Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue Oct 8 03:38:04 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 03:38:04 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 03:38:04 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 03:38:04 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886579] [wifi1] FWLOG: [26894911] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x19a624a
- Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886657] [wifi1] FWLOG: [26894922] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435ab4 )
- Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886697] [wifi1] FWLOG: [26894950] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x19a62e9
- Tue Oct 8 03:38:14 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session CEC2EA00BEED7AD1
- Tue Oct 8 03:38:14 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1410000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"26246.261535"}
- Tue Oct 8 04:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 04:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
- Tue Oct 8 04:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 04:04:40 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 04:04:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 04:04:40 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 04:04:40 2019 kern.warn kernel: [26246.886736] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [28528156] WAL_DBGID_SET_HW_FILTER ( 0x435ab4 )
- Tue Oct 8 04:04:40 2019 kern.warn kernel: [27842.058287] [wifi1] FWLOG: [28528665] WAL_DBGID_SET_HW_FILTER ( 0x4359cc )
- Tue Oct 8 04:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 04:04:45 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 04:31:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 04:31:34 2019 kern.warn kernel: [29456.228717] [wifi1] FWLOG: [30181761] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1cc898e
- Tue Oct 8 04:31:34 2019 kern.warn kernel: [29456.228788] [wifi1] FWLOG: [30181774] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435b9c )
- Tue Oct 8 04:31:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 04:31:35 2019 kern.warn kernel: [29457.229050] [wifi1] FWLOG: [30181800] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x7fc0401
- Tue Oct 8 04:31:44 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 818731093D7FBF89
- Tue Oct 8 04:31:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"29456.172748"}
- Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 04:32:12 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 04:32:12 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.232973] [wifi1] FWLOG: [30220712] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1cd21b3
- Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.233049] [wifi1] FWLOG: [30220723] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435c84 )
- Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.233090] [wifi1] [wifi1] FWLOG: [30220954] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 04:32:22 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session FCFB1744E486584A
- Tue Oct 8 04:32:22 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1400000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"29494.214104"}
- Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
- Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 04:39:43 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 04:39:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 04:39:44 2019 kern.warn kernel: [29504.233842] [wifi1] [wifi1] [wifi1] FWLOG: [30682729] WAL_DBGID_SET_HW_FILTER ( 0x435b9c )
- Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 04:40:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286521] [wifi1] FWLOG: [30734716] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1d4f989
- Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286607] [wifi1] FWLOG: [30734729] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435d6c )
- Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286648] [wifi1] FWLOG: [30734753] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
- Tue Oct 8 04:40:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 04:40:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 04:40:40 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
- Tue Oct 8 04:40:40 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 04:40:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 04:40:40 2019 kern.warn kernel: [30002.037487] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 04:40:40 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 04:40:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"2","ip_assign_type":"roamed","auth_ts":"29996.185451"}
- Tue Oct 8 04:40:49 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F789A9A27AE11E3B
- Tue Oct 8 04:40:49 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"30001.372865"}
- Tue Oct 8 04:41:49 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 04:45:48 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 04:56:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386568] [wifi1] FWLOG: [31719871] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1e401cd
- Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386653] [wifi1] FWLOG: [31719885] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435e54 )
- Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386746] [wifi1] FWLOG: [31719905] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
- Tue Oct 8 04:56:37 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 04:56:37 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 04:56:37 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 04:56:37 2019 kern.warn kernel: [30959.390452] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 04:56:37 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 04:56:38 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 04:56:38 2019 kern.warn kernel: [30960.475674] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 04:56:46 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 2512F92850E68B4E
- Tue Oct 8 04:56:46 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"30958.277610"}
- Tue Oct 8 04:57:29 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 05:00:41 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 05:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"258850000","assoc_delta":"10000","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
- Tue Oct 8 05:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake completed (RSN)
- Tue Oct 8 05:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 05:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
- Tue Oct 8 05:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 05:04:39 2019 kern.warn kernel: [31441.438086] [wifi1] [wifi1] FWLOG: [32214449] WAL_DBGID_SET_HW_FILTER ( 0x435c84 )
- Tue Oct 8 05:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
- Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 05:10:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 05:10:20 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 05:10:20 2019 kern.warn kernel: [31782.474866] [wifi1] FWLOG: [32562870] WAL_DBGID_SET_HW_FILTER ( 0x435e54 )
- Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 05:14:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 05:14:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504666] [wifi1] FWLOG: [32846756] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1f533b3
- Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504744] [wifi1] FWLOG: [32846771] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435f3c )
- Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504784] [wifi1] FWLOG: [32846794] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
- Tue Oct 8 05:15:07 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 61DEC226D0900996
- Tue Oct 8 05:15:07 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"32058.784525"}
- Tue Oct 8 05:21:04 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 05:26:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 05:26:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576239] [wifi1] FWLOG: [33546535] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1ffe132
- Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576319] [wifi1] FWLOG: [33546546] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436024 )
- Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576359] [wifi1] FWLOG: [33546584] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1ffe1e2
- Tue Oct 8 05:26:30 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 580AEED378C8DF43
- Tue Oct 8 05:26:30 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1420000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"32742.183980"}
- Tue Oct 8 05:31:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"958250000","assoc_delta":"0","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
- Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
- Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 05:51:27 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 05:51:27 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 05:51:28 2019 kern.warn kernel: [32742.576397] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [35089176] WAL_DBGID_SET_HW_FILTER ( 0x435f3c )
- Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 05:55:35 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 05:55:35 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766598] [wifi1] FWLOG: [35343702] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x21b4d64
- Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766677] [wifi1] FWLOG: [35343716] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43610c )
- Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766717] [wifi1] FWLOG: [35343741] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1ff0401
- Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 05:55:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 05:55:41 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
- Tue Oct 8 05:55:41 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 05:55:41 2019 kern.warn kernel: [34503.005038] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 05:55:41 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 05:55:41 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"0"}
- Tue Oct 8 05:55:45 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"34497.282123"}
- Tue Oct 8 05:55:50 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 47760D0EDDB51871
- Tue Oct 8 05:55:51 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"34502.416527"}
- Tue Oct 8 05:56:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 06:00:32 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 06:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"314600000","assoc_delta":"10000","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
- Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 06:01:58 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:01:58 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 06:01:59 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.593878] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 06:01:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 06:01:59 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.808886] [wifi1] FWLOG: [35735810] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x2214910
- Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.808963] [wifi1] FWLOG: [35735824] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4361f4 )
- Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.809005] [wifi1] FWLOG: [35735848] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
- Tue Oct 8 06:02:00 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 06:02:00 2019 kern.warn kernel: [34881.677146] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 06:02:08 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F47B1E62BBA3410D
- Tue Oct 8 06:02:08 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"34880.211013"}
- Tue Oct 8 06:02:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 06:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake completed (RSN)
- Tue Oct 8 06:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 06:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
- Tue Oct 8 06:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 06:04:40 2019 kern.warn kernel: [35041.826073] [wifi1] [wifi1] FWLOG: [35900740] WAL_DBGID_SET_HW_FILTER ( 0x436024 )
- Tue Oct 8 06:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 06:14:27 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 06:20:28 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:20:28 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924529] [wifi1] FWLOG: [36872358] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x232a0b1
- Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924607] [wifi1] FWLOG: [36872369] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4362dc )
- Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924648] [wifi1] [wifi1] FWLOG: [36872596] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 06:20:38 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 37081B4B77809764
- Tue Oct 8 06:20:38 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1650000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"35990.155274"}
- Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 06:22:56 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:22:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 06:22:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 06:22:57 2019 kern.warn kernel: [35998.925179] [wifi1] [wifi1] FWLOG: [37024199] RATE: ChainMask 1, phymode 1044489, ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x234f1d4
- Tue Oct 8 06:22:57 2019 kern.warn kernel: [36138.939713] [wifi1] FWLOG: [37024212] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4363c4 )
- Tue Oct 8 06:22:57 2019 kern.warn kernel: [36138.939756] [wifi1] FWLOG: [37024236] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
- Tue Oct 8 06:23:06 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F47B1E62BBA3410D
- Tue Oct 8 06:23:07 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","event_type":"soft failure","assoc_delta":"0","event_id":"2","ip_assign_type":"roamed","auth_ts":"36138.443305"}
- Tue Oct 8 06:31:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","ip_delta":"478500000","assoc_delta":"0","event_type":"fixup","event_id":"2","ip_assign_type":"dhcp","auth_ts":"0.0"}
- Tue Oct 8 06:41:15 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","arp_reply_gw_seen":"yes","event_type":"fixup","event_id":"2","auth_ts":"0.0"}
- Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 06:48:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:48:39 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
- Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 06:48:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 06:48:39 2019 kern.warn kernel: [36342.961892] [wifi1]
- Tue Oct 8 06:48:39 2019 kern.warn kernel: [37681.346822] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 06:48:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"2"}
- Tue Oct 8 06:48:49 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session FE12BB7D73375C84
- Tue Oct 8 06:48:49 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"37681.8863"}
- Tue Oct 8 06:49:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 06:50:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 06:51:14 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
- Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
- Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:51:14 2019 kern.warn kernel: [37836.115780] [wifi1] FWLOG: [38762460] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x24f77ea
- Tue Oct 8 06:51:14 2019 kern.warn kernel: [37836.115866] [wifi1] FWLOG: [38762474] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4364ac )
- Tue Oct 8 06:51:15 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 06:51:15 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 06:51:15 2019 kern.warn kernel: [37836.642265] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 06:51:15 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 06:51:15 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 06:51:15 2019 kern.warn kernel: [37837.115856] [wifi1] FWLOG: [38762604] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x21b0401
- Tue Oct 8 06:51:16 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
- Tue Oct 8 06:51:16 2019 kern.warn kernel: [37837.729109] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 06:51:24 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 27C277091C533594
- Tue Oct 8 06:51:24 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"37836.13219"}
- Tue Oct 8 06:51:29 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
- Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
- Tue Oct 8 06:59:16 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 /1
- Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
- Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 06:59:17 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
- Tue Oct 8 06:59:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session B0CA838859F0F341
- Tue Oct 8 06:59:26 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"1130000","assoc_delta":"10000","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"38318.114558"}
- Tue Oct 8 07:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"580890000","assoc_delta":"0","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
- Tue Oct 8 07:02:02 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","arp_reply_gw_seen":"yes","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916264]
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916264] Could not find the peer
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916326]
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916326] Unable to process TX info
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916352]
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916352] Could not find the peer
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916372]
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916372] Unable to process TX info
- Tue Oct 8 07:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
- Tue Oct 8 07:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 07:04:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
- Tue Oct 8 07:04:36 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 07:04:36 2019 kern.warn kernel: [38638.198564] [wifi1] FWLOG: [39583541] WAL_DBGID_SET_HW_FILTER ( 0x4364ac )
- Tue Oct 8 07:04:37 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 07:04:37 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1 / 1
- Tue Oct 8 07:04:37 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 07:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 07:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
- Tue Oct 8 07:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 07:04:40 2019 kern.warn kernel: [38642.198972] [wifi1] [wifi1] FWLOG: [39587032] WAL_DBGID_SET_HW_FILTER ( 0x4362dc )
- Tue Oct 8 07:04:42 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 07:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 07:14:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 07:14:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263596] [wifi1] FWLOG: [40198179] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x265602d
- Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263673] [wifi1] FWLOG: [40198189] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436594 )
- Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263713] [wifi1] FWLOG: [40198214] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 07:14:46 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 830FF3C7F0FCD452
- Tue Oct 8 07:14:46 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1220000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"39238.125734"}
- Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
- Tue Oct 8 07:22:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 /1
- Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
- Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 07:22:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
- Tue Oct 8 07:23:09 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session CCB004E5DAF8A736
- Tue Oct 8 07:23:09 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"140000","assoc_delta":"10000","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"39740.913641"}
- Tue Oct 8 07:23:34 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
- Tue Oct 8 07:23:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","auth_failures":"1","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"failure","event_id":"1","auth_ts":"39776.136227"}
- Tue Oct 8 07:23:58 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
- Tue Oct 8 07:28:44 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
- Tue Oct 8 07:28:44 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
- Tue Oct 8 07:28:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1 / 1
- Tue Oct 8 07:28:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 08:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 08:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
- Tue Oct 8 08:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
- Tue Oct 8 08:04:40 2019 kern.warn kernel: [39239.263663] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [43273328] WAL_DBGID_SET_HW_FILTER ( 0x436594 )
- Tue Oct 8 08:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 08:08:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
- Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 08:08:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602685] [wifi1] FWLOG: [43524002] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2981fac
- Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602764] [wifi1] FWLOG: [43524012] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43667c )
- Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602804] [wifi1] [wifi1] FWLOG: [43524238] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0xcf0401
- Tue Oct 8 08:08:54 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 8F4068061E00530D
- Tue Oct 8 08:08:54 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1970000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"42486.95176"}
- Tue Oct 8 08:47:14 2019 user.info : mcad[5675]: ace_reporter.reporter_handle_response(): cfgversion: 54ae48916cb0ddd9 -> d34edcd5c30955a7
- Tue Oct 8 08:47:18 2019 user.info : mcad[5675]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
- Tue Oct 8 08:47:25 2019 authpriv.info dropbear[5826]: Early exit: Terminated by signal
- Tue Oct 8 08:47:44 2019 daemon.info lldpcli[13048]: lldpd should resume operations
- Tue Oct 8 08:47:44 2019 daemon.info logread[13050]: failed to send log data to 60.251.196.251:514 via udp
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.003643] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.030488] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
- Tue Oct 8 08:47:44 2019 user.err : mcad[13051]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:47:44 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13051) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.048109] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.068025] DEVICE IS DOWN ifname=ath0
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.068118] DEVICE IS DOWN ifname=ath0
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.078940] DEVICE IS DOWN ifname=ath1
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.079039] DEVICE IS DOWN ifname=ath1
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.088881] DEVICE IS DOWN ifname=ath2
- Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.088975] DEVICE IS DOWN ifname=ath2
- Tue Oct 8 08:47:44 2019 daemon.err snmpd[13045]: MIB search path: //.snmp/mibs:/usr/share/snmp/mibs
- Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): UBNT_DEVICE[b4:fb:e4:f3:9a:c2]
- Tue Oct 8 08:47:45 2019 user.info : utermd[13054]: utermd.utermd_main(): server up, fd:3, pid:13054
- Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): mcast_ip is 239.254.127.63
- Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): ubnt_protocol init done
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.741024] wmi_unified_vdev_stop_send for vap 1 (84ff0000)
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.741103] STOPPED EVENT for vap 1 (84ff0000)
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.867274] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875361] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875405] ol_if_dfs_configure: called
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875417] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875430] ol_if_dfs_disable: called
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875784] ol_if_dfs_enable: called
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875810] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
- Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875852] cac_start chan 5500 timeout 62 sec, curr time: 44526 sec
- Tue Oct 8 08:47:46 2019 kern.info kernel: [44827.866504] br0: port 4(ath2) entered blocking state
- Tue Oct 8 08:47:46 2019 kern.info kernel: [44827.866535] br0: port 4(ath2) entered forwarding state
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.867631] wmi_unified_vdev_stop_send for vap 0 (84ff0000)
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.867826] STOPPED EVENT for vap 0 (84ff0000)
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997279] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997624] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997650] ol_if_dfs_configure: called
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997662] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997674] ol_if_dfs_disable: called
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.998016] ol_if_dfs_enable: called
- Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.998074] cac_start chan 5500 timeout 62 sec, curr time: 44527 sec
- Tue Oct 8 08:47:47 2019 kern.info kernel: [44828.996525] br0: port 3(ath1) entered blocking state
- Tue Oct 8 08:47:47 2019 kern.info kernel: [44828.996560] br0: port 3(ath1) entered forwarding state
- Tue Oct 8 08:47:47 2019 kern.warn kernel: [44829.157277] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.157838] br0: port 2(ath0) entered blocking state
- Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.157872] br0: port 2(ath0) entered forwarding state
- Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.159417] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
- Tue Oct 8 08:47:49 2019 user.notice ortix: netconsole init failed, error 2
- Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
- Tue Oct 8 08:47:52 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_stainfo_send(): failed to send ubnt wevent (len:88), Network unreachable
- Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
- Tue Oct 8 08:47:52 2019 user.info : wevent[13055]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
- Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 08:47:53 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_stainfo_send(): failed to send ubnt wevent (len:88), Network unreachable
- Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
- Tue Oct 8 08:47:53 2019 user.notice syswrapper: ipready.br0 = 192.168.1.20
- Tue Oct 8 08:47:53 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 13042) exited with status 9. Scheduling for restart (no alert sent).
- Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
- Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.1.20
- Tue Oct 8 08:47:53 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_multicast_socket_init(): already drop membership
- Tue Oct 8 08:47:53 2019 authpriv.info dropbear[13171]: Not backgrounding
- Tue Oct 8 08:47:54 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=36 (max=300)
- Tue Oct 8 08:47:54 2019 user.err : mcad[13172]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:47:54 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13172) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:47:58 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 13044) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:47:58 2019 daemon.warn lldpd[13180]: no privilege separation available
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol LLDP enabled and forced
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol CDPv1 disabled
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol CDPv2 disabled
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol SONMP disabled
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol EDP disabled
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol FDP disabled
- Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: libevent 2.0.22-stable initialized with epoll method
- Tue Oct 8 08:47:58 2019 daemon.info lldpcli[13181]: lldpd should resume operations
- Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=ath1 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:48:02 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 5BAD774E452ED8FC
- Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119266] eth0: link up (100Mbps/Full duplex)
- Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119467] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119607] br0: port 1(eth0) entered blocking state
- Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119636] br0: port 1(eth0) entered forwarding state
- Tue Oct 8 08:48:04 2019 user.err : mcad[13207]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:48:04 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13207) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:48:04 2019 user.info : mca-ctrl[13078]: mca-client.service_json(): failed to contact mcad
- Tue Oct 8 08:48:04 2019 user.info : mcad[5675]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
- Tue Oct 8 08:48:04 2019 user.info : mcad[5675]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
- Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload_config(): authkey=B542B8A70975764F1E71EAAEE14AD003
- Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
- Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
- Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.set_default_localtime(): time is ready
- Tue Oct 8 08:48:14 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=56 (max=300)
- Tue Oct 8 08:48:15 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
- Tue Oct 8 08:48:15 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
- Tue Oct 8 08:48:22 2019 user.info : mca-ctrl[13206]: mca-client.service_json(): failed to contact mcad
- Tue Oct 8 08:48:22 2019 user.info : stahtd[13056]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","assoc_delta":"10000","mac":"28:c2:dd:e5:12:e5","vap":"ath0","ip_assign_type":"roamed","event_type":"soft failure","assoc_status":"0","auth_delta":"0","wpa_auth_delta":"80000","event_id":"1","auth_ts":"44834.405856"}
- Tue Oct 8 08:48:25 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=66 (max=300)
- Tue Oct 8 08:48:25 2019 user.info : stahtd[13056]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","dns_resp_seen":"yes","vap":"ath0","mac":"28:c2:dd:e5:12:e5","event_type":"fixup","auth_ts":"0.0","assoc_status":"0","event_id":"1"}
- Tue Oct 8 08:48:29 2019 daemon.info logread[13050]: Logread connected to 60.251.196.251:514
- Tue Oct 8 08:48:29 2019 user.notice syswrapper: ipready.br0 = 192.168.178.150
- Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 13171) exited with status 9. Scheduling for restart (no alert sent).
- Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/ntpclient' (pid 13041) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:48:29 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
- Tue Oct 8 08:48:29 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.178.150
- Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 13180) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:48:29 2019 authpriv.info dropbear[13325]: Not backgrounding
- Tue Oct 8 08:48:30 2019 daemon.warn lldpd[13331]: no privilege separation available
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol LLDP enabled and forced
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol CDPv1 disabled
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol CDPv2 disabled
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol SONMP disabled
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol EDP disabled
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol FDP disabled
- Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: libevent 2.0.22-stable initialized with epoll method
- Tue Oct 8 08:48:30 2019 daemon.info lldpcli[13332]: lldpd should resume operations
- Tue Oct 8 08:48:30 2019 user.info : mcad[13208]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
- Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=ath1 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116280] cac_timeout cac expired, chan 5500 curr time 44590
- Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116377] wmi_unified_vdev_up_send for vap 0 (84ff0000)
- Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116437] wmi_unified_vdev_up_send for vap 1 (84ff0000)
- Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.619333] console [netcon_ext0] disabled
- Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.619374] console [netcon0] disabled
- Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.629779] console [netcon0] enabled
- Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.629984] netconsole: network logging started
- Tue Oct 8 08:49:44 2019 user.info : mcad[13208]: ace_reporter.reporter_handle_response(): cfgversion: d34edcd5c30955a7-> 9022292276f25a08
- Tue Oct 8 08:49:48 2019 user.info : mcad[13208]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
- Tue Oct 8 08:49:55 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=6(max=300)
- Tue Oct 8 08:49:55 2019 authpriv.info dropbear[13325]: Early exit: Terminated by signal
- Tue Oct 8 08:50:15 2019 daemon.info lldpcli[14397]: lldpd should resume operations
- Tue Oct 8 08:50:15 2019 daemon.info logread[14396]: failed to send log data to 60.251.196.251:514 via udp
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.515458] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.553797] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.580085] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
- Tue Oct 8 08:50:16 2019 user.err : mcad[14399]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.594401] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.595117] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.598960] DEVICE IS DOWN ifname=ath0
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.599057] DEVICE IS DOWN ifname=ath0
- Tue Oct 8 08:50:16 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14399) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.622212] DEVICE IS DOWN ifname=vwire1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.622308] DEVICE IS DOWN ifname=vwire1
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.636399] DEVICE IS DOWN ifname=vwire4
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.636491] DEVICE IS DOWN ifname=vwire4
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.658265] DEVICE IS DOWN ifname=ath2
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.658360] DEVICE IS DOWN ifname=ath2
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.667320] DEVICE IS DOWN ifname=ath3
- Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.667416] DEVICE IS DOWN ifname=ath3
- Tue Oct 8 08:50:16 2019 daemon.err snmpd[14393]: MIB search path: //.snmp/mibs:/usr/share/snmp/mibs
- Tue Oct 8 08:50:16 2019 user.info : utermd[14402]: utermd.utermd_main(): server up, fd:3, pid:14402
- Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): UBNT_DEVICE[b4:fb:e4:f3:9a:c2]
- Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): mcast_ip is 239.254.127.63
- Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): ubnt_protocol init done
- Tue Oct 8 08:50:17 2019 kern.warn kernel: [44978.517328] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.517902] br0: port 2(ath0) entered blocking state
- Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.517930] br0: port 2(ath0) entered forwarding state
- Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.519274] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
- Tue Oct 8 08:50:19 2019 kern.warn kernel: [44981.348494] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.477278] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:20 2019 kern.info kernel: [44981.478178] br0: port 3(vwire1) entered blocking state
- Tue Oct 8 08:50:20 2019 kern.info kernel: [44981.478207] br0: port 3(vwire1) entered forwarding state
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.607280] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.622986] wmi_unified_vdev_stop_send for vap 2 (849b0000)
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.623341] STOPPED EVENT for vap 2 (849b0000)
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.747385] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755427] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755487] ol_if_dfs_configure: called
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755499] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755512] ol_if_dfs_disable: called
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755859] ol_if_dfs_enable: called
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755885] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755900] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
- Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755945] cac_start chan 5500 timeout 62 sec, curr time: 44681 sec
- Tue Oct 8 08:50:20 2019 user.notice ortix: netconsole init failed, error 2
- Tue Oct 8 08:50:21 2019 kern.info kernel: [44982.746695] br0: port 6(vwire4) entered blocking state
- Tue Oct 8 08:50:21 2019 kern.info kernel: [44982.746724] br0: port 6(vwire4) entered forwarding state
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.747493] wmi_unified_vdev_stop_send for vap 0 (849b0000)
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.747664] STOPPED EVENT for vap 0 (849b0000)
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877274] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877614] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877636] ol_if_dfs_configure: called
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877648] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877660] ol_if_dfs_disable: called
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878050] ol_if_dfs_enable: called
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878100] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
- Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878127] cac_start chan 5500 timeout 62 sec, curr time: 44682 sec
- Tue Oct 8 08:50:22 2019 kern.info kernel: [44983.876567] br0: port 4(ath2) entered blocking state
- Tue Oct 8 08:50:22 2019 kern.info kernel: [44983.876602] br0: port 4(ath2) entered forwarding state
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44983.879702] wmi_unified_vdev_stop_send for vap 1 (849b0000)
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44983.880282] STOPPED EVENT for vap 1 (849b0000)
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007277] wlan_get_active_vport_chan: ch=0
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007636] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007660] ol_if_dfs_configure: called
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007672] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007684] ol_if_dfs_disable: called
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.008026] ol_if_dfs_enable: called
- Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.008079] cac_start chan 5500 timeout 62 sec, curr time: 44683 sec
- Tue Oct 8 08:50:23 2019 kern.info kernel: [44985.007966] br0: port 5(ath3) entered blocking state
- Tue Oct 8 08:50:23 2019 kern.info kernel: [44985.007999] br0: port 5(ath3) entered forwarding state
- Tue Oct 8 08:50:24 2019 user.notice syswrapper: ipready.br0 = 192.168.1.20
- Tue Oct 8 08:50:24 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 14390) exited with status 9. Scheduling for restart (no alert sent).
- Tue Oct 8 08:50:24 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
- Tue Oct 8 08:50:24 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.1.20
- Tue Oct 8 08:50:24 2019 user.err : wevent[14405]: ubnt_protocol.ubnt_multicast_socket_init(): already drop membership
- Tue Oct 8 08:50:25 2019 authpriv.info dropbear[14562]: Not backgrounding
- Tue Oct 8 08:50:26 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=37 (max=300)
- Tue Oct 8 08:50:26 2019 user.err : mcad[14563]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:50:26 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14563) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:50:29 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 14392) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:50:30 2019 daemon.warn lldpd[14571]: no privilege separation available
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol LLDP enabled and forced
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol CDPv1 disabled
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol CDPv2 disabled
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol SONMP disabled
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol EDP disabled
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol FDP disabled
- Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: libevent 2.0.22-stable initialized with epoll method
- Tue Oct 8 08:50:30 2019 daemon.info lldpcli[14572]: lldpd should resume operations
- Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa5.cfg iterface=vwire4 nas_ip=192.168.1.20res=
- Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa4.cfg iterface=ath3 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=vwire1 nas_ip=192.168.1.20res=
- Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.1.20 res=
- Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479385] eth0: link up (100Mbps/Full duplex)
- Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479436] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479572] br0: port 1(eth0) entered blocking state
- Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479603] br0: port 1(eth0) entered forwarding state
- Tue Oct 8 08:50:36 2019 user.err : mcad[14608]: mcad.mca_daemon_main(): Another instance is running, aborting...
- Tue Oct 8 08:50:36 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14608) exited with status 25600. Schedulingfor restart (alert sent).
- Tue Oct 8 08:50:43 2019 user.info : mca-ctrl[14521]: mca-client.service_json(): failed to contact mcad
- Tue Oct 8 08:50:43 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
- Tue Oct 8 08:50:43 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
- Tue Oct 8 08:50:43 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
- Tue Oct 8 08:50:43 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
- Tue Oct 8 08:50:46 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.checkin is -18 ago (max=200)
- Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload_config(): authkey=B542B8A70975764F1E71EAAEE14AD003
- Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
- Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
- Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.set_default_localtime(): time is ready
- Tue Oct 8 08:50:46 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
- Tue Oct 8 08:50:46 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
- Tue Oct 8 08:50:49 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 IEEE 802.11: disassociated
- Tue Oct 8 08:50:56 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=67 (max=300)
- Tue Oct 8 08:51:01 2019 daemon.info logread[14396]: Logread connected to 60.251.196.251:514
- Tue Oct 8 08:51:01 2019 user.notice syswrapper: ipready.br0 = 192.168.178.150
- Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 14562) exited with status 9. Scheduling for restart (no alert sent).
- Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/ntpclient' (pid 14389) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:51:02 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
- Tue Oct 8 08:51:02 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.178.150
- Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 14571) exited with status 0. Scheduling for restart (no alert sent).
- Tue Oct 8 08:51:02 2019 user.info : mcad[14609]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
- Tue Oct 8 08:51:02 2019 authpriv.info dropbear[14849]: Not backgrounding
- Tue Oct 8 08:51:02 2019 daemon.warn lldpd[14862]: no privilege separation available
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol LLDP enabled and forced
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol CDPv1 disabled
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol CDPv2 disabled
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol SONMP disabled
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol EDP disabled
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol FDP disabled
- Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: libevent 2.0.22-stable initialized with epoll method
- Tue Oct 8 08:51:02 2019 daemon.info lldpcli[14863]: lldpd should resume operations
- Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=vwire1 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa4.cfg iterface=ath3 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa5.cfg iterface=vwire4 nas_ip=192.168.178.150 res=
- Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.303095] console [netcon_ext0] disabled
- Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.303136] console [netcon0] disabled
- Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.313255] console [netcon0] enabled
- Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.313459] netconsole: network logging started
- Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116268] cac_timeout cac expired, chan 5500 curr time 44746
- Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116394] wmi_unified_vdev_up_send for vap 0 (849b0000)
- Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116469] wmi_unified_vdev_up_send for vap 1 (849b0000)
- Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116533] wmi_unified_vdev_up_send for vap 2 (849b0000)
- Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
- Tue Oct 8 08:53:50 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
- Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
- Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 08:53:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
- Tue Oct 8 08:54:00 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"70000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"10000","ip_assign_type":"roamed","event_id":"1","auth_ts":"45192.209004"}
- Tue Oct 8 08:54:00 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 0ED6F388262D3DAD
- Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 09:02:53 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 09:02:53 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501791] [wifi1] FWLOG: [46850936] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2cae385
- Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501869] [wifi1] FWLOG: [46850949] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434e04 )
- Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501909] [wifi1] FWLOG: [46850975] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 09:03:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 8CD163651E24F603
- Tue Oct 8 09:03:03 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1520000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"45735.143618"}
- Tue Oct 8 09:13:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1168600000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"70000","auth_delta":"0","event_type":"fixup","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"0.0"}
- Tue Oct 8 09:50:19 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: group key handshake completed (RSN)
- Tue Oct 8 09:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 09:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 09:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 09:50:28 2019 kern.warn kernel: [45737.502175] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [49773255] WAL_DBGID_SET_HW_FILTER ( 0x434e04 )
- Tue Oct 8 09:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 09:57:01 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 09:57:01 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754458] [wifi1] FWLOG: [50176785] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2fda31d
- Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754535] [wifi1] FWLOG: [50176797] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434eec )
- Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754576] [wifi1] FWLOG: [50176820] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x8000204
- Tue Oct 8 09:57:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 3445879784BF3334
- Tue Oct 8 09:57:11 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1920000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"48983.63917"}
- Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"87940e62-c3da-4513-8b8d-86073eb3e89c", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
- Tue Oct 8 10:00:42 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<dd2ac0a7e000e4edb9f5bd3bc110bb0e0c487fdb1d9e873f5b67156140b96464>
- Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" offer start creating
- Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" (1,1) offer sent, now waiting for answer
- Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 3873579965 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:zZi80JwLyZuR9q9c a=ice-pwd:85wEhhCRKIrNok3NipDYCQdx a=fingerprint:sha-256 85:6C:C1:AE:99:D9:F7:E9:86:0B:EC:91:77:7F:F6:36:85:2F:C1:4D:92:2A:7D:FA:55:06:57:04:C2:4B:F4:5F a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130701311 192.168.178.150 59108 typ host generation 0 ufrag zZi80JwLyZuR9q9c a=candidate:2317678234 1 udp 1694493695 213.46.59.215 59108 typ srflx raddr 192.168.178.150 rport 59108 generation 0 ufrag zZi80JwLyZuR9q9c ===
- Tue Oct 8 10:00:44 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" recving answer
- Tue Oct 8 10:00:44 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" answer parsed successfully, going to build up connection
- Tue Oct 8 10:00:44 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<87940e62-c3da-4513-8 a=candidate:854292265 1 udp 2113937151 5b1b47bd-c2d0-479a-af53-0eb9966bc893.local 59059 typ host generation 0 network-c a=candidate:2377513972 1 udp 2113932031 665615d0-2b65-446d-98c1-229de69a6e8a.local 59060 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 176.74.237.161 59059 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 9 a=candidate:2686458394 1 udp 33562367 18.195.48.247 59228 typ relay raddr 176.74.237.161 rport 59059 generation 0 netwo a=scd:datativesha-256 98:6B:CF:37:23:CD:8F:BE:85:18:43:31:DA:EC:CF:7D:BD:73:A4:47:A7:53:7F:5D:AC:65:63:F2:49:E4:6F:64
- Tue Oct 8 10:00:44 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>
- Tue Oct 8 10:01:31 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 10:01:31 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 10:01:31 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" clean up
- Tue Oct 8 10:01:31 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>
- Tue Oct 8 10:02:41 2019 user.info : mcad[14609]: ace_reporter.reporter_handle_response(): cfgversion: 9022292276f25a08-> 303581d4f7e1e192
- Tue Oct 8 10:02:45 2019 user.info : mcad[14609]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
- Tue Oct 8 10:02:50 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=5(max=300)
- Tue Oct 8 10:02:53 2019 user.notice syswrapper: [apply-config] using fast apply
- Tue Oct 8 10:02:53 2019 kern.warn kernel: [48985.754556] [wifi1] [wifi1]
- Tue Oct 8 10:02:53 2019 kern.warn kernel: [49334.581319] Enabling Channel and channel width Switch Announcement on current channel
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.639062] set channel freq 5640
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.639153] DCS previous state is restored
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647695] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647751] ol_if_dfs_configure: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647771] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647788] ol_if_dfs_disable: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648133] ol_if_dfs_enable: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648261] wmi_unified_vdev_up_send for vap 0 (849b0000)
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648324] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648347] ol_if_dfs_configure: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648364] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648380] ol_if_dfs_disable: called
- DirkACLR-BZ.v4.0.60#
- Device Dirk_ACLR: Connected
- BusyBox v1.25.1 () built-in shell (ash)
- ___ ___ .__________.__
- | | |____ |__\_ ____/__|
- | | / \| || __) | | (c) 2010-2019
- | | | | \ || \ | | Ubiquiti Networks, Inc.
- |______|___| /__||__/ |__|
- |_/ https://www.ui.com/
- Welcome to UniFi UAP-AC-LR!
- DirkACLR-BZ.v4.0.60# cat /var/log/messages
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648719] ol_if_dfs_enable: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648805] wmi_unified_vdev_up_send for vap 1 (849b0000)
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648870] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648893] ol_if_dfs_configure: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648909] ol_if_dfs_configure: ETSI domain
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648926] ol_if_dfs_disable: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.649256] ol_if_dfs_enable: called
- Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.649342] wmi_unified_vdev_up_send for vap 2 (849b0000)
- Tue Oct 8 10:03:10 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.checkin is 10 ago (max=200)
- Tue Oct 8 10:03:13 2019 user.info : mca-ctrl[15986]: mca-client.service_json(): failed to contact mcad
- Tue Oct 8 10:03:13 2019 user.info : mcad[14609]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
- Tue Oct 8 10:04:44 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: disassociated
- Tue Oct 8 10:04:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 28:c2:dd:e5:12:e5/ 1
- Tue Oct 8 10:04:44 2019 kern.warn kernel: [49335.782698] [wifi1]
- Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.237465] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.272375] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.298781] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 10:04:44 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
- Tue Oct 8 10:04:47 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
- Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
- Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 10:04:49 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
- Tue Oct 8 10:04:57 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 06DF8C7B3151C277
- Tue Oct 8 10:04:57 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"60000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"2","auth_ts":"49449.310489"}
- Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
- Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 10:07:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 10:07:51 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 10:07:51 2019 kern.warn kernel: [49632.806259] [wifi1] [wifi1] FWLOG: [50841929] WAL_DBGID_SET_HW_FILTER ( 0x434eec )
- Tue Oct 8 10:13:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"511490000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"60000","auth_delta":"0","event_type":"fixup","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"0.0"}
- Tue Oct 8 10:50:19 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: group key handshake completed (RSN)
- Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 10:51:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 10:51:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015137] [wifi1] FWLOG: [53504060] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3306846
- Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015216] [wifi1] FWLOG: [53504070] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434fd4 )
- Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015259] [wifi1] FWLOG: [53504101] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3306952
- Tue Oct 8 10:51:20 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D15B75A5035F2F91
- Tue Oct 8 10:51:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1720000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"52232.371122"}
- Tue Oct 8 11:31:15 2019 kern.warn kernel: [52233.015298] [wifi1] [wifi1] [wifi1]
- Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.345467] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 11:31:15 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: disassociated
- Tue Oct 8 11:31:15 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 28:c2:dd:e5:12:e5/ 1
- Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.384957] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.403771] ieee80211_ioctl_kickmac[15026]
- Tue Oct 8 11:31:16 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
- Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 11:45:19 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288550] [wifi1] [wifi1] FWLOG: [56830604] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3632a98
- Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288640] [wifi1] FWLOG: [56830616] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4350bc )
- Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288680] [wifi1] FWLOG: [56830639] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 11:45:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 556FF12FE51200F5
- Tue Oct 8 11:45:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"1940000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"55480.981535"}
- Tue Oct 8 11:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 11:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 11:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 11:50:27 2019 kern.warn kernel: [55483.288687] [wifi1] [wifi1] [wifi1]
- Tue Oct 8 11:50:27 2019 kern.warn kernel: [55789.311785] [wifi1] [wifi1] FWLOG: [57146004] WAL_DBGID_SET_HW_FILTER ( 0x4350bc )
- Tue Oct 8 11:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 12:39:28 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 12:39:28 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.559925] [wifi1] FWLOG: [60157516] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x395ee56
- Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.560005] [wifi1] FWLOG: [60157526] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4351a4 )
- Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.560047] [wifi1] FWLOG: [60157553] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x395ef00
- Tue Oct 8 12:39:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session F01D7ED03FC95269
- Tue Oct 8 12:39:38 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1380000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"58729.951678"}
- Tue Oct 8 12:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 12:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 12:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 12:50:28 2019 kern.warn kernel: [58730.560087] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [60832366] WAL_DBGID_SET_HW_FILTER ( 0x4351a4 )
- Tue Oct 8 12:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 13:33:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 13:33:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843372] [wifi1] FWLOG: [63483398] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3c8ae11
- Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843451] [wifi1] FWLOG: [63483409] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43528c )
- Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843492] [wifi1] [wifi1] FWLOG: [63483538] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 13:33:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 696653F28D4C1BBA
- Tue Oct 8 13:33:46 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1180000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"61977.923440"}
- Tue Oct 8 13:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 13:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 13:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 13:50:28 2019 kern.warn kernel: [61987.844504] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [64518726] WAL_DBGID_SET_HW_FILTER ( 0x43528c )
- Tue Oct 8 13:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
- Tue Oct 8 14:06:05 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
- Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
- Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:06:06 2019 kern.warn kernel: [63928.012677] [wifi1] FWLOG: [65479328] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e722ac
- Tue Oct 8 14:06:06 2019 kern.warn kernel: [63928.012757] [wifi1] FWLOG: [65479340] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435374 )
- Tue Oct 8 14:06:09 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
- Tue Oct 8 14:06:10 2019 kern.warn kernel: [63932.012967] [wifi1] FWLOG: [65483648] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 14:06:15 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
- Tue Oct 8 14:06:15 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"20000","dns_resp_seen":"yes","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"10000","ip_assign_type":"roamed","event_id":"1","auth_ts":"63927.96364"}
- Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
- Tue Oct 8 14:07:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
- Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
- Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:07:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
- Tue Oct 8 14:07:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
- Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018343] [wifi1] FWLOG: [65546057] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e82754
- Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018423] [wifi1] FWLOG: [65546068] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43545c )
- Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018465] [wifi1] FWLOG: [65546108] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 14:07:20 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
- Tue Oct 8 14:07:20 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"2","auth_ts":"63992.265111"}
- Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
- Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
- Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
- Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
- Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
- Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019156] [wifi1] FWLOG: [65557420] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e853b6
- Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019235] [wifi1] FWLOG: [65557430] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435544 )
- Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019275] [wifi1] FWLOG: [65557469] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 14:07:32 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
- Tue Oct 8 14:07:32 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"3","auth_ts":"64003.361574"}
- Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
- Tue Oct 8 14:08:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
- Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
- Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:08:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
- Tue Oct 8 14:08:58 2019 kern.warn kernel: [64100.027036] [wifi1] FWLOG: [65656166] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e9d570
- Tue Oct 8 14:08:58 2019 kern.warn kernel: [64100.027116] [wifi1] FWLOG: [65656176] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43562c )
- Tue Oct 8 14:09:08 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
- Tue Oct 8 14:09:08 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"4","auth_ts":"64099.794924"}
- Tue Oct 8 14:09:20 2019 kern.warn kernel: [64122.028869] [wifi1] FWLOG: [65678867] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e80401
- Tue Oct 8 14:09:31 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"4","message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","dns_resp_seen":"yes","event_type":"fixup","auth_ts":"0.0","assoc_status":"0"}
- Tue Oct 8 14:10:13 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
- Tue Oct 8 14:14:10 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=d0:c6:37:65:6b:c5 status_code=0
- Tue Oct 8 14:14:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: d0:c6:37:65:6b:c5 / 1
- Tue Oct 8 14:14:10 2019 daemon.info hostapd: ath0: STA d0:c6:37:65:6b:c5 IEEE 802.11: associated
- Tue Oct 8 14:14:14 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: d0:c6:37:65:6b:c5/ 1
- Tue Oct 8 14:14:19 2019 daemon.info hostapd: ath0: STA d0:c6:37:65:6b:c5 IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 14:14:20 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"d0:c6:37:65:6b:c5","vap":"ath0","event_type":"failure","auth_delta":"0","assoc_status":"0","wpa_auth_failures":"1","assoc_delta":"10000","event_id":"1","auth_ts":"64412.183336"}
- Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: sta_stats
- Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: disassociated
- Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: disassociated
- Tue Oct 8 14:15:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
- Tue Oct 8 14:15:37 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"4","message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 14:15:37 2019 kern.warn kernel: [64499.063128] [wifi1] FWLOG: [66064174] WAL_DBGID_SET_HW_FILTER ( 0x43562c )
- Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
- Tue Oct 8 14:18:26 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 / 1
- Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
- Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:18:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
- Tue Oct 8 14:18:36 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session 4E898792027F7241
- Tue Oct 8 14:18:36 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1170000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","wpa_auth_delta":"30000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"20000","auth_ts":"64667.437607"}
- Tue Oct 8 14:25:58 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
- Tue Oct 8 14:25:58 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
- Tue Oct 8 14:25:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1/ 1
- Tue Oct 8 14:25:58 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 14:27:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 14:27:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.124924] [wifi1] FWLOG: [66809273] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3fb6dc3
- Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.125004] [wifi1] FWLOG: [66809283] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435714 )
- Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.125045] [wifi1] FWLOG: [66809311] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 14:27:54 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 6DF86A4A01DF7787
- Tue Oct 8 14:27:54 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1420000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"65225.892080"}
- Tue Oct 8 14:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 14:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 14:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 14:50:27 2019 kern.warn kernel: [65228.125099] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [68205081] WAL_DBGID_SET_HW_FILTER ( 0x435714 )
- Tue Oct 8 14:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 15:21:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 15:21:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418658] [wifi1] FWLOG: [70135172] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x42e2d8e
- Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418735] [wifi1] FWLOG: [70135182] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4357fc )
- Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418776] [wifi1] FWLOG: [70135218] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x42e2e1e
- Tue Oct 8 15:22:02 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session F88081E9F9DD3F05
- Tue Oct 8 15:22:02 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1520000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"68473.881383"}
- Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
- Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 15:27:22 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 15:27:23 2019 kern.warn kernel: [68474.418821] [wifi1] [wifi1] [wifi1] FWLOG: [70473060] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x433556f
- Tue Oct 8 15:27:23 2019 kern.warn kernel: [68804.447043] [wifi1] FWLOG: [70473071] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4358e4 )
- Tue Oct 8 15:27:23 2019 kern.warn kernel: [68804.447084] [wifi1] [wifi1] FWLOG: [70473277] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 15:27:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 7547625C239A2D27
- Tue Oct 8 15:27:32 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"1720000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"68803.856193"}
- Tue Oct 8 15:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 15:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 15:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 15:50:28 2019 kern.warn kernel: [68805.447063] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [71891430] WAL_DBGID_SET_HW_FILTER ( 0x4358e4 )
- Tue Oct 8 15:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 16:21:29 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 16:21:29 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757455] [wifi1] FWLOG: [73797896] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4661112
- Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757536] [wifi1] FWLOG: [73797906] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4359cc )
- Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757577] [wifi1] FWLOG: [73797929] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x46611b5
- Tue Oct 8 16:21:39 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D32A3DFCB16E035E
- Tue Oct 8 16:21:39 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1180000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","dns_resp_seen":"yes","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"72050.827383"}
- Tue Oct 8 16:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 16:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 16:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 16:50:28 2019 kern.warn kernel: [72051.757616] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [75577761] WAL_DBGID_SET_HW_FILTER ( 0x4359cc )
- Tue Oct 8 16:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 16:53:41 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
- Tue Oct 8 16:53:41 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): inform failed #1 (last inform: 60 seconds ago), rc=11
- Tue Oct 8 16:54:26 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
- Tue Oct 8 16:54:26 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): inform failed #2 (last inform: 105 seconds ago), rc=11
- Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 17:15:38 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 17:15:38 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063590] [wifi1] FWLOG: [77124775] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x498d4b2
- Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063669] [wifi1] FWLOG: [77124786] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435ab4 )
- Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063711] [wifi1] FWLOG: [77124819] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x498d55f
- Tue Oct 8 17:15:48 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D387A3CED47543C9
- Tue Oct 8 17:15:48 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1830000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"75299.797488"}
- Tue Oct 8 17:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 17:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 17:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 17:50:27 2019 kern.warn kernel: [75300.063750] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [79264098] WAL_DBGID_SET_HW_FILTER ( 0x435ab4 )
- Tue Oct 8 17:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 18:09:46 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 18:09:46 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374001] [wifi1] FWLOG: [80450641] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4cb945a
- Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374079] [wifi1] FWLOG: [80450650] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435b9c )
- Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374121] [wifi1] FWLOG: [80450673] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4cb94ef
- Tue Oct 8 18:09:56 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 0963D13E9C93376C
- Tue Oct 8 18:09:56 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1930000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"78547.769115"}
- Tue Oct 8 18:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 18:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 18:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 18:50:28 2019 kern.warn kernel: [78548.374160] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [82950433] WAL_DBGID_SET_HW_FILTER ( 0x435b9c )
- Tue Oct 8 18:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 19:03:55 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 19:03:55 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684720] [wifi1] FWLOG: [83777522] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe57fc
- Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684800] [wifi1] FWLOG: [83777532] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435c84 )
- Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684841] [wifi1] FWLOG: [83777555] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe5902
- Tue Oct 8 19:04:05 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session E7675029453204C9
- Tue Oct 8 19:04:05 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1560000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"81796.740072"}
- Tue Oct 8 19:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 19:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 19:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 19:50:28 2019 kern.warn kernel: [81797.684880] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [86636766] WAL_DBGID_SET_HW_FILTER ( 0x435c84 )
- Tue Oct 8 19:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 19:58:03 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 19:58:03 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.979922] [wifi1] FWLOG: [87103378] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x531179e
- Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.980002] [wifi1] FWLOG: [87103390] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435d6c )
- Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.980043] [wifi1] FWLOG: [87103419] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe0401
- Tue Oct 8 19:58:13 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 1D764183BCB8FF57
- Tue Oct 8 19:58:13 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1290000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"85044.707506"}
- Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
- Tue Oct 8 20:18:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 / 1
- Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
- Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 20:18:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
- Tue Oct 8 20:19:01 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session F8935E4AEDCF3D93
- Tue Oct 8 20:19:01 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1160000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","wpa_auth_delta":"30000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"86292.664702"}
- Tue Oct 8 20:19:10 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
- Tue Oct 8 20:19:10 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
- Tue Oct 8 20:19:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1/ 1
- Tue Oct 8 20:19:10 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 20:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 20:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 20:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 20:50:27 2019 kern.warn kernel: [85047.980167] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [90323101] WAL_DBGID_SET_HW_FILTER ( 0x435d6c )
- Tue Oct 8 20:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 20:52:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 20:52:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274280] [wifi1] FWLOG: [90429244] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x563d748
- Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274357] [wifi1] FWLOG: [90429256] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435f3c )
- Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274398] [wifi1] [wifi1] FWLOG: [90429477] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
- Tue Oct 8 20:52:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 24087224E9139F44
- Tue Oct 8 20:52:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1870000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"88292.687005"}
- Tue Oct 8 21:26:26 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVT_AP_RadarDetected ath2: radar found on channel 128 (5640 MHz)
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [88302.275208] [wifi1] [wifi1] dfs_process_radarevent: FILTER 38 - MATCH FOUND.
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635082] dfs_process_radarevent: Radar found on channel 128 (5640 MHz)
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635190] ol_if_dfs_clist_update: called, cmd=1, nollist=84a60b00, nentries=2
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350]
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350] Changing to channel 40 (5200 MHz) chanStart 2
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350]
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.163622] set channel freq 5200
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.163709] DCS previous state is restored
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.171790] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.171942] wmi_unified_vdev_up_send for vap 0 (849b0000)
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172001] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172084] wmi_unified_vdev_up_send for vap 1 (849b0000)
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172207] ol_ath_vap_join: join operation is only for STA/IBSS mode
- Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172311] wmi_unified_vdev_up_send for vap 2 (849b0000)
- Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
- Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
- Tue Oct 8 21:27:21 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 21:27:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 21:27:22 2019 kern.warn kernel: [90403.463106] [wifi1] [wifi1] FWLOG: [92590301] WAL_DBGID_SET_HW_FILTER ( 0x435f3c )
- Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
- Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
- Tue Oct 8 21:46:23 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
- Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
- Tue Oct 8 21:46:23 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
- Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.564975] [wifi1] FWLOG: [93758945] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x596a5ed
- Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.565054] [wifi1] FWLOG: [93758957] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436024 )
- Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.565096] [wifi1] FWLOG: [93758981] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
- Tue Oct 8 21:46:33 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session C8EBFAD949E1265C
- Tue Oct 8 21:46:33 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1750000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"91544.414463"}
- Tue Oct 8 21:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
- Tue Oct 8 21:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
- Tue Oct 8 21:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
- Tue Oct 8 21:50:28 2019 kern.warn kernel: [91546.565137] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [94009430] WAL_DBGID_SET_HW_FILTER ( 0x436024 )
- Tue Oct 8 21:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
- Tue Oct 8 21:56:31 2019 kern.warn kernel: [92152.834857] ol_if_dfs_clist_update: called, cmd=1, nollist=855c8400, nentries=1
- Tue Oct 8 21:56:31 2019 kern.warn kernel: [92152.834955] ol_if_dfs_clist_update: called, cmd=1, nollist= (null), nentries=0
- Tue Oct 8 22:23:31 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"4b3114c4-bbe2-461f-ae74-01ebc159e392", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
- Tue Oct 8 22:23:31 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<ddf9d2cb0113ed6779fcff0ff0612407fc64e96778e0468160b19ad5681de6ac>
- Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" offer start creating
- Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" (1,1) offer sent, now waiting for answer
- Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 1788317579 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:dUVFofvcqC//1Iel a=ice-pwd:RlhoyIzX8jCl/S4ObH1iqDM8 a=fingerprint:sha-256 0D:DD:EE:CE:F4:32:B5:61:8C:C2:C5:12:DA:6E:39:EC:87:75:99:9A:DD:2B:FE:C6:27:E2:CF:89:8D:76:18:AE a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130698751 192.168.178.150 45532 typ host generation 0 ufrag dUVFofvcqC//1Iel a=candidate:2317678234 1 udp 1694491135 213.46.59.215 45532 typ srflx raddr 192.168.178.150 rport 45532 generation 0 ufrag dUVFofvcqC//1Iel ===
- Tue Oct 8 22:23:33 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" recving answer
- Tue Oct 8 22:23:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" answer parsed successfully, going to build up connection
- Tue Oct 8 22:23:33 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<4b3114c4-bbe2-461f-a a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 49181 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 49182 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 49181 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:1703355540 1 udp 33562367 18.195.48.240 37736 typ relay raddr 178.85.165.24 rport 49181 generation 0 networ a=sct:datativesha-256 2F:42:9C:18:67:5E:FF:27:11:68:4F:C1:C2:6B:F6:55:3A:50:D4:36:B0:3E:B7:42:DB:AA:D2:B9:F3:67:B1:A8
- Tue Oct 8 22:23:33 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>
- Tue Oct 8 22:25:25 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 22:25:25 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 22:25:25 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" clean up
- Tue Oct 8 22:25:25 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>
- Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"871fcd56-fa9a-4ac0-82dc-647af3d28d58", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
- Tue Oct 8 22:35:57 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<e41e5ecd0c132d6d298fa33c554287ec768282e4e9e845dbb80063c89ebdfc1c>
- Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" offer start creating
- Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" (1,1) offer sent, now waiting for answer
- Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 3945697865 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:hkbESkTzoCR+Kqsi a=ice-pwd:BKuO3W3tRQnFcJ2GYjib7pR8 a=fingerprint:sha-256 22:35:C6:B2:2F:53:98:32:B2:99:59:BE:D8:89:F2:D1:28:CD:5C:7F:71:68:FB:7A:D2:C3:9E:77:49:3A:F1:93 a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130701311 192.168.178.150 56907 typ host generation 0 ufrag hkbESkTzoCR+Kqsi a=candidate:2317678234 1 udp 1694493695 213.46.59.215 56907 typ srflx raddr 192.168.178.150 rport 56907 generation 0 ufrag hkbESkTzoCR+Kqsi ===
- Tue Oct 8 22:35:58 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" recving answer
- Tue Oct 8 22:35:58 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" answer parsed successfully, going to build up connection
- Tue Oct 8 22:35:58 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<871fcd56-fa9a-4ac0-8 a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 57107 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 57108 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 57107 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:2686458394 1 udp 33562367 18.195.48.247 40135 typ relay raddr 178.85.165.24 rport 57107 generation 0 networ a=sct:datativesha-256 44:32:97:71:EC:55:6B:79:EA:70:13:65:90:50:FF:47:0B:B2:87:0B:C5:33:58:EB:7F:6A:FD:D1:E0:65:60:47
- Tue Oct 8 22:35:58 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>
- Tue Oct 8 22:36:29 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 22:36:29 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
- Tue Oct 8 22:36:29 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" clean up
- Tue Oct 8 22:36:29 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>
- Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"71439708-7ace-4ae8-87f8-bf474cd89d80", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
- Tue Oct 8 22:36:33 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<71439708-7ace-4ae8-87f8-bf474cd89d80>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<4f11f5607ad5a82bc4d88f9927f141ec07b40012901f18d03c2d015461acc80a>
- Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" offer start creating
- Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" (1,1) offer sent, now waiting for answer
- Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 43072400 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:y+ar8+dkBOIfxvUn a=ice-pwd:YlI1s8xwkz8CAPWQeRliF1/B a=fingerprint:sha-256 C2:C2:0A:42:0C:70:7E:B4:22:7F:45:94:D6:FE:72:07:59:92:E2:6B:5C:91:2F:5D:25:2E:22:AC:77:9F:09:4A a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130698751 192.168.178.150 46875 typ host generation 0 ufrag y+ar8+dkBOIfxvUn a=candidate:2317678234 1 udp 1694491135 213.46.59.215 46875 typ srflx raddr 192.168.178.150 rport 46875 generation 0 ufrag y+ar8+dkBOIfxvUn ===
- Tue Oct 8 22:36:34 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" recving answer
- Tue Oct 8 22:36:34 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" answer parsed successfully, going to build up connection
- Tue Oct 8 22:36:34 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<71439708-7ace-4ae8-8 a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 55003 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 55004 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 55003 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:2686458394 1 udp 33562367 18.195.48.247 48860 typ relay raddr 178.85.165.24 rport 55003 generation 0 networ a=sctpdatativesha-256 20:BA:A3:70:89:AC:52:18:04:B1:03:73:96:DF:F8:06:26:A4:11:AE:0A:8C:D0:26:74:E8:D8:F8:CF:A4:4B:14
- Tue Oct 8 22:36:34 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<71439708-7ace-4ae8-87f8-bf474cd89d80>
- DirkACLR-BZ.v4.0.60#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement