 from main routing table
  1792. Feb 2 11:13:23 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1793. Feb 2 11:13:23 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1794. Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1795. Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1796. Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1797. Feb 2 11:13:23 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1798. Feb 2 11:13:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1799. Feb 2 11:13:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1800. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1801. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1802. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1803. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1804. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1805. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1806. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1807. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1808. Feb 2 11:13:24 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1809. Feb 2 11:13:24 openvpn-routing: Completed routing policy configuration for client 1
  1810. Feb 2 11:13:24 openvpn[1168]: Initialization Sequence Completed
  1811. Feb 2 19:15:03 openvpn[1168]: [cea746126e54b708370ac7ac18bc4e90] Inactivity timeout (--ping-restart), restarting
  1812. Feb 2 19:15:03 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1813. Feb 2 19:15:03 openvpn[1168]: Restart pause, 2 second(s)
  1814. Feb 2 19:15:05 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1815. Feb 2 19:15:05 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1816. Feb 2 19:15:05 openvpn[1168]: UDPv4 link local: [undef]
  1817. Feb 2 19:15:05 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.232:1197
  1818. Feb 2 19:15:05 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.232:1197, sid=ffe7cda7 bb7192b6
  1819. Feb 2 19:15:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1820. Feb 2 19:15:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1821. Feb 2 19:15:06 openvpn[1168]: Validating certificate key usage
  1822. Feb 2 19:15:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1823. Feb 2 19:15:06 openvpn[1168]: VERIFY KU OK
  1824. Feb 2 19:15:06 openvpn[1168]: Validating certificate extended key usage
  1825. Feb 2 19:15:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1826. Feb 2 19:15:06 openvpn[1168]: VERIFY EKU OK
  1827. Feb 2 19:15:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f0c9fac8c0ceb7aa64f2952318eb7423, name=f0c9fac8c0ceb7aa64f2952318eb7423
  1828. Feb 2 19:15:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1829. Feb 2 19:15:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1830. Feb 2 19:15:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1831. Feb 2 19:15:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1832. Feb 2 19:15:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1833. Feb 2 19:15:09 openvpn[1168]: [f0c9fac8c0ceb7aa64f2952318eb7423] Peer Connection Initiated with [AF_INET]46.166.186.232:1197
  1834. Feb 2 19:15:11 openvpn[1168]: SENT CONTROL [f0c9fac8c0ceb7aa64f2952318eb7423]: 'PUSH_REQUEST' (status=1)
  1835. Feb 2 19:15:11 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.66.10.1,topology net30,ifconfig 10.66.10.6 10.66.10.5'
  1836. Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1837. Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1838. Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1839. Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: route options modified
  1840. Feb 2 19:15:11 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1841. Feb 2 19:15:11 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1842. Feb 2 19:15:11 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1843. Feb 2 19:15:11 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
  1844. Feb 2 19:15:12 openvpn-routing: Configuring policy rules for client 1
  1845. Feb 2 19:15:12 openvpn-routing: Removing rule 10001 from routing policy
  1846. Feb 2 19:15:12 openvpn-routing: Removing rule 10002 from routing policy
  1847. Feb 2 19:15:12 openvpn-routing: Removing rule 10003 from routing policy
  1848. Feb 2 19:15:12 openvpn-routing: Removing rule 10004 from routing policy
  1849. Feb 2 19:15:12 openvpn-routing: Removing rule 10005 from routing policy
  1850. Feb 2 19:15:12 openvpn-routing: Removing rule 10006 from routing policy
  1851. Feb 2 19:15:13 openvpn-routing: Removing rule 10007 from routing policy
  1852. Feb 2 19:15:13 openvpn-routing: Removing rule 10008 from routing policy
  1853. Feb 2 19:15:13 openvpn-routing: Removing rule 10009 from routing policy
  1854. Feb 2 19:15:13 openvpn-routing: Removing rule 10010 from routing policy
  1855. Feb 2 19:15:13 openvpn-routing: Removing rule 10011 from routing policy
  1856. Feb 2 19:15:13 openvpn-routing: Removing rule 10101 from routing policy
  1857. Feb 2 19:15:13 openvpn-routing: Removing rule 10102 from routing policy
  1858. Feb 2 19:15:13 openvpn-routing: Removing rule 10103 from routing policy
  1859. Feb 2 19:15:13 openvpn-routing: Removing rule 10104 from routing policy
  1860. Feb 2 19:15:13 openvpn-routing: Flushing client routing table
  1861. Feb 2 19:15:13 openvpn-routing: Completed routing policy configuration for client 1
  1862. Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 10.2.10.1/32
  1863. Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1864. Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 109.201.154.176/32
  1865. Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1866. Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1867. Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1868. Feb 2 19:15:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1869. Feb 2 19:15:13 openvpn[1168]: Closing TUN/TAP interface
  1870. Feb 2 19:15:13 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.2.10.10 peer 10.2.10.9
  1871. Feb 2 19:15:13 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.10 10.2.10.9 init
  1872. Feb 2 19:15:14 rc_service: service 22007:notify_rc updateresolv
  1873. Feb 2 19:15:14 rc_service: service 22008:notify_rc restart_dnsmasq
  1874. Feb 2 19:15:14 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1875. Feb 2 19:15:15 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1876. Feb 2 19:15:15 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1877. Feb 2 19:15:16 openvpn[1168]: TUN/TAP device tun11 opened
  1878. Feb 2 19:15:16 openvpn[1168]: TUN/TAP TX queue length set to 100
  1879. Feb 2 19:15:16 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1880. Feb 2 19:15:16 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1881. Feb 2 19:15:16 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.66.10.6 peer 10.66.10.5
  1882. Feb 2 19:15:16 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  1883. Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1884. Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1885. Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1886. Feb 2 19:15:17 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1887. Feb 2 19:15:18 rc_service: service 22192:notify_rc updateresolv
  1888. Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 46.166.186.232/32 via 60.226.64.1
  1889. Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.66.10.5
  1890. Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.66.10.5
  1891. Feb 2 19:15:21 openvpn[1168]: /usr/sbin/ip route add 10.66.10.1/32 via 10.66.10.5
  1892. Feb 2 19:15:21 openvpn-routing: Configuring policy rules for client 1
  1893. Feb 2 19:15:21 openvpn-routing: Creating VPN routing table
  1894. Feb 2 19:15:21 openvpn-routing: Removing route for 10.66.10.1 to tun11 from main routing table
  1895. Feb 2 19:15:21 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  1896. Feb 2 19:15:21 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  1897. Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  1898. Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  1899. Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  1900. Feb 2 19:15:22 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  1901. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  1902. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  1903. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  1904. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  1905. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  1906. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  1907. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  1908. Feb 2 19:15:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  1909. Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  1910. Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  1911. Feb 2 19:15:23 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  1912. Feb 2 19:15:23 openvpn-routing: Completed routing policy configuration for client 1
  1913. Feb 2 19:15:23 openvpn[1168]: Initialization Sequence Completed
  1914. Feb 2 20:00:19 ntp: start NTP update
  1915. Feb 3 03:17:03 openvpn[1168]: [f0c9fac8c0ceb7aa64f2952318eb7423] Inactivity timeout (--ping-restart), restarting
  1916. Feb 3 03:17:03 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  1917. Feb 3 03:17:03 openvpn[1168]: Restart pause, 2 second(s)
  1918. Feb 3 03:17:05 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  1919. Feb 3 03:17:05 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  1920. Feb 3 03:17:05 openvpn[1168]: UDPv4 link local: [undef]
  1921. Feb 3 03:17:05 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.223:1197
  1922. Feb 3 03:17:06 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.223:1197, sid=6d20081c 7a4add69
  1923. Feb 3 03:17:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  1924. Feb 3 03:17:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  1925. Feb 3 03:17:06 openvpn[1168]: Validating certificate key usage
  1926. Feb 3 03:17:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  1927. Feb 3 03:17:06 openvpn[1168]: VERIFY KU OK
  1928. Feb 3 03:17:06 openvpn[1168]: Validating certificate extended key usage
  1929. Feb 3 03:17:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  1930. Feb 3 03:17:06 openvpn[1168]: VERIFY EKU OK
  1931. Feb 3 03:17:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=d08991d88aa94663f66b017ff5766e4b, name=d08991d88aa94663f66b017ff5766e4b
  1932. Feb 3 03:17:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1933. Feb 3 03:17:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1934. Feb 3 03:17:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1935. Feb 3 03:17:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  1936. Feb 3 03:17:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  1937. Feb 3 03:17:09 openvpn[1168]: [d08991d88aa94663f66b017ff5766e4b] Peer Connection Initiated with [AF_INET]46.166.137.223:1197
  1938. Feb 3 03:17:11 openvpn[1168]: SENT CONTROL [d08991d88aa94663f66b017ff5766e4b]: 'PUSH_REQUEST' (status=1)
  1939. Feb 3 03:17:11 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.28.10.1,topology net30,ifconfig 10.28.10.6 10.28.10.5'
  1940. Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  1941. Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  1942. Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  1943. Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: route options modified
  1944. Feb 3 03:17:11 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1945. Feb 3 03:17:11 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  1946. Feb 3 03:17:11 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  1947. Feb 3 03:17:11 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  1948. Feb 3 03:17:12 openvpn-routing: Configuring policy rules for client 1
  1949. Feb 3 03:17:12 openvpn-routing: Removing rule 10001 from routing policy
  1950. Feb 3 03:17:12 openvpn-routing: Removing rule 10002 from routing policy
  1951. Feb 3 03:17:12 openvpn-routing: Removing rule 10003 from routing policy
  1952. Feb 3 03:17:12 openvpn-routing: Removing rule 10004 from routing policy
  1953. Feb 3 03:17:12 openvpn-routing: Removing rule 10005 from routing policy
  1954. Feb 3 03:17:12 openvpn-routing: Removing rule 10006 from routing policy
  1955. Feb 3 03:17:13 openvpn-routing: Removing rule 10007 from routing policy
  1956. Feb 3 03:17:13 openvpn-routing: Removing rule 10008 from routing policy
  1957. Feb 3 03:17:13 openvpn-routing: Removing rule 10009 from routing policy
  1958. Feb 3 03:17:13 openvpn-routing: Removing rule 10010 from routing policy
  1959. Feb 3 03:17:13 openvpn-routing: Removing rule 10011 from routing policy
  1960. Feb 3 03:17:13 openvpn-routing: Removing rule 10101 from routing policy
  1961. Feb 3 03:17:13 openvpn-routing: Removing rule 10102 from routing policy
  1962. Feb 3 03:17:13 openvpn-routing: Removing rule 10103 from routing policy
  1963. Feb 3 03:17:13 openvpn-routing: Removing rule 10104 from routing policy
  1964. Feb 3 03:17:13 openvpn-routing: Flushing client routing table
  1965. Feb 3 03:17:13 openvpn-routing: Completed routing policy configuration for client 1
  1966. Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 10.66.10.1/32
  1967. Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1968. Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 46.166.186.232/32
  1969. Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  1970. Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1971. Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  1972. Feb 3 03:17:13 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  1973. Feb 3 03:17:13 openvpn[1168]: Closing TUN/TAP interface
  1974. Feb 3 03:17:13 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.66.10.6 peer 10.66.10.5
  1975. Feb 3 03:17:13 openvpn[1168]: updown.sh tun11 1500 1570 10.66.10.6 10.66.10.5 init
  1976. Feb 3 03:17:14 rc_service: service 22820:notify_rc updateresolv
  1977. Feb 3 03:17:14 rc_service: service 22821:notify_rc restart_dnsmasq
  1978. Feb 3 03:17:14 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  1979. Feb 3 03:17:15 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  1980. Feb 3 03:17:15 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  1981. Feb 3 03:17:16 openvpn[1168]: TUN/TAP device tun11 opened
  1982. Feb 3 03:17:16 openvpn[1168]: TUN/TAP TX queue length set to 100
  1983. Feb 3 03:17:16 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  1984. Feb 3 03:17:16 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  1985. Feb 3 03:17:16 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.28.10.6 peer 10.28.10.5
  1986. Feb 3 03:17:16 openvpn[1168]: updown.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
  1987. Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  1988. Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  1989. Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  1990. Feb 3 03:17:17 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  1991. Feb 3 03:17:18 rc_service: service 23005:notify_rc updateresolv
  1992. Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 46.166.137.223/32 via 60.226.64.1
  1993. Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.28.10.5
  1994. Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.28.10.5
  1995. Feb 3 03:17:21 openvpn[1168]: /usr/sbin/ip route add 10.28.10.1/32 via 10.28.10.5
  1996. Feb 3 03:17:21 openvpn-routing: Configuring policy rules for client 1
  1997. Feb 3 03:17:21 openvpn-routing: Creating VPN routing table
  1998. Feb 3 03:17:21 openvpn-routing: Removing route for 10.28.10.1 to tun11 from main routing table
  1999. Feb 3 03:17:21 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2000. Feb 3 03:17:21 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2001. Feb 3 03:17:21 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2002. Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2003. Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2004. Feb 3 03:17:22 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2005. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2006. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2007. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2008. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2009. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2010. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2011. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2012. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2013. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2014. Feb 3 03:17:22 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2015. Feb 3 03:17:23 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2016. Feb 3 03:17:23 openvpn-routing: Completed routing policy configuration for client 1
  2017. Feb 3 03:17:23 openvpn[1168]: Initialization Sequence Completed
  2018. Feb 3 08:00:17 ntp: start NTP update
  2019. Feb 3 11:19:04 openvpn[1168]: [d08991d88aa94663f66b017ff5766e4b] Inactivity timeout (--ping-restart), restarting
  2020. Feb 3 11:19:04 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  2021. Feb 3 11:19:04 openvpn[1168]: Restart pause, 2 second(s)
  2022. Feb 3 11:19:06 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  2023. Feb 3 11:19:06 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2024. Feb 3 11:19:06 openvpn[1168]: UDPv4 link local: [undef]
  2025. Feb 3 11:19:06 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.138.161:1197
  2026. Feb 3 11:19:06 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.138.161:1197, sid=a7505161 d89588b3
  2027. Feb 3 11:19:06 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  2028. Feb 3 11:19:06 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  2029. Feb 3 11:19:06 openvpn[1168]: Validating certificate key usage
  2030. Feb 3 11:19:06 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  2031. Feb 3 11:19:06 openvpn[1168]: VERIFY KU OK
  2032. Feb 3 11:19:06 openvpn[1168]: Validating certificate extended key usage
  2033. Feb 3 11:19:06 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  2034. Feb 3 11:19:06 openvpn[1168]: VERIFY EKU OK
  2035. Feb 3 11:19:06 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=b80d93afa23029065af8f8c064043989, name=b80d93afa23029065af8f8c064043989
  2036. Feb 3 11:19:09 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2037. Feb 3 11:19:09 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2038. Feb 3 11:19:09 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2039. Feb 3 11:19:09 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2040. Feb 3 11:19:09 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  2041. Feb 3 11:19:09 openvpn[1168]: [b80d93afa23029065af8f8c064043989] Peer Connection Initiated with [AF_INET]46.166.138.161:1197
  2042. Feb 3 11:19:12 openvpn[1168]: SENT CONTROL [b80d93afa23029065af8f8c064043989]: 'PUSH_REQUEST' (status=1)
  2043. Feb 3 11:19:12 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.2.10.1,topology net30,ifconfig 10.2.10.6 10.2.10.5'
  2044. Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  2045. Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  2046. Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  2047. Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: route options modified
  2048. Feb 3 11:19:12 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2049. Feb 3 11:19:12 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  2050. Feb 3 11:19:12 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  2051. Feb 3 11:19:12 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
  2052. Feb 3 11:19:13 openvpn-routing: Configuring policy rules for client 1
  2053. Feb 3 11:19:13 openvpn-routing: Removing rule 10001 from routing policy
  2054. Feb 3 11:19:13 openvpn-routing: Removing rule 10002 from routing policy
  2055. Feb 3 11:19:13 openvpn-routing: Removing rule 10003 from routing policy
  2056. Feb 3 11:19:13 openvpn-routing: Removing rule 10004 from routing policy
  2057. Feb 3 11:19:13 openvpn-routing: Removing rule 10005 from routing policy
  2058. Feb 3 11:19:13 openvpn-routing: Removing rule 10006 from routing policy
  2059. Feb 3 11:19:13 openvpn-routing: Removing rule 10007 from routing policy
  2060. Feb 3 11:19:13 openvpn-routing: Removing rule 10008 from routing policy
  2061. Feb 3 11:19:13 openvpn-routing: Removing rule 10009 from routing policy
  2062. Feb 3 11:19:13 openvpn-routing: Removing rule 10010 from routing policy
  2063. Feb 3 11:19:13 openvpn-routing: Removing rule 10011 from routing policy
  2064. Feb 3 11:19:13 openvpn-routing: Removing rule 10101 from routing policy
  2065. Feb 3 11:19:14 openvpn-routing: Removing rule 10102 from routing policy
  2066. Feb 3 11:19:14 openvpn-routing: Removing rule 10103 from routing policy
  2067. Feb 3 11:19:14 openvpn-routing: Removing rule 10104 from routing policy
  2068. Feb 3 11:19:14 openvpn-routing: Flushing client routing table
  2069. Feb 3 11:19:14 openvpn-routing: Completed routing policy configuration for client 1
  2070. Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 10.28.10.1/32
  2071. Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2072. Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 46.166.137.223/32
  2073. Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  2074. Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2075. Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  2076. Feb 3 11:19:14 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2077. Feb 3 11:19:14 openvpn[1168]: Closing TUN/TAP interface
  2078. Feb 3 11:19:14 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.28.10.6 peer 10.28.10.5
  2079. Feb 3 11:19:14 openvpn[1168]: updown.sh tun11 1500 1570 10.28.10.6 10.28.10.5 init
  2080. Feb 3 11:19:15 rc_service: service 23634:notify_rc updateresolv
  2081. Feb 3 11:19:15 rc_service: service 23635:notify_rc restart_dnsmasq
  2082. Feb 3 11:19:15 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  2083. Feb 3 11:19:16 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  2084. Feb 3 11:19:16 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  2085. Feb 3 11:19:17 openvpn[1168]: TUN/TAP device tun11 opened
  2086. Feb 3 11:19:17 openvpn[1168]: TUN/TAP TX queue length set to 100
  2087. Feb 3 11:19:17 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2088. Feb 3 11:19:17 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  2089. Feb 3 11:19:17 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.2.10.6 peer 10.2.10.5
  2090. Feb 3 11:19:17 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
  2091. Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  2092. Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  2093. Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  2094. Feb 3 11:19:18 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  2095. Feb 3 11:19:19 rc_service: service 23819:notify_rc updateresolv
  2096. Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 46.166.138.161/32 via 60.226.64.1
  2097. Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.2.10.5
  2098. Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.2.10.5
  2099. Feb 3 11:19:22 openvpn[1168]: /usr/sbin/ip route add 10.2.10.1/32 via 10.2.10.5
  2100. Feb 3 11:19:22 openvpn-routing: Configuring policy rules for client 1
  2101. Feb 3 11:19:22 openvpn-routing: Creating VPN routing table
  2102. Feb 3 11:19:22 openvpn-routing: Removing route for 10.2.10.1 to tun11 from main routing table
  2103. Feb 3 11:19:22 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2104. Feb 3 11:19:22 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2105. Feb 3 11:19:22 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2106. Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2107. Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2108. Feb 3 11:19:23 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2109. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2110. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2111. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2112. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2113. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2114. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2115. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2116. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2117. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2118. Feb 3 11:19:23 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2119. Feb 3 11:19:24 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2120. Feb 3 11:19:24 openvpn-routing: Completed routing policy configuration for client 1
  2121. Feb 3 11:19:24 openvpn[1168]: Initialization Sequence Completed
  2122. Feb 3 19:20:57 openvpn[1168]: [b80d93afa23029065af8f8c064043989] Inactivity timeout (--ping-restart), restarting
  2123. Feb 3 19:20:57 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  2124. Feb 3 19:20:57 openvpn[1168]: Restart pause, 2 second(s)
  2125. Feb 3 19:20:59 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  2126. Feb 3 19:20:59 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2127. Feb 3 19:21:00 openvpn[1168]: UDPv4 link local: [undef]
  2128. Feb 3 19:21:00 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.190.181:1197
  2129. Feb 3 19:21:00 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.190.181:1197, sid=c00a9f78 3e3e2cd7
  2130. Feb 3 19:21:00 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  2131. Feb 3 19:21:00 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  2132. Feb 3 19:21:00 openvpn[1168]: Validating certificate key usage
  2133. Feb 3 19:21:00 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  2134. Feb 3 19:21:00 openvpn[1168]: VERIFY KU OK
  2135. Feb 3 19:21:00 openvpn[1168]: Validating certificate extended key usage
  2136. Feb 3 19:21:00 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  2137. Feb 3 19:21:00 openvpn[1168]: VERIFY EKU OK
  2138. Feb 3 19:21:00 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e74d3ca8b512011f9c6a17cd33226de2, name=e74d3ca8b512011f9c6a17cd33226de2
  2139. Feb 3 19:21:03 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2140. Feb 3 19:21:03 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2141. Feb 3 19:21:03 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2142. Feb 3 19:21:03 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2143. Feb 3 19:21:03 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  2144. Feb 3 19:21:03 openvpn[1168]: [e74d3ca8b512011f9c6a17cd33226de2] Peer Connection Initiated with [AF_INET]46.166.190.181:1197
  2145. Feb 3 19:21:06 openvpn[1168]: SENT CONTROL [e74d3ca8b512011f9c6a17cd33226de2]: 'PUSH_REQUEST' (status=1)
  2146. Feb 3 19:21:06 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.24.10.1,topology net30,ifconfig 10.24.10.6 10.24.10.5'
  2147. Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  2148. Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  2149. Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  2150. Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: route options modified
  2151. Feb 3 19:21:06 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2152. Feb 3 19:21:06 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  2153. Feb 3 19:21:06 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  2154. Feb 3 19:21:06 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
  2155. Feb 3 19:21:06 openvpn-routing: Configuring policy rules for client 1
  2156. Feb 3 19:21:06 openvpn-routing: Removing rule 10001 from routing policy
  2157. Feb 3 19:21:06 openvpn-routing: Removing rule 10002 from routing policy
  2158. Feb 3 19:21:06 openvpn-routing: Removing rule 10003 from routing policy
  2159. Feb 3 19:21:06 openvpn-routing: Removing rule 10004 from routing policy
  2160. Feb 3 19:21:07 openvpn-routing: Removing rule 10005 from routing policy
  2161. Feb 3 19:21:07 openvpn-routing: Removing rule 10006 from routing policy
  2162. Feb 3 19:21:07 openvpn-routing: Removing rule 10007 from routing policy
  2163. Feb 3 19:21:07 openvpn-routing: Removing rule 10008 from routing policy
  2164. Feb 3 19:21:07 openvpn-routing: Removing rule 10009 from routing policy
  2165. Feb 3 19:21:07 openvpn-routing: Removing rule 10010 from routing policy
  2166. Feb 3 19:21:07 openvpn-routing: Removing rule 10011 from routing policy
  2167. Feb 3 19:21:07 openvpn-routing: Removing rule 10101 from routing policy
  2168. Feb 3 19:21:07 openvpn-routing: Removing rule 10102 from routing policy
  2169. Feb 3 19:21:07 openvpn-routing: Removing rule 10103 from routing policy
  2170. Feb 3 19:21:07 openvpn-routing: Removing rule 10104 from routing policy
  2171. Feb 3 19:21:07 openvpn-routing: Flushing client routing table
  2172. Feb 3 19:21:07 openvpn-routing: Completed routing policy configuration for client 1
  2173. Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 10.2.10.1/32
  2174. Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2175. Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 46.166.138.161/32
  2176. Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  2177. Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2178. Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  2179. Feb 3 19:21:07 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2180. Feb 3 19:21:07 openvpn[1168]: Closing TUN/TAP interface
  2181. Feb 3 19:21:07 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.2.10.6 peer 10.2.10.5
  2182. Feb 3 19:21:07 openvpn[1168]: updown.sh tun11 1500 1570 10.2.10.6 10.2.10.5 init
  2183. Feb 3 19:21:08 rc_service: service 24448:notify_rc updateresolv
  2184. Feb 3 19:21:09 rc_service: service 24449:notify_rc restart_dnsmasq
  2185. Feb 3 19:21:09 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  2186. Feb 3 19:21:09 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  2187. Feb 3 19:21:09 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  2188. Feb 3 19:21:10 openvpn[1168]: TUN/TAP device tun11 opened
  2189. Feb 3 19:21:10 openvpn[1168]: TUN/TAP TX queue length set to 100
  2190. Feb 3 19:21:10 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2191. Feb 3 19:21:10 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  2192. Feb 3 19:21:10 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.24.10.6 peer 10.24.10.5
  2193. Feb 3 19:21:10 openvpn[1168]: updown.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
  2194. Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  2195. Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  2196. Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  2197. Feb 3 19:21:11 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  2198. Feb 3 19:21:12 rc_service: service 24633:notify_rc updateresolv
  2199. Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 46.166.190.181/32 via 60.226.64.1
  2200. Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.24.10.5
  2201. Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.24.10.5
  2202. Feb 3 19:21:15 openvpn[1168]: /usr/sbin/ip route add 10.24.10.1/32 via 10.24.10.5
  2203. Feb 3 19:21:16 openvpn-routing: Configuring policy rules for client 1
  2204. Feb 3 19:21:16 openvpn-routing: Creating VPN routing table
  2205. Feb 3 19:21:16 openvpn-routing: Removing route for 10.24.10.1 to tun11 from main routing table
  2206. Feb 3 19:21:16 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2207. Feb 3 19:21:16 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2208. Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2209. Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2210. Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2211. Feb 3 19:21:16 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2212. Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2213. Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2214. Feb 3 19:21:16 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2215. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2216. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2217. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2218. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2219. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2220. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2221. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2222. Feb 3 19:21:17 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2223. Feb 3 19:21:17 openvpn-routing: Completed routing policy configuration for client 1
  2224. Feb 3 19:21:17 openvpn[1168]: Initialization Sequence Completed
  2225. Feb 3 20:00:15 ntp: start NTP update
  2226. Feb 4 03:22:52 openvpn[1168]: [e74d3ca8b512011f9c6a17cd33226de2] Inactivity timeout (--ping-restart), restarting
  2227. Feb 4 03:22:52 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  2228. Feb 4 03:22:52 openvpn[1168]: Restart pause, 2 second(s)
  2229. Feb 4 03:22:54 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  2230. Feb 4 03:22:54 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2231. Feb 4 03:22:54 openvpn[1168]: UDPv4 link local: [undef]
  2232. Feb 4 03:22:54 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.137.243:1197
  2233. Feb 4 03:22:55 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.137.243:1197, sid=c3ac0bee fa4510cc
  2234. Feb 4 03:22:55 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  2235. Feb 4 03:22:55 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  2236. Feb 4 03:22:55 openvpn[1168]: Validating certificate key usage
  2237. Feb 4 03:22:55 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  2238. Feb 4 03:22:55 openvpn[1168]: VERIFY KU OK
  2239. Feb 4 03:22:55 openvpn[1168]: Validating certificate extended key usage
  2240. Feb 4 03:22:55 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  2241. Feb 4 03:22:55 openvpn[1168]: VERIFY EKU OK
  2242. Feb 4 03:22:55 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=f74d6d45d247c56c4d71e2587a31f408, name=f74d6d45d247c56c4d71e2587a31f408
  2243. Feb 4 03:22:58 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2244. Feb 4 03:22:58 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2245. Feb 4 03:22:58 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2246. Feb 4 03:22:58 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2247. Feb 4 03:22:58 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  2248. Feb 4 03:22:58 openvpn[1168]: [f74d6d45d247c56c4d71e2587a31f408] Peer Connection Initiated with [AF_INET]46.166.137.243:1197
  2249. Feb 4 03:23:00 openvpn[1168]: SENT CONTROL [f74d6d45d247c56c4d71e2587a31f408]: 'PUSH_REQUEST' (status=1)
  2250. Feb 4 03:23:01 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.16.10.1,topology net30,ifconfig 10.16.10.6 10.16.10.5'
  2251. Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  2252. Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  2253. Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  2254. Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: route options modified
  2255. Feb 4 03:23:01 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2256. Feb 4 03:23:01 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  2257. Feb 4 03:23:01 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  2258. Feb 4 03:23:01 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
  2259. Feb 4 03:23:01 openvpn-routing: Configuring policy rules for client 1
  2260. Feb 4 03:23:01 openvpn-routing: Removing rule 10001 from routing policy
  2261. Feb 4 03:23:01 openvpn-routing: Removing rule 10002 from routing policy
  2262. Feb 4 03:23:01 openvpn-routing: Removing rule 10003 from routing policy
  2263. Feb 4 03:23:01 openvpn-routing: Removing rule 10004 from routing policy
  2264. Feb 4 03:23:02 openvpn-routing: Removing rule 10005 from routing policy
  2265. Feb 4 03:23:02 openvpn-routing: Removing rule 10006 from routing policy
  2266. Feb 4 03:23:02 openvpn-routing: Removing rule 10007 from routing policy
  2267. Feb 4 03:23:02 openvpn-routing: Removing rule 10008 from routing policy
  2268. Feb 4 03:23:02 openvpn-routing: Removing rule 10009 from routing policy
  2269. Feb 4 03:23:02 openvpn-routing: Removing rule 10010 from routing policy
  2270. Feb 4 03:23:02 openvpn-routing: Removing rule 10011 from routing policy
  2271. Feb 4 03:23:02 openvpn-routing: Removing rule 10101 from routing policy
  2272. Feb 4 03:23:02 openvpn-routing: Removing rule 10102 from routing policy
  2273. Feb 4 03:23:02 openvpn-routing: Removing rule 10103 from routing policy
  2274. Feb 4 03:23:02 openvpn-routing: Removing rule 10104 from routing policy
  2275. Feb 4 03:23:02 openvpn-routing: Flushing client routing table
  2276. Feb 4 03:23:02 openvpn-routing: Completed routing policy configuration for client 1
  2277. Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 10.24.10.1/32
  2278. Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2279. Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 46.166.190.181/32
  2280. Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  2281. Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2282. Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  2283. Feb 4 03:23:02 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2284. Feb 4 03:23:02 openvpn[1168]: Closing TUN/TAP interface
  2285. Feb 4 03:23:02 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.24.10.6 peer 10.24.10.5
  2286. Feb 4 03:23:02 openvpn[1168]: updown.sh tun11 1500 1570 10.24.10.6 10.24.10.5 init
  2287. Feb 4 03:23:03 rc_service: service 25263:notify_rc updateresolv
  2288. Feb 4 03:23:04 rc_service: service 25264:notify_rc restart_dnsmasq
  2289. Feb 4 03:23:04 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  2290. Feb 4 03:23:04 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  2291. Feb 4 03:23:04 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  2292. Feb 4 03:23:05 openvpn[1168]: TUN/TAP device tun11 opened
  2293. Feb 4 03:23:05 openvpn[1168]: TUN/TAP TX queue length set to 100
  2294. Feb 4 03:23:05 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2295. Feb 4 03:23:05 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  2296. Feb 4 03:23:06 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.16.10.6 peer 10.16.10.5
  2297. Feb 4 03:23:06 openvpn[1168]: updown.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
  2298. Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  2299. Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  2300. Feb 4 03:23:06 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  2301. Feb 4 03:23:07 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  2302. Feb 4 03:23:08 rc_service: service 25448:notify_rc updateresolv
  2303. Feb 4 03:23:10 openvpn[1168]: /usr/sbin/ip route add 46.166.137.243/32 via 60.226.64.1
  2304. Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.16.10.5
  2305. Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.16.10.5
  2306. Feb 4 03:23:11 openvpn[1168]: /usr/sbin/ip route add 10.16.10.1/32 via 10.16.10.5
  2307. Feb 4 03:23:11 openvpn-routing: Configuring policy rules for client 1
  2308. Feb 4 03:23:11 openvpn-routing: Creating VPN routing table
  2309. Feb 4 03:23:11 openvpn-routing: Removing route for 10.16.10.1 to tun11 from main routing table
  2310. Feb 4 03:23:11 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2311. Feb 4 03:23:11 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2312. Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2313. Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2314. Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2315. Feb 4 03:23:11 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2316. Feb 4 03:23:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2317. Feb 4 03:23:11 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2318. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2319. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2320. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2321. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2322. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2323. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2324. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2325. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2326. Feb 4 03:23:12 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2327. Feb 4 03:23:12 openvpn-routing: Completed routing policy configuration for client 1
  2328. Feb 4 03:23:12 openvpn[1168]: Initialization Sequence Completed
  2329. Feb 4 08:00:13 ntp: start NTP update
  2330. Feb 4 11:24:51 openvpn[1168]: [f74d6d45d247c56c4d71e2587a31f408] Inactivity timeout (--ping-restart), restarting
  2331. Feb 4 11:24:51 openvpn[1168]: SIGUSR1[soft,ping-restart] received, process restarting
  2332. Feb 4 11:24:51 openvpn[1168]: Restart pause, 2 second(s)
  2333. Feb 4 11:24:53 openvpn[1168]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  2334. Feb 4 11:24:53 openvpn[1168]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2335. Feb 4 11:24:53 openvpn[1168]: UDPv4 link local: [undef]
  2336. Feb 4 11:24:53 openvpn[1168]: UDPv4 link remote: [AF_INET]46.166.186.225:1197
  2337. Feb 4 11:24:54 openvpn[1168]: TLS: Initial packet from [AF_INET]46.166.186.225:1197, sid=adaae46d 27715e9c
  2338. Feb 4 11:24:54 openvpn[1168]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  2339. Feb 4 11:24:54 openvpn[1168]: VERIFY OK: nsCertType=SERVER
  2340. Feb 4 11:24:54 openvpn[1168]: Validating certificate key usage
  2341. Feb 4 11:24:54 openvpn[1168]: ++ Certificate has key usage 00a0, expects 00a0
  2342. Feb 4 11:24:54 openvpn[1168]: VERIFY KU OK
  2343. Feb 4 11:24:54 openvpn[1168]: Validating certificate extended key usage
  2344. Feb 4 11:24:54 openvpn[1168]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  2345. Feb 4 11:24:54 openvpn[1168]: VERIFY EKU OK
  2346. Feb 4 11:24:54 openvpn[1168]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=acede04be2333ca8ff1493afdb53a60d, name=acede04be2333ca8ff1493afdb53a60d
  2347. Feb 4 11:24:57 openvpn[1168]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2348. Feb 4 11:24:57 openvpn[1168]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2349. Feb 4 11:24:57 openvpn[1168]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2350. Feb 4 11:24:57 openvpn[1168]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2351. Feb 4 11:24:57 openvpn[1168]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  2352. Feb 4 11:24:57 openvpn[1168]: [acede04be2333ca8ff1493afdb53a60d] Peer Connection Initiated with [AF_INET]46.166.186.225:1197
  2353. Feb 4 11:25:00 openvpn[1168]: SENT CONTROL [acede04be2333ca8ff1493afdb53a60d]: 'PUSH_REQUEST' (status=1)
  2354. Feb 4 11:25:00 openvpn[1168]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.12.10.1,topology net30,ifconfig 10.12.10.6 10.12.10.5'
  2355. Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: timers and/or timeouts modified
  2356. Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: LZO parms modified
  2357. Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: --ifconfig/up options modified
  2358. Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: route options modified
  2359. Feb 4 11:25:00 openvpn[1168]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2360. Feb 4 11:25:00 openvpn[1168]: Preserving previous TUN/TAP instance: tun11
  2361. Feb 4 11:25:00 openvpn[1168]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  2362. Feb 4 11:25:00 openvpn[1168]: vpnrouting.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
  2363. Feb 4 11:25:00 openvpn-routing: Configuring policy rules for client 1
  2364. Feb 4 11:25:01 openvpn-routing: Removing rule 10001 from routing policy
  2365. Feb 4 11:25:01 openvpn-routing: Removing rule 10002 from routing policy
  2366. Feb 4 11:25:01 openvpn-routing: Removing rule 10003 from routing policy
  2367. Feb 4 11:25:01 openvpn-routing: Removing rule 10004 from routing policy
  2368. Feb 4 11:25:01 openvpn-routing: Removing rule 10005 from routing policy
  2369. Feb 4 11:25:01 openvpn-routing: Removing rule 10006 from routing policy
  2370. Feb 4 11:25:01 openvpn-routing: Removing rule 10007 from routing policy
  2371. Feb 4 11:25:01 openvpn-routing: Removing rule 10008 from routing policy
  2372. Feb 4 11:25:01 openvpn-routing: Removing rule 10009 from routing policy
  2373. Feb 4 11:25:01 openvpn-routing: Removing rule 10010 from routing policy
  2374. Feb 4 11:25:01 openvpn-routing: Removing rule 10011 from routing policy
  2375. Feb 4 11:25:01 openvpn-routing: Removing rule 10101 from routing policy
  2376. Feb 4 11:25:01 openvpn-routing: Removing rule 10102 from routing policy
  2377. Feb 4 11:25:01 openvpn-routing: Removing rule 10103 from routing policy
  2378. Feb 4 11:25:01 openvpn-routing: Removing rule 10104 from routing policy
  2379. Feb 4 11:25:01 openvpn-routing: Flushing client routing table
  2380. Feb 4 11:25:01 openvpn-routing: Completed routing policy configuration for client 1
  2381. Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 10.16.10.1/32
  2382. Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2383. Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 46.166.137.243/32
  2384. Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 0.0.0.0/1
  2385. Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2386. Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip route del 128.0.0.0/1
  2387. Feb 4 11:25:01 openvpn[1168]: ERROR: Linux route delete command failed: external program exited with error status: 2
  2388. Feb 4 11:25:01 openvpn[1168]: Closing TUN/TAP interface
  2389. Feb 4 11:25:01 openvpn[1168]: /usr/sbin/ip addr del dev tun11 local 10.16.10.6 peer 10.16.10.5
  2390. Feb 4 11:25:01 openvpn[1168]: updown.sh tun11 1500 1570 10.16.10.6 10.16.10.5 init
  2391. Feb 4 11:25:02 rc_service: service 26219:notify_rc updateresolv
  2392. Feb 4 11:25:03 rc_service: service 26220:notify_rc restart_dnsmasq
  2393. Feb 4 11:25:03 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  2394. Feb 4 11:25:03 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  2395. Feb 4 11:25:03 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  2396. Feb 4 11:25:04 openvpn[1168]: TUN/TAP device tun11 opened
  2397. Feb 4 11:25:04 openvpn[1168]: TUN/TAP TX queue length set to 100
  2398. Feb 4 11:25:04 openvpn[1168]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2399. Feb 4 11:25:04 openvpn[1168]: /usr/sbin/ip link set dev tun11 up mtu 1500
  2400. Feb 4 11:25:05 openvpn[1168]: /usr/sbin/ip addr add dev tun11 local 10.12.10.6 peer 10.12.10.5
  2401. Feb 4 11:25:05 openvpn[1168]: updown.sh tun11 1500 1570 10.12.10.6 10.12.10.5 init
  2402. Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  2403. Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  2404. Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  2405. Feb 4 11:25:05 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  2406. Feb 4 11:25:07 rc_service: service 26404:notify_rc updateresolv
  2407. Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 46.166.186.225/32 via 60.226.64.1
  2408. Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 0.0.0.0/1 via 10.12.10.5
  2409. Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 128.0.0.0/1 via 10.12.10.5
  2410. Feb 4 11:25:09 openvpn[1168]: /usr/sbin/ip route add 10.12.10.1/32 via 10.12.10.5
  2411. Feb 4 11:25:09 openvpn-routing: Configuring policy rules for client 1
  2412. Feb 4 11:25:10 openvpn-routing: Creating VPN routing table
  2413. Feb 4 11:25:10 openvpn-routing: Removing route for 10.12.10.1 to tun11 from main routing table
  2414. Feb 4 11:25:10 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2415. Feb 4 11:25:10 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2416. Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2417. Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2418. Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2419. Feb 4 11:25:10 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2420. Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2421. Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2422. Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2423. Feb 4 11:25:10 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2424. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2425. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2426. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2427. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2428. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2429. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2430. Feb 4 11:25:11 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2431. Feb 4 11:25:11 openvpn-routing: Completed routing policy configuration for client 1
  2432. Feb 4 11:25:11 openvpn[1168]: Initialization Sequence Completed
  2433. Feb 4 20:00:11 ntp: start NTP update
  2434. Feb 5 08:00:09 ntp: start NTP update
  2435. Feb 5 17:41:29 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
  2436. Feb 5 17:41:29 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
  2437. Feb 5 20:00:07 ntp: start NTP update
  2438. Feb 6 08:00:05 ntp: start NTP update
  2439. Feb 6 09:51:31 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
  2440. Feb 6 09:51:31 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
  2441. Feb 6 13:48:35 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
  2442. Feb 6 13:48:35 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
  2443. Feb 6 15:46:34 miniupnpd[1126]: remove port mapping 20806 TCP because it has expired
  2444. Feb 6 15:46:34 miniupnpd[1126]: remove port mapping 20806 UDP because it has expired
  2445. Feb 6 20:00:03 ntp: start NTP update
  2446. Aug 1 10:00:13 syslogd started: BusyBox v1.20.2
  2447. Aug 1 10:00:13 kernel: klogd started: BusyBox v1.20.2 (2017-01-07 19:19:06 EST)
  2448. Aug 1 10:00:13 kernel: Linux version 2.6.36.4brcmarm (merlin@ubuntu-dev) (gcc version 4.5.3 (Buildroot 2012.02) ) #3 SMP PREEMPT Sat Jan 7 19:33:39 EST 2017
  2449. Aug 1 10:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
  2450. Aug 1 10:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
  2451. Aug 1 10:00:13 kernel: Machine: Northstar Prototype
  2452. Aug 1 10:00:13 kernel: Ignoring unrecognised tag 0x00000000
  2453. Aug 1 10:00:13 kernel: bootconsole [earlycon0] enabled
  2454. Aug 1 10:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
  2455. Aug 1 10:00:13 kernel: MPCORE found at 19020000
  2456. Aug 1 10:00:13 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536
  2457. Aug 1 10:00:13 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096
  2458. Aug 1 10:00:13 kernel: pcpu-alloc: [0] 0 [0] 1
  2459. Aug 1 10:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
  2460. Aug 1 10:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
  2461. Aug 1 10:00:13 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes)
  2462. Aug 1 10:00:13 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
  2463. Aug 1 10:00:13 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
  2464. Aug 1 10:00:13 kernel: Memory: 128MB 128MB = 256MB total
  2465. Aug 1 10:00:13 kernel: Memory: 255488k/255488k available, 6656k reserved, 0K highmem
  2466. Aug 1 10:00:13 kernel: Virtual kernel memory layout:
  2467. Aug 1 10:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
  2468. Aug 1 10:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
  2469. Aug 1 10:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
  2470. Aug 1 10:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
  2471. Aug 1 10:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
  2472. Aug 1 10:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
  2473. Aug 1 10:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
  2474. Aug 1 10:00:13 kernel: .text : 0xc003d000 - 0xc03a9000 (3504 kB)
  2475. Aug 1 10:00:13 kernel: .data : 0xc03c0000 - 0xc03e32a0 ( 141 kB)
  2476. Aug 1 10:00:13 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
  2477. Aug 1 10:00:13 kernel: Hierarchical RCU implementation.
  2478. Aug 1 10:00:13 kernel: RCU-based detection of stalled CPUs is disabled.
  2479. Aug 1 10:00:13 kernel: Verbose stalled-CPUs detection is disabled.
  2480. Aug 1 10:00:13 kernel: NR_IRQS:256
  2481. Aug 1 10:00:13 kernel: MPCORE GIC init
  2482. Aug 1 10:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
  2483. Aug 1 10:00:14 kernel: MPCORE Global Timer Clock 400000000Hz
  2484. Aug 1 10:00:14 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008)
  2485. Aug 1 10:00:14 kernel: pid_max: default: 32768 minimum: 301
  2486. Aug 1 10:00:14 kernel: Mount-cache hash table entries: 512
  2487. Aug 1 10:00:14 kernel: CPU: Testing write buffer coherency: ok
  2488. Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU0
  2489. Aug 1 10:00:14 kernel: Calibrating local timer... 399.869MHz.
  2490. Aug 1 10:00:14 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000
  2491. Aug 1 10:00:14 kernel: CPU1: Booted secondary processor
  2492. Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU1
  2493. Aug 1 10:00:14 kernel: Brought up 2 CPUs
  2494. Aug 1 10:00:14 kernel: SMP: Total of 2 processors activated (3194.88 BogoMIPS).
  2495. Aug 1 10:00:14 kernel: devtmpfs: initialized
  2496. Aug 1 10:00:14 kernel: atomic64 test passed
  2497. Aug 1 10:00:14 kernel: NET: Registered protocol family 16
  2498. Aug 1 10:00:14 kernel: Found a AMD NAND flash:
  2499. Aug 1 10:00:14 kernel: Total size: 128MB
  2500. Aug 1 10:00:14 kernel: Block size: 128KB
  2501. Aug 1 10:00:14 kernel: Page Size: 2048B
  2502. Aug 1 10:00:14 kernel: OOB Size: 64B
  2503. Aug 1 10:00:14 kernel: Sector size: 512B
  2504. Aug 1 10:00:14 kernel: Spare size: 16B
  2505. Aug 1 10:00:14 kernel: ECC level: 8 (8-bit)
  2506. Aug 1 10:00:14 kernel: Device ID: 0x 1 0xf1 0x 0 0x1d 0x 1 0xf1
  2507. Aug 1 10:00:14 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48
  2508. Aug 1 10:00:14 kernel: CCA UART Clock rate 100000000Hz
  2509. Aug 1 10:00:14 kernel: bio: create slab <bio-0> at 0
  2510. Aug 1 10:00:14 kernel: Switching to clocksource mpcore_gtimer
  2511. Aug 1 10:00:14 kernel: NET: Registered protocol family 2
  2512. Aug 1 10:00:14 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes)
  2513. Aug 1 10:00:14 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes)
  2514. Aug 1 10:00:14 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes)
  2515. Aug 1 10:00:14 kernel: TCP: Hash tables configured (established 8192 bind 8192)
  2516. Aug 1 10:00:14 kernel: TCP reno registered
  2517. Aug 1 10:00:14 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes)
  2518. Aug 1 10:00:14 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes)
  2519. Aug 1 10:00:14 kernel: NET: Registered protocol family 1
  2520. Aug 1 10:00:14 kernel: PCI: no core
  2521. Aug 1 10:00:14 kernel: PCI: no core
  2522. Aug 1 10:00:14 kernel: PCI: scanning bus 0
  2523. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  2524. Aug 1 10:00:14 kernel: PCIE1 link=1
  2525. Aug 1 10:00:14 kernel: PCIE1 switching to GEN2
  2526. Aug 1 10:00:14 kernel: PCIE1 link=1
  2527. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  2528. Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
  2529. Aug 1 10:00:14 kernel: PCI: Fixing up bus 1
  2530. Aug 1 10:00:14 kernel: PCI: bus1: Fast back to back transfers disabled
  2531. Aug 1 10:00:14 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
  2532. Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
  2533. Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff]
  2534. Aug 1 10:00:14 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01]
  2535. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [io disabled]
  2536. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
  2537. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem pref disabled]
  2538. Aug 1 10:00:14 kernel: PCIE2 link=1
  2539. Aug 1 10:00:14 kernel: PCIE2 switching to GEN2
  2540. Aug 1 10:00:14 kernel: PCIE2 link=1
  2541. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  2542. Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
  2543. Aug 1 10:00:14 kernel: PCI: Fixing up bus 2
  2544. Aug 1 10:00:14 kernel: PCI: bus2: Fast back to back transfers disabled
  2545. Aug 1 10:00:14 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
  2546. Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit]
  2547. Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff]
  2548. Aug 1 10:00:14 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02]
  2549. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [io disabled]
  2550. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
  2551. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem pref disabled]
  2552. Aug 1 10:00:14 kernel: PCIE3 link=0
  2553. Aug 1 10:00:14 kernel: VFS: Disk quotas dquot_6.5.2
  2554. Aug 1 10:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
  2555. Aug 1 10:00:14 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
  2556. Aug 1 10:00:14 kernel: fuse init (API version 7.15)
  2557. Aug 1 10:00:14 kernel: msgmni has been set to 499
  2558. Aug 1 10:00:14 kernel: io scheduler noop registered (default)
  2559. Aug 1 10:00:14 kernel: io scheduler deadline registered
  2560. Aug 1 10:00:14 kernel: io scheduler cfq registered
  2561. Aug 1 10:00:14 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
  2562. Aug 1 10:00:14 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550
  2563. Aug 1 10:00:14 kernel: console [ttyS0] enabled, bootconsole disabled
  2564. Aug 1 10:00:14 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550
  2565. Aug 1 10:00:14 kernel: brd: module loaded
  2566. Aug 1 10:00:14 kernel: loop: module loaded
  2567. Aug 1 10:00:14 kernel: pflash: found no supported devices
  2568. Aug 1 10:00:14 kernel: bcmsflash: found no supported devices
  2569. Aug 1 10:00:14 kernel: Boot partition size = 524288(0x80000)
  2570. Aug 1 10:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
  2571. Aug 1 10:00:14 kernel: nflash: squash filesystem with lzma found at block 28
  2572. Aug 1 10:00:14 kernel: Creating 4 MTD partitions on "nflash":
  2573. Aug 1 10:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
  2574. Aug 1 10:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
  2575. Aug 1 10:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
  2576. Aug 1 10:00:14 kernel: 0x00000039d3d8-0x000004000000 : "rootfs"
  2577. Aug 1 10:00:14 kernel: PPP generic driver version 2.4.2
  2578. Aug 1 10:00:14 kernel: PPP MPPE Compression module registered
  2579. Aug 1 10:00:14 kernel: NET: Registered protocol family 24
  2580. Aug 1 10:00:14 kernel: PPTP driver version 0.8.5
  2581. Aug 1 10:00:14 kernel: Mirror/redirect action on
  2582. Aug 1 10:00:14 kernel: u32 classifier
  2583. Aug 1 10:00:14 kernel: Actions configured
  2584. Aug 1 10:00:14 kernel: Netfilter messages via NETLINK v0.30.
  2585. Aug 1 10:00:14 kernel: nf_conntrack version 0.5.0 (3992 buckets, 15968 max)
  2586. Aug 1 10:00:14 kernel: xt_time: kernel timezone is -0000
  2587. Aug 1 10:00:14 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
  2588. Aug 1 10:00:14 kernel: TCP cubic registered
  2589. Aug 1 10:00:14 kernel: NET: Registered protocol family 10
  2590. Aug 1 10:00:14 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
  2591. Aug 1 10:00:14 kernel: NET: Registered protocol family 17
  2592. Aug 1 10:00:15 kernel: L2TP core driver, V2.0
  2593. Aug 1 10:00:15 kernel: PPPoL2TP kernel driver, V2.0
  2594. Aug 1 10:00:15 kernel: 802.1Q VLAN Support v1.8 Ben Greear <greearb@candelatech.com>
  2595. Aug 1 10:00:15 kernel: All bugs added by David S. Miller <davem@redhat.com>
  2596. Aug 1 10:00:15 kernel: Registering the dns_resolver key type
  2597. Aug 1 10:00:15 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
  2598. Aug 1 10:00:15 kernel: NAND device: Manufacturer ID: 0x01, Chip ID: 0xf1 (AMD NAND 128MiB 3,3V 8-bit)
  2599. Aug 1 10:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
  2600. Aug 1 10:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
  2601. Aug 1 10:00:15 kernel: Available 7 bytes at (off,len):
  2602. Aug 1 10:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
  2603. Aug 1 10:00:15 kernel: Scanning device for bad blocks
  2604. Aug 1 10:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
  2605. Aug 1 10:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
  2606. Aug 1 10:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
  2607. Aug 1 10:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
  2608. Aug 1 10:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
  2609. Aug 1 10:00:15 kernel: devtmpfs: mounted
  2610. Aug 1 10:00:15 kernel: Freeing init memory: 212K
  2611. Aug 1 10:00:15 kernel: cfe_commit: do nothing
  2612. Aug 1 10:00:15 kernel: et: module license 'Proprietary' taints kernel.
  2613. Aug 1 10:00:15 kernel: Disabling lock debugging due to kernel taint
  2614. Aug 1 10:00:15 kernel: et_module_init: passivemode set to 0x0
  2615. Aug 1 10:00:15 kernel: et_module_init: txworkq set to 0x0
  2616. Aug 1 10:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
  2617. Aug 1 10:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
  2618. Aug 1 10:00:15 kernel: wl_module_init: passivemode set to 0x0
  2619. Aug 1 10:00:15 kernel: wl_module_init: igs set to 0x0
  2620. Aug 1 10:00:15 kernel: wl_module_init: txworkq set to 0x0
  2621. Aug 1 10:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  2622. Aug 1 10:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  2623. Aug 1 10:00:15 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
  2624. Aug 1 10:00:15 WAN Connection: ISP's DHCP did not function properly.
  2625. Aug 1 10:00:15 kernel: _ Reboot message ... _______________________________________________________
  2626. Aug 1 10:00:15 kernel: <1>Unable to handle kernel NULL pointer derefere�U�at virtual address 000000dc
  2627. Aug 1 10:00:15 kernel: <1>pgd = c0004000
  2628. Aug 1 10:00:15 kernel: <1>[000000dc] *pgds: 17 [#1] PREEMPT SMP
  2629. Aug 1 10:00:15 kernel: <0>last sread_ahead_kb
  2630. Aug 1 10:00:15 kernel: <4>module: tun bt_sip bf73a000 5031
  2631. Aug 1 10:00:15 kernel: <4>module: nf_conntrack_sip bf731000 15713
  2632. Aug 1 10:00:15 kernel: <4>module: nf_nat_h323 bf72a000 4761
  2633. Aug 1 10:00:15 kernel: <4>module: nf_conntdule: nf_nat_rtsp bf716000 32 bf710000 4067
  2634. Aug 1 10:00:15 kernel: <4>module: nf_nat_ftp bf70a000 1144
  2635. Aug 1 10:00:15 kernel: <4>module: nf_conntrack_ftp bf703000 4909
  2636. Aug 1 10:00:15 kernel: <4>module: ebt_mark bf6fd000 814
  2637. Aug 1 10:00:15 kernel: <4>module: ip6table_maebtable_nat bf6f1000 1056
  2638. Aug 1 10:00:15 kernel: <4>module: ebtables bf6e8000 15649000 10842
  2639. Aug 1 10:00:15 kernel: <4>module: cdrom bf6cc000 30901
  2640. Aug 1 10:00:15 kernel: <4>module: cdc_mbim bf6c6000 3129
  2641. Aug 1 10:00:15 kernel: <4>module: qmi_wwan bf6bf000 5780
  2642. Aug 1 10:00:15 kernel: <4>modu0 4936
  2643. Aug 1 10:00:15 kernel: <4>module: cdc_ether bmii bf68c000 3367
  2644. Aug 1 10:00:15 kernel: <4>module: usblp bf684000 10321
  2645. Aug 1 10:00:15 kernel: <4>module0 81793
  2646. Aug 1 10:00:15 kernel: <4>module: tntfs bf5d
  2647. Aug 1 10:00:15 kernel: <4>module: usb_storage bf4e5000 19855
  2648. Aug 1 10:00:15 kernel: <4>module: sd_mod bfe: scsi_mod bf4a3000 108738
  2649. Aug 1 10:00:15 dropbear[435]: Running in background
  2650. Aug 1 10:00:15 kernel: <1810
  2651. Aug 1 10:00:15 kernel: <4>module: ip6t_LOG bf479: wl bf027000 3991991
  2652. Aug 1 10:00:15 kernel: <4>module: igs bf01f000 11887
  2653. Aug 1 10:00:15 kernel: <4>modnntrack_rtsp nf_nat_ftp nf_conntcdc_wdm cdc_ncm rndis_host cdc_ether asix usbnet mii usblp ohci_fat(P) ext2 ext4 crc16 jbd2 ext3 jbd mbcache usb_storage sg sd_mod scsi_wait_scan scsi_mod usbco) emf(P) et(P) [last unloaded: nf_conntrack_ftp]
  2654. Aug 1 10:00:15 kernel: <4>CPU: 1 Tapdu+0x44/0x10c [wl]
  2655. Aug 1 10:00:15 kernel: ISA ARM Segment kernel
  2656. Aug 1 10:00:15 kernel: <4>Contr
  2657. Aug 1 10:00:15 kernel: ____________________________________________________________________________
  2658. Aug 1 10:00:15 kernel: device vlan1 entered promiscuous mode
  2659. Aug 1 10:00:15 kernel: device eth0 entered promiscuous mode
  2660. Aug 1 10:00:15 kernel: device eth1 entered promiscuous mode
  2661. Aug 1 10:00:15 kernel: device eth2 entered promiscuous mode
  2662. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  2663. Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
  2664. Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
  2665. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  2666. Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
  2667. Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
  2668. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  2669. Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
  2670. Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
  2671. Aug 1 10:00:18 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  2672. Aug 1 10:00:18 dnsmasq[450]: started, version 2.76 cachesize 1500
  2673. Aug 1 10:00:18 dnsmasq[450]: asynchronous logging enabled, queue limit is 5 messages
  2674. Aug 1 10:00:18 dnsmasq-dhcp[450]: DHCP, IP range 10.1.1.1 -- 10.1.1.254, lease time 1d
  2675. Aug 1 10:00:18 dnsmasq[450]: read /etc/hosts - 5 addresses
  2676. Aug 1 10:00:18 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  2677. Aug 1 10:00:18 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  2678. Aug 1 10:00:18 RT-AC68U: start httpd
  2679. Aug 1 10:00:19 crond[458]: crond: crond (busybox 1.20.2) started, log level 8
  2680. Aug 1 10:00:19 custom script: Running /jffs/scripts/services-start
  2681. Aug 1 10:00:19 jffs2: valid logs(1)
  2682. Aug 1 10:00:19 disk monitor: be idle
  2683. Aug 1 10:00:19 hour monitor: daemon is starting
  2684. Aug 1 10:00:19 hour monitor: daemon terminates
  2685. Aug 1 10:00:20 miniupnpd[529]: HTTP listening on port 37674
  2686. Aug 1 10:00:20 miniupnpd[529]: Listening for NAT-PMP/PCP traffic on port 5351
  2687. Aug 1 10:00:20 miniupnpd[529]: chain VUPNP not found
  2688. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
  2689. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  2690. Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  2691. Aug 1 10:00:20 kernel: usbcore: registered new interface driver usbfs
  2692. Aug 1 10:00:20 kernel: usbcore: registered new interface driver hub
  2693. Aug 1 10:00:20 kernel: usbcore: registered new device driver usb
  2694. Aug 1 10:00:20 syslog: module ledtrig-usbdev not found in modules.dep
  2695. Aug 1 10:00:20 syslog: module leds-usb not found in modules.dep
  2696. Aug 1 10:00:20 kernel: SCSI subsystem initialized
  2697. Aug 1 10:00:20 kernel: csw_retry 100
  2698. Aug 1 10:00:20 kernel: Initializing USB Mass Storage driver...
  2699. Aug 1 10:00:20 kernel: usbcore: registered new interface driver usb-storage
  2700. Aug 1 10:00:20 kernel: USB Mass Storage support registered.
  2701. Aug 1 10:00:20 rc_service: udhcpc 558:notify_rc start_firewall
  2702. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
  2703. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  2704. Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  2705. Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  2706. Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  2707. Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.1#53
  2708. Aug 1 10:00:20 dnsmasq[450]: using nameserver 61.9.211.33#53
  2709. Aug 1 10:00:20 wan: finish adding multi routes
  2710. Aug 1 10:00:21 rc_service: udhcpc 558:notify_rc stop_upnp
  2711. Aug 1 10:00:21 rc_service: waitting "start_firewall" via udhcpc ...
  2712. Aug 1 10:00:21 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE].
  2713. Aug 1 10:00:21 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Wed Dec 2 11:17:39 CST 2015 arm
  2714. Aug 1 10:00:21 kernel: Running on kernel 2.6.36.4brcmarm #3 SMP PREEMPT Sat Jan 7 19:33:39 EST 2017 armv7l
  2715. Aug 1 10:00:21 kernel: Tuxera NTFS driver 3015.1.29.8_1 [Flags: R/W MODULE].
  2716. Aug 1 10:00:21 kernel: Tuxera HFS+ driver 3014.7.28
  2717. Aug 1 10:00:21 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  2718. Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller
  2719. Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 1
  2720. Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000
  2721. Aug 1 10:00:21 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00
  2722. Aug 1 10:00:21 kernel: hub 1-0:1.0: USB hub found
  2723. Aug 1 10:00:21 kernel: hub 1-0:1.0: 2 ports detected
  2724. Aug 1 10:00:21 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
  2725. Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller
  2726. Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 2
  2727. Aug 1 10:00:21 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000
  2728. Aug 1 10:00:21 kernel: hub 2-0:1.0: USB hub found
  2729. Aug 1 10:00:21 kernel: hub 2-0:1.0: 2 ports detected
  2730. Aug 1 10:00:21 kernel: usbcore: registered new interface driver usblp
  2731. Aug 1 10:00:22 kernel: usbcore: registered new interface driver asix
  2732. Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_ether
  2733. Aug 1 10:00:22 kernel: usbcore: registered new interface driver rndis_host
  2734. Aug 1 10:00:22 kernel: usb 1-1: new high speed USB device using ehci_hcd and address 2
  2735. Aug 1 10:00:22 kernel: cdc_ncm: 14-Mar-2012
  2736. Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_ncm
  2737. Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_wdm
  2738. Aug 1 10:00:22 kernel: usbcore: registered new interface driver qmi_wwan
  2739. Aug 1 10:00:22 kernel: cdc_mbim: loaded
  2740. Aug 1 10:00:22 kernel: usbcore: registered new interface driver cdc_mbim
  2741. Aug 1 10:00:22 kernel: scsi0 : usb-storage 1-1:1.0
  2742. Aug 1 10:00:22 kernel: usb 1-2: new high speed USB device using ehci_hcd and address 3
  2743. Aug 1 10:00:22 kernel: scsi1 : usb-storage 1-2:1.0
  2744. Aug 1 10:00:23 kernel: scsi 0:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
  2745. Aug 1 10:00:23 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0
  2746. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
  2747. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Write Protect is off
  2748. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  2749. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  2750. Aug 1 10:00:23 kernel: sda: sda1
  2751. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  2752. Aug 1 10:00:23 kernel: sd 0:0:0:0: [sda] Attached SCSI removable disk
  2753. Aug 1 10:00:23 kernel: scsi 1:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
  2754. Aug 1 10:00:23 kernel: sd 1:0:0:0: Attached scsi generic sg1 type 0
  2755. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
  2756. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Write Protect is off
  2757. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  2758. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  2759. Aug 1 10:00:23 kernel: sdb: sdb1
  2760. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  2761. Aug 1 10:00:23 kernel: sd 1:0:0:0: [sdb] Attached SCSI removable disk
  2762. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  2763. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  2764. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  2765. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  2766. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2767. Aug 1 10:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2768. Aug 1 10:00:24 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  2769. Aug 1 10:00:25 WAN Connection: WAN was restored.
  2770. Aug 1 10:00:25 kernel: EXT3-fs: barriers not enabled
  2771. Aug 1 10:00:25 kernel: Ebtables v2.0 registered
  2772. Aug 1 10:00:25 kernel: xt_connbytes: Forcing CT accounting to be enabled
  2773. Aug 1 10:00:26 kernel: nf_conntrack_rtsp v0.6.21 loading
  2774. Aug 1 10:00:26 kernel: nf_nat_rtsp v0.6.21 loading
  2775. Aug 1 10:00:27 rc_service: udhcpc 558:notify_rc start_upnp
  2776. Aug 1 10:00:27 rc_service: waitting "stop_upnp" via udhcpc ...
  2777. Aug 1 10:00:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  2778. Aug 1 10:00:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  2779. Aug 1 10:00:31 kernel: kjournald starting. Commit interval 5 seconds
  2780. Aug 1 10:00:31 kernel: EXT3-fs (sda1): using internal journal
  2781. Aug 1 10:00:31 kernel: EXT3-fs (sda1): recovery complete
  2782. Aug 1 10:00:31 kernel: EXT3-fs (sda1): mounted filesystem with ordered data mode
  2783. Aug 1 10:00:31 hotplug[780]: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1
  2784. Aug 1 10:00:31 usb: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1.
  2785. Aug 1 10:00:31 miniupnpd[529]: shutting down MiniUPnPd
  2786. Aug 1 10:00:32 miniupnpd[897]: HTTP listening on port 49309
  2787. Aug 1 10:00:32 miniupnpd[897]: Listening for NAT-PMP/PCP traffic on port 5351
  2788. Aug 1 10:00:32 ddns update: ez-ipupdate: starting...
  2789. Aug 1 10:00:33 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/sda1)
  2790. Aug 1 10:00:33 rc_service: hotplug 780:notify_rc restart_nasapps
  2791. Aug 1 10:00:33 iTunes: daemon is stopped
  2792. Aug 1 10:00:33 FTP Server: daemon is stopped
  2793. Aug 1 10:00:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  2794. Aug 1 10:00:33 Samba Server: smb daemon is stopped
  2795. Aug 1 10:00:33 kernel: gro disabled
  2796. Aug 1 10:00:33 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 06 Feb 2017 21:27:00 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
  2797. Aug 1 10:00:33 ddns update: retval= 0, ddns_return_code (,200)
  2798. Aug 1 10:00:33 ddns update: asusddns_update: 0
  2799. Aug 1 10:00:34 Timemachine: daemon is stopped
  2800. Aug 1 10:00:34 miniupnpd[897]: shutting down MiniUPnPd
  2801. Aug 1 10:00:34 kernel: gro enabled with interval 2
  2802. Aug 1 10:00:34 ddns: ddns update ok
  2803. Aug 1 10:00:34 files: Started privoxy from .
  2804. Aug 1 10:00:34 rc_service: udhcpc 558:notify_rc start_vpnserver1
  2805. Aug 1 10:00:34 rc_service: waitting "restart_nasapps" via hotplug ...
  2806. Aug 1 10:00:34 ntp: start NTP update
  2807. Feb 7 07:27:02 rc_service: ntp 942:notify_rc restart_upnp
  2808. Feb 7 07:27:02 rc_service: waitting "restart_nasapps" via hotplug ...
  2809. Feb 7 07:27:04 Samba Server: daemon is started
  2810. Feb 7 07:27:05 rc_service: ntp 942:notify_rc restart_diskmon
  2811. Feb 7 07:27:05 rc_service: waitting "start_vpnserver1" via udhcpc ...
  2812. Feb 7 07:27:06 miniupnpd[974]: HTTP listening on port 42791
  2813. Feb 7 07:27:06 miniupnpd[974]: Listening for NAT-PMP/PCP traffic on port 5351
  2814. Feb 7 07:27:07 kernel: tfat: fail_safe is enabled
  2815. Feb 7 07:27:07 kernel: tfat: cluster_heap_lbo 0x3bc000
  2816. Feb 7 07:27:07 kernel: tfat: 12 blkbits for normal inodes
  2817. Feb 7 07:27:07 kernel: tfat: fat start lbo 0x2400
  2818. Feb 7 07:27:07 kernel: tfat: 9 blkbits for main FAT32 inode
  2819. Feb 7 07:27:07 kernel: tfat: cluster size 16384
  2820. Feb 7 07:27:07 kernel: tfat info: FAT32 volume name 'ASUS', version 0.0.
  2821. Feb 7 07:27:07 kernel: tfat warning (device sdb1, pid 986): fat_fill_super(): FAT volume ASUS is dirty. You should unmount and repair it.
  2822. Feb 7 07:27:07 hotplug[781]: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS
  2823. Feb 7 07:27:07 usb: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS.
  2824. Feb 7 07:27:07 kernel: tun: Universal TUN/TAP device driver, 1.6
  2825. Feb 7 07:27:07 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  2826. Feb 7 07:27:07 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/ASUS)
  2827. Feb 7 07:27:07 openvpn-routing: Refreshing policy rules for client 1
  2828. Feb 7 07:27:07 rc_service: hotplug 781:notify_rc restart_nasapps
  2829. Feb 7 07:27:07 rc_service: waitting "start_vpnserver1" via udhcpc ...
  2830. Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
  2831. Feb 7 07:27:08 openvpn-routing: Refreshing policy rules for client 2
  2832. Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
  2833. Feb 7 07:27:08 openvpn-routing: Refreshing policy rules for client 3
  2834. Feb 7 07:27:08 openvpn-routing: Allow WAN access to all VPN clients
  2835. Feb 7 07:27:09 openvpn-routing: Refreshing policy rules for client 4
  2836. Feb 7 07:27:09 openvpn-routing: Allow WAN access to all VPN clients
  2837. Feb 7 07:27:09 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
  2838. Feb 7 07:27:09 kernel: device tun21 entered promiscuous mode
  2839. Feb 7 07:27:09 openvpn-routing: Refreshing policy rules for client 5
  2840. Feb 7 07:27:09 openvpn-routing: Allow WAN access to all VPN clients
  2841. Feb 7 07:27:09 rc_service: udhcpc 558:notify_rc start_vpnclient1
  2842. Feb 7 07:27:09 rc_service: waitting "start_vpnserver1" via udhcpc ...
  2843. Feb 7 07:27:10 openvpn[1136]: OpenVPN 2.3.14 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan 7 2017
  2844. Feb 7 07:27:10 openvpn[1136]: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.08
  2845. Feb 7 07:27:10 openvpn[1137]: Diffie-Hellman initialized with 2048 bit key
  2846. Feb 7 07:27:10 openvpn[1137]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2847. Feb 7 07:27:10 openvpn[1137]: TUN/TAP device tun21 opened
  2848. Feb 7 07:27:10 openvpn[1137]: TUN/TAP TX queue length set to 100
  2849. Feb 7 07:27:10 openvpn[1137]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2850. Feb 7 07:27:10 openvpn[1137]: /usr/sbin/ip link set dev tun21 up mtu 1500
  2851. Feb 7 07:27:10 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
  2852. Feb 7 07:27:10 openvpn[1137]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
  2853. Feb 7 07:27:10 openvpn[1137]: UDPv4 link local (bound): [undef]
  2854. Feb 7 07:27:10 openvpn[1137]: UDPv4 link remote: [undef]
  2855. Feb 7 07:27:10 openvpn[1137]: MULTI: multi_init called, r=256 v=256
  2856. Feb 7 07:27:10 openvpn[1137]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  2857. Feb 7 07:27:10 openvpn[1137]: Initialization Sequence Completed
  2858. Feb 7 07:27:11 iTunes: daemon is stopped
  2859. Feb 7 07:27:11 FTP Server: daemon is stopped
  2860. Feb 7 07:27:12 Samba Server: smb daemon is stopped
  2861. Feb 7 07:27:12 kernel: gro disabled
  2862. Feb 7 07:27:13 Timemachine: daemon is stopped
  2863. Feb 7 07:27:13 miniupnpd[974]: shutting down MiniUPnPd
  2864. Feb 7 07:27:13 kernel: gro enabled with interval 2
  2865. Feb 7 07:27:14 Samba Server: daemon is started
  2866. Feb 7 07:27:14 disk_monitor: Finish
  2867. Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  2868. Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  2869. Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  2870. Feb 7 07:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  2871. Feb 7 07:27:15 miniupnpd[1167]: HTTP listening on port 33966
  2872. Feb 7 07:27:15 miniupnpd[1167]: Listening for NAT-PMP/PCP traffic on port 5351
  2873. Feb 7 07:27:17 disk monitor: be idle
  2874. Feb 7 07:27:17 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  2875. Feb 7 07:27:17 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  2876. Feb 7 07:27:18 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 77801 seconds.
  2877. Feb 7 07:27:18 openvpn[1214]: OpenVPN 2.3.14 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan 7 2017
  2878. Feb 7 07:27:18 openvpn[1214]: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.08
  2879. Feb 7 07:27:18 openvpn[1215]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  2880. Feb 7 07:27:18 openvpn[1215]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  2881. Feb 7 07:27:19 openvpn[1215]: UDPv4 link local: [undef]
  2882. Feb 7 07:27:19 openvpn[1215]: UDPv4 link remote: [AF_INET]46.166.188.204:1197
  2883. Feb 7 07:27:19 openvpn[1215]: TLS: Initial packet from [AF_INET]46.166.188.204:1197, sid=290bafb0 53882e09
  2884. Feb 7 07:27:19 openvpn[1215]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  2885. Feb 7 07:27:19 openvpn[1215]: VERIFY OK: nsCertType=SERVER
  2886. Feb 7 07:27:19 openvpn[1215]: Validating certificate key usage
  2887. Feb 7 07:27:19 openvpn[1215]: ++ Certificate has key usage 00a0, expects 00a0
  2888. Feb 7 07:27:19 openvpn[1215]: VERIFY KU OK
  2889. Feb 7 07:27:19 openvpn[1215]: Validating certificate extended key usage
  2890. Feb 7 07:27:19 openvpn[1215]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  2891. Feb 7 07:27:19 openvpn[1215]: VERIFY EKU OK
  2892. Feb 7 07:27:19 openvpn[1215]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=089eadaf1f154eab1712c10dd9007339, name=089eadaf1f154eab1712c10dd9007339
  2893. Feb 7 07:27:23 openvpn[1215]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2894. Feb 7 07:27:23 openvpn[1215]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2895. Feb 7 07:27:23 openvpn[1215]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  2896. Feb 7 07:27:23 openvpn[1215]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  2897. Feb 7 07:27:23 openvpn[1215]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  2898. Feb 7 07:27:23 openvpn[1215]: [089eadaf1f154eab1712c10dd9007339] Peer Connection Initiated with [AF_INET]46.166.188.204:1197
  2899. Feb 7 07:27:26 openvpn[1215]: SENT CONTROL [089eadaf1f154eab1712c10dd9007339]: 'PUSH_REQUEST' (status=1)
  2900. Feb 7 07:27:26 openvpn[1215]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.77.10.1,topology net30,ifconfig 10.77.10.6 10.77.10.5'
  2901. Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: timers and/or timeouts modified
  2902. Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: LZO parms modified
  2903. Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: --ifconfig/up options modified
  2904. Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: route options modified
  2905. Feb 7 07:27:26 openvpn[1215]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2906. Feb 7 07:27:26 openvpn[1215]: TUN/TAP device tun11 opened
  2907. Feb 7 07:27:26 openvpn[1215]: TUN/TAP TX queue length set to 100
  2908. Feb 7 07:27:26 openvpn[1215]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  2909. Feb 7 07:27:26 openvpn[1215]: /usr/sbin/ip link set dev tun11 up mtu 1500
  2910. Feb 7 07:27:26 openvpn[1215]: /usr/sbin/ip addr add dev tun11 local 10.77.10.6 peer 10.77.10.5
  2911. Feb 7 07:27:26 openvpn[1215]: updown.sh tun11 1500 1570 10.77.10.6 10.77.10.5 init
  2912. Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  2913. Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  2914. Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  2915. Feb 7 07:27:27 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  2916. Feb 7 07:27:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  2917. Feb 7 07:27:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  2918. Feb 7 07:27:27 rc_service: service 1394:notify_rc updateresolv
  2919. Feb 7 07:27:28 dnsmasq[450]: read /etc/hosts - 5 addresses
  2920. Feb 7 07:27:28 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  2921. Feb 7 07:27:28 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  2922. Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  2923. Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  2924. Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.1#53
  2925. Feb 7 07:27:28 dnsmasq[450]: using nameserver 61.9.211.33#53
  2926. Feb 7 07:27:28 crond[458]: time disparity of 800487 minutes detected
  2927. Feb 7 07:27:30 openvpn[1215]: /usr/sbin/ip route add 46.166.188.204/32 via 60.226.64.1
  2928. Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 0.0.0.0/1 via 10.77.10.5
  2929. Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 128.0.0.0/1 via 10.77.10.5
  2930. Feb 7 07:27:31 openvpn[1215]: /usr/sbin/ip route add 10.77.10.1/32 via 10.77.10.5
  2931. Feb 7 07:27:31 openvpn-routing: Configuring policy rules for client 1
  2932. Feb 7 07:27:31 openvpn-routing: Creating VPN routing table
  2933. Feb 7 07:27:31 openvpn-routing: Removing route for 10.77.10.1 to tun11 from main routing table
  2934. Feb 7 07:27:31 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  2935. Feb 7 07:27:31 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  2936. Feb 7 07:27:31 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  2937. Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  2938. Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  2939. Feb 7 07:27:32 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  2940. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  2941. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  2942. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  2943. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  2944. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  2945. Feb 7 07:27:32 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  2946. Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  2947. Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  2948. Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  2949. Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  2950. Feb 7 07:27:33 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  2951. Feb 7 07:27:33 openvpn-routing: Completed routing policy configuration for client 1
  2952. Feb 7 07:27:33 openvpn[1215]: Initialization Sequence Completed
  2953. Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
  2954. Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2955. Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2956. Feb 7 07:31:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2957. Feb 7 07:33:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  2958. Feb 7 07:33:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  2959. Feb 7 08:00:17 disk_monitor: Got SIGALRM...
  2960. Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
  2961. Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
  2962. Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  2963. Feb 7 09:38:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  2964. Feb 7 09:53:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  2965. Feb 7 09:53:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  2966. Feb 7 10:20:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  2967. Feb 7 10:20:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  2968. Feb 7 12:09:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2969. Feb 7 12:09:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2970. Feb 7 12:41:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  2971. Feb 7 12:41:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  2972. Feb 7 14:40:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  2973. Feb 7 14:40:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  2974. Feb 7 14:49:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  2975. Feb 7 14:49:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  2976. Feb 7 15:31:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  2977. Feb 7 15:31:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  2978. Feb 7 17:16:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  2979. Feb 7 17:16:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  2980. Feb 7 17:19:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2981. Feb 7 17:19:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2982. Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  2983. Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  2984. Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  2985. Feb 7 17:56:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  2986. Feb 7 17:58:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2987. Feb 7 17:58:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2988. Feb 7 18:09:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  2989. Feb 7 18:09:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  2990. Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  2991. Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  2992. Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  2993. Feb 7 18:27:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  2994. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  2995. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  2996. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  2997. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  2998. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  2999. Feb 7 18:53:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3000. Feb 7 19:27:11 ntp: start NTP update
  3001. Feb 7 19:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3002. Feb 7 19:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3003. Feb 7 19:27:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3004. Feb 7 19:27:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3005. Feb 7 20:37:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  3006. Feb 7 20:37:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  3007. Feb 7 20:40:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  3008. Feb 7 20:40:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  3009. Feb 7 20:40:49 miniupnpd[1167]: remove port mapping 32518 TCP because it has expired
  3010. Feb 7 20:40:49 miniupnpd[1167]: remove port mapping 32518 UDP because it has expired
  3011. Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3012. Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3013. Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3014. Feb 7 20:56:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3015. Feb 7 20:57:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3016. Feb 7 20:57:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3017. Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
  3018. Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3019. Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3020. Feb 7 21:06:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3021. Feb 7 21:12:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3022. Feb 7 21:12:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3023. Feb 7 21:27:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3024. Feb 7 21:27:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3025. Feb 7 21:31:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3026. Feb 7 21:31:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3027. Feb 7 21:45:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3028. Feb 7 21:45:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3029. Feb 7 21:51:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3030. Feb 7 21:51:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3031. Feb 7 23:00:17 disk_monitor: Got SIGALRM...
  3032. Feb 7 23:01:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3033. Feb 7 23:01:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3034. Feb 7 23:01:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3035. Feb 7 23:01:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3036. Feb 7 23:20:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3037. Feb 7 23:20:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3038. Feb 8 01:34:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3039. Feb 8 01:34:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3040. Feb 8 01:45:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3041. Feb 8 01:45:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3042. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3043. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3044. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3045. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3046. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3047. Feb 8 04:16:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3048. Feb 8 04:26:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3049. Feb 8 04:26:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3050. Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  3051. Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  3052. Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3053. Feb 8 04:28:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3054. Feb 8 05:35:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3055. Feb 8 05:35:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3056. Feb 8 05:58:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3057. Feb 8 05:58:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3058. Feb 8 06:20:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3059. Feb 8 06:20:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3060. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3061. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3062. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3063. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3064. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3065. Feb 8 06:42:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3066. Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
  3067. Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3068. Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3069. Feb 8 07:02:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3070. Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3071. Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3072. Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3073. Feb 8 07:21:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3074. Feb 8 07:26:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3075. Feb 8 07:26:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3076. Feb 8 07:27:11 ntp: start NTP update
  3077. Feb 8 07:27:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3078. Feb 8 07:27:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3079. Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3080. Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3081. Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3082. Feb 8 07:40:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3083. Feb 8 07:41:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3084. Feb 8 07:41:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3085. Feb 8 07:47:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3086. Feb 8 07:47:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3087. Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3088. Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3089. Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3090. Feb 8 07:50:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3091. Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) f4:09:d8:d4:eb:f5
  3092. Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3093. Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3094. Feb 8 08:01:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3095. Feb 8 08:42:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3096. Feb 8 08:42:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3097. Feb 8 09:29:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3098. Feb 8 09:29:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3099. Feb 8 09:41:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.136 f4:09:d8:d4:eb:f5
  3100. Feb 8 09:41:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.136 f4:09:d8:d4:eb:f5 Samsung
  3101. Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  3102. Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  3103. Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  3104. Feb 8 10:57:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  3105. Feb 8 12:58:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3106. Feb 8 12:58:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3107. Feb 8 13:49:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3108. Feb 8 13:49:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3109. Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3110. Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3111. Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3112. Feb 8 15:01:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3113. Feb 8 15:16:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3114. Feb 8 15:16:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3115. Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
  3116. Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
  3117. Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
  3118. Feb 8 15:19:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
  3119. Feb 8 15:21:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3120. Feb 8 15:21:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3121. Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  3122. Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  3123. Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  3124. Feb 8 16:37:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  3125. Feb 8 17:28:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3126. Feb 8 17:28:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3127. Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3128. Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3129. Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3130. Feb 8 18:13:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3131. Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3132. Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3133. Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3134. Feb 8 18:40:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3135. Feb 8 18:55:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3136. Feb 8 18:55:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3137. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3138. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3139. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3140. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3141. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3142. Feb 8 18:56:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3143. Feb 8 19:19:58 miniupnpd[1167]: remove port mapping 20806 TCP because it has expired
  3144. Feb 8 19:19:58 miniupnpd[1167]: remove port mapping 20806 UDP because it has expired
  3145. Feb 8 19:27:09 ntp: start NTP update
  3146. Feb 8 19:27:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3147. Feb 8 19:27:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3148. Feb 8 19:49:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3149. Feb 8 19:49:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3150. Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3151. Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3152. Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3153. Feb 8 21:30:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3154. Feb 8 23:32:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3155. Feb 8 23:32:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3156. Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  3157. Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  3158. Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3159. Feb 9 04:28:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3160. Feb 9 05:05:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3161. Feb 9 05:05:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3162. Feb 9 05:51:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3163. Feb 9 05:51:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3164. Feb 9 06:11:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3165. Feb 9 06:11:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3166. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3167. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3168. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3169. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3170. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3171. Feb 9 06:32:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3172. Feb 9 06:44:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3173. Feb 9 06:44:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3174. Feb 9 07:25:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3175. Feb 9 07:25:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3176. Feb 9 07:27:07 ntp: start NTP update
  3177. Feb 9 07:27:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3178. Feb 9 07:27:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3179. Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3180. Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3181. Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3182. Feb 9 07:51:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3183. Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3184. Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3185. Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3186. Feb 9 08:56:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3187. Aug 1 10:00:14 syslogd started: BusyBox v1.25.1
  3188. Aug 1 10:00:14 kernel: klogd started: BusyBox v1.25.1 (2017-02-03 00:18:59 EST)
  3189. Aug 1 10:00:14 kernel: Linux version 2.6.36.4brcmarm (merlin@ubuntu-dev) (gcc version 4.5.3 (Buildroot 2012.02) ) #2 SMP PREEMPT Fri Feb 3 00:27:49 EST 2017
  3190. Aug 1 10:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
  3191. Aug 1 10:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
  3192. Aug 1 10:00:14 kernel: Machine: Northstar Prototype
  3193. Aug 1 10:00:14 kernel: Ignoring unrecognised tag 0x00000000
  3194. Aug 1 10:00:14 kernel: bootconsole [earlycon0] enabled
  3195. Aug 1 10:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
  3196. Aug 1 10:00:14 kernel: MPCORE found at 19020000
  3197. Aug 1 10:00:14 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536
  3198. Aug 1 10:00:14 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096
  3199. Aug 1 10:00:14 kernel: pcpu-alloc: [0] 0 [0] 1
  3200. Aug 1 10:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
  3201. Aug 1 10:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
  3202. Aug 1 10:00:14 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes)
  3203. Aug 1 10:00:14 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
  3204. Aug 1 10:00:14 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
  3205. Aug 1 10:00:14 kernel: Memory: 128MB 128MB = 256MB total
  3206. Aug 1 10:00:14 kernel: Memory: 255488k/255488k available, 6656k reserved, 0K highmem
  3207. Aug 1 10:00:14 kernel: Virtual kernel memory layout:
  3208. Aug 1 10:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
  3209. Aug 1 10:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
  3210. Aug 1 10:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
  3211. Aug 1 10:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
  3212. Aug 1 10:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
  3213. Aug 1 10:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
  3214. Aug 1 10:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
  3215. Aug 1 10:00:14 kernel: .text : 0xc003d000 - 0xc03a9000 (3504 kB)
  3216. Aug 1 10:00:14 kernel: .data : 0xc03c0000 - 0xc03e32a0 ( 141 kB)
  3217. Aug 1 10:00:14 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
  3218. Aug 1 10:00:14 kernel: Hierarchical RCU implementation.
  3219. Aug 1 10:00:14 kernel: RCU-based detection of stalled CPUs is disabled.
  3220. Aug 1 10:00:14 kernel: Verbose stalled-CPUs detection is disabled.
  3221. Aug 1 10:00:14 kernel: NR_IRQS:256
  3222. Aug 1 10:00:14 kernel: MPCORE GIC init
  3223. Aug 1 10:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
  3224. Aug 1 10:00:14 kernel: MPCORE Global Timer Clock 400000000Hz
  3225. Aug 1 10:00:14 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008)
  3226. Aug 1 10:00:14 kernel: pid_max: default: 32768 minimum: 301
  3227. Aug 1 10:00:14 kernel: Mount-cache hash table entries: 512
  3228. Aug 1 10:00:14 kernel: CPU: Testing write buffer coherency: ok
  3229. Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU0
  3230. Aug 1 10:00:14 kernel: Calibrating local timer... 399.872MHz.
  3231. Aug 1 10:00:14 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000
  3232. Aug 1 10:00:14 kernel: CPU1: Booted secondary processor
  3233. Aug 1 10:00:14 kernel: MPCORE Private timer setup CPU1
  3234. Aug 1 10:00:14 kernel: Brought up 2 CPUs
  3235. Aug 1 10:00:14 kernel: SMP: Total of 2 processors activated (3194.88 BogoMIPS).
  3236. Aug 1 10:00:14 kernel: devtmpfs: initialized
  3237. Aug 1 10:00:14 kernel: atomic64 test passed
  3238. Aug 1 10:00:14 kernel: NET: Registered protocol family 16
  3239. Aug 1 10:00:14 kernel: Found a AMD NAND flash:
  3240. Aug 1 10:00:14 kernel: Total size: 128MB
  3241. Aug 1 10:00:14 kernel: Block size: 128KB
  3242. Aug 1 10:00:14 kernel: Page Size: 2048B
  3243. Aug 1 10:00:14 kernel: OOB Size: 64B
  3244. Aug 1 10:00:14 kernel: Sector size: 512B
  3245. Aug 1 10:00:14 kernel: Spare size: 16B
  3246. Aug 1 10:00:14 kernel: ECC level: 8 (8-bit)
  3247. Aug 1 10:00:14 kernel: Device ID: 0x 1 0xf1 0x 0 0x1d 0x 1 0xf1
  3248. Aug 1 10:00:14 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48
  3249. Aug 1 10:00:14 kernel: CCA UART Clock rate 100000000Hz
  3250. Aug 1 10:00:14 kernel: bio: create slab <bio-0> at 0
  3251. Aug 1 10:00:14 kernel: Switching to clocksource mpcore_gtimer
  3252. Aug 1 10:00:14 kernel: NET: Registered protocol family 2
  3253. Aug 1 10:00:14 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes)
  3254. Aug 1 10:00:14 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes)
  3255. Aug 1 10:00:14 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes)
  3256. Aug 1 10:00:14 kernel: TCP: Hash tables configured (established 8192 bind 8192)
  3257. Aug 1 10:00:14 kernel: TCP reno registered
  3258. Aug 1 10:00:14 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes)
  3259. Aug 1 10:00:14 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes)
  3260. Aug 1 10:00:14 kernel: NET: Registered protocol family 1
  3261. Aug 1 10:00:14 kernel: PCI: no core
  3262. Aug 1 10:00:14 kernel: PCI: no core
  3263. Aug 1 10:00:14 kernel: PCI: scanning bus 0
  3264. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  3265. Aug 1 10:00:14 kernel: PCIE1 link=1
  3266. Aug 1 10:00:14 kernel: PCIE1 switching to GEN2
  3267. Aug 1 10:00:14 kernel: PCIE1 link=1
  3268. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  3269. Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
  3270. Aug 1 10:00:14 kernel: PCI: Fixing up bus 1
  3271. Aug 1 10:00:14 kernel: PCI: bus1: Fast back to back transfers disabled
  3272. Aug 1 10:00:14 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff]
  3273. Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit]
  3274. Aug 1 10:00:14 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff]
  3275. Aug 1 10:00:14 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01]
  3276. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [io disabled]
  3277. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff]
  3278. Aug 1 10:00:14 kernel: pci 0001:00:00.0: bridge window [mem pref disabled]
  3279. Aug 1 10:00:14 kernel: PCIE2 link=1
  3280. Aug 1 10:00:14 kernel: PCIE2 switching to GEN2
  3281. Aug 1 10:00:14 kernel: PCIE2 link=1
  3282. Aug 1 10:00:14 kernel: PCI: Fixing up bus 0
  3283. Aug 1 10:00:14 kernel: PCI: bus0: Fast back to back transfers disabled
  3284. Aug 1 10:00:14 kernel: PCI: Fixing up bus 2
  3285. Aug 1 10:00:14 kernel: PCI: bus2: Fast back to back transfers disabled
  3286. Aug 1 10:00:14 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff]
  3287. Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit]
  3288. Aug 1 10:00:14 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff]
  3289. Aug 1 10:00:14 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02]
  3290. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [io disabled]
  3291. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff]
  3292. Aug 1 10:00:14 kernel: pci 0002:00:00.0: bridge window [mem pref disabled]
  3293. Aug 1 10:00:14 kernel: PCIE3 link=0
  3294. Aug 1 10:00:14 kernel: VFS: Disk quotas dquot_6.5.2
  3295. Aug 1 10:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
  3296. Aug 1 10:00:14 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
  3297. Aug 1 10:00:14 kernel: fuse init (API version 7.15)
  3298. Aug 1 10:00:14 kernel: msgmni has been set to 499
  3299. Aug 1 10:00:14 kernel: io scheduler noop registered (default)
  3300. Aug 1 10:00:14 kernel: io scheduler deadline registered
  3301. Aug 1 10:00:14 kernel: io scheduler cfq registered
  3302. Aug 1 10:00:14 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
  3303. Aug 1 10:00:14 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550
  3304. Aug 1 10:00:14 kernel: console [ttyS0] enabled, bootconsole disabled
  3305. Aug 1 10:00:14 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550
  3306. Aug 1 10:00:14 kernel: brd: module loaded
  3307. Aug 1 10:00:14 kernel: loop: module loaded
  3308. Aug 1 10:00:14 kernel: pflash: found no supported devices
  3309. Aug 1 10:00:14 kernel: bcmsflash: found no supported devices
  3310. Aug 1 10:00:14 kernel: Boot partition size = 524288(0x80000)
  3311. Aug 1 10:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
  3312. Aug 1 10:00:14 kernel: nflash: squash filesystem with lzma found at block 28
  3313. Aug 1 10:00:14 kernel: Creating 4 MTD partitions on "nflash":
  3314. Aug 1 10:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
  3315. Aug 1 10:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
  3316. Aug 1 10:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
  3317. Aug 1 10:00:14 kernel: 0x00000039d3d8-0x000004000000 : "rootfs"
  3318. Aug 1 10:00:14 kernel: PPP generic driver version 2.4.2
  3319. Aug 1 10:00:14 kernel: PPP MPPE Compression module registered
  3320. Aug 1 10:00:14 kernel: NET: Registered protocol family 24
  3321. Aug 1 10:00:14 kernel: PPTP driver version 0.8.5
  3322. Aug 1 10:00:14 kernel: Mirror/redirect action on
  3323. Aug 1 10:00:14 kernel: u32 classifier
  3324. Aug 1 10:00:14 kernel: Actions configured
  3325. Aug 1 10:00:14 kernel: Netfilter messages via NETLINK v0.30.
  3326. Aug 1 10:00:14 kernel: nf_conntrack version 0.5.0 (3992 buckets, 15968 max)
  3327. Aug 1 10:00:14 kernel: xt_time: kernel timezone is -0000
  3328. Aug 1 10:00:14 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
  3329. Aug 1 10:00:14 kernel: TCP cubic registered
  3330. Aug 1 10:00:14 kernel: NET: Registered protocol family 10
  3331. Aug 1 10:00:14 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
  3332. Aug 1 10:00:14 kernel: NET: Registered protocol family 17
  3333. Aug 1 10:00:14 kernel: L2TP core driver, V2.0
  3334. Aug 1 10:00:14 kernel: PPPoL2TP kernel driver, V2.0
  3335. Aug 1 10:00:14 kernel: 802.1Q VLAN Support v1.8 Ben Greear <greearb@candelatech.com>
  3336. Aug 1 10:00:14 kernel: All bugs added by David S. Miller <davem@redhat.com>
  3337. Aug 1 10:00:14 kernel: Registering the dns_resolver key type
  3338. Aug 1 10:00:14 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012
  3339. Aug 1 10:00:14 kernel: NAND device: Manufacturer ID: 0x01, Chip ID: 0xf1 (AMD NAND 128MiB 3,3V 8-bit)
  3340. Aug 1 10:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
  3341. Aug 1 10:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
  3342. Aug 1 10:00:14 kernel: Available 7 bytes at (off,len):
  3343. Aug 1 10:00:14 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
  3344. Aug 1 10:00:14 kernel: Scanning device for bad blocks
  3345. Aug 1 10:00:14 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
  3346. Aug 1 10:00:14 kernel: Creating 2 MTD partitions on "brcmnand":
  3347. Aug 1 10:00:14 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
  3348. Aug 1 10:00:14 kernel: 0x000007ec0000-0x000008000000 : "asus"
  3349. Aug 1 10:00:14 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
  3350. Aug 1 10:00:14 kernel: devtmpfs: mounted
  3351. Aug 1 10:00:14 kernel: Freeing init memory: 212K
  3352. Aug 1 10:00:14 kernel: cfe_commit: do nothing
  3353. Aug 1 10:00:14 kernel: et: module license 'Proprietary' taints kernel.
  3354. Aug 1 10:00:14 kernel: Disabling lock debugging due to kernel taint
  3355. Aug 1 10:00:14 kernel: et_module_init: passivemode set to 0x0
  3356. Aug 1 10:00:14 kernel: et_module_init: txworkq set to 0x0
  3357. Aug 1 10:00:14 kernel: et_module_init: et_txq_thresh set to 0xce4
  3358. Aug 1 10:00:14 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
  3359. Aug 1 10:00:14 kernel: wl_module_init: passivemode set to 0x0
  3360. Aug 1 10:00:14 kernel: wl_module_init: igs set to 0x0
  3361. Aug 1 10:00:14 kernel: wl_module_init: txworkq set to 0x0
  3362. Aug 1 10:00:14 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  3363. Aug 1 10:00:14 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  3364. Aug 1 10:00:14 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
  3365. Aug 1 10:00:15 kernel: device vlan1 entered promiscuous mode
  3366. Aug 1 10:00:15 kernel: device eth0 entered promiscuous mode
  3367. Aug 1 10:00:15 kernel: device eth1 entered promiscuous mode
  3368. Aug 1 10:00:15 kernel: device eth2 entered promiscuous mode
  3369. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  3370. Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
  3371. Aug 1 10:00:15 kernel: br0: port 3(eth2) entering forwarding state
  3372. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  3373. Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
  3374. Aug 1 10:00:15 kernel: br0: port 2(eth1) entering forwarding state
  3375. Aug 1 10:00:15 kernel: br0: topology change detected, propagating
  3376. Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
  3377. Aug 1 10:00:15 kernel: br0: port 1(vlan1) entering forwarding state
  3378. Aug 1 10:00:15 WAN Connection: ISP's DHCP did not function properly.
  3379. Aug 1 10:00:16 dropbear[435]: Running in background
  3380. Aug 1 10:00:19 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  3381. Aug 1 10:00:19 dnsmasq[450]: started, version 2.76 cachesize 1500
  3382. Aug 1 10:00:19 dnsmasq[450]: asynchronous logging enabled, queue limit is 5 messages
  3383. Aug 1 10:00:19 dnsmasq-dhcp[450]: DHCP, IP range 10.1.1.1 -- 10.1.1.254, lease time 1d
  3384. Aug 1 10:00:19 dnsmasq[450]: read /etc/hosts - 5 addresses
  3385. Aug 1 10:00:19 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  3386. Aug 1 10:00:19 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  3387. Aug 1 10:00:19 RT-AC68U: start httpd
  3388. Aug 1 10:00:19 crond[458]: crond (busybox 1.25.1) started, log level 8
  3389. Aug 1 10:00:20 custom script: Running /jffs/scripts/services-start
  3390. Aug 1 10:00:20 jffs2: valid logs(1)
  3391. Aug 1 10:00:20 disk monitor: be idle
  3392. Aug 1 10:00:20 hour monitor: daemon is starting
  3393. Aug 1 10:00:20 hour monitor: daemon terminates
  3394. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts - 5 addresses
  3395. Aug 1 10:00:20 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  3396. Aug 1 10:00:20 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  3397. Aug 1 10:00:21 rc_service: udhcpc 527:notify_rc start_firewall
  3398. Aug 1 10:00:21 dnsmasq[450]: read /etc/hosts - 5 addresses
  3399. Aug 1 10:00:21 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  3400. Aug 1 10:00:21 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  3401. Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  3402. Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  3403. Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.1#53
  3404. Aug 1 10:00:21 dnsmasq[450]: using nameserver 61.9.211.33#53
  3405. Aug 1 10:00:21 wan: finish adding multi routes
  3406. Aug 1 10:00:21 rc_service: udhcpc 527:notify_rc stop_upnp
  3407. Aug 1 10:00:21 rc_service: waitting "start_firewall" via udhcpc ...
  3408. Aug 1 10:00:22 kernel: usbcore: registered new interface driver usbfs
  3409. Aug 1 10:00:22 kernel: usbcore: registered new interface driver hub
  3410. Aug 1 10:00:22 kernel: usbcore: registered new device driver usb
  3411. Aug 1 10:00:22 syslog: module ledtrig-usbdev not found in modules.dep
  3412. Aug 1 10:00:22 syslog: module leds-usb not found in modules.dep
  3413. Aug 1 10:00:22 kernel: SCSI subsystem initialized
  3414. Aug 1 10:00:23 kernel: csw_retry 100
  3415. Aug 1 10:00:23 kernel: Initializing USB Mass Storage driver...
  3416. Aug 1 10:00:23 kernel: usbcore: registered new interface driver usb-storage
  3417. Aug 1 10:00:23 kernel: USB Mass Storage support registered.
  3418. Aug 1 10:00:23 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE].
  3419. Aug 1 10:00:23 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Wed Dec 2 11:17:39 CST 2015 arm
  3420. Aug 1 10:00:23 kernel: Running on kernel 2.6.36.4brcmarm #2 SMP PREEMPT Fri Feb 3 00:27:49 EST 2017 armv7l
  3421. Aug 1 10:00:24 kernel: Tuxera NTFS driver 3015.1.29.8_1 [Flags: R/W MODULE].
  3422. Aug 1 10:00:24 kernel: Tuxera HFS+ driver 3014.7.28
  3423. Aug 1 10:00:24 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  3424. Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller
  3425. Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 1
  3426. Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000
  3427. Aug 1 10:00:24 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00
  3428. Aug 1 10:00:24 kernel: hub 1-0:1.0: USB hub found
  3429. Aug 1 10:00:24 kernel: hub 1-0:1.0: 2 ports detected
  3430. Aug 1 10:00:24 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
  3431. Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller
  3432. Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 2
  3433. Aug 1 10:00:24 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000
  3434. Aug 1 10:00:24 kernel: hub 2-0:1.0: USB hub found
  3435. Aug 1 10:00:24 kernel: hub 2-0:1.0: 2 ports detected
  3436. Aug 1 10:00:24 kernel: usbcore: registered new interface driver usblp
  3437. Aug 1 10:00:24 kernel: usbcore: registered new interface driver asix
  3438. Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_ether
  3439. Aug 1 10:00:24 kernel: usbcore: registered new interface driver rndis_host
  3440. Aug 1 10:00:24 kernel: cdc_ncm: 14-Mar-2012
  3441. Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_ncm
  3442. Aug 1 10:00:24 kernel: usb 1-1: new high speed USB device using ehci_hcd and address 2
  3443. Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_wdm
  3444. Aug 1 10:00:24 kernel: usbcore: registered new interface driver qmi_wwan
  3445. Aug 1 10:00:24 kernel: cdc_mbim: loaded
  3446. Aug 1 10:00:24 kernel: usbcore: registered new interface driver cdc_mbim
  3447. Aug 1 10:00:24 kernel: scsi0 : usb-storage 1-1:1.0
  3448. Aug 1 10:00:24 kernel: usb 1-2: new high speed USB device using ehci_hcd and address 3
  3449. Aug 1 10:00:24 kernel: scsi1 : usb-storage 1-2:1.0
  3450. Aug 1 10:00:25 kernel: scsi 0:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
  3451. Aug 1 10:00:25 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0
  3452. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
  3453. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Write Protect is off
  3454. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  3455. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  3456. Aug 1 10:00:25 kernel: sda: sda1
  3457. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through
  3458. Aug 1 10:00:25 kernel: sd 0:0:0:0: [sda] Attached SCSI removable disk
  3459. Aug 1 10:00:25 WAN Connection: WAN was restored.
  3460. Aug 1 10:00:25 kernel: scsi 1:0:0:0: Direct-Access SanDisk Cruzer Facet 1.27 PQ: 0 ANSI: 6
  3461. Aug 1 10:00:25 kernel: sd 1:0:0:0: Attached scsi generic sg1 type 0
  3462. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] 15633408 512-byte logical blocks: (8.00 GB/7.45 GiB)
  3463. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Write Protect is off
  3464. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  3465. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  3466. Aug 1 10:00:25 kernel: sdb: sdb1
  3467. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Assuming drive cache: write through
  3468. Aug 1 10:00:25 kernel: sd 1:0:0:0: [sdb] Attached SCSI removable disk
  3469. Aug 1 10:00:25 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  3470. Aug 1 10:00:27 kernel: EXT3-fs: barriers not enabled
  3471. Aug 1 10:00:27 kernel: Ebtables v2.0 registered
  3472. Aug 1 10:00:27 hotplug[777]: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1
  3473. Aug 1 10:00:27 usb: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/sda1.
  3474. Aug 1 10:00:27 kernel: kjournald starting. Commit interval 5 seconds
  3475. Aug 1 10:00:27 kernel: EXT3-fs (sda1): using internal journal
  3476. Aug 1 10:00:27 kernel: EXT3-fs (sda1): recovery complete
  3477. Aug 1 10:00:27 kernel: EXT3-fs (sda1): mounted filesystem with ordered data mode
  3478. Aug 1 10:00:27 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  3479. Aug 1 10:00:27 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/sda1)
  3480. Aug 1 10:00:28 rc_service: hotplug 777:notify_rc restart_nasapps
  3481. Aug 1 10:00:28 rc_service: waitting "start_firewall" via udhcpc ...
  3482. Aug 1 10:00:28 kernel: xt_connbytes: Forcing CT accounting to be enabled
  3483. Aug 1 10:00:28 kernel: nf_conntrack_rtsp v0.6.21 loading
  3484. Aug 1 10:00:28 kernel: nf_nat_rtsp v0.6.21 loading
  3485. Aug 1 10:00:28 rc_service: udhcpc 527:notify_rc start_upnp
  3486. Aug 1 10:00:28 rc_service: waitting "stop_upnp" via udhcpc ...
  3487. Aug 1 10:00:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3488. Aug 1 10:00:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3489. Aug 1 10:00:29 iTunes: daemon is stopped
  3490. Aug 1 10:00:29 FTP Server: daemon is stopped
  3491. Aug 1 10:00:29 Samba Server: smb daemon is stopped
  3492. Aug 1 10:00:29 kernel: gro disabled
  3493. Aug 1 10:00:30 files: Started privoxy from .
  3494. Aug 1 10:00:30 Timemachine: daemon is stopped
  3495. Aug 1 10:00:30 kernel: gro enabled with interval 2
  3496. Aug 1 10:00:32 Samba Server: daemon is started
  3497. Aug 1 10:00:34 ddns update: ez-ipupdate: starting...
  3498. Aug 1 10:00:34 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  3499. Aug 1 10:00:35 miniupnpd[937]: HTTP listening on port 47991
  3500. Aug 1 10:00:35 miniupnpd[937]: Listening for NAT-PMP/PCP traffic on port 5351
  3501. Aug 1 10:00:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 08 Feb 2017 23:26:29 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
  3502. Aug 1 10:00:35 ddns update: retval= 0, ddns_return_code (,200)
  3503. Aug 1 10:00:35 ddns update: asusddns_update: 0
  3504. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3505. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3506. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  3507. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  3508. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3509. Aug 1 10:00:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3510. Aug 1 10:00:36 kernel: tfat: fail_safe is enabled
  3511. Aug 1 10:00:36 kernel: tfat: cluster_heap_lbo 0x3bc000
  3512. Aug 1 10:00:36 kernel: tfat: 12 blkbits for normal inodes
  3513. Aug 1 10:00:36 kernel: tfat: fat start lbo 0x2400
  3514. Aug 1 10:00:36 kernel: tfat: 9 blkbits for main FAT32 inode
  3515. Aug 1 10:00:36 kernel: tfat: cluster size 16384
  3516. Aug 1 10:00:36 kernel: tfat info: FAT32 volume name 'ASUS', version 0.0.
  3517. Aug 1 10:00:36 kernel: tfat warning (device sdb1, pid 933): fat_fill_super(): FAT volume ASUS is dirty. You should unmount and repair it.
  3518. Aug 1 10:00:36 hotplug[779]: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS
  3519. Aug 1 10:00:36 usb: USB vfat fs at /dev/sdb1 mounted on /tmp/mnt/ASUS.
  3520. Aug 1 10:00:36 custom script: Running /jffs/scripts/post-mount (args: /tmp/mnt/ASUS)
  3521. Aug 1 10:00:36 rc_service: hotplug 779:notify_rc restart_nasapps
  3522. Aug 1 10:00:36 iTunes: daemon is stopped
  3523. Aug 1 10:00:37 FTP Server: daemon is stopped
  3524. Aug 1 10:00:39 ddns: ddns update ok
  3525. Aug 1 10:00:39 Samba Server: smb daemon is stopped
  3526. Aug 1 10:00:39 kernel: gro disabled
  3527. Aug 1 10:00:40 rc_service: udhcpc 527:notify_rc start_vpnserver1
  3528. Aug 1 10:00:40 rc_service: waitting "restart_nasapps" via hotplug ...
  3529. Aug 1 10:00:40 Timemachine: daemon is stopped
  3530. Aug 1 10:00:40 miniupnpd[937]: shutting down MiniUPnPd
  3531. Aug 1 10:00:41 kernel: gro enabled with interval 2
  3532. Aug 1 10:00:41 ntp: start NTP update
  3533. Feb 9 09:26:36 rc_service: ntp 988:notify_rc restart_upnp
  3534. Feb 9 09:26:36 rc_service: waitting "restart_nasapps" via hotplug ...
  3535. Feb 9 09:26:37 Samba Server: daemon is started
  3536. Feb 9 09:26:38 miniupnpd[1018]: HTTP listening on port 59429
  3537. Feb 9 09:26:38 miniupnpd[1018]: Listening for NAT-PMP/PCP traffic on port 5351
  3538. Feb 9 09:26:40 kernel: tun: Universal TUN/TAP device driver, 1.6
  3539. Feb 9 09:26:40 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  3540. Feb 9 09:26:41 openvpn-routing: Refreshing policy rules for client 1
  3541. Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
  3542. Feb 9 09:26:42 openvpn-routing: Refreshing policy rules for client 2
  3543. Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
  3544. Feb 9 09:26:42 openvpn-routing: Refreshing policy rules for client 3
  3545. Feb 9 09:26:42 openvpn-routing: Allow WAN access to all VPN clients
  3546. Feb 9 09:26:43 openvpn-routing: Refreshing policy rules for client 4
  3547. Feb 9 09:26:43 openvpn-routing: Allow WAN access to all VPN clients
  3548. Feb 9 09:26:43 openvpn-routing: Refreshing policy rules for client 5
  3549. Feb 9 09:26:43 openvpn-routing: Allow WAN access to all VPN clients
  3550. Feb 9 09:26:44 rc_service: udhcpc 527:notify_rc start_vpnclient1
  3551. Feb 9 09:26:44 rc_service: waitting "start_vpnserver1" via udhcpc ...
  3552. Feb 9 09:26:44 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
  3553. Feb 9 09:26:44 kernel: device tun21 entered promiscuous mode
  3554. Feb 9 09:26:46 openvpn[1148]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  3555. Feb 9 09:26:46 openvpn[1148]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  3556. Feb 9 09:26:46 openvpn[1149]: Diffie-Hellman initialized with 2048 bit key
  3557. Feb 9 09:26:46 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
  3558. Feb 9 09:26:46 openvpn[1149]: TUN/TAP device tun21 opened
  3559. Feb 9 09:26:46 openvpn[1149]: TUN/TAP TX queue length set to 100
  3560. Feb 9 09:26:46 openvpn[1149]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  3561. Feb 9 09:26:46 openvpn[1149]: /usr/sbin/ip link set dev tun21 up mtu 1500
  3562. Feb 9 09:26:46 openvpn[1149]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
  3563. Feb 9 09:26:46 openvpn[1149]: Could not determine IPv4/IPv6 protocol. Using AF_INET6
  3564. Feb 9 09:26:46 openvpn[1149]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  3565. Feb 9 09:26:46 openvpn[1149]: setsockopt(IPV6_V6ONLY=0)
  3566. Feb 9 09:26:46 openvpn[1149]: UDPv6 link local (bound): [AF_INET6][undef]:1194
  3567. Feb 9 09:26:46 openvpn[1149]: UDPv6 link remote: [AF_UNSPEC]
  3568. Feb 9 09:26:46 openvpn[1149]: MULTI: multi_init called, r=256 v=256
  3569. Feb 9 09:26:46 openvpn[1149]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  3570. Feb 9 09:26:46 openvpn[1149]: Initialization Sequence Completed
  3571. Feb 9 09:26:48 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  3572. Feb 9 09:26:48 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  3573. Feb 9 09:26:48 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 3600 seconds.
  3574. Feb 9 09:26:50 openvpn[1192]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  3575. Feb 9 09:26:50 openvpn[1192]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  3576. Feb 9 09:26:50 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  3577. Feb 9 09:26:51 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.188.197:1197
  3578. Feb 9 09:26:51 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  3579. Feb 9 09:26:51 openvpn[1193]: UDP link local: (not bound)
  3580. Feb 9 09:26:51 openvpn[1193]: UDP link remote: [AF_INET]46.166.188.197:1197
  3581. Feb 9 09:26:51 openvpn[1193]: TLS: Initial packet from [AF_INET]46.166.188.197:1197, sid=5d95de34 b7003d9b
  3582. Feb 9 09:26:51 miniupnpd[1018]: shutting down MiniUPnPd
  3583. Feb 9 09:26:52 miniupnpd[1195]: HTTP listening on port 56831
  3584. Feb 9 09:26:52 miniupnpd[1195]: Listening for NAT-PMP/PCP traffic on port 5351
  3585. Feb 9 09:26:52 rc_service: ntp 988:notify_rc restart_diskmon
  3586. Feb 9 09:26:52 disk_monitor: Finish
  3587. Feb 9 09:26:54 openvpn[1193]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  3588. Feb 9 09:26:54 openvpn[1193]: VERIFY OK: nsCertType=SERVER
  3589. Feb 9 09:26:54 openvpn[1193]: Validating certificate key usage
  3590. Feb 9 09:26:54 openvpn[1193]: ++ Certificate has key usage 00a0, expects 00a0
  3591. Feb 9 09:26:54 openvpn[1193]: VERIFY KU OK
  3592. Feb 9 09:26:54 openvpn[1193]: Validating certificate extended key usage
  3593. Feb 9 09:26:54 openvpn[1193]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  3594. Feb 9 09:26:54 openvpn[1193]: VERIFY EKU OK
  3595. Feb 9 09:26:54 openvpn[1193]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=29bcd4910986d3292bd023417f90d95e, name=29bcd4910986d3292bd023417f90d95e
  3596. Feb 9 09:26:55 crond[458]: time disparity of 803486 minutes detected
  3597. Feb 9 09:26:56 disk monitor: be idle
  3598. Feb 9 09:26:59 openvpn[1193]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  3599. Feb 9 09:26:59 openvpn[1193]: [29bcd4910986d3292bd023417f90d95e] Peer Connection Initiated with [AF_INET]46.166.188.197:1197
  3600. Feb 9 09:27:00 openvpn[1193]: SENT CONTROL [29bcd4910986d3292bd023417f90d95e]: 'PUSH_REQUEST' (status=1)
  3601. Feb 9 09:27:00 openvpn[1193]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.27.10.1,topology net30,ifconfig 10.27.10.6 10.27.10.5'
  3602. Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: timers and/or timeouts modified
  3603. Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: compression parms modified
  3604. Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: --ifconfig/up options modified
  3605. Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: route options modified
  3606. Feb 9 09:27:00 openvpn[1193]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3607. Feb 9 09:27:00 openvpn[1193]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3608. Feb 9 09:27:00 openvpn[1193]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  3609. Feb 9 09:27:00 openvpn[1193]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3610. Feb 9 09:27:00 openvpn[1193]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  3611. Feb 9 09:27:00 openvpn[1193]: TUN/TAP device tun11 opened
  3612. Feb 9 09:27:00 openvpn[1193]: TUN/TAP TX queue length set to 100
  3613. Feb 9 09:27:00 openvpn[1193]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  3614. Feb 9 09:27:00 openvpn[1193]: /usr/sbin/ip link set dev tun11 up mtu 1500
  3615. Feb 9 09:27:01 openvpn[1193]: /usr/sbin/ip addr add dev tun11 local 10.27.10.6 peer 10.27.10.5
  3616. Feb 9 09:27:01 openvpn[1193]: updown.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
  3617. Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  3618. Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  3619. Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  3620. Feb 9 09:27:02 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  3621. Feb 9 09:27:03 rc_service: service 1367:notify_rc updateresolv
  3622. Feb 9 09:27:03 dnsmasq[450]: read /etc/hosts - 5 addresses
  3623. Feb 9 09:27:03 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  3624. Feb 9 09:27:03 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  3625. Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  3626. Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  3627. Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.1#53
  3628. Feb 9 09:27:03 dnsmasq[450]: using nameserver 61.9.211.33#53
  3629. Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 46.166.188.197/32 via 60.226.64.1
  3630. Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 0.0.0.0/1 via 10.27.10.5
  3631. Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 128.0.0.0/1 via 10.27.10.5
  3632. Feb 9 09:27:06 openvpn[1193]: /usr/sbin/ip route add 10.27.10.1/32 via 10.27.10.5
  3633. Feb 9 09:27:07 openvpn-routing: Configuring policy rules for client 1
  3634. Feb 9 09:27:07 openvpn-routing: Creating VPN routing table
  3635. Feb 9 09:27:07 openvpn-routing: Removing route for 10.27.10.1 to tun11 from main routing table
  3636. Feb 9 09:27:07 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  3637. Feb 9 09:27:07 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  3638. Feb 9 09:27:07 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  3639. Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  3640. Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  3641. Feb 9 09:27:08 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  3642. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  3643. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  3644. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  3645. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  3646. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  3647. Feb 9 09:27:08 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  3648. Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  3649. Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  3650. Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  3651. Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  3652. Feb 9 09:27:09 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  3653. Feb 9 09:27:09 openvpn-routing: Completed routing policy configuration for client 1
  3654. Feb 9 09:27:09 openvpn[1193]: Initialization Sequence Completed
  3655. Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3656. Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3657. Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3658. Feb 9 09:47:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3659. Feb 9 10:00:56 disk_monitor: Got SIGALRM...
  3660. Feb 9 10:20:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3661. Feb 9 10:20:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3662. Feb 9 13:39:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3663. Feb 9 13:39:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3664. Feb 9 16:40:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.111 00:9c:02:94:2d:68
  3665. Feb 9 16:40:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.111 00:9c:02:94:2d:68
  3666. Feb 9 16:40:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.111 00:9c:02:94:2d:68
  3667. Feb 9 16:40:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.111 00:9c:02:94:2d:68 DESKTOP-S3EOB7P
  3668. Feb 9 16:54:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3669. Feb 9 16:54:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3670. Feb 9 17:03:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3671. Feb 9 17:03:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3672. Feb 9 17:33:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3673. Feb 9 17:33:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3674. Feb 9 17:41:26 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  3675. Feb 9 17:41:26 miniupnpd[1195]: remove port mapping 20807 UDP because it has expired
  3676. Feb 9 17:56:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3677. Feb 9 17:56:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3678. Feb 9 18:11:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3679. Feb 9 18:11:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3680. Feb 9 18:24:44 miniupnpd[1195]: remove port mapping 20807 TCP because it has expired
  3681. Feb 9 18:54:44 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  3682. Feb 9 18:54:44 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  3683. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3684. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3685. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3686. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3687. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3688. Feb 9 18:57:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3689. Feb 9 20:59:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3690. Feb 9 20:59:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3691. Feb 9 21:26:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3692. Feb 9 21:26:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3693. Feb 9 21:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3694. Feb 9 21:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3695. Feb 9 21:26:49 ntp: start NTP update
  3696. Feb 9 21:33:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3697. Feb 9 21:33:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3698. Feb 9 21:47:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3699. Feb 9 21:47:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3700. Feb 9 23:00:56 disk_monitor: Got SIGALRM...
  3701. Feb 10 04:15:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3702. Feb 10 04:15:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3703. Feb 10 04:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3704. Feb 10 04:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3705. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3706. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3707. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3708. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3709. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3710. Feb 10 05:03:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3711. Feb 10 05:03:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3712. Feb 10 05:03:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3713. Feb 10 05:42:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3714. Feb 10 05:42:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3715. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3716. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3717. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3718. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3719. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3720. Feb 10 07:11:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3721. Feb 10 07:47:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3722. Feb 10 07:47:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3723. Feb 10 08:12:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3724. Feb 10 08:12:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3725. Feb 10 08:39:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3726. Feb 10 08:39:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3727. Feb 10 09:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3728. Feb 10 09:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3729. Feb 10 09:26:47 ntp: start NTP update
  3730. Feb 10 09:47:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3731. Feb 10 09:47:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3732. Feb 10 10:31:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3733. Feb 10 10:31:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3734. Feb 10 11:20:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3735. Feb 10 11:20:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3736. Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3737. Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3738. Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3739. Feb 10 13:28:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3740. Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3741. Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3742. Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3743. Feb 10 14:20:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3744. Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3745. Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3746. Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3747. Feb 10 14:48:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3748. Feb 10 14:53:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3749. Feb 10 14:53:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3750. Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  3751. Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  3752. Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3753. Feb 10 15:17:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3754. Feb 10 16:17:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3755. Feb 10 16:17:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3756. Feb 10 16:41:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3757. Feb 10 16:41:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3758. Feb 10 17:16:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3759. Feb 10 17:16:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3760. Feb 10 17:35:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3761. Feb 10 17:35:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3762. Feb 10 17:40:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3763. Feb 10 17:40:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3764. Feb 10 17:40:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3765. Feb 10 17:40:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3766. Feb 10 17:47:44 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  3767. Feb 10 17:47:44 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  3768. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3769. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3770. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3771. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3772. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3773. Feb 10 18:47:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3774. Feb 10 19:06:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3775. Feb 10 19:06:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3776. Feb 10 19:13:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3777. Feb 10 19:13:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3778. Feb 10 19:56:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3779. Feb 10 19:56:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3780. Feb 10 21:26:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3781. Feb 10 21:26:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3782. Feb 10 21:26:45 ntp: start NTP update
  3783. Feb 11 02:06:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3784. Feb 11 02:06:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3785. Feb 11 03:23:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3786. Feb 11 03:23:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3787. Feb 11 05:11:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3788. Feb 11 05:11:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3789. Feb 11 05:51:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3790. Feb 11 05:51:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3791. Feb 11 06:11:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3792. Feb 11 06:11:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3793. Feb 11 07:27:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3794. Feb 11 07:27:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3795. Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  3796. Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  3797. Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3798. Feb 11 07:58:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3799. Feb 11 08:16:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3800. Feb 11 08:16:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3801. Feb 11 09:26:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3802. Feb 11 09:26:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3803. Feb 11 09:26:42 ntp: start NTP update
  3804. Feb 11 12:18:27 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3805. Feb 11 12:18:27 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3806. Feb 11 12:18:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3807. Feb 11 12:18:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3808. Feb 11 12:18:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3809. Feb 11 12:18:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3810. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3811. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3812. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3813. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3814. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3815. Feb 11 12:29:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3816. Feb 11 13:15:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3817. Feb 11 13:15:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3818. Feb 11 13:16:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3819. Feb 11 13:16:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3820. Feb 11 14:33:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3821. Feb 11 14:33:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3822. Feb 11 16:43:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3823. Feb 11 16:43:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3824. Feb 11 17:00:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3825. Feb 11 17:00:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3826. Feb 11 17:32:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3827. Feb 11 17:32:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3828. Feb 11 19:44:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3829. Feb 11 19:44:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3830. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3831. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3832. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3833. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3834. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3835. Feb 11 19:53:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3836. Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  3837. Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  3838. Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3839. Feb 11 20:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3840. Feb 11 20:54:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3841. Feb 11 20:54:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3842. Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3843. Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3844. Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3845. Feb 11 20:56:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3846. Feb 11 21:26:40 ntp: start NTP update
  3847. Feb 11 21:58:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3848. Feb 11 21:58:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3849. Feb 11 22:02:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3850. Feb 11 22:02:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3851. Feb 11 22:10:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3852. Feb 11 22:10:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3853. Feb 12 00:22:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3854. Feb 12 00:22:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3855. Feb 12 01:42:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3856. Feb 12 01:42:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3857. Feb 12 03:28:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3858. Feb 12 03:28:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3859. Feb 12 03:40:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3860. Feb 12 03:40:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3861. Feb 12 04:12:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3862. Feb 12 04:12:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3863. Feb 12 08:27:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3864. Feb 12 08:27:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3865. Feb 12 08:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3866. Feb 12 08:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3867. Feb 12 09:26:38 ntp: start NTP update
  3868. Feb 12 09:42:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3869. Feb 12 09:42:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3870. Feb 12 11:20:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3871. Feb 12 11:20:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3872. Feb 12 12:32:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3873. Feb 12 12:32:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3874. Feb 12 12:48:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3875. Feb 12 12:48:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3876. Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3877. Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3878. Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3879. Feb 12 13:14:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3880. Feb 12 14:42:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3881. Feb 12 14:42:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3882. Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3883. Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3884. Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3885. Feb 12 14:49:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3886. Feb 12 14:49:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3887. Feb 12 14:49:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3888. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3889. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3890. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3891. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3892. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3893. Feb 12 14:53:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3894. Feb 12 14:55:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3895. Feb 12 14:55:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3896. Feb 12 18:20:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3897. Feb 12 18:20:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3898. Feb 12 18:50:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3899. Feb 12 18:50:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3900. Feb 12 18:50:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3901. Feb 12 18:50:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3902. Feb 12 18:52:17 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
  3903. Feb 12 18:52:17 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
  3904. Feb 12 20:41:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3905. Feb 12 20:41:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3906. Feb 12 21:26:35 ntp: start NTP update
  3907. Feb 12 22:12:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3908. Feb 12 22:12:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3909. Feb 12 23:19:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3910. Feb 12 23:19:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3911. Feb 13 01:30:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3912. Feb 13 01:30:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3913. Feb 13 01:54:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3914. Feb 13 01:54:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3915. Feb 13 06:21:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3916. Feb 13 06:21:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3917. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3918. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3919. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3920. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3921. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3922. Feb 13 06:21:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3923. Feb 13 06:22:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3924. Feb 13 06:22:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3925. Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  3926. Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  3927. Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3928. Feb 13 06:37:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3929. Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
  3930. Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
  3931. Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3932. Feb 13 07:23:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3933. Feb 13 08:41:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3934. Feb 13 08:41:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3935. Feb 13 08:52:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3936. Feb 13 08:52:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3937. Feb 13 08:53:11 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  3938. Feb 13 08:53:11 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  3939. Feb 13 09:26:33 ntp: start NTP update
  3940. Feb 13 09:52:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3941. Feb 13 09:52:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3942. Feb 13 12:26:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3943. Feb 13 12:26:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3944. Feb 13 13:03:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3945. Feb 13 13:03:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3946. Feb 13 15:15:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3947. Feb 13 15:15:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3948. Feb 13 15:31:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3949. Feb 13 15:31:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3950. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3951. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3952. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3953. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3954. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3955. Feb 13 17:23:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3956. Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  3957. Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  3958. Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3959. Feb 13 17:35:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3960. Feb 13 17:36:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3961. Feb 13 17:36:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3962. Feb 13 18:01:19 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  3963. Feb 13 18:01:19 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  3964. Feb 13 19:59:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3965. Feb 13 19:59:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3966. Feb 13 20:41:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3967. Feb 13 20:41:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3968. Feb 13 20:59:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3969. Feb 13 20:59:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3970. Feb 13 21:26:31 ntp: start NTP update
  3971. Feb 13 23:00:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3972. Feb 13 23:00:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  3973. Feb 14 00:14:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3974. Feb 14 00:14:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  3975. Feb 14 05:06:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  3976. Feb 14 05:06:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  3977. Feb 14 05:07:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  3978. Feb 14 05:07:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  3979. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3980. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3981. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  3982. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3983. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  3984. Feb 14 06:28:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  3985. Feb 14 06:32:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3986. Feb 14 06:32:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3987. Feb 14 06:36:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  3988. Feb 14 06:36:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  3989. Feb 14 07:22:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  3990. Feb 14 07:22:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  3991. Feb 14 07:24:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  3992. Feb 14 07:24:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  3993. Feb 14 07:42:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  3994. Feb 14 07:42:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  3995. Feb 14 08:41:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  3996. Feb 14 08:41:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  3997. Feb 14 09:26:28 ntp: start NTP update
  3998. Feb 14 09:35:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  3999. Feb 14 09:35:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4000. Feb 14 11:18:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4001. Feb 14 11:18:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4002. Feb 14 12:24:55 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4003. Feb 14 12:24:55 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4004. Feb 14 13:34:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4005. Feb 14 13:34:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4006. Feb 14 13:38:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4007. Feb 14 13:38:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4008. Feb 14 17:09:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4009. Feb 14 17:09:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4010. Feb 14 17:09:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4011. Feb 14 17:09:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4012. Feb 14 17:14:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4013. Feb 14 17:14:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4014. Feb 14 17:30:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4015. Feb 14 17:30:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4016. Feb 14 18:24:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4017. Feb 14 18:24:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4018. Feb 14 18:41:57 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
  4019. Feb 14 18:41:57 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
  4020. Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4021. Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4022. Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4023. Feb 14 18:49:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4024. Feb 14 18:54:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4025. Feb 14 18:54:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4026. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4027. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4028. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4029. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4030. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4031. Feb 14 19:03:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4032. Feb 14 19:05:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4033. Feb 14 19:05:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4034. Feb 14 19:55:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4035. Feb 14 19:55:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4036. Feb 14 19:55:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4037. Feb 14 19:55:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4038. Feb 14 20:13:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4039. Feb 14 20:13:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4040. Feb 14 20:32:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4041. Feb 14 20:32:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4042. Feb 14 20:36:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4043. Feb 14 20:36:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4044. Feb 14 20:39:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4045. Feb 14 20:39:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4046. Feb 14 20:41:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4047. Feb 14 20:41:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4048. Feb 14 21:26:26 ntp: start NTP update
  4049. Feb 14 22:22:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4050. Feb 14 22:22:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4051. Feb 14 22:38:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4052. Feb 14 22:38:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4053. Feb 14 22:38:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4054. Feb 14 22:38:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4055. Feb 14 22:38:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4056. Feb 14 22:38:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4057. Feb 15 04:05:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4058. Feb 15 04:05:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4059. Feb 15 04:41:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4060. Feb 15 04:41:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4061. Feb 15 05:21:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4062. Feb 15 05:21:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4063. Feb 15 06:14:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4064. Feb 15 06:14:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4065. Feb 15 06:20:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4066. Feb 15 06:20:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4067. Feb 15 06:20:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4068. Feb 15 06:20:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4069. Feb 15 06:27:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4070. Feb 15 06:27:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4071. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4072. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4073. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4074. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4075. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4076. Feb 15 06:34:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4077. Feb 15 07:16:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4078. Feb 15 07:16:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4079. Feb 15 07:18:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4080. Feb 15 07:18:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4081. Feb 15 08:41:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4082. Feb 15 08:41:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4083. Feb 15 08:55:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4084. Feb 15 08:55:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4085. Feb 15 09:00:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4086. Feb 15 09:00:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4087. Feb 15 09:13:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4088. Feb 15 09:13:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4089. Feb 15 09:15:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4090. Feb 15 09:15:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4091. Feb 15 09:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4092. Feb 15 09:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4093. Feb 15 09:20:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4094. Feb 15 09:20:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4095. Feb 15 09:26:24 ntp: start NTP update
  4096. Feb 15 09:30:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4097. Feb 15 09:30:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4098. Feb 15 11:59:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4099. Feb 15 11:59:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4100. Feb 15 14:42:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4101. Feb 15 14:42:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4102. Feb 15 14:42:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4103. Feb 15 14:42:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4104. Feb 15 15:16:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4105. Feb 15 15:16:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4106. Feb 15 15:35:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4107. Feb 15 15:35:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4108. Feb 15 16:04:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4109. Feb 15 16:04:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4110. Feb 15 16:04:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4111. Feb 15 16:04:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4112. Feb 15 16:39:06 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4113. Feb 15 16:39:06 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4114. Feb 15 17:15:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4115. Feb 15 17:15:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4116. Feb 15 18:09:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4117. Feb 15 18:09:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4118. Feb 15 20:06:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4119. Feb 15 20:06:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4120. Feb 15 20:41:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4121. Feb 15 20:41:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4122. Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4123. Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4124. Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4125. Feb 15 20:52:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4126. Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4127. Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4128. Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4129. Feb 15 20:52:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4130. Feb 15 21:02:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4131. Feb 15 21:02:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4132. Feb 15 21:18:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4133. Feb 15 21:18:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4134. Feb 15 21:26:24 ntp: start NTP update
  4135. Feb 15 22:02:47 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4136. Feb 15 22:02:47 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4137. Feb 16 02:00:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4138. Feb 16 02:00:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4139. Feb 16 03:53:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4140. Feb 16 03:53:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4141. Feb 16 05:20:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4142. Feb 16 05:20:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4143. Feb 16 06:39:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4144. Feb 16 06:39:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4145. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4146. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4147. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4148. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4149. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4150. Feb 16 06:39:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4151. Feb 16 06:43:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4152. Feb 16 06:43:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4153. Feb 16 06:53:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4154. Feb 16 06:53:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4155. Feb 16 07:33:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4156. Feb 16 07:33:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4157. Feb 16 08:24:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4158. Feb 16 08:24:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4159. Feb 16 08:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4160. Feb 16 08:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4161. Feb 16 09:26:22 ntp: start NTP update
  4162. Feb 16 13:09:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4163. Feb 16 13:09:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4164. Feb 16 14:50:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4165. Feb 16 14:50:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4166. Feb 16 16:21:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4167. Feb 16 16:21:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4168. Feb 16 17:06:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4169. Feb 16 17:06:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4170. Feb 16 17:55:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4171. Feb 16 17:55:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4172. Feb 16 18:15:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4173. Feb 16 18:15:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4174. Feb 16 18:41:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4175. Feb 16 18:41:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4176. Feb 16 19:03:25 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4177. Feb 16 19:03:25 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4178. Feb 16 20:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4179. Feb 16 20:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4180. Feb 16 20:45:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4181. Feb 16 20:45:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4182. Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4183. Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4184. Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4185. Feb 16 20:45:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4186. Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4187. Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4188. Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4189. Feb 16 20:46:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4190. Feb 16 21:26:20 ntp: start NTP update
  4191. Feb 16 23:51:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4192. Feb 16 23:51:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4193. Feb 17 01:55:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4194. Feb 17 01:55:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4195. Feb 17 03:05:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4196. Feb 17 03:05:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4197. Feb 17 04:49:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4198. Feb 17 04:49:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4199. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4200. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4201. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4202. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4203. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4204. Feb 17 05:59:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4205. Feb 17 06:26:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4206. Feb 17 06:26:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4207. Feb 17 07:05:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4208. Feb 17 07:05:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4209. Feb 17 08:18:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4210. Feb 17 08:18:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4211. Feb 17 08:41:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4212. Feb 17 08:41:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4213. Feb 17 08:54:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4214. Feb 17 08:54:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4215. Feb 17 09:26:18 ntp: start NTP update
  4216. Feb 17 10:46:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4217. Feb 17 10:46:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4218. Feb 17 11:34:59 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4219. Feb 17 11:34:59 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4220. Feb 17 13:09:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4221. Feb 17 13:09:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4222. Feb 17 13:53:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4223. Feb 17 13:53:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4224. Feb 17 13:58:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4225. Feb 17 13:58:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4226. Feb 17 14:03:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4227. Feb 17 14:03:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4228. Feb 17 15:38:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4229. Feb 17 15:38:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4230. Feb 17 16:39:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4231. Feb 17 16:39:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4232. Feb 17 16:40:21 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
  4233. Feb 17 16:40:21 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
  4234. Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
  4235. Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
  4236. Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
  4237. Feb 17 16:40:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
  4238. Feb 17 17:39:16 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4239. Feb 17 17:39:16 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4240. Feb 17 20:41:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4241. Feb 17 20:41:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4242. Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4243. Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4244. Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4245. Feb 17 20:42:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4246. Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4247. Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4248. Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4249. Feb 17 20:42:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4250. Feb 17 20:56:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4251. Feb 17 20:56:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4252. Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  4253. Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4254. Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4255. Feb 17 20:57:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  4256. Feb 17 21:25:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4257. Feb 17 21:25:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4258. Feb 17 21:26:16 ntp: start NTP update
  4259. Feb 17 21:56:05 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  4260. Feb 17 21:56:05 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  4261. Feb 18 00:08:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4262. Feb 18 00:08:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4263. Feb 18 01:07:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4264. Feb 18 01:07:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4265. Feb 18 02:25:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4266. Feb 18 02:25:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4267. Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  4268. Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  4269. Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4270. Feb 18 04:21:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4271. Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  4272. Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  4273. Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4274. Feb 18 06:42:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4275. Feb 18 07:14:51 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4276. Feb 18 07:14:51 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4277. Feb 18 08:13:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4278. Feb 18 08:13:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4279. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4280. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4281. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4282. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4283. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4284. Feb 18 08:24:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4285. Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  4286. Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  4287. Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4288. Feb 18 08:28:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4289. Feb 18 08:34:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4290. Feb 18 08:34:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4291. Feb 18 09:26:14 ntp: start NTP update
  4292. Feb 18 11:04:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4293. Feb 18 11:04:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4294. Feb 18 11:32:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4295. Feb 18 11:32:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4296. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4297. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4298. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4299. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4300. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4301. Feb 18 11:38:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4302. Feb 18 12:15:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4303. Feb 18 12:15:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4304. Feb 18 12:55:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4305. Feb 18 12:55:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4306. Feb 18 15:42:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4307. Feb 18 15:42:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4308. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4309. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4310. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4311. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4312. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4313. Feb 18 16:16:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4314. Feb 18 18:32:01 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:55544, sid=010ee3a3 e1fa50b4
  4315. Feb 18 18:32:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4316. Feb 18 18:32:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4317. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
  4318. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
  4319. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
  4320. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
  4321. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
  4322. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
  4323. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
  4324. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
  4325. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
  4326. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
  4327. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4328. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4329. Feb 18 18:32:04 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:55544
  4330. Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  4331. Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
  4332. Feb 18 18:32:04 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
  4333. Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
  4334. Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
  4335. Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4336. Feb 18 18:32:05 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4337. Feb 18 18:40:42 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
  4338. Feb 18 18:40:42 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
  4339. Feb 18 19:34:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4340. Feb 18 19:34:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4341. Feb 18 20:28:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4342. Feb 18 20:28:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4343. Feb 18 21:26:12 ntp: start NTP update
  4344. Feb 18 21:58:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4345. Feb 18 21:58:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4346. Feb 18 23:07:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4347. Feb 18 23:07:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4348. Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4349. Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4350. Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4351. Feb 18 23:35:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4352. Feb 18 23:44:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4353. Feb 18 23:44:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4354. Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4355. Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4356. Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4357. Feb 19 00:03:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4358. Feb 19 00:14:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4359. Feb 19 00:14:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4360. Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4361. Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4362. Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4363. Feb 19 01:27:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4364. Feb 19 06:29:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4365. Feb 19 06:29:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4366. Feb 19 08:28:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4367. Feb 19 08:28:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4368. Feb 19 08:53:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4369. Feb 19 08:53:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4370. Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  4371. Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  4372. Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4373. Feb 19 09:03:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4374. Feb 19 09:07:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4375. Feb 19 09:07:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4376. Feb 19 09:26:10 ntp: start NTP update
  4377. Feb 19 09:58:19 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:54938, sid=2c2b239e cb123222
  4378. Feb 19 09:58:21 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4379. Feb 19 09:58:21 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4380. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
  4381. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
  4382. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
  4383. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
  4384. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
  4385. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
  4386. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
  4387. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
  4388. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
  4389. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
  4390. Feb 19 09:58:22 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4391. Feb 19 09:58:25 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4392. Feb 19 09:58:25 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:54938
  4393. Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  4394. Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
  4395. Feb 19 09:58:25 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
  4396. Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
  4397. Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
  4398. Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4399. Feb 19 09:58:26 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4400. Feb 19 10:16:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4401. Feb 19 10:16:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4402. Feb 19 10:46:04 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
  4403. Feb 19 10:46:04 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
  4404. Feb 19 10:57:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4405. Feb 19 10:57:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4406. Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4407. Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4408. Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4409. Feb 19 11:03:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4410. Feb 19 11:54:12 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:56906, sid=ceae4080 721ed74c
  4411. Feb 19 11:54:13 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4412. Feb 19 11:54:13 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4413. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
  4414. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
  4415. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
  4416. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
  4417. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
  4418. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
  4419. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
  4420. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
  4421. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
  4422. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
  4423. Feb 19 11:54:14 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4424. Feb 19 11:54:15 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4425. Feb 19 11:54:15 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:56906
  4426. Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  4427. Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
  4428. Feb 19 11:54:15 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
  4429. Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
  4430. Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
  4431. Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4432. Feb 19 11:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4433. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4434. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4435. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
  4436. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
  4437. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
  4438. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
  4439. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
  4440. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
  4441. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
  4442. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
  4443. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
  4444. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4445. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4446. Feb 19 12:54:16 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4447. Feb 19 12:54:17 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4448. Feb 19 13:54:14 openvpn[1149]: client/103.21.230.246 TLS: tls_process: killed expiring key
  4449. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4450. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4451. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
  4452. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
  4453. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
  4454. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
  4455. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
  4456. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
  4457. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
  4458. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
  4459. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
  4460. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4461. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4462. Feb 19 13:54:18 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4463. Feb 19 13:54:19 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4464. Feb 19 14:54:16 openvpn[1149]: client/103.21.230.246 TLS: tls_process: killed expiring key
  4465. Feb 19 14:54:19 openvpn[1149]: client/103.21.230.246 TLS: soft reset sec=0 bytes=23026403/-1 pkts=44223/0
  4466. Feb 19 14:54:22 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4467. Feb 19 14:54:22 openvpn[1149]: client/103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4468. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_VER=2.4.0
  4469. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_PLAT=win
  4470. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_PROTO=2
  4471. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4=1
  4472. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZ4v2=1
  4473. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_LZO=1
  4474. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUB=1
  4475. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_COMP_STUBv2=1
  4476. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_TCPNL=1
  4477. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4478. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4479. Feb 19 14:54:23 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4480. Feb 19 14:54:24 openvpn[1149]: client/103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4481. Feb 19 14:58:01 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
  4482. Feb 19 14:58:01 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
  4483. Feb 19 15:01:02 openvpn[1149]: 103.21.230.246 TLS: Initial packet from [AF_INET6]::ffff:103.21.230.246:53318, sid=8a3ff108 ec516f6d
  4484. Feb 19 15:01:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC68U, emailAddress=me@myhost.mydomain
  4485. Feb 19 15:01:03 openvpn[1149]: 103.21.230.246 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
  4486. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_VER=2.4.0
  4487. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_PLAT=win
  4488. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_PROTO=2
  4489. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_NCP=2
  4490. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4=1
  4491. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZ4v2=1
  4492. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_LZO=1
  4493. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUB=1
  4494. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_COMP_STUBv2=1
  4495. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_TCPNL=1
  4496. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4497. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4498. Feb 19 15:01:04 openvpn[1149]: 103.21.230.246 [client] Peer Connection Initiated with [AF_INET6]::ffff:103.21.230.246:53318
  4499. Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  4500. Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI: Learn: 10.8.0.2 -> client/103.21.230.246
  4501. Feb 19 15:01:04 openvpn[1149]: client/103.21.230.246 MULTI: primary virtual IP for client/103.21.230.246: 10.8.0.2
  4502. Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 PUSH: Received control message: 'PUSH_REQUEST'
  4503. Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 SENT CONTROL [client]: 'PUSH_REPLY,route 10.1.1.0 255.255.255.0,dhcp-option DNS 10.1.1.2,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
  4504. Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4505. Feb 19 15:01:06 openvpn[1149]: client/103.21.230.246 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  4506. Feb 19 15:05:23 openvpn[1149]: client/103.21.230.246 [client] Inactivity timeout (--ping-restart), restarting
  4507. Feb 19 15:05:23 openvpn[1149]: client/103.21.230.246 SIGUSR1[soft,ping-restart] received, client-instance restarting
  4508. Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4509. Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4510. Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4511. Feb 19 15:48:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4512. Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4513. Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4514. Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4515. Feb 19 16:30:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4516. Feb 19 17:03:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4517. Feb 19 17:03:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4518. Feb 19 19:57:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4519. Feb 19 19:57:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4520. Feb 19 20:28:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4521. Feb 19 20:28:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4522. Feb 19 21:14:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4523. Feb 19 21:14:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4524. Feb 19 21:26:08 ntp: start NTP update
  4525. Feb 19 22:21:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4526. Feb 19 22:21:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4527. Feb 20 03:19:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4528. Feb 20 03:19:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4529. Feb 20 03:43:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4530. Feb 20 03:43:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4531. Feb 20 05:31:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4532. Feb 20 05:31:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4533. Feb 20 07:09:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4534. Feb 20 07:09:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4535. Feb 20 08:14:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4536. Feb 20 08:14:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4537. Feb 20 08:28:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4538. Feb 20 08:28:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4539. Feb 20 09:23:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4540. Feb 20 09:23:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4541. Feb 20 09:26:06 ntp: start NTP update
  4542. Feb 20 14:55:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4543. Feb 20 14:55:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4544. Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4545. Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4546. Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4547. Feb 20 16:27:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4548. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4549. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4550. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4551. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4552. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4553. Feb 20 17:04:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4554. Feb 20 18:23:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4555. Feb 20 18:23:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4556. Feb 20 19:15:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4557. Feb 20 19:15:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4558. Feb 20 19:57:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4559. Feb 20 19:57:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4560. Feb 20 20:28:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4561. Feb 20 20:28:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4562. Feb 20 20:49:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4563. Feb 20 20:49:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4564. Feb 20 21:01:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4565. Feb 20 21:01:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4566. Feb 20 21:26:03 ntp: start NTP update
  4567. Feb 21 02:10:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4568. Feb 21 02:10:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4569. Feb 21 03:58:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4570. Feb 21 03:58:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4571. Feb 21 05:25:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4572. Feb 21 05:25:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4573. Feb 21 05:37:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4574. Feb 21 05:37:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4575. Feb 21 06:14:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4576. Feb 21 06:14:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4577. Feb 21 07:23:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4578. Feb 21 07:23:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4579. Feb 21 08:28:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4580. Feb 21 08:28:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4581. Feb 21 09:26:01 ntp: start NTP update
  4582. Feb 21 13:10:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4583. Feb 21 13:10:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4584. Feb 21 16:44:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4585. Feb 21 16:44:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4586. Feb 21 16:55:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4587. Feb 21 16:55:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4588. Feb 21 17:16:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4589. Feb 21 17:16:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4590. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4591. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4592. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4593. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4594. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4595. Feb 21 17:22:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4596. Feb 21 18:14:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4597. Feb 21 18:14:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4598. Feb 21 20:28:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4599. Feb 21 20:28:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4600. Feb 21 20:36:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4601. Feb 21 20:36:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4602. Feb 21 21:25:59 ntp: start NTP update
  4603. Feb 22 00:01:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4604. Feb 22 00:01:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4605. Feb 22 03:23:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4606. Feb 22 03:23:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4607. Feb 22 04:26:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4608. Feb 22 04:26:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4609. Feb 22 05:19:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4610. Feb 22 05:19:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4611. Feb 22 08:28:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4612. Feb 22 08:28:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4613. Feb 22 08:36:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4614. Feb 22 08:36:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4615. Feb 22 09:25:57 ntp: start NTP update
  4616. Feb 22 11:14:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4617. Feb 22 11:14:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4618. Feb 22 14:49:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4619. Feb 22 14:49:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4620. Feb 22 16:50:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4621. Feb 22 16:50:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4622. Feb 22 16:59:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4623. Feb 22 16:59:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4624. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4625. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4626. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4627. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4628. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4629. Feb 22 17:34:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4630. Feb 22 19:51:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4631. Feb 22 19:51:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4632. Feb 22 20:28:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4633. Feb 22 20:28:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4634. Feb 22 21:25:55 ntp: start NTP update
  4635. Feb 22 22:16:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4636. Feb 22 22:16:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4637. Feb 23 01:21:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4638. Feb 23 01:21:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4639. Feb 23 03:58:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4640. Feb 23 03:58:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4641. Feb 23 04:21:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4642. Feb 23 04:21:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4643. Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  4644. Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  4645. Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4646. Feb 23 05:36:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4647. Feb 23 06:52:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4648. Feb 23 06:52:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4649. Feb 23 08:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4650. Feb 23 08:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4651. Feb 23 08:55:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4652. Feb 23 08:55:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4653. Feb 23 09:25:53 ntp: start NTP update
  4654. Feb 23 12:27:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4655. Feb 23 12:27:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4656. Feb 23 13:57:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4657. Feb 23 13:57:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4658. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4659. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4660. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4661. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4662. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4663. Feb 23 14:33:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4664. Feb 23 15:12:02 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4665. Feb 23 15:12:02 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4666. Feb 23 17:58:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4667. Feb 23 17:58:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4668. Feb 23 20:03:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4669. Feb 23 20:03:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4670. Feb 23 20:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4671. Feb 23 20:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4672. Feb 23 21:25:51 ntp: start NTP update
  4673. Feb 23 23:25:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4674. Feb 23 23:25:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4675. Feb 24 01:28:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4676. Feb 24 01:28:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4677. Feb 24 02:13:20 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4678. Feb 24 02:13:20 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4679. Feb 24 05:00:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4680. Feb 24 05:00:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4681. Feb 24 05:34:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  4682. Feb 24 05:34:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  4683. Feb 24 07:05:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4684. Feb 24 07:05:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4685. Feb 24 08:28:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4686. Feb 24 08:28:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4687. Feb 24 09:25:49 ntp: start NTP update
  4688. Feb 24 10:32:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4689. Feb 24 10:32:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4690. Feb 24 13:17:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4691. Feb 24 13:17:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4692. Feb 24 16:31:50 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4693. Feb 24 16:31:50 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4694. Feb 24 16:36:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4695. Feb 24 16:36:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4696. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4697. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4698. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4699. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4700. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4701. Feb 24 17:06:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4702. Feb 24 17:41:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4703. Feb 24 17:41:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4704. Feb 24 18:17:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4705. Feb 24 18:17:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4706. Feb 24 18:30:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4707. Feb 24 18:30:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4708. Feb 24 18:54:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4709. Feb 24 18:54:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4710. Feb 24 20:28:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4711. Feb 24 20:28:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4712. Feb 24 21:25:47 ntp: start NTP update
  4713. Feb 24 21:30:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4714. Feb 24 21:30:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4715. Feb 25 00:00:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4716. Feb 25 00:00:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4717. Feb 25 03:45:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4718. Feb 25 03:45:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4719. Feb 25 04:59:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4720. Feb 25 04:59:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4721. Feb 25 05:21:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4722. Feb 25 05:21:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4723. Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4724. Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4725. Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4726. Feb 25 05:21:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4727. Feb 25 08:01:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4728. Feb 25 08:01:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4729. Feb 25 08:28:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4730. Feb 25 08:28:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4731. Feb 25 09:25:45 ntp: start NTP update
  4732. Feb 25 11:02:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4733. Feb 25 11:02:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4734. Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4735. Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4736. Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4737. Feb 25 13:05:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4738. Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4739. Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4740. Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4741. Feb 25 13:05:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4742. Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 54:a0:50:39:03:b0
  4743. Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.37 54:a0:50:39:03:b0
  4744. Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.37 54:a0:50:39:03:b0
  4745. Feb 25 13:31:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.37 54:a0:50:39:03:b0 CBt100
  4746. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4747. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4748. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4749. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4750. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4751. Feb 25 13:42:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4752. Feb 25 14:26:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4753. Feb 25 14:26:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4754. Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
  4755. Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
  4756. Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  4757. Feb 25 14:40:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  4758. Feb 25 15:48:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4759. Feb 25 15:48:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4760. Feb 25 17:39:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4761. Feb 25 17:39:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4762. Feb 25 18:42:36 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
  4763. Feb 25 18:42:36 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
  4764. Feb 25 19:11:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4765. Feb 25 19:11:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4766. Feb 25 19:24:33 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4767. Feb 25 19:24:33 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4768. Feb 25 19:24:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4769. Feb 25 19:24:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4770. Feb 25 19:50:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4771. Feb 25 19:50:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4772. Feb 25 19:51:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4773. Feb 25 19:51:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4774. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4775. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4776. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4777. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4778. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4779. Feb 25 19:52:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4780. Feb 25 20:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4781. Feb 25 20:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4782. Feb 25 21:25:43 ntp: start NTP update
  4783. Feb 25 22:02:46 miniupnpd[1195]: remove port mapping 1865 TCP because it has expired
  4784. Feb 25 22:02:46 miniupnpd[1195]: remove port mapping 1865 UDP because it has expired
  4785. Feb 25 22:11:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4786. Feb 25 22:11:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4787. Feb 26 01:34:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4788. Feb 26 01:34:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4789. Feb 26 02:27:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4790. Feb 26 02:27:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4791. Feb 26 02:28:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4792. Feb 26 02:28:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4793. Feb 26 03:02:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4794. Feb 26 03:02:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4795. Feb 26 06:09:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4796. Feb 26 06:09:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4797. Feb 26 08:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4798. Feb 26 08:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4799. Feb 26 08:49:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4800. Feb 26 08:49:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4801. Feb 26 09:25:41 ntp: start NTP update
  4802. Feb 26 12:37:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4803. Feb 26 12:37:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4804. Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
  4805. Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
  4806. Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4807. Feb 26 12:54:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4808. Feb 26 13:43:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4809. Feb 26 13:43:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4810. Feb 26 15:25:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4811. Feb 26 15:25:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4812. Feb 26 15:26:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4813. Feb 26 15:26:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4814. Feb 26 15:29:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4815. Feb 26 15:29:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4816. Feb 26 16:59:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4817. Feb 26 16:59:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4818. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4819. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4820. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4821. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4822. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4823. Feb 26 17:05:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4824. Feb 26 18:05:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4825. Feb 26 18:05:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4826. Feb 26 18:21:22 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4827. Feb 26 18:21:22 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4828. Feb 26 19:59:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4829. Feb 26 19:59:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4830. Feb 26 20:28:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4831. Feb 26 20:28:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4832. Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4833. Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4834. Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4835. Feb 26 20:36:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4836. Feb 26 21:25:39 ntp: start NTP update
  4837. Feb 26 23:38:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4838. Feb 26 23:38:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4839. Feb 27 00:39:03 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4840. Feb 27 00:39:03 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4841. Feb 27 03:48:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4842. Feb 27 03:48:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4843. Feb 27 05:52:41 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4844. Feb 27 05:52:41 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4845. Feb 27 06:39:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4846. Feb 27 06:39:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4847. Feb 27 08:07:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4848. Feb 27 08:07:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4849. Feb 27 08:28:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4850. Feb 27 08:28:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4851. Feb 27 09:22:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4852. Feb 27 09:22:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4853. Feb 27 09:25:37 ntp: start NTP update
  4854. Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4855. Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4856. Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4857. Feb 27 10:14:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4858. Feb 27 10:48:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4859. Feb 27 10:48:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4860. Feb 27 11:49:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4861. Feb 27 11:49:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4862. Feb 27 14:02:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4863. Feb 27 14:02:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4864. Feb 27 14:02:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4865. Feb 27 14:02:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4866. Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4867. Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4868. Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4869. Feb 27 14:03:13 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4870. Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
  4871. Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
  4872. Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  4873. Feb 27 14:12:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  4874. Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  4875. Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4876. Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4877. Feb 27 14:27:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  4878. Feb 27 14:53:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4879. Feb 27 14:53:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4880. Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  4881. Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4882. Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4883. Feb 27 15:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  4884. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4885. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4886. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4887. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4888. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4889. Feb 27 15:43:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4890. Feb 27 16:30:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4891. Feb 27 16:30:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4892. Feb 27 16:52:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4893. Feb 27 16:52:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4894. Feb 27 16:53:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4895. Feb 27 16:53:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4896. Feb 27 17:49:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4897. Feb 27 17:49:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4898. Feb 27 20:28:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4899. Feb 27 20:28:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4900. Feb 27 20:38:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4901. Feb 27 20:38:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4902. Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4903. Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4904. Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4905. Feb 27 20:40:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4906. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4907. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4908. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4909. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4910. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4911. Feb 27 20:48:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4912. Feb 27 21:25:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4913. Feb 27 21:25:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4914. Feb 27 21:25:35 ntp: start NTP update
  4915. Feb 27 21:46:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4916. Feb 27 21:46:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4917. Feb 27 22:45:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4918. Feb 27 22:45:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4919. Feb 28 01:34:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4920. Feb 28 01:34:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4921. Feb 28 02:04:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4922. Feb 28 02:04:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4923. Feb 28 04:44:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4924. Feb 28 04:44:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4925. Feb 28 08:11:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4926. Feb 28 08:11:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4927. Feb 28 08:25:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  4928. Feb 28 08:25:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  4929. Feb 28 08:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  4930. Feb 28 08:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  4931. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4932. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4933. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4934. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4935. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4936. Feb 28 08:30:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4937. Feb 28 08:32:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4938. Feb 28 08:32:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4939. Feb 28 09:25:33 ntp: start NTP update
  4940. Feb 28 09:36:00 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
  4941. Feb 28 09:36:00 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
  4942. Feb 28 09:37:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  4943. Feb 28 09:37:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  4944. Feb 28 09:50:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  4945. Feb 28 09:50:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  4946. Feb 28 09:56:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  4947. Feb 28 09:56:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  4948. Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  4949. Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4950. Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4951. Feb 28 10:55:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  4952. Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  4953. Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4954. Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  4955. Feb 28 11:36:34 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  4956. Feb 28 13:05:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  4957. Feb 28 13:05:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  4958. Feb 28 13:17:47 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4959. Feb 28 13:17:47 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4960. Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 88:30:8a:79:ee:94
  4961. Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.232 88:30:8a:79:ee:94
  4962. Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4963. Feb 28 13:17:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4964. Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  4965. Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  4966. Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  4967. Feb 28 13:18:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  4968. Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:5f:bb:23
  4969. Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4970. Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4971. Feb 28 13:30:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  4972. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4973. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4974. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4975. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4976. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4977. Feb 28 13:32:58 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  4978. Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:5f:bb:23
  4979. Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4980. Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4981. Feb 28 13:38:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  4982. Feb 28 13:51:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  4983. Feb 28 13:51:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  4984. Feb 28 13:55:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.232 88:30:8a:79:ee:94
  4985. Feb 28 13:55:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.232 88:30:8a:79:ee:94 232
  4986. Feb 28 15:30:19 miniupnpd[1195]: remove port mapping 16942 TCP because it has expired
  4987. Feb 28 15:30:19 miniupnpd[1195]: remove port mapping 16942 UDP because it has expired
  4988. Feb 28 15:41:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4989. Feb 28 15:41:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  4990. Feb 28 16:03:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4991. Feb 28 16:03:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  4992. Feb 28 16:30:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4993. Feb 28 16:30:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  4994. Feb 28 16:46:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  4995. Feb 28 16:46:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  4996. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4997. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  4998. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  4999. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5000. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5001. Feb 28 17:20:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5002. Feb 28 17:22:17 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5003. Feb 28 17:22:17 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5004. Feb 28 19:33:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5005. Feb 28 19:33:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5006. Feb 28 20:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5007. Feb 28 20:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5008. Feb 28 20:33:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5009. Feb 28 20:33:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5010. Feb 28 21:25:31 ntp: start NTP update
  5011. Mar 1 00:12:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5012. Mar 1 00:12:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5013. Mar 1 00:50:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5014. Mar 1 00:50:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5015. Mar 1 02:13:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5016. Mar 1 02:13:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5017. Mar 1 04:53:30 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5018. Mar 1 04:53:30 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5019. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5020. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5021. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5022. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5023. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5024. Mar 1 05:19:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5025. Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  5026. Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  5027. Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  5028. Mar 1 06:09:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  5029. Mar 1 06:10:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  5030. Mar 1 06:10:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  5031. Mar 1 06:35:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5032. Mar 1 06:35:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5033. Mar 1 06:37:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5034. Mar 1 06:37:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5035. Mar 1 07:42:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5036. Mar 1 07:42:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5037. Mar 1 08:28:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5038. Mar 1 08:28:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5039. Mar 1 09:25:29 ntp: start NTP update
  5040. Mar 1 09:32:37 miniupnpd[1195]: remove port mapping 46508 TCP because it has expired
  5041. Mar 1 09:32:37 miniupnpd[1195]: remove port mapping 46508 UDP because it has expired
  5042. Mar 1 11:07:45 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5043. Mar 1 11:07:45 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5044. Mar 1 12:55:54 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5045. Mar 1 12:55:54 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5046. Mar 1 16:43:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5047. Mar 1 16:43:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5048. Mar 1 17:42:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5049. Mar 1 17:42:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5050. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5051. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5052. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5053. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5054. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5055. Mar 1 18:07:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5056. Mar 1 18:33:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5057. Mar 1 18:33:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5058. Mar 1 18:51:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5059. Mar 1 18:51:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5060. Mar 1 20:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5061. Mar 1 20:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5062. Mar 1 21:25:27 ntp: start NTP update
  5063. Mar 1 21:47:53 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5064. Mar 1 21:47:53 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5065. Mar 1 23:50:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5066. Mar 1 23:50:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5067. Mar 2 04:14:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5068. Mar 2 04:14:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5069. Mar 2 04:17:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5070. Mar 2 04:17:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5071. Mar 2 06:04:16 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5072. Mar 2 06:04:16 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5073. Mar 2 06:06:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5074. Mar 2 06:06:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5075. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5076. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5077. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5078. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5079. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5080. Mar 2 06:14:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5081. Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 74:2f:68:20:e1:af
  5082. Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.252 74:2f:68:20:e1:af
  5083. Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.252 74:2f:68:20:e1:af
  5084. Mar 2 06:38:43 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.252 74:2f:68:20:e1:af android-1f800deca590ca0d
  5085. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5086. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5087. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5088. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5089. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5090. Mar 2 07:17:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5091. Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
  5092. Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
  5093. Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5094. Mar 2 07:22:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5095. Mar 2 08:28:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5096. Mar 2 08:28:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5097. Mar 2 08:31:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5098. Mar 2 08:31:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5099. Mar 2 08:31:19 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5100. Mar 2 08:31:19 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5101. Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 18:cf:5e:f4:fa:20
  5102. Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  5103. Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.20 18:cf:5e:f4:fa:20
  5104. Mar 2 08:42:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.20 18:cf:5e:f4:fa:20 FXF4FA20
  5105. Mar 2 08:53:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5106. Mar 2 08:53:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5107. Mar 2 09:25:24 ntp: start NTP update
  5108. Mar 2 10:50:56 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5109. Mar 2 10:50:56 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5110. Mar 2 14:20:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5111. Mar 2 14:20:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5112. Mar 2 15:02:44 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5113. Mar 2 15:02:44 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5114. Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5115. Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5116. Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5117. Mar 2 16:16:36 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5118. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5119. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5120. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5121. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5122. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5123. Mar 2 16:37:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5124. Mar 2 16:56:38 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5125. Mar 2 16:56:38 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5126. Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  5127. Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  5128. Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5129. Mar 2 17:05:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5130. Mar 2 17:17:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5131. Mar 2 17:17:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5132. Mar 2 17:35:21 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5133. Mar 2 17:35:21 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5134. Mar 2 18:49:35 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5135. Mar 2 18:49:35 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5136. Mar 2 19:43:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5137. Mar 2 19:43:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5138. Mar 2 21:25:23 ntp: start NTP update
  5139. Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5140. Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5141. Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5142. Mar 2 21:28:24 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5143. Mar 2 21:42:23 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5144. Mar 2 21:42:23 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5145. Mar 3 02:14:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5146. Mar 3 02:14:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5147. Mar 3 04:02:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5148. Mar 3 04:02:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5149. Mar 3 05:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5150. Mar 3 05:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5151. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5152. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5153. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5154. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5155. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5156. Mar 3 06:17:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5157. Mar 3 06:20:49 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5158. Mar 3 06:20:49 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5159. Mar 3 06:40:07 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5160. Mar 3 06:40:07 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5161. Mar 3 07:06:26 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5162. Mar 3 07:06:26 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5163. Mar 3 08:14:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5164. Mar 3 08:14:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5165. Mar 3 09:25:21 ntp: start NTP update
  5166. Mar 3 12:36:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5167. Mar 3 12:36:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5168. Mar 3 13:14:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5169. Mar 3 13:14:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5170. Mar 3 14:55:52 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5171. Mar 3 14:55:52 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5172. Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5173. Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5174. Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5175. Mar 3 16:27:01 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5176. Mar 3 17:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5177. Mar 3 17:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5178. Mar 3 17:40:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5179. Mar 3 17:40:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5180. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5181. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5182. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5183. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5184. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5185. Mar 3 17:53:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5186. Mar 3 19:20:09 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5187. Mar 3 19:20:09 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5188. Mar 3 21:25:19 ntp: start NTP update
  5189. Mar 3 23:56:04 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5190. Mar 3 23:56:04 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5191. Mar 4 00:07:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5192. Mar 4 00:07:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5193. Mar 4 02:03:11 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5194. Mar 4 02:03:11 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5195. Mar 4 03:58:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5196. Mar 4 03:58:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5197. Mar 4 04:35:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5198. Mar 4 04:35:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5199. Mar 4 05:05:47 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5200. Mar 4 05:05:47 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5201. Mar 4 06:18:39 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5202. Mar 4 06:18:39 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5203. Mar 4 09:25:17 ntp: start NTP update
  5204. Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5205. Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5206. Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5207. Mar 4 10:30:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5208. Mar 4 11:00:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5209. Mar 4 11:00:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5210. Mar 4 12:23:15 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5211. Mar 4 12:23:15 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5212. Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5213. Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5214. Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5215. Mar 4 12:23:18 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5216. Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
  5217. Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
  5218. Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  5219. Mar 4 13:03:25 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  5220. Mar 4 13:06:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5221. Mar 4 13:06:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5222. Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.145 24:77:03:5c:3e:84
  5223. Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.145 24:77:03:5c:3e:84
  5224. Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5225. Mar 4 13:07:00 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5226. Mar 4 15:46:10 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5227. Mar 4 15:46:10 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5228. Mar 4 17:05:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5229. Mar 4 17:05:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5230. Mar 4 17:09:29 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5231. Mar 4 17:09:29 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5232. Mar 4 17:48:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5233. Mar 4 17:48:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5234. Mar 4 18:16:32 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5235. Mar 4 18:16:32 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5236. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5237. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5238. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5239. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5240. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5241. Mar 4 18:49:28 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5242. Mar 4 19:18:39 miniupnpd[1195]: remove port mapping 20806 TCP because it has expired
  5243. Mar 4 19:18:39 miniupnpd[1195]: remove port mapping 20806 UDP because it has expired
  5244. Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  5245. Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  5246. Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5247. Mar 4 21:09:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5248. Mar 4 21:25:15 ntp: start NTP update
  5249. Mar 4 21:54:59 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5250. Mar 4 21:54:59 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5251. Mar 4 23:54:27 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5252. Mar 4 23:54:27 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5253. Mar 4 23:54:31 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5254. Mar 4 23:54:31 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5255. Mar 5 00:49:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5256. Mar 5 00:49:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5257. Mar 5 02:55:46 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5258. Mar 5 02:55:46 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5259. Mar 5 03:54:48 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5260. Mar 5 03:54:48 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5261. Mar 5 07:09:39 openvpn[1193]: [29bcd4910986d3292bd023417f90d95e] Inactivity timeout (--ping-restart), restarting
  5262. Mar 5 07:09:39 openvpn[1193]: SIGUSR1[soft,ping-restart] received, process restarting
  5263. Mar 5 07:09:39 openvpn[1193]: Restart pause, 5 second(s)
  5264. Mar 5 07:09:44 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5265. Mar 5 07:09:44 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.188.197:1197
  5266. Mar 5 07:09:44 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5267. Mar 5 07:09:44 openvpn[1193]: UDP link local: (not bound)
  5268. Mar 5 07:09:44 openvpn[1193]: UDP link remote: [AF_INET]46.166.188.197:1197
  5269. Mar 5 07:10:44 openvpn[1193]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  5270. Mar 5 07:10:44 openvpn[1193]: TLS Error: TLS handshake failed
  5271. Mar 5 07:10:44 openvpn[1193]: SIGUSR1[soft,tls-error] received, process restarting
  5272. Mar 5 07:10:44 openvpn[1193]: Restart pause, 5 second(s)
  5273. Mar 5 07:10:49 openvpn[1193]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5274. Mar 5 07:10:49 openvpn[1193]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.154.192:1197
  5275. Mar 5 07:10:49 openvpn[1193]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5276. Mar 5 07:10:49 openvpn[1193]: UDP link local: (not bound)
  5277. Mar 5 07:10:49 openvpn[1193]: UDP link remote: [AF_INET]109.201.154.192:1197
  5278. Mar 5 07:10:49 openvpn[1193]: TLS: Initial packet from [AF_INET]109.201.154.192:1197, sid=eec874a6 cbc685c3
  5279. Mar 5 07:10:50 openvpn[1193]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5280. Mar 5 07:10:50 openvpn[1193]: VERIFY OK: nsCertType=SERVER
  5281. Mar 5 07:10:50 openvpn[1193]: Validating certificate key usage
  5282. Mar 5 07:10:50 openvpn[1193]: ++ Certificate has key usage 00a0, expects 00a0
  5283. Mar 5 07:10:50 openvpn[1193]: VERIFY KU OK
  5284. Mar 5 07:10:50 openvpn[1193]: Validating certificate extended key usage
  5285. Mar 5 07:10:50 openvpn[1193]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5286. Mar 5 07:10:50 openvpn[1193]: VERIFY EKU OK
  5287. Mar 5 07:10:50 openvpn[1193]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=14162b986ea31b50fccaa9bd5e3c8e87, name=14162b986ea31b50fccaa9bd5e3c8e87
  5288. Mar 5 07:10:53 openvpn[1193]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5289. Mar 5 07:10:53 openvpn[1193]: [14162b986ea31b50fccaa9bd5e3c8e87] Peer Connection Initiated with [AF_INET]109.201.154.192:1197
  5290. Mar 5 07:10:54 openvpn[1193]: SENT CONTROL [14162b986ea31b50fccaa9bd5e3c8e87]: 'PUSH_REQUEST' (status=1)
  5291. Mar 5 07:10:55 openvpn[1193]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.16.10.1,topology net30,ifconfig 10.16.10.6 10.16.10.5'
  5292. Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: timers and/or timeouts modified
  5293. Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: compression parms modified
  5294. Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: --ifconfig/up options modified
  5295. Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: route options modified
  5296. Mar 5 07:10:55 openvpn[1193]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5297. Mar 5 07:10:55 openvpn[1193]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5298. Mar 5 07:10:55 openvpn[1193]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5299. Mar 5 07:10:55 openvpn[1193]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5300. Mar 5 07:10:55 openvpn[1193]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5301. Mar 5 07:10:55 openvpn[1193]: Preserving previous TUN/TAP instance: tun11
  5302. Mar 5 07:10:55 openvpn[1193]: Initialization Sequence Completed
  5303. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5304. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5305. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 6c:ad:f8:d9:1e:c8
  5306. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5307. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8
  5308. Mar 5 08:36:37 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.51 6c:ad:f8:d9:1e:c8 Chromecast
  5309. Mar 5 09:05:40 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.25 b0:d5:9d:1e:1c:48
  5310. Mar 5 09:05:40 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.25 b0:d5:9d:1e:1c:48 ANTSCAM-0000-38
  5311. Mar 5 09:09:06 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5312. Mar 5 09:09:06 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5313. Mar 5 09:25:13 ntp: start NTP update
  5314. Mar 5 11:41:05 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.92 3c:a8:2a:4b:4f:67
  5315. Mar 5 11:41:05 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.92 3c:a8:2a:4b:4f:67 ILOCN65170H6G
  5316. Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 08:62:66:13:0f:0d
  5317. Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.114 08:62:66:13:0f:0d
  5318. Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.114 08:62:66:13:0f:0d
  5319. Mar 5 12:15:14 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.114 08:62:66:13:0f:0d 114
  5320. Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 48:5a:3f:66:59:01
  5321. Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.162 48:5a:3f:66:59:01
  5322. Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.162 48:5a:3f:66:59:01
  5323. Mar 5 12:53:57 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.162 48:5a:3f:66:59:01 WISOL
  5324. Mar 5 12:54:42 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.89 48:5a:3f:5f:bb:23
  5325. Mar 5 12:54:42 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.89 48:5a:3f:5f:bb:23 android-43668acc6f1b825e
  5326. Mar 5 13:51:12 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.5 3c:a8:2a:4b:4f:64
  5327. Mar 5 13:51:12 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.5 3c:a8:2a:4b:4f:64 MACHINE
  5328. Mar 5 14:07:08 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.145 24:77:03:5c:3e:84
  5329. Mar 5 14:07:08 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.145 24:77:03:5c:3e:84 CB-EB
  5330. Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPDISCOVER(br0) 10.1.1.77 10:08:b1:e4:71:89
  5331. Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPOFFER(br0) 10.1.1.77 10:08:b1:e4:71:89
  5332. Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.77 10:08:b1:e4:71:89
  5333. Mar 5 14:10:55 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.77 10:08:b1:e4:71:89 Rhiannon
  5334. Mar 5 14:52:33 dnsmasq-dhcp[450]: DHCPREQUEST(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5335. Mar 5 14:52:33 dnsmasq-dhcp[450]: DHCPACK(br0) 10.1.1.137 00:0e:08:ac:80:e8
  5336. Mar 5 16:41:56 rc_service: httpd 456:notify_rc stop_vpnclient1
  5337. Mar 5 16:41:56 openvpn[1193]: event_wait : Interrupted system call (code=4)
  5338. Mar 5 16:41:56 openvpn[1193]: vpnrouting.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
  5339. Mar 5 16:41:56 openvpn-routing: Configuring policy rules for client 1
  5340. Mar 5 16:41:57 openvpn-routing: Removing rule 10001 from routing policy
  5341. Mar 5 16:41:57 openvpn-routing: Removing rule 10002 from routing policy
  5342. Mar 5 16:41:57 openvpn-routing: Removing rule 10003 from routing policy
  5343. Mar 5 16:41:57 openvpn-routing: Removing rule 10004 from routing policy
  5344. Mar 5 16:41:57 openvpn-routing: Removing rule 10005 from routing policy
  5345. Mar 5 16:41:57 openvpn-routing: Removing rule 10006 from routing policy
  5346. Mar 5 16:41:57 openvpn-routing: Removing rule 10007 from routing policy
  5347. Mar 5 16:41:57 openvpn-routing: Removing rule 10008 from routing policy
  5348. Mar 5 16:41:57 openvpn-routing: Removing rule 10009 from routing policy
  5349. Mar 5 16:41:57 openvpn-routing: Removing rule 10010 from routing policy
  5350. Mar 5 16:41:57 openvpn-routing: Removing rule 10011 from routing policy
  5351. Mar 5 16:41:57 openvpn-routing: Removing rule 10101 from routing policy
  5352. Mar 5 16:41:58 openvpn-routing: Removing rule 10102 from routing policy
  5353. Mar 5 16:41:58 openvpn-routing: Removing rule 10103 from routing policy
  5354. Mar 5 16:41:58 openvpn-routing: Removing rule 10104 from routing policy
  5355. Mar 5 16:41:58 openvpn-routing: Flushing client routing table
  5356. Mar 5 16:41:58 openvpn-routing: Completed routing policy configuration for client 1
  5357. Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 10.27.10.1/32
  5358. Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5359. Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 46.166.188.197/32
  5360. Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 0.0.0.0/1
  5361. Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5362. Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip route del 128.0.0.0/1
  5363. Mar 5 16:41:58 openvpn[1193]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5364. Mar 5 16:41:58 openvpn[1193]: Closing TUN/TAP interface
  5365. Mar 5 16:41:58 openvpn[1193]: /usr/sbin/ip addr del dev tun11 local 10.27.10.6 peer 10.27.10.5
  5366. Mar 5 16:41:58 openvpn[1193]: updown.sh tun11 1500 1570 10.27.10.6 10.27.10.5 init
  5367. Mar 5 16:41:59 rc_service: service 18319:notify_rc updateresolv
  5368. Mar 5 16:41:59 rc_service: waitting "stop_vpnclient1" via httpd ...
  5369. Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts - 5 addresses
  5370. Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  5371. Mar 5 16:42:09 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  5372. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  5373. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  5374. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53
  5375. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53
  5376. Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts - 5 addresses
  5377. Mar 5 16:42:09 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  5378. Mar 5 16:42:09 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  5379. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  5380. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  5381. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.1#53
  5382. Mar 5 16:42:09 dnsmasq[450]: using nameserver 61.9.211.33#53
  5383. Mar 5 16:42:16 rc_service: httpd 456:notify_rc start_vpnclient1
  5384. Mar 5 16:42:19 openvpn[18357]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  5385. Mar 5 16:42:19 openvpn[18357]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  5386. Mar 5 16:42:19 openvpn[18358]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5387. Mar 5 16:42:19 openvpn[18358]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.163:1197
  5388. Mar 5 16:42:19 openvpn[18358]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5389. Mar 5 16:42:19 openvpn[18358]: UDP link local: (not bound)
  5390. Mar 5 16:42:19 openvpn[18358]: UDP link remote: [AF_INET]46.166.138.163:1197
  5391. Mar 5 16:42:19 openvpn[18358]: TLS: Initial packet from [AF_INET]46.166.138.163:1197, sid=10a77258 df37d728
  5392. Mar 5 16:42:20 openvpn[18358]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5393. Mar 5 16:42:20 openvpn[18358]: VERIFY OK: nsCertType=SERVER
  5394. Mar 5 16:42:20 openvpn[18358]: Validating certificate key usage
  5395. Mar 5 16:42:20 openvpn[18358]: ++ Certificate has key usage 00a0, expects 00a0
  5396. Mar 5 16:42:20 openvpn[18358]: VERIFY KU OK
  5397. Mar 5 16:42:20 openvpn[18358]: Validating certificate extended key usage
  5398. Mar 5 16:42:20 openvpn[18358]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5399. Mar 5 16:42:20 openvpn[18358]: VERIFY EKU OK
  5400. Mar 5 16:42:20 openvpn[18358]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=5d9250ee5e356c71b846d7648cb82217, name=5d9250ee5e356c71b846d7648cb82217
  5401. Mar 5 16:42:23 openvpn[18358]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5402. Mar 5 16:42:23 openvpn[18358]: [5d9250ee5e356c71b846d7648cb82217] Peer Connection Initiated with [AF_INET]46.166.138.163:1197
  5403. Mar 5 16:42:24 openvpn[18358]: SENT CONTROL [5d9250ee5e356c71b846d7648cb82217]: 'PUSH_REQUEST' (status=1)
  5404. Mar 5 16:42:24 openvpn[18358]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.18.10.1,topology net30,ifconfig 10.18.10.6 10.18.10.5'
  5405. Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: timers and/or timeouts modified
  5406. Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: compression parms modified
  5407. Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: --ifconfig/up options modified
  5408. Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: route options modified
  5409. Mar 5 16:42:24 openvpn[18358]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5410. Mar 5 16:42:24 openvpn[18358]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5411. Mar 5 16:42:24 openvpn[18358]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5412. Mar 5 16:42:24 openvpn[18358]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5413. Mar 5 16:42:24 openvpn[18358]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5414. Mar 5 16:42:24 openvpn[18358]: TUN/TAP device tun11 opened
  5415. Mar 5 16:42:24 openvpn[18358]: TUN/TAP TX queue length set to 100
  5416. Mar 5 16:42:24 openvpn[18358]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  5417. Mar 5 16:42:24 openvpn[18358]: /usr/sbin/ip link set dev tun11 up mtu 1500
  5418. Mar 5 16:42:25 openvpn[18358]: /usr/sbin/ip addr add dev tun11 local 10.18.10.6 peer 10.18.10.5
  5419. Mar 5 16:42:25 openvpn[18358]: updown.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
  5420. Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  5421. Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  5422. Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  5423. Mar 5 16:42:25 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  5424. Mar 5 16:42:26 rc_service: service 18529:notify_rc updateresolv
  5425. Mar 5 16:42:26 dnsmasq[450]: read /etc/hosts - 5 addresses
  5426. Mar 5 16:42:26 dnsmasq[450]: read /etc/hosts.dnsmasq - 15 addresses
  5427. Mar 5 16:42:26 dnsmasq-dhcp[450]: read /etc/ethers - 21 addresses
  5428. Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.33#53 for domain ql.bigpond.net.au
  5429. Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.1#53 for domain ql.bigpond.net.au
  5430. Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.1#53
  5431. Mar 5 16:42:26 dnsmasq[450]: using nameserver 61.9.211.33#53
  5432. Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 46.166.138.163/32 via 60.226.64.1
  5433. Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 0.0.0.0/1 via 10.18.10.5
  5434. Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 128.0.0.0/1 via 10.18.10.5
  5435. Mar 5 16:42:29 openvpn[18358]: /usr/sbin/ip route add 10.18.10.1/32 via 10.18.10.5
  5436. Mar 5 16:42:29 openvpn-routing: Configuring policy rules for client 1
  5437. Mar 5 16:42:29 openvpn-routing: Creating VPN routing table
  5438. Mar 5 16:42:29 openvpn-routing: Removing route for 10.18.10.1 to tun11 from main routing table
  5439. Mar 5 16:42:29 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  5440. Mar 5 16:42:29 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  5441. Mar 5 16:42:29 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  5442. Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  5443. Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  5444. Mar 5 16:42:30 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  5445. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  5446. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  5447. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  5448. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  5449. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  5450. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  5451. Mar 5 16:42:30 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  5452. Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  5453. Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  5454. Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  5455. Mar 5 16:42:31 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  5456. Mar 5 16:42:31 openvpn-routing: Completed routing policy configuration for client 1
  5457. Mar 5 16:42:31 openvpn[18358]: Initialization Sequence Completed
  5458. Mar 5 16:51:43 rc_service: httpd 456:notify_rc restart_net
  5459. Mar 5 16:51:46 dropbear[435]: Early exit: Terminated by signal
  5460. Mar 5 16:51:46 dnsmasq[450]: exiting on receipt of SIGTERM
  5461. Mar 5 16:51:46 miniupnpd[1195]: shutting down MiniUPnPd
  5462. Mar 5 16:51:48 kernel: Attempt to kill tasklet from interrupt
  5463. Mar 5 16:51:48 kernel: device eth0 left promiscuous mode
  5464. Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
  5465. Mar 5 16:51:48 kernel: device eth0 entered promiscuous mode
  5466. Mar 5 16:51:48 kernel: br0: topology change detected, propagating
  5467. Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
  5468. Mar 5 16:51:48 kernel: br0: port 1(vlan1) entering forwarding state
  5469. Mar 5 16:51:50 openvpn[1149]: event_wait : Interrupted system call (code=4)
  5470. Mar 5 16:51:50 openvpn[1149]: Closing TUN/TAP interface
  5471. Mar 5 16:51:50 openvpn[1149]: /usr/sbin/ip addr del dev tun21 10.8.0.1/24
  5472. Mar 5 16:51:50 openvpn[1149]: SIGTERM[hard,] received, process exiting
  5473. Mar 5 16:51:52 openvpn[18358]: write UDP: Network is unreachable (code=101)
  5474. Mar 5 16:51:52 openvpn[18358]: event_wait : Interrupted system call (code=4)
  5475. Mar 5 16:51:52 openvpn[18358]: vpnrouting.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
  5476. Mar 5 16:51:52 openvpn-routing: Configuring policy rules for client 1
  5477. Mar 5 16:51:52 openvpn-routing: Removing rule 10001 from routing policy
  5478. Mar 5 16:51:52 openvpn-routing: Removing rule 10002 from routing policy
  5479. Mar 5 16:51:52 openvpn-routing: Removing rule 10003 from routing policy
  5480. Mar 5 16:51:52 openvpn-routing: Removing rule 10004 from routing policy
  5481. Mar 5 16:51:52 openvpn-routing: Removing rule 10005 from routing policy
  5482. Mar 5 16:51:53 openvpn-routing: Removing rule 10006 from routing policy
  5483. Mar 5 16:51:53 openvpn-routing: Removing rule 10007 from routing policy
  5484. Mar 5 16:51:53 openvpn-routing: Removing rule 10008 from routing policy
  5485. Mar 5 16:51:53 openvpn-routing: Removing rule 10009 from routing policy
  5486. Mar 5 16:51:53 openvpn-routing: Removing rule 10010 from routing policy
  5487. Mar 5 16:51:53 openvpn-routing: Removing rule 10011 from routing policy
  5488. Mar 5 16:51:53 openvpn-routing: Removing rule 10101 from routing policy
  5489. Mar 5 16:51:53 openvpn-routing: Removing rule 10102 from routing policy
  5490. Mar 5 16:51:53 openvpn-routing: Removing rule 10103 from routing policy
  5491. Mar 5 16:51:53 openvpn-routing: Removing rule 10104 from routing policy
  5492. Mar 5 16:51:53 openvpn-routing: Flushing client routing table
  5493. Mar 5 16:51:53 openvpn-routing: Completed routing policy configuration for client 1
  5494. Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 10.18.10.1/32
  5495. Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5496. Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 46.166.138.163/32
  5497. Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5498. Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 0.0.0.0/1
  5499. Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5500. Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip route del 128.0.0.0/1
  5501. Mar 5 16:51:53 openvpn[18358]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5502. Mar 5 16:51:53 openvpn[18358]: Closing TUN/TAP interface
  5503. Mar 5 16:51:53 openvpn[18358]: /usr/sbin/ip addr del dev tun11 local 10.18.10.6 peer 10.18.10.5
  5504. Mar 5 16:51:53 openvpn[18358]: updown.sh tun11 1500 1570 10.18.10.6 10.18.10.5 init
  5505. Mar 5 16:51:53 rc_service: service 18995:notify_rc updateresolv
  5506. Mar 5 16:51:53 rc_service: waitting "restart_net" via ...
  5507. Mar 5 16:51:57 watchdog: restart httpd
  5508. Mar 5 16:51:57 rc_service: watchdog 461:notify_rc stop_httpd
  5509. Mar 5 16:51:57 rc_service: waitting "restart_net" via ...
  5510. Mar 5 16:52:00 WAN Connection: ISP's DHCP did not function properly.
  5511. Mar 5 16:52:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  5512. Mar 5 16:52:03 kernel: br0: port 3(eth2) entering forwarding state
  5513. Mar 5 16:52:03 kernel: br0: port 2(eth1) entering forwarding state
  5514. Mar 5 16:52:03 kernel: br0: port 1(vlan1) entering forwarding state
  5515. Mar 5 16:52:03 kernel: device eth0 left promiscuous mode
  5516. Mar 5 16:52:03 kernel: device vlan1 left promiscuous mode
  5517. Mar 5 16:52:03 kernel: br0: port 1(vlan1) entering disabled state
  5518. Mar 5 16:52:03 kernel: device eth1 left promiscuous mode
  5519. Mar 5 16:52:03 kernel: br0: port 2(eth1) entering disabled state
  5520. Mar 5 16:52:03 kernel: device eth2 left promiscuous mode
  5521. Mar 5 16:52:03 kernel: br0: port 3(eth2) entering disabled state
  5522. Mar 5 16:52:05 kernel: wl_module_init: passivemode set to 0x0
  5523. Mar 5 16:52:05 kernel: wl_module_init: igs set to 0x0
  5524. Mar 5 16:52:05 kernel: wl_module_init: txworkq set to 0x0
  5525. Mar 5 16:52:05 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  5526. Mar 5 16:52:05 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  5527. Mar 5 16:52:05 kernel: device vlan1 entered promiscuous mode
  5528. Mar 5 16:52:05 kernel: device eth0 entered promiscuous mode
  5529. Mar 5 16:52:06 kernel: device eth1 entered promiscuous mode
  5530. Mar 5 16:52:06 kernel: device eth2 entered promiscuous mode
  5531. Mar 5 16:52:06 kernel: br0: topology change detected, propagating
  5532. Mar 5 16:52:06 kernel: br0: port 3(eth2) entering forwarding state
  5533. Mar 5 16:52:06 kernel: br0: port 3(eth2) entering forwarding state
  5534. Mar 5 16:52:06 kernel: br0: topology change detected, propagating
  5535. Mar 5 16:52:06 kernel: br0: port 2(eth1) entering forwarding state
  5536. Mar 5 16:52:06 kernel: br0: port 2(eth1) entering forwarding state
  5537. Mar 5 16:52:06 kernel: br0: topology change detected, propagating
  5538. Mar 5 16:52:06 kernel: br0: port 1(vlan1) entering forwarding state
  5539. Mar 5 16:52:06 kernel: br0: port 1(vlan1) entering forwarding state
  5540. Mar 5 16:52:06 kernel: ADDRCONF(NETDEV_UP): ifb0: link is not ready
  5541. Mar 5 16:52:06 kernel: ADDRCONF(NETDEV_UP): ifb1: link is not ready
  5542. Mar 5 16:52:06 custom script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf)
  5543. Mar 5 16:52:06 WAN Connection: ISP's DHCP did not function properly.
  5544. Mar 5 16:52:06 files: AB-Solution added entries via ab_dnsmasq_postconf.sh
  5545. Mar 5 16:52:06 files: AB-Solution linked dnsmasq.postconf to ab_dnsmasq_postconf.sh
  5546. Mar 5 16:52:07 rc_service: udhcpc 19137:notify_rc start_firewall
  5547. Mar 5 16:52:07 rc_service: waitting "restart_net" via ...
  5548. Mar 5 16:52:09 RT-AC68U: start httpd
  5549. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5550. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 1866 -> 10.1.1.37:1865 protocol UDP
  5551. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5552. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 17246 -> 10.1.1.37:17246 protocol UDP
  5553. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5554. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 17246 -> 10.1.1.37:17246 protocol TCP
  5555. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5556. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 20806 -> 10.1.1.145:20806 protocol UDP
  5557. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5558. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 20806 -> 10.1.1.145:20806 protocol TCP
  5559. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5560. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 16187 -> 10.1.1.6:16187 protocol TCP
  5561. Mar 5 16:52:10 miniupnpd[19149]: add_filter_rule() : chain FUPNP not found
  5562. Mar 5 16:52:10 miniupnpd[19149]: Failed to redirect 16187 -> 10.1.1.6:16187 protocol UDP
  5563. Mar 5 16:52:10 miniupnpd[19149]: HTTP listening on port 52406
  5564. Mar 5 16:52:10 miniupnpd[19149]: Listening for NAT-PMP/PCP traffic on port 5351
  5565. Mar 5 16:52:10 dropbear[19152]: Running in background
  5566. Mar 5 16:52:12 miniupnpd[19149]: shutting down MiniUPnPd
  5567. Mar 5 16:52:12 wan: finish adding multi routes
  5568. Mar 5 16:52:12 rc_service: udhcpc 19137:notify_rc stop_upnp
  5569. Mar 5 16:52:12 rc_service: waitting "start_firewall" via udhcpc ...
  5570. Mar 5 16:52:13 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  5571. Mar 5 16:52:14 rc_service: watchdog 461:notify_rc start_httpd
  5572. Mar 5 16:52:14 rc_service: waitting "stop_httpd" via watchdog ...
  5573. Mar 5 16:52:14 miniupnpd[19234]: HTTP listening on port 58199
  5574. Mar 5 16:52:14 miniupnpd[19234]: Listening for NAT-PMP/PCP traffic on port 5351
  5575. Mar 5 16:52:14 rc_service: udhcpc 19137:notify_rc start_upnp
  5576. Mar 5 16:52:14 rc_service: waitting "stop_upnp" via udhcpc ...
  5577. Mar 5 16:52:14 miniupnpd[19234]: shutting down MiniUPnPd
  5578. Mar 5 16:52:15 RT-AC68U: start httpd
  5579. Mar 5 16:52:16 WAN Connection: WAN was restored.
  5580. Mar 5 16:52:17 ddns update: ez-ipupdate: starting...
  5581. Mar 5 16:52:17 miniupnpd[19243]: HTTP listening on port 58548
  5582. Mar 5 16:52:17 miniupnpd[19243]: Listening for NAT-PMP/PCP traffic on port 5351
  5583. Mar 5 16:52:18 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  5584. Mar 5 16:52:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 05 Mar 2017 06:52:17 GMT^M Server: Apache^M Content-Length: 0^M Connection: close^M Content-Type: text/html^M ^M
  5585. Mar 5 16:52:18 ddns update: retval= 0, ddns_return_code (,200)
  5586. Mar 5 16:52:18 ddns update: asusddns_update: 0
  5587. Mar 5 16:52:19 ddns: ddns update ok
  5588. Mar 5 16:52:19 ntp: start NTP update
  5589. Mar 5 16:52:19 rc_service: udhcpc 19137:notify_rc start_vpnserver1
  5590. Mar 5 16:52:20 kernel: tun: Universal TUN/TAP device driver, 1.6
  5591. Mar 5 16:52:20 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  5592. Mar 5 16:52:20 openvpn-routing: Refreshing policy rules for client 1
  5593. Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
  5594. Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 2
  5595. Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
  5596. Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 3
  5597. Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
  5598. Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 4
  5599. Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
  5600. Mar 5 16:52:21 openvpn-routing: Refreshing policy rules for client 5
  5601. Mar 5 16:52:21 openvpn-routing: Allow WAN access to all VPN clients
  5602. Mar 5 16:52:21 rc_service: udhcpc 19137:notify_rc start_vpnclient1
  5603. Mar 5 16:52:21 rc_service: waitting "start_vpnserver1" via udhcpc ...
  5604. Mar 5 16:52:22 kernel: ADDRCONF(NETDEV_UP): tun21: link is not ready
  5605. Mar 5 16:52:22 kernel: device tun21 entered promiscuous mode
  5606. Mar 5 16:52:23 openvpn[19376]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  5607. Mar 5 16:52:23 openvpn[19376]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  5608. Mar 5 16:52:23 openvpn[19377]: Diffie-Hellman initialized with 2048 bit key
  5609. Mar 5 16:52:23 kernel: ADDRCONF(NETDEV_CHANGE): tun21: link becomes ready
  5610. Mar 5 16:52:23 openvpn[19377]: TUN/TAP device tun21 opened
  5611. Mar 5 16:52:23 openvpn[19377]: TUN/TAP TX queue length set to 100
  5612. Mar 5 16:52:23 openvpn[19377]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  5613. Mar 5 16:52:23 openvpn[19377]: /usr/sbin/ip link set dev tun21 up mtu 1500
  5614. Mar 5 16:52:23 openvpn[19377]: /usr/sbin/ip addr add dev tun21 10.8.0.1/24 broadcast 10.8.0.255
  5615. Mar 5 16:52:23 openvpn[19377]: Could not determine IPv4/IPv6 protocol. Using AF_INET6
  5616. Mar 5 16:52:23 openvpn[19377]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5617. Mar 5 16:52:23 openvpn[19377]: setsockopt(IPV6_V6ONLY=0)
  5618. Mar 5 16:52:23 openvpn[19377]: UDPv6 link local (bound): [AF_INET6][undef]:1194
  5619. Mar 5 16:52:23 openvpn[19377]: UDPv6 link remote: [AF_UNSPEC]
  5620. Mar 5 16:52:23 openvpn[19377]: MULTI: multi_init called, r=256 v=256
  5621. Mar 5 16:52:23 openvpn[19377]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  5622. Mar 5 16:52:23 openvpn[19377]: Initialization Sequence Completed
  5623. Mar 5 16:52:25 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  5624. Mar 5 16:52:25 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  5625. Mar 5 16:52:25 dhcp client: bound 60.226.100.152 via 60.226.64.1 during 3600 seconds.
  5626. Mar 5 16:52:27 openvpn[19420]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  5627. Mar 5 16:52:27 openvpn[19420]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  5628. Mar 5 16:52:27 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5629. Mar 5 16:52:27 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
  5630. Mar 5 16:52:27 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5631. Mar 5 16:52:27 openvpn[19421]: UDP link local: (not bound)
  5632. Mar 5 16:52:27 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
  5633. Mar 5 16:52:27 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=2daa738f 93fa0ae1
  5634. Mar 5 16:52:28 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5635. Mar 5 16:52:28 openvpn[19421]: VERIFY OK: nsCertType=SERVER
  5636. Mar 5 16:52:28 openvpn[19421]: Validating certificate key usage
  5637. Mar 5 16:52:28 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
  5638. Mar 5 16:52:28 openvpn[19421]: VERIFY KU OK
  5639. Mar 5 16:52:28 openvpn[19421]: Validating certificate extended key usage
  5640. Mar 5 16:52:28 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5641. Mar 5 16:52:28 openvpn[19421]: VERIFY EKU OK
  5642. Mar 5 16:52:28 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
  5643. Mar 5 16:52:31 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5644. Mar 5 16:52:31 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
  5645. Mar 5 16:52:32 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
  5646. Mar 5 16:52:32 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.39.10.1,topology net30,ifconfig 10.39.10.6 10.39.10.5'
  5647. Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
  5648. Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: compression parms modified
  5649. Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
  5650. Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: route options modified
  5651. Mar 5 16:52:32 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5652. Mar 5 16:52:32 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5653. Mar 5 16:52:32 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5654. Mar 5 16:52:32 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5655. Mar 5 16:52:32 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5656. Mar 5 16:52:32 openvpn[19421]: TUN/TAP device tun11 opened
  5657. Mar 5 16:52:32 openvpn[19421]: TUN/TAP TX queue length set to 100
  5658. Mar 5 16:52:32 openvpn[19421]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  5659. Mar 5 16:52:32 openvpn[19421]: /usr/sbin/ip link set dev tun11 up mtu 1500
  5660. Mar 5 16:52:33 openvpn[19421]: /usr/sbin/ip addr add dev tun11 local 10.39.10.6 peer 10.39.10.5
  5661. Mar 5 16:52:33 openvpn[19421]: updown.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
  5662. Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  5663. Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  5664. Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  5665. Mar 5 16:52:33 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  5666. Mar 5 16:52:34 rc_service: service 19592:notify_rc updateresolv
  5667. Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 46.166.138.136/32 via 60.226.64.1
  5668. Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 0.0.0.0/1 via 10.39.10.5
  5669. Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 128.0.0.0/1 via 10.39.10.5
  5670. Mar 5 16:52:36 openvpn[19421]: /usr/sbin/ip route add 10.39.10.1/32 via 10.39.10.5
  5671. Mar 5 16:52:37 openvpn-routing: Configuring policy rules for client 1
  5672. Mar 5 16:52:37 openvpn-routing: Creating VPN routing table
  5673. Mar 5 16:52:37 openvpn-routing: Removing route for 10.39.10.1 to tun11 from main routing table
  5674. Mar 5 16:52:37 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  5675. Mar 5 16:52:37 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  5676. Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  5677. Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  5678. Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  5679. Mar 5 16:52:37 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  5680. Mar 5 16:52:37 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  5681. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  5682. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  5683. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  5684. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  5685. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  5686. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  5687. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  5688. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  5689. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  5690. Mar 5 16:52:38 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  5691. Mar 5 16:52:38 openvpn-routing: Completed routing policy configuration for client 1
  5692. Mar 5 16:52:38 openvpn[19421]: Initialization Sequence Completed
  5693. Mar 5 17:01:15 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
  5694. Mar 5 17:01:16 kernel: IDPfw: TrendMicro forward module ver-1.0.34
  5695. Mar 5 17:01:16 kernel: IDPfw: Apply module param dev_wan=eth0
  5696. Mar 5 17:01:16 kernel: IDPfw: Apply module param sess_num=30000
  5697. Mar 5 17:01:16 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
  5698. Mar 5 17:01:16 kernel: IDPfw: IDPfw is ready
  5699. Mar 5 17:01:16 kernel: sizeof forward param = 160
  5700. Mar 5 17:01:16 signature: rollback signature from /usr/bwdpi/
  5701. Mar 5 17:01:30 kernel: mod epilog takes 0 jiffies
  5702. Mar 5 17:01:30 kernel: IDPfw: Exit IDPfw
  5703. Mar 5 17:01:30 kernel: Stop the IPS/AppID engine...
  5704. Mar 5 17:01:30 kernel: IDPfw: Exit chrdev /dev/idpfw with major 191
  5705. Mar 5 17:01:31 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  5706. Mar 5 17:01:31 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  5707. Mar 5 17:01:31 rc_service: bwdpi_check 487:notify_rc start_firewall
  5708. Mar 5 17:01:31 miniupnpd[19243]: shutting down MiniUPnPd
  5709. Mar 5 17:01:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  5710. Mar 5 17:01:33 miniupnpd[20102]: HTTP listening on port 51578
  5711. Mar 5 17:01:33 miniupnpd[20102]: Listening for NAT-PMP/PCP traffic on port 5351
  5712. Mar 5 18:07:12 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
  5713. Mar 5 18:07:12 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
  5714. Mar 6 04:52:17 ntp: start NTP update
  5715. Mar 6 12:32:29 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5716. Mar 6 14:31:53 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5717. Mar 6 15:21:53 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5718. Mar 6 16:51:55 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5719. Mar 6 16:52:15 ntp: start NTP update
  5720. Mar 6 18:40:58 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5721. Mar 6 21:52:37 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
  5722. Mar 6 21:52:37 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
  5723. Mar 7 04:52:13 ntp: start NTP update
  5724. Mar 7 12:41:15 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5725. Mar 7 13:14:18 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5726. Mar 7 14:17:20 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5727. Mar 7 14:40:21 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5728. Mar 7 16:23:41 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
  5729. Mar 7 16:23:41 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
  5730. Mar 7 16:52:11 ntp: start NTP update
  5731. Mar 7 17:55:27 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
  5732. Mar 7 17:55:27 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
  5733. Mar 7 17:55:27 openvpn[19421]: Restart pause, 5 second(s)
  5734. Mar 7 17:55:32 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5735. Mar 7 17:55:32 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
  5736. Mar 7 17:55:32 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5737. Mar 7 17:55:32 openvpn[19421]: UDP link local: (not bound)
  5738. Mar 7 17:55:32 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
  5739. Mar 7 17:55:32 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=3eed74f8 02c8a082
  5740. Mar 7 17:55:32 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5741. Mar 7 17:55:32 openvpn[19421]: VERIFY OK: nsCertType=SERVER
  5742. Mar 7 17:55:32 openvpn[19421]: Validating certificate key usage
  5743. Mar 7 17:55:32 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
  5744. Mar 7 17:55:32 openvpn[19421]: VERIFY KU OK
  5745. Mar 7 17:55:32 openvpn[19421]: Validating certificate extended key usage
  5746. Mar 7 17:55:32 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5747. Mar 7 17:55:32 openvpn[19421]: VERIFY EKU OK
  5748. Mar 7 17:55:32 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
  5749. Mar 7 17:55:35 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5750. Mar 7 17:55:35 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
  5751. Mar 7 17:55:36 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
  5752. Mar 7 17:55:36 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.9.10.1,topology net30,ifconfig 10.9.10.6 10.9.10.5'
  5753. Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
  5754. Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: compression parms modified
  5755. Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
  5756. Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: route options modified
  5757. Mar 7 17:55:36 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5758. Mar 7 17:55:36 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5759. Mar 7 17:55:36 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5760. Mar 7 17:55:36 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5761. Mar 7 17:55:36 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5762. Mar 7 17:55:36 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
  5763. Mar 7 17:55:36 openvpn[19421]: Initialization Sequence Completed
  5764. Mar 7 20:01:45 miniupnpd[20102]: remove port mapping 20806 TCP because it has expired
  5765. Mar 7 20:01:45 miniupnpd[20102]: remove port mapping 20806 UDP because it has expired
  5766. Mar 7 20:02:25 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5767. Mar 8 01:57:22 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
  5768. Mar 8 01:57:22 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
  5769. Mar 8 01:57:22 openvpn[19421]: Restart pause, 5 second(s)
  5770. Mar 8 01:57:27 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5771. Mar 8 01:57:27 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
  5772. Mar 8 01:57:27 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5773. Mar 8 01:57:27 openvpn[19421]: UDP link local: (not bound)
  5774. Mar 8 01:57:27 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
  5775. Mar 8 01:57:28 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=cbff5ffc 591ad418
  5776. Mar 8 01:57:28 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5777. Mar 8 01:57:28 openvpn[19421]: VERIFY OK: nsCertType=SERVER
  5778. Mar 8 01:57:28 openvpn[19421]: Validating certificate key usage
  5779. Mar 8 01:57:28 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
  5780. Mar 8 01:57:28 openvpn[19421]: VERIFY KU OK
  5781. Mar 8 01:57:28 openvpn[19421]: Validating certificate extended key usage
  5782. Mar 8 01:57:28 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5783. Mar 8 01:57:28 openvpn[19421]: VERIFY EKU OK
  5784. Mar 8 01:57:28 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
  5785. Mar 8 01:57:31 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5786. Mar 8 01:57:31 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
  5787. Mar 8 01:57:32 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
  5788. Mar 8 01:57:33 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.53.10.1,topology net30,ifconfig 10.53.10.6 10.53.10.5'
  5789. Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
  5790. Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: compression parms modified
  5791. Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
  5792. Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: route options modified
  5793. Mar 8 01:57:33 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5794. Mar 8 01:57:33 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5795. Mar 8 01:57:33 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5796. Mar 8 01:57:33 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5797. Mar 8 01:57:33 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5798. Mar 8 01:57:33 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
  5799. Mar 8 01:57:33 openvpn[19421]: Initialization Sequence Completed
  5800. Mar 8 04:52:09 ntp: start NTP update
  5801. Mar 8 06:04:42 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5802. Mar 8 06:16:40 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5803. Mar 8 06:41:42 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5804. Mar 8 08:20:43 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5805. Mar 8 09:59:20 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Inactivity timeout (--ping-restart), restarting
  5806. Mar 8 09:59:20 openvpn[19421]: SIGUSR1[soft,ping-restart] received, process restarting
  5807. Mar 8 09:59:20 openvpn[19421]: Restart pause, 5 second(s)
  5808. Mar 8 09:59:25 openvpn[19421]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5809. Mar 8 09:59:25 openvpn[19421]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.138.136:1197
  5810. Mar 8 09:59:25 openvpn[19421]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5811. Mar 8 09:59:25 openvpn[19421]: UDP link local: (not bound)
  5812. Mar 8 09:59:25 openvpn[19421]: UDP link remote: [AF_INET]46.166.138.136:1197
  5813. Mar 8 09:59:25 openvpn[19421]: TLS: Initial packet from [AF_INET]46.166.138.136:1197, sid=370f0fac f6c82d6d
  5814. Mar 8 09:59:26 openvpn[19421]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5815. Mar 8 09:59:26 openvpn[19421]: VERIFY OK: nsCertType=SERVER
  5816. Mar 8 09:59:26 openvpn[19421]: Validating certificate key usage
  5817. Mar 8 09:59:26 openvpn[19421]: ++ Certificate has key usage 00a0, expects 00a0
  5818. Mar 8 09:59:26 openvpn[19421]: VERIFY KU OK
  5819. Mar 8 09:59:26 openvpn[19421]: Validating certificate extended key usage
  5820. Mar 8 09:59:26 openvpn[19421]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5821. Mar 8 09:59:26 openvpn[19421]: VERIFY EKU OK
  5822. Mar 8 09:59:26 openvpn[19421]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=3c60df46fea04c8810290e7ac781f386, name=3c60df46fea04c8810290e7ac781f386
  5823. Mar 8 09:59:29 openvpn[19421]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5824. Mar 8 09:59:29 openvpn[19421]: [3c60df46fea04c8810290e7ac781f386] Peer Connection Initiated with [AF_INET]46.166.138.136:1197
  5825. Mar 8 09:59:30 openvpn[19421]: SENT CONTROL [3c60df46fea04c8810290e7ac781f386]: 'PUSH_REQUEST' (status=1)
  5826. Mar 8 09:59:31 openvpn[19421]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.5.10.1,topology net30,ifconfig 10.5.10.6 10.5.10.5'
  5827. Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: timers and/or timeouts modified
  5828. Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: compression parms modified
  5829. Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: --ifconfig/up options modified
  5830. Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: route options modified
  5831. Mar 8 09:59:31 openvpn[19421]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5832. Mar 8 09:59:31 openvpn[19421]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5833. Mar 8 09:59:31 openvpn[19421]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5834. Mar 8 09:59:31 openvpn[19421]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5835. Mar 8 09:59:31 openvpn[19421]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5836. Mar 8 09:59:31 openvpn[19421]: Preserving previous TUN/TAP instance: tun11
  5837. Mar 8 09:59:31 openvpn[19421]: Initialization Sequence Completed
  5838. Mar 8 10:21:43 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5839. Mar 8 12:03:44 miniupnpd[20102]: upnp_event_recv: recv(): Connection reset by peer
  5840. Mar 8 13:36:51 miniupnpd[20102]: recv (state0): Connection reset by peer
  5841. Mar 8 14:03:03 rc_service: httpd 19235:notify_rc stop_vpnclient1
  5842. Mar 8 14:03:04 openvpn[19421]: event_wait : Interrupted system call (code=4)
  5843. Mar 8 14:03:04 openvpn[19421]: vpnrouting.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
  5844. Mar 8 14:03:04 openvpn-routing: Configuring policy rules for client 1
  5845. Mar 8 14:03:04 openvpn-routing: Removing rule 10001 from routing policy
  5846. Mar 8 14:03:04 openvpn-routing: Removing rule 10002 from routing policy
  5847. Mar 8 14:03:04 openvpn-routing: Removing rule 10003 from routing policy
  5848. Mar 8 14:03:04 openvpn-routing: Removing rule 10004 from routing policy
  5849. Mar 8 14:03:04 openvpn-routing: Removing rule 10005 from routing policy
  5850. Mar 8 14:03:04 openvpn-routing: Removing rule 10006 from routing policy
  5851. Mar 8 14:03:04 openvpn-routing: Removing rule 10007 from routing policy
  5852. Mar 8 14:03:05 openvpn-routing: Removing rule 10008 from routing policy
  5853. Mar 8 14:03:05 openvpn-routing: Removing rule 10009 from routing policy
  5854. Mar 8 14:03:05 openvpn-routing: Removing rule 10010 from routing policy
  5855. Mar 8 14:03:05 openvpn-routing: Removing rule 10011 from routing policy
  5856. Mar 8 14:03:05 openvpn-routing: Removing rule 10101 from routing policy
  5857. Mar 8 14:03:05 openvpn-routing: Removing rule 10102 from routing policy
  5858. Mar 8 14:03:05 openvpn-routing: Removing rule 10103 from routing policy
  5859. Mar 8 14:03:05 openvpn-routing: Removing rule 10104 from routing policy
  5860. Mar 8 14:03:05 openvpn-routing: Flushing client routing table
  5861. Mar 8 14:03:05 openvpn-routing: Completed routing policy configuration for client 1
  5862. Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 10.39.10.1/32
  5863. Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5864. Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 46.166.138.136/32
  5865. Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 0.0.0.0/1
  5866. Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5867. Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip route del 128.0.0.0/1
  5868. Mar 8 14:03:05 openvpn[19421]: ERROR: Linux route delete command failed: external program exited with error status: 2
  5869. Mar 8 14:03:05 openvpn[19421]: Closing TUN/TAP interface
  5870. Mar 8 14:03:05 openvpn[19421]: /usr/sbin/ip addr del dev tun11 local 10.39.10.6 peer 10.39.10.5
  5871. Mar 8 14:03:05 openvpn[19421]: updown.sh tun11 1500 1570 10.39.10.6 10.39.10.5 init
  5872. Mar 8 14:03:06 rc_service: service 22193:notify_rc updateresolv
  5873. Mar 8 14:03:06 rc_service: waitting "stop_vpnclient1" via httpd ...
  5874. Mar 8 14:03:21 rc_service: httpd 19235:notify_rc start_vpnclient1
  5875. Mar 8 14:03:24 openvpn[22232]: OpenVPN 2.4.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 3 2017
  5876. Mar 8 14:03:24 openvpn[22232]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
  5877. Mar 8 14:03:24 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  5878. Mar 8 14:03:24 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.226:1197
  5879. Mar 8 14:03:24 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  5880. Mar 8 14:03:24 openvpn[22233]: UDP link local: (not bound)
  5881. Mar 8 14:03:24 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.226:1197
  5882. Mar 8 14:03:25 openvpn[22233]: TLS: Initial packet from [AF_INET]109.201.152.226:1197, sid=8b2fc6ff 4d156737
  5883. Mar 8 14:03:25 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  5884. Mar 8 14:03:25 openvpn[22233]: VERIFY OK: nsCertType=SERVER
  5885. Mar 8 14:03:25 openvpn[22233]: Validating certificate key usage
  5886. Mar 8 14:03:25 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
  5887. Mar 8 14:03:25 openvpn[22233]: VERIFY KU OK
  5888. Mar 8 14:03:25 openvpn[22233]: Validating certificate extended key usage
  5889. Mar 8 14:03:25 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  5890. Mar 8 14:03:25 openvpn[22233]: VERIFY EKU OK
  5891. Mar 8 14:03:25 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=237dce7889fc9a964f36f065f7e6cd4e, name=237dce7889fc9a964f36f065f7e6cd4e
  5892. Mar 8 14:03:29 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5893. Mar 8 14:03:29 openvpn[22233]: [237dce7889fc9a964f36f065f7e6cd4e] Peer Connection Initiated with [AF_INET]109.201.152.226:1197
  5894. Mar 8 14:03:30 openvpn[22233]: SENT CONTROL [237dce7889fc9a964f36f065f7e6cd4e]: 'PUSH_REQUEST' (status=1)
  5895. Mar 8 14:03:30 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.22.10.1,topology net30,ifconfig 10.22.10.6 10.22.10.5'
  5896. Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
  5897. Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: compression parms modified
  5898. Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
  5899. Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: route options modified
  5900. Mar 8 14:03:30 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  5901. Mar 8 14:03:30 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5902. Mar 8 14:03:30 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5903. Mar 8 14:03:30 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  5904. Mar 8 14:03:30 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  5905. Mar 8 14:03:30 openvpn[22233]: TUN/TAP device tun11 opened
  5906. Mar 8 14:03:30 openvpn[22233]: TUN/TAP TX queue length set to 100
  5907. Mar 8 14:03:30 openvpn[22233]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  5908. Mar 8 14:03:30 openvpn[22233]: /usr/sbin/ip link set dev tun11 up mtu 1500
  5909. Mar 8 14:03:30 openvpn[22233]: /usr/sbin/ip addr add dev tun11 local 10.22.10.6 peer 10.22.10.5
  5910. Mar 8 14:03:30 openvpn[22233]: updown.sh tun11 1500 1570 10.22.10.6 10.22.10.5 init
  5911. Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.6 to use DNS server 209.222.18.222
  5912. Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.7 to use DNS server 209.222.18.222
  5913. Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.8 to use DNS server 209.222.18.222
  5914. Mar 8 14:03:31 openvpn-updown: Forcing 10.1.1.9 to use DNS server 209.222.18.222
  5915. Mar 8 14:03:32 rc_service: service 22404:notify_rc updateresolv
  5916. Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 109.201.152.226/32 via 60.226.64.1
  5917. Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 0.0.0.0/1 via 10.22.10.5
  5918. Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 128.0.0.0/1 via 10.22.10.5
  5919. Mar 8 14:03:34 openvpn[22233]: /usr/sbin/ip route add 10.22.10.1/32 via 10.22.10.5
  5920. Mar 8 14:03:34 openvpn-routing: Configuring policy rules for client 1
  5921. Mar 8 14:03:34 openvpn-routing: Creating VPN routing table
  5922. Mar 8 14:03:35 openvpn-routing: Removing route for 10.22.10.1 to tun11 from main routing table
  5923. Mar 8 14:03:35 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  5924. Mar 8 14:03:35 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  5925. Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.6 to 0.0.0.0 through VPN client 1
  5926. Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.7 to 0.0.0.0 through VPN client 1
  5927. Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.8 to 0.0.0.0 through VPN client 1
  5928. Mar 8 14:03:35 openvpn-routing: Adding route for 10.1.1.9 to 0.0.0.0 through VPN client 1
  5929. Mar 8 14:03:35 openvpn-routing: Adding route for 0.0.0.0 to 104.20.23.72 through WAN
  5930. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.25.193.32 through WAN
  5931. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.25.192.32 through WAN
  5932. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 50.63.202.16 through WAN
  5933. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.58.190 through WAN
  5934. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.22.72 through WAN
  5935. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 104.20.59.190 through WAN
  5936. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.11 through WAN
  5937. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 178.20.174.131 through WAN
  5938. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 85.12.14.12 through WAN
  5939. Mar 8 14:03:36 openvpn-routing: Adding route for 0.0.0.0 to 80.67.3.13 through WAN
  5940. Mar 8 14:03:37 openvpn-routing: Completed routing policy configuration for client 1
  5941. Mar 8 14:03:37 openvpn[22233]: Initialization Sequence Completed
  5942. Mar 8 14:09:43 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
  5943. Mar 8 14:09:45 kernel: IDPfw: TrendMicro forward module ver-1.0.34
  5944. Mar 8 14:09:45 kernel: IDPfw: Apply module param dev_wan=eth0
  5945. Mar 8 14:09:45 kernel: IDPfw: Apply module param sess_num=30000
  5946. Mar 8 14:09:45 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
  5947. Mar 8 14:09:45 kernel: IDPfw: IDPfw is ready
  5948. Mar 8 14:09:45 kernel: sizeof forward param = 160
  5949. Mar 8 14:09:55 kernel: mod epilog takes 0 jiffies
  5950. Mar 8 14:09:55 kernel: IDPfw: Exit IDPfw
  5951. Mar 8 14:09:55 kernel: Stop the IPS/AppID engine...
  5952. Mar 8 14:09:56 kernel: IDPfw: Exit chrdev /dev/idpfw with major 191
  5953. Mar 8 14:09:57 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  5954. Mar 8 14:09:57 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  5955. Mar 8 14:09:57 rc_service: bwdpi_check 487:notify_rc start_firewall
  5956. Mar 8 14:09:58 miniupnpd[20102]: shutting down MiniUPnPd
  5957. Mar 8 14:09:58 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  5958. Mar 8 14:10:00 miniupnpd[22926]: HTTP listening on port 55508
  5959. Mar 8 14:10:00 miniupnpd[22926]: Listening for NAT-PMP/PCP traffic on port 5351
  5960. Mar 8 14:10:04 miniupnpd[22926]: upnp_event_recv: recv(): Connection reset by peer
  5961. Mar 8 14:10:44 rc_service: httpd 19235:notify_rc restart_qos;restart_firewall
  5962. Mar 8 14:10:46 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
  5963. Mar 8 14:10:46 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
  5964. Mar 8 14:10:46 miniupnpd[22926]: shutting down MiniUPnPd
  5965. Mar 8 14:10:47 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  5966. Mar 8 14:10:48 miniupnpd[23042]: HTTP listening on port 35042
  5967. Mar 8 14:10:48 miniupnpd[23042]: Listening for NAT-PMP/PCP traffic on port 5351
  5968. Mar 8 14:10:52 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5969. Mar 8 15:03:07 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
  5970. Mar 8 15:03:07 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
  5971. Mar 8 15:35:01 miniupnpd[23042]: remove port mapping 20807 TCP because it has expired
  5972. Mar 8 15:35:01 miniupnpd[23042]: remove port mapping 20807 UDP because it has expired
  5973. Mar 8 16:43:53 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5974. Mar 8 16:52:07 ntp: start NTP update
  5975. Mar 8 17:35:02 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
  5976. Mar 8 17:35:02 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
  5977. Mar 8 18:38:57 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5978. Mar 8 19:16:57 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5979. Mar 8 19:58:33 miniupnpd[23042]: remove port mapping 46508 TCP because it has expired
  5980. Mar 8 19:58:33 miniupnpd[23042]: remove port mapping 46508 UDP because it has expired
  5981. Mar 8 20:32:01 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5982. Mar 9 04:52:05 ntp: start NTP update
  5983. Mar 9 06:02:11 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5984. Mar 9 07:50:23 rc_service: httpd 19235:notify_rc start_webs_update
  5985. Mar 9 08:23:13 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5986. Mar 9 09:36:15 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5987. Mar 9 09:50:17 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5988. Mar 9 16:52:03 ntp: start NTP update
  5989. Mar 9 18:06:21 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5990. Mar 9 20:47:23 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5991. Mar 9 21:43:16 miniupnpd[23042]: remove port mapping 20806 TCP because it has expired
  5992. Mar 9 21:43:16 miniupnpd[23042]: remove port mapping 20806 UDP because it has expired
  5993. Mar 10 04:52:01 ntp: start NTP update
  5994. Mar 10 07:37:39 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5995. Mar 10 09:25:41 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5996. Mar 10 16:52:01 ntp: start NTP update
  5997. Mar 10 18:54:52 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5998. Mar 10 19:04:54 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  5999. Mar 10 19:28:46 openvpn[22233]: [237dce7889fc9a964f36f065f7e6cd4e] Inactivity timeout (--ping-restart), restarting
  6000. Mar 10 19:28:46 openvpn[22233]: SIGUSR1[soft,ping-restart] received, process restarting
  6001. Mar 10 19:28:46 openvpn[22233]: Restart pause, 5 second(s)
  6002. Mar 10 19:28:51 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6003. Mar 10 19:28:51 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.226:1197
  6004. Mar 10 19:28:51 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  6005. Mar 10 19:28:51 openvpn[22233]: UDP link local: (not bound)
  6006. Mar 10 19:28:51 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.226:1197
  6007. Mar 10 19:29:51 openvpn[22233]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  6008. Mar 10 19:29:51 openvpn[22233]: TLS Error: TLS handshake failed
  6009. Mar 10 19:29:51 openvpn[22233]: SIGUSR1[soft,tls-error] received, process restarting
  6010. Mar 10 19:29:51 openvpn[22233]: Restart pause, 5 second(s)
  6011. Mar 10 19:29:56 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6012. Mar 10 19:29:56 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.190.208:1197
  6013. Mar 10 19:29:56 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  6014. Mar 10 19:29:56 openvpn[22233]: UDP link local: (not bound)
  6015. Mar 10 19:29:56 openvpn[22233]: UDP link remote: [AF_INET]46.166.190.208:1197
  6016. Mar 10 19:29:56 openvpn[22233]: TLS: Initial packet from [AF_INET]46.166.190.208:1197, sid=98c335d5 4d88aec8
  6017. Mar 10 19:29:56 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  6018. Mar 10 19:29:56 openvpn[22233]: VERIFY OK: nsCertType=SERVER
  6019. Mar 10 19:29:56 openvpn[22233]: Validating certificate key usage
  6020. Mar 10 19:29:56 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
  6021. Mar 10 19:29:56 openvpn[22233]: VERIFY KU OK
  6022. Mar 10 19:29:56 openvpn[22233]: Validating certificate extended key usage
  6023. Mar 10 19:29:56 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  6024. Mar 10 19:29:56 openvpn[22233]: VERIFY EKU OK
  6025. Mar 10 19:29:56 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=a86e3a7799a7e7d74534209194da9524, name=a86e3a7799a7e7d74534209194da9524
  6026. Mar 10 19:29:59 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  6027. Mar 10 19:29:59 openvpn[22233]: [a86e3a7799a7e7d74534209194da9524] Peer Connection Initiated with [AF_INET]46.166.190.208:1197
  6028. Mar 10 19:30:00 openvpn[22233]: SENT CONTROL [a86e3a7799a7e7d74534209194da9524]: 'PUSH_REQUEST' (status=1)
  6029. Mar 10 19:30:01 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.12.10.1,topology net30,ifconfig 10.12.10.6 10.12.10.5'
  6030. Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
  6031. Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: compression parms modified
  6032. Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
  6033. Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: route options modified
  6034. Mar 10 19:30:01 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  6035. Mar 10 19:30:01 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  6036. Mar 10 19:30:01 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  6037. Mar 10 19:30:01 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  6038. Mar 10 19:30:01 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  6039. Mar 10 19:30:01 openvpn[22233]: Preserving previous TUN/TAP instance: tun11
  6040. Mar 10 19:30:01 openvpn[22233]: Initialization Sequence Completed
  6041. Mar 10 21:31:55 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  6042. Mar 11 03:42:06 openvpn[22233]: [a86e3a7799a7e7d74534209194da9524] Inactivity timeout (--ping-restart), restarting
  6043. Mar 11 03:42:06 openvpn[22233]: SIGUSR1[soft,ping-restart] received, process restarting
  6044. Mar 11 03:42:06 openvpn[22233]: Restart pause, 5 second(s)
  6045. Mar 11 03:42:11 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6046. Mar 11 03:42:11 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.190.208:1197
  6047. Mar 11 03:42:11 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  6048. Mar 11 03:42:11 openvpn[22233]: UDP link local: (not bound)
  6049. Mar 11 03:42:11 openvpn[22233]: UDP link remote: [AF_INET]46.166.190.208:1197
  6050. Mar 11 03:43:11 openvpn[22233]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  6051. Mar 11 03:43:11 openvpn[22233]: TLS Error: TLS handshake failed
  6052. Mar 11 03:43:11 openvpn[22233]: SIGUSR1[soft,tls-error] received, process restarting
  6053. Mar 11 03:43:11 openvpn[22233]: Restart pause, 5 second(s)
  6054. Mar 11 03:43:16 openvpn[22233]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6055. Mar 11 03:43:16 openvpn[22233]: TCP/UDP: Preserving recently used remote address: [AF_INET]109.201.152.245:1197
  6056. Mar 11 03:43:16 openvpn[22233]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  6057. Mar 11 03:43:16 openvpn[22233]: UDP link local: (not bound)
  6058. Mar 11 03:43:16 openvpn[22233]: UDP link remote: [AF_INET]109.201.152.245:1197
  6059. Mar 11 03:43:17 openvpn[22233]: TLS: Initial packet from [AF_INET]109.201.152.245:1197, sid=9f7b6c46 ebe6e914
  6060. Mar 11 03:43:17 openvpn[22233]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  6061. Mar 11 03:43:17 openvpn[22233]: VERIFY OK: nsCertType=SERVER
  6062. Mar 11 03:43:17 openvpn[22233]: Validating certificate key usage
  6063. Mar 11 03:43:17 openvpn[22233]: ++ Certificate has key usage 00a0, expects 00a0
  6064. Mar 11 03:43:17 openvpn[22233]: VERIFY KU OK
  6065. Mar 11 03:43:17 openvpn[22233]: Validating certificate extended key usage
  6066. Mar 11 03:43:17 openvpn[22233]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  6067. Mar 11 03:43:17 openvpn[22233]: VERIFY EKU OK
  6068. Mar 11 03:43:17 openvpn[22233]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=da4cf1fc7a5c33e9749fbd1ed3990382, name=da4cf1fc7a5c33e9749fbd1ed3990382
  6069. Mar 11 03:43:20 openvpn[22233]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  6070. Mar 11 03:43:20 openvpn[22233]: [da4cf1fc7a5c33e9749fbd1ed3990382] Peer Connection Initiated with [AF_INET]109.201.152.245:1197
  6071. Mar 11 03:43:22 openvpn[22233]: SENT CONTROL [da4cf1fc7a5c33e9749fbd1ed3990382]: 'PUSH_REQUEST' (status=1)
  6072. Mar 11 03:43:22 openvpn[22233]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.32.10.1,topology net30,ifconfig 10.32.10.6 10.32.10.5'
  6073. Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: timers and/or timeouts modified
  6074. Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: compression parms modified
  6075. Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: --ifconfig/up options modified
  6076. Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: route options modified
  6077. Mar 11 03:43:22 openvpn[22233]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  6078. Mar 11 03:43:22 openvpn[22233]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  6079. Mar 11 03:43:22 openvpn[22233]: Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  6080. Mar 11 03:43:22 openvpn[22233]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  6081. Mar 11 03:43:22 openvpn[22233]: Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  6082. Mar 11 03:43:22 openvpn[22233]: Preserving previous TUN/TAP instance: tun11
  6083. Mar 11 03:43:22 openvpn[22233]: Initialization Sequence Completed
  6084. Mar 11 04:51:59 ntp: start NTP update
  6085. Mar 11 06:04:08 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
  6086. Mar 11 12:19:31 miniupnpd[23042]: upnp_event_recv: recv(): Connection reset by peer
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement