Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Feb 19 07:04:00 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 07:04:00 openvpn[22741]: VERIFY KU OK
- Feb 19 07:04:00 openvpn[22741]: Validating certificate extended key usage
- Feb 19 07:04:00 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 07:04:00 openvpn[22741]: VERIFY EKU OK
- Feb 19 07:04:00 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 07:04:01 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 07:04:01 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 07:04:01 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 07:04:01 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 07:04:01 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 08:04:00 openvpn[22741]: TLS: tls_process: killed expiring key
- Feb 19 08:04:00 openvpn[22741]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 08:04:00 openvpn[22741]: Validating certificate key usage
- Feb 19 08:04:00 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 08:04:00 openvpn[22741]: VERIFY KU OK
- Feb 19 08:04:00 openvpn[22741]: Validating certificate extended key usage
- Feb 19 08:04:00 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 08:04:00 openvpn[22741]: VERIFY EKU OK
- Feb 19 08:04:00 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 08:04:01 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 08:04:01 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 08:04:01 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 08:04:01 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 08:04:01 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 09:04:00 openvpn[22741]: TLS: tls_process: killed expiring key
- Feb 19 09:04:01 openvpn[22741]: TLS: soft reset sec=0 bytes=44048493/0 pkts=75114/0
- Feb 19 09:04:01 openvpn[22741]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 09:04:01 openvpn[22741]: Validating certificate key usage
- Feb 19 09:04:01 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 09:04:01 openvpn[22741]: VERIFY KU OK
- Feb 19 09:04:01 openvpn[22741]: Validating certificate extended key usage
- Feb 19 09:04:01 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 09:04:01 openvpn[22741]: VERIFY EKU OK
- Feb 19 09:04:01 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 09:04:02 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 09:04:02 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 09:04:02 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 09:04:02 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 09:04:02 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 09:57:21 ntp: start NTP update
- Feb 19 10:04:01 openvpn[22741]: TLS: tls_process: killed expiring key
- Feb 19 10:04:02 openvpn[22741]: TLS: soft reset sec=0 bytes=3330251/0 pkts=21641/0
- Feb 19 10:04:02 openvpn[22741]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 10:04:02 openvpn[22741]: Validating certificate key usage
- Feb 19 10:04:02 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 10:04:02 openvpn[22741]: VERIFY KU OK
- Feb 19 10:04:02 openvpn[22741]: Validating certificate extended key usage
- Feb 19 10:04:02 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 10:04:02 openvpn[22741]: VERIFY EKU OK
- Feb 19 10:04:02 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 10:04:03 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 10:04:03 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 10:04:03 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 10:04:03 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 10:04:03 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 11:04:02 openvpn[22741]: TLS: tls_process: killed expiring key
- Feb 19 11:04:02 openvpn[22741]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 11:04:02 openvpn[22741]: Validating certificate key usage
- Feb 19 11:04:02 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 11:04:02 openvpn[22741]: VERIFY KU OK
- Feb 19 11:04:02 openvpn[22741]: Validating certificate extended key usage
- Feb 19 11:04:02 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 11:04:02 openvpn[22741]: VERIFY EKU OK
- Feb 19 11:04:02 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 11:04:03 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 11:04:03 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 11:04:03 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 11:04:03 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 11:04:03 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 12:04:02 openvpn[22741]: TLS: tls_process: killed expiring key
- Feb 19 12:04:03 openvpn[22741]: TLS: soft reset sec=0 bytes=446736616/0 pkts=478642/0
- Feb 19 12:04:03 openvpn[22741]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 12:04:03 openvpn[22741]: Validating certificate key usage
- Feb 19 12:04:03 openvpn[22741]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 12:04:03 openvpn[22741]: VERIFY KU OK
- Feb 19 12:04:03 openvpn[22741]: Validating certificate extended key usage
- Feb 19 12:04:03 openvpn[22741]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 12:04:03 openvpn[22741]: VERIFY EKU OK
- Feb 19 12:04:03 openvpn[22741]: VERIFY OK: depth=0, CN=server
- Feb 19 12:04:04 openvpn[22741]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 12:04:04 openvpn[22741]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:04:04 openvpn[22741]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 12:04:04 openvpn[22741]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:04:04 openvpn[22741]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 12:11:36 rc_service: httpd 443:notify_rc restart_vpncall
- Feb 19 12:11:37 openvpn[22741]: event_wait : Interrupted system call (code=4)
- Feb 19 12:11:37 openvpn[22741]: /sbin/route del -net 192.152.0.165 netmask 255.255.255.255
- Feb 19 12:11:37 openvpn[22741]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Feb 19 12:11:37 openvpn[22741]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Feb 19 12:11:37 openvpn[22741]: Closing TUN/TAP interface
- Feb 19 12:11:37 openvpn[22741]: /sbin/ifconfig tun15 0.0.0.0
- Feb 19 12:11:37 openvpn[22741]: SIGTERM[hard,] received, process exiting
- Feb 19 12:13:17 rc_service: httpd 443:notify_rc restart_vpncall
- Feb 19 12:13:19 openvpn[28044]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Feb 19 12:13:19 openvpn[28044]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
- Feb 19 12:13:19 openvpn[28044]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:13:19 openvpn[28044]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:13:19 openvpn[28044]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 19 12:13:19 openvpn[28049]: UDPv4 link local: [undef]
- Feb 19 12:13:19 openvpn[28049]: UDPv4 link remote: [AF_INET]192.152.0.165:1194
- Feb 19 12:13:20 openvpn[28049]: TLS: Initial packet from [AF_INET]192.152.0.165:1194, sid=586cdf6d cd7eb6ab
- Feb 19 12:13:20 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 12:13:20 openvpn[28049]: Validating certificate key usage
- Feb 19 12:13:20 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 12:13:20 openvpn[28049]: VERIFY KU OK
- Feb 19 12:13:20 openvpn[28049]: Validating certificate extended key usage
- Feb 19 12:13:20 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 12:13:20 openvpn[28049]: VERIFY EKU OK
- Feb 19 12:13:20 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 12:13:21 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 12:13:21 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:13:21 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 12:13:21 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 12:13:21 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 12:13:21 openvpn[28049]: [server] Peer Connection Initiated with [AF_INET]192.152.0.165:1194
- Feb 19 12:13:24 openvpn[28049]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Feb 19 12:13:24 openvpn[28049]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0'
- Feb 19 12:13:24 openvpn[28049]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 19 12:13:24 openvpn[28049]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 19 12:13:24 openvpn[28049]: OPTIONS IMPORT: route options modified
- Feb 19 12:13:24 openvpn[28049]: OPTIONS IMPORT: route-related options modified
- Feb 19 12:13:24 openvpn[28049]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 19 12:13:24 openvpn[28049]: TUN/TAP device tun15 opened
- Feb 19 12:13:24 openvpn[28049]: TUN/TAP TX queue length set to 100
- Feb 19 12:13:24 openvpn[28049]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 19 12:13:24 openvpn[28049]: /sbin/ifconfig tun15 10.8.0.2 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
- Feb 19 12:13:24 openvpn[28049]: /sbin/route add -net 192.152.0.165 netmask 255.255.255.255 gw 172.16.19.146
- Feb 19 12:13:24 openvpn[28049]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
- Feb 19 12:13:24 openvpn[28049]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
- Feb 19 12:13:24 openvpn[28049]: Initialization Sequence Completed
- Feb 19 13:13:21 openvpn[28049]: TLS: soft reset sec=0 bytes=842836369/0 pkts=889355/0
- Feb 19 13:13:21 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 13:13:21 openvpn[28049]: Validating certificate key usage
- Feb 19 13:13:21 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 13:13:21 openvpn[28049]: VERIFY KU OK
- Feb 19 13:13:21 openvpn[28049]: Validating certificate extended key usage
- Feb 19 13:13:21 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 13:13:21 openvpn[28049]: VERIFY EKU OK
- Feb 19 13:13:21 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 13:13:22 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 13:13:22 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 13:13:22 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 13:13:22 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 13:13:22 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 14:13:21 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 14:13:21 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 14:13:21 openvpn[28049]: Validating certificate key usage
- Feb 19 14:13:21 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 14:13:21 openvpn[28049]: VERIFY KU OK
- Feb 19 14:13:21 openvpn[28049]: Validating certificate extended key usage
- Feb 19 14:13:21 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 14:13:21 openvpn[28049]: VERIFY EKU OK
- Feb 19 14:13:21 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 14:13:22 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 14:13:22 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 14:13:22 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 14:13:22 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 14:13:22 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 14:16:43 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 14:16:43 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 14:16:43 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 14:16:43 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 14:16:43 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 15:13:21 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 15:13:22 openvpn[28049]: TLS: soft reset sec=0 bytes=11610141/0 pkts=37824/0
- Feb 19 15:13:22 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 15:13:22 openvpn[28049]: Validating certificate key usage
- Feb 19 15:13:22 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 15:13:22 openvpn[28049]: VERIFY KU OK
- Feb 19 15:13:22 openvpn[28049]: Validating certificate extended key usage
- Feb 19 15:13:22 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 15:13:22 openvpn[28049]: VERIFY EKU OK
- Feb 19 15:13:22 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 15:13:23 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 15:13:23 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 15:13:23 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 15:13:23 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 15:13:23 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 15:31:49 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 15:31:49 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 15:31:49 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 16:13:22 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 16:13:24 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 16:13:24 openvpn[28049]: Validating certificate key usage
- Feb 19 16:13:24 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 16:13:24 openvpn[28049]: VERIFY KU OK
- Feb 19 16:13:24 openvpn[28049]: Validating certificate extended key usage
- Feb 19 16:13:24 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 16:13:24 openvpn[28049]: VERIFY EKU OK
- Feb 19 16:13:24 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 16:13:25 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 16:13:25 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 16:13:25 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 16:13:25 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 16:13:25 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 16:38:13 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 16:38:13 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 16:38:13 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 16:38:13 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 17:13:23 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 17:13:25 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 17:13:25 openvpn[28049]: Validating certificate key usage
- Feb 19 17:13:25 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 17:13:25 openvpn[28049]: VERIFY KU OK
- Feb 19 17:13:25 openvpn[28049]: Validating certificate extended key usage
- Feb 19 17:13:25 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 17:13:25 openvpn[28049]: VERIFY EKU OK
- Feb 19 17:13:25 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 17:13:26 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 17:13:26 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 17:13:26 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 17:13:26 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 17:13:26 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 18:13:24 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 18:13:25 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 18:13:25 openvpn[28049]: Validating certificate key usage
- Feb 19 18:13:25 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 18:13:25 openvpn[28049]: VERIFY KU OK
- Feb 19 18:13:25 openvpn[28049]: Validating certificate extended key usage
- Feb 19 18:13:25 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 18:13:25 openvpn[28049]: VERIFY EKU OK
- Feb 19 18:13:25 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 18:13:26 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 18:13:26 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 18:13:26 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 18:13:26 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 18:13:26 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 19:13:25 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 19:13:26 openvpn[28049]: TLS: soft reset sec=0 bytes=1042604253/0 pkts=1101082/0
- Feb 19 19:13:26 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 19:13:26 openvpn[28049]: Validating certificate key usage
- Feb 19 19:13:26 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 19:13:26 openvpn[28049]: VERIFY KU OK
- Feb 19 19:13:26 openvpn[28049]: Validating certificate extended key usage
- Feb 19 19:13:26 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 19:13:26 openvpn[28049]: VERIFY EKU OK
- Feb 19 19:13:26 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 19:13:27 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 19:13:27 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 19:13:27 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 19:13:27 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 19:13:27 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 20:13:26 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 20:13:27 openvpn[28049]: TLS: soft reset sec=0 bytes=1217048785/0 pkts=1271674/0
- Feb 19 20:13:27 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 20:13:27 openvpn[28049]: Validating certificate key usage
- Feb 19 20:13:27 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 20:13:27 openvpn[28049]: VERIFY KU OK
- Feb 19 20:13:27 openvpn[28049]: Validating certificate extended key usage
- Feb 19 20:13:27 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 20:13:27 openvpn[28049]: VERIFY EKU OK
- Feb 19 20:13:27 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 20:13:28 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 20:13:28 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 20:13:28 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 20:13:28 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 20:13:28 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 21:13:27 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 21:13:28 openvpn[28049]: TLS: soft reset sec=0 bytes=1029503634/0 pkts=1049262/0
- Feb 19 21:13:28 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 21:13:28 openvpn[28049]: Validating certificate key usage
- Feb 19 21:13:28 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 21:13:28 openvpn[28049]: VERIFY KU OK
- Feb 19 21:13:28 openvpn[28049]: Validating certificate extended key usage
- Feb 19 21:13:28 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 21:13:28 openvpn[28049]: VERIFY EKU OK
- Feb 19 21:13:28 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 21:13:29 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 21:13:29 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 21:13:29 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 21:13:29 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 21:13:29 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 21:57:19 ntp: start NTP update
- Feb 19 22:13:28 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 22:13:29 openvpn[28049]: TLS: soft reset sec=0 bytes=8395090/0 pkts=32410/0
- Feb 19 22:13:29 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 22:13:29 openvpn[28049]: Validating certificate key usage
- Feb 19 22:13:29 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 22:13:29 openvpn[28049]: VERIFY KU OK
- Feb 19 22:13:29 openvpn[28049]: Validating certificate extended key usage
- Feb 19 22:13:29 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 22:13:29 openvpn[28049]: VERIFY EKU OK
- Feb 19 22:13:29 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 22:13:30 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 22:13:30 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 22:13:30 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 22:13:30 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 22:13:30 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 19 23:05:15 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 23:05:20 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 23:05:20 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 23:05:20 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 23:05:20 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 19 23:13:29 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 19 23:13:30 openvpn[28049]: TLS: soft reset sec=0 bytes=12967045/0 pkts=39730/0
- Feb 19 23:13:30 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 19 23:13:30 openvpn[28049]: Validating certificate key usage
- Feb 19 23:13:30 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 19 23:13:30 openvpn[28049]: VERIFY KU OK
- Feb 19 23:13:30 openvpn[28049]: Validating certificate extended key usage
- Feb 19 23:13:30 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 19 23:13:30 openvpn[28049]: VERIFY EKU OK
- Feb 19 23:13:30 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 19 23:13:31 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 23:13:31 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 23:13:31 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 19 23:13:31 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 19 23:13:31 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 00:13:30 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 00:13:31 openvpn[28049]: TLS: soft reset sec=0 bytes=5929305/0 pkts=28901/0
- Feb 20 00:13:31 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 00:13:31 openvpn[28049]: Validating certificate key usage
- Feb 20 00:13:31 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 00:13:31 openvpn[28049]: VERIFY KU OK
- Feb 20 00:13:31 openvpn[28049]: Validating certificate extended key usage
- Feb 20 00:13:31 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 00:13:31 openvpn[28049]: VERIFY EKU OK
- Feb 20 00:13:31 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 00:13:32 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 00:13:32 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 00:13:32 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 00:13:32 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 00:13:32 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 01:13:31 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 01:13:32 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 01:13:32 openvpn[28049]: Validating certificate key usage
- Feb 20 01:13:32 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 01:13:32 openvpn[28049]: VERIFY KU OK
- Feb 20 01:13:32 openvpn[28049]: Validating certificate extended key usage
- Feb 20 01:13:32 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 01:13:32 openvpn[28049]: VERIFY EKU OK
- Feb 20 01:13:32 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 01:13:33 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 01:13:33 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 01:13:33 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 01:13:33 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 01:13:33 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 02:13:32 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 02:13:32 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 02:13:32 openvpn[28049]: Validating certificate key usage
- Feb 20 02:13:32 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 02:13:32 openvpn[28049]: VERIFY KU OK
- Feb 20 02:13:32 openvpn[28049]: Validating certificate extended key usage
- Feb 20 02:13:32 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 02:13:32 openvpn[28049]: VERIFY EKU OK
- Feb 20 02:13:32 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 02:13:33 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 02:13:33 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 02:13:33 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 02:13:33 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 02:13:33 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 03:13:32 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 03:13:33 openvpn[28049]: TLS: soft reset sec=0 bytes=3253796/0 pkts=22158/0
- Feb 20 03:13:33 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 03:13:33 openvpn[28049]: Validating certificate key usage
- Feb 20 03:13:33 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 03:13:33 openvpn[28049]: VERIFY KU OK
- Feb 20 03:13:33 openvpn[28049]: Validating certificate extended key usage
- Feb 20 03:13:33 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 03:13:33 openvpn[28049]: VERIFY EKU OK
- Feb 20 03:13:33 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 03:13:34 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 03:13:34 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 03:13:34 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 03:13:34 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 03:13:34 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 04:13:33 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 04:13:33 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 04:13:33 openvpn[28049]: Validating certificate key usage
- Feb 20 04:13:33 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 04:13:33 openvpn[28049]: VERIFY KU OK
- Feb 20 04:13:33 openvpn[28049]: Validating certificate extended key usage
- Feb 20 04:13:33 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 04:13:33 openvpn[28049]: VERIFY EKU OK
- Feb 20 04:13:33 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 04:13:34 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 04:13:34 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 04:13:34 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 04:13:34 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 04:13:34 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 05:13:33 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 05:13:34 openvpn[28049]: TLS: soft reset sec=0 bytes=2587807/0 pkts=17732/0
- Feb 20 05:13:34 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 05:13:34 openvpn[28049]: Validating certificate key usage
- Feb 20 05:13:34 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 05:13:34 openvpn[28049]: VERIFY KU OK
- Feb 20 05:13:34 openvpn[28049]: Validating certificate extended key usage
- Feb 20 05:13:34 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 05:13:34 openvpn[28049]: VERIFY EKU OK
- Feb 20 05:13:34 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 05:13:35 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 05:13:35 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 05:13:35 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 05:13:35 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 05:13:35 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 06:13:34 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 06:13:35 openvpn[28049]: TLS: soft reset sec=0 bytes=2829252/0 pkts=17838/0
- Feb 20 06:13:35 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 06:13:35 openvpn[28049]: Validating certificate key usage
- Feb 20 06:13:35 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 06:13:35 openvpn[28049]: VERIFY KU OK
- Feb 20 06:13:35 openvpn[28049]: Validating certificate extended key usage
- Feb 20 06:13:35 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 06:13:35 openvpn[28049]: VERIFY EKU OK
- Feb 20 06:13:35 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 06:13:36 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 06:13:36 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 06:13:36 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 06:13:36 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 06:13:36 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 07:13:35 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 07:13:36 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 07:13:36 openvpn[28049]: Validating certificate key usage
- Feb 20 07:13:36 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 07:13:36 openvpn[28049]: VERIFY KU OK
- Feb 20 07:13:36 openvpn[28049]: Validating certificate extended key usage
- Feb 20 07:13:36 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 07:13:36 openvpn[28049]: VERIFY EKU OK
- Feb 20 07:13:36 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 07:13:37 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 07:13:37 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 07:13:37 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 07:13:37 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 07:13:37 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 08:13:36 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 08:13:37 openvpn[28049]: TLS: soft reset sec=0 bytes=5548603/0 pkts=23279/0
- Feb 20 08:13:37 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 08:13:37 openvpn[28049]: Validating certificate key usage
- Feb 20 08:13:37 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 08:13:37 openvpn[28049]: VERIFY KU OK
- Feb 20 08:13:37 openvpn[28049]: Validating certificate extended key usage
- Feb 20 08:13:37 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 08:13:37 openvpn[28049]: VERIFY EKU OK
- Feb 20 08:13:37 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 08:13:38 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 08:13:38 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 08:13:38 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 08:13:38 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 08:13:38 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 09:13:37 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 09:13:38 openvpn[28049]: TLS: soft reset sec=0 bytes=2847790/0 pkts=17930/0
- Feb 20 09:13:38 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 09:13:38 openvpn[28049]: Validating certificate key usage
- Feb 20 09:13:38 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 09:13:38 openvpn[28049]: VERIFY KU OK
- Feb 20 09:13:38 openvpn[28049]: Validating certificate extended key usage
- Feb 20 09:13:38 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 09:13:38 openvpn[28049]: VERIFY EKU OK
- Feb 20 09:13:38 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 09:13:39 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 09:13:39 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 09:13:39 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 09:13:39 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 09:13:39 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 09:57:16 ntp: start NTP update
- Feb 20 10:13:38 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 10:13:39 openvpn[28049]: TLS: soft reset sec=0 bytes=5279275/0 pkts=22521/0
- Feb 20 10:13:40 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 10:13:40 openvpn[28049]: Validating certificate key usage
- Feb 20 10:13:40 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 10:13:40 openvpn[28049]: VERIFY KU OK
- Feb 20 10:13:40 openvpn[28049]: Validating certificate extended key usage
- Feb 20 10:13:40 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 10:13:40 openvpn[28049]: VERIFY EKU OK
- Feb 20 10:13:40 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 10:13:40 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 10:13:40 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 10:13:40 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 10:13:40 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 10:13:40 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 11:13:39 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 11:13:40 openvpn[28049]: TLS: soft reset sec=0 bytes=3400768/0 pkts=19494/0
- Feb 20 11:13:40 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 11:13:40 openvpn[28049]: Validating certificate key usage
- Feb 20 11:13:40 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 11:13:40 openvpn[28049]: VERIFY KU OK
- Feb 20 11:13:40 openvpn[28049]: Validating certificate extended key usage
- Feb 20 11:13:40 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 11:13:40 openvpn[28049]: VERIFY EKU OK
- Feb 20 11:13:40 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 11:13:41 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 11:13:41 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 11:13:41 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 11:13:41 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 11:13:41 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 12:13:40 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 12:13:40 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 12:13:40 openvpn[28049]: Validating certificate key usage
- Feb 20 12:13:40 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 12:13:40 openvpn[28049]: VERIFY KU OK
- Feb 20 12:13:40 openvpn[28049]: Validating certificate extended key usage
- Feb 20 12:13:40 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 12:13:40 openvpn[28049]: VERIFY EKU OK
- Feb 20 12:13:40 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 12:13:41 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 12:13:41 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 12:13:41 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 12:13:41 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 12:13:41 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 13:13:40 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 13:13:41 openvpn[28049]: TLS: soft reset sec=0 bytes=4478715/0 pkts=24471/0
- Feb 20 13:13:41 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 13:13:41 openvpn[28049]: Validating certificate key usage
- Feb 20 13:13:41 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 13:13:41 openvpn[28049]: VERIFY KU OK
- Feb 20 13:13:41 openvpn[28049]: Validating certificate extended key usage
- Feb 20 13:13:41 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 13:13:41 openvpn[28049]: VERIFY EKU OK
- Feb 20 13:13:41 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 13:13:42 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 13:13:42 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 13:13:42 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 13:13:42 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 13:13:42 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 14:13:41 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 14:13:42 openvpn[28049]: TLS: soft reset sec=0 bytes=16826632/0 pkts=43728/0
- Feb 20 14:13:42 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 14:13:42 openvpn[28049]: Validating certificate key usage
- Feb 20 14:13:42 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 14:13:42 openvpn[28049]: VERIFY KU OK
- Feb 20 14:13:42 openvpn[28049]: Validating certificate extended key usage
- Feb 20 14:13:42 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 14:13:42 openvpn[28049]: VERIFY EKU OK
- Feb 20 14:13:42 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 14:13:43 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 14:13:43 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 14:13:43 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 14:13:43 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 14:13:43 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 15:13:42 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 15:13:42 openvpn[28049]: Validating certificate key usage
- Feb 20 15:13:42 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 15:13:42 openvpn[28049]: VERIFY KU OK
- Feb 20 15:13:42 openvpn[28049]: Validating certificate extended key usage
- Feb 20 15:13:42 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 15:13:42 openvpn[28049]: VERIFY EKU OK
- Feb 20 15:13:42 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 15:13:43 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 15:13:43 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 15:13:43 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 15:13:43 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 15:13:43 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 16:13:42 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 16:13:43 openvpn[28049]: TLS: soft reset sec=0 bytes=6569159/0 pkts=26900/0
- Feb 20 16:13:43 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 16:13:43 openvpn[28049]: Validating certificate key usage
- Feb 20 16:13:43 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 16:13:43 openvpn[28049]: VERIFY KU OK
- Feb 20 16:13:43 openvpn[28049]: Validating certificate extended key usage
- Feb 20 16:13:43 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 16:13:43 openvpn[28049]: VERIFY EKU OK
- Feb 20 16:13:43 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 16:13:44 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 16:13:44 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 16:13:44 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 16:13:44 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 16:13:44 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 17:13:43 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 17:13:44 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 17:13:44 openvpn[28049]: Validating certificate key usage
- Feb 20 17:13:44 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 17:13:44 openvpn[28049]: VERIFY KU OK
- Feb 20 17:13:44 openvpn[28049]: Validating certificate extended key usage
- Feb 20 17:13:44 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 17:13:44 openvpn[28049]: VERIFY EKU OK
- Feb 20 17:13:44 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 17:13:45 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 17:13:45 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 17:13:45 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 17:13:45 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 17:13:45 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 18:13:43 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 18:13:44 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 18:13:44 openvpn[28049]: Validating certificate key usage
- Feb 20 18:13:44 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 18:13:44 openvpn[28049]: VERIFY KU OK
- Feb 20 18:13:44 openvpn[28049]: Validating certificate extended key usage
- Feb 20 18:13:44 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 18:13:44 openvpn[28049]: VERIFY EKU OK
- Feb 20 18:13:44 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 18:13:45 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 18:13:45 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 18:13:45 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 18:13:45 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 18:13:45 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 19:13:44 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 19:13:45 openvpn[28049]: TLS: soft reset sec=0 bytes=85570486/0 pkts=228111/0
- Feb 20 19:13:45 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 19:13:45 openvpn[28049]: Validating certificate key usage
- Feb 20 19:13:45 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 19:13:45 openvpn[28049]: VERIFY KU OK
- Feb 20 19:13:45 openvpn[28049]: Validating certificate extended key usage
- Feb 20 19:13:45 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 19:13:45 openvpn[28049]: VERIFY EKU OK
- Feb 20 19:13:45 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 19:13:46 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 19:13:46 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 19:13:46 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 19:13:46 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 19:13:46 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 20:13:45 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 20:13:46 openvpn[28049]: TLS: soft reset sec=0 bytes=521155360/0 pkts=622667/0
- Feb 20 20:13:46 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 20:13:46 openvpn[28049]: Validating certificate key usage
- Feb 20 20:13:46 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 20:13:46 openvpn[28049]: VERIFY KU OK
- Feb 20 20:13:46 openvpn[28049]: Validating certificate extended key usage
- Feb 20 20:13:46 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 20:13:46 openvpn[28049]: VERIFY EKU OK
- Feb 20 20:13:46 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 20:13:51 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 20:13:51 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 20:13:51 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 20:13:51 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 20:13:51 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 21:13:46 openvpn[28049]: TLS: tls_process: killed expiring key
- Feb 20 21:13:51 openvpn[28049]: TLS: soft reset sec=0 bytes=1453986542/0 pkts=1537682/0
- Feb 20 21:13:51 openvpn[28049]: VERIFY OK: depth=1, CN=ChangeMe
- Feb 20 21:13:51 openvpn[28049]: Validating certificate key usage
- Feb 20 21:13:51 openvpn[28049]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 20 21:13:51 openvpn[28049]: VERIFY KU OK
- Feb 20 21:13:51 openvpn[28049]: Validating certificate extended key usage
- Feb 20 21:13:51 openvpn[28049]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 20 21:13:51 openvpn[28049]: VERIFY EKU OK
- Feb 20 21:13:51 openvpn[28049]: VERIFY OK: depth=0, CN=server
- Feb 20 21:13:52 openvpn[28049]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 21:13:52 openvpn[28049]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 21:13:52 openvpn[28049]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 20 21:13:52 openvpn[28049]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 20 21:13:52 openvpn[28049]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 20 21:57:14 ntp: start NTP update
- Feb 20 22:10:09 rc_service: httpd 443:notify_rc restart_vpncall
- Feb 20 22:10:10 openvpn[28049]: event_wait : Interrupted system call (code=4)
- Feb 20 22:10:10 openvpn[28049]: /sbin/route del -net 192.152.0.165 netmask 255.255.255.255
- Feb 20 22:10:10 openvpn[28049]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Feb 20 22:10:10 openvpn[28049]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Feb 20 22:10:10 openvpn[28049]: Closing TUN/TAP interface
- Feb 20 22:10:10 openvpn[28049]: /sbin/ifconfig tun15 0.0.0.0
- Feb 20 22:10:10 openvpn[28049]: SIGTERM[hard,] received, process exiting
- Feb 20 22:30:04 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 20 22:30:04 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 20 22:30:04 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 20 22:30:04 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 20 22:30:04 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 21 09:57:12 ntp: start NTP update
- Feb 21 16:42:39 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 21 16:42:42 miniupnpd[860]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 21 21:57:10 ntp: start NTP update
- Feb 22 09:57:10 ntp: start NTP update
- Feb 22 19:11:23 rc_service: httpd 443:notify_rc reboot
- Feb 22 19:11:24 pppd[491]: Connection terminated.
- Feb 22 19:11:25 iTunes: daemon is stoped
- Feb 22 19:11:25 FTP Server: daemon is stoped
- Feb 22 19:11:25 Samba Server: smb daemon is stoped
- Feb 22 19:11:25 kernel: gro disabled
- Feb 22 19:11:25 Timemachine: daemon is stoped
- Feb 22 19:11:25 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:15 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:15 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:25 jffs2: valid logs(1)
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:26 miniupnpd[487]: version 1.9 started
- Aug 1 00:00:26 miniupnpd[487]: HTTP listening on port 50137
- Aug 1 00:00:26 miniupnpd[487]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:26 syslog: Generating SSL certificate...
- Aug 1 00:00:26 pppd[496]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:26 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:26 pppd[496]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[496]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:27 pppd[496]: local IP address 159.180.116.131
- Aug 1 00:00:27 pppd[496]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 508:notify_rc start_firewall
- Aug 1 00:00:27 wan: finish adding multi routes
- Aug 1 00:00:27 rc_service: ip-up 508:notify_rc stop_upnp
- Aug 1 00:00:27 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:28 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[487]: shutting down MiniUPnPd
- Aug 1 00:00:32 WAN Connection: WAN was restored.
- Aug 1 00:00:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:33 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:33 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:33 miniupnpd[689]: version 1.9 started
- Aug 1 00:00:33 miniupnpd[689]: HTTP listening on port 35935
- Aug 1 00:00:33 miniupnpd[689]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:34 rc_service: ip-up 508:notify_rc start_upnp
- Aug 1 00:00:34 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:34 miniupnpd[689]: shutting down MiniUPnPd
- Aug 1 00:00:35 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:35 miniupnpd[693]: HTTP listening on port 42250
- Aug 1 00:00:35 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:37 ntp: start NTP update
- Aug 1 00:00:37 rc_service: zcip 699:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Feb 22 19:13:52 miniupnpd[693]: shutting down MiniUPnPd
- Feb 22 19:13:52 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 22 19:13:53 rc_service: ntp 692:notify_rc restart_upnp
- Feb 22 19:13:53 rc_service: waitting "start_firewall" via zcip ...
- Feb 22 19:13:53 miniupnpd[728]: version 1.9 started
- Feb 22 19:13:53 miniupnpd[728]: HTTP listening on port 54876
- Feb 22 19:13:53 miniupnpd[728]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 22 19:13:53 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Feb 22 19:13:54 miniupnpd[728]: shutting down MiniUPnPd
- Feb 22 19:13:54 miniupnpd[733]: version 1.9 started
- Feb 22 19:13:54 miniupnpd[733]: HTTP listening on port 33004
- Feb 22 19:13:54 miniupnpd[733]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 22 19:13:55 rc_service: ntp 692:notify_rc restart_diskmon
- Feb 22 19:13:55 disk_monitor: Finish
- Feb 22 19:13:55 kernel: sizeof forward param = 160
- Feb 22 19:13:58 disk monitor: be idle
- Feb 22 19:14:01 rc_service: ip-up 508:notify_rc start_firewall
- Feb 22 19:14:02 miniupnpd[733]: shutting down MiniUPnPd
- Feb 22 19:14:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 22 19:14:03 miniupnpd[836]: version 1.9 started
- Feb 22 19:14:03 miniupnpd[836]: HTTP listening on port 50229
- Feb 22 19:14:03 miniupnpd[836]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 22 19:14:15 crond[446]: time disparity of 823393 minutes detected
- Feb 22 19:15:39 hour monitor: ntp sync fail, will retry after 120 sec
- Feb 22 20:00:58 disk_monitor: Got SIGALRM...
- Feb 22 23:00:58 disk_monitor: Got SIGALRM...
- Feb 23 07:13:52 ntp: start NTP update
- Feb 23 16:47:01 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 23 16:47:01 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 23 16:47:01 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 23 16:47:01 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 23 19:13:49 ntp: start NTP update
- Feb 24 07:13:47 ntp: start NTP update
- Feb 24 09:53:58 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 24 09:53:58 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 24 09:53:58 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 24 09:53:58 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 24 19:13:45 ntp: start NTP update
- Feb 25 07:13:43 ntp: start NTP update
- Feb 25 11:18:46 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 11:18:46 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 11:18:46 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 11:18:46 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 17:26:47 rc_service: httpd 444:notify_rc start_sig_check
- Feb 25 17:26:48 rc_service: httpd 444:notify_rc start_webs_update
- Feb 25 17:26:48 rc_service: waitting "start_sig_check" via httpd ...
- Feb 25 17:29:59 rc_service: httpd 444:notify_rc restart_qos;restart_firewall
- Feb 25 17:30:04 miniupnpd[836]: shutting down MiniUPnPd
- Feb 25 17:30:04 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:30:04 miniupnpd[8875]: version 1.9 started
- Feb 25 17:30:04 miniupnpd[8875]: HTTP listening on port 38888
- Feb 25 17:30:04 miniupnpd[8875]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:32:26 rc_service: httpd 444:notify_rc restart_dslwan_if 0
- Feb 25 17:32:26 pppd[496]: Connection terminated.
- Feb 25 17:32:34 pppd[9151]: pppd 2.4.7 started by admin, uid 0
- Feb 25 17:32:34 pppd[9151]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Feb 25 17:32:35 pppd[9151]: Connect: ppp0 <--> vlan3880
- Feb 25 17:32:37 pppd[9151]: CHAP authentication succeeded
- Feb 25 17:32:37 pppd[9151]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Feb 25 17:32:37 pppd[9151]: local IP address 159.180.116.131
- Feb 25 17:32:37 pppd[9151]: remote IP address 172.16.19.146
- Feb 25 17:32:37 pppd[9151]: primary DNS address 81.139.57.100
- Feb 25 17:32:37 pppd[9151]: secondary DNS address 81.139.56.100
- Feb 25 17:32:38 rc_service: ip-up 9157:notify_rc start_firewall
- Feb 25 17:32:38 miniupnpd[8875]: shutting down MiniUPnPd
- Feb 25 17:32:38 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:32:38 wan: finish adding multi routes
- Feb 25 17:32:39 rc_service: ip-up 9157:notify_rc stop_upnp
- Feb 25 17:32:39 rc_service: waitting "start_firewall" via ip-up ...
- Feb 25 17:32:39 miniupnpd[9192]: version 1.9 started
- Feb 25 17:32:39 miniupnpd[9192]: HTTP listening on port 56731
- Feb 25 17:32:39 miniupnpd[9192]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:32:40 rc_service: ip-up 9157:notify_rc start_upnp
- Feb 25 17:32:40 rc_service: waitting "stop_upnp" via ip-up ...
- Feb 25 17:32:40 miniupnpd[9192]: shutting down MiniUPnPd
- Feb 25 17:32:41 ntp: start NTP update
- Feb 25 17:32:41 miniupnpd[9196]: version 1.9 started
- Feb 25 17:32:41 miniupnpd[9196]: HTTP listening on port 38314
- Feb 25 17:32:41 miniupnpd[9196]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:32:46 rc_service: ip-up 9157:notify_rc start_firewall
- Feb 25 17:32:46 miniupnpd[9196]: shutting down MiniUPnPd
- Feb 25 17:32:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:32:47 rc_service: zcip 9282:notify_rc start_firewall
- Feb 25 17:32:47 rc_service: waitting "start_firewall" via ...
- Feb 25 17:32:47 miniupnpd[9305]: version 1.9 started
- Feb 25 17:32:47 miniupnpd[9305]: HTTP listening on port 34978
- Feb 25 17:32:47 miniupnpd[9305]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:32:48 zcip client: configured 169.254.71.195
- Feb 25 17:32:49 miniupnpd[9305]: shutting down MiniUPnPd
- Feb 25 17:32:49 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:32:50 miniupnpd[9333]: version 1.9 started
- Feb 25 17:32:50 miniupnpd[9333]: HTTP listening on port 43595
- Feb 25 17:32:50 miniupnpd[9333]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:33:15 rc_service: httpd 444:notify_rc reboot
- Feb 25 17:33:16 pppd[9151]: Connection terminated.
- Feb 25 17:33:17 iTunes: daemon is stoped
- Feb 25 17:33:17 FTP Server: daemon is stoped
- Feb 25 17:33:17 Samba Server: smb daemon is stoped
- Feb 25 17:33:17 kernel: gro disabled
- Feb 25 17:33:18 Timemachine: daemon is stoped
- Feb 25 17:33:18 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:15 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:15 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:16 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:25 jffs2: valid logs(1)
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:26 miniupnpd[487]: version 1.9 started
- Aug 1 00:00:26 miniupnpd[487]: HTTP listening on port 50684
- Aug 1 00:00:26 miniupnpd[487]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:26 syslog: Generating SSL certificate...
- Aug 1 00:00:26 pppd[496]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:26 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:26 pppd[496]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:26 pppd[496]: CHAP authentication succeeded
- Aug 1 00:00:26 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:26 pppd[496]: local IP address 165.120.89.35
- Aug 1 00:00:26 pppd[496]: remote IP address 172.16.19.146
- Aug 1 00:00:26 pppd[496]: primary DNS address 81.139.57.100
- Aug 1 00:00:26 pppd[496]: secondary DNS address 81.139.56.100
- Aug 1 00:00:26 rc_service: ip-up 509:notify_rc start_firewall
- Aug 1 00:00:26 WAN Connection: WAN was restored.
- Aug 1 00:00:27 wan: finish adding multi routes
- Aug 1 00:00:27 rc_service: ip-up 509:notify_rc stop_upnp
- Aug 1 00:00:27 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:28 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[487]: shutting down MiniUPnPd
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[689]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[689]: HTTP listening on port 36970
- Aug 1 00:00:32 miniupnpd[689]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 rc_service: ip-up 509:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[689]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[694]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[694]: HTTP listening on port 51892
- Aug 1 00:00:34 miniupnpd[694]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 ntp: start NTP update
- Feb 25 17:35:46 rc_service: ntp 692:notify_rc restart_upnp
- Feb 25 17:35:46 miniupnpd[694]: shutting down MiniUPnPd
- Feb 25 17:35:46 miniupnpd[709]: version 1.9 started
- Feb 25 17:35:46 miniupnpd[709]: HTTP listening on port 33777
- Feb 25 17:35:46 miniupnpd[709]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:35:46 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Feb 25 17:35:47 rc_service: ntp 692:notify_rc restart_diskmon
- Feb 25 17:35:47 disk_monitor: Finish
- Feb 25 17:35:49 rc_service: zcip 714:notify_rc start_firewall
- Feb 25 17:35:49 zcip client: configured 169.254.71.195
- Feb 25 17:35:50 miniupnpd[709]: shutting down MiniUPnPd
- Feb 25 17:35:50 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:35:51 disk monitor: be idle
- Feb 25 17:35:51 kernel: sizeof forward param = 160
- Feb 25 17:35:51 miniupnpd[737]: version 1.9 started
- Feb 25 17:35:51 miniupnpd[737]: HTTP listening on port 38629
- Feb 25 17:35:51 miniupnpd[737]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:35:57 rc_service: ip-up 509:notify_rc start_firewall
- Feb 25 17:35:58 miniupnpd[737]: shutting down MiniUPnPd
- Feb 25 17:35:58 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 25 17:36:00 miniupnpd[836]: version 1.9 started
- Feb 25 17:36:00 miniupnpd[836]: HTTP listening on port 44523
- Feb 25 17:36:00 miniupnpd[836]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 25 17:36:10 crond[445]: time disparity of 827615 minutes detected
- Feb 25 17:37:35 hour monitor: ntp sync fail, will retry after 120 sec
- Feb 25 18:00:51 disk_monitor: Got SIGALRM...
- Feb 25 18:52:12 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 18:52:12 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 18:52:12 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 18:52:12 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 25 22:41:24 rc_service: httpd 443:notify_rc start_lltdc
- Feb 25 22:41:24 rc_service: httpd 443:notify_rc start_miniupnpc
- Feb 25 22:41:24 rc_service: waitting "start_lltdc" via httpd ...
- Feb 25 22:41:50 rc_service: httpd 443:notify_rc start_webs_update
- Feb 25 23:00:51 disk_monitor: Got SIGALRM...
- Feb 26 05:35:44 ntp: start NTP update
- Feb 26 10:41:49 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 26 10:41:49 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 26 10:41:49 miniupnpd[836]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Feb 26 17:35:41 ntp: start NTP update
- Feb 27 05:35:39 ntp: start NTP update
- Feb 27 17:35:37 ntp: start NTP update
- Feb 28 05:35:34 ntp: start NTP update
- Feb 28 17:35:34 ntp: start NTP update
- Feb 28 19:26:13 rc_service: httpd 443:notify_rc restart_dslwan_if 0
- Feb 28 19:26:13 pppd[496]: Connection terminated.
- Feb 28 19:26:22 pppd[28978]: pppd 2.4.7 started by admin, uid 0
- Feb 28 19:26:22 pppd[28978]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Feb 28 19:26:22 pppd[28978]: Connect: ppp0 <--> vlan3880
- Feb 28 19:26:25 pppd[28978]: CHAP authentication succeeded
- Feb 28 19:26:25 pppd[28978]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Feb 28 19:26:25 pppd[28978]: local IP address 165.120.89.102
- Feb 28 19:26:25 pppd[28978]: remote IP address 172.16.19.146
- Feb 28 19:26:25 rc_service: ip-up 28983:notify_rc start_firewall
- Feb 28 19:26:25 miniupnpd[836]: shutting down MiniUPnPd
- Feb 28 19:26:25 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 28 19:26:26 wan: finish adding multi routes
- Feb 28 19:26:26 rc_service: ip-up 28983:notify_rc stop_upnp
- Feb 28 19:26:26 rc_service: waitting "start_firewall" via ip-up ...
- Feb 28 19:26:26 miniupnpd[29019]: version 1.9 started
- Feb 28 19:26:26 miniupnpd[29019]: HTTP listening on port 56924
- Feb 28 19:26:26 miniupnpd[29019]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 28 19:26:27 rc_service: ip-up 28983:notify_rc start_upnp
- Feb 28 19:26:27 rc_service: waitting "stop_upnp" via ip-up ...
- Feb 28 19:26:27 miniupnpd[29019]: shutting down MiniUPnPd
- Feb 28 19:26:28 ntp: start NTP update
- Feb 28 19:26:28 miniupnpd[29022]: version 1.9 started
- Feb 28 19:26:28 miniupnpd[29022]: HTTP listening on port 58592
- Feb 28 19:26:28 miniupnpd[29022]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 28 19:26:33 rc_service: ip-up 28983:notify_rc start_firewall
- Feb 28 19:26:34 miniupnpd[29022]: shutting down MiniUPnPd
- Feb 28 19:26:34 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 28 19:26:34 rc_service: zcip 29106:notify_rc start_firewall
- Feb 28 19:26:34 rc_service: waitting "start_firewall" via ...
- Feb 28 19:26:35 miniupnpd[29131]: version 1.9 started
- Feb 28 19:26:35 miniupnpd[29131]: HTTP listening on port 51082
- Feb 28 19:26:35 miniupnpd[29131]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 28 19:26:36 zcip client: configured 169.254.71.195
- Feb 28 19:26:36 miniupnpd[29131]: shutting down MiniUPnPd
- Feb 28 19:26:36 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Feb 28 19:26:37 miniupnpd[29159]: version 1.9 started
- Feb 28 19:26:37 miniupnpd[29159]: HTTP listening on port 56688
- Feb 28 19:26:37 miniupnpd[29159]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 1 07:05:19 miniupnpd[29159]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 1 07:05:19 miniupnpd[29159]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 1 07:26:28 ntp: start NTP update
- Mar 1 19:26:28 ntp: start NTP update
- Mar 2 07:26:28 ntp: start NTP update
- Mar 2 17:08:44 miniupnpd[29159]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 2 17:08:44 miniupnpd[29159]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 2 19:26:28 ntp: start NTP update
- Mar 2 20:16:01 rc_service: httpd 443:notify_rc reboot
- Mar 2 20:16:02 pppd[28978]: Connection terminated.
- Mar 2 20:16:03 iTunes: daemon is stoped
- Mar 2 20:16:03 FTP Server: daemon is stoped
- Mar 2 20:16:03 Samba Server: smb daemon is stoped
- Mar 2 20:16:03 kernel: gro disabled
- Mar 2 20:16:04 Timemachine: daemon is stoped
- Mar 2 20:16:04 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:15 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:15 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:25 jffs2: valid logs(1)
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:26 syslog: Generating SSL certificate...
- Aug 1 00:00:26 miniupnpd[488]: version 1.9 started
- Aug 1 00:00:26 miniupnpd[488]: HTTP listening on port 54928
- Aug 1 00:00:26 miniupnpd[488]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:26 pppd[496]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:26 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:26 pppd[496]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:26 pppd[496]: CHAP authentication succeeded
- Aug 1 00:00:26 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 pppd[496]: local IP address 86.157.189.249
- Aug 1 00:00:27 pppd[496]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 507:notify_rc start_firewall
- Aug 1 00:00:27 WAN Connection: WAN was restored.
- Aug 1 00:00:27 wan: finish adding multi routes
- Aug 1 00:00:27 rc_service: ip-up 507:notify_rc stop_upnp
- Aug 1 00:00:27 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:28 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[488]: shutting down MiniUPnPd
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[693]: HTTP listening on port 46071
- Aug 1 00:00:32 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 rc_service: ip-up 507:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[693]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[697]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[697]: HTTP listening on port 34543
- Aug 1 00:00:34 miniupnpd[697]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 ntp: start NTP update
- Mar 2 20:18:27 rc_service: ntp 695:notify_rc restart_upnp
- Mar 2 20:18:27 miniupnpd[697]: shutting down MiniUPnPd
- Mar 2 20:18:27 miniupnpd[711]: version 1.9 started
- Mar 2 20:18:27 miniupnpd[711]: HTTP listening on port 43874
- Mar 2 20:18:27 miniupnpd[711]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 2 20:18:28 rc_service: ntp 695:notify_rc restart_diskmon
- Mar 2 20:18:28 disk_monitor: Finish
- Mar 2 20:18:29 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Mar 2 20:18:29 rc_service: zcip 713:notify_rc start_firewall
- Mar 2 20:18:29 zcip client: configured 169.254.71.195
- Mar 2 20:18:30 disk monitor: be idle
- Mar 2 20:18:30 miniupnpd[711]: shutting down MiniUPnPd
- Mar 2 20:18:30 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 2 20:18:31 kernel: sizeof forward param = 160
- Mar 2 20:18:31 miniupnpd[741]: version 1.9 started
- Mar 2 20:18:31 miniupnpd[741]: HTTP listening on port 52961
- Mar 2 20:18:31 miniupnpd[741]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 2 20:18:35 rc_service: ip-up 507:notify_rc start_firewall
- Mar 2 20:18:36 miniupnpd[741]: shutting down MiniUPnPd
- Mar 2 20:18:36 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 2 20:18:38 miniupnpd[835]: version 1.9 started
- Mar 2 20:18:38 miniupnpd[835]: HTTP listening on port 58872
- Mar 2 20:18:38 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 2 20:18:52 crond[445]: time disparity of 834978 minutes detected
- Mar 2 20:20:17 hour monitor: ntp sync fail, will retry after 120 sec
- Mar 2 21:00:30 disk_monitor: Got SIGALRM...
- Mar 2 23:00:30 disk_monitor: Got SIGALRM...
- Mar 3 08:18:25 ntp: start NTP update
- Mar 3 20:18:22 ntp: start NTP update
- Mar 4 08:18:20 ntp: start NTP update
- Mar 4 20:18:18 ntp: start NTP update
- Mar 5 02:00:42 rc_service: rc 12253:notify_rc restart_wrs
- Mar 5 08:18:15 ntp: start NTP update
- Mar 5 20:18:13 ntp: start NTP update
- Mar 6 08:18:13 ntp: start NTP update
- Mar 6 20:18:11 ntp: start NTP update
- Mar 7 08:18:09 ntp: start NTP update
- Mar 7 18:32:40 miniupnpd[835]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 7 18:32:40 miniupnpd[835]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Mar 7 20:18:07 ntp: start NTP update
- Mar 8 08:18:07 ntp: start NTP update
- Mar 8 20:18:05 ntp: start NTP update
- Mar 9 08:18:05 ntp: start NTP update
- Mar 9 20:18:03 ntp: start NTP update
- Mar 10 08:18:01 ntp: start NTP update
- Mar 10 20:17:59 ntp: start NTP update
- Mar 11 08:17:56 ntp: start NTP update
- Mar 11 20:17:54 ntp: start NTP update
- Mar 12 08:17:51 ntp: start NTP update
- Mar 12 20:17:49 ntp: start NTP update
- Mar 13 08:17:49 ntp: start NTP update
- Mar 13 20:17:47 ntp: start NTP update
- Mar 14 08:17:45 ntp: start NTP update
- Mar 14 20:17:43 ntp: start NTP update
- Mar 15 08:17:43 ntp: start NTP update
- Mar 15 20:17:41 ntp: start NTP update
- Mar 16 08:17:38 ntp: start NTP update
- Mar 16 20:17:36 ntp: start NTP update
- Mar 17 08:17:36 ntp: start NTP update
- Mar 17 20:17:34 ntp: start NTP update
- Mar 18 08:17:34 ntp: start NTP update
- Mar 18 12:38:57 miniupnpd[835]: upnp_event_recv: recv(): Connection reset by peer
- Mar 18 20:17:32 ntp: start NTP update
- Mar 19 08:17:30 ntp: start NTP update
- Mar 19 20:17:28 ntp: start NTP update
- Mar 20 08:17:25 ntp: start NTP update
- Mar 20 20:17:23 ntp: start NTP update
- Mar 21 00:23:16 pppd[496]: Serial link appears to be disconnected.
- Mar 21 00:23:17 WAN Connection: Fail to connect with some issues.
- Mar 21 00:23:17 stop_nat_rules: apply the redirect_rules!
- Mar 21 00:23:22 pppd[496]: Connection terminated.
- Mar 21 00:23:22 pppd[496]: Modem hangup
- Mar 21 00:23:59 WAN Connection: Ethernet link down.
- Mar 21 00:24:07 pppd[496]: Timeout waiting for PADO packets
- Mar 21 00:25:22 pppd[496]: Timeout waiting for PADO packets
- Mar 21 00:25:54 WAN Connection: Fail to connect with some issues.
- Mar 21 00:26:37 pppd[496]: Timeout waiting for PADO packets
- Mar 21 00:26:37 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 00:26:37 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 00:27:10 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 00:27:10 pppd[496]: Connection terminated.
- Mar 21 00:27:11 pppd[496]: Modem hangup
- Mar 21 00:27:26 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 00:27:26 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 00:27:26 pppd[496]: CHAP authentication succeeded
- Mar 21 00:27:26 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 00:27:32 pppd[496]: local IP address 86.142.17.188
- Mar 21 00:27:32 pppd[496]: remote IP address 172.16.19.146
- Mar 21 00:27:32 rc_service: ip-up 30446:notify_rc start_firewall
- Mar 21 00:27:33 miniupnpd[835]: shutting down MiniUPnPd
- Mar 21 00:27:33 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 00:27:33 wan: finish adding multi routes
- Mar 21 00:27:33 rc_service: ip-up 30446:notify_rc stop_upnp
- Mar 21 00:27:33 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 00:27:33 miniupnpd[30482]: version 1.9 started
- Mar 21 00:27:34 miniupnpd[30482]: HTTP listening on port 57230
- Mar 21 00:27:34 miniupnpd[30482]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 00:27:34 WAN Connection: WAN was restored.
- Mar 21 00:27:34 rc_service: ip-up 30446:notify_rc start_upnp
- Mar 21 00:27:34 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 00:27:34 miniupnpd[30482]: shutting down MiniUPnPd
- Mar 21 00:27:35 ntp: start NTP update
- Mar 21 00:27:36 miniupnpd[30486]: version 1.9 started
- Mar 21 00:27:36 miniupnpd[30486]: HTTP listening on port 39436
- Mar 21 00:27:36 miniupnpd[30486]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 00:27:40 rc_service: ip-up 30446:notify_rc start_firewall
- Mar 21 00:27:41 miniupnpd[30486]: shutting down MiniUPnPd
- Mar 21 00:27:41 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 00:27:41 miniupnpd[30558]: version 1.9 started
- Mar 21 00:27:41 miniupnpd[30558]: HTTP listening on port 42126
- Mar 21 00:27:41 miniupnpd[30558]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 02:03:24 pppd[496]: Serial link appears to be disconnected.
- Mar 21 02:03:29 WAN Connection: Fail to connect with some issues.
- Mar 21 02:03:29 stop_nat_rules: apply the redirect_rules!
- Mar 21 02:03:30 pppd[496]: Connection terminated.
- Mar 21 02:03:30 pppd[496]: Modem hangup
- Mar 21 02:03:40 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:03:40 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:04:10 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 02:04:10 pppd[496]: Connection terminated.
- Mar 21 02:04:10 pppd[496]: Modem hangup
- Mar 21 02:04:55 pppd[496]: Timeout waiting for PADS packets
- Mar 21 02:04:55 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:04:55 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:05:28 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 02:05:28 pppd[496]: Connection terminated.
- Mar 21 02:05:28 pppd[496]: Modem hangup
- Mar 21 02:05:38 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:05:38 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:06:09 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 02:06:09 pppd[496]: Connection terminated.
- Mar 21 02:06:09 pppd[496]: Modem hangup
- Mar 21 02:06:54 pppd[496]: Timeout waiting for PADS packets
- Mar 21 02:06:54 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:06:54 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:07:33 pppd[496]: Connection terminated.
- Mar 21 02:07:33 pppd[496]: Modem hangup
- Mar 21 02:08:18 pppd[496]: Timeout waiting for PADS packets
- Mar 21 02:08:23 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:08:23 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:09:01 pppd[496]: Connection terminated.
- Mar 21 02:09:01 pppd[496]: Modem hangup
- Mar 21 02:09:11 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 02:09:11 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 02:09:11 pppd[496]: CHAP authentication succeeded
- Mar 21 02:09:11 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 02:09:12 pppd[496]: local IP address 159.180.118.223
- Mar 21 02:09:12 pppd[496]: remote IP address 172.16.19.146
- Mar 21 02:09:12 rc_service: ip-up 7598:notify_rc start_firewall
- Mar 21 02:09:12 miniupnpd[30558]: shutting down MiniUPnPd
- Mar 21 02:09:12 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 02:09:13 wan: finish adding multi routes
- Mar 21 02:09:13 rc_service: ip-up 7598:notify_rc stop_upnp
- Mar 21 02:09:13 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 02:09:13 miniupnpd[7638]: version 1.9 started
- Mar 21 02:09:13 miniupnpd[7638]: HTTP listening on port 56320
- Mar 21 02:09:13 miniupnpd[7638]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 02:09:14 rc_service: ip-up 7598:notify_rc start_upnp
- Mar 21 02:09:14 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 02:09:14 miniupnpd[7638]: shutting down MiniUPnPd
- Mar 21 02:09:15 miniupnpd[7673]: version 1.9 started
- Mar 21 02:09:15 miniupnpd[7673]: HTTP listening on port 37763
- Mar 21 02:09:15 miniupnpd[7673]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 02:09:16 WAN Connection: WAN was restored.
- Mar 21 02:09:18 ntp: start NTP update
- Mar 21 02:09:19 rc_service: ip-up 7598:notify_rc start_firewall
- Mar 21 02:09:20 miniupnpd[7673]: shutting down MiniUPnPd
- Mar 21 02:09:20 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 02:09:21 miniupnpd[7745]: version 1.9 started
- Mar 21 02:09:21 miniupnpd[7745]: HTTP listening on port 37488
- Mar 21 02:09:21 miniupnpd[7745]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 04:17:58 pppd[496]: Serial link appears to be disconnected.
- Mar 21 04:18:03 WAN Connection: Fail to connect with some issues.
- Mar 21 04:18:03 stop_nat_rules: apply the redirect_rules!
- Mar 21 04:18:04 pppd[496]: Connection terminated.
- Mar 21 04:18:04 pppd[496]: Modem hangup
- Mar 21 04:18:14 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 04:18:14 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 04:18:45 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 04:18:45 pppd[496]: Connection terminated.
- Mar 21 04:18:45 pppd[496]: Modem hangup
- Mar 21 04:18:55 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 04:18:55 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 04:18:55 pppd[496]: CHAP authentication succeeded
- Mar 21 04:18:55 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 04:18:55 pppd[496]: local IP address 159.180.118.111
- Mar 21 04:18:55 pppd[496]: remote IP address 172.16.19.146
- Mar 21 04:18:55 rc_service: ip-up 19924:notify_rc start_firewall
- Mar 21 04:18:56 miniupnpd[7745]: shutting down MiniUPnPd
- Mar 21 04:18:56 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 04:18:56 wan: finish adding multi routes
- Mar 21 04:18:56 rc_service: ip-up 19924:notify_rc stop_upnp
- Mar 21 04:18:56 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 04:18:56 miniupnpd[19959]: version 1.9 started
- Mar 21 04:18:56 miniupnpd[19959]: HTTP listening on port 35370
- Mar 21 04:18:56 miniupnpd[19959]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 04:18:57 rc_service: ip-up 19924:notify_rc start_upnp
- Mar 21 04:18:57 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 04:18:57 miniupnpd[19959]: shutting down MiniUPnPd
- Mar 21 04:18:58 WAN Connection: WAN was restored.
- Mar 21 04:18:58 ntp: start NTP update
- Mar 21 04:18:58 miniupnpd[19963]: version 1.9 started
- Mar 21 04:18:59 miniupnpd[19963]: HTTP listening on port 46532
- Mar 21 04:18:59 miniupnpd[19963]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 04:19:02 rc_service: ip-up 19924:notify_rc start_firewall
- Mar 21 04:19:03 miniupnpd[19963]: shutting down MiniUPnPd
- Mar 21 04:19:03 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 04:19:04 miniupnpd[20035]: version 1.9 started
- Mar 21 04:19:04 miniupnpd[20035]: HTTP listening on port 56127
- Mar 21 04:19:04 miniupnpd[20035]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 05:38:10 pppd[496]: Serial link appears to be disconnected.
- Mar 21 05:38:16 pppd[496]: Connection terminated.
- Mar 21 05:38:16 pppd[496]: Modem hangup
- Mar 21 05:38:17 WAN Connection: Fail to connect with some issues.
- Mar 21 05:38:17 stop_nat_rules: apply the redirect_rules!
- Mar 21 05:38:26 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 05:38:26 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 05:38:27 pppd[496]: CHAP authentication succeeded
- Mar 21 05:38:27 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 05:38:33 pppd[496]: Connection terminated.
- Mar 21 05:38:33 pppd[496]: Modem hangup
- Mar 21 05:38:43 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 05:38:43 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 05:39:13 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 05:39:13 pppd[496]: Connection terminated.
- Mar 21 05:39:13 pppd[496]: Modem hangup
- Mar 21 05:39:23 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 05:39:23 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 05:40:03 pppd[496]: Connection terminated.
- Mar 21 05:40:03 pppd[496]: Modem hangup
- Mar 21 05:40:18 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 05:40:18 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 05:40:18 pppd[496]: CHAP authentication succeeded
- Mar 21 05:40:18 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 05:40:24 pppd[496]: Connection terminated.
- Mar 21 05:40:25 pppd[496]: Modem hangup
- Mar 21 05:40:40 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 05:40:40 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 05:40:40 pppd[496]: CHAP authentication succeeded
- Mar 21 05:40:40 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 05:40:43 pppd[496]: local IP address 109.159.169.96
- Mar 21 05:40:43 pppd[496]: remote IP address 172.16.19.146
- Mar 21 05:40:43 rc_service: ip-up 27683:notify_rc start_firewall
- Mar 21 05:40:43 miniupnpd[20035]: shutting down MiniUPnPd
- Mar 21 05:40:43 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 05:40:44 wan: finish adding multi routes
- Mar 21 05:40:44 rc_service: ip-up 27683:notify_rc stop_upnp
- Mar 21 05:40:44 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 05:40:44 miniupnpd[27719]: version 1.9 started
- Mar 21 05:40:44 miniupnpd[27719]: HTTP listening on port 50117
- Mar 21 05:40:44 miniupnpd[27719]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 05:40:45 rc_service: ip-up 27683:notify_rc start_upnp
- Mar 21 05:40:45 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 05:40:45 miniupnpd[27719]: shutting down MiniUPnPd
- Mar 21 05:40:46 miniupnpd[27721]: version 1.9 started
- Mar 21 05:40:46 miniupnpd[27721]: HTTP listening on port 42383
- Mar 21 05:40:46 miniupnpd[27721]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 05:40:49 WAN Connection: WAN was restored.
- Mar 21 05:40:50 rc_service: ip-up 27683:notify_rc start_firewall
- Mar 21 05:40:51 miniupnpd[27721]: shutting down MiniUPnPd
- Mar 21 05:40:51 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 05:40:52 miniupnpd[27791]: version 1.9 started
- Mar 21 05:40:52 miniupnpd[27791]: HTTP listening on port 50183
- Mar 21 05:40:52 miniupnpd[27791]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 05:40:55 ntp: start NTP update
- Mar 21 06:12:53 pppd[496]: Serial link appears to be disconnected.
- Mar 21 06:12:56 WAN Connection: Fail to connect with some issues.
- Mar 21 06:12:56 stop_nat_rules: apply the redirect_rules!
- Mar 21 06:12:59 pppd[496]: Connection terminated.
- Mar 21 06:12:59 pppd[496]: Modem hangup
- Mar 21 06:13:24 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 06:13:24 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 06:13:25 pppd[496]: CHAP authentication succeeded
- Mar 21 06:13:25 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 06:13:37 pppd[496]: local IP address 86.142.17.247
- Mar 21 06:13:37 pppd[496]: remote IP address 172.16.19.146
- Mar 21 06:13:37 rc_service: ip-up 30823:notify_rc start_firewall
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 27744 -> 192.168.1.167:27744 protocol TCP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 58183 -> 192.168.1.192:58183 protocol UDP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 63609 -> 192.168.1.167:63608 protocol UDP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 14242 -> 192.168.1.2:14242 protocol UDP
- Mar 21 06:13:37 wan: finish adding multi routes
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 27048 -> 192.168.1.167:27048 protocol UDP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 27048 -> 192.168.1.167:27048 protocol TCP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 47066 -> 192.168.1.167:47066 protocol UDP
- Mar 21 06:13:37 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:37 miniupnpd[27791]: Failed to redirect 47066 -> 192.168.1.167:47066 protocol TCP
- Mar 21 06:13:38 rc_service: ip-up 30823:notify_rc stop_upnp
- Mar 21 06:13:38 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27744 -> 192.168.1.167:27744 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27744 -> 192.168.1.167:27744 protocol TCP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 58183 -> 192.168.1.192:58183 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 63609 -> 192.168.1.167:63608 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 14242 -> 192.168.1.2:14242 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27048 -> 192.168.1.167:27048 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27048 -> 192.168.1.167:27048 protocol TCP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 47066 -> 192.168.1.167:47066 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 47066 -> 192.168.1.167:47066 protocol TCP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27744 -> 192.168.1.167:27744 protocol UDP
- Mar 21 06:13:38 miniupnpd[27791]: add_filter_rule() : chain FUPNP not found
- Mar 21 06:13:38 miniupnpd[27791]: Failed to redirect 27744 -> 192.168.1.167:27744 protocol TCP
- Mar 21 06:13:38 miniupnpd[27791]: shutting down MiniUPnPd
- Mar 21 06:13:38 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:13:38 miniupnpd[30858]: version 1.9 started
- Mar 21 06:13:38 miniupnpd[30858]: HTTP listening on port 42956
- Mar 21 06:13:38 miniupnpd[30858]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:13:39 rc_service: ip-up 30823:notify_rc start_upnp
- Mar 21 06:13:39 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 06:13:39 miniupnpd[30858]: shutting down MiniUPnPd
- Mar 21 06:13:40 ntp: start NTP update
- Mar 21 06:13:40 miniupnpd[30861]: version 1.9 started
- Mar 21 06:13:40 miniupnpd[30861]: HTTP listening on port 42844
- Mar 21 06:13:40 miniupnpd[30861]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:13:42 WAN Connection: WAN was restored.
- Mar 21 06:13:44 rc_service: ip-up 30823:notify_rc start_firewall
- Mar 21 06:13:45 miniupnpd[30861]: shutting down MiniUPnPd
- Mar 21 06:13:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:13:46 miniupnpd[30933]: version 1.9 started
- Mar 21 06:13:46 miniupnpd[30933]: HTTP listening on port 51135
- Mar 21 06:13:46 miniupnpd[30933]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:20:13 pppd[496]: Serial link appears to be disconnected.
- Mar 21 06:20:15 WAN Connection: Fail to connect with some issues.
- Mar 21 06:20:15 stop_nat_rules: apply the redirect_rules!
- Mar 21 06:20:19 pppd[496]: Connection terminated.
- Mar 21 06:20:19 pppd[496]: Modem hangup
- Mar 21 06:20:29 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 06:20:29 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 06:20:29 pppd[496]: CHAP authentication succeeded
- Mar 21 06:20:29 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 06:20:29 pppd[496]: local IP address 86.155.230.186
- Mar 21 06:20:29 pppd[496]: remote IP address 172.16.19.146
- Mar 21 06:20:29 rc_service: ip-up 31580:notify_rc start_firewall
- Mar 21 06:20:30 wan: finish adding multi routes
- Mar 21 06:20:30 rc_service: ip-up 31580:notify_rc stop_upnp
- Mar 21 06:20:30 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 06:20:30 miniupnpd[30933]: shutting down MiniUPnPd
- Mar 21 06:20:30 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:20:31 WAN Connection: WAN was restored.
- Mar 21 06:20:31 miniupnpd[31616]: version 1.9 started
- Mar 21 06:20:31 miniupnpd[31616]: HTTP listening on port 57513
- Mar 21 06:20:31 miniupnpd[31616]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:20:31 rc_service: ip-up 31580:notify_rc start_upnp
- Mar 21 06:20:31 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 06:20:31 miniupnpd[31616]: shutting down MiniUPnPd
- Mar 21 06:20:32 ntp: start NTP update
- Mar 21 06:20:33 miniupnpd[31619]: version 1.9 started
- Mar 21 06:20:33 miniupnpd[31619]: HTTP listening on port 43735
- Mar 21 06:20:33 miniupnpd[31619]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:20:36 rc_service: ip-up 31580:notify_rc start_firewall
- Mar 21 06:20:37 miniupnpd[31619]: shutting down MiniUPnPd
- Mar 21 06:20:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:20:38 miniupnpd[31690]: version 1.9 started
- Mar 21 06:20:38 miniupnpd[31690]: HTTP listening on port 42377
- Mar 21 06:20:38 miniupnpd[31690]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:36:42 pppd[496]: Serial link appears to be disconnected.
- Mar 21 06:36:48 pppd[496]: Connection terminated.
- Mar 21 06:36:48 pppd[496]: Modem hangup
- Mar 21 06:36:48 WAN Connection: Fail to connect with some issues.
- Mar 21 06:36:48 stop_nat_rules: apply the redirect_rules!
- Mar 21 06:36:58 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 06:36:58 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 06:37:28 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 06:37:28 pppd[496]: Connection terminated.
- Mar 21 06:37:28 pppd[496]: Modem hangup
- Mar 21 06:38:13 pppd[496]: Timeout waiting for PADO packets
- Mar 21 06:38:29 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 06:38:29 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 06:38:29 pppd[496]: CHAP authentication succeeded
- Mar 21 06:38:29 pppd[496]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 21 06:38:29 pppd[496]: local IP address 159.180.118.210
- Mar 21 06:38:29 pppd[496]: remote IP address 172.16.19.146
- Mar 21 06:38:29 rc_service: ip-up 987:notify_rc start_firewall
- Mar 21 06:38:30 miniupnpd[31690]: shutting down MiniUPnPd
- Mar 21 06:38:30 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:38:30 wan: finish adding multi routes
- Mar 21 06:38:30 rc_service: ip-up 987:notify_rc stop_upnp
- Mar 21 06:38:30 rc_service: waitting "start_firewall" via ip-up ...
- Mar 21 06:38:30 miniupnpd[1023]: version 1.9 started
- Mar 21 06:38:30 miniupnpd[1023]: HTTP listening on port 33495
- Mar 21 06:38:30 miniupnpd[1023]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:38:31 rc_service: ip-up 987:notify_rc start_upnp
- Mar 21 06:38:31 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 21 06:38:31 miniupnpd[1023]: shutting down MiniUPnPd
- Mar 21 06:38:32 miniupnpd[1025]: version 1.9 started
- Mar 21 06:38:33 miniupnpd[1025]: HTTP listening on port 50286
- Mar 21 06:38:33 miniupnpd[1025]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:38:36 rc_service: ip-up 987:notify_rc start_firewall
- Mar 21 06:38:37 WAN Connection: WAN was restored.
- Mar 21 06:38:37 miniupnpd[1025]: shutting down MiniUPnPd
- Mar 21 06:38:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 06:38:38 miniupnpd[1096]: version 1.9 started
- Mar 21 06:38:38 miniupnpd[1096]: HTTP listening on port 42302
- Mar 21 06:38:38 miniupnpd[1096]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 06:38:50 ntp: start NTP update
- Mar 21 06:58:23 pppd[496]: Serial link appears to be disconnected.
- Mar 21 06:58:27 WAN Connection: Fail to connect with some issues.
- Mar 21 06:58:27 stop_nat_rules: apply the redirect_rules!
- Mar 21 06:58:29 pppd[496]: Connection terminated.
- Mar 21 06:58:30 pppd[496]: Modem hangup
- Mar 21 06:58:40 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 06:58:40 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 06:59:10 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 06:59:10 pppd[496]: Connection terminated.
- Mar 21 06:59:10 pppd[496]: Modem hangup
- Mar 21 07:00:00 pppd[496]: Timeout waiting for PADS packets
- Mar 21 07:00:15 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 07:00:15 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 07:00:45 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 07:00:45 pppd[496]: Connection terminated.
- Mar 21 07:00:45 pppd[496]: Modem hangup
- Mar 21 07:00:55 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 07:00:55 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 07:01:25 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 07:01:25 pppd[496]: Connection terminated.
- Mar 21 07:01:26 pppd[496]: Modem hangup
- Mar 21 07:01:36 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 07:01:36 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 07:02:14 pppd[496]: Connection terminated.
- Mar 21 07:02:14 pppd[496]: Modem hangup
- Mar 21 07:03:14 pppd[496]: Timeout waiting for PADS packets
- Mar 21 07:03:14 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 07:03:14 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 07:03:44 pppd[496]: LCP: timeout sending Config-Requests
- Mar 21 07:03:44 pppd[496]: Connection terminated.
- Mar 21 07:03:44 pppd[496]: Modem hangup
- Mar 21 07:04:29 pppd[496]: Timeout waiting for PADS packets
- Mar 21 07:04:34 pppd[496]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 21 07:04:34 pppd[496]: Connect: ppp0 <--> vlan3880
- Mar 21 07:04:41 rc_service: httpd 443:notify_rc reboot
- Mar 21 07:04:42 pppd[496]: Connection terminated.
- Mar 21 07:04:43 iTunes: daemon is stoped
- Mar 21 07:04:43 FTP Server: daemon is stoped
- Mar 21 07:04:43 Samba Server: smb daemon is stoped
- Mar 21 07:04:43 kernel: gro disabled
- Mar 21 07:04:44 Timemachine: daemon is stoped
- Mar 21 07:04:44 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:15 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:15 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: _ Reboot message ... _______________________________________________________
- Aug 1 00:00:16 kernel: <1>Unable to handle kernel NULL pointer derefere�U�at virtual address 00000000
- Aug 1 00:00:16 kernel: <1>pgd = cb910000
- Aug 1 00:00:16 kernel: <1>[00000000] *pgd=9bf25031, *pte=00000000, *ppte=00000000
- Aug 1 00:00:16 kernel: <0>Internal error: Oops: 17 [#1] PREEMPT SMP
- Aug 1 00:00:16 kernel: <0>last sysfs file: /sys/module/bw_forward/parameters/dev_wan
- Aug 1 00:00:16 kernel: <4>module: IDP bf701000 529190
- Aug 1 00:00:16 kernel: <4>module: nf_nat_sip bf6fa000 5031
- Aug 1 00:00:16 kernel: <4>module: nf_conntrack_sip bf6f1000 15713
- Aug 1 00:00:16 kernel: <4>module: nf_nat_h323 bf6ea000 4761
- Aug 1 00:00:17 kernel: <4>module: nf_conntrack_h323 bf6dc000 33807
- Aug 1 00:00:17 kernel: <4>module: nf_nat_rtsp bf6d6000 3202
- Aug 1 00:00:17 kernel: <4>module: nf_conntrack_rtsp bf6d0000 4067
- Aug 1 00:00:17 kernel: <4>module: nf_nat_ftp bf6ca000 1144
- Aug 1 00:00:17 kernel: <4>module: nf_conntrack_ftp bf6c3000 4909
- Aug 1 00:00:17 kernel: <4>module: ip6table_mangle bf6bd000 934
- Aug 1 00:00:17 kernel: <4>module: ohci_hcd bf66b000 17918
- Aug 1 00:00:17 kernel: <4>module: ehci_hcd bf65e000 31565
- Aug 1 00:00:17 kernel: <4>module: thfsplus bf642000 81793
- Aug 1 00:00:17 kernel: <4>module: tntfs bf5c6000 454497
- Aug 1 00:00:17 kernel: <4>module: tfat bf58d000 188546
- Aug 1 00:00:17 kernel: <4>module: ext2 bf579000 52776
- Aug 1 00:00:17 kernel: <4>module: ext4 bf538000 221674
- Aug 1 00:00:17 kernel: <4>module: jbd2 bf525000 48993
- Aug 1 00:00:17 kernel: <4>module: crc16 bf51f000 1007
- Aug 1 00:00:17 kernel: <4>module: ext3 bf4fd000 106409
- Aug 1 00:00:17 kernel: <4>module: jbd bf4ec000 42367
- Aug 1 00:00:17 kernel: <4>module: mbcache bf4e5000 4599
- Aug 1 00:00:17 kernel: <4>module: usb_storage bf4d6000 34110
- Aug 1 00:00:17 kernel: <4>module: sg bf4cb000 19855
- Aug 1 00:00:17 kernel: <4>module: sd_mod bf4bf000 21983
- Aug 1 00:00:17 kernel: <4>module: scsi_wait_scan bf4b9000 416
- Aug 1 00:00:17 kernel: <4>module: scsi_mod bf494000 108738
- Aug 1 00:00:17 kernel: <4>module: usbcore bf471000 101810
- Aug 1 00:00:17 kernel: <4>module: ip6t_LOG bf46a000 4494
- Aug 1 00:00:17 kernel: <4>module: ip6table_filter bf464000 750
- Aug 1 00:00:17 kernel: <4>module: jffs2 bf446000 91274
- Aug 1 00:00:17 kernel: <4>module: zlib_deflate bf43c000 19489
- Aug 1 00:00:17 kernel: <4>module: wl bf031000 3986711
- Aug 1 00:00:17 kernel: <4>module: igs bf029000 11887
- Aug 1 00:00:17 kernel: <4>module: emf bf020000 15157
- Aug 1 00:00:17 kernel: <4>module: et bf00a000 61437
- Aug 1 00:00:17 kernel: <4>module: ctf bf000000 20367
- Aug 1 00:00:17 kernel: <4>Modules linked in: IDP(P-) nf_nat_sip nf_conntrack_sip nf_nat_h323 nf_conntrack_h323 nf_nat_rtsp nf_conntrack_rtsp nf_nat_ftp nf_conntrack_ftp ip6table_mangle ohci_hcd ehci_hcd thfsplus tntfs(P) tfat(P) ext2 ext4 jbd2 crc16 ext3 jbd mbcache usb_storage sg sd_mod scsi_wait_scan scsi_mod usbcore ip6t_LOG ip6table_filter jffs2 zlib_deflate wl(P) igs(P) emf(P) et(P) ctf(P) [last unloaded: bw_forward]
- Aug 1 00:00:17 kernel: <4>CPU: 0 Tainted: P (2.6.36.4brcmarm #1)
- Aug 1 00:00:17 kernel: <4>PC is at parse_ip6_header+0x1cb6c/0x1cf24 [IDP]
- Aug 1 00:00:17 kernel: <4>LR is at devid_sig_destroy+0x1bc/0x21c [IDP]
- Aug 1 00:00:17 kernel: <4>pc : [<bf748448>] lr : [<bf7489bc>] psr: a0000013
- Aug 1 00:00:17 kernel: <4>sp : ccefdf00 ip : 00000000 fp : 00000000
- Aug 1 00:00:17 kernel: <4>r10: 00000000 r9 : ccefc000 r8 : bea11ca0
- Aug 1 00:00:17 kernel: <4>r7 : d59d7000 r6 : cbb0eea0 r5 : cbb0ee80 r4 : cbb0ee68
- Aug 1 00:00:17 kernel: <4>r3 : 00000000 r2 : 00000000 r1 : 9a000081 r0 : cbb0ee80
- Aug 1 00:00:17 kernel: <4>Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
- Aug 1 00:00:17 kernel: <4>Control: 10c53c7d Table: 9b91004a DAC: 00000015
- Aug 1 00:00:17 kernel: <0>Process rmmod (pid: 3732, stack limit = 0xccefc270)
- Aug 1 00:00:17 kernel: <0>Stack: (0xccefdf00 to 0xccefe000)
- Aug 1 00:00:17 kernel: <0>df00: cbb0ee68 d59d7420 ccefc000 bf7489bc bf7577f0 bf757378 ccefc000 ccefdf44
- Aug 1 00:00:17 kernel: <0>df20: bea11ca0 bf7492f4 bf7577f0 bf70b750 bf7577f0 bf703804 00000000 c008f2a8
- Aug 1 00:00:17 kernel: <0>df40: cdf186b8 00504449 c03be064 ccefc000 4002f000 ccefdf84 4002f000 00000001
- Aug 1 00:00:17 kernel: <0>df60: ccefc000 4002e000 ccd49aa0 bea11a34 00005401 00000001 c003dc68 00efc000
- Aug 1 00:00:17 kernel: <0>df80: bf757378 00000880 ccefdf8c 00000000 402453b0 00000880 bea11ca0 00000081
- Aug 1 00:00:17 kernel: <0>dfa0: c003dc68 c003dac0 402453b0 00000880 bea11ca0 00000880 00001e38 00000000
- Aug 1 00:00:17 kernel: <0>dfc0: 402453b0 00000880 bea11ca0 00000081 000001ea 0000ca3c 0009b8a4 00000000
- Aug 1 00:00:17 kernel: <0>dfe0: 401ec74c bea11c88 00012520 401ec758 20000010 bea11ca0 00000000 00000000
- Aug 1 00:00:17 kernel: <4>[<bf748448>] (PC is at parse_ip6_header+0x1cb6c/0x1cf24 [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf748448>] (parse_ip6_header+0x1cb6c/0x1cf24 [IDP]) from [<bf7489bc>] (devid_sig_destroy+0x1bc/0x21c [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf7489bc>] (devid_sig_destroy+0x1bc/0x21c [IDP]) from [<bf7492f4>] (devid_exit+0x18/0x24 [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf7492f4>] (devid_exit+0x18/0x24 [IDP]) from [<bf70b750>] (detector_remove+0x3c/0x4c [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf70b750>] (detector_remove+0x3c/0x4c [IDP]) from [<bf703804>] (nk_sys_exit+0xac/0xc8 [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf703804>] (nk_sys_exit+0xac/0xc8 [IDP]) from [<c008f2a8>] (sys_delete_module+0x16c/0x218)
- Aug 1 00:00:17 kernel: <4>[<c008f2a8>] (sys_delete_module+0x16c/0x218) from [<c003dac0>] (ret_fast_syscall+0x0/0x30)
- Aug 1 00:00:17 kernel: <0>Code: e5902020 e1a05000 e1560002 0a000010 (e5924000)
- Aug 1 00:00:17 kernel: -[ end trace ad65e40ad38b66eb ]---
- Aug 1 00:00:17 kernel: <0>Kernel panic - not syncing: Fatal exception
- Aug 1 00:00:17 kernel: <4>[<c0043ff8>] (unwind_backtrace+0x0/0xf8) from [<c02c7960>] (panic+0x7c/0x1a8)
- Aug 1 00:00:17 kernel: <4>[<c02c7960>] (panic+0x7c/0x1a8) from [<c00416f0>] (die+0x1a4/0x1dc)
- Aug 1 00:00:17 kernel: <4>[<c00416f0>] (die+0x1a4/0x1dc) from [<c004515c>] (__do_kernel_fault+0x6c/0x8c)
- Aug 1 00:00:17 kernel: <4>[<c004515c>] (__do_kernel_fault+0x6c/0x8c) from [<c00452cc>] (do_page_fault+0x150/0x1ec)
- Aug 1 00:00:17 kernel: <4>[<c00452cc>] (do_page_fault+0x150/0x1ec) from [<c003d3a4>] (do_DataAbort+0x30/0x9c)
- Aug 1 00:00:17 kernel: <4>[<c003d3a4>] (do_DataAbort+0x30/0x9c) from [<c03822ac>] (__dabt_svc+0x4c/0x60)
- Aug 1 00:00:17 kernel: <4>Exception stack(0xccefdeb8 to 0xccefdf00)
- Aug 1 00:00:17 kernel: <4>dea0:
- Aug 1 00:00:17 kernel: JFFS2 notice: (344) check_node_data: wrong data CRC in data node at 0x0352f444: read 0x2ac0e48a, calculated 0x87914d42.
- Aug 1 00:00:17 kernel: cbb0ee80 9a000081
- Aug 1 00:00:17 kernel: <4>dec0: 00000000 00000000 cbb0ee68 cbb0ee80 cbb0eea0 d59d7000 bea11ca0 ccefc000
- Aug 1 00:00:17 kernel: <4>dee0: 0000000489bc bf748448 a0000013 ffffffff
- Aug 1 00:00:17 kernel: <4>[<c03822ac>] (__dabt_svc+0x4_ip6_header+0x1cb6c/0x1cf24 [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf748448>] (parse_ip�^Bader+0x1cb6c/0x1cf24 [IDP]) from [<bf7489bc>] (devid_sig_destroy+0x1bc/0x21c [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf7489bc>] (devid_sig_destroy+0x1bc/0x27492f4>] (devid_exit+0x18/0x24 [IDP]) from [<bf70b750>] (detector_remove+0x3c/0x4c [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf70b750>] (detector_remove+0x3c/0x4c [IDP]) from [<bf703804>] (nk_sys_exit+0xac/0xc8 [IDP])
- Aug 1 00:00:17 kernel: <4>[<bf703804>] (nk_sys_exit+0xac/0xc8 [IDP]) from [<c008f2a8>] (sys_delete_module+0x16c/0x218)
- Aug 1 00:00:17 kernel: <4>[x16c/0x218) from [<c003dac0>] (ret_fast_syscall+0x0/0x30)
- Aug 1 00:00:17 kernel: <2>CPU003d334>] (do_IPI+0x114/0x154)
- Aug 1 00:00:17 kernel: xcf843f98 to 0xcf843fe0)
- Aug 1 00:00:17 kernel: <4>3f80 c8225c60 cf9d3900
- Aug 1 00:00:17 kernel: <4>3fa0: cf843fe0 00000x28) from [<c003ed88>] (cpu_idl
- Aug 1 00:00:17 kernel: ____________________________________________________________________________
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:18 WAN Connection: Ethernet link down.
- Aug 1 00:00:26 DSL-AC68U: start httpd
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:27 miniupnpd[484]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[484]: HTTP listening on port 38067
- Aug 1 00:00:27 miniupnpd[484]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:27 pppd[488]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[488]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[488]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 pppd[488]: local IP address 159.180.118.197
- Aug 1 00:00:27 pppd[488]: remote IP address 172.16.19.146
- Aug 1 00:00:28 rc_service: ip-up 509:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 509:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:29 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[484]: shutting down MiniUPnPd
- Aug 1 00:00:32 WAN Connection: WAN was restored.
- Aug 1 00:00:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[693]: HTTP listening on port 60792
- Aug 1 00:00:32 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 rc_service: ip-up 509:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[693]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[696]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[696]: HTTP listening on port 55629
- Aug 1 00:00:34 miniupnpd[696]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 ntp: start NTP update
- Mar 21 07:06:57 rc_service: ntp 695:notify_rc restart_upnp
- Mar 21 07:06:57 miniupnpd[696]: shutting down MiniUPnPd
- Mar 21 07:06:58 miniupnpd[707]: version 1.9 started
- Mar 21 07:06:58 miniupnpd[707]: HTTP listening on port 58966
- Mar 21 07:06:58 miniupnpd[707]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 07:06:58 rc_service: ntp 695:notify_rc restart_diskmon
- Mar 21 07:06:58 disk_monitor: Finish
- Mar 21 07:06:59 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Mar 21 07:07:00 kernel: sizeof forward param = 160
- Mar 21 07:07:00 rc_service: zcip 718:notify_rc start_firewall
- Mar 21 07:07:00 zcip client: configured 169.254.71.195
- Mar 21 07:07:00 disk monitor: be idle
- Mar 21 07:07:02 miniupnpd[707]: shutting down MiniUPnPd
- Mar 21 07:07:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 07:07:02 miniupnpd[742]: version 1.9 started
- Mar 21 07:07:02 miniupnpd[742]: HTTP listening on port 54795
- Mar 21 07:07:02 miniupnpd[742]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 07:07:06 rc_service: ip-up 509:notify_rc start_firewall
- Mar 21 07:07:07 miniupnpd[742]: shutting down MiniUPnPd
- Mar 21 07:07:07 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 21 07:07:08 miniupnpd[835]: version 1.9 started
- Mar 21 07:07:08 miniupnpd[835]: HTTP listening on port 33099
- Mar 21 07:07:08 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 21 07:07:23 crond[445]: time disparity of 861546 minutes detected
- Mar 21 07:08:49 hour monitor: ntp sync fail, will retry after 120 sec
- Mar 21 18:04:24 miniupnpd[835]: upnp_event_recv: recv(): Connection reset by peer
- Mar 21 19:06:55 ntp: start NTP update
- Mar 21 23:07:01 disk_monitor: Got SIGALRM...
- Mar 22 07:06:53 ntp: start NTP update
- Mar 22 11:26:30 WAN Connection: Ethernet link down.
- Mar 22 11:26:30 stop_nat_rules: apply the redirect_rules!
- Mar 22 11:26:35 WAN Connection: WAN was restored.
- Mar 22 11:26:35 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 22 19:06:53 ntp: start NTP update
- Mar 23 07:06:51 ntp: start NTP update
- Mar 23 19:06:49 ntp: start NTP update
- Mar 23 20:15:16 rc_service: httpd 443:notify_rc start_webs_upgrade
- Mar 23 20:15:31 rc_service: httpd 443:notify_rc reboot
- Mar 23 20:15:32 pppd[488]: Connection terminated.
- Mar 23 20:15:34 iTunes: daemon is stoped
- Mar 23 20:15:34 FTP Server: daemon is stoped
- Mar 23 20:15:34 Samba Server: smb daemon is stoped
- Mar 23 20:15:34 kernel: gro disabled
- Mar 23 20:15:34 Timemachine: daemon is stoped
- Mar 23 20:15:34 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:26 DSL-AC68U: start httpd
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:27 miniupnpd[486]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[486]: HTTP listening on port 39119
- Aug 1 00:00:27 miniupnpd[486]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[495]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[495]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[495]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 pppd[495]: local IP address 159.180.118.14
- Aug 1 00:00:27 pppd[495]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 509:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 509:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:29 kernel: SCSI subsystem initialized
- Aug 1 00:00:32 miniupnpd[486]: shutting down MiniUPnPd
- Aug 1 00:00:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:32 WAN Connection: WAN was restored.
- Aug 1 00:00:33 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:33 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:33 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:33 miniupnpd[693]: HTTP listening on port 35181
- Aug 1 00:00:33 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:34 rc_service: ip-up 509:notify_rc start_upnp
- Aug 1 00:00:34 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:34 miniupnpd[693]: shutting down MiniUPnPd
- Aug 1 00:00:35 miniupnpd[696]: version 1.9 started
- Aug 1 00:00:35 miniupnpd[696]: HTTP listening on port 60020
- Aug 1 00:00:35 miniupnpd[696]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:36 ntp: start NTP update
- Mar 23 20:18:00 rc_service: ntp 695:notify_rc restart_upnp
- Mar 23 20:18:00 miniupnpd[696]: shutting down MiniUPnPd
- Mar 23 20:18:01 miniupnpd[710]: version 1.9 started
- Mar 23 20:18:01 miniupnpd[710]: HTTP listening on port 52926
- Mar 23 20:18:01 miniupnpd[710]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 23 20:18:01 rc_service: ntp 695:notify_rc restart_diskmon
- Mar 23 20:18:01 disk_monitor: Finish
- Mar 23 20:18:03 rc_service: zcip 712:notify_rc start_firewall
- Mar 23 20:18:03 zcip client: configured 169.254.71.195
- Mar 23 20:18:03 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Mar 23 20:18:04 miniupnpd[710]: shutting down MiniUPnPd
- Mar 23 20:18:04 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 23 20:18:04 disk monitor: be idle
- Mar 23 20:18:05 miniupnpd[739]: version 1.9 started
- Mar 23 20:18:05 miniupnpd[739]: HTTP listening on port 60795
- Mar 23 20:18:05 miniupnpd[739]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 23 20:18:05 kernel: sizeof forward param = 160
- Mar 23 20:18:09 rc_service: ip-up 509:notify_rc start_firewall
- Mar 23 20:18:10 miniupnpd[739]: shutting down MiniUPnPd
- Mar 23 20:18:10 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 23 20:18:11 miniupnpd[835]: version 1.9 started
- Mar 23 20:18:11 miniupnpd[835]: HTTP listening on port 48445
- Mar 23 20:18:11 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 23 20:18:24 crond[444]: time disparity of 865217 minutes detected
- Mar 23 20:19:50 hour monitor: ntp sync fail, will retry after 120 sec
- Mar 23 21:00:04 disk_monitor: Got SIGALRM...
- Mar 23 23:00:04 disk_monitor: Got SIGALRM...
- Mar 24 03:11:54 WAN Connection: Fail to connect with some issues.
- Mar 24 03:11:54 stop_nat_rules: apply the redirect_rules!
- Mar 24 03:11:54 pppd[495]: Connection terminated.
- Mar 24 03:11:54 pppd[495]: Modem hangup
- Mar 24 03:12:04 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 24 03:12:04 pppd[495]: Connect: ppp0 <--> vlan3880
- Mar 24 03:12:04 pppd[495]: CHAP authentication succeeded
- Mar 24 03:12:04 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 24 03:12:04 pppd[495]: local IP address 109.159.169.214
- Mar 24 03:12:04 pppd[495]: remote IP address 172.16.19.146
- Mar 24 03:12:04 rc_service: ip-up 7585:notify_rc start_firewall
- Mar 24 03:12:05 miniupnpd[835]: shutting down MiniUPnPd
- Mar 24 03:12:05 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 24 03:12:05 wan: finish adding multi routes
- Mar 24 03:12:05 rc_service: ip-up 7585:notify_rc stop_upnp
- Mar 24 03:12:05 rc_service: waitting "start_firewall" via ip-up ...
- Mar 24 03:12:06 miniupnpd[7620]: version 1.9 started
- Mar 24 03:12:06 miniupnpd[7620]: HTTP listening on port 52734
- Mar 24 03:12:06 miniupnpd[7620]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 24 03:12:06 rc_service: ip-up 7585:notify_rc start_upnp
- Mar 24 03:12:06 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 24 03:12:06 miniupnpd[7620]: shutting down MiniUPnPd
- Mar 24 03:12:07 ntp: start NTP update
- Mar 24 03:12:08 miniupnpd[7623]: version 1.9 started
- Mar 24 03:12:08 miniupnpd[7623]: HTTP listening on port 49508
- Mar 24 03:12:08 miniupnpd[7623]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 24 03:12:10 WAN Connection: WAN was restored.
- Mar 24 03:12:12 rc_service: ip-up 7585:notify_rc start_firewall
- Mar 24 03:12:13 miniupnpd[7623]: shutting down MiniUPnPd
- Mar 24 03:12:13 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 24 03:12:14 miniupnpd[7696]: version 1.9 started
- Mar 24 03:12:14 miniupnpd[7696]: HTTP listening on port 55225
- Mar 24 03:12:14 miniupnpd[7696]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 24 12:25:32 WAN Connection: Ethernet link down.
- Mar 24 12:25:32 stop_nat_rules: apply the redirect_rules!
- Mar 24 12:25:57 WAN Connection: WAN was restored.
- Mar 24 12:25:57 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 24 15:12:05 ntp: start NTP update
- Mar 24 23:11:14 WAN Connection: Fail to connect with some issues.
- Mar 24 23:11:14 stop_nat_rules: apply the redirect_rules!
- Mar 24 23:11:14 pppd[495]: Connection terminated.
- Mar 24 23:11:14 pppd[495]: Modem hangup
- Mar 24 23:11:24 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 24 23:11:24 pppd[495]: Connect: ppp0 <--> vlan3880
- Mar 24 23:11:25 pppd[495]: CHAP authentication succeeded
- Mar 24 23:11:25 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 24 23:11:25 pppd[495]: local IP address 86.155.181.10
- Mar 24 23:11:25 pppd[495]: remote IP address 172.16.19.146
- Mar 24 23:11:25 rc_service: ip-up 23309:notify_rc start_firewall
- Mar 24 23:11:25 miniupnpd[7696]: shutting down MiniUPnPd
- Mar 24 23:11:25 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 24 23:11:26 wan: finish adding multi routes
- Mar 24 23:11:26 rc_service: ip-up 23309:notify_rc stop_upnp
- Mar 24 23:11:26 rc_service: waitting "start_firewall" via ip-up ...
- Mar 24 23:11:26 miniupnpd[23345]: version 1.9 started
- Mar 24 23:11:26 miniupnpd[23345]: HTTP listening on port 57742
- Mar 24 23:11:26 miniupnpd[23345]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 24 23:11:27 rc_service: ip-up 23309:notify_rc start_upnp
- Mar 24 23:11:27 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 24 23:11:27 miniupnpd[23345]: shutting down MiniUPnPd
- Mar 24 23:11:28 ntp: start NTP update
- Mar 24 23:11:28 miniupnpd[23348]: version 1.9 started
- Mar 24 23:11:29 miniupnpd[23348]: HTTP listening on port 55838
- Mar 24 23:11:29 miniupnpd[23348]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 24 23:11:29 WAN Connection: WAN was restored.
- Mar 24 23:11:33 rc_service: ip-up 23309:notify_rc start_firewall
- Mar 24 23:11:33 miniupnpd[23348]: shutting down MiniUPnPd
- Mar 24 23:11:33 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 24 23:11:34 miniupnpd[23419]: version 1.9 started
- Mar 24 23:11:34 miniupnpd[23419]: HTTP listening on port 52688
- Mar 24 23:11:34 miniupnpd[23419]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 11:11:26 ntp: start NTP update
- Mar 25 19:00:44 rc_service: httpd 442:notify_rc start_webs_upgrade
- Mar 25 19:01:14 rc_service: httpd 442:notify_rc reboot
- Mar 25 19:01:15 pppd[495]: Connection terminated.
- Mar 25 19:01:17 iTunes: daemon is stoped
- Mar 25 19:01:17 FTP Server: daemon is stoped
- Mar 25 19:01:17 Samba Server: smb daemon is stoped
- Mar 25 19:01:17 kernel: gro disabled
- Mar 25 19:01:18 Timemachine: daemon is stoped
- Mar 25 19:01:18 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:26 miniupnpd[486]: version 1.9 started
- Aug 1 00:00:26 miniupnpd[486]: HTTP listening on port 42107
- Aug 1 00:00:26 miniupnpd[486]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 pppd[487]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[487]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[487]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[487]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[487]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 pppd[487]: local IP address 109.159.191.12
- Aug 1 00:00:27 pppd[487]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 508:notify_rc start_firewall
- Aug 1 00:00:27 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 508:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:29 kernel: SCSI subsystem initialized
- Aug 1 00:00:32 miniupnpd[486]: shutting down MiniUPnPd
- Aug 1 00:00:32 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:33 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:33 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:33 miniupnpd[689]: version 1.9 started
- Aug 1 00:00:33 miniupnpd[689]: HTTP listening on port 54842
- Aug 1 00:00:33 miniupnpd[689]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:34 rc_service: ip-up 508:notify_rc start_upnp
- Aug 1 00:00:34 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:34 miniupnpd[689]: shutting down MiniUPnPd
- Aug 1 00:00:34 WAN Connection: WAN was restored.
- Aug 1 00:00:35 miniupnpd[692]: version 1.9 started
- Aug 1 00:00:35 miniupnpd[692]: HTTP listening on port 34195
- Aug 1 00:00:35 miniupnpd[692]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:38 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:38 rc_service: zcip 706:notify_rc start_firewall
- Aug 1 00:00:38 zcip client: configured 169.254.71.195
- Aug 1 00:00:39 miniupnpd[692]: shutting down MiniUPnPd
- Aug 1 00:00:39 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:39 kernel: sizeof forward param = 160
- Aug 1 00:00:40 miniupnpd[734]: version 1.9 started
- Aug 1 00:00:40 miniupnpd[734]: HTTP listening on port 54249
- Aug 1 00:00:40 miniupnpd[734]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:43 rc_service: ip-up 508:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[734]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 miniupnpd[825]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[825]: HTTP listening on port 42987
- Aug 1 00:00:46 miniupnpd[825]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:01:09 ntp: start NTP update
- Mar 25 19:04:20 rc_service: ntp 691:notify_rc restart_upnp
- Mar 25 19:04:20 miniupnpd[825]: shutting down MiniUPnPd
- Mar 25 19:04:21 miniupnpd[844]: version 1.9 started
- Mar 25 19:04:21 miniupnpd[844]: already expired lease in lease file
- Mar 25 19:04:21 miniupnpd[844]: already expired lease in lease file
- Mar 25 19:04:21 miniupnpd[844]: HTTP listening on port 38921
- Mar 25 19:04:21 miniupnpd[844]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:04:21 rc_service: ntp 691:notify_rc restart_diskmon
- Mar 25 19:04:21 disk_monitor: Finish
- Mar 25 19:04:24 disk monitor: be idle
- Mar 25 19:05:11 crond[444]: time disparity of 868024 minutes detected
- Mar 25 19:05:36 hour monitor: ntp sync fail, will retry after 120 sec
- Mar 25 19:34:14 rc_service: httpd 442:notify_rc start_webs_upgrade
- Mar 25 19:39:34 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Mar 25 19:39:34 pppd[487]: Connection terminated.
- Mar 25 19:39:42 pppd[4369]: pppd 2.4.7 started by admin, uid 0
- Mar 25 19:39:43 pppd[4369]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 25 19:39:43 pppd[4369]: Connect: ppp0 <--> vlan3880
- Mar 25 19:39:45 pppd[4369]: CHAP authentication succeeded
- Mar 25 19:39:45 pppd[4369]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 25 19:39:45 pppd[4369]: local IP address 109.159.191.12
- Mar 25 19:39:45 pppd[4369]: remote IP address 172.16.19.146
- Mar 25 19:39:45 pppd[4369]: primary DNS address 81.139.56.100
- Mar 25 19:39:45 pppd[4369]: secondary DNS address 81.139.57.100
- Mar 25 19:39:45 rc_service: ip-up 4374:notify_rc start_firewall
- Mar 25 19:39:46 miniupnpd[844]: shutting down MiniUPnPd
- Mar 25 19:39:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:39:46 wan: finish adding multi routes
- Mar 25 19:39:46 rc_service: ip-up 4374:notify_rc stop_upnp
- Mar 25 19:39:46 rc_service: waitting "start_firewall" via ip-up ...
- Mar 25 19:39:47 miniupnpd[4410]: version 1.9 started
- Mar 25 19:39:47 miniupnpd[4410]: HTTP listening on port 50133
- Mar 25 19:39:47 miniupnpd[4410]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:39:47 rc_service: ip-up 4374:notify_rc start_upnp
- Mar 25 19:39:47 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 25 19:39:47 miniupnpd[4410]: shutting down MiniUPnPd
- Mar 25 19:39:49 miniupnpd[4413]: version 1.9 started
- Mar 25 19:39:49 miniupnpd[4413]: HTTP listening on port 38215
- Mar 25 19:39:49 miniupnpd[4413]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:39:53 rc_service: ip-up 4374:notify_rc start_firewall
- Mar 25 19:39:54 miniupnpd[4413]: shutting down MiniUPnPd
- Mar 25 19:39:54 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:39:55 ntp: start NTP update
- Mar 25 19:39:55 rc_service: zcip 4463:notify_rc start_firewall
- Mar 25 19:39:55 rc_service: waitting "start_firewall" via ...
- Mar 25 19:39:55 miniupnpd[4485]: version 1.9 started
- Mar 25 19:39:55 miniupnpd[4485]: HTTP listening on port 56563
- Mar 25 19:39:55 miniupnpd[4485]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:39:56 zcip client: configured 169.254.71.195
- Mar 25 19:39:57 miniupnpd[4485]: shutting down MiniUPnPd
- Mar 25 19:39:57 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:39:57 miniupnpd[4516]: version 1.9 started
- Mar 25 19:39:57 miniupnpd[4516]: HTTP listening on port 33356
- Mar 25 19:39:57 miniupnpd[4516]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:40:46 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Mar 25 19:40:47 pppd[4369]: Connection terminated.
- Mar 25 19:40:54 pppd[4627]: pppd 2.4.7 started by admin, uid 0
- Mar 25 19:40:55 pppd[4627]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 25 19:40:55 pppd[4627]: Connect: ppp0 <--> vlan3880
- Mar 25 19:40:57 pppd[4627]: CHAP authentication succeeded
- Mar 25 19:40:57 pppd[4627]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 25 19:40:57 pppd[4627]: local IP address 109.159.191.12
- Mar 25 19:40:57 pppd[4627]: remote IP address 172.16.19.146
- Mar 25 19:40:57 rc_service: ip-up 4634:notify_rc start_firewall
- Mar 25 19:40:58 miniupnpd[4516]: shutting down MiniUPnPd
- Mar 25 19:40:58 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:40:58 wan: finish adding multi routes
- Mar 25 19:40:58 rc_service: ip-up 4634:notify_rc stop_upnp
- Mar 25 19:40:58 rc_service: waitting "start_firewall" via ip-up ...
- Mar 25 19:40:59 miniupnpd[4669]: version 1.9 started
- Mar 25 19:40:59 miniupnpd[4669]: HTTP listening on port 47177
- Mar 25 19:40:59 miniupnpd[4669]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:40:59 rc_service: ip-up 4634:notify_rc start_upnp
- Mar 25 19:40:59 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 25 19:40:59 miniupnpd[4669]: shutting down MiniUPnPd
- Mar 25 19:41:00 ntp: start NTP update
- Mar 25 19:41:01 miniupnpd[4672]: version 1.9 started
- Mar 25 19:41:01 miniupnpd[4672]: HTTP listening on port 57439
- Mar 25 19:41:01 miniupnpd[4672]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:41:05 rc_service: ip-up 4634:notify_rc start_firewall
- Mar 25 19:41:06 miniupnpd[4672]: shutting down MiniUPnPd
- Mar 25 19:41:06 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:41:07 rc_service: zcip 4760:notify_rc start_firewall
- Mar 25 19:41:07 rc_service: waitting "start_firewall" via ...
- Mar 25 19:41:07 miniupnpd[4781]: version 1.9 started
- Mar 25 19:41:07 miniupnpd[4781]: HTTP listening on port 33478
- Mar 25 19:41:07 miniupnpd[4781]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 19:41:08 zcip client: configured 169.254.71.195
- Mar 25 19:41:08 miniupnpd[4781]: shutting down MiniUPnPd
- Mar 25 19:41:08 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 19:41:09 miniupnpd[4811]: version 1.9 started
- Mar 25 19:41:09 miniupnpd[4811]: HTTP listening on port 45459
- Mar 25 19:41:09 miniupnpd[4811]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 23:04:24 disk_monitor: Got SIGALRM...
- Mar 25 23:11:17 pppd[4627]: Connection terminated.
- Mar 25 23:11:17 pppd[4627]: Modem hangup
- Mar 25 23:11:18 WAN Connection: Fail to connect with some issues.
- Mar 25 23:11:18 stop_nat_rules: apply the redirect_rules!
- Mar 25 23:11:27 pppd[4627]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 25 23:11:27 pppd[4627]: Connect: ppp0 <--> vlan3880
- Mar 25 23:11:27 pppd[4627]: CHAP authentication succeeded
- Mar 25 23:11:27 pppd[4627]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 25 23:11:27 pppd[4627]: local IP address 86.142.17.232
- Mar 25 23:11:27 pppd[4627]: remote IP address 172.16.19.146
- Mar 25 23:11:27 rc_service: ip-up 24475:notify_rc start_firewall
- Mar 25 23:11:28 wan: finish adding multi routes
- Mar 25 23:11:28 miniupnpd[4811]: shutting down MiniUPnPd
- Mar 25 23:11:28 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 23:11:28 rc_service: ip-up 24475:notify_rc stop_upnp
- Mar 25 23:11:28 rc_service: waitting "start_firewall" via ip-up ...
- Mar 25 23:11:29 miniupnpd[24510]: version 1.9 started
- Mar 25 23:11:29 miniupnpd[24510]: HTTP listening on port 44520
- Mar 25 23:11:29 miniupnpd[24510]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 23:11:29 rc_service: ip-up 24475:notify_rc start_upnp
- Mar 25 23:11:29 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 25 23:11:29 miniupnpd[24510]: shutting down MiniUPnPd
- Mar 25 23:11:30 ntp: start NTP update
- Mar 25 23:11:31 miniupnpd[24517]: version 1.9 started
- Mar 25 23:11:31 miniupnpd[24517]: HTTP listening on port 51058
- Mar 25 23:11:32 miniupnpd[24517]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 25 23:11:33 WAN Connection: WAN was restored.
- Mar 25 23:11:36 rc_service: ip-up 24475:notify_rc start_firewall
- Mar 25 23:11:37 miniupnpd[24517]: shutting down MiniUPnPd
- Mar 25 23:11:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 25 23:11:38 miniupnpd[24620]: version 1.9 started
- Mar 25 23:11:38 miniupnpd[24620]: HTTP listening on port 42732
- Mar 25 23:11:38 miniupnpd[24620]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 26 11:11:31 ntp: start NTP update
- Mar 26 20:43:18 rc_service: httpd 442:notify_rc reboot
- Mar 26 20:43:19 pppd[4627]: Connection terminated.
- Mar 26 20:43:20 iTunes: daemon is stoped
- Mar 26 20:43:20 FTP Server: daemon is stoped
- Mar 26 20:43:20 Samba Server: smb daemon is stoped
- Mar 26 20:43:20 kernel: gro disabled
- Mar 26 20:43:21 Timemachine: daemon is stoped
- Mar 26 20:43:21 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:16 kernel: Found a AMD NAND flash:
- Aug 1 00:00:16 kernel: Total size: 128MB
- Aug 1 00:00:16 kernel: Block size: 128KB
- Aug 1 00:00:16 kernel: Page Size: 2048B
- Aug 1 00:00:16 kernel: OOB Size: 64B
- Aug 1 00:00:16 kernel: Sector size: 512B
- Aug 1 00:00:16 kernel: Spare size: 16B
- Aug 1 00:00:16 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:27 miniupnpd[484]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[484]: HTTP listening on port 37829
- Aug 1 00:00:27 miniupnpd[484]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[488]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[488]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:28 pppd[488]: CHAP authentication succeeded
- Aug 1 00:00:28 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:28 pppd[488]: local IP address 109.159.160.148
- Aug 1 00:00:28 pppd[488]: remote IP address 172.16.19.146
- Aug 1 00:00:28 rc_service: ip-up 509:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 509:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:30 kernel: SCSI subsystem initialized
- Aug 1 00:00:32 miniupnpd[484]: shutting down MiniUPnPd
- Aug 1 00:00:33 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:33 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:33 miniupnpd[690]: version 1.9 started
- Aug 1 00:00:33 miniupnpd[690]: HTTP listening on port 37094
- Aug 1 00:00:33 miniupnpd[690]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:34 rc_service: ip-up 509:notify_rc start_upnp
- Aug 1 00:00:34 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:34 miniupnpd[690]: shutting down MiniUPnPd
- Aug 1 00:00:35 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:35 miniupnpd[693]: HTTP listening on port 40893
- Aug 1 00:00:35 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:37 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:37 kernel: sizeof forward param = 160
- Aug 1 00:00:38 rc_service: zcip 710:notify_rc start_firewall
- Aug 1 00:00:38 zcip client: configured 169.254.71.195
- Aug 1 00:00:39 miniupnpd[693]: shutting down MiniUPnPd
- Aug 1 00:00:40 miniupnpd[733]: version 1.9 started
- Aug 1 00:00:40 miniupnpd[733]: HTTP listening on port 56330
- Aug 1 00:00:40 miniupnpd[733]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:42 rc_service: ip-up 509:notify_rc start_firewall
- Aug 1 00:00:43 miniupnpd[733]: shutting down MiniUPnPd
- Aug 1 00:00:43 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:43 WAN Connection: WAN was restored.
- Aug 1 00:00:44 miniupnpd[817]: version 1.9 started
- Aug 1 00:00:44 miniupnpd[817]: HTTP listening on port 46775
- Aug 1 00:00:44 miniupnpd[817]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:45 ntp: start NTP update
- Mar 26 20:46:00 rc_service: ntp 692:notify_rc restart_upnp
- Mar 26 20:46:00 miniupnpd[817]: shutting down MiniUPnPd
- Mar 26 20:46:00 miniupnpd[829]: version 1.9 started
- Mar 26 20:46:00 miniupnpd[829]: HTTP listening on port 60962
- Mar 26 20:46:00 miniupnpd[829]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 26 20:46:01 rc_service: ntp 692:notify_rc restart_diskmon
- Mar 26 20:46:01 disk_monitor: Finish
- Mar 26 20:46:02 disk monitor: be idle
- Mar 26 20:46:16 crond[444]: time disparity of 869565 minutes detected
- Mar 26 20:47:41 hour monitor: ntp sync fail, will retry after 120 sec
- Mar 26 21:00:02 disk_monitor: Got SIGALRM...
- Mar 26 22:12:03 pppd[488]: Connection terminated.
- Mar 26 22:12:03 pppd[488]: Modem hangup
- Mar 26 22:12:04 WAN Connection: Fail to connect with some issues.
- Mar 26 22:12:04 stop_nat_rules: apply the redirect_rules!
- Mar 26 22:12:14 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 26 22:12:14 pppd[488]: Connect: ppp0 <--> vlan3880
- Mar 26 22:12:14 pppd[488]: CHAP authentication succeeded
- Mar 26 22:12:14 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 26 22:12:14 pppd[488]: local IP address 109.159.160.148
- Mar 26 22:12:14 pppd[488]: remote IP address 172.16.19.146
- Mar 26 22:12:14 rc_service: ip-up 9140:notify_rc start_firewall
- Mar 26 22:12:14 miniupnpd[829]: shutting down MiniUPnPd
- Mar 26 22:12:14 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 26 22:12:14 WAN Connection: WAN was restored.
- Mar 26 22:12:15 wan: finish adding multi routes
- Mar 26 22:12:15 rc_service: ip-up 9140:notify_rc stop_upnp
- Mar 26 22:12:15 rc_service: waitting "start_firewall" via ip-up ...
- Mar 26 22:12:15 miniupnpd[9176]: version 1.9 started
- Mar 26 22:12:15 miniupnpd[9176]: HTTP listening on port 50742
- Mar 26 22:12:15 miniupnpd[9176]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 26 22:12:16 rc_service: ip-up 9140:notify_rc start_upnp
- Mar 26 22:12:16 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 26 22:12:16 miniupnpd[9176]: shutting down MiniUPnPd
- Mar 26 22:12:17 miniupnpd[9214]: version 1.9 started
- Mar 26 22:12:17 miniupnpd[9214]: HTTP listening on port 38404
- Mar 26 22:12:17 miniupnpd[9214]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 26 22:12:20 ntp: start NTP update
- Mar 26 22:12:22 rc_service: ip-up 9140:notify_rc start_firewall
- Mar 26 22:12:22 miniupnpd[9214]: shutting down MiniUPnPd
- Mar 26 22:12:22 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 26 22:12:23 miniupnpd[9287]: version 1.9 started
- Mar 26 22:12:23 miniupnpd[9287]: HTTP listening on port 35236
- Mar 26 22:12:23 miniupnpd[9287]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 26 23:00:02 disk_monitor: Got SIGALRM...
- Mar 27 10:12:17 ntp: start NTP update
- Mar 27 11:40:55 WAN Connection: Ethernet link down.
- Mar 27 11:40:55 stop_nat_rules: apply the redirect_rules!
- Mar 27 11:41:15 WAN Connection: WAN was restored.
- Mar 27 11:41:15 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 27 12:00:29 miniupnpd[9287]: upnp_event_recv: recv(): Connection reset by peer
- Mar 27 22:11:02 pppd[488]: Connection terminated.
- Mar 27 22:11:02 pppd[488]: Modem hangup
- Mar 27 22:11:04 WAN Connection: Fail to connect with some issues.
- Mar 27 22:11:04 stop_nat_rules: apply the redirect_rules!
- Mar 27 22:11:12 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Mar 27 22:11:12 pppd[488]: Connect: ppp0 <--> vlan3880
- Mar 27 22:11:12 pppd[488]: CHAP authentication succeeded
- Mar 27 22:11:12 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Mar 27 22:11:12 pppd[488]: local IP address 109.159.160.107
- Mar 27 22:11:12 pppd[488]: remote IP address 172.16.19.146
- Mar 27 22:11:12 rc_service: ip-up 14928:notify_rc start_firewall
- Mar 27 22:11:13 miniupnpd[9287]: shutting down MiniUPnPd
- Mar 27 22:11:13 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 27 22:11:13 wan: finish adding multi routes
- Mar 27 22:11:13 rc_service: ip-up 14928:notify_rc stop_upnp
- Mar 27 22:11:13 rc_service: waitting "start_firewall" via ip-up ...
- Mar 27 22:11:14 miniupnpd[14964]: version 1.9 started
- Mar 27 22:11:14 miniupnpd[14964]: HTTP listening on port 42799
- Mar 27 22:11:14 miniupnpd[14964]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 27 22:11:14 rc_service: ip-up 14928:notify_rc start_upnp
- Mar 27 22:11:14 rc_service: waitting "stop_upnp" via ip-up ...
- Mar 27 22:11:14 miniupnpd[14964]: shutting down MiniUPnPd
- Mar 27 22:11:15 WAN Connection: WAN was restored.
- Mar 27 22:11:15 ntp: start NTP update
- Mar 27 22:11:16 miniupnpd[14968]: version 1.9 started
- Mar 27 22:11:16 miniupnpd[14968]: HTTP listening on port 40567
- Mar 27 22:11:16 miniupnpd[14968]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 27 22:11:20 rc_service: ip-up 14928:notify_rc start_firewall
- Mar 27 22:11:21 miniupnpd[14968]: shutting down MiniUPnPd
- Mar 27 22:11:21 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Mar 27 22:11:22 miniupnpd[15039]: version 1.9 started
- Mar 27 22:11:22 miniupnpd[15039]: HTTP listening on port 58840
- Mar 27 22:11:22 miniupnpd[15039]: Listening for NAT-PMP/PCP traffic on port 5351
- Mar 28 10:11:14 ntp: start NTP update
- Mar 28 22:11:11 ntp: start NTP update
- Mar 29 10:11:09 ntp: start NTP update
- Mar 29 22:11:09 ntp: start NTP update
- Mar 30 10:11:07 ntp: start NTP update
- Mar 30 22:11:07 ntp: start NTP update
- Mar 31 10:11:05 ntp: start NTP update
- Mar 31 22:11:03 ntp: start NTP update
- Apr 1 10:11:01 ntp: start NTP update
- Apr 1 22:11:01 ntp: start NTP update
- Apr 2 10:10:59 ntp: start NTP update
- Apr 2 20:24:46 rc_service: httpd 442:notify_rc reboot
- Apr 2 20:24:47 pppd[488]: Connection terminated.
- Apr 2 20:24:48 iTunes: daemon is stoped
- Apr 2 20:24:48 FTP Server: daemon is stoped
- Apr 2 20:24:48 Samba Server: smb daemon is stoped
- Apr 2 20:24:48 kernel: gro disabled
- Apr 2 20:24:48 Timemachine: daemon is stoped
- Apr 2 20:24:48 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: * Invalid signature of oopsbuf: B7-F7-BE-DB-BA-BB-DA-C3 (len 2945933181)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:16 kernel: Found a AMD NAND flash:
- Aug 1 00:00:16 kernel: Total size: 128MB
- Aug 1 00:00:16 kernel: Block size: 128KB
- Aug 1 00:00:16 kernel: Page Size: 2048B
- Aug 1 00:00:16 kernel: OOB Size: 64B
- Aug 1 00:00:16 kernel: Sector size: 512B
- Aug 1 00:00:16 kernel: Spare size: 16B
- Aug 1 00:00:16 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:17 kernel: Registering the dns_resolver key type
- Aug 1 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:17 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:17 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:17 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:17 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:17 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:25 DSL-AC68U: start httpd
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 miniupnpd[483]: version 1.9 started
- Aug 1 00:00:26 miniupnpd[483]: HTTP listening on port 41890
- Aug 1 00:00:26 miniupnpd[483]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:26 pppd[486]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:26 pppd[486]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:26 pppd[486]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[486]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[486]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[486]: local IP address 86.157.189.221
- Aug 1 00:00:27 pppd[486]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 500:notify_rc start_firewall
- Aug 1 00:00:27 wan: finish adding multi routes
- Aug 1 00:00:27 rc_service: ip-up 500:notify_rc stop_upnp
- Aug 1 00:00:27 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:28 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[483]: shutting down MiniUPnPd
- Aug 1 00:00:31 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[692]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[692]: HTTP listening on port 60215
- Aug 1 00:00:32 miniupnpd[692]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 WAN Connection: WAN was restored.
- Aug 1 00:00:33 rc_service: ip-up 500:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[692]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[696]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[696]: HTTP listening on port 37995
- Aug 1 00:00:35 miniupnpd[696]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 ntp: start NTP update
- Apr 2 20:32:47 rc_service: ntp 695:notify_rc restart_upnp
- Apr 2 20:32:47 miniupnpd[696]: shutting down MiniUPnPd
- Apr 2 20:32:47 miniupnpd[706]: version 1.9 started
- Apr 2 20:32:47 miniupnpd[706]: HTTP listening on port 43515
- Apr 2 20:32:47 miniupnpd[706]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:32:48 rc_service: ntp 695:notify_rc restart_diskmon
- Apr 2 20:32:48 disk_monitor: Finish
- Apr 2 20:32:48 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Apr 2 20:32:50 rc_service: zcip 716:notify_rc start_firewall
- Apr 2 20:32:50 zcip client: configured 169.254.71.195
- Apr 2 20:32:51 kernel: sizeof forward param = 160
- Apr 2 20:32:51 disk monitor: be idle
- Apr 2 20:32:51 miniupnpd[706]: shutting down MiniUPnPd
- Apr 2 20:32:52 miniupnpd[741]: version 1.9 started
- Apr 2 20:32:52 miniupnpd[741]: HTTP listening on port 33590
- Apr 2 20:32:52 miniupnpd[741]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:32:57 rc_service: ip-up 500:notify_rc start_firewall
- Apr 2 20:32:58 miniupnpd[741]: shutting down MiniUPnPd
- Apr 2 20:32:58 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 20:32:59 miniupnpd[833]: version 1.9 started
- Apr 2 20:32:59 miniupnpd[833]: HTTP listening on port 47901
- Apr 2 20:32:59 miniupnpd[833]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:33:12 crond[444]: time disparity of 879632 minutes detected
- Apr 2 20:34:37 hour monitor: ntp sync fail, will retry after 120 sec
- Apr 2 20:37:13 rc_service: httpd 442:notify_rc reboot
- Apr 2 20:37:14 pppd[486]: Connection terminated.
- Apr 2 20:37:16 iTunes: daemon is stoped
- Apr 2 20:37:16 FTP Server: daemon is stoped
- Apr 2 20:37:16 Samba Server: smb daemon is stoped
- Apr 2 20:37:16 kernel: gro disabled
- Apr 2 20:37:16 Timemachine: daemon is stoped
- Apr 2 20:37:16 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:16 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:16 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:16 kernel: Found a AMD NAND flash:
- Aug 1 00:00:16 kernel: Total size: 128MB
- Aug 1 00:00:16 kernel: Block size: 128KB
- Aug 1 00:00:16 kernel: Page Size: 2048B
- Aug 1 00:00:16 kernel: OOB Size: 64B
- Aug 1 00:00:16 kernel: Sector size: 512B
- Aug 1 00:00:16 kernel: Spare size: 16B
- Aug 1 00:00:16 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:17 kernel: Registering the dns_resolver key type
- Aug 1 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:17 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:17 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:17 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:17 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:17 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: Empty flash at 0x00f69260 ends at 0x00f69800
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:26 DSL-AC68U: start httpd
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:27 miniupnpd[482]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[482]: HTTP listening on port 58759
- Aug 1 00:00:27 miniupnpd[482]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[489]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[489]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[489]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:28 pppd[489]: CHAP authentication succeeded
- Aug 1 00:00:28 pppd[489]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:28 pppd[489]: local IP address 86.157.189.221
- Aug 1 00:00:28 pppd[489]: remote IP address 172.16.19.146
- Aug 1 00:00:28 rc_service: ip-up 508:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 508:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:30 kernel: SCSI subsystem initialized
- Aug 1 00:00:32 WAN Connection: WAN was restored.
- Aug 1 00:00:33 miniupnpd[482]: shutting down MiniUPnPd
- Aug 1 00:00:34 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:34 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:34 miniupnpd[688]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[688]: HTTP listening on port 45290
- Aug 1 00:00:34 miniupnpd[688]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 rc_service: ip-up 508:notify_rc start_upnp
- Aug 1 00:00:35 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:35 miniupnpd[688]: shutting down MiniUPnPd
- Aug 1 00:00:36 miniupnpd[691]: version 1.9 started
- Aug 1 00:00:36 miniupnpd[691]: HTTP listening on port 45824
- Aug 1 00:00:36 miniupnpd[691]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:38 ntp: start NTP update
- Apr 2 20:39:46 rc_service: zcip 699:notify_rc start_firewall
- Apr 2 20:39:46 zcip client: configured 169.254.71.195
- Apr 2 20:39:47 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Apr 2 20:39:47 miniupnpd[691]: shutting down MiniUPnPd
- Apr 2 20:39:47 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 20:39:48 rc_service: ntp 690:notify_rc restart_upnp
- Apr 2 20:39:48 rc_service: waitting "start_firewall" via ...
- Apr 2 20:39:49 miniupnpd[730]: version 1.9 started
- Apr 2 20:39:49 miniupnpd[730]: HTTP listening on port 56971
- Apr 2 20:39:49 miniupnpd[730]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:39:49 kernel: sizeof forward param = 160
- Apr 2 20:39:49 miniupnpd[730]: shutting down MiniUPnPd
- Apr 2 20:39:50 miniupnpd[736]: version 1.9 started
- Apr 2 20:39:50 miniupnpd[736]: HTTP listening on port 57722
- Apr 2 20:39:50 miniupnpd[736]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:39:50 rc_service: ntp 690:notify_rc restart_diskmon
- Apr 2 20:39:50 disk_monitor: Finish
- Apr 2 20:39:54 disk monitor: be idle
- Apr 2 20:39:56 rc_service: ip-up 508:notify_rc start_firewall
- Apr 2 20:39:57 miniupnpd[736]: shutting down MiniUPnPd
- Apr 2 20:39:57 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 20:39:58 miniupnpd[835]: version 1.9 started
- Apr 2 20:39:58 miniupnpd[835]: HTTP listening on port 59813
- Apr 2 20:39:58 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 20:40:08 crond[444]: time disparity of 879639 minutes detected
- Apr 2 20:41:34 hour monitor: ntp sync fail, will retry after 120 sec
- Apr 2 21:00:54 disk_monitor: Got SIGALRM...
- Apr 2 21:18:27 rc_service: httpd 442:notify_rc reboot
- Apr 2 21:18:28 pppd[489]: Connection terminated.
- Apr 2 21:18:29 iTunes: daemon is stoped
- Apr 2 21:18:29 FTP Server: daemon is stoped
- Apr 2 21:18:29 Samba Server: smb daemon is stoped
- Apr 2 21:18:29 kernel: gro disabled
- Apr 2 21:18:30 Timemachine: daemon is stoped
- Apr 2 21:18:30 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:16 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:16 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:16 kernel: Found a AMD NAND flash:
- Aug 1 00:00:16 kernel: Total size: 128MB
- Aug 1 00:00:16 kernel: Block size: 128KB
- Aug 1 00:00:16 kernel: Page Size: 2048B
- Aug 1 00:00:16 kernel: OOB Size: 64B
- Aug 1 00:00:16 kernel: Sector size: 512B
- Aug 1 00:00:16 kernel: Spare size: 16B
- Aug 1 00:00:16 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:17 kernel: Registering the dns_resolver key type
- Aug 1 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:17 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:17 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:17 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:17 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:17 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:26 DSL-AC68U: start httpd
- Aug 1 00:00:26 disk monitor: be idle
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:26 hour monitor: daemon is starting
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 miniupnpd[487]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[487]: HTTP listening on port 38045
- Aug 1 00:00:27 miniupnpd[487]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 pppd[495]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[495]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[495]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:27 pppd[495]: local IP address 86.157.189.200
- Aug 1 00:00:27 pppd[495]: remote IP address 172.16.19.146
- Aug 1 00:00:27 rc_service: ip-up 508:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 508:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:29 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[487]: shutting down MiniUPnPd
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[690]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[690]: HTTP listening on port 44294
- Aug 1 00:00:32 miniupnpd[690]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 rc_service: ip-up 508:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[690]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[693]: HTTP listening on port 53408
- Aug 1 00:00:34 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:36 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:36 kernel: sizeof forward param = 160
- Aug 1 00:00:37 WAN Connection: WAN was restored.
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:38 ntp: start NTP update
- Aug 1 00:00:38 rc_service: zcip 715:notify_rc start_firewall
- Aug 1 00:00:38 zcip client: configured 169.254.71.195
- Apr 2 21:20:59 miniupnpd[693]: shutting down MiniUPnPd
- Apr 2 21:20:59 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 21:20:59 rc_service: ntp 692:notify_rc restart_upnp
- Apr 2 21:20:59 rc_service: waitting "start_firewall" via ...
- Apr 2 21:21:00 miniupnpd[747]: version 1.9 started
- Apr 2 21:21:00 miniupnpd[747]: HTTP listening on port 38327
- Apr 2 21:21:00 miniupnpd[747]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:21:00 miniupnpd[747]: shutting down MiniUPnPd
- Apr 2 21:21:01 miniupnpd[759]: version 1.9 started
- Apr 2 21:21:01 miniupnpd[759]: HTTP listening on port 57650
- Apr 2 21:21:01 miniupnpd[759]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:21:01 rc_service: ntp 692:notify_rc restart_diskmon
- Apr 2 21:21:01 disk_monitor: Finish
- Apr 2 21:21:05 disk monitor: be idle
- Apr 2 21:21:07 rc_service: ip-up 508:notify_rc start_firewall
- Apr 2 21:21:08 miniupnpd[759]: shutting down MiniUPnPd
- Apr 2 21:21:08 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 21:21:08 miniupnpd[835]: version 1.9 started
- Apr 2 21:21:08 miniupnpd[835]: HTTP listening on port 34581
- Apr 2 21:21:08 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:21:21 crond[445]: time disparity of 879680 minutes detected
- Apr 2 21:22:46 hour monitor: ntp sync fail, will retry after 120 sec
- Apr 2 21:29:16 rc_service: httpd 443:notify_rc reboot
- Apr 2 21:29:17 pppd[495]: Connection terminated.
- Apr 2 21:29:19 iTunes: daemon is stoped
- Apr 2 21:29:19 FTP Server: daemon is stoped
- Apr 2 21:29:19 Samba Server: smb daemon is stoped
- Apr 2 21:29:19 kernel: gro disabled
- Apr 2 21:29:19 Timemachine: daemon is stoped
- Apr 2 21:29:19 WEBDAV Server: daemon is stoped
- Aug 1 00:00:15 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:15 kernel: Machine: Northstar Prototype
- Aug 1 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:15 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:15 kernel: Virtual kernel memory layout:
- Aug 1 00:00:15 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:15 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:15 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:15 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:15 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:15 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:15 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:15 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:15 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:15 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:16 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:16 kernel: Found a AMD NAND flash:
- Aug 1 00:00:16 kernel: Total size: 128MB
- Aug 1 00:00:16 kernel: Block size: 128KB
- Aug 1 00:00:16 kernel: Page Size: 2048B
- Aug 1 00:00:16 kernel: OOB Size: 64B
- Aug 1 00:00:16 kernel: Sector size: 512B
- Aug 1 00:00:16 kernel: Spare size: 16B
- Aug 1 00:00:16 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:16 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:16 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: no core
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:16 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:16 kernel: pflash: found no supported devices
- Aug 1 00:00:16 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:16 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:16 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:16 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:17 kernel: Registering the dns_resolver key type
- Aug 1 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:17 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:17 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:17 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:17 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:17 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:17 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:17 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:17 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:17 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:17 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:17 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:17 WAN Connection: Ethernet link down.
- Aug 1 00:00:26 DSL-AC68U: start httpd
- Aug 1 00:00:26 jffs2: valid logs(1)
- Aug 1 00:00:27 hour monitor: daemon is starting
- Aug 1 00:00:27 disk monitor: be idle
- Aug 1 00:00:27 miniupnpd[486]: version 1.9 started
- Aug 1 00:00:27 miniupnpd[486]: HTTP listening on port 32928
- Aug 1 00:00:27 miniupnpd[486]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:27 syslog: Generating SSL certificate...
- Aug 1 00:00:27 pppd[492]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 pppd[492]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:27 pppd[492]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:27 pppd[492]: CHAP authentication succeeded
- Aug 1 00:00:27 pppd[492]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:28 pppd[492]: local IP address 86.157.189.249
- Aug 1 00:00:28 pppd[492]: remote IP address 172.16.19.146
- Aug 1 00:00:28 rc_service: ip-up 506:notify_rc start_firewall
- Aug 1 00:00:28 wan: finish adding multi routes
- Aug 1 00:00:28 rc_service: ip-up 506:notify_rc stop_upnp
- Aug 1 00:00:28 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:29 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 miniupnpd[486]: shutting down MiniUPnPd
- Aug 1 00:00:31 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:32 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:32 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:32 miniupnpd[693]: version 1.9 started
- Aug 1 00:00:32 miniupnpd[693]: HTTP listening on port 51263
- Aug 1 00:00:32 miniupnpd[693]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:33 WAN Connection: WAN was restored.
- Aug 1 00:00:33 rc_service: ip-up 506:notify_rc start_upnp
- Aug 1 00:00:33 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:33 miniupnpd[693]: shutting down MiniUPnPd
- Aug 1 00:00:34 miniupnpd[696]: version 1.9 started
- Aug 1 00:00:34 miniupnpd[696]: HTTP listening on port 58241
- Aug 1 00:00:34 miniupnpd[696]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:35 ntp: start NTP update
- Apr 2 21:31:42 rc_service: ntp 695:notify_rc restart_upnp
- Apr 2 21:31:43 miniupnpd[696]: shutting down MiniUPnPd
- Apr 2 21:31:43 miniupnpd[709]: version 1.9 started
- Apr 2 21:31:43 miniupnpd[709]: HTTP listening on port 38431
- Apr 2 21:31:43 miniupnpd[709]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:31:43 rc_service: ntp 695:notify_rc restart_diskmon
- Apr 2 21:31:43 disk_monitor: Finish
- Apr 2 21:31:45 rc_service: zcip 715:notify_rc start_firewall
- Apr 2 21:31:45 zcip client: configured 169.254.71.195
- Apr 2 21:31:46 disk monitor: be idle
- Apr 2 21:31:46 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Apr 2 21:31:46 miniupnpd[709]: shutting down MiniUPnPd
- Apr 2 21:31:47 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 21:31:47 kernel: sizeof forward param = 160
- Apr 2 21:31:47 miniupnpd[741]: version 1.9 started
- Apr 2 21:31:47 miniupnpd[741]: HTTP listening on port 55286
- Apr 2 21:31:47 miniupnpd[741]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:31:52 rc_service: ip-up 506:notify_rc start_firewall
- Apr 2 21:31:53 miniupnpd[741]: shutting down MiniUPnPd
- Apr 2 21:31:53 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 2 21:31:54 miniupnpd[835]: version 1.9 started
- Apr 2 21:31:54 miniupnpd[835]: HTTP listening on port 36956
- Apr 2 21:31:54 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 2 21:32:07 crond[444]: time disparity of 879691 minutes detected
- Apr 2 21:33:33 hour monitor: ntp sync fail, will retry after 120 sec
- Apr 2 22:00:46 disk_monitor: Got SIGALRM...
- Apr 2 23:00:46 disk_monitor: Got SIGALRM...
- Apr 3 09:31:40 ntp: start NTP update
- Apr 3 21:31:38 ntp: start NTP update
- Apr 4 09:31:36 ntp: start NTP update
- Apr 4 21:31:33 ntp: start NTP update
- Apr 5 09:31:31 ntp: start NTP update
- Apr 5 21:31:29 ntp: start NTP update
- Apr 6 09:31:26 ntp: start NTP update
- Apr 6 21:31:24 ntp: start NTP update
- Apr 7 09:31:24 ntp: start NTP update
- Apr 7 11:21:53 kernel: SKIPPED false Type 1 Radar Detection. min_pw=7 pw_delta=0 pri=61079 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 395425, = 6590min 25sec. Detected pulse index: 0
- Apr 7 11:21:54 kernel: Type 1 Radar Detection. Detected pulse index=4 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 0, = 0min 0sec
- Apr 7 21:31:22 ntp: start NTP update
- Apr 8 09:31:20 ntp: start NTP update
- Apr 8 21:31:18 ntp: start NTP update
- Apr 9 09:31:18 ntp: start NTP update
- Apr 9 21:31:16 ntp: start NTP update
- Apr 10 09:31:13 ntp: start NTP update
- Apr 10 21:31:11 ntp: start NTP update
- Apr 11 02:01:04 rc_service: rc 7520:notify_rc restart_wrs
- Apr 11 09:31:09 ntp: start NTP update
- Apr 11 21:31:06 ntp: start NTP update
- Apr 12 09:31:04 ntp: start NTP update
- Apr 12 21:31:02 ntp: start NTP update
- Apr 13 09:31:02 ntp: start NTP update
- Apr 13 11:45:22 WAN Connection: Ethernet link down.
- Apr 13 11:45:22 stop_nat_rules: apply the redirect_rules!
- Apr 13 11:45:44 WAN Connection: WAN was restored.
- Apr 13 11:45:44 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 13 21:31:00 ntp: start NTP update
- Apr 14 09:30:58 ntp: start NTP update
- Apr 14 21:30:55 ntp: start NTP update
- Apr 14 22:10:55 WAN Connection: Fail to connect with some issues.
- Apr 14 22:10:55 stop_nat_rules: apply the redirect_rules!
- Apr 14 22:10:56 pppd[492]: Connection terminated.
- Apr 14 22:10:56 pppd[492]: Modem hangup
- Apr 14 22:11:06 pppd[492]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Apr 14 22:11:06 pppd[492]: Connect: ppp0 <--> vlan3880
- Apr 14 22:11:07 pppd[492]: CHAP authentication succeeded
- Apr 14 22:11:07 pppd[492]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Apr 14 22:11:07 pppd[492]: local IP address 86.157.189.249
- Apr 14 22:11:07 pppd[492]: remote IP address 172.16.19.146
- Apr 14 22:11:07 rc_service: ip-up 8808:notify_rc start_firewall
- Apr 14 22:11:08 miniupnpd[835]: shutting down MiniUPnPd
- Apr 14 22:11:08 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 14 22:11:08 wan: finish adding multi routes
- Apr 14 22:11:08 rc_service: ip-up 8808:notify_rc stop_upnp
- Apr 14 22:11:08 rc_service: waitting "start_firewall" via ip-up ...
- Apr 14 22:11:08 miniupnpd[8843]: version 1.9 started
- Apr 14 22:11:08 miniupnpd[8843]: HTTP listening on port 45286
- Apr 14 22:11:08 miniupnpd[8843]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 14 22:11:09 rc_service: ip-up 8808:notify_rc start_upnp
- Apr 14 22:11:09 rc_service: waitting "stop_upnp" via ip-up ...
- Apr 14 22:11:09 miniupnpd[8843]: shutting down MiniUPnPd
- Apr 14 22:11:10 ntp: start NTP update
- Apr 14 22:11:10 miniupnpd[8847]: version 1.9 started
- Apr 14 22:11:10 WAN Connection: WAN was restored.
- Apr 14 22:11:11 miniupnpd[8847]: HTTP listening on port 51744
- Apr 14 22:11:11 miniupnpd[8847]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 14 22:11:14 rc_service: ip-up 8808:notify_rc start_firewall
- Apr 14 22:11:15 miniupnpd[8847]: shutting down MiniUPnPd
- Apr 14 22:11:15 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 14 22:11:16 miniupnpd[8955]: version 1.9 started
- Apr 14 22:11:16 miniupnpd[8955]: HTTP listening on port 58509
- Apr 14 22:11:16 miniupnpd[8955]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 15 02:01:26 rc_service: rc 30598:notify_rc restart_wrs
- Apr 15 10:11:08 ntp: start NTP update
- Apr 15 10:34:21 WAN Connection: Ethernet link down.
- Apr 15 10:34:21 stop_nat_rules: apply the redirect_rules!
- Apr 15 10:34:45 WAN Connection: WAN was restored.
- Apr 15 10:34:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 15 22:11:06 ntp: start NTP update
- Apr 15 22:11:07 pppd[492]: Connection terminated.
- Apr 15 22:11:08 pppd[492]: Modem hangup
- Apr 15 22:11:09 WAN Connection: Fail to connect with some issues.
- Apr 15 22:11:09 stop_nat_rules: apply the redirect_rules!
- Apr 15 22:11:18 pppd[492]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Apr 15 22:11:18 pppd[492]: Connect: ppp0 <--> vlan3880
- Apr 15 22:11:18 pppd[492]: CHAP authentication succeeded
- Apr 15 22:11:18 pppd[492]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Apr 15 22:11:18 pppd[492]: local IP address 86.142.17.228
- Apr 15 22:11:18 pppd[492]: remote IP address 172.16.19.146
- Apr 15 22:11:18 rc_service: ip-up 14817:notify_rc start_firewall
- Apr 15 22:11:19 WAN Connection: WAN was restored.
- Apr 15 22:11:19 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 15 22:11:19 wan: finish adding multi routes
- Apr 15 22:11:19 rc_service: ip-up 14817:notify_rc stop_upnp
- Apr 15 22:11:19 rc_service: waitting "start_firewall" via ip-up ...
- Apr 15 22:11:19 miniupnpd[8955]: shutting down MiniUPnPd
- Apr 15 22:11:19 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 15 22:11:20 miniupnpd[14854]: version 1.9 started
- Apr 15 22:11:20 miniupnpd[14854]: HTTP listening on port 43030
- Apr 15 22:11:20 miniupnpd[14854]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 15 22:11:20 rc_service: ip-up 14817:notify_rc start_upnp
- Apr 15 22:11:20 rc_service: waitting "stop_upnp" via ip-up ...
- Apr 15 22:11:20 miniupnpd[14854]: shutting down MiniUPnPd
- Apr 15 22:11:21 miniupnpd[14857]: version 1.9 started
- Apr 15 22:11:21 miniupnpd[14857]: HTTP listening on port 36263
- Apr 15 22:11:21 miniupnpd[14857]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 15 22:11:24 ntp: start NTP update
- Apr 15 22:11:27 rc_service: ip-up 14817:notify_rc start_firewall
- Apr 15 22:11:27 miniupnpd[14857]: shutting down MiniUPnPd
- Apr 15 22:11:27 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Apr 15 22:11:28 miniupnpd[14930]: version 1.9 started
- Apr 15 22:11:28 miniupnpd[14930]: HTTP listening on port 52931
- Apr 15 22:11:28 miniupnpd[14930]: Listening for NAT-PMP/PCP traffic on port 5351
- Apr 16 10:11:22 ntp: start NTP update
- Apr 16 22:03:23 miniupnpd[14930]: HTTP Connection from 192.168.1.167 closed unexpectedly
- Apr 16 22:11:20 ntp: start NTP update
- Apr 17 10:11:20 ntp: start NTP update
- Apr 17 22:11:18 ntp: start NTP update
- Apr 18 10:11:18 ntp: start NTP update
- Apr 18 22:11:17 ntp: start NTP update
- Apr 19 10:11:15 ntp: start NTP update
- Apr 19 22:11:13 ntp: start NTP update
- Apr 20 10:11:13 ntp: start NTP update
- Apr 20 22:11:11 ntp: start NTP update
- Apr 21 10:11:09 ntp: start NTP update
- Apr 21 22:11:06 ntp: start NTP update
- Apr 22 10:11:04 ntp: start NTP update
- Apr 22 22:11:02 ntp: start NTP update
- Apr 23 10:11:02 ntp: start NTP update
- Apr 23 22:11:00 ntp: start NTP update
- Apr 24 10:11:00 ntp: start NTP update
- Apr 24 22:10:58 ntp: start NTP update
- Apr 25 10:10:58 ntp: start NTP update
- Apr 25 22:10:57 ntp: start NTP update
- Apr 26 10:10:57 ntp: start NTP update
- Apr 26 22:10:55 ntp: start NTP update
- Apr 27 10:10:55 ntp: start NTP update
- Apr 27 22:10:53 ntp: start NTP update
- Apr 28 10:10:53 ntp: start NTP update
- Apr 28 22:10:51 ntp: start NTP update
- Apr 29 10:10:51 ntp: start NTP update
- Apr 29 22:10:50 ntp: start NTP update
- Apr 30 10:10:47 ntp: start NTP update
- Apr 30 22:10:45 ntp: start NTP update
- May 1 10:10:45 ntp: start NTP update
- May 1 22:10:43 ntp: start NTP update
- May 2 10:10:43 ntp: start NTP update
- May 2 22:10:42 ntp: start NTP update
- May 3 10:10:39 ntp: start NTP update
- May 3 22:10:37 ntp: start NTP update
- May 4 10:10:37 ntp: start NTP update
- May 4 22:10:35 ntp: start NTP update
- May 5 02:02:42 rc_service: rc 15046:notify_rc restart_wrs
- May 5 10:10:35 ntp: start NTP update
- May 5 22:10:33 ntp: start NTP update
- May 6 10:10:31 ntp: start NTP update
- May 6 22:10:29 ntp: start NTP update
- May 7 10:10:27 ntp: start NTP update
- May 7 22:10:24 ntp: start NTP update
- May 8 10:10:22 ntp: start NTP update
- May 8 22:10:20 ntp: start NTP update
- May 9 10:10:17 ntp: start NTP update
- May 9 22:10:15 ntp: start NTP update
- May 10 10:10:15 ntp: start NTP update
- May 10 22:10:13 ntp: start NTP update
- May 11 10:10:14 ntp: start NTP update
- May 11 22:10:12 ntp: start NTP update
- May 12 10:10:12 ntp: start NTP update
- May 12 20:00:55 kernel: SKIPPED false Type 7 Radar Detection. min_pw=33 pw_delta=0 pri=7244 fm_min=1030 fm_max=0 nconsecq_pulses=4. Time from last detection = 3055103, = 50918min 23sec. Detected pulse index: 5
- May 12 22:10:10 ntp: start NTP update
- May 13 10:10:10 ntp: start NTP update
- May 13 22:10:08 ntp: start NTP update
- May 14 10:10:06 ntp: start NTP update
- May 14 22:10:04 ntp: start NTP update
- May 15 10:10:04 ntp: start NTP update
- May 15 22:10:02 ntp: start NTP update
- May 16 10:10:02 ntp: start NTP update
- May 16 22:10:02 ntp: start NTP update
- May 17 02:03:47 rc_service: rc 18827:notify_rc restart_wrs
- May 17 10:10:01 ntp: start NTP update
- May 17 22:09:59 ntp: start NTP update
- May 18 10:09:56 ntp: start NTP update
- May 18 22:09:54 ntp: start NTP update
- May 19 10:09:54 ntp: start NTP update
- May 19 20:01:21 kernel: SKIPPED false Type 7 Radar Detection. min_pw=34 pw_delta=0 pri=14624 fm_min=1030 fm_max=0 nconsecq_pulses=4. Time from last detection = 604819, = 10080min 19sec. Detected pulse index: 0
- May 19 22:09:52 ntp: start NTP update
- May 20 10:09:52 ntp: start NTP update
- May 20 22:09:51 ntp: start NTP update
- May 21 02:04:11 rc_service: rc 9221:notify_rc restart_wrs
- May 21 10:09:51 ntp: start NTP update
- May 21 22:09:49 ntp: start NTP update
- May 22 10:09:49 ntp: start NTP update
- May 22 22:09:49 ntp: start NTP update
- May 23 10:09:48 ntp: start NTP update
- May 23 22:09:45 ntp: start NTP update
- May 24 10:09:46 ntp: start NTP update
- May 24 22:09:44 ntp: start NTP update
- May 25 10:09:41 ntp: start NTP update
- May 25 22:09:41 ntp: start NTP update
- May 26 10:09:40 ntp: start NTP update
- May 26 22:09:40 ntp: start NTP update
- May 27 10:09:40 ntp: start NTP update
- May 27 22:09:38 ntp: start NTP update
- May 28 10:09:36 ntp: start NTP update
- May 28 22:09:34 ntp: start NTP update
- May 29 10:09:31 ntp: start NTP update
- May 29 22:09:31 ntp: start NTP update
- May 30 10:09:29 ntp: start NTP update
- May 30 22:09:27 ntp: start NTP update
- May 31 10:09:25 ntp: start NTP update
- May 31 22:09:22 ntp: start NTP update
- Jun 1 10:09:20 ntp: start NTP update
- Jun 1 22:09:18 ntp: start NTP update
- Jun 2 02:05:05 rc_service: rc 12816:notify_rc restart_wrs
- Jun 2 10:09:15 ntp: start NTP update
- Jun 2 18:31:06 rc_service: httpd 442:notify_rc restart_vpncall
- Jun 2 18:31:07 openvpn[8437]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Jun 2 18:31:08 openvpn[8437]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
- Jun 2 18:31:08 openvpn[8437]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 2 18:31:08 openvpn[8437]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 2 18:31:08 openvpn[8437]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Jun 2 18:31:08 openvpn[8442]: UDPv4 link local: [undef]
- Jun 2 18:31:08 openvpn[8442]: UDPv4 link remote: [AF_INET]185.175.208.75:1194
- Jun 2 18:31:15 rc_service: httpd 442:notify_rc restart_vpncall
- Jun 2 18:31:16 openvpn[8442]: event_wait : Interrupted system call (code=4)
- Jun 2 18:31:16 openvpn[8442]: SIGTERM[hard,] received, process exiting
- Jun 2 22:09:16 ntp: start NTP update
- Jun 3 10:09:14 ntp: start NTP update
- Jun 3 18:22:49 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 18:30:05 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 18:34:07 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 18:42:43 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 18:46:32 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 18:51:30 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 19:11:30 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 22:09:11 ntp: start NTP update
- Jun 3 23:12:24 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 23:32:24 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 3 23:52:24 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 4 00:12:24 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 4 00:17:04 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 4 00:37:04 miniupnpd[14930]: PCP MAP: added mapping UDP 6672->192.168.1.2:6672 'PCP MAP be1800002348000029000000'
- Jun 4 10:09:12 ntp: start NTP update
- Jun 4 22:09:12 ntp: start NTP update
- Jun 5 10:09:10 ntp: start NTP update
- Jun 5 22:09:08 ntp: start NTP update
- Jun 6 10:09:06 ntp: start NTP update
- Jun 6 22:09:03 ntp: start NTP update
- Jun 7 10:09:03 ntp: start NTP update
- Jun 7 19:07:29 kernel: SKIPPED false Type 1 Radar Detection. min_pw=6 pw_delta=0 pri=23701 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 1638348, = 27305min 48sec. Detected pulse index: 3
- Jun 7 19:07:29 kernel: Type 1 Radar Detection. Detected pulse index=0 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 0, = 0min 0sec
- Jun 7 22:09:02 ntp: start NTP update
- Jun 8 10:09:02 ntp: start NTP update
- Jun 8 22:09:02 ntp: start NTP update
- Jun 9 10:09:02 ntp: start NTP update
- Jun 9 22:09:01 ntp: start NTP update
- Jun 10 02:05:46 rc_service: rc 26114:notify_rc restart_wrs
- Jun 10 10:09:01 ntp: start NTP update
- Jun 10 12:24:05 miniupnpd[14930]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Jun 10 15:57:01 miniupnpd[14930]: HTTP Connection from 192.168.1.192 closed unexpectedly
- Jun 10 16:10:53 miniupnpd[14930]: upnp_event_process_notify: connect(192.168.1.192:2869): Connection timed out
- Jun 10 22:08:59 ntp: start NTP update
- Jun 11 10:08:59 ntp: start NTP update
- Jun 11 22:08:59 ntp: start NTP update
- Jun 12 10:08:59 ntp: start NTP update
- Jun 12 22:09:00 ntp: start NTP update
- Jun 13 10:08:59 ntp: start NTP update
- Jun 13 22:08:57 ntp: start NTP update
- Jun 14 10:08:57 ntp: start NTP update
- Jun 14 22:08:55 ntp: start NTP update
- Jun 15 10:08:55 ntp: start NTP update
- Jun 15 22:08:53 ntp: start NTP update
- Jun 16 10:08:53 ntp: start NTP update
- Jun 16 22:08:51 ntp: start NTP update
- Jun 17 10:08:51 ntp: start NTP update
- Jun 17 22:08:50 ntp: start NTP update
- Jun 18 02:04:00 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jun 18 02:04:00 pppd[492]: Connection terminated.
- Jun 18 02:04:08 pppd[6686]: pppd 2.4.7 started by admin, uid 0
- Jun 18 02:04:19 WAN Connection: Fail to connect with some issues.
- Jun 18 02:04:19 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:04:20 rc_service: zcip 6725:notify_rc start_firewall
- Jun 18 02:04:20 zcip client: configured 169.254.71.195
- Jun 18 02:04:21 miniupnpd[14930]: shutting down MiniUPnPd
- Jun 18 02:04:21 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Jun 18 02:04:21 miniupnpd[6746]: version 1.9 started
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21280 -> 192.168.1.242:21280 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21280 -> 192.168.1.242:21280 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 33559 -> 192.168.1.167:33559 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21222 -> 192.168.1.2:21222 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21222 -> 192.168.1.2:21222 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 4995 -> 192.168.1.167:4995 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 4995 -> 192.168.1.167:4995 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 29942 -> 192.168.1.2:29942 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 29942 -> 192.168.1.2:29942 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 61452 -> 192.168.1.192:61452 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 29943 -> 192.168.1.142:29942 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21223 -> 192.168.1.142:21222 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 49453 -> 192.168.1.142:49453 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 49453 -> 192.168.1.142:49453 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol UDP
- Jun 18 02:04:21 miniupnpd[6746]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:04:21 miniupnpd[6746]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol TCP
- Jun 18 02:04:21 miniupnpd[6746]: HTTP listening on port 50055
- Jun 18 02:04:21 miniupnpd[6746]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:04:23 pppd[6686]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Jun 18 02:04:24 pppd[6686]: Connect: ppp0 <--> vlan3880
- Jun 18 02:04:24 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:04:27 pppd[6686]: CHAP authentication succeeded
- Jun 18 02:04:27 pppd[6686]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Jun 18 02:04:27 pppd[6686]: local IP address 86.142.17.228
- Jun 18 02:04:27 pppd[6686]: remote IP address 172.16.19.146
- Jun 18 02:04:27 rc_service: ip-up 6762:notify_rc start_firewall
- Jun 18 02:04:28 miniupnpd[6746]: shutting down MiniUPnPd
- Jun 18 02:04:28 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jun 18 02:04:28 wan: finish adding multi routes
- Jun 18 02:04:28 rc_service: ip-up 6762:notify_rc stop_upnp
- Jun 18 02:04:28 rc_service: waitting "start_firewall" via ip-up ...
- Jun 18 02:04:28 miniupnpd[6812]: version 1.9 started
- Jun 18 02:04:28 miniupnpd[6812]: HTTP listening on port 35054
- Jun 18 02:04:28 miniupnpd[6812]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:04:29 rc_service: ip-up 6762:notify_rc start_upnp
- Jun 18 02:04:29 rc_service: waitting "stop_upnp" via ip-up ...
- Jun 18 02:04:29 miniupnpd[6812]: shutting down MiniUPnPd
- Jun 18 02:04:30 WAN Connection: WAN was restored.
- Jun 18 02:04:30 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jun 18 02:04:30 pppd[6686]: Connection terminated.
- Jun 18 02:04:40 pppd[6826]: pppd 2.4.7 started by admin, uid 0
- Jun 18 02:04:50 WAN Connection: Fail to connect with some issues.
- Jun 18 02:04:50 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:04:51 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jun 18 02:04:51 pppd[6826]: Unable to complete PPPoE Discovery
- Jun 18 02:04:58 pppd[6873]: pppd 2.4.7 started by admin, uid 0
- Jun 18 02:05:11 rc_service: zcip 6877:notify_rc start_firewall
- Jun 18 02:05:11 zcip client: configured 169.254.71.195
- Jun 18 02:05:11 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Jun 18 02:05:13 pppd[6873]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Jun 18 02:05:13 pppd[6873]: Connect: ppp0 <--> vlan3880
- Jun 18 02:05:15 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:05:16 pppd[6873]: CHAP authentication succeeded
- Jun 18 02:05:16 pppd[6873]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Jun 18 02:05:16 pppd[6873]: local IP address 86.142.17.228
- Jun 18 02:05:16 pppd[6873]: remote IP address 172.16.19.146
- Jun 18 02:05:16 rc_service: ip-up 6900:notify_rc start_firewall
- Jun 18 02:05:17 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jun 18 02:05:17 wan: finish adding multi routes
- Jun 18 02:05:17 rc_service: ip-up 6900:notify_rc stop_upnp
- Jun 18 02:05:17 rc_service: waitting "start_firewall" via ip-up ...
- Jun 18 02:05:18 rc_service: ip-up 6900:notify_rc start_upnp
- Jun 18 02:05:18 rc_service: waitting "stop_upnp" via ip-up ...
- Jun 18 02:05:19 ntp: start NTP update
- Jun 18 02:05:20 miniupnpd[6973]: version 1.9 started
- Jun 18 02:05:20 miniupnpd[6973]: HTTP listening on port 49866
- Jun 18 02:05:20 miniupnpd[6973]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:05:21 WAN Connection: WAN was restored.
- Jun 18 02:05:24 rc_service: ip-up 6900:notify_rc start_firewall
- Jun 18 02:05:25 miniupnpd[6973]: shutting down MiniUPnPd
- Jun 18 02:05:25 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jun 18 02:05:26 miniupnpd[7044]: version 1.9 started
- Jun 18 02:05:26 miniupnpd[7044]: HTTP listening on port 49486
- Jun 18 02:05:26 miniupnpd[7044]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:12:40 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jun 18 02:12:40 pppd[6873]: Connection terminated.
- Jun 18 02:12:49 pppd[7764]: pppd 2.4.7 started by admin, uid 0
- Jun 18 02:12:55 WAN Connection: Fail to connect with some issues.
- Jun 18 02:12:55 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:13:01 rc_service: zcip 7805:notify_rc start_firewall
- Jun 18 02:13:01 zcip client: configured 169.254.71.195
- Jun 18 02:13:02 miniupnpd[7044]: shutting down MiniUPnPd
- Jun 18 02:13:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Jun 18 02:13:02 miniupnpd[7826]: version 1.9 started
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21280 -> 192.168.1.242:21280 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21280 -> 192.168.1.242:21280 protocol TCP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 33559 -> 192.168.1.167:33559 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21222 -> 192.168.1.2:21222 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21222 -> 192.168.1.2:21222 protocol TCP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 4995 -> 192.168.1.167:4995 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 4995 -> 192.168.1.167:4995 protocol TCP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 29942 -> 192.168.1.2:29942 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 29942 -> 192.168.1.2:29942 protocol TCP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 61452 -> 192.168.1.192:61452 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 29943 -> 192.168.1.142:29942 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21223 -> 192.168.1.142:21222 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 49453 -> 192.168.1.142:49453 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 49453 -> 192.168.1.142:49453 protocol TCP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol UDP
- Jun 18 02:13:02 miniupnpd[7826]: add_filter_rule() : chain FUPNP not found
- Jun 18 02:13:02 miniupnpd[7826]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol TCP
- Jun 18 02:13:03 miniupnpd[7826]: HTTP listening on port 43801
- Jun 18 02:13:03 miniupnpd[7826]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:13:05 pppd[7764]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Jun 18 02:13:05 pppd[7764]: Connect: ppp0 <--> vlan3880
- Jun 18 02:13:05 stop_nat_rules: apply the redirect_rules!
- Jun 18 02:13:08 pppd[7764]: CHAP authentication succeeded
- Jun 18 02:13:08 pppd[7764]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Jun 18 02:13:08 pppd[7764]: local IP address 86.142.17.228
- Jun 18 02:13:08 pppd[7764]: remote IP address 172.16.19.146
- Jun 18 02:13:08 rc_service: ip-up 7841:notify_rc start_firewall
- Jun 18 02:13:09 miniupnpd[7826]: shutting down MiniUPnPd
- Jun 18 02:13:09 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jun 18 02:13:09 wan: finish adding multi routes
- Jun 18 02:13:09 rc_service: ip-up 7841:notify_rc stop_upnp
- Jun 18 02:13:09 rc_service: waitting "start_firewall" via ip-up ...
- Jun 18 02:13:09 miniupnpd[7893]: version 1.9 started
- Jun 18 02:13:09 miniupnpd[7893]: HTTP listening on port 40965
- Jun 18 02:13:09 miniupnpd[7893]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:13:10 rc_service: ip-up 7841:notify_rc start_upnp
- Jun 18 02:13:10 rc_service: waitting "stop_upnp" via ip-up ...
- Jun 18 02:13:10 miniupnpd[7893]: shutting down MiniUPnPd
- Jun 18 02:13:11 ntp: start NTP update
- Jun 18 02:13:11 WAN Connection: WAN was restored.
- Jun 18 02:13:12 miniupnpd[7897]: version 1.9 started
- Jun 18 02:13:12 miniupnpd[7897]: HTTP listening on port 43529
- Jun 18 02:13:12 miniupnpd[7897]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:13:15 rc_service: ip-up 7841:notify_rc start_firewall
- Jun 18 02:13:16 miniupnpd[7897]: shutting down MiniUPnPd
- Jun 18 02:13:16 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jun 18 02:13:17 miniupnpd[7968]: version 1.9 started
- Jun 18 02:13:17 miniupnpd[7968]: HTTP listening on port 54193
- Jun 18 02:13:17 miniupnpd[7968]: Listening for NAT-PMP/PCP traffic on port 5351
- Jun 18 02:13:33 rc_service: httpd 442:notify_rc start_webs_upgrade
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: * Invalid signature of oopsbuf: B7-F7-BE-DB-B2-BB-DA-C3 (len 2945965821)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:18 kernel: JFFS2 notice: (344) check_node_data: wrong data CRC in data node at 0x00a84fbc: read 0x9bb45288, calculated 0xbc2b198b.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:25 miniupnpd[483]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[483]: HTTP listening on port 59130
- Aug 1 00:00:25 miniupnpd[483]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[493]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:30 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[483]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 56679
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[493]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[493]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[493]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[493]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:45 pppd[493]: local IP address 86.183.149.200
- Aug 1 00:00:45 pppd[493]: remote IP address 172.16.19.146
- Aug 1 00:00:45 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:46 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[714]: HTTP listening on port 52419
- Aug 1 00:00:46 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:48 miniupnpd[719]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[719]: HTTP listening on port 55303
- Aug 1 00:00:48 miniupnpd[719]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 ntp: start NTP update
- Aug 1 00:00:50 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:51 kernel: sizeof forward param = 160
- Aug 1 00:00:53 ntp: start NTP update
- Jul 4 17:32:00 rc_service: ntp 718:notify_rc restart_upnp
- Jul 4 17:32:00 miniupnpd[719]: shutting down MiniUPnPd
- Jul 4 17:32:01 miniupnpd[768]: version 1.9 started
- Jul 4 17:32:01 miniupnpd[768]: HTTP listening on port 40121
- Jul 4 17:32:01 miniupnpd[768]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 4 17:32:01 rc_service: ntp 718:notify_rc restart_diskmon
- Jul 4 17:32:01 disk_monitor: Finish
- Jul 4 17:32:04 disk monitor: be idle
- Jul 4 17:32:04 rc_service: ip-up 663:notify_rc start_firewall
- Jul 4 17:32:04 miniupnpd[768]: shutting down MiniUPnPd
- Jul 4 17:32:04 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 4 17:32:05 miniupnpd[840]: version 1.9 started
- Jul 4 17:32:05 miniupnpd[840]: HTTP listening on port 47375
- Jul 4 17:32:05 miniupnpd[840]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 4 17:32:07 crond[444]: time disparity of 1013371 minutes detected
- Jul 4 17:33:16 rc_service: rc 1178:notify_rc restart_wrs
- Jul 4 17:33:31 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 4 18:00:04 disk_monitor: Got SIGALRM...
- Jul 4 23:00:04 disk_monitor: Got SIGALRM...
- Jul 5 05:31:58 ntp: start NTP update
- Jul 5 17:31:58 ntp: start NTP update
- Jul 5 20:25:52 rc_service: httpd 442:notify_rc reboot
- Jul 5 20:25:53 pppd[493]: Connection terminated.
- Jul 5 20:25:55 iTunes: daemon is stoped
- Jul 5 20:25:55 FTP Server: daemon is stoped
- Jul 5 20:25:55 Samba Server: smb daemon is stoped
- Jul 5 20:25:55 kernel: gro disabled
- Jul 5 20:25:55 Timemachine: daemon is stoped
- Jul 5 20:25:55 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:15 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:15 kernel: Found a AMD NAND flash:
- Aug 1 00:00:15 kernel: Total size: 128MB
- Aug 1 00:00:15 kernel: Block size: 128KB
- Aug 1 00:00:15 kernel: Page Size: 2048B
- Aug 1 00:00:15 kernel: OOB Size: 64B
- Aug 1 00:00:15 kernel: Sector size: 512B
- Aug 1 00:00:15 kernel: Spare size: 16B
- Aug 1 00:00:15 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:15 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:15 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:16 kernel: Registering the dns_resolver key type
- Aug 1 00:00:16 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:16 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:16 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:16 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:16 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:16 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:16 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:16 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:16 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:16 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:16 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:16 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:16 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:16 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:16 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 kernel: Empty flash at 0x00a850e8 ends at 0x00a85800
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:16 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 jffs2: valid logs(1)
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[485]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[485]: HTTP listening on port 34274
- Aug 1 00:00:25 miniupnpd[485]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:26 syslog: Generating SSL certificate...
- Aug 1 00:00:26 pppd[488]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:28 kernel: SCSI subsystem initialized
- Aug 1 00:00:31 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 612:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:38 miniupnpd[485]: shutting down MiniUPnPd
- Aug 1 00:00:38 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:39 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:39 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:39 miniupnpd[650]: version 1.9 started
- Aug 1 00:00:39 miniupnpd[650]: HTTP listening on port 58592
- Aug 1 00:00:39 miniupnpd[650]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:41 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:41 pppd[488]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:41 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[488]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:45 pppd[488]: local IP address 86.157.189.249
- Aug 1 00:00:45 pppd[488]: remote IP address 172.16.19.146
- Aug 1 00:00:45 rc_service: ip-up 664:notify_rc start_firewall
- Aug 1 00:00:46 miniupnpd[650]: shutting down MiniUPnPd
- Aug 1 00:00:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 664:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[715]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[715]: HTTP listening on port 44095
- Aug 1 00:00:46 miniupnpd[715]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 664:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[715]: shutting down MiniUPnPd
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:49 miniupnpd[720]: version 1.9 started
- Aug 1 00:00:49 miniupnpd[720]: HTTP listening on port 50084
- Aug 1 00:00:49 miniupnpd[720]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 ntp: start NTP update
- Jul 5 20:28:36 rc_service: ntp 719:notify_rc restart_upnp
- Jul 5 20:28:36 miniupnpd[720]: shutting down MiniUPnPd
- Jul 5 20:28:36 miniupnpd[731]: version 1.9 started
- Jul 5 20:28:36 miniupnpd[731]: HTTP listening on port 58931
- Jul 5 20:28:36 miniupnpd[731]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 5 20:28:37 rc_service: ntp 719:notify_rc restart_diskmon
- Jul 5 20:28:37 disk_monitor: Finish
- Jul 5 20:28:38 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 5 20:28:39 kernel: sizeof forward param = 160
- Jul 5 20:28:39 disk monitor: be idle
- Jul 5 20:28:44 rc_service: ip-up 664:notify_rc start_firewall
- Jul 5 20:28:45 miniupnpd[731]: shutting down MiniUPnPd
- Jul 5 20:28:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 5 20:28:46 miniupnpd[841]: version 1.9 started
- Jul 5 20:28:46 miniupnpd[841]: HTTP listening on port 47096
- Jul 5 20:28:46 miniupnpd[841]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 5 20:28:48 crond[444]: time disparity of 1014988 minutes detected
- Jul 5 20:30:11 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 5 21:00:39 disk_monitor: Got SIGALRM...
- Jul 5 23:00:39 disk_monitor: Got SIGALRM...
- Jul 6 08:28:34 ntp: start NTP update
- Jul 6 20:28:32 ntp: start NTP update
- Jul 7 08:28:30 ntp: start NTP update
- Jul 7 08:54:10 miniupnpd[841]: upnp_event_send: send(): Connection reset by peer
- Jul 7 08:54:18 miniupnpd[841]: upnp_event_recv: recv(): Connection reset by peer
- Jul 7 09:10:21 miniupnpd[841]: upnp_event_process_notify: connect(192.168.1.192:2869): No route to host
- Jul 7 09:23:53 rc_service: httpd 442:notify_rc reboot
- Jul 7 09:23:54 pppd[488]: Connection terminated.
- Jul 7 09:23:55 iTunes: daemon is stoped
- Jul 7 09:23:55 FTP Server: daemon is stoped
- Jul 7 09:23:55 Samba Server: smb daemon is stoped
- Jul 7 09:23:55 kernel: gro disabled
- Jul 7 09:23:56 Timemachine: daemon is stoped
- Jul 7 09:23:56 WEBDAV Server: daemon is stoped
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:13 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:13 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:13 kernel: Machine: Northstar Prototype
- Aug 1 00:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:13 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:13 kernel: Virtual kernel memory layout:
- Aug 1 00:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:13 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:13 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:13 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:13 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:14 kernel: pflash: found no supported devices
- Aug 1 00:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:14 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:14 kernel: Registering the dns_resolver key type
- Aug 1 00:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: Empty flash at 0x00a850e8 ends at 0x00a85800
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:23 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:24 miniupnpd[484]: version 1.9 started
- Aug 1 00:00:24 miniupnpd[484]: HTTP listening on port 52366
- Aug 1 00:00:24 miniupnpd[484]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[488]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:26 kernel: SCSI subsystem initialized
- Aug 1 00:00:30 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:36 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:36 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[484]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 58337
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[488]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:43 pppd[488]: CHAP authentication succeeded
- Aug 1 00:00:43 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[488]: local IP address 86.157.189.249
- Aug 1 00:00:44 pppd[488]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:45 wan: finish adding multi routes
- Aug 1 00:00:45 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:45 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:45 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:45 miniupnpd[714]: HTTP listening on port 44934
- Aug 1 00:00:45 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:46 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[718]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[718]: HTTP listening on port 54115
- Aug 1 00:00:48 miniupnpd[718]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:48 ntp: start NTP update
- Aug 1 00:00:49 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:50 kernel: sizeof forward param = 160
- Aug 1 00:00:52 ntp: start NTP update
- Aug 1 00:00:54 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:55 ntp: start NTP update
- Aug 1 00:00:55 miniupnpd[718]: shutting down MiniUPnPd
- Aug 1 00:00:55 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:56 miniupnpd[828]: version 1.9 started
- Aug 1 00:00:56 miniupnpd[828]: HTTP listening on port 51036
- Aug 1 00:00:56 miniupnpd[828]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 7 09:26:40 rc_service: ntp 717:notify_rc restart_upnp
- Jul 7 09:26:40 miniupnpd[828]: shutting down MiniUPnPd
- Jul 7 09:26:40 miniupnpd[839]: version 1.9 started
- Jul 7 09:26:40 miniupnpd[839]: HTTP listening on port 41912
- Jul 7 09:26:40 miniupnpd[839]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 7 09:26:41 rc_service: ntp 717:notify_rc restart_diskmon
- Jul 7 09:26:41 disk_monitor: Finish
- Jul 7 09:26:43 disk monitor: be idle
- Jul 7 09:26:44 crond[444]: time disparity of 1017206 minutes detected
- Jul 7 09:28:07 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 7 09:28:21 rc_service: rc 1310:notify_rc restart_wrs
- Jul 7 10:00:43 disk_monitor: Got SIGALRM...
- Jul 7 21:26:38 ntp: start NTP update
- Jul 7 22:18:42 rc_service: httpd 442:notify_rc reboot
- Jul 7 22:18:43 pppd[488]: Connection terminated.
- Jul 7 22:18:44 iTunes: daemon is stoped
- Jul 7 22:18:44 FTP Server: daemon is stoped
- Jul 7 22:18:44 Samba Server: smb daemon is stoped
- Jul 7 22:18:44 kernel: gro disabled
- Jul 7 22:18:45 Timemachine: daemon is stoped
- Jul 7 22:18:45 WEBDAV Server: daemon is stoped
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:13 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:13 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:13 kernel: Machine: Northstar Prototype
- Aug 1 00:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:13 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:13 kernel: Virtual kernel memory layout:
- Aug 1 00:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:13 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:13 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:13 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:13 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:14 kernel: pflash: found no supported devices
- Aug 1 00:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:14 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:14 kernel: Registering the dns_resolver key type
- Aug 1 00:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: Empty flash at 0x00a850e8 ends at 0x00a85800
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:23 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 miniupnpd[484]: version 1.9 started
- Aug 1 00:00:24 miniupnpd[484]: HTTP listening on port 38641
- Aug 1 00:00:24 miniupnpd[484]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[487]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:30 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:36 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:36 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[484]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 39472
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[487]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[487]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:43 pppd[487]: CHAP authentication succeeded
- Aug 1 00:00:43 pppd[487]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[487]: local IP address 109.159.191.93
- Aug 1 00:00:44 pppd[487]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[704]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[704]: HTTP listening on port 57266
- Aug 1 00:00:46 miniupnpd[704]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[704]: shutting down MiniUPnPd
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:48 miniupnpd[709]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[709]: HTTP listening on port 47318
- Aug 1 00:00:48 miniupnpd[709]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 ntp: start NTP update
- Jul 7 22:21:25 rc_service: ntp 708:notify_rc restart_upnp
- Jul 7 22:21:25 miniupnpd[709]: shutting down MiniUPnPd
- Jul 7 22:21:25 miniupnpd[720]: version 1.9 started
- Jul 7 22:21:25 miniupnpd[720]: HTTP listening on port 51345
- Jul 7 22:21:25 miniupnpd[720]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 7 22:21:26 rc_service: ntp 708:notify_rc restart_diskmon
- Jul 7 22:21:26 disk_monitor: Finish
- Jul 7 22:21:26 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 7 22:21:27 kernel: sizeof forward param = 160
- Jul 7 22:21:28 disk monitor: be idle
- Jul 7 22:21:32 rc_service: ip-up 663:notify_rc start_firewall
- Jul 7 22:21:33 miniupnpd[720]: shutting down MiniUPnPd
- Jul 7 22:21:33 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 7 22:21:34 miniupnpd[813]: version 1.9 started
- Jul 7 22:21:34 miniupnpd[813]: HTTP listening on port 53783
- Jul 7 22:21:34 miniupnpd[813]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 7 22:21:36 crond[444]: time disparity of 1017981 minutes detected
- Jul 7 22:23:00 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 7 23:00:28 disk_monitor: Got SIGALRM...
- Jul 8 10:21:23 ntp: start NTP update
- Jul 8 18:37:51 rc_service: httpd 442:notify_rc reboot
- Jul 8 18:37:51 pppd[487]: Connection terminated.
- Jul 8 18:37:53 iTunes: daemon is stoped
- Jul 8 18:37:53 FTP Server: daemon is stoped
- Jul 8 18:37:53 Samba Server: smb daemon is stoped
- Jul 8 18:37:53 kernel: gro disabled
- Jul 8 18:37:53 Timemachine: daemon is stoped
- Jul 8 18:37:53 WEBDAV Server: daemon is stoped
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:13 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:13 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:13 kernel: Machine: Northstar Prototype
- Aug 1 00:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:13 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:13 kernel: Virtual kernel memory layout:
- Aug 1 00:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:13 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:13 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:13 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:13 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:13 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:14 kernel: pflash: found no supported devices
- Aug 1 00:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:14 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:14 kernel: Registering the dns_resolver key type
- Aug 1 00:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:23 DSL-AC68U: start httpd
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 miniupnpd[483]: version 1.9 started
- Aug 1 00:00:24 miniupnpd[483]: HTTP listening on port 32871
- Aug 1 00:00:24 miniupnpd[483]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[487]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:30 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:36 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:36 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[483]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 54189
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[487]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[487]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:43 pppd[487]: CHAP authentication succeeded
- Aug 1 00:00:43 pppd[487]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[487]: local IP address 86.157.189.179
- Aug 1 00:00:44 pppd[487]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:45 wan: finish adding multi routes
- Aug 1 00:00:45 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:45 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[714]: HTTP listening on port 39188
- Aug 1 00:00:46 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:46 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:47 WAN Connection: WAN was restored.
- Aug 1 00:00:48 miniupnpd[719]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[719]: HTTP listening on port 59209
- Aug 1 00:00:48 miniupnpd[719]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 ntp: start NTP update
- Aug 1 00:00:49 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:50 kernel: sizeof forward param = 160
- Aug 1 00:00:52 ntp: start NTP update
- Aug 1 00:00:54 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:55 ntp: start NTP update
- Aug 1 00:00:56 miniupnpd[719]: shutting down MiniUPnPd
- Aug 1 00:00:56 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 8 18:40:42 miniupnpd[834]: version 1.9 started
- Jul 8 18:40:42 miniupnpd[834]: already expired lease in lease file
- Jul 8 18:40:42 miniupnpd[834]: already expired lease in lease file
- Jul 8 18:40:42 miniupnpd[834]: HTTP listening on port 49912
- Jul 8 18:40:42 miniupnpd[834]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 8 18:40:43 rc_service: ntp 718:notify_rc restart_upnp
- Jul 8 18:40:43 miniupnpd[834]: shutting down MiniUPnPd
- Jul 8 18:40:43 miniupnpd[840]: version 1.9 started
- Jul 8 18:40:43 miniupnpd[840]: HTTP listening on port 40131
- Jul 8 18:40:43 miniupnpd[840]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 8 18:40:44 rc_service: ntp 718:notify_rc restart_diskmon
- Jul 8 18:40:44 disk_monitor: Finish
- Jul 8 18:40:46 disk monitor: be idle
- Jul 8 18:40:47 crond[444]: time disparity of 1019200 minutes detected
- Jul 8 18:42:10 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 8 19:00:46 disk_monitor: Got SIGALRM...
- Jul 8 23:00:46 disk_monitor: Got SIGALRM...
- Jul 9 06:40:41 ntp: start NTP update
- Jul 9 10:07:52 rc_service: httpd 442:notify_rc reboot
- Jul 9 10:07:53 pppd[487]: Connection terminated.
- Jul 9 10:07:54 iTunes: daemon is stoped
- Jul 9 10:07:54 FTP Server: daemon is stoped
- Jul 9 10:07:54 Samba Server: smb daemon is stoped
- Jul 9 10:07:54 kernel: gro disabled
- Jul 9 10:07:54 Timemachine: daemon is stoped
- Jul 9 10:07:54 WEBDAV Server: daemon is stoped
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:13 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:13 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:13 kernel: Machine: Northstar Prototype
- Aug 1 00:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:13 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:13 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:13 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:13 kernel: Virtual kernel memory layout:
- Aug 1 00:00:13 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:13 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:13 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:13 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:13 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:13 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:13 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:13 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:13 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:13 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:13 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:14 kernel: pflash: found no supported devices
- Aug 1 00:00:14 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:14 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:14 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:14 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:14 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:14 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:14 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:14 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:14 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:14 kernel: Registering the dns_resolver key type
- Aug 1 00:00:14 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:14 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[485]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[485]: HTTP listening on port 47463
- Aug 1 00:00:25 miniupnpd[485]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 pppd[486]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:30 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:36 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[485]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 40370
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[486]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[486]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[486]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[486]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:45 pppd[486]: local IP address 159.180.118.134
- Aug 1 00:00:45 pppd[486]: remote IP address 172.16.19.146
- Aug 1 00:00:45 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[714]: HTTP listening on port 34323
- Aug 1 00:00:46 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[718]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[718]: HTTP listening on port 35500
- Aug 1 00:00:48 miniupnpd[718]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 WAN Connection: WAN was restored.
- Aug 1 00:00:50 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:50 kernel: sizeof forward param = 160
- Aug 1 00:00:52 ntp: start NTP update
- Jul 9 10:10:34 rc_service: ntp 717:notify_rc restart_upnp
- Jul 9 10:10:34 miniupnpd[718]: shutting down MiniUPnPd
- Jul 9 10:10:34 miniupnpd[744]: version 1.9 started
- Jul 9 10:10:34 miniupnpd[744]: already expired lease in lease file
- Jul 9 10:10:34 miniupnpd[744]: already expired lease in lease file
- Jul 9 10:10:34 miniupnpd[744]: HTTP listening on port 55778
- Jul 9 10:10:34 miniupnpd[744]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 9 10:10:35 rc_service: ntp 717:notify_rc restart_diskmon
- Jul 9 10:10:35 disk_monitor: Finish
- Jul 9 10:10:38 disk monitor: be idle
- Jul 9 10:10:40 rc_service: ip-up 663:notify_rc start_firewall
- Jul 9 10:10:40 miniupnpd[744]: shutting down MiniUPnPd
- Jul 9 10:10:40 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 9 10:10:41 miniupnpd[840]: version 1.9 started
- Jul 9 10:10:41 miniupnpd[840]: HTTP listening on port 46762
- Jul 9 10:10:41 miniupnpd[840]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 9 10:10:42 crond[444]: time disparity of 1020130 minutes detected
- Jul 9 10:12:06 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 9 22:10:32 ntp: start NTP update
- Jul 9 23:10:39 disk_monitor: Got SIGALRM...
- Jul 10 10:10:29 ntp: start NTP update
- Jul 10 22:10:29 ntp: start NTP update
- Jul 11 10:10:28 ntp: start NTP update
- Jul 11 22:10:26 ntp: start NTP update
- Jul 12 02:19:27 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jul 12 02:19:27 pppd[486]: Connection terminated.
- Jul 12 02:19:36 pppd[6202]: pppd 2.4.7 started by admin, uid 0
- Jul 12 02:19:43 WAN Connection: Fail to connect with some issues.
- Jul 12 02:19:43 stop_nat_rules: apply the redirect_rules!
- Jul 12 02:19:48 rc_service: zcip 6205:notify_rc start_firewall
- Jul 12 02:19:48 zcip client: configured 169.254.71.195
- Jul 12 02:19:49 miniupnpd[840]: shutting down MiniUPnPd
- Jul 12 02:19:49 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Jul 12 02:19:49 miniupnpd[6227]: version 1.9 started
- Jul 12 02:19:49 miniupnpd[6227]: add_filter_rule() : chain FUPNP not found
- Jul 12 02:19:49 miniupnpd[6227]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol UDP
- Jul 12 02:19:49 miniupnpd[6227]: add_filter_rule() : chain FUPNP not found
- Jul 12 02:19:49 miniupnpd[6227]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol TCP
- Jul 12 02:19:49 miniupnpd[6227]: HTTP listening on port 38273
- Jul 12 02:19:49 miniupnpd[6227]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 12 02:19:51 pppd[6202]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Jul 12 02:19:51 pppd[6202]: Connect: ppp0 <--> vlan3880
- Jul 12 02:19:53 stop_nat_rules: apply the redirect_rules!
- Jul 12 02:19:55 pppd[6202]: CHAP authentication succeeded
- Jul 12 02:19:55 pppd[6202]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Jul 12 02:19:55 pppd[6202]: local IP address 109.159.169.211
- Jul 12 02:19:55 pppd[6202]: remote IP address 172.16.19.146
- Jul 12 02:19:55 pppd[6202]: primary DNS address 81.139.57.100
- Jul 12 02:19:55 pppd[6202]: secondary DNS address 81.139.56.100
- Jul 12 02:19:55 rc_service: ip-up 6244:notify_rc start_firewall
- Jul 12 02:19:56 miniupnpd[6227]: shutting down MiniUPnPd
- Jul 12 02:19:56 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 12 02:19:56 wan: finish adding multi routes
- Jul 12 02:19:56 rc_service: ip-up 6244:notify_rc stop_upnp
- Jul 12 02:19:56 rc_service: waitting "start_firewall" via ip-up ...
- Jul 12 02:19:56 miniupnpd[6293]: version 1.9 started
- Jul 12 02:19:56 miniupnpd[6293]: HTTP listening on port 47068
- Jul 12 02:19:56 miniupnpd[6293]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 12 02:19:57 rc_service: ip-up 6244:notify_rc start_upnp
- Jul 12 02:19:57 rc_service: waitting "stop_upnp" via ip-up ...
- Jul 12 02:19:57 miniupnpd[6293]: shutting down MiniUPnPd
- Jul 12 02:19:58 ntp: start NTP update
- Jul 12 02:19:58 miniupnpd[6296]: version 1.9 started
- Jul 12 02:19:58 miniupnpd[6296]: HTTP listening on port 33786
- Jul 12 02:19:58 miniupnpd[6296]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 12 02:19:59 WAN Connection: WAN was restored.
- Jul 12 02:20:02 rc_service: ip-up 6244:notify_rc start_firewall
- Jul 12 02:20:03 miniupnpd[6296]: shutting down MiniUPnPd
- Jul 12 02:20:03 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 12 02:20:04 miniupnpd[6404]: version 1.9 started
- Jul 12 02:20:04 miniupnpd[6404]: HTTP listening on port 52032
- Jul 12 02:20:04 miniupnpd[6404]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 12 14:19:58 ntp: start NTP update
- Jul 13 02:19:56 ntp: start NTP update
- Jul 13 14:19:56 ntp: start NTP update
- Jul 13 16:16:47 rc_service: httpd 442:notify_rc restart_dslwan_if 0
- Jul 13 16:16:47 pppd[6202]: Connection terminated.
- Jul 13 16:16:55 pppd[25949]: pppd 2.4.7 started by admin, uid 0
- Jul 13 16:17:06 WAN Connection: Fail to connect with some issues.
- Jul 13 16:17:06 stop_nat_rules: apply the redirect_rules!
- Jul 13 16:17:07 rc_service: zcip 25990:notify_rc start_firewall
- Jul 13 16:17:07 zcip client: configured 169.254.71.195
- Jul 13 16:17:08 miniupnpd[6404]: shutting down MiniUPnPd
- Jul 13 16:17:08 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Jul 13 16:17:08 miniupnpd[26011]: version 1.9 started
- Jul 13 16:17:08 miniupnpd[26011]: add_filter_rule() : chain FUPNP not found
- Jul 13 16:17:08 miniupnpd[26011]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol UDP
- Jul 13 16:17:08 miniupnpd[26011]: add_filter_rule() : chain FUPNP not found
- Jul 13 16:17:08 miniupnpd[26011]: Failed to redirect 21312 -> 192.168.1.142:21312 protocol TCP
- Jul 13 16:17:08 miniupnpd[26011]: HTTP listening on port 34072
- Jul 13 16:17:08 miniupnpd[26011]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 13 16:17:10 pppd[25949]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Jul 13 16:17:10 pppd[25949]: Connect: ppp0 <--> vlan3880
- Jul 13 16:17:11 stop_nat_rules: apply the redirect_rules!
- Jul 13 16:17:13 pppd[25949]: CHAP authentication succeeded
- Jul 13 16:17:13 pppd[25949]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Jul 13 16:17:13 pppd[25949]: local IP address 109.159.169.211
- Jul 13 16:17:13 pppd[25949]: remote IP address 172.16.19.146
- Jul 13 16:17:13 rc_service: ip-up 26027:notify_rc start_firewall
- Jul 13 16:17:14 miniupnpd[26011]: shutting down MiniUPnPd
- Jul 13 16:17:14 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 13 16:17:14 wan: finish adding multi routes
- Jul 13 16:17:14 rc_service: ip-up 26027:notify_rc stop_upnp
- Jul 13 16:17:14 rc_service: waitting "start_firewall" via ip-up ...
- Jul 13 16:17:15 miniupnpd[26076]: version 1.9 started
- Jul 13 16:17:15 miniupnpd[26076]: HTTP listening on port 41061
- Jul 13 16:17:15 miniupnpd[26076]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 13 16:17:15 rc_service: ip-up 26027:notify_rc start_upnp
- Jul 13 16:17:15 rc_service: waitting "stop_upnp" via ip-up ...
- Jul 13 16:17:15 miniupnpd[26076]: shutting down MiniUPnPd
- Jul 13 16:17:16 ntp: start NTP update
- Jul 13 16:17:17 miniupnpd[26081]: version 1.9 started
- Jul 13 16:17:17 WAN Connection: WAN was restored.
- Jul 13 16:17:17 miniupnpd[26081]: HTTP listening on port 51868
- Jul 13 16:17:17 miniupnpd[26081]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 13 16:17:21 rc_service: ip-up 26027:notify_rc start_firewall
- Jul 13 16:17:22 miniupnpd[26081]: shutting down MiniUPnPd
- Jul 13 16:17:22 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 13 16:17:22 miniupnpd[26152]: version 1.9 started
- Jul 13 16:17:22 miniupnpd[26152]: HTTP listening on port 56323
- Jul 13 16:17:22 miniupnpd[26152]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 14 04:17:15 ntp: start NTP update
- Jul 14 16:17:12 ntp: start NTP update
- Jul 15 04:17:10 ntp: start NTP update
- Jul 15 16:17:10 ntp: start NTP update
- Jul 15 17:25:08 rc_service: httpd 442:notify_rc reboot
- Jul 15 17:25:09 pppd[25949]: Connection terminated.
- Jul 15 17:25:10 iTunes: daemon is stoped
- Jul 15 17:25:10 FTP Server: daemon is stoped
- Jul 15 17:25:10 Samba Server: smb daemon is stoped
- Jul 15 17:25:10 kernel: gro disabled
- Jul 15 17:25:10 Timemachine: daemon is stoped
- Jul 15 17:25:10 WEBDAV Server: daemon is stoped
- Aug 1 00:00:13 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:13 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:13 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:13 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:13 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:13 kernel: Machine: Northstar Prototype
- Aug 1 00:00:13 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:13 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:14 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:14 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: _ Reboot message ... _______________________________________________________
- Aug 1 00:00:15 kernel: <1>Unable to handle kernel NULL pointer derefere�U�at virtual address 00000000
- Aug 1 00:00:15 kernel: <1>pgd = cfa34000
- Aug 1 00:00:15 kernel: <1>[00000000] *pgd00000000
- Aug 1 00:00:15 kernel: <0>Internal error: Oops: 17 [#1] PREEMPT SMP
- Aug 1 00:00:15 kernel: <0>last sysfs file: /sys/module/bw_forward/parameters/dev_wan
- Aug 1 00:00:15 kernel: <4>module: 0 3202
- Aug 1 00:00:15 kernel: <4>module: nf_conntrack000 4909
- Aug 1 00:00:15 kernel: <4>module: ip6table_m ohci_hcd bf66b000 17918
- Aug 1 00:00:15 kernel: <4>mo 81793
- Aug 1 00:00:15 kernel: <4>module: tntfs bf5c60 crc16 bf51f000 1007
- Aug 1 00:00:15 kernel: <4>module: ext3 bf4fd000 106409
- Aug 1 00:00:15 kernel: <4>mod4>module: usb_storage bf4d600010
- Aug 1 00:00:15 kernel: <4>module: ip6t_LOG bf46a00ffs2 bf446000 91274
- Aug 1 00:00:15 kernel: <4>module:
- Aug 1 00:00:15 kernel: <4>module: emf bf020000 15157
- Aug 1 00:00:15 kernel: <4>module: ctf bf000000 20367
- Aug 1 00:00:15 kernel: <4>Modules linked in: nf_nat_ nf_conntrack_h323 nf_nat_rtsp nf_conntrack_rtsp nf_nat_ftp nf_cfs2 zlib_deflate igs(P) emf(P) e<4>r10: 00000000 r9 : cf824000 53c7d Table: 9fa3404a DAC: 000ec5156c c004dc10 316e6177 6f727080 0000000d cf824000 00000000 c051558 40211888 4056bf10 60000010/0x38)
- Aug 1 00:00:15 kernel: <4>[<c0161ae8>] (strcmp+0x4/0x38) from [<c004f884>] (_nvrm_get+0x20/0x3c) from [<c004dc10>] (dev_nvram_read+0x6c/0x180)
- Aug 1 00:00:15 kernel: x6c/0x180) from [<c00ca484>] (vfc00ca558>] (sys_read+0x40/0x70)
- Aug 1 00:00:15 kernel: on
- Aug 1 00:00:15 kernel: c00416f0>] (die+0x1a4/0x1dc) fro30/0x9c) from [<c03822ac>] (__da00006c 00000000
- Aug 1 00:00:15 kernel: <4>5e80: cbed054
- Aug 1 00:00:15 kernel: ____________________________________________________________________________
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[486]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[486]: HTTP listening on port 44390
- Aug 1 00:00:25 miniupnpd[486]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[495]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:35 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 612:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:38 miniupnpd[486]: shutting down MiniUPnPd
- Aug 1 00:00:38 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[650]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[650]: HTTP listening on port 49535
- Aug 1 00:00:38 miniupnpd[650]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[495]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:41 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[495]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[495]: local IP address 109.159.169.211
- Aug 1 00:00:44 pppd[495]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 660:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[650]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:45 wan: finish adding multi routes
- Aug 1 00:00:45 rc_service: ip-up 660:notify_rc stop_upnp
- Aug 1 00:00:45 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[715]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[715]: HTTP listening on port 56781
- Aug 1 00:00:46 miniupnpd[715]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:46 rc_service: ip-up 660:notify_rc start_upnp
- Aug 1 00:00:46 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:46 miniupnpd[715]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[719]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[719]: HTTP listening on port 57799
- Aug 1 00:00:48 miniupnpd[719]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:49 ntp: start NTP update
- Jul 15 17:27:47 rc_service: ntp 718:notify_rc restart_upnp
- Jul 15 17:27:48 miniupnpd[719]: shutting down MiniUPnPd
- Jul 15 17:27:48 miniupnpd[731]: version 1.9 started
- Jul 15 17:27:48 miniupnpd[731]: HTTP listening on port 51246
- Jul 15 17:27:48 miniupnpd[731]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 15 17:27:48 rc_service: ntp 718:notify_rc restart_diskmon
- Jul 15 17:27:48 disk_monitor: Finish
- Jul 15 17:27:49 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 15 17:27:50 kernel: sizeof forward param = 160
- Jul 15 17:27:51 disk monitor: be idle
- Jul 15 17:27:56 rc_service: ip-up 660:notify_rc start_firewall
- Jul 15 17:27:57 miniupnpd[731]: shutting down MiniUPnPd
- Jul 15 17:27:57 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 15 17:27:58 miniupnpd[840]: version 1.9 started
- Jul 15 17:27:58 miniupnpd[840]: HTTP listening on port 52165
- Jul 15 17:27:58 miniupnpd[840]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 15 17:27:59 crond[445]: time disparity of 1029207 minutes detected
- Jul 15 17:29:23 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 15 17:31:24 rc_service: httpd 443:notify_rc reboot
- Jul 15 17:31:26 pppd[495]: Connection terminated.
- Jul 15 17:31:27 iTunes: daemon is stoped
- Jul 15 17:31:27 FTP Server: daemon is stoped
- Jul 15 17:31:27 Samba Server: smb daemon is stoped
- Jul 15 17:31:27 kernel: gro disabled
- Jul 15 17:31:28 Timemachine: daemon is stoped
- Jul 15 17:31:28 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: Empty flash at 0x00e6ebc8 ends at 0x00e6f000
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[483]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[483]: HTTP listening on port 44134
- Aug 1 00:00:25 miniupnpd[483]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[494]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:35 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 612:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[483]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[650]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[650]: HTTP listening on port 60144
- Aug 1 00:00:38 miniupnpd[650]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:40 pppd[494]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[494]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:43 pppd[494]: CHAP authentication succeeded
- Aug 1 00:00:43 pppd[494]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[494]: local IP address 109.159.169.211
- Aug 1 00:00:44 pppd[494]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 664:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[650]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:45 wan: finish adding multi routes
- Aug 1 00:00:45 rc_service: ip-up 664:notify_rc stop_upnp
- Aug 1 00:00:45 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:45 miniupnpd[705]: version 1.9 started
- Aug 1 00:00:45 miniupnpd[705]: HTTP listening on port 60777
- Aug 1 00:00:45 miniupnpd[705]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:46 rc_service: ip-up 664:notify_rc start_upnp
- Aug 1 00:00:46 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:46 miniupnpd[705]: shutting down MiniUPnPd
- Aug 1 00:00:47 miniupnpd[710]: version 1.9 started
- Aug 1 00:00:47 miniupnpd[710]: HTTP listening on port 50886
- Aug 1 00:00:47 miniupnpd[710]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:48 WAN Connection: WAN was restored.
- Aug 1 00:00:48 ntp: start NTP update
- Jul 15 17:34:03 rc_service: ntp 708:notify_rc restart_upnp
- Jul 15 17:34:03 miniupnpd[710]: shutting down MiniUPnPd
- Jul 15 17:34:03 miniupnpd[721]: version 1.9 started
- Jul 15 17:34:03 miniupnpd[721]: HTTP listening on port 57751
- Jul 15 17:34:03 miniupnpd[721]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 15 17:34:04 rc_service: ntp 708:notify_rc restart_diskmon
- Jul 15 17:34:04 disk_monitor: Finish
- Jul 15 17:34:06 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 15 17:34:06 disk monitor: be idle
- Jul 15 17:34:06 kernel: sizeof forward param = 160
- Jul 15 17:34:10 rc_service: ip-up 664:notify_rc start_firewall
- Jul 15 17:34:11 miniupnpd[721]: shutting down MiniUPnPd
- Jul 15 17:34:12 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 15 17:34:13 miniupnpd[830]: version 1.9 started
- Jul 15 17:34:13 miniupnpd[830]: HTTP listening on port 35880
- Jul 15 17:34:13 miniupnpd[830]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 15 17:34:15 crond[445]: time disparity of 1029213 minutes detected
- Jul 15 17:35:38 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 15 18:00:06 disk_monitor: Got SIGALRM...
- Jul 15 23:00:06 disk_monitor: Got SIGALRM...
- Jul 16 05:34:01 ntp: start NTP update
- Jul 16 17:34:01 ntp: start NTP update
- Jul 17 05:34:01 ntp: start NTP update
- Jul 17 17:33:59 ntp: start NTP update
- Jul 18 05:34:00 ntp: start NTP update
- Jul 18 17:33:58 ntp: start NTP update
- Jul 19 05:33:58 ntp: start NTP update
- Jul 19 17:33:56 ntp: start NTP update
- Jul 20 05:33:56 ntp: start NTP update
- Jul 20 17:33:54 ntp: start NTP update
- Jul 20 18:05:59 rc_service: httpd 443:notify_rc reboot
- Jul 20 18:06:00 pppd[494]: Connection terminated.
- Jul 20 18:06:01 iTunes: daemon is stoped
- Jul 20 18:06:01 FTP Server: daemon is stoped
- Jul 20 18:06:01 Samba Server: smb daemon is stoped
- Jul 20 18:06:01 kernel: gro disabled
- Jul 20 18:06:01 Timemachine: daemon is stoped
- Jul 20 18:06:01 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 miniupnpd[485]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[485]: HTTP listening on port 42093
- Aug 1 00:00:25 miniupnpd[485]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[487]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:36 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[485]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 47342
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:40 pppd[487]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[487]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:44 pppd[487]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[487]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:45 pppd[487]: local IP address 109.159.169.211
- Aug 1 00:00:45 pppd[487]: remote IP address 172.16.19.146
- Aug 1 00:00:45 rc_service: ip-up 663:notify_rc start_firewall
- Aug 1 00:00:46 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 663:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[714]: HTTP listening on port 56443
- Aug 1 00:00:46 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 663:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[718]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[718]: HTTP listening on port 40447
- Aug 1 00:00:48 miniupnpd[718]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 WAN Connection: WAN was restored.
- Aug 1 00:00:49 ntp: start NTP update
- Jul 20 18:08:42 rc_service: ntp 717:notify_rc restart_upnp
- Jul 20 18:08:42 miniupnpd[718]: shutting down MiniUPnPd
- Jul 20 18:08:43 miniupnpd[729]: version 1.9 started
- Jul 20 18:08:43 miniupnpd[729]: HTTP listening on port 53349
- Jul 20 18:08:43 miniupnpd[729]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 20 18:08:43 rc_service: ntp 717:notify_rc restart_diskmon
- Jul 20 18:08:43 disk_monitor: Finish
- Jul 20 18:08:45 disk monitor: be idle
- Jul 20 18:08:45 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 20 18:08:46 kernel: sizeof forward param = 160
- Jul 20 18:08:50 rc_service: ip-up 663:notify_rc start_firewall
- Jul 20 18:08:51 miniupnpd[729]: shutting down MiniUPnPd
- Jul 20 18:08:51 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 20 18:08:52 miniupnpd[839]: version 1.9 started
- Jul 20 18:08:52 miniupnpd[839]: HTTP listening on port 60071
- Jul 20 18:08:52 miniupnpd[839]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 20 18:08:54 crond[444]: time disparity of 1036448 minutes detected
- Jul 20 18:10:18 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 20 18:15:18 rc_service: httpd 442:notify_rc reboot
- Jul 20 18:15:19 pppd[487]: Connection terminated.
- Jul 20 18:15:21 iTunes: daemon is stoped
- Jul 20 18:15:21 FTP Server: daemon is stoped
- Jul 20 18:15:21 Samba Server: smb daemon is stoped
- Jul 20 18:15:21 kernel: gro disabled
- Jul 20 18:15:21 Timemachine: daemon is stoped
- Jul 20 18:15:21 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:14 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:15 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 disk monitor: be idle
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[485]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[485]: HTTP listening on port 36208
- Aug 1 00:00:25 miniupnpd[485]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[488]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:35 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:36 rc_service: zcip 611:notify_rc start_firewall
- Aug 1 00:00:36 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[485]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:38 miniupnpd[649]: version 1.9 started
- Aug 1 00:00:38 miniupnpd[649]: HTTP listening on port 53541
- Aug 1 00:00:38 miniupnpd[649]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 pppd[488]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:40 pppd[488]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[488]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[488]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:45 pppd[488]: local IP address 109.159.191.9
- Aug 1 00:00:45 pppd[488]: remote IP address 172.16.19.146
- Aug 1 00:00:45 rc_service: ip-up 665:notify_rc start_firewall
- Aug 1 00:00:46 miniupnpd[649]: shutting down MiniUPnPd
- Aug 1 00:00:46 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:46 wan: finish adding multi routes
- Aug 1 00:00:46 rc_service: ip-up 665:notify_rc stop_upnp
- Aug 1 00:00:46 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:46 miniupnpd[714]: version 1.9 started
- Aug 1 00:00:46 miniupnpd[714]: HTTP listening on port 54125
- Aug 1 00:00:46 miniupnpd[714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:47 rc_service: ip-up 665:notify_rc start_upnp
- Aug 1 00:00:47 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:47 miniupnpd[714]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[719]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[719]: HTTP listening on port 38164
- Aug 1 00:00:48 miniupnpd[719]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 WAN Connection: WAN was restored.
- Aug 1 00:00:49 ntp: start NTP update
- Jul 20 18:17:57 rc_service: ntp 717:notify_rc restart_upnp
- Jul 20 18:17:57 miniupnpd[719]: shutting down MiniUPnPd
- Jul 20 18:17:57 miniupnpd[729]: version 1.9 started
- Jul 20 18:17:57 miniupnpd[729]: HTTP listening on port 49345
- Jul 20 18:17:57 miniupnpd[729]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 20 18:17:58 rc_service: ntp 717:notify_rc restart_diskmon
- Jul 20 18:17:58 disk_monitor: Finish
- Jul 20 18:18:00 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Jul 20 18:18:00 disk monitor: be idle
- Jul 20 18:18:01 kernel: sizeof forward param = 160
- Jul 20 18:18:05 rc_service: ip-up 665:notify_rc start_firewall
- Jul 20 18:18:06 miniupnpd[729]: shutting down MiniUPnPd
- Jul 20 18:18:06 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 20 18:18:07 miniupnpd[835]: version 1.9 started
- Jul 20 18:18:07 miniupnpd[835]: HTTP listening on port 51502
- Jul 20 18:18:07 miniupnpd[835]: Listening for NAT-PMP/PCP traffic on port 5351
- Jul 20 18:18:08 crond[444]: time disparity of 1036457 minutes detected
- Jul 20 18:19:32 hour monitor: ntp sync fail, will retry after 120 sec
- Jul 20 19:00:00 disk_monitor: Got SIGALRM...
- Jul 20 23:00:00 disk_monitor: Got SIGALRM...
- Jul 21 06:17:55 ntp: start NTP update
- Jul 21 18:17:55 ntp: start NTP update
- Jul 22 06:17:53 ntp: start NTP update
- Jul 22 18:17:51 ntp: start NTP update
- Jul 23 02:00:27 rc_service: rc 23504:notify_rc restart_wrs
- Jul 23 06:17:51 ntp: start NTP update
- Jul 23 18:17:49 ntp: start NTP update
- Jul 24 06:17:47 ntp: start NTP update
- Jul 24 13:24:46 kernel: SKIPPED false Type 1 Radar Detection. min_pw=6 pw_delta=0 pri=21386 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 328039, = 5467min 19sec. Detected pulse index: 3
- Jul 24 13:25:44 kernel: Type 1 Radar Detection. Detected pulse index=0 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 58, = 0min 58sec
- Jul 24 18:17:45 ntp: start NTP update
- Jul 25 06:17:45 ntp: start NTP update
- Jul 25 18:17:45 ntp: start NTP update
- Jul 26 06:17:45 ntp: start NTP update
- Jul 26 18:17:44 ntp: start NTP update
- Jul 27 06:17:42 ntp: start NTP update
- Jul 27 09:19:49 WAN Connection: Ethernet link down.
- Jul 27 09:19:49 stop_nat_rules: apply the redirect_rules!
- Jul 27 09:20:05 WAN Connection: WAN was restored.
- Jul 27 09:20:05 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Jul 27 18:17:39 ntp: start NTP update
- Jul 28 06:17:39 ntp: start NTP update
- Jul 28 18:17:38 ntp: start NTP update
- Jul 29 06:17:38 ntp: start NTP update
- Jul 29 18:17:36 ntp: start NTP update
- Jul 30 06:17:33 ntp: start NTP update
- Jul 30 18:17:31 ntp: start NTP update
- Jul 31 06:17:31 ntp: start NTP update
- Jul 31 09:00:17 kernel: SKIPPED false Type 1 Radar Detection. min_pw=6 pw_delta=0 pri=24083 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 588867, = 9814min 27sec. Detected pulse index: 0
- Jul 31 09:00:20 kernel: Type 1 Radar Detection. Detected pulse index=0 fm_min=0 fm_max=0 nconsecq_pulses=3. Time from last detection = 2, = 0min 2sec
- Jul 31 18:17:29 ntp: start NTP update
- Aug 1 06:17:27 ntp: start NTP update
- Aug 1 18:17:25 ntp: start NTP update
- Aug 2 06:17:25 ntp: start NTP update
- Aug 2 18:17:23 ntp: start NTP update
- Aug 3 06:17:21 ntp: start NTP update
- Aug 3 18:17:18 ntp: start NTP update
- Aug 4 06:17:16 ntp: start NTP update
- Aug 4 18:17:14 ntp: start NTP update
- Aug 5 06:17:12 ntp: start NTP update
- Aug 5 18:17:09 ntp: start NTP update
- Aug 6 02:01:42 rc_service: rc 6040:notify_rc restart_wrs
- Aug 6 06:17:07 ntp: start NTP update
- Aug 6 07:59:29 WAN Connection: Ethernet link down.
- Aug 6 07:59:29 stop_nat_rules: apply the redirect_rules!
- Aug 6 07:59:50 WAN Connection: WAN was restored.
- Aug 6 07:59:50 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 6 18:17:07 ntp: start NTP update
- Aug 7 06:17:05 ntp: start NTP update
- Aug 7 18:17:03 ntp: start NTP update
- Aug 8 06:17:01 ntp: start NTP update
- Aug 8 18:16:58 ntp: start NTP update
- Aug 9 06:16:59 ntp: start NTP update
- Aug 9 18:16:57 ntp: start NTP update
- Aug 10 06:16:54 ntp: start NTP update
- Aug 10 18:16:52 ntp: start NTP update
- Aug 11 06:16:52 ntp: start NTP update
- Aug 11 18:16:50 ntp: start NTP update
- Aug 12 06:16:50 ntp: start NTP update
- Aug 12 16:33:50 rc_service: httpd 442:notify_rc restart_firewall
- Aug 12 16:33:51 miniupnpd[835]: shutting down MiniUPnPd
- Aug 12 16:33:51 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 12 16:33:51 miniupnpd[25037]: version 1.9 started
- Aug 12 16:33:51 miniupnpd[25037]: HTTP listening on port 52788
- Aug 12 16:33:51 miniupnpd[25037]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 12 17:11:15 rc_service: httpd 442:notify_rc restart_firewall
- Aug 12 17:11:15 miniupnpd[25037]: shutting down MiniUPnPd
- Aug 12 17:11:15 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 12 17:11:16 miniupnpd[28529]: version 1.9 started
- Aug 12 17:11:16 miniupnpd[28529]: HTTP listening on port 49127
- Aug 12 17:11:16 miniupnpd[28529]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 12 17:15:11 rc_service: httpd 442:notify_rc restart_firewall
- Aug 12 17:15:12 miniupnpd[28529]: shutting down MiniUPnPd
- Aug 12 17:15:12 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 12 17:15:12 miniupnpd[28909]: version 1.9 started
- Aug 12 17:15:12 miniupnpd[28909]: HTTP listening on port 43719
- Aug 12 17:15:12 miniupnpd[28909]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 12 18:16:49 ntp: start NTP update
- Aug 13 06:16:46 ntp: start NTP update
- Aug 13 10:53:07 rc_service: httpd 442:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 10:53:13 openvpn[31181]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 10:53:13 openvpn[31181]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 10:53:13 openvpn[31181]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 10:53:13 openvpn[31181]: Socket Buffers: R=[122880->131072] S=[122880->131072]
- Aug 13 10:53:13 openvpn[31181]: TUN/TAP device tun21 opened
- Aug 13 10:53:13 openvpn[31181]: TUN/TAP TX queue length set to 100
- Aug 13 10:53:13 openvpn[31181]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 10:53:13 openvpn[31181]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 10:53:13 openvpn[31181]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 10:53:13 openvpn[31187]: UDPv4 link local (bound): [undef]
- Aug 13 10:53:13 openvpn[31187]: UDPv4 link remote: [undef]
- Aug 13 10:53:13 openvpn[31187]: MULTI: multi_init called, r=256 v=256
- Aug 13 10:53:13 openvpn[31187]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 10:53:13 openvpn[31187]: Initialization Sequence Completed
- Aug 13 10:53:13 Samba Server: smb daemon is stoped
- Aug 13 10:53:13 kernel: gro disabled
- Aug 13 11:12:56 openvpn[31187]: 144.136.137.17:4788 TLS: Initial packet from [AF_INET]144.136.137.17:4788, sid=2b5f3983 c1c9baea
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=DSL-AC68U, emailAddress=me@myhost.mydomain
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 TLS: Username/Password authentication succeeded for username 'memes'
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:13:00 openvpn[31187]: 144.136.137.17:4788 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:13:01 openvpn[31187]: 144.136.137.17:4788 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Aug 13 11:13:01 openvpn[31187]: 144.136.137.17:4788 [client] Peer Connection Initiated with [AF_INET]144.136.137.17:4788
- Aug 13 11:13:01 openvpn[31187]: client/144.136.137.17:4788 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Aug 13 11:13:01 openvpn[31187]: client/144.136.137.17:4788 MULTI: Learn: 10.8.0.6 -> client/144.136.137.17:4788
- Aug 13 11:13:01 openvpn[31187]: client/144.136.137.17:4788 MULTI: primary virtual IP for client/144.136.137.17:4788: 10.8.0.6
- Aug 13 11:13:02 openvpn[31187]: client/144.136.137.17:4788 PUSH: Received control message: 'PUSH_REQUEST'
- Aug 13 11:13:02 openvpn[31187]: client/144.136.137.17:4788 send_push_reply(): safe_cap=940
- Aug 13 11:13:02 openvpn[31187]: client/144.136.137.17:4788 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Aug 13 11:14:27 openvpn[31187]: 144.136.137.17:55594 TLS: Initial packet from [AF_INET]144.136.137.17:55594, sid=38b6df48 4204c074
- Aug 13 11:14:30 openvpn[31187]: 144.136.137.17:55594 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=DSL-AC68U, emailAddress=me@myhost.mydomain
- Aug 13 11:14:30 openvpn[31187]: 144.136.137.17:55594 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 TLS: Username/Password authentication succeeded for username 'memes'
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Aug 13 11:14:31 openvpn[31187]: 144.136.137.17:55594 [client] Peer Connection Initiated with [AF_INET]144.136.137.17:55594
- Aug 13 11:14:31 openvpn[31187]: client/144.136.137.17:55594 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)
- Aug 13 11:14:31 openvpn[31187]: client/144.136.137.17:55594 MULTI: Learn: 10.8.0.10 -> client/144.136.137.17:55594
- Aug 13 11:14:31 openvpn[31187]: client/144.136.137.17:55594 MULTI: primary virtual IP for client/144.136.137.17:55594: 10.8.0.10
- Aug 13 11:14:33 openvpn[31187]: client/144.136.137.17:55594 PUSH: Received control message: 'PUSH_REQUEST'
- Aug 13 11:14:33 openvpn[31187]: client/144.136.137.17:55594 send_push_reply(): safe_cap=940
- Aug 13 11:14:33 openvpn[31187]: client/144.136.137.17:55594 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.10 10.8.0.9' (status=1)
- Aug 13 11:16:18 openvpn[31187]: client/144.136.137.17:4788 [client] Inactivity timeout (--ping-restart), restarting
- Aug 13 11:16:18 openvpn[31187]: client/144.136.137.17:4788 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Aug 13 11:17:30 rc_service: httpd 442:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 11:17:31 openvpn[31187]: event_wait : Interrupted system call (code=4)
- Aug 13 11:17:31 openvpn[31187]: /sbin/route del -net 10.8.0.0 netmask 255.255.255.0
- Aug 13 11:17:31 openvpn[31187]: Closing TUN/TAP interface
- Aug 13 11:17:31 openvpn[31187]: /sbin/ifconfig tun21 0.0.0.0
- Aug 13 11:17:31 openvpn[31187]: PLUGIN_CLOSE: /usr/lib/openvpn-plugin-auth-pam.so
- Aug 13 11:17:31 openvpn[31187]: SIGTERM[hard,] received, process exiting
- Aug 13 11:17:33 openvpn[1160]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 11:17:33 openvpn[1160]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 11:17:33 openvpn[1160]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 11:17:33 openvpn[1160]: Socket Buffers: R=[122880->131072] S=[122880->131072]
- Aug 13 11:17:33 openvpn[1160]: TUN/TAP device tun21 opened
- Aug 13 11:17:33 openvpn[1160]: TUN/TAP TX queue length set to 100
- Aug 13 11:17:33 openvpn[1160]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 11:17:33 openvpn[1160]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 11:17:33 openvpn[1160]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 11:17:33 openvpn[1169]: UDPv4 link local (bound): [undef]
- Aug 13 11:17:33 openvpn[1169]: UDPv4 link remote: [undef]
- Aug 13 11:17:33 openvpn[1169]: MULTI: multi_init called, r=256 v=256
- Aug 13 11:17:33 openvpn[1169]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 11:17:33 openvpn[1169]: Initialization Sequence Completed
- Aug 13 11:17:33 Samba Server: smb daemon is stoped
- Aug 13 11:17:33 kernel: gro disabled
- Aug 13 11:18:26 openvpn[1169]: 144.136.137.17:41033 TLS: Initial packet from [AF_INET]144.136.137.17:41033, sid=7ffe3a72 f407b34c
- Aug 13 11:18:29 openvpn[1169]: 144.136.137.17:41033 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=DSL-AC68U, emailAddress=me@myhost.mydomain
- Aug 13 11:18:29 openvpn[1169]: 144.136.137.17:41033 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 TLS: Username/Password authentication succeeded for username 'memes'
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Aug 13 11:18:30 openvpn[1169]: 144.136.137.17:41033 [client] Peer Connection Initiated with [AF_INET]144.136.137.17:41033
- Aug 13 11:18:30 openvpn[1169]: client/144.136.137.17:41033 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Aug 13 11:18:30 openvpn[1169]: client/144.136.137.17:41033 MULTI: Learn: 10.8.0.6 -> client/144.136.137.17:41033
- Aug 13 11:18:30 openvpn[1169]: client/144.136.137.17:41033 MULTI: primary virtual IP for client/144.136.137.17:41033: 10.8.0.6
- Aug 13 11:18:31 openvpn[1169]: client/144.136.137.17:41033 PUSH: Received control message: 'PUSH_REQUEST'
- Aug 13 11:18:31 openvpn[1169]: client/144.136.137.17:41033 send_push_reply(): safe_cap=940
- Aug 13 11:18:31 openvpn[1169]: client/144.136.137.17:41033 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,redirect-gateway def1,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Aug 13 11:18:41 rc_service: httpd 442:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 11:18:42 openvpn[1169]: event_wait : Interrupted system call (code=4)
- Aug 13 11:18:42 openvpn[1169]: /sbin/route del -net 10.8.0.0 netmask 255.255.255.0
- Aug 13 11:18:42 openvpn[1169]: Closing TUN/TAP interface
- Aug 13 11:18:42 openvpn[1169]: /sbin/ifconfig tun21 0.0.0.0
- Aug 13 11:18:42 openvpn[1169]: PLUGIN_CLOSE: /usr/lib/openvpn-plugin-auth-pam.so
- Aug 13 11:18:42 openvpn[1169]: SIGTERM[hard,] received, process exiting
- Aug 13 11:18:44 openvpn[1365]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 11:18:44 openvpn[1365]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 11:18:44 openvpn[1365]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 11:18:44 openvpn[1365]: Socket Buffers: R=[87380->131072] S=[16384->131072]
- Aug 13 11:18:44 openvpn[1365]: TUN/TAP device tun21 opened
- Aug 13 11:18:44 openvpn[1365]: TUN/TAP TX queue length set to 100
- Aug 13 11:18:44 openvpn[1365]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 11:18:44 openvpn[1365]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 11:18:44 openvpn[1365]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 11:18:44 openvpn[1373]: Listening for incoming TCP connection on [undef]
- Aug 13 11:18:44 openvpn[1373]: TCPv4_SERVER link local (bound): [undef]
- Aug 13 11:18:44 openvpn[1373]: TCPv4_SERVER link remote: [undef]
- Aug 13 11:18:44 openvpn[1373]: MULTI: multi_init called, r=256 v=256
- Aug 13 11:18:44 openvpn[1373]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 11:18:44 openvpn[1373]: MULTI: TCP INIT maxclients=1024 maxevents=1028
- Aug 13 11:18:44 openvpn[1373]: Initialization Sequence Completed
- Aug 13 11:18:44 Samba Server: smb daemon is stoped
- Aug 13 11:18:44 kernel: gro disabled
- Aug 13 11:22:13 rc_service: httpd 442:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 11:22:15 openvpn[1373]: /sbin/route del -net 10.8.0.0 netmask 255.255.255.0
- Aug 13 11:22:15 openvpn[1373]: Closing TUN/TAP interface
- Aug 13 11:22:15 openvpn[1373]: /sbin/ifconfig tun21 0.0.0.0
- Aug 13 11:22:15 openvpn[1373]: PLUGIN_CLOSE: /usr/lib/openvpn-plugin-auth-pam.so
- Aug 13 11:22:15 openvpn[1373]: SIGTERM[hard,] received, process exiting
- Aug 13 11:22:16 openvpn[1770]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 11:22:16 openvpn[1770]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 11:22:16 openvpn[1770]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 11:22:16 openvpn[1770]: Socket Buffers: R=[122880->131072] S=[122880->131072]
- Aug 13 11:22:16 openvpn[1770]: TUN/TAP device tun21 opened
- Aug 13 11:22:16 openvpn[1770]: TUN/TAP TX queue length set to 100
- Aug 13 11:22:16 openvpn[1770]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 11:22:16 openvpn[1770]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 11:22:16 openvpn[1770]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 11:22:16 openvpn[1778]: UDPv4 link local (bound): [undef]
- Aug 13 11:22:16 openvpn[1778]: UDPv4 link remote: [undef]
- Aug 13 11:22:16 openvpn[1778]: MULTI: multi_init called, r=256 v=256
- Aug 13 11:22:16 openvpn[1778]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 11:22:16 openvpn[1778]: Initialization Sequence Completed
- Aug 13 11:22:16 Samba Server: smb daemon is stoped
- Aug 13 11:22:16 kernel: gro disabled
- Aug 13 11:22:55 openvpn[1778]: 144.136.137.17:30810 TLS: Initial packet from [AF_INET]144.136.137.17:30810, sid=8d7a2bc5 f9a5b607
- Aug 13 11:22:59 openvpn[1778]: 144.136.137.17:30810 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=DSL-AC68U, emailAddress=me@myhost.mydomain
- Aug 13 11:22:59 openvpn[1778]: 144.136.137.17:30810 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 TLS: Username/Password authentication succeeded for username 'memes'
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Aug 13 11:23:00 openvpn[1778]: 144.136.137.17:30810 [client] Peer Connection Initiated with [AF_INET]144.136.137.17:30810
- Aug 13 11:23:00 openvpn[1778]: client/144.136.137.17:30810 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Aug 13 11:23:00 openvpn[1778]: client/144.136.137.17:30810 MULTI: Learn: 10.8.0.6 -> client/144.136.137.17:30810
- Aug 13 11:23:00 openvpn[1778]: client/144.136.137.17:30810 MULTI: primary virtual IP for client/144.136.137.17:30810: 10.8.0.6
- Aug 13 11:23:01 openvpn[1778]: client/144.136.137.17:30810 PUSH: Received control message: 'PUSH_REQUEST'
- Aug 13 11:23:01 openvpn[1778]: client/144.136.137.17:30810 send_push_reply(): safe_cap=940
- Aug 13 11:23:01 openvpn[1778]: client/144.136.137.17:30810 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,redirect-gateway def1,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Aug 13 11:28:49 rc_service: httpd 442:notify_rc stop_openvpnd;restart_samba
- Aug 13 11:28:51 openvpn[1778]: event_wait : Interrupted system call (code=4)
- Aug 13 11:28:51 openvpn[1778]: /sbin/route del -net 10.8.0.0 netmask 255.255.255.0
- Aug 13 11:28:51 openvpn[1778]: Closing TUN/TAP interface
- Aug 13 11:28:51 openvpn[1778]: /sbin/ifconfig tun21 0.0.0.0
- Aug 13 11:28:51 openvpn[1778]: PLUGIN_CLOSE: /usr/lib/openvpn-plugin-auth-pam.so
- Aug 13 11:28:51 openvpn[1778]: SIGTERM[hard,] received, process exiting
- Aug 13 11:28:52 Samba Server: smb daemon is stoped
- Aug 13 11:28:52 kernel: gro disabled
- Aug 13 14:59:44 rc_service: httpd 442:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 14:59:47 openvpn[22355]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 14:59:47 openvpn[22355]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 14:59:47 openvpn[22355]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 14:59:47 openvpn[22355]: Socket Buffers: R=[122880->131072] S=[122880->131072]
- Aug 13 14:59:47 openvpn[22355]: TUN/TAP device tun21 opened
- Aug 13 14:59:47 openvpn[22355]: TUN/TAP TX queue length set to 100
- Aug 13 14:59:47 openvpn[22355]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 14:59:47 openvpn[22355]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 14:59:47 openvpn[22355]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 14:59:47 openvpn[22361]: UDPv4 link local (bound): [undef]
- Aug 13 14:59:47 openvpn[22361]: UDPv4 link remote: [undef]
- Aug 13 14:59:47 openvpn[22361]: MULTI: multi_init called, r=256 v=256
- Aug 13 14:59:47 openvpn[22361]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 14:59:47 openvpn[22361]: Initialization Sequence Completed
- Aug 13 14:59:47 Samba Server: smb daemon is stoped
- Aug 13 14:59:47 kernel: gro disabled
- Aug 13 15:05:09 openvpn[22361]: 144.136.137.17:13564 TLS: Initial packet from [AF_INET]144.136.137.17:13564, sid=248cfbe1 98fa3208
- Aug 13 15:05:13 openvpn[22361]: 144.136.137.17:13564 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:05:13 openvpn[22361]: 144.136.137.17:13564 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:05:13 openvpn[22361]: 144.136.137.17:13564 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:05:13 openvpn[22361]: 144.136.137.17:13564 TLS Error: TLS handshake failed
- Aug 13 15:05:13 openvpn[22361]: 144.136.137.17:13564 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:05:23 openvpn[22361]: 144.136.137.17:15018 TLS: Initial packet from [AF_INET]144.136.137.17:15018, sid=ce70e883 efb3a353
- Aug 13 15:05:26 openvpn[22361]: 144.136.137.17:15018 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:05:26 openvpn[22361]: 144.136.137.17:15018 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:05:26 openvpn[22361]: 144.136.137.17:15018 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:05:26 openvpn[22361]: 144.136.137.17:15018 TLS Error: TLS handshake failed
- Aug 13 15:05:26 openvpn[22361]: 144.136.137.17:15018 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:06:25 openvpn[22361]: 144.136.137.17:13720 TLS: Initial packet from [AF_INET]144.136.137.17:13720, sid=f5750aa0 da7f48af
- Aug 13 15:06:28 openvpn[22361]: 144.136.137.17:13720 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:06:28 openvpn[22361]: 144.136.137.17:13720 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:06:28 openvpn[22361]: 144.136.137.17:13720 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:06:28 openvpn[22361]: 144.136.137.17:13720 TLS Error: TLS handshake failed
- Aug 13 15:06:28 openvpn[22361]: 144.136.137.17:13720 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:07:10 openvpn[22361]: 144.136.137.17:28858 TLS: Initial packet from [AF_INET]144.136.137.17:28858, sid=b69dddcd a99ce82f
- Aug 13 15:07:13 openvpn[22361]: 144.136.137.17:28858 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:07:13 openvpn[22361]: 144.136.137.17:28858 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:07:13 openvpn[22361]: 144.136.137.17:28858 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:07:13 openvpn[22361]: 144.136.137.17:28858 TLS Error: TLS handshake failed
- Aug 13 15:07:13 openvpn[22361]: 144.136.137.17:28858 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:08:12 openvpn[22361]: 144.136.137.17:20261 TLS: Initial packet from [AF_INET]144.136.137.17:20261, sid=0120e171 c96d06d2
- Aug 13 15:08:16 openvpn[22361]: 144.136.137.17:20261 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:08:16 openvpn[22361]: 144.136.137.17:20261 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:08:16 openvpn[22361]: 144.136.137.17:20261 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:08:16 openvpn[22361]: 144.136.137.17:20261 TLS Error: TLS handshake failed
- Aug 13 15:08:16 openvpn[22361]: 144.136.137.17:20261 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:09:13 openvpn[22361]: 144.136.137.17:27063 TLS: Initial packet from [AF_INET]144.136.137.17:27063, sid=4175de10 58a33117
- Aug 13 15:09:18 openvpn[22361]: 144.136.137.17:49100 TLS: Initial packet from [AF_INET]144.136.137.17:49100, sid=8d49fd50 9828539c
- Aug 13 15:09:22 openvpn[22361]: 144.136.137.17:64295 TLS: Initial packet from [AF_INET]144.136.137.17:64295, sid=c2c51ea6 028ee384
- Aug 13 15:09:27 openvpn[22361]: 144.136.137.17:43975 TLS: Initial packet from [AF_INET]144.136.137.17:43975, sid=2684c7af cff7c0f4
- Aug 13 15:09:31 openvpn[22361]: 144.136.137.17:25328 TLS: Initial packet from [AF_INET]144.136.137.17:25328, sid=74bbf031 f18ee667
- Aug 13 15:09:36 openvpn[22361]: 144.136.137.17:48211 TLS: Initial packet from [AF_INET]144.136.137.17:48211, sid=edeebdec 53230eba
- Aug 13 15:09:40 openvpn[22361]: 144.136.137.17:17387 TLS: Initial packet from [AF_INET]144.136.137.17:17387, sid=7ce86db4 e068c620
- Aug 13 15:09:45 openvpn[22361]: 144.136.137.17:23220 TLS: Initial packet from [AF_INET]144.136.137.17:23220, sid=c6cd3856 7d31b5c6
- Aug 13 15:09:49 openvpn[22361]: 144.136.137.17:42617 TLS: Initial packet from [AF_INET]144.136.137.17:42617, sid=d02b6fb8 cb02cdbf
- Aug 13 15:09:54 openvpn[22361]: 144.136.137.17:49665 TLS: Initial packet from [AF_INET]144.136.137.17:49665, sid=f37cb9ab bcb7f98f
- Aug 13 15:09:58 openvpn[22361]: 144.136.137.17:9762 TLS: Initial packet from [AF_INET]144.136.137.17:9762, sid=9c0c221c 2285c868
- Aug 13 15:10:02 openvpn[22361]: 144.136.137.17:9539 TLS: Initial packet from [AF_INET]144.136.137.17:9539, sid=f7d947a8 f45467dc
- Aug 13 15:10:07 openvpn[22361]: 144.136.137.17:61716 TLS: Initial packet from [AF_INET]144.136.137.17:61716, sid=5d77ed19 dbd84a83
- Aug 13 15:10:11 openvpn[22361]: 144.136.137.17:48764 TLS: Initial packet from [AF_INET]144.136.137.17:48764, sid=1fabe140 ededfc96
- Aug 13 15:10:14 openvpn[22361]: 144.136.137.17:27063 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:14 openvpn[22361]: 144.136.137.17:27063 TLS Error: TLS handshake failed
- Aug 13 15:10:14 openvpn[22361]: 144.136.137.17:27063 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:16 openvpn[22361]: 144.136.137.17:4127 TLS: Initial packet from [AF_INET]144.136.137.17:4127, sid=70cc21aa b2127327
- Aug 13 15:10:18 openvpn[22361]: 144.136.137.17:49100 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:18 openvpn[22361]: 144.136.137.17:49100 TLS Error: TLS handshake failed
- Aug 13 15:10:18 openvpn[22361]: 144.136.137.17:49100 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:20 openvpn[22361]: 144.136.137.17:36199 TLS: Initial packet from [AF_INET]144.136.137.17:36199, sid=224109bd 69c576f8
- Aug 13 15:10:22 openvpn[22361]: 144.136.137.17:64295 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:22 openvpn[22361]: 144.136.137.17:64295 TLS Error: TLS handshake failed
- Aug 13 15:10:22 openvpn[22361]: 144.136.137.17:64295 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:24 openvpn[22361]: 144.136.137.17:26766 TLS: Initial packet from [AF_INET]144.136.137.17:26766, sid=2beb5720 b9dcd00e
- Aug 13 15:10:28 openvpn[22361]: 144.136.137.17:43975 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:28 openvpn[22361]: 144.136.137.17:43975 TLS Error: TLS handshake failed
- Aug 13 15:10:28 openvpn[22361]: 144.136.137.17:43975 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:29 openvpn[22361]: 144.136.137.17:8387 TLS: Initial packet from [AF_INET]144.136.137.17:8387, sid=33fdafdb 750764b6
- Aug 13 15:10:31 openvpn[22361]: 144.136.137.17:25328 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:31 openvpn[22361]: 144.136.137.17:25328 TLS Error: TLS handshake failed
- Aug 13 15:10:31 openvpn[22361]: 144.136.137.17:25328 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:33 openvpn[22361]: 144.136.137.17:39395 TLS: Initial packet from [AF_INET]144.136.137.17:39395, sid=fe88bb2a 9c31b72a
- Aug 13 15:10:36 openvpn[22361]: 144.136.137.17:48211 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:36 openvpn[22361]: 144.136.137.17:48211 TLS Error: TLS handshake failed
- Aug 13 15:10:36 openvpn[22361]: 144.136.137.17:48211 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:38 openvpn[22361]: 144.136.137.17:21275 TLS: Initial packet from [AF_INET]144.136.137.17:21275, sid=4faebb9a 6b42917a
- Aug 13 15:10:40 openvpn[22361]: 144.136.137.17:17387 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:40 openvpn[22361]: 144.136.137.17:17387 TLS Error: TLS handshake failed
- Aug 13 15:10:40 openvpn[22361]: 144.136.137.17:17387 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:42 openvpn[22361]: 144.136.137.17:49594 TLS: Initial packet from [AF_INET]144.136.137.17:49594, sid=bdf0fed4 f0a05f7a
- Aug 13 15:10:45 openvpn[22361]: 144.136.137.17:23220 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:45 openvpn[22361]: 144.136.137.17:23220 TLS Error: TLS handshake failed
- Aug 13 15:10:45 openvpn[22361]: 144.136.137.17:23220 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:47 openvpn[22361]: 144.136.137.17:47075 TLS: Initial packet from [AF_INET]144.136.137.17:47075, sid=d96cde72 689651e0
- Aug 13 15:10:49 openvpn[22361]: 144.136.137.17:42617 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:49 openvpn[22361]: 144.136.137.17:42617 TLS Error: TLS handshake failed
- Aug 13 15:10:49 openvpn[22361]: 144.136.137.17:42617 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:51 openvpn[22361]: 144.136.137.17:33671 TLS: Initial packet from [AF_INET]144.136.137.17:33671, sid=d595393b cf0a9e7b
- Aug 13 15:10:54 openvpn[22361]: 144.136.137.17:49665 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:54 openvpn[22361]: 144.136.137.17:49665 TLS Error: TLS handshake failed
- Aug 13 15:10:54 openvpn[22361]: 144.136.137.17:49665 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:10:55 openvpn[22361]: 144.136.137.17:12172 TLS: Initial packet from [AF_INET]144.136.137.17:12172, sid=d46f8a90 9eb81772
- Aug 13 15:10:58 openvpn[22361]: 144.136.137.17:9762 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:10:58 openvpn[22361]: 144.136.137.17:9762 TLS Error: TLS handshake failed
- Aug 13 15:10:58 openvpn[22361]: 144.136.137.17:9762 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:00 openvpn[22361]: 144.136.137.17:39759 TLS: Initial packet from [AF_INET]144.136.137.17:39759, sid=97923d69 dfe786da
- Aug 13 15:11:02 openvpn[22361]: 144.136.137.17:9539 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:02 openvpn[22361]: 144.136.137.17:9539 TLS Error: TLS handshake failed
- Aug 13 15:11:02 openvpn[22361]: 144.136.137.17:9539 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:04 openvpn[22361]: 144.136.137.17:54838 TLS: Initial packet from [AF_INET]144.136.137.17:54838, sid=e522d34a 223a66bb
- Aug 13 15:11:07 openvpn[22361]: 144.136.137.17:61716 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:07 openvpn[22361]: 144.136.137.17:61716 TLS Error: TLS handshake failed
- Aug 13 15:11:07 openvpn[22361]: 144.136.137.17:61716 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:09 openvpn[22361]: 144.136.137.17:13306 TLS: Initial packet from [AF_INET]144.136.137.17:13306, sid=b7c0b1fa dffab450
- Aug 13 15:11:11 openvpn[22361]: 144.136.137.17:48764 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:11 openvpn[22361]: 144.136.137.17:48764 TLS Error: TLS handshake failed
- Aug 13 15:11:11 openvpn[22361]: 144.136.137.17:48764 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:13 openvpn[22361]: 144.136.137.17:15953 TLS: Initial packet from [AF_INET]144.136.137.17:15953, sid=23303e91 06dc3e3e
- Aug 13 15:11:16 openvpn[22361]: 144.136.137.17:4127 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:16 openvpn[22361]: 144.136.137.17:4127 TLS Error: TLS handshake failed
- Aug 13 15:11:16 openvpn[22361]: 144.136.137.17:4127 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:17 openvpn[22361]: 144.136.137.17:55813 TLS: Initial packet from [AF_INET]144.136.137.17:55813, sid=6c65fcf7 06023a3a
- Aug 13 15:11:20 openvpn[22361]: 144.136.137.17:36199 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:20 openvpn[22361]: 144.136.137.17:36199 TLS Error: TLS handshake failed
- Aug 13 15:11:20 openvpn[22361]: 144.136.137.17:36199 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:22 openvpn[22361]: 144.136.137.17:53869 TLS: Initial packet from [AF_INET]144.136.137.17:53869, sid=2b38e8a9 91d2492b
- Aug 13 15:11:24 openvpn[22361]: 144.136.137.17:26766 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:24 openvpn[22361]: 144.136.137.17:26766 TLS Error: TLS handshake failed
- Aug 13 15:11:24 openvpn[22361]: 144.136.137.17:26766 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:26 openvpn[22361]: 144.136.137.17:20097 TLS: Initial packet from [AF_INET]144.136.137.17:20097, sid=382c0f3c 6cffde89
- Aug 13 15:11:29 openvpn[22361]: 144.136.137.17:8387 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:29 openvpn[22361]: 144.136.137.17:8387 TLS Error: TLS handshake failed
- Aug 13 15:11:29 openvpn[22361]: 144.136.137.17:8387 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:31 openvpn[22361]: 144.136.137.17:58699 TLS: Initial packet from [AF_INET]144.136.137.17:58699, sid=51d9a135 7dd9e45e
- Aug 13 15:11:33 openvpn[22361]: 144.136.137.17:39395 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:33 openvpn[22361]: 144.136.137.17:39395 TLS Error: TLS handshake failed
- Aug 13 15:11:33 openvpn[22361]: 144.136.137.17:39395 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:35 openvpn[22361]: 144.136.137.17:19496 TLS: Initial packet from [AF_INET]144.136.137.17:19496, sid=b53c6cd9 508ff2d1
- Aug 13 15:11:38 openvpn[22361]: 144.136.137.17:21275 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:38 openvpn[22361]: 144.136.137.17:21275 TLS Error: TLS handshake failed
- Aug 13 15:11:38 openvpn[22361]: 144.136.137.17:21275 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:40 openvpn[22361]: 144.136.137.17:59379 TLS: Initial packet from [AF_INET]144.136.137.17:59379, sid=b178e423 2cb897c5
- Aug 13 15:11:42 openvpn[22361]: 144.136.137.17:49594 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:42 openvpn[22361]: 144.136.137.17:49594 TLS Error: TLS handshake failed
- Aug 13 15:11:42 openvpn[22361]: 144.136.137.17:49594 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:44 openvpn[22361]: 144.136.137.17:48985 TLS: Initial packet from [AF_INET]144.136.137.17:48985, sid=5f206fe3 c732cbd8
- Aug 13 15:11:48 openvpn[22361]: 144.136.137.17:47075 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:48 openvpn[22361]: 144.136.137.17:47075 TLS Error: TLS handshake failed
- Aug 13 15:11:48 openvpn[22361]: 144.136.137.17:47075 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:48 openvpn[22361]: 144.136.137.17:32728 TLS: Initial packet from [AF_INET]144.136.137.17:32728, sid=fbea12b0 3c7da3a4
- Aug 13 15:11:51 openvpn[22361]: 144.136.137.17:33671 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:51 openvpn[22361]: 144.136.137.17:33671 TLS Error: TLS handshake failed
- Aug 13 15:11:51 openvpn[22361]: 144.136.137.17:33671 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:53 openvpn[22361]: 144.136.137.17:26568 TLS: Initial packet from [AF_INET]144.136.137.17:26568, sid=2f2c0186 d91104ea
- Aug 13 15:11:55 openvpn[22361]: 144.136.137.17:12172 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:11:55 openvpn[22361]: 144.136.137.17:12172 TLS Error: TLS handshake failed
- Aug 13 15:11:55 openvpn[22361]: 144.136.137.17:12172 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:11:57 openvpn[22361]: 144.136.137.17:40061 TLS: Initial packet from [AF_INET]144.136.137.17:40061, sid=d6022ea4 b61430e2
- Aug 13 15:12:00 openvpn[22361]: 144.136.137.17:39759 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:00 openvpn[22361]: 144.136.137.17:39759 TLS Error: TLS handshake failed
- Aug 13 15:12:00 openvpn[22361]: 144.136.137.17:39759 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:02 openvpn[22361]: 144.136.137.17:48877 TLS: Initial packet from [AF_INET]144.136.137.17:48877, sid=80900af4 0277c6de
- Aug 13 15:12:04 openvpn[22361]: 144.136.137.17:54838 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:04 openvpn[22361]: 144.136.137.17:54838 TLS Error: TLS handshake failed
- Aug 13 15:12:04 openvpn[22361]: 144.136.137.17:54838 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:06 openvpn[22361]: 144.136.137.17:44816 TLS: Initial packet from [AF_INET]144.136.137.17:44816, sid=291a5a04 1bb2a4f4
- Aug 13 15:12:09 openvpn[22361]: 144.136.137.17:13306 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:09 openvpn[22361]: 144.136.137.17:13306 TLS Error: TLS handshake failed
- Aug 13 15:12:09 openvpn[22361]: 144.136.137.17:13306 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:11 openvpn[22361]: 144.136.137.17:56959 TLS: Initial packet from [AF_INET]144.136.137.17:56959, sid=cf900923 e972de0e
- Aug 13 15:12:13 openvpn[22361]: 144.136.137.17:15953 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:13 openvpn[22361]: 144.136.137.17:15953 TLS Error: TLS handshake failed
- Aug 13 15:12:13 openvpn[22361]: 144.136.137.17:15953 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:15 openvpn[22361]: 144.136.137.17:61470 TLS: Initial packet from [AF_INET]144.136.137.17:61470, sid=44ce5a65 5396bed2
- Aug 13 15:12:18 openvpn[22361]: 144.136.137.17:55813 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:18 openvpn[22361]: 144.136.137.17:55813 TLS Error: TLS handshake failed
- Aug 13 15:12:18 openvpn[22361]: 144.136.137.17:55813 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:19 openvpn[22361]: 144.136.137.17:32292 TLS: Initial packet from [AF_INET]144.136.137.17:32292, sid=48868078 48b74a47
- Aug 13 15:12:22 openvpn[22361]: 144.136.137.17:53869 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:22 openvpn[22361]: 144.136.137.17:53869 TLS Error: TLS handshake failed
- Aug 13 15:12:22 openvpn[22361]: 144.136.137.17:53869 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:24 openvpn[22361]: 144.136.137.17:17783 TLS: Initial packet from [AF_INET]144.136.137.17:17783, sid=2a289e5b 8d007886
- Aug 13 15:12:26 openvpn[22361]: 144.136.137.17:20097 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:26 openvpn[22361]: 144.136.137.17:20097 TLS Error: TLS handshake failed
- Aug 13 15:12:26 openvpn[22361]: 144.136.137.17:20097 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:28 openvpn[22361]: 144.136.137.17:10012 TLS: Initial packet from [AF_INET]144.136.137.17:10012, sid=f592d09f 5b8280ee
- Aug 13 15:12:31 openvpn[22361]: 144.136.137.17:58699 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:31 openvpn[22361]: 144.136.137.17:58699 TLS Error: TLS handshake failed
- Aug 13 15:12:31 openvpn[22361]: 144.136.137.17:58699 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:33 openvpn[22361]: 144.136.137.17:25590 TLS: Initial packet from [AF_INET]144.136.137.17:25590, sid=157b5707 0ffb79cd
- Aug 13 15:12:35 openvpn[22361]: 144.136.137.17:19496 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:35 openvpn[22361]: 144.136.137.17:19496 TLS Error: TLS handshake failed
- Aug 13 15:12:35 openvpn[22361]: 144.136.137.17:19496 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:37 openvpn[22361]: 144.136.137.17:61651 TLS: Initial packet from [AF_INET]144.136.137.17:61651, sid=29a96363 ec25a5d9
- Aug 13 15:12:40 openvpn[22361]: 144.136.137.17:59379 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:40 openvpn[22361]: 144.136.137.17:59379 TLS Error: TLS handshake failed
- Aug 13 15:12:40 openvpn[22361]: 144.136.137.17:59379 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:41 openvpn[22361]: 144.136.137.17:33391 TLS: Initial packet from [AF_INET]144.136.137.17:33391, sid=73624708 913ed6f6
- Aug 13 15:12:44 openvpn[22361]: 144.136.137.17:48985 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:44 openvpn[22361]: 144.136.137.17:48985 TLS Error: TLS handshake failed
- Aug 13 15:12:44 openvpn[22361]: 144.136.137.17:48985 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:46 openvpn[22361]: 144.136.137.17:20234 TLS: Initial packet from [AF_INET]144.136.137.17:20234, sid=8cae09da 4eb913e9
- Aug 13 15:12:48 openvpn[22361]: 144.136.137.17:32728 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:48 openvpn[22361]: 144.136.137.17:32728 TLS Error: TLS handshake failed
- Aug 13 15:12:48 openvpn[22361]: 144.136.137.17:32728 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:50 openvpn[22361]: 144.136.137.17:19708 TLS: Initial packet from [AF_INET]144.136.137.17:19708, sid=0010159b 3f160732
- Aug 13 15:12:53 openvpn[22361]: 144.136.137.17:26568 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:53 openvpn[22361]: 144.136.137.17:26568 TLS Error: TLS handshake failed
- Aug 13 15:12:53 openvpn[22361]: 144.136.137.17:26568 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:55 openvpn[22361]: 144.136.137.17:60346 TLS: Initial packet from [AF_INET]144.136.137.17:60346, sid=fa997815 b4c1b308
- Aug 13 15:12:57 openvpn[22361]: 144.136.137.17:40061 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:12:57 openvpn[22361]: 144.136.137.17:40061 TLS Error: TLS handshake failed
- Aug 13 15:12:57 openvpn[22361]: 144.136.137.17:40061 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:12:59 openvpn[22361]: 144.136.137.17:39599 TLS: Initial packet from [AF_INET]144.136.137.17:39599, sid=61e7a0df 7261211d
- Aug 13 15:13:02 openvpn[22361]: 144.136.137.17:48877 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:02 openvpn[22361]: 144.136.137.17:48877 TLS Error: TLS handshake failed
- Aug 13 15:13:02 openvpn[22361]: 144.136.137.17:48877 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:03 openvpn[22361]: 144.136.137.17:52095 TLS: Initial packet from [AF_INET]144.136.137.17:52095, sid=4cab6b51 7829bffa
- Aug 13 15:13:06 openvpn[22361]: 144.136.137.17:44816 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:06 openvpn[22361]: 144.136.137.17:44816 TLS Error: TLS handshake failed
- Aug 13 15:13:06 openvpn[22361]: 144.136.137.17:44816 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:08 openvpn[22361]: 144.136.137.17:52840 TLS: Initial packet from [AF_INET]144.136.137.17:52840, sid=b43940fd c6301821
- Aug 13 15:13:12 openvpn[22361]: 144.136.137.17:56959 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:12 openvpn[22361]: 144.136.137.17:56959 TLS Error: TLS handshake failed
- Aug 13 15:13:12 openvpn[22361]: 144.136.137.17:56959 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:12 openvpn[22361]: 144.136.137.17:42053 TLS: Initial packet from [AF_INET]144.136.137.17:42053, sid=736bea31 f50c1e54
- Aug 13 15:13:15 openvpn[22361]: 144.136.137.17:61470 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:15 openvpn[22361]: 144.136.137.17:61470 TLS Error: TLS handshake failed
- Aug 13 15:13:15 openvpn[22361]: 144.136.137.17:61470 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:17 openvpn[22361]: 144.136.137.17:16664 TLS: Initial packet from [AF_INET]144.136.137.17:16664, sid=ce1e0046 3ddd1d0e
- Aug 13 15:13:19 openvpn[22361]: 144.136.137.17:32292 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:19 openvpn[22361]: 144.136.137.17:32292 TLS Error: TLS handshake failed
- Aug 13 15:13:19 openvpn[22361]: 144.136.137.17:32292 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:21 openvpn[22361]: 144.136.137.17:3601 TLS: Initial packet from [AF_INET]144.136.137.17:3601, sid=ba3238d0 714ff043
- Aug 13 15:13:24 openvpn[22361]: 144.136.137.17:17783 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:24 openvpn[22361]: 144.136.137.17:17783 TLS Error: TLS handshake failed
- Aug 13 15:13:24 openvpn[22361]: 144.136.137.17:17783 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:26 openvpn[22361]: 144.136.137.17:65222 TLS: Initial packet from [AF_INET]144.136.137.17:65222, sid=b7aa8bd8 24964a28
- Aug 13 15:13:28 openvpn[22361]: 144.136.137.17:10012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:28 openvpn[22361]: 144.136.137.17:10012 TLS Error: TLS handshake failed
- Aug 13 15:13:28 openvpn[22361]: 144.136.137.17:10012 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:30 openvpn[22361]: 144.136.137.17:26878 TLS: Initial packet from [AF_INET]144.136.137.17:26878, sid=06667a1b 05aee000
- Aug 13 15:13:34 openvpn[22361]: 144.136.137.17:25590 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:34 openvpn[22361]: 144.136.137.17:25590 TLS Error: TLS handshake failed
- Aug 13 15:13:34 openvpn[22361]: 144.136.137.17:25590 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:34 openvpn[22361]: 144.136.137.17:31916 TLS: Initial packet from [AF_INET]144.136.137.17:31916, sid=2ae07a8f 12ff02df
- Aug 13 15:13:37 openvpn[22361]: 144.136.137.17:61651 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:37 openvpn[22361]: 144.136.137.17:61651 TLS Error: TLS handshake failed
- Aug 13 15:13:37 openvpn[22361]: 144.136.137.17:61651 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:39 openvpn[22361]: 144.136.137.17:56224 TLS: Initial packet from [AF_INET]144.136.137.17:56224, sid=a67a8837 27004bc2
- Aug 13 15:13:41 openvpn[22361]: 144.136.137.17:33391 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:41 openvpn[22361]: 144.136.137.17:33391 TLS Error: TLS handshake failed
- Aug 13 15:13:41 openvpn[22361]: 144.136.137.17:33391 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:43 openvpn[22361]: 144.136.137.17:21052 TLS: Initial packet from [AF_INET]144.136.137.17:21052, sid=3a035ca8 e1bff948
- Aug 13 15:13:46 openvpn[22361]: 144.136.137.17:20234 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:46 openvpn[22361]: 144.136.137.17:20234 TLS Error: TLS handshake failed
- Aug 13 15:13:46 openvpn[22361]: 144.136.137.17:20234 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:48 openvpn[22361]: 144.136.137.17:2580 TLS: Initial packet from [AF_INET]144.136.137.17:2580, sid=a39c19e9 eb32d7ec
- Aug 13 15:13:50 openvpn[22361]: 144.136.137.17:19708 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:13:50 openvpn[22361]: 144.136.137.17:19708 TLS Error: TLS handshake failed
- Aug 13 15:13:50 openvpn[22361]: 144.136.137.17:19708 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:13:52 openvpn[22361]: 144.136.137.17:5839 TLS: Initial packet from [AF_INET]144.136.137.17:5839, sid=d40a5799 dfb9241f
- Aug 13 15:13:54 rc_service: httpd 442:notify_rc stop_openvpnd;restart_samba
- Aug 13 15:13:55 openvpn[22361]: event_wait : Interrupted system call (code=4)
- Aug 13 15:13:56 openvpn[22361]: /sbin/route del -net 10.8.0.0 netmask 255.255.255.0
- Aug 13 15:13:56 openvpn[22361]: Closing TUN/TAP interface
- Aug 13 15:13:56 openvpn[22361]: /sbin/ifconfig tun21 0.0.0.0
- Aug 13 15:13:56 openvpn[22361]: PLUGIN_CLOSE: /usr/lib/openvpn-plugin-auth-pam.so
- Aug 13 15:13:56 openvpn[22361]: SIGTERM[hard,] received, process exiting
- Aug 13 15:13:57 Samba Server: smb daemon is stoped
- Aug 13 15:13:57 kernel: gro disabled
- Aug 13 15:16:27 rc_service: httpd 442:notify_rc reboot
- Aug 13 15:16:28 pppd[488]: Connection terminated.
- Aug 13 15:16:29 iTunes: daemon is stoped
- Aug 13 15:16:29 FTP Server: daemon is stoped
- Aug 13 15:16:29 Samba Server: smb daemon is stoped
- Aug 13 15:16:29 kernel: gro disabled
- Aug 13 15:16:30 Timemachine: daemon is stoped
- Aug 13 15:16:30 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: * Invalid signature of oopsbuf: B7-F7-FE-DB-F2-BB-DA-C3 (len 2945932925)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:16 WAN Connection: Ethernet link down.
- Aug 1 00:00:16 kernel: JFFS2 notice: (344) check_node_data: wrong data CRC in data node at 0x0255b7ac: read 0xedbb2546, calculated 0x2e8945ef.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:24 jffs2: valid logs(1)
- Aug 1 00:00:24 hour monitor: daemon is starting
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 miniupnpd[482]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[482]: HTTP listening on port 56785
- Aug 1 00:00:25 miniupnpd[482]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[495]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:35 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 612:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:37 miniupnpd[482]: shutting down MiniUPnPd
- Aug 1 00:00:37 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:39 miniupnpd[650]: version 1.9 started
- Aug 1 00:00:39 miniupnpd[650]: HTTP listening on port 34142
- Aug 1 00:00:39 miniupnpd[650]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:40 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:01:00 pppd[495]: Timeout waiting for PADO packets
- Aug 1 00:01:00 pppd[495]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:01:01 pppd[495]: Connect: ppp0 <--> vlan3880
- Aug 1 00:01:03 pppd[495]: CHAP authentication succeeded
- Aug 1 00:01:03 pppd[495]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:01:03 pppd[495]: local IP address 109.159.191.9
- Aug 1 00:01:03 pppd[495]: remote IP address 172.16.19.146
- Aug 1 00:01:03 rc_service: ip-up 671:notify_rc start_firewall
- Aug 1 00:01:04 miniupnpd[650]: shutting down MiniUPnPd
- Aug 1 00:01:04 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:01:04 wan: finish adding multi routes
- Aug 1 00:01:04 rc_service: ip-up 671:notify_rc stop_upnp
- Aug 1 00:01:04 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:01:05 miniupnpd[720]: version 1.9 started
- Aug 1 00:01:05 miniupnpd[720]: HTTP listening on port 60774
- Aug 1 00:01:05 miniupnpd[720]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:01:05 rc_service: ip-up 671:notify_rc start_upnp
- Aug 1 00:01:05 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:01:06 miniupnpd[720]: shutting down MiniUPnPd
- Aug 1 00:01:07 miniupnpd[723]: version 1.9 started
- Aug 1 00:01:07 miniupnpd[723]: HTTP listening on port 43254
- Aug 1 00:01:07 miniupnpd[723]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:01:08 WAN Connection: WAN was restored.
- Aug 1 00:01:08 ntp: start NTP update
- Aug 1 00:01:09 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:01:09 kernel: sizeof forward param = 160
- Aug 1 00:01:11 ntp: start NTP update
- Aug 13 15:23:57 rc_service: ntp 722:notify_rc restart_upnp
- Aug 13 15:23:57 miniupnpd[723]: shutting down MiniUPnPd
- Aug 13 15:23:58 miniupnpd[759]: version 1.9 started
- Aug 13 15:23:58 miniupnpd[759]: HTTP listening on port 56392
- Aug 13 15:23:58 miniupnpd[759]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:23:58 rc_service: ntp 722:notify_rc restart_diskmon
- Aug 13 15:23:58 disk_monitor: Finish
- Aug 13 15:24:00 disk monitor: be idle
- Aug 13 15:24:01 rc_service: ip-up 671:notify_rc start_firewall
- Aug 13 15:24:02 miniupnpd[759]: shutting down MiniUPnPd
- Aug 13 15:24:02 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 13 15:24:03 miniupnpd[842]: version 1.9 started
- Aug 13 15:24:03 miniupnpd[842]: HTTP listening on port 40137
- Aug 13 15:24:03 miniupnpd[842]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:24:47 crond[445]: time disparity of 1070843 minutes detected
- Aug 13 15:25:10 hour monitor: ntp sync fail, will retry after 120 sec
- Aug 13 15:28:05 rc_service: httpd 443:notify_rc restart_firewall
- Aug 13 15:28:06 miniupnpd[842]: shutting down MiniUPnPd
- Aug 13 15:28:06 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 13 15:28:06 miniupnpd[1439]: version 1.9 started
- Aug 13 15:28:06 miniupnpd[1439]: HTTP listening on port 53497
- Aug 13 15:28:06 miniupnpd[1439]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:31:00 rc_service: httpd 443:notify_rc restart_firewall
- Aug 13 15:31:00 miniupnpd[1439]: shutting down MiniUPnPd
- Aug 13 15:31:00 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 13 15:31:01 miniupnpd[1714]: version 1.9 started
- Aug 13 15:31:01 miniupnpd[1714]: HTTP listening on port 37791
- Aug 13 15:31:01 miniupnpd[1714]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:31:23 rc_service: httpd 443:notify_rc restart_firewall
- Aug 13 15:31:24 miniupnpd[1714]: shutting down MiniUPnPd
- Aug 13 15:31:24 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 13 15:31:25 miniupnpd[1757]: version 1.9 started
- Aug 13 15:31:25 miniupnpd[1757]: HTTP listening on port 54563
- Aug 13 15:31:25 miniupnpd[1757]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:33:39 rc_service: httpd 443:notify_rc reboot
- Aug 13 15:33:40 pppd[495]: Connection terminated.
- Aug 13 15:33:42 iTunes: daemon is stoped
- Aug 13 15:33:42 FTP Server: daemon is stoped
- Aug 13 15:33:42 Samba Server: smb daemon is stoped
- Aug 13 15:33:42 kernel: gro disabled
- Aug 13 15:33:42 Timemachine: daemon is stoped
- Aug 13 15:33:42 WEBDAV Server: daemon is stoped
- Aug 1 00:00:14 syslogd started: BusyBox v1.17.4
- Aug 1 00:00:14 kernel: klogd started: BusyBox v1.17.4 (2016-11-17 16:22:03 CST)
- Aug 1 00:00:14 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Nov 17 16:29:05 CST 2016
- Aug 1 00:00:14 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
- Aug 1 00:00:14 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
- Aug 1 00:00:14 kernel: Machine: Northstar Prototype
- Aug 1 00:00:14 kernel: Ignoring unrecognised tag 0x00000000
- Aug 1 00:00:14 kernel: Memory policy: ECC disabled, Data cache writealloc
- Aug 1 00:00:14 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
- Aug 1 00:00:14 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
- Aug 1 00:00:14 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
- Aug 1 00:00:14 kernel: Virtual kernel memory layout:
- Aug 1 00:00:14 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
- Aug 1 00:00:14 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
- Aug 1 00:00:14 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
- Aug 1 00:00:14 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
- Aug 1 00:00:14 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
- Aug 1 00:00:14 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
- Aug 1 00:00:14 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
- Aug 1 00:00:14 kernel: .text : 0xc003d000 - 0xc03a5000 (3488 kB)
- Aug 1 00:00:14 kernel: .data : 0xc03bc000 - 0xc03df120 ( 141 kB)
- Aug 1 00:00:14 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
- Aug 1 00:00:14 kernel: Mount-cache hash table entries: 512
- Aug 1 00:00:14 kernel: CPU1: Booted secondary processor
- Aug 1 00:00:14 kernel: Found a AMD NAND flash:
- Aug 1 00:00:14 kernel: Total size: 128MB
- Aug 1 00:00:14 kernel: Block size: 128KB
- Aug 1 00:00:14 kernel: Page Size: 2048B
- Aug 1 00:00:14 kernel: OOB Size: 64B
- Aug 1 00:00:14 kernel: Sector size: 512B
- Aug 1 00:00:14 kernel: Spare size: 16B
- Aug 1 00:00:14 kernel: ECC level: 8 (8-bit)
- Aug 1 00:00:14 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
- Aug 1 00:00:14 kernel: bio: create slab <bio-0> at 0
- Aug 1 00:00:14 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: no core
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 1
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 0
- Aug 1 00:00:15 kernel: PCI: Fixing up bus 2
- Aug 1 00:00:15 kernel: VFS: Disk quotas dquot_6.5.2
- Aug 1 00:00:15 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
- Aug 1 00:00:15 kernel: pflash: found no supported devices
- Aug 1 00:00:15 kernel: bcmsflash: found no supported devices
- Aug 1 00:00:15 kernel: Boot partition size = 524288(0x80000)
- Aug 1 00:00:15 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
- Aug 1 00:00:15 kernel: nflash: squash filesystem with lzma found at block 28
- Aug 1 00:00:15 kernel: Creating 4 MTD partitions on "nflash":
- Aug 1 00:00:15 kernel: 0x000000000000-0x000000080000 : "boot"
- Aug 1 00:00:15 kernel: 0x000000080000-0x000000200000 : "nvram"
- Aug 1 00:00:15 kernel: 0x000000200000-0x000004000000 : "linux"
- Aug 1 00:00:15 kernel: 0x00000039acc4-0x000004000000 : "rootfs"
- Aug 1 00:00:15 kernel: Registering the dns_resolver key type
- Aug 1 00:00:15 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
- Aug 1 00:00:15 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
- Aug 1 00:00:15 kernel: Available 7 bytes at (off,len):
- Aug 1 00:00:15 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
- Aug 1 00:00:15 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
- Aug 1 00:00:15 kernel: Creating 2 MTD partitions on "brcmnand":
- Aug 1 00:00:15 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
- Aug 1 00:00:15 kernel: 0x000007ec0000-0x000008000000 : "asus"
- Aug 1 00:00:15 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
- Aug 1 00:00:15 kernel: ctf: module license 'Proprietary' taints kernel.
- Aug 1 00:00:15 kernel: Disabling lock debugging due to kernel taint
- Aug 1 00:00:15 kernel: et_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: et_module_init: et_txq_thresh set to 0xce4
- Aug 1 00:00:15 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: wl_module_init: passivemode set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: igs set to 0x0
- Aug 1 00:00:15 kernel: wl_module_init: txworkq set to 0x0
- Aug 1 00:00:15 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:15 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
- Aug 1 00:00:16 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:16 WAN Connection: Ethernet link down.
- Aug 1 00:00:24 DSL-AC68U: start httpd
- Aug 1 00:00:25 disk monitor: be idle
- Aug 1 00:00:25 jffs2: valid logs(1)
- Aug 1 00:00:25 hour monitor: daemon is starting
- Aug 1 00:00:25 miniupnpd[485]: version 1.9 started
- Aug 1 00:00:25 miniupnpd[485]: HTTP listening on port 33287
- Aug 1 00:00:25 miniupnpd[485]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:25 syslog: Generating SSL certificate...
- Aug 1 00:00:25 pppd[489]: pppd 2.4.7 started by admin, uid 0
- Aug 1 00:00:27 kernel: SCSI subsystem initialized
- Aug 1 00:00:36 WAN Connection: Fail to connect with some issues.
- Aug 1 00:00:37 rc_service: zcip 612:notify_rc start_firewall
- Aug 1 00:00:37 zcip client: configured 169.254.71.195
- Aug 1 00:00:38 miniupnpd[485]: shutting down MiniUPnPd
- Aug 1 00:00:38 start_nat_rules: apply the nat_rules(/tmp/nat_rules__vlan3880)!
- Aug 1 00:00:38 kernel: nf_conntrack_rtsp v0.6.21 loading
- Aug 1 00:00:38 kernel: nf_nat_rtsp v0.6.21 loading
- Aug 1 00:00:39 miniupnpd[650]: version 1.9 started
- Aug 1 00:00:39 miniupnpd[650]: HTTP listening on port 44781
- Aug 1 00:00:39 miniupnpd[650]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:41 pppd[489]: Connected to 84:26:2b:a2:3b:de via interface vlan3880
- Aug 1 00:00:41 pppd[489]: Connect: ppp0 <--> vlan3880
- Aug 1 00:00:41 stop_nat_rules: apply the redirect_rules!
- Aug 1 00:00:44 pppd[489]: CHAP authentication succeeded
- Aug 1 00:00:44 pppd[489]: peer from calling number 84:26:2B:A2:3B:DE authorized
- Aug 1 00:00:44 pppd[489]: local IP address 109.159.191.117
- Aug 1 00:00:44 pppd[489]: remote IP address 172.16.19.146
- Aug 1 00:00:44 rc_service: ip-up 664:notify_rc start_firewall
- Aug 1 00:00:45 miniupnpd[650]: shutting down MiniUPnPd
- Aug 1 00:00:45 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:45 wan: finish adding multi routes
- Aug 1 00:00:45 rc_service: ip-up 664:notify_rc stop_upnp
- Aug 1 00:00:45 rc_service: waitting "start_firewall" via ip-up ...
- Aug 1 00:00:45 miniupnpd[715]: version 1.9 started
- Aug 1 00:00:45 miniupnpd[715]: HTTP listening on port 59044
- Aug 1 00:00:45 miniupnpd[715]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:46 rc_service: ip-up 664:notify_rc start_upnp
- Aug 1 00:00:46 rc_service: waitting "stop_upnp" via ip-up ...
- Aug 1 00:00:46 miniupnpd[715]: shutting down MiniUPnPd
- Aug 1 00:00:48 miniupnpd[719]: version 1.9 started
- Aug 1 00:00:48 miniupnpd[719]: HTTP listening on port 33433
- Aug 1 00:00:48 miniupnpd[719]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:49 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Aug 1 00:00:50 kernel: sizeof forward param = 160
- Aug 1 00:00:53 rc_service: ip-up 664:notify_rc start_firewall
- Aug 1 00:00:54 miniupnpd[719]: shutting down MiniUPnPd
- Aug 1 00:00:54 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 1 00:00:54 WAN Connection: WAN was restored.
- Aug 1 00:00:55 ntp: start NTP update
- Aug 1 00:00:55 miniupnpd[831]: version 1.9 started
- Aug 1 00:00:55 miniupnpd[831]: HTTP listening on port 57280
- Aug 1 00:00:55 miniupnpd[831]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 1 00:00:58 ntp: start NTP update
- Aug 1 00:01:01 ntp: start NTP update
- Aug 1 00:01:04 ntp: start NTP update
- Aug 1 00:01:08 ntp: start NTP update
- Aug 13 15:36:40 rc_service: ntp 717:notify_rc restart_upnp
- Aug 13 15:36:40 miniupnpd[831]: shutting down MiniUPnPd
- Aug 13 15:36:40 miniupnpd[853]: version 1.9 started
- Aug 13 15:36:40 miniupnpd[853]: HTTP listening on port 40110
- Aug 13 15:36:40 miniupnpd[853]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:36:41 rc_service: ntp 717:notify_rc restart_diskmon
- Aug 13 15:36:41 disk_monitor: Finish
- Aug 13 15:36:42 disk monitor: be idle
- Aug 13 15:37:33 crond[445]: time disparity of 1070856 minutes detected
- Aug 13 15:37:57 hour monitor: ntp sync fail, will retry after 120 sec
- Aug 13 15:41:15 rc_service: httpd 443:notify_rc restart_openvpnd;restart_chpass;restart_samba
- Aug 13 15:41:18 openvpn[1499]: OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [IPv6] built on Nov 17 2016
- Aug 13 15:41:18 openvpn[1499]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
- Aug 13 15:41:18 openvpn[1499]: Diffie-Hellman initialized with 2048 bit key
- Aug 13 15:41:18 openvpn[1499]: Socket Buffers: R=[122880->131072] S=[122880->131072]
- Aug 13 15:41:18 openvpn[1499]: TUN/TAP device tun21 opened
- Aug 13 15:41:18 openvpn[1499]: TUN/TAP TX queue length set to 100
- Aug 13 15:41:18 openvpn[1499]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Aug 13 15:41:18 openvpn[1499]: /sbin/ifconfig tun21 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Aug 13 15:41:18 openvpn[1499]: /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Aug 13 15:41:18 openvpn[1505]: UDPv4 link local (bound): [undef]
- Aug 13 15:41:18 openvpn[1505]: UDPv4 link remote: [undef]
- Aug 13 15:41:18 openvpn[1505]: MULTI: multi_init called, r=256 v=256
- Aug 13 15:41:18 openvpn[1505]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Aug 13 15:41:18 openvpn[1505]: Initialization Sequence Completed
- Aug 13 15:41:18 Samba Server: smb daemon is stoped
- Aug 13 15:41:18 kernel: gro disabled
- Aug 13 15:41:23 openvpn[1505]: 144.136.137.17:1040 TLS: Initial packet from [AF_INET]144.136.137.17:1040, sid=25045471 26c9a9a4
- Aug 13 15:41:27 openvpn[1505]: 144.136.137.17:1040 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:41:27 openvpn[1505]: 144.136.137.17:1040 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:41:27 openvpn[1505]: 144.136.137.17:1040 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:41:27 openvpn[1505]: 144.136.137.17:1040 TLS Error: TLS handshake failed
- Aug 13 15:41:27 openvpn[1505]: 144.136.137.17:1040 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:42:10 openvpn[1505]: 144.136.137.17:36872 TLS: Initial packet from [AF_INET]144.136.137.17:36872, sid=6e9816c6 20a4db7d
- Aug 13 15:42:13 openvpn[1505]: 144.136.137.17:36872 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:42:13 openvpn[1505]: 144.136.137.17:36872 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:42:13 openvpn[1505]: 144.136.137.17:36872 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:42:13 openvpn[1505]: 144.136.137.17:36872 TLS Error: TLS handshake failed
- Aug 13 15:42:13 openvpn[1505]: 144.136.137.17:36872 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:42:15 openvpn[1505]: 144.136.137.17:9880 TLS: Initial packet from [AF_INET]144.136.137.17:9880, sid=fa272b58 62ad88e9
- Aug 13 15:42:18 openvpn[1505]: 144.136.137.17:9880 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:42:18 openvpn[1505]: 144.136.137.17:9880 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:42:18 openvpn[1505]: 144.136.137.17:9880 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:42:18 openvpn[1505]: 144.136.137.17:9880 TLS Error: TLS handshake failed
- Aug 13 15:42:18 openvpn[1505]: 144.136.137.17:9880 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:43:18 openvpn[1505]: 144.136.137.17:50676 TLS: Initial packet from [AF_INET]144.136.137.17:50676, sid=bb60d6aa d67e71e2
- Aug 13 15:43:21 openvpn[1505]: 144.136.137.17:50676 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:43:21 openvpn[1505]: 144.136.137.17:50676 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:43:21 openvpn[1505]: 144.136.137.17:50676 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:43:21 openvpn[1505]: 144.136.137.17:50676 TLS Error: TLS handshake failed
- Aug 13 15:43:21 openvpn[1505]: 144.136.137.17:50676 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:44:20 openvpn[1505]: 144.136.137.17:28953 TLS: Initial packet from [AF_INET]144.136.137.17:28953, sid=28d371f8 e4672765
- Aug 13 15:44:24 openvpn[1505]: 144.136.137.17:28953 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:44:24 openvpn[1505]: 144.136.137.17:28953 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:44:24 openvpn[1505]: 144.136.137.17:28953 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:44:24 openvpn[1505]: 144.136.137.17:28953 TLS Error: TLS handshake failed
- Aug 13 15:44:24 openvpn[1505]: 144.136.137.17:28953 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:45:22 openvpn[1505]: 144.136.137.17:23487 TLS: Initial packet from [AF_INET]144.136.137.17:23487, sid=f0f496fe 6801b617
- Aug 13 15:45:25 openvpn[1505]: 144.136.137.17:23487 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:45:25 openvpn[1505]: 144.136.137.17:23487 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:45:25 openvpn[1505]: 144.136.137.17:23487 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:45:25 openvpn[1505]: 144.136.137.17:23487 TLS Error: TLS handshake failed
- Aug 13 15:45:25 openvpn[1505]: 144.136.137.17:23487 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:45:50 openvpn[1505]: 144.136.137.17:8005 TLS: Initial packet from [AF_INET]144.136.137.17:8005, sid=c233465e d110fd4d
- Aug 13 15:45:50 openvpn[1505]: 144.136.137.17:8005 TLS Error: reading acknowledgement record from packet
- Aug 13 15:45:52 openvpn[1505]: 144.136.137.17:8005 TLS Error: reading acknowledgement record from packet
- Aug 13 15:45:55 openvpn[1505]: 144.136.137.17:58799 TLS: Initial packet from [AF_INET]144.136.137.17:58799, sid=30a9c5c3 f207d644
- Aug 13 15:45:55 openvpn[1505]: 144.136.137.17:58799 TLS Error: reading acknowledgement record from packet
- Aug 13 15:45:58 openvpn[1505]: 144.136.137.17:58799 TLS Error: reading acknowledgement record from packet
- Aug 13 15:46:01 openvpn[1505]: 144.136.137.17:58799 TLS Error: reading acknowledgement record from packet
- Aug 13 15:46:09 openvpn[1505]: 144.136.137.17:58799 TLS Error: reading acknowledgement record from packet
- Aug 13 15:46:25 openvpn[1505]: 144.136.137.17:58799 TLS Error: reading acknowledgement record from packet
- Aug 13 15:46:50 openvpn[1505]: 144.136.137.17:8005 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:46:50 openvpn[1505]: 144.136.137.17:8005 TLS Error: TLS handshake failed
- Aug 13 15:46:50 openvpn[1505]: 144.136.137.17:8005 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:46:55 openvpn[1505]: 144.136.137.17:58799 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:46:55 openvpn[1505]: 144.136.137.17:58799 TLS Error: TLS handshake failed
- Aug 13 15:46:55 openvpn[1505]: 144.136.137.17:58799 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:46:57 openvpn[1505]: 144.136.137.17:56170 TLS: Initial packet from [AF_INET]144.136.137.17:56170, sid=553cb17b d8aa9ab5
- Aug 13 15:46:57 openvpn[1505]: 144.136.137.17:56170 TLS Error: reading acknowledgement record from packet
- Aug 13 15:46:59 openvpn[1505]: 144.136.137.17:56170 TLS Error: reading acknowledgement record from packet
- Aug 13 15:47:03 openvpn[1505]: 144.136.137.17:56170 TLS Error: reading acknowledgement record from packet
- Aug 13 15:47:12 openvpn[1505]: 144.136.137.17:56170 TLS Error: reading acknowledgement record from packet
- Aug 13 15:47:28 openvpn[1505]: 144.136.137.17:56170 TLS Error: reading acknowledgement record from packet
- Aug 13 15:47:58 openvpn[1505]: 144.136.137.17:56170 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:47:58 openvpn[1505]: 144.136.137.17:56170 TLS Error: TLS handshake failed
- Aug 13 15:47:58 openvpn[1505]: 144.136.137.17:56170 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:47:59 openvpn[1505]: 144.136.137.17:24088 TLS: Initial packet from [AF_INET]144.136.137.17:24088, sid=67aa31a8 400fc29f
- Aug 13 15:47:59 openvpn[1505]: 144.136.137.17:24088 TLS Error: reading acknowledgement record from packet
- Aug 13 15:48:01 openvpn[1505]: 144.136.137.17:24088 TLS Error: reading acknowledgement record from packet
- Aug 13 15:48:06 openvpn[1505]: 144.136.137.17:24088 TLS Error: reading acknowledgement record from packet
- Aug 13 15:48:14 openvpn[1505]: 144.136.137.17:24088 TLS Error: reading acknowledgement record from packet
- Aug 13 15:48:30 openvpn[1505]: 144.136.137.17:24088 TLS Error: reading acknowledgement record from packet
- Aug 13 15:48:59 openvpn[1505]: 144.136.137.17:24088 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:48:59 openvpn[1505]: 144.136.137.17:24088 TLS Error: TLS handshake failed
- Aug 13 15:48:59 openvpn[1505]: 144.136.137.17:24088 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:49:02 openvpn[1505]: 144.136.137.17:3293 TLS: Initial packet from [AF_INET]144.136.137.17:3293, sid=8299b3e4 3df261d0
- Aug 13 15:49:02 openvpn[1505]: 144.136.137.17:3293 TLS Error: reading acknowledgement record from packet
- Aug 13 15:49:04 openvpn[1505]: 144.136.137.17:3293 TLS Error: reading acknowledgement record from packet
- Aug 13 15:49:09 openvpn[1505]: 144.136.137.17:3293 TLS Error: reading acknowledgement record from packet
- Aug 13 15:49:12 openvpn[1505]: 144.136.137.17:38351 TLS: Initial packet from [AF_INET]144.136.137.17:38351, sid=9939a16d 9d5b004e
- Aug 13 15:49:15 openvpn[1505]: 144.136.137.17:38351 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=DSL-AC68U, emailAddress=me@myhost.mydomain
- Aug 13 15:49:15 openvpn[1505]: 144.136.137.17:38351 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:3293 TLS Error: reading acknowledgement record from packet
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 TLS: Username/Password authentication succeeded for username 'memes'
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Aug 13 15:49:16 openvpn[1505]: 144.136.137.17:38351 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Aug 13 15:49:17 openvpn[1505]: 144.136.137.17:38351 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Aug 13 15:49:17 openvpn[1505]: 144.136.137.17:38351 [client] Peer Connection Initiated with [AF_INET]144.136.137.17:38351
- Aug 13 15:49:17 openvpn[1505]: client/144.136.137.17:38351 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Aug 13 15:49:17 openvpn[1505]: client/144.136.137.17:38351 MULTI: Learn: 10.8.0.6 -> client/144.136.137.17:38351
- Aug 13 15:49:17 openvpn[1505]: client/144.136.137.17:38351 MULTI: primary virtual IP for client/144.136.137.17:38351: 10.8.0.6
- Aug 13 15:49:18 openvpn[1505]: client/144.136.137.17:38351 PUSH: Received control message: 'PUSH_REQUEST'
- Aug 13 15:49:18 openvpn[1505]: client/144.136.137.17:38351 send_push_reply(): safe_cap=940
- Aug 13 15:49:18 openvpn[1505]: client/144.136.137.17:38351 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,redirect-gateway def1,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Aug 13 15:49:32 openvpn[1505]: 144.136.137.17:3293 TLS Error: reading acknowledgement record from packet
- Aug 13 15:50:02 openvpn[1505]: 144.136.137.17:3293 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:50:02 openvpn[1505]: 144.136.137.17:3293 TLS Error: TLS handshake failed
- Aug 13 15:50:02 openvpn[1505]: 144.136.137.17:3293 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:50:04 openvpn[1505]: 144.136.137.17:35525 TLS: Initial packet from [AF_INET]144.136.137.17:35525, sid=96884bf0 cbd8acb8
- Aug 13 15:50:04 openvpn[1505]: 144.136.137.17:35525 TLS Error: reading acknowledgement record from packet
- Aug 13 15:50:06 openvpn[1505]: 144.136.137.17:35525 TLS Error: reading acknowledgement record from packet
- Aug 13 15:50:10 openvpn[1505]: 144.136.137.17:35525 TLS Error: reading acknowledgement record from packet
- Aug 13 15:50:18 openvpn[1505]: 144.136.137.17:35525 TLS Error: reading acknowledgement record from packet
- Aug 13 15:50:34 openvpn[1505]: 144.136.137.17:35525 TLS Error: reading acknowledgement record from packet
- Aug 13 15:51:05 openvpn[1505]: 144.136.137.17:35525 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:51:05 openvpn[1505]: 144.136.137.17:35525 TLS Error: TLS handshake failed
- Aug 13 15:51:05 openvpn[1505]: 144.136.137.17:35525 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:51:06 openvpn[1505]: 144.136.137.17:2302 TLS: Initial packet from [AF_INET]144.136.137.17:2302, sid=7b3fa57b 8a0d238b
- Aug 13 15:51:06 openvpn[1505]: 144.136.137.17:2302 TLS Error: reading acknowledgement record from packet
- Aug 13 15:51:08 openvpn[1505]: 144.136.137.17:2302 TLS Error: reading acknowledgement record from packet
- Aug 13 15:51:12 openvpn[1505]: 144.136.137.17:2302 TLS Error: reading acknowledgement record from packet
- Aug 13 15:51:20 openvpn[1505]: 144.136.137.17:2302 TLS Error: reading acknowledgement record from packet
- Aug 13 15:51:36 openvpn[1505]: 144.136.137.17:2302 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:06 openvpn[1505]: 144.136.137.17:2302 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:52:06 openvpn[1505]: 144.136.137.17:2302 TLS Error: TLS handshake failed
- Aug 13 15:52:06 openvpn[1505]: 144.136.137.17:2302 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:52:09 openvpn[1505]: 144.136.137.17:42685 TLS: Initial packet from [AF_INET]144.136.137.17:42685, sid=2b2666b9 02886d6e
- Aug 13 15:52:09 openvpn[1505]: 144.136.137.17:42685 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:11 openvpn[1505]: 144.136.137.17:42685 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:15 openvpn[1505]: 144.136.137.17:42685 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:19 openvpn[1505]: 144.136.137.17:20517 TLS: Initial packet from [AF_INET]144.136.137.17:20517, sid=d5db6560 345981a5
- Aug 13 15:52:19 openvpn[1505]: 144.136.137.17:20517 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:21 openvpn[1505]: 144.136.137.17:20517 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:25 openvpn[1505]: 144.136.137.17:20517 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:27 openvpn[1505]: 144.136.137.17:5580 TLS: Initial packet from [AF_INET]144.136.137.17:5580, sid=9e9b531a 41ee6597
- Aug 13 15:52:27 openvpn[1505]: 144.136.137.17:5580 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:29 openvpn[1505]: 144.136.137.17:5580 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:33 openvpn[1505]: 144.136.137.17:5580 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:41 openvpn[1505]: 144.136.137.17:5580 TLS Error: reading acknowledgement record from packet
- Aug 13 15:52:57 openvpn[1505]: 144.136.137.17:5580 TLS Error: reading acknowledgement record from packet
- Aug 13 15:53:09 openvpn[1505]: 144.136.137.17:42685 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:53:09 openvpn[1505]: 144.136.137.17:42685 TLS Error: TLS handshake failed
- Aug 13 15:53:09 openvpn[1505]: 144.136.137.17:42685 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:53:19 openvpn[1505]: 144.136.137.17:20517 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:53:19 openvpn[1505]: 144.136.137.17:20517 TLS Error: TLS handshake failed
- Aug 13 15:53:19 openvpn[1505]: 144.136.137.17:20517 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:53:27 openvpn[1505]: 144.136.137.17:5580 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:53:27 openvpn[1505]: 144.136.137.17:5580 TLS Error: TLS handshake failed
- Aug 13 15:53:27 openvpn[1505]: 144.136.137.17:5580 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:53:30 openvpn[1505]: 144.136.137.17:23004 TLS: Initial packet from [AF_INET]144.136.137.17:23004, sid=e781a930 10437a57
- Aug 13 15:53:30 openvpn[1505]: 144.136.137.17:23004 TLS Error: reading acknowledgement record from packet
- Aug 13 15:53:32 openvpn[1505]: 144.136.137.17:23004 TLS Error: reading acknowledgement record from packet
- Aug 13 15:53:36 openvpn[1505]: 144.136.137.17:23004 TLS Error: reading acknowledgement record from packet
- Aug 13 15:53:43 rc_service: httpd 443:notify_rc restart_qos;restart_firewall
- Aug 13 15:53:44 openvpn[1505]: 144.136.137.17:23004 TLS Error: reading acknowledgement record from packet
- Aug 13 15:53:47 miniupnpd[853]: shutting down MiniUPnPd
- Aug 13 15:53:47 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_vlan3880)!
- Aug 13 15:53:48 miniupnpd[2753]: version 1.9 started
- Aug 13 15:53:48 miniupnpd[2753]: HTTP listening on port 58140
- Aug 13 15:53:48 miniupnpd[2753]: Listening for NAT-PMP/PCP traffic on port 5351
- Aug 13 15:54:00 openvpn[1505]: 144.136.137.17:23004 TLS Error: reading acknowledgement record from packet
- Aug 13 15:54:30 openvpn[1505]: 144.136.137.17:23004 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:54:30 openvpn[1505]: 144.136.137.17:23004 TLS Error: TLS handshake failed
- Aug 13 15:54:30 openvpn[1505]: 144.136.137.17:23004 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:54:32 openvpn[1505]: 144.136.137.17:62208 TLS: Initial packet from [AF_INET]144.136.137.17:62208, sid=0b01b280 fc4cf576
- Aug 13 15:54:32 openvpn[1505]: 144.136.137.17:62208 TLS Error: reading acknowledgement record from packet
- Aug 13 15:54:34 openvpn[1505]: 144.136.137.17:62208 TLS Error: reading acknowledgement record from packet
- Aug 13 15:54:38 openvpn[1505]: 144.136.137.17:62208 TLS Error: reading acknowledgement record from packet
- Aug 13 15:54:46 openvpn[1505]: 144.136.137.17:62208 TLS Error: reading acknowledgement record from packet
- Aug 13 15:55:02 openvpn[1505]: 144.136.137.17:62208 TLS Error: reading acknowledgement record from packet
- Aug 13 15:55:32 openvpn[1505]: 144.136.137.17:62208 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:55:32 openvpn[1505]: 144.136.137.17:62208 TLS Error: TLS handshake failed
- Aug 13 15:55:32 openvpn[1505]: 144.136.137.17:62208 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:55:35 openvpn[1505]: 144.136.137.17:42634 TLS: Initial packet from [AF_INET]144.136.137.17:42634, sid=68579c42 c180d9a7
- Aug 13 15:55:35 openvpn[1505]: 144.136.137.17:42634 TLS Error: reading acknowledgement record from packet
- Aug 13 15:55:36 openvpn[1505]: 144.136.137.17:42634 TLS Error: reading acknowledgement record from packet
- Aug 13 15:55:41 openvpn[1505]: 144.136.137.17:42634 TLS Error: reading acknowledgement record from packet
- Aug 13 15:55:49 openvpn[1505]: 144.136.137.17:42634 TLS Error: reading acknowledgement record from packet
- Aug 13 15:56:05 openvpn[1505]: 144.136.137.17:42634 TLS Error: reading acknowledgement record from packet
- Aug 13 15:56:35 openvpn[1505]: 144.136.137.17:42634 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:56:35 openvpn[1505]: 144.136.137.17:42634 TLS Error: TLS handshake failed
- Aug 13 15:56:35 openvpn[1505]: 144.136.137.17:42634 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:56:37 openvpn[1505]: 144.136.137.17:32568 TLS: Initial packet from [AF_INET]144.136.137.17:32568, sid=181cf120 6059e697
- Aug 13 15:56:37 openvpn[1505]: 144.136.137.17:32568 TLS Error: reading acknowledgement record from packet
- Aug 13 15:56:39 openvpn[1505]: 144.136.137.17:32568 TLS Error: reading acknowledgement record from packet
- Aug 13 15:56:43 openvpn[1505]: 144.136.137.17:32568 TLS Error: reading acknowledgement record from packet
- Aug 13 15:56:51 openvpn[1505]: 144.136.137.17:32568 TLS Error: reading acknowledgement record from packet
- Aug 13 15:57:07 openvpn[1505]: 144.136.137.17:32568 TLS Error: reading acknowledgement record from packet
- Aug 13 15:57:37 openvpn[1505]: 144.136.137.17:32568 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:57:37 openvpn[1505]: 144.136.137.17:32568 TLS Error: TLS handshake failed
- Aug 13 15:57:37 openvpn[1505]: 144.136.137.17:32568 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:57:40 openvpn[1505]: 144.136.137.17:43695 TLS: Initial packet from [AF_INET]144.136.137.17:43695, sid=8f7d2f17 2ed1633e
- Aug 13 15:57:40 openvpn[1505]: 144.136.137.17:43695 TLS Error: reading acknowledgement record from packet
- Aug 13 15:57:42 openvpn[1505]: 144.136.137.17:43695 TLS Error: reading acknowledgement record from packet
- Aug 13 15:57:47 openvpn[1505]: 144.136.137.17:43695 TLS Error: reading acknowledgement record from packet
- Aug 13 15:57:50 openvpn[1505]: 144.136.137.17:41067 TLS: Initial packet from [AF_INET]144.136.137.17:41067, sid=c551f839 356468df
- Aug 13 15:57:53 openvpn[1505]: 144.136.137.17:41067 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:57:53 openvpn[1505]: 144.136.137.17:41067 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:57:53 openvpn[1505]: 144.136.137.17:41067 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:57:53 openvpn[1505]: 144.136.137.17:41067 TLS Error: TLS handshake failed
- Aug 13 15:57:53 openvpn[1505]: 144.136.137.17:41067 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:57:55 openvpn[1505]: 144.136.137.17:30729 TLS: Initial packet from [AF_INET]144.136.137.17:30729, sid=2e6a8898 3793ef8e
- Aug 13 15:57:59 openvpn[1505]: 144.136.137.17:30729 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:57:59 openvpn[1505]: 144.136.137.17:30729 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:57:59 openvpn[1505]: 144.136.137.17:30729 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:57:59 openvpn[1505]: 144.136.137.17:30729 TLS Error: TLS handshake failed
- Aug 13 15:57:59 openvpn[1505]: 144.136.137.17:30729 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:58:40 openvpn[1505]: 144.136.137.17:43695 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 15:58:40 openvpn[1505]: 144.136.137.17:43695 TLS Error: TLS handshake failed
- Aug 13 15:58:40 openvpn[1505]: 144.136.137.17:43695 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 15:58:58 openvpn[1505]: 144.136.137.17:14254 TLS: Initial packet from [AF_INET]144.136.137.17:14254, sid=38755047 78ad66a8
- Aug 13 15:59:01 openvpn[1505]: 144.136.137.17:14254 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 15:59:01 openvpn[1505]: 144.136.137.17:14254 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 15:59:01 openvpn[1505]: 144.136.137.17:14254 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 15:59:01 openvpn[1505]: 144.136.137.17:14254 TLS Error: TLS handshake failed
- Aug 13 15:59:01 openvpn[1505]: 144.136.137.17:14254 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:00:00 openvpn[1505]: 144.136.137.17:42500 TLS: Initial packet from [AF_INET]144.136.137.17:42500, sid=657e8db8 b1343ec2
- Aug 13 16:00:03 openvpn[1505]: 144.136.137.17:42500 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:00:03 openvpn[1505]: 144.136.137.17:42500 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:00:03 openvpn[1505]: 144.136.137.17:42500 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:00:03 openvpn[1505]: 144.136.137.17:42500 TLS Error: TLS handshake failed
- Aug 13 16:00:03 openvpn[1505]: 144.136.137.17:42500 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:00:42 disk_monitor: Got SIGALRM...
- Aug 13 16:01:01 openvpn[1505]: client/144.136.137.17:38351 [client] Inactivity timeout (--ping-restart), restarting
- Aug 13 16:01:01 openvpn[1505]: client/144.136.137.17:38351 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Aug 13 16:01:02 openvpn[1505]: 144.136.137.17:37003 TLS: Initial packet from [AF_INET]144.136.137.17:37003, sid=312ecf77 cfb7cc1f
- Aug 13 16:01:02 openvpn[1505]: 144.136.137.17:38862 TLS: Initial packet from [AF_INET]144.136.137.17:38862, sid=0163303d e1c88897
- Aug 13 16:01:06 openvpn[1505]: 144.136.137.17:38862 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:01:06 openvpn[1505]: 144.136.137.17:38862 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:01:06 openvpn[1505]: 144.136.137.17:38862 TLS Error: TLS handshake failed
- Aug 13 16:01:06 openvpn[1505]: 144.136.137.17:38862 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:01:07 openvpn[1505]: 144.136.137.17:39588 TLS: Initial packet from [AF_INET]144.136.137.17:39588, sid=9732da2f b01d5446
- Aug 13 16:01:11 openvpn[1505]: 144.136.137.17:39588 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:01:11 openvpn[1505]: 144.136.137.17:39588 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:01:11 openvpn[1505]: 144.136.137.17:39588 TLS Error: TLS handshake failed
- Aug 13 16:01:11 openvpn[1505]: 144.136.137.17:39588 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:01:48 openvpn[1505]: 144.136.137.17:40933 TLS: Initial packet from [AF_INET]144.136.137.17:40933, sid=ba70dffe 00aa44c3
- Aug 13 16:01:51 openvpn[1505]: 144.136.137.17:40933 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:01:51 openvpn[1505]: 144.136.137.17:40933 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:01:51 openvpn[1505]: 144.136.137.17:40933 TLS Error: TLS handshake failed
- Aug 13 16:01:51 openvpn[1505]: 144.136.137.17:40933 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:01:53 openvpn[1505]: 144.136.137.17:63299 TLS: Initial packet from [AF_INET]144.136.137.17:63299, sid=5089674e a39a182e
- Aug 13 16:01:56 openvpn[1505]: 144.136.137.17:63299 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:01:56 openvpn[1505]: 144.136.137.17:63299 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:01:56 openvpn[1505]: 144.136.137.17:63299 TLS Error: TLS handshake failed
- Aug 13 16:01:56 openvpn[1505]: 144.136.137.17:63299 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:02:02 openvpn[1505]: 144.136.137.17:37003 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:02:02 openvpn[1505]: 144.136.137.17:37003 TLS Error: TLS handshake failed
- Aug 13 16:02:02 openvpn[1505]: 144.136.137.17:37003 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:02:55 openvpn[1505]: 144.136.137.17:6743 TLS: Initial packet from [AF_INET]144.136.137.17:6743, sid=049793cd 9f3c46e6
- Aug 13 16:02:58 openvpn[1505]: 144.136.137.17:6743 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:02:58 openvpn[1505]: 144.136.137.17:6743 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:02:58 openvpn[1505]: 144.136.137.17:6743 TLS Error: TLS handshake failed
- Aug 13 16:02:58 openvpn[1505]: 144.136.137.17:6743 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:03:57 openvpn[1505]: 144.136.137.17:29258 TLS: Initial packet from [AF_INET]144.136.137.17:29258, sid=1d41ae48 e416ce3a
- Aug 13 16:04:01 openvpn[1505]: 144.136.137.17:29258 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:04:01 openvpn[1505]: 144.136.137.17:29258 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:04:01 openvpn[1505]: 144.136.137.17:29258 TLS Error: TLS handshake failed
- Aug 13 16:04:01 openvpn[1505]: 144.136.137.17:29258 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:04:59 openvpn[1505]: 144.136.137.17:63812 TLS: Initial packet from [AF_INET]144.136.137.17:63812, sid=81e7345f 0f5c36e2
- Aug 13 16:05:02 openvpn[1505]: 144.136.137.17:63812 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:05:02 openvpn[1505]: 144.136.137.17:63812 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:05:02 openvpn[1505]: 144.136.137.17:63812 TLS Error: TLS handshake failed
- Aug 13 16:05:02 openvpn[1505]: 144.136.137.17:63812 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:05:39 openvpn[1505]: 144.136.137.17:14513 TLS: Initial packet from [AF_INET]144.136.137.17:14513, sid=93782485 90c26500
- Aug 13 16:05:42 openvpn[1505]: 144.136.137.17:14513 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:05:42 openvpn[1505]: 144.136.137.17:14513 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:05:42 openvpn[1505]: 144.136.137.17:14513 TLS Error: TLS handshake failed
- Aug 13 16:05:42 openvpn[1505]: 144.136.137.17:14513 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:05:43 openvpn[1505]: 144.136.137.17:35953 TLS: Initial packet from [AF_INET]144.136.137.17:35953, sid=ed5fabe3 da294cb2
- Aug 13 16:05:47 openvpn[1505]: 144.136.137.17:35953 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:05:47 openvpn[1505]: 144.136.137.17:35953 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:05:47 openvpn[1505]: 144.136.137.17:35953 TLS Error: TLS handshake failed
- Aug 13 16:05:47 openvpn[1505]: 144.136.137.17:35953 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:06:45 openvpn[1505]: 144.136.137.17:18264 TLS: Initial packet from [AF_INET]144.136.137.17:18264, sid=bb60e796 ed8db526
- Aug 13 16:06:48 openvpn[1505]: 144.136.137.17:61352 TLS: Initial packet from [AF_INET]144.136.137.17:61352, sid=5fe0a6e2 d859a959
- Aug 13 16:06:51 openvpn[1505]: 144.136.137.17:61352 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:06:51 openvpn[1505]: 144.136.137.17:61352 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:06:51 openvpn[1505]: 144.136.137.17:61352 TLS Error: TLS handshake failed
- Aug 13 16:06:51 openvpn[1505]: 144.136.137.17:61352 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:07:45 openvpn[1505]: 144.136.137.17:18264 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:07:45 openvpn[1505]: 144.136.137.17:18264 TLS Error: TLS handshake failed
- Aug 13 16:07:45 openvpn[1505]: 144.136.137.17:18264 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:07:50 openvpn[1505]: 144.136.137.17:6728 TLS: Initial packet from [AF_INET]144.136.137.17:6728, sid=a95fe00a 37a324a1
- Aug 13 16:07:53 openvpn[1505]: 144.136.137.17:6728 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:07:53 openvpn[1505]: 144.136.137.17:6728 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:07:53 openvpn[1505]: 144.136.137.17:6728 TLS Error: TLS handshake failed
- Aug 13 16:07:53 openvpn[1505]: 144.136.137.17:6728 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:08:13 openvpn[1505]: 144.136.137.17:52655 TLS: Initial packet from [AF_INET]144.136.137.17:52655, sid=8202a92e 7900a5d8
- Aug 13 16:08:16 openvpn[1505]: 144.136.137.17:52655 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:08:16 openvpn[1505]: 144.136.137.17:52655 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:08:16 openvpn[1505]: 144.136.137.17:52655 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:08:16 openvpn[1505]: 144.136.137.17:52655 TLS Error: TLS handshake failed
- Aug 13 16:08:16 openvpn[1505]: 144.136.137.17:52655 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:08:25 openvpn[1505]: 144.136.137.17:23971 TLS: Initial packet from [AF_INET]144.136.137.17:23971, sid=b1dd296d 457dfd93
- Aug 13 16:08:29 openvpn[1505]: 144.136.137.17:23971 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:08:29 openvpn[1505]: 144.136.137.17:23971 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:08:29 openvpn[1505]: 144.136.137.17:23971 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:08:29 openvpn[1505]: 144.136.137.17:23971 TLS Error: TLS handshake failed
- Aug 13 16:08:29 openvpn[1505]: 144.136.137.17:23971 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:09:27 openvpn[1505]: 144.136.137.17:34879 TLS: Initial packet from [AF_INET]144.136.137.17:34879, sid=fc44d3ec 60b4cdd3
- Aug 13 16:09:30 openvpn[1505]: 144.136.137.17:34879 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:09:30 openvpn[1505]: 144.136.137.17:34879 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:09:30 openvpn[1505]: 144.136.137.17:34879 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:09:30 openvpn[1505]: 144.136.137.17:34879 TLS Error: TLS handshake failed
- Aug 13 16:09:30 openvpn[1505]: 144.136.137.17:34879 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:09:41 openvpn[1505]: 144.136.137.17:16708 TLS: Initial packet from [AF_INET]144.136.137.17:16708, sid=da717f1d 2a761ff5
- Aug 13 16:09:45 openvpn[1505]: 144.136.137.17:52538 TLS: Initial packet from [AF_INET]144.136.137.17:52538, sid=655c7177 9d058d82
- Aug 13 16:09:50 openvpn[1505]: 144.136.137.17:54354 TLS: Initial packet from [AF_INET]144.136.137.17:54354, sid=f0c345b3 04f5e0e1
- Aug 13 16:09:55 openvpn[1505]: 144.136.137.17:54146 TLS: Initial packet from [AF_INET]144.136.137.17:54146, sid=ac2e7dee 497aaacb
- Aug 13 16:09:59 openvpn[1505]: 144.136.137.17:48217 TLS: Initial packet from [AF_INET]144.136.137.17:48217, sid=0bd8eca2 73df02dc
- Aug 13 16:10:04 openvpn[1505]: 144.136.137.17:28744 TLS: Initial packet from [AF_INET]144.136.137.17:28744, sid=b5e7c5de 04a525ca
- Aug 13 16:10:08 openvpn[1505]: 144.136.137.17:3627 TLS: Initial packet from [AF_INET]144.136.137.17:3627, sid=03608fd4 cf580c17
- Aug 13 16:10:12 openvpn[1505]: 144.136.137.17:15401 TLS: Initial packet from [AF_INET]144.136.137.17:15401, sid=3379dc8b c16dba56
- Aug 13 16:10:16 openvpn[1505]: 144.136.137.17:10990 TLS: Initial packet from [AF_INET]144.136.137.17:10990, sid=dd807dd5 593ef31b
- Aug 13 16:10:21 openvpn[1505]: 144.136.137.17:47249 TLS: Initial packet from [AF_INET]144.136.137.17:47249, sid=e6e12e59 85d7e866
- Aug 13 16:10:25 openvpn[1505]: 144.136.137.17:53319 TLS: Initial packet from [AF_INET]144.136.137.17:53319, sid=00fb6271 31c95b0c
- Aug 13 16:10:29 openvpn[1505]: 144.136.137.17:21787 TLS: Initial packet from [AF_INET]144.136.137.17:21787, sid=4f4077ab db8d6d76
- Aug 13 16:10:34 openvpn[1505]: 144.136.137.17:5761 TLS: Initial packet from [AF_INET]144.136.137.17:5761, sid=b82e8ce1 b6a4e1f6
- Aug 13 16:10:38 openvpn[1505]: 144.136.137.17:32667 TLS: Initial packet from [AF_INET]144.136.137.17:32667, sid=b6d56a9c 7faf2d76
- Aug 13 16:10:41 openvpn[1505]: 144.136.137.17:16708 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:10:41 openvpn[1505]: 144.136.137.17:16708 TLS Error: TLS handshake failed
- Aug 13 16:10:41 openvpn[1505]: 144.136.137.17:16708 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:10:43 openvpn[1505]: 144.136.137.17:48852 TLS: Initial packet from [AF_INET]144.136.137.17:48852, sid=4a123d50 426159f4
- Aug 13 16:10:45 openvpn[1505]: 144.136.137.17:52538 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:10:45 openvpn[1505]: 144.136.137.17:52538 TLS Error: TLS handshake failed
- Aug 13 16:10:45 openvpn[1505]: 144.136.137.17:52538 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:10:47 openvpn[1505]: 144.136.137.17:5231 TLS: Initial packet from [AF_INET]144.136.137.17:5231, sid=6e7c1364 a7022714
- Aug 13 16:10:50 openvpn[1505]: 144.136.137.17:54354 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:10:50 openvpn[1505]: 144.136.137.17:54354 TLS Error: TLS handshake failed
- Aug 13 16:10:50 openvpn[1505]: 144.136.137.17:54354 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:10:52 openvpn[1505]: 144.136.137.17:19130 TLS: Initial packet from [AF_INET]144.136.137.17:19130, sid=ea67b6d2 f6fcf9b8
- Aug 13 16:10:56 openvpn[1505]: 144.136.137.17:54146 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:10:56 openvpn[1505]: 144.136.137.17:54146 TLS Error: TLS handshake failed
- Aug 13 16:10:56 openvpn[1505]: 144.136.137.17:54146 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:10:56 openvpn[1505]: 144.136.137.17:19009 TLS: Initial packet from [AF_INET]144.136.137.17:19009, sid=77a6e972 243ca04f
- Aug 13 16:10:59 openvpn[1505]: 144.136.137.17:48217 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:10:59 openvpn[1505]: 144.136.137.17:48217 TLS Error: TLS handshake failed
- Aug 13 16:10:59 openvpn[1505]: 144.136.137.17:48217 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:00 openvpn[1505]: 144.136.137.17:62796 TLS: Initial packet from [AF_INET]144.136.137.17:62796, sid=554231c6 d5a0a089
- Aug 13 16:11:05 openvpn[1505]: 144.136.137.17:28744 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:05 openvpn[1505]: 144.136.137.17:28744 TLS Error: TLS handshake failed
- Aug 13 16:11:05 openvpn[1505]: 144.136.137.17:28744 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:05 openvpn[1505]: 144.136.137.17:46632 TLS: Initial packet from [AF_INET]144.136.137.17:46632, sid=cdf40857 afeb637d
- Aug 13 16:11:08 openvpn[1505]: 144.136.137.17:3627 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:08 openvpn[1505]: 144.136.137.17:3627 TLS Error: TLS handshake failed
- Aug 13 16:11:08 openvpn[1505]: 144.136.137.17:3627 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:09 openvpn[1505]: 144.136.137.17:13260 TLS: Initial packet from [AF_INET]144.136.137.17:13260, sid=f567bb69 ceefcac7
- Aug 13 16:11:12 openvpn[1505]: 144.136.137.17:15401 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:12 openvpn[1505]: 144.136.137.17:15401 TLS Error: TLS handshake failed
- Aug 13 16:11:12 openvpn[1505]: 144.136.137.17:15401 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:14 openvpn[1505]: 144.136.137.17:43953 TLS: Initial packet from [AF_INET]144.136.137.17:43953, sid=b1cae808 1fdc7771
- Aug 13 16:11:16 openvpn[1505]: 144.136.137.17:10990 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:16 openvpn[1505]: 144.136.137.17:10990 TLS Error: TLS handshake failed
- Aug 13 16:11:16 openvpn[1505]: 144.136.137.17:10990 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:18 openvpn[1505]: 144.136.137.17:64636 TLS: Initial packet from [AF_INET]144.136.137.17:64636, sid=607c5107 4fd3b261
- Aug 13 16:11:21 openvpn[1505]: 144.136.137.17:47249 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:21 openvpn[1505]: 144.136.137.17:47249 TLS Error: TLS handshake failed
- Aug 13 16:11:21 openvpn[1505]: 144.136.137.17:47249 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:23 openvpn[1505]: 144.136.137.17:25432 TLS: Initial packet from [AF_INET]144.136.137.17:25432, sid=43a4566b 0f6b9eaa
- Aug 13 16:11:25 openvpn[1505]: 144.136.137.17:53319 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:25 openvpn[1505]: 144.136.137.17:53319 TLS Error: TLS handshake failed
- Aug 13 16:11:25 openvpn[1505]: 144.136.137.17:53319 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:27 openvpn[1505]: 144.136.137.17:32858 TLS: Initial packet from [AF_INET]144.136.137.17:32858, sid=74a8e790 76586141
- Aug 13 16:11:29 openvpn[1505]: 144.136.137.17:21787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:29 openvpn[1505]: 144.136.137.17:21787 TLS Error: TLS handshake failed
- Aug 13 16:11:29 openvpn[1505]: 144.136.137.17:21787 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:31 openvpn[1505]: 144.136.137.17:12535 TLS: Initial packet from [AF_INET]144.136.137.17:12535, sid=a6444765 7f1b7244
- Aug 13 16:11:34 openvpn[1505]: 144.136.137.17:5761 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:34 openvpn[1505]: 144.136.137.17:5761 TLS Error: TLS handshake failed
- Aug 13 16:11:34 openvpn[1505]: 144.136.137.17:5761 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:36 openvpn[1505]: 144.136.137.17:26165 TLS: Initial packet from [AF_INET]144.136.137.17:26165, sid=c2757659 a07bac1d
- Aug 13 16:11:38 openvpn[1505]: 144.136.137.17:32667 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:38 openvpn[1505]: 144.136.137.17:32667 TLS Error: TLS handshake failed
- Aug 13 16:11:38 openvpn[1505]: 144.136.137.17:32667 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:40 openvpn[1505]: 144.136.137.17:35862 TLS: Initial packet from [AF_INET]144.136.137.17:35862, sid=79de47c0 4a78f7bd
- Aug 13 16:11:43 openvpn[1505]: 144.136.137.17:48852 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:43 openvpn[1505]: 144.136.137.17:48852 TLS Error: TLS handshake failed
- Aug 13 16:11:43 openvpn[1505]: 144.136.137.17:48852 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:45 openvpn[1505]: 144.136.137.17:25685 TLS: Initial packet from [AF_INET]144.136.137.17:25685, sid=14d6fed2 9da20e97
- Aug 13 16:11:47 openvpn[1505]: 144.136.137.17:5231 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:47 openvpn[1505]: 144.136.137.17:5231 TLS Error: TLS handshake failed
- Aug 13 16:11:47 openvpn[1505]: 144.136.137.17:5231 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:48 openvpn[1505]: 144.136.137.17:54958 TLS: Initial packet from [AF_INET]144.136.137.17:54958, sid=60c79dde e954a9a3
- Aug 13 16:11:52 openvpn[1505]: 144.136.137.17:54958 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:11:52 openvpn[1505]: 144.136.137.17:54958 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:11:52 openvpn[1505]: 144.136.137.17:54958 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:11:52 openvpn[1505]: 144.136.137.17:54958 TLS Error: TLS handshake failed
- Aug 13 16:11:52 openvpn[1505]: 144.136.137.17:54958 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:53 openvpn[1505]: 144.136.137.17:19130 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:53 openvpn[1505]: 144.136.137.17:19130 TLS Error: TLS handshake failed
- Aug 13 16:11:53 openvpn[1505]: 144.136.137.17:19130 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:11:56 openvpn[1505]: 144.136.137.17:19009 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:11:56 openvpn[1505]: 144.136.137.17:19009 TLS Error: TLS handshake failed
- Aug 13 16:11:56 openvpn[1505]: 144.136.137.17:19009 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:01 openvpn[1505]: 144.136.137.17:62796 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:01 openvpn[1505]: 144.136.137.17:62796 TLS Error: TLS handshake failed
- Aug 13 16:12:01 openvpn[1505]: 144.136.137.17:62796 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:05 openvpn[1505]: 144.136.137.17:46632 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:05 openvpn[1505]: 144.136.137.17:46632 TLS Error: TLS handshake failed
- Aug 13 16:12:05 openvpn[1505]: 144.136.137.17:46632 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:09 openvpn[1505]: 144.136.137.17:13260 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:09 openvpn[1505]: 144.136.137.17:13260 TLS Error: TLS handshake failed
- Aug 13 16:12:09 openvpn[1505]: 144.136.137.17:13260 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:14 openvpn[1505]: 144.136.137.17:43953 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:14 openvpn[1505]: 144.136.137.17:43953 TLS Error: TLS handshake failed
- Aug 13 16:12:14 openvpn[1505]: 144.136.137.17:43953 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:18 openvpn[1505]: 144.136.137.17:64636 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:18 openvpn[1505]: 144.136.137.17:64636 TLS Error: TLS handshake failed
- Aug 13 16:12:18 openvpn[1505]: 144.136.137.17:64636 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:24 openvpn[1505]: 144.136.137.17:25432 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:24 openvpn[1505]: 144.136.137.17:25432 TLS Error: TLS handshake failed
- Aug 13 16:12:24 openvpn[1505]: 144.136.137.17:25432 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:27 openvpn[1505]: 144.136.137.17:32858 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:27 openvpn[1505]: 144.136.137.17:32858 TLS Error: TLS handshake failed
- Aug 13 16:12:27 openvpn[1505]: 144.136.137.17:32858 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:31 openvpn[1505]: 144.136.137.17:12535 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:31 openvpn[1505]: 144.136.137.17:12535 TLS Error: TLS handshake failed
- Aug 13 16:12:31 openvpn[1505]: 144.136.137.17:12535 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:36 openvpn[1505]: 144.136.137.17:26165 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:36 openvpn[1505]: 144.136.137.17:26165 TLS Error: TLS handshake failed
- Aug 13 16:12:36 openvpn[1505]: 144.136.137.17:26165 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:40 openvpn[1505]: 144.136.137.17:35862 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:40 openvpn[1505]: 144.136.137.17:35862 TLS Error: TLS handshake failed
- Aug 13 16:12:40 openvpn[1505]: 144.136.137.17:35862 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:45 openvpn[1505]: 144.136.137.17:25685 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:12:45 openvpn[1505]: 144.136.137.17:25685 TLS Error: TLS handshake failed
- Aug 13 16:12:45 openvpn[1505]: 144.136.137.17:25685 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:50 openvpn[1505]: 144.136.137.17:60938 TLS: Initial packet from [AF_INET]144.136.137.17:60938, sid=2ea997a6 297a30ad
- Aug 13 16:12:54 openvpn[1505]: 144.136.137.17:60938 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:12:54 openvpn[1505]: 144.136.137.17:60938 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:12:54 openvpn[1505]: 144.136.137.17:60938 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:12:54 openvpn[1505]: 144.136.137.17:60938 TLS Error: TLS handshake failed
- Aug 13 16:12:54 openvpn[1505]: 144.136.137.17:60938 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:12:57 openvpn[1505]: 144.136.137.17:10790 TLS: Initial packet from [AF_INET]144.136.137.17:10790, sid=c22246b6 aa1a68a9
- Aug 13 16:13:00 openvpn[1505]: 144.136.137.17:10790 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:13:00 openvpn[1505]: 144.136.137.17:10790 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:13:00 openvpn[1505]: 144.136.137.17:10790 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:13:00 openvpn[1505]: 144.136.137.17:10790 TLS Error: TLS handshake failed
- Aug 13 16:13:00 openvpn[1505]: 144.136.137.17:10790 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:13:02 openvpn[1505]: 144.136.137.17:57606 TLS: Initial packet from [AF_INET]144.136.137.17:57606, sid=2ef393d4 417ff285
- Aug 13 16:13:05 openvpn[1505]: 144.136.137.17:57606 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:13:05 openvpn[1505]: 144.136.137.17:57606 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:13:05 openvpn[1505]: 144.136.137.17:57606 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:13:05 openvpn[1505]: 144.136.137.17:57606 TLS Error: TLS handshake failed
- Aug 13 16:13:05 openvpn[1505]: 144.136.137.17:57606 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:14:05 openvpn[1505]: 144.136.137.17:41457 TLS: Initial packet from [AF_INET]144.136.137.17:41457, sid=ee31dc4a c7008000
- Aug 13 16:14:08 openvpn[1505]: 144.136.137.17:41457 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:14:08 openvpn[1505]: 144.136.137.17:41457 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:14:08 openvpn[1505]: 144.136.137.17:41457 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:14:08 openvpn[1505]: 144.136.137.17:41457 TLS Error: TLS handshake failed
- Aug 13 16:14:08 openvpn[1505]: 144.136.137.17:41457 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:14:48 openvpn[1505]: 144.136.137.17:39599 TLS: Initial packet from [AF_INET]144.136.137.17:39599, sid=adff7873 4c8edfe7
- Aug 13 16:14:51 openvpn[1505]: 144.136.137.17:39599 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:14:51 openvpn[1505]: 144.136.137.17:39599 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:14:51 openvpn[1505]: 144.136.137.17:39599 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:14:51 openvpn[1505]: 144.136.137.17:39599 TLS Error: TLS handshake failed
- Aug 13 16:14:51 openvpn[1505]: 144.136.137.17:39599 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:14:52 openvpn[1505]: 144.136.137.17:32442 TLS: Initial packet from [AF_INET]144.136.137.17:32442, sid=c9662dfe f5e710a6
- Aug 13 16:14:56 openvpn[1505]: 144.136.137.17:32442 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:14:56 openvpn[1505]: 144.136.137.17:32442 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:14:56 openvpn[1505]: 144.136.137.17:32442 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:14:56 openvpn[1505]: 144.136.137.17:32442 TLS Error: TLS handshake failed
- Aug 13 16:14:56 openvpn[1505]: 144.136.137.17:32442 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:15:54 openvpn[1505]: 144.136.137.17:7299 TLS: Initial packet from [AF_INET]144.136.137.17:7299, sid=6272a875 db134454
- Aug 13 16:15:55 openvpn[1505]: 144.136.137.17:41148 TLS: Initial packet from [AF_INET]144.136.137.17:41148, sid=a4d31a28 4de56c75
- Aug 13 16:15:58 openvpn[1505]: 144.136.137.17:41148 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:15:58 openvpn[1505]: 144.136.137.17:41148 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:15:58 openvpn[1505]: 144.136.137.17:41148 TLS Error: TLS handshake failed
- Aug 13 16:15:58 openvpn[1505]: 144.136.137.17:41148 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:16:02 openvpn[1505]: 144.136.137.17:6322 TLS: Initial packet from [AF_INET]144.136.137.17:6322, sid=d1d8682b 8f334678
- Aug 13 16:16:05 openvpn[1505]: 144.136.137.17:6322 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:16:05 openvpn[1505]: 144.136.137.17:6322 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:16:05 openvpn[1505]: 144.136.137.17:6322 TLS Error: TLS handshake failed
- Aug 13 16:16:05 openvpn[1505]: 144.136.137.17:6322 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:16:54 openvpn[1505]: 144.136.137.17:7299 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:16:54 openvpn[1505]: 144.136.137.17:7299 TLS Error: TLS handshake failed
- Aug 13 16:16:54 openvpn[1505]: 144.136.137.17:7299 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:17:04 openvpn[1505]: 144.136.137.17:42062 TLS: Initial packet from [AF_INET]144.136.137.17:42062, sid=77f7dea7 36a514d0
- Aug 13 16:17:07 openvpn[1505]: 144.136.137.17:42062 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:17:07 openvpn[1505]: 144.136.137.17:42062 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:17:07 openvpn[1505]: 144.136.137.17:42062 TLS Error: TLS handshake failed
- Aug 13 16:17:07 openvpn[1505]: 144.136.137.17:42062 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:18:07 openvpn[1505]: 144.136.137.17:43543 TLS: Initial packet from [AF_INET]144.136.137.17:43543, sid=c742c056 6cffc682
- Aug 13 16:18:10 openvpn[1505]: 144.136.137.17:1176 TLS: Initial packet from [AF_INET]144.136.137.17:1176, sid=e04693aa d0149547
- Aug 13 16:18:13 openvpn[1505]: 144.136.137.17:1176 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:18:13 openvpn[1505]: 144.136.137.17:1176 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:18:13 openvpn[1505]: 144.136.137.17:1176 TLS Error: TLS handshake failed
- Aug 13 16:18:13 openvpn[1505]: 144.136.137.17:1176 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:19:07 openvpn[1505]: 144.136.137.17:43543 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Aug 13 16:19:07 openvpn[1505]: 144.136.137.17:43543 TLS Error: TLS handshake failed
- Aug 13 16:19:07 openvpn[1505]: 144.136.137.17:43543 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:19:12 openvpn[1505]: 144.136.137.17:51981 TLS: Initial packet from [AF_INET]144.136.137.17:51981, sid=5ea6dc54 6e14673c
- Aug 13 16:19:15 openvpn[1505]: 144.136.137.17:51981 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:19:15 openvpn[1505]: 144.136.137.17:51981 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:19:15 openvpn[1505]: 144.136.137.17:51981 TLS Error: TLS handshake failed
- Aug 13 16:19:15 openvpn[1505]: 144.136.137.17:51981 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:19:18 openvpn[1505]: 144.136.137.17:65232 TLS: Initial packet from [AF_INET]144.136.137.17:65232, sid=946ccfeb 87d9d30b
- Aug 13 16:19:21 openvpn[1505]: 144.136.137.17:65232 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:19:21 openvpn[1505]: 144.136.137.17:65232 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:19:21 openvpn[1505]: 144.136.137.17:65232 TLS Error: TLS handshake failed
- Aug 13 16:19:21 openvpn[1505]: 144.136.137.17:65232 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:20:20 openvpn[1505]: 144.136.137.17:39983 TLS: Initial packet from [AF_INET]144.136.137.17:39983, sid=61e591f2 37a04f83
- Aug 13 16:20:23 openvpn[1505]: 144.136.137.17:39983 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:20:23 openvpn[1505]: 144.136.137.17:39983 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:20:23 openvpn[1505]: 144.136.137.17:39983 TLS Error: TLS handshake failed
- Aug 13 16:20:23 openvpn[1505]: 144.136.137.17:39983 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:21:22 openvpn[1505]: 144.136.137.17:13877 TLS: Initial packet from [AF_INET]144.136.137.17:13877, sid=e458ee0e 8388b6d4
- Aug 13 16:21:25 openvpn[1505]: 144.136.137.17:13877 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:21:25 openvpn[1505]: 144.136.137.17:13877 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:21:25 openvpn[1505]: 144.136.137.17:13877 TLS Error: TLS handshake failed
- Aug 13 16:21:25 openvpn[1505]: 144.136.137.17:13877 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:22:24 openvpn[1505]: 144.136.137.17:28238 TLS: Initial packet from [AF_INET]144.136.137.17:28238, sid=1973f0d6 544a5211
- Aug 13 16:22:28 openvpn[1505]: 144.136.137.17:28238 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:22:28 openvpn[1505]: 144.136.137.17:28238 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:22:28 openvpn[1505]: 144.136.137.17:28238 TLS Error: TLS handshake failed
- Aug 13 16:22:28 openvpn[1505]: 144.136.137.17:28238 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:23:26 openvpn[1505]: 144.136.137.17:13377 TLS: Initial packet from [AF_INET]144.136.137.17:13377, sid=b340e2fe 688813bc
- Aug 13 16:23:29 openvpn[1505]: 144.136.137.17:13377 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:23:29 openvpn[1505]: 144.136.137.17:13377 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:23:29 openvpn[1505]: 144.136.137.17:13377 TLS Error: TLS handshake failed
- Aug 13 16:23:29 openvpn[1505]: 144.136.137.17:13377 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:24:00 openvpn[1505]: 144.136.137.17:25053 TLS: Initial packet from [AF_INET]144.136.137.17:25053, sid=c22af978 b96dcfe7
- Aug 13 16:24:04 openvpn[1505]: 144.136.137.17:25053 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:24:04 openvpn[1505]: 144.136.137.17:25053 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:24:04 openvpn[1505]: 144.136.137.17:25053 TLS Error: TLS handshake failed
- Aug 13 16:24:04 openvpn[1505]: 144.136.137.17:25053 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:24:12 openvpn[1505]: 144.136.137.17:53827 TLS: Initial packet from [AF_INET]144.136.137.17:53827, sid=a46deb0f 64936ada
- Aug 13 16:24:16 openvpn[1505]: 144.136.137.17:53827 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:24:16 openvpn[1505]: 144.136.137.17:53827 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:24:16 openvpn[1505]: 144.136.137.17:53827 TLS Error: TLS handshake failed
- Aug 13 16:24:16 openvpn[1505]: 144.136.137.17:53827 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:25:14 openvpn[1505]: 144.136.137.17:56344 TLS: Initial packet from [AF_INET]144.136.137.17:56344, sid=13139f0c f46a6ef2
- Aug 13 16:25:18 openvpn[1505]: 144.136.137.17:56344 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:25:18 openvpn[1505]: 144.136.137.17:56344 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:25:18 openvpn[1505]: 144.136.137.17:56344 TLS Error: TLS handshake failed
- Aug 13 16:25:18 openvpn[1505]: 144.136.137.17:56344 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:26:16 openvpn[1505]: 144.136.137.17:20003 TLS: Initial packet from [AF_INET]144.136.137.17:20003, sid=3e306655 0809a01c
- Aug 13 16:26:20 openvpn[1505]: 144.136.137.17:20003 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:26:20 openvpn[1505]: 144.136.137.17:20003 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:26:20 openvpn[1505]: 144.136.137.17:20003 TLS Error: TLS handshake failed
- Aug 13 16:26:20 openvpn[1505]: 144.136.137.17:20003 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:26:50 openvpn[1505]: 144.136.137.17:53546 TLS: Initial packet from [AF_INET]144.136.137.17:53546, sid=0adf0468 d7d5f9d4
- Aug 13 16:26:53 openvpn[1505]: 144.136.137.17:53546 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:26:53 openvpn[1505]: 144.136.137.17:53546 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:26:53 openvpn[1505]: 144.136.137.17:53546 TLS Error: TLS handshake failed
- Aug 13 16:26:53 openvpn[1505]: 144.136.137.17:53546 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:27:30 openvpn[1505]: 144.136.137.17:24594 TLS: Initial packet from [AF_INET]144.136.137.17:24594, sid=4be17f14 d4fdd69d
- Aug 13 16:27:34 openvpn[1505]: 144.136.137.17:24594 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:27:34 openvpn[1505]: 144.136.137.17:24594 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:27:34 openvpn[1505]: 144.136.137.17:24594 TLS Error: TLS handshake failed
- Aug 13 16:27:34 openvpn[1505]: 144.136.137.17:24594 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:27:40 openvpn[1505]: 144.136.137.17:50091 TLS: Initial packet from [AF_INET]144.136.137.17:50091, sid=aff2ed04 df0ed275
- Aug 13 16:27:43 openvpn[1505]: 144.136.137.17:50091 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:27:43 openvpn[1505]: 144.136.137.17:50091 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:27:43 openvpn[1505]: 144.136.137.17:50091 TLS Error: TLS handshake failed
- Aug 13 16:27:43 openvpn[1505]: 144.136.137.17:50091 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:28:43 openvpn[1505]: 144.136.137.17:5399 TLS: Initial packet from [AF_INET]144.136.137.17:5399, sid=c10ea9ab e07dc138
- Aug 13 16:28:46 openvpn[1505]: 144.136.137.17:5399 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:28:46 openvpn[1505]: 144.136.137.17:5399 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:28:46 openvpn[1505]: 144.136.137.17:5399 TLS Error: TLS handshake failed
- Aug 13 16:28:46 openvpn[1505]: 144.136.137.17:5399 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:29:45 openvpn[1505]: 144.136.137.17:10991 TLS: Initial packet from [AF_INET]144.136.137.17:10991, sid=8ab1414c 41148c78
- Aug 13 16:29:48 openvpn[1505]: 144.136.137.17:10991 TLS_ERROR: BIO read tls_read_plaintext error: error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate
- Aug 13 16:29:48 openvpn[1505]: 144.136.137.17:10991 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:29:48 openvpn[1505]: 144.136.137.17:10991 TLS Error: TLS handshake failed
- Aug 13 16:29:48 openvpn[1505]: 144.136.137.17:10991 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:30:19 openvpn[1505]: 144.136.137.17:45207 TLS: Initial packet from [AF_INET]144.136.137.17:45207, sid=48c8d425 e0fa5299
- Aug 13 16:30:23 openvpn[1505]: 144.136.137.17:45207 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:30:23 openvpn[1505]: 144.136.137.17:45207 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:30:23 openvpn[1505]: 144.136.137.17:45207 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:30:23 openvpn[1505]: 144.136.137.17:45207 TLS Error: TLS handshake failed
- Aug 13 16:30:23 openvpn[1505]: 144.136.137.17:45207 SIGUSR1[soft,tls-error] received, client-instance restarting
- Aug 13 16:30:26 openvpn[1505]: 144.136.137.17:28437 TLS: Initial packet from [AF_INET]144.136.137.17:28437, sid=df4527ac bf95897a
- Aug 13 16:30:29 openvpn[1505]: 144.136.137.17:28437 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=US, ST=State, L=Locality, O=pfSense webConfigurator Self-Signed Certificate, emailAddress=admin@pfSense.localdomain, CN=pfSense-3c30fca88b038
- Aug 13 16:30:29 openvpn[1505]: 144.136.137.17:28437 TLS_ERROR: BIO read tls_read_plaintext error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
- Aug 13 16:30:29 openvpn[1505]: 144.136.137.17:28437 TLS Error: TLS object -> incoming plaintext read error
- Aug 13 16:30:29 openvpn[1505]: 144.136.137.17:28437 TLS Error: TLS handshake failed
- Aug 13 16:30:29 openvpn[1505]: 144.136.137.17:28437 SIGUSR1[soft,tls-error] received, client-instance restarting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement