Advertisement
Guest User

Untitled

a guest
Dec 11th, 2015
1,161
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.11 KB | None | 0 0
  1. Fri Dec 11 15:10:14 2015 kern.info kernel: [ 25.290000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
  2. Fri Dec 11 15:10:14 2015 kern.info kernel: [ 25.300000] device wlan1 entered promiscuous mode
  3. Fri Dec 11 15:10:14 2015 daemon.notice netifd: radio1 (1098): wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  4. Fri Dec 11 15:10:14 2015 daemon.notice netifd: radio1 (1098): wlan1: interface state COUNTRY_UPDATE->HT_SCAN
  5. Fri Dec 11 15:10:14 2015 kern.info kernel: [ 25.330000] device wlan0 entered promiscuous mode
  6. Fri Dec 11 15:10:14 2015 kern.info kernel: [ 25.330000] br-lan: port 3(wlan0) entered forwarding state
  7. Fri Dec 11 15:10:14 2015 kern.info kernel: [ 25.340000] br-lan: port 3(wlan0) entered forwarding state
  8. Fri Dec 11 15:10:14 2015 daemon.notice netifd: radio0 (1097): wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  9. Fri Dec 11 15:10:14 2015 daemon.notice netifd: radio0 (1097): Using interface wlan0 with hwaddr c0:4a:00:2c:d9:e1 and ssid "OpenWrt"
  10. Fri Dec 11 15:10:14 2015 daemon.notice netifd: radio1 (1098): Using interface wlan1 with hwaddr c0:4a:00:2c:d9:e2 and ssid "OpenWrt_5GHz"
  11. Fri Dec 11 15:10:14 2015 daemon.notice openvpn(test123)[1049]: OpenVPN 2.3.6 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jul 25 2015
  12. Fri Dec 11 15:10:14 2015 daemon.notice openvpn(test123)[1049]: library versions: OpenSSL 1.0.2e 3 Dec 2015, LZO 2.08
  13. Fri Dec 11 15:10:14 2015 daemon.warn openvpn(test123)[1049]: WARNING: file '/root/key.txt' is group or others accessible
  14. Fri Dec 11 15:10:14 2015 daemon.warn openvpn(test123)[1049]: WARNING: file '/lib/uci/upload/cbid.openvpn.test123.key' is group or others accessible
  15. Fri Dec 11 15:10:15 2015 daemon.notice openvpn(test123)[1049]: Socket Buffers: R=[87380->131072] S=[16384->131072]
  16. Fri Dec 11 15:10:15 2015 daemon.notice openvpn(test123)[1049]: Attempting to establish TCP connection with [AF_INET]212.83.59.130:443 [nonblock]
  17. Fri Dec 11 15:10:15 2015 kern.info kernel: [ 26.260000] br-lan: port 3(wlan0) entered disabled state
  18. Fri Dec 11 15:10:15 2015 user.notice SQM: QDISC fq_codel is useable.
  19. Fri Dec 11 15:10:15 2015 user.notice SQM: QDISC efq_codel is NOT useable.
  20. Fri Dec 11 15:10:15 2015 user.notice SQM: QDISC nfq_codel is NOT useable.
  21. Fri Dec 11 15:10:15 2015 user.notice SQM: QDISC sfq is useable.
  22. Fri Dec 11 15:10:15 2015 user.notice SQM: QDISC codel is useable.
  23. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 26.880000] br-lan: port 3(wlan0) entered forwarding state
  24. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 26.890000] br-lan: port 3(wlan0) entered forwarding state
  25. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 26.890000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  26. Fri Dec 11 15:10:16 2015 daemon.notice netifd: radio0 (1097): wlan0: interface state COUNTRY_UPDATE->ENABLED
  27. Fri Dec 11 15:10:16 2015 daemon.notice netifd: radio0 (1097): wlan0: AP-ENABLED
  28. Fri Dec 11 15:10:16 2015 daemon.notice openvpn(test123)[1049]: TCP connection established with [AF_INET]212.83.59.130:443
  29. Fri Dec 11 15:10:16 2015 daemon.notice openvpn(test123)[1049]: TCPv4_CLIENT link local: [undef]
  30. Fri Dec 11 15:10:16 2015 daemon.notice openvpn(test123)[1049]: TCPv4_CLIENT link remote: [AF_INET]212.83.59.130:443
  31. Fri Dec 11 15:10:16 2015 daemon.notice openvpn(test123)[1049]: TLS: Initial packet from [AF_INET]212.83.59.130:443, sid=0d246dc7 962cab83
  32. Fri Dec 11 15:10:16 2015 daemon.warn openvpn(test123)[1049]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  33. Fri Dec 11 15:10:16 2015 user.notice SQM: QDISC ns2_codel is NOT useable.
  34. Fri Dec 11 15:10:16 2015 user.notice SQM: QDISC pie is useable.
  35. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 27.210000] br-lan: port 2(wlan1) entered forwarding state
  36. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 27.210000] br-lan: port 2(wlan1) entered forwarding state
  37. Fri Dec 11 15:10:16 2015 kern.info kernel: [ 27.220000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  38. Fri Dec 11 15:10:16 2015 daemon.notice netifd: radio1 (1098): wlan1: interface state HT_SCAN->ENABLED
  39. Fri Dec 11 15:10:16 2015 daemon.notice netifd: radio1 (1098): wlan1: AP-ENABLED
  40. Fri Dec 11 15:10:16 2015 user.notice SQM: QDISC cake is NOT useable.
  41. Fri Dec 11 15:10:16 2015 daemon.notice netifd: Network device 'wlan0' link is up
  42. Fri Dec 11 15:10:16 2015 daemon.notice netifd: Network device 'wlan1' link is up
  43. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: VERIFY OK: depth=1, C=GB, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, name=HMA, emailAddress=info@privax.com
  44. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: Validating certificate key usage
  45. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: ++ Certificate has key usage 00a0, expects 00a0
  46. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: VERIFY KU OK
  47. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: Validating certificate extended key usage
  48. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  49. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: VERIFY EKU OK
  50. Fri Dec 11 15:10:17 2015 daemon.notice openvpn(test123)[1049]: VERIFY OK: depth=0, C=GB, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=info@privax.com
  51. Fri Dec 11 15:10:17 2015 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  52. Fri Dec 11 15:10:18 2015 kern.info kernel: [ 28.890000] br-lan: port 3(wlan0) entered forwarding state
  53. Fri Dec 11 15:10:18 2015 kern.info kernel: [ 29.210000] br-lan: port 2(wlan1) entered forwarding state
  54. Fri Dec 11 15:10:19 2015 daemon.err openvpn(test123)[1049]: write TCPv4_CLIENT: Connection reset by peer (code=131)
  55. Fri Dec 11 15:10:19 2015 daemon.err openvpn(test123)[1049]: write TCPv4_CLIENT: Broken pipe (code=32)
  56. Fri Dec 11 15:10:19 2015 daemon.err openvpn(test123)[1049]: write TCPv4_CLIENT: Broken pipe (code=32)
  57. Fri Dec 11 15:10:19 2015 daemon.err openvpn(test123)[1049]: write TCPv4_CLIENT: Broken pipe (code=32)
  58. Fri Dec 11 15:10:19 2015 daemon.err openvpn(test123)[1049]: Connection reset, restarting [0]
  59. Fri Dec 11 15:10:19 2015 daemon.notice openvpn(test123)[1049]: SIGUSR1[soft,connection-reset] received, process restarting
  60. Fri Dec 11 15:10:19 2015 daemon.notice openvpn(test123)[1049]: Restart pause, 5 second(s)
  61. Fri Dec 11 15:10:20 2015 daemon.info hostapd: wlan0: STA 10:fe:ed:1f:2f:57 IEEE 802.11: authenticated
  62. Fri Dec 11 15:10:20 2015 daemon.info hostapd: wlan0: STA 10:fe:ed:1f:2f:57 IEEE 802.11: associated (aid 1)
  63. Fri Dec 11 15:10:20 2015 daemon.info hostapd: wlan0: STA 10:fe:ed:1f:2f:57 WPA: pairwise key handshake completed (RSN)
  64. Fri Dec 11 15:10:20 2015 daemon.warn odhcpd[961]: DHCPV6 SOLICIT IA_NA from 000100011d93005574d435fdd883 on br-lan: ok fd80:1198:1b2c::c68/128
  65. Fri Dec 11 15:10:20 2015 daemon.warn odhcpd[961]: DHCPV6 SOLICIT IA_NA from 000100011d93005574d435fdd883 on br-lan: ok fd80:1198:1b2c::c68/128
  66. Fri Dec 11 15:10:21 2015 daemon.warn odhcpd[961]: DHCPV6 REQUEST IA_NA from 000100011d93005574d435fdd883 on br-lan: ok fd80:1198:1b2c::c68/128
  67. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: started, version 2.73 cachesize 150
  68. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
  69. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: DNS service limited to local subnets
  70. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq-dhcp[1662]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
  71. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using local addresses only for domain lan
  72. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: reading /tmp/resolv.conf.auto
  73. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using local addresses only for domain lan
  74. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using nameserver 217.237.148.22#53
  75. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using nameserver 217.237.150.51#53
  76. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using nameserver 217.237.148.22#53
  77. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: using nameserver 217.237.150.51#53
  78. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: read /etc/hosts - 1 addresses
  79. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: read /tmp/hosts/dhcp - 1 addresses
  80. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq[1662]: read /tmp/hosts/odhcpd - 1 addresses
  81. Fri Dec 11 15:10:21 2015 daemon.info dnsmasq-dhcp[1662]: read /etc/ethers - 0 addresses
  82. Fri Dec 11 15:10:22 2015 daemon.info hostapd: wlan0: STA 00:22:c0:a0:03:55 IEEE 802.11: authenticated
  83. Fri Dec 11 15:10:22 2015 daemon.info hostapd: wlan0: STA 00:22:c0:a0:03:55 IEEE 802.11: associated (aid 2)
  84. Fri Dec 11 15:10:22 2015 daemon.info hostapd: wlan0: STA 00:22:c0:a0:03:55 WPA: pairwise key handshake completed (RSN)
  85. Fri Dec 11 15:10:22 2015 daemon.info dnsmasq-dhcp[1662]: DHCPREQUEST(br-lan) 192.168.1.117 00:22:c0:a0:03:55
  86. Fri Dec 11 15:10:22 2015 daemon.info dnsmasq-dhcp[1662]: DHCPACK(br-lan) 192.168.1.117 00:22:c0:a0:03:55 alarmpi
  87. Fri Dec 11 15:10:22 2015 user.notice SQM: /usr/lib/sqm/start-sqm: Starting pppoe-wan
  88. Fri Dec 11 15:10:22 2015 user.notice SQM: /usr/lib/sqm/start-sqm: Queue Setup Script: simple.qos
  89. Fri Dec 11 15:10:22 2015 daemon.err modprobe: act_ipt is already loaded
  90. Fri Dec 11 15:10:22 2015 daemon.err modprobe: failed to find a module named sch_fq_codel
  91. Fri Dec 11 15:10:22 2015 daemon.err modprobe: sch_ingress is already loaded
  92. Fri Dec 11 15:10:22 2015 daemon.err modprobe: act_mirred is already loaded
  93. Fri Dec 11 15:10:22 2015 daemon.err modprobe: cls_fw is already loaded
  94. Fri Dec 11 15:10:22 2015 daemon.err modprobe: cls_flow is already loaded
  95. Fri Dec 11 15:10:22 2015 daemon.err modprobe: cls_u32 is already loaded
  96. Fri Dec 11 15:10:22 2015 daemon.err modprobe: sch_htb is already loaded
  97. Fri Dec 11 15:10:22 2015 daemon.err modprobe: sch_hfsc is already loaded
  98. Fri Dec 11 15:10:22 2015 user.notice SQM: QDISC htb is useable.
  99. Fri Dec 11 15:10:22 2015 user.notice SQM: QDISC fq_codel is useable.
  100. Fri Dec 11 15:10:23 2015 user.notice SQM: Starting simple.qos
  101. Fri Dec 11 15:10:23 2015 user.notice SQM: ifb associated with interface pppoe-wan:
  102. Fri Dec 11 15:10:23 2015 user.notice SQM: Currently no ifb is associated with pppoe-wan, this is normal during starting of the sqm system.
  103. Fri Dec 11 15:10:23 2015 daemon.info hostapd: wlan0: STA 84:c9:b2:01:8c:13 IEEE 802.11: authenticated
  104. Fri Dec 11 15:10:23 2015 daemon.info hostapd: wlan0: STA 84:c9:b2:01:8c:13 IEEE 802.11: associated (aid 3)
  105. Fri Dec 11 15:10:23 2015 daemon.info hostapd: wlan0: STA 84:c9:b2:01:8c:13 WPA: pairwise key handshake completed (RSN)
  106. Fri Dec 11 15:10:23 2015 user.notice SQM: Squashing differentiated services code points (DSCP) from ingress.
  107. Fri Dec 11 15:10:24 2015 daemon.notice openvpn(test123)[1049]: Socket Buffers: R=[87380->131072] S=[16384->131072]
  108. Fri Dec 11 15:10:24 2015 daemon.notice openvpn(test123)[1049]: Attempting to establish TCP connection with [AF_INET]212.83.59.130:443 [nonblock]
  109. Fri Dec 11 15:10:24 2015 daemon.info dnsmasq-dhcp[1662]: DHCPREQUEST(br-lan) 192.168.1.199 10:fe:ed:1f:2f:57
  110. Fri Dec 11 15:10:24 2015 daemon.info dnsmasq-dhcp[1662]: DHCPACK(br-lan) 192.168.1.199 10:fe:ed:1f:2f:57 daniel-pc
  111. Fri Dec 11 15:10:24 2015 user.notice SQM: STAB: stab mtu 2047 tsize 512 mpu 0 overhead 44 linklayer atm
  112. Fri Dec 11 15:10:24 2015 user.notice SQM: get_limit: CURLIMIT: 1001
  113. Fri Dec 11 15:10:24 2015 user.notice SQM: get_target defaulting to auto.
  114. Fri Dec 11 15:10:24 2015 user.notice SQM: get_limit: CURLIMIT: 1001
  115. Fri Dec 11 15:10:24 2015 user.notice SQM: get_target defaulting to auto.
  116. Fri Dec 11 15:10:24 2015 user.notice SQM: get_limit: CURLIMIT: 1001
  117. Fri Dec 11 15:10:24 2015 user.notice SQM: get_target defaulting to auto.
  118. Fri Dec 11 15:10:24 2015 user.notice SQM: egress shaping activated
  119. Fri Dec 11 15:10:24 2015 user.notice SQM: QDISC ingress is useable.
  120. Fri Dec 11 15:10:24 2015 user.notice SQM: Do not perform DSCP based filtering on ingress. (1-tier classification)
  121. Fri Dec 11 15:10:24 2015 user.notice SQM: STAB: stab mtu 2047 tsize 512 mpu 0 overhead 44 linklayer atm
  122. Fri Dec 11 15:10:24 2015 user.notice SQM: get_limit: CURLIMIT: 1001
  123. Fri Dec 11 15:10:24 2015 user.notice SQM: get_target defaulting to auto.
  124. Fri Dec 11 15:10:24 2015 user.notice SQM: ingress shaping activated
  125. Fri Dec 11 15:10:25 2015 daemon.notice openvpn(test123)[1049]: TCP connection established with [AF_INET]212.83.59.130:443
  126. Fri Dec 11 15:10:25 2015 daemon.notice openvpn(test123)[1049]: TCPv4_CLIENT link local: [undef]
  127. Fri Dec 11 15:10:25 2015 daemon.notice openvpn(test123)[1049]: TCPv4_CLIENT link remote: [AF_INET]212.83.59.130:443
  128. Fri Dec 11 15:10:25 2015 daemon.notice openvpn(test123)[1049]: TLS: Initial packet from [AF_INET]212.83.59.130:443, sid=92e3cfeb 4d5d461c
  129. Fri Dec 11 15:10:25 2015 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  130. Fri Dec 11 15:10:26 2015 kern.notice kernel: [ 36.870000] random: nonblocking pool is initialized
  131. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: VERIFY OK: depth=1, C=GB, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, name=HMA, emailAddress=info@privax.com
  132. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: Validating certificate key usage
  133. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: ++ Certificate has key usage 00a0, expects 00a0
  134. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: VERIFY KU OK
  135. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: Validating certificate extended key usage
  136. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  137. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: VERIFY EKU OK
  138. Fri Dec 11 15:10:26 2015 daemon.notice openvpn(test123)[1049]: VERIFY OK: depth=0, C=GB, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=info@privax.com
  139. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  140. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  141. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  142. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  143. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  144. Fri Dec 11 15:10:29 2015 daemon.notice openvpn(test123)[1049]: [server] Peer Connection Initiated with [AF_INET]212.83.59.130:443
  145. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  146. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: PUSH: Received control message: 'PUSH_REPLY,topology subnet,route-gateway 10.200.0.1,dhcp-option DNS 10.200.0.1,redirect-gateway def1,ifconfig-ipv6 2001:db8:123::2/64 2001:db8:123::1,route-ipv6 2000::/3 2001:db8:123::1,explicit-exit-notify 2,ifconfig 10.200.3.71 255.255.252.0'
  147. Fri Dec 11 15:10:31 2015 daemon.err openvpn(test123)[1049]: Options error: Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:7: explicit-exit-notify (2.3.6)
  148. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: OPTIONS IMPORT: --ifconfig/up options modified
  149. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: OPTIONS IMPORT: route options modified
  150. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: OPTIONS IMPORT: route-related options modified
  151. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  152. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: TUN/TAP device tun0 opened
  153. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: TUN/TAP TX queue length set to 100
  154. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=1
  155. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: /sbin/ifconfig tun0 10.200.3.71 netmask 255.255.252.0 mtu 1500 broadcast 10.200.3.255
  156. Fri Dec 11 15:10:31 2015 daemon.notice netifd: Interface 'vpn' is enabled
  157. Fri Dec 11 15:10:31 2015 daemon.notice netifd: Network device 'tun0' link is up
  158. Fri Dec 11 15:10:31 2015 daemon.notice netifd: Interface 'vpn' is now up
  159. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.200.0.1
  160. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: add_route_ipv6(): not adding 2000::/3, no IPv6 on if tun0
  161. Fri Dec 11 15:10:31 2015 daemon.notice openvpn(test123)[1049]: Initialization Sequence Completed
  162. Fri Dec 11 15:10:31 2015 user.notice firewall: Reloading firewall due to ifup of vpn (tun0)
  163. Fri Dec 11 15:10:32 2015 daemon.info dnsmasq-dhcp[1662]: DHCPDISCOVER(br-lan) 84:c9:b2:01:8c:13
  164. Fri Dec 11 15:10:32 2015 daemon.info dnsmasq-dhcp[1662]: DHCPOFFER(br-lan) 192.168.1.111 84:c9:b2:01:8c:13
  165. Fri Dec 11 15:10:34 2015 daemon.info dnsmasq-dhcp[1662]: DHCPDISCOVER(br-lan) 84:c9:b2:01:8c:13
  166. Fri Dec 11 15:10:34 2015 daemon.info dnsmasq-dhcp[1662]: DHCPOFFER(br-lan) 192.168.1.111 84:c9:b2:01:8c:13
  167. Fri Dec 11 15:10:34 2015 daemon.info dnsmasq-dhcp[1662]: DHCPREQUEST(br-lan) 192.168.1.111 84:c9:b2:01:8c:13
  168. Fri Dec 11 15:10:34 2015 daemon.info dnsmasq-dhcp[1662]: DHCPACK(br-lan) 192.168.1.111 84:c9:b2:01:8c:13 OpenELEC
  169. Fri Dec 11 15:10:35 2015 daemon.info hostapd: wlan0: STA a0:f3:c1:17:d2:d8 IEEE 802.11: authenticated
  170. Fri Dec 11 15:10:35 2015 daemon.info hostapd: wlan0: STA a0:f3:c1:17:d2:d8 IEEE 802.11: associated (aid 4)
  171. Fri Dec 11 15:10:35 2015 daemon.info hostapd: wlan0: STA a0:f3:c1:17:d2:d8 WPA: pairwise key handshake completed (RSN)
  172. Fri Dec 11 15:10:35 2015 daemon.info dnsmasq-dhcp[1662]: DHCPREQUEST(br-lan) 192.168.1.160 a0:f3:c1:17:d2:d8
  173. Fri Dec 11 15:10:35 2015 daemon.info dnsmasq-dhcp[1662]: DHCPACK(br-lan) 192.168.1.160 a0:f3:c1:17:d2:d8 OpenELEC
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement