Advertisement
RingtailedFox

OpenWRT Logread results

Nov 11th, 2020
1,487
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 72.75 KB | None | 0 0
  1. Wed Nov 11 01:27:22 2020 kern.err kernel: [ 27.957575] firmware ath10k!QCA9984!hw1.0!ct-firmware-2.bin: firmware_loading_store: map pages failed
  2. Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 27.957722] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/QCA9984/hw1.0/firmware-6.bin failed with error -2
  3. Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 27.965850] ath10k_pci 0001:01:00.0: Falling back to user helper
  4. Wed Nov 11 01:27:22 2020 kern.err kernel: [ 27.992848] firmware ath10k!QCA9984!hw1.0!firmware-6.bin: firmware_loading_store: map pages failed
  5. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 27.992988] ath10k_pci 0001:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
  6. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 28.000792] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
  7. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 28.012983] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9984-fW-13-795874169 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 f3d4b769
  8. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 30.338464] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 0:2 crc32 85498734
  9. Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 36.185396] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  10. Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 36.185424] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  11. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.269438] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  12. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.270313] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
  13. Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.553493] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
  14. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652936] ath: EEPROM regdomain: 0x0
  15. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652949] ath: EEPROM indicates default country code should be used
  16. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652958] ath: doing EEPROM country->regdmn map search
  17. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652973] ath: country maps to regdmn code: 0x3a
  18. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652984] ath: Country alpha2 being used: US
  19. Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652992] ath: Regpair used: 0x3a
  20. Wed Nov 11 01:27:22 2020 user.info kernel: [ 36.661190] kmodloader: done loading kernel modules from /etc/modules.d/*
  21. Wed Nov 11 01:27:23 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  22. Wed Nov 11 01:27:23 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  23. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: started, version 2.80 cachesize 150
  24. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: DNS service limited to local subnets
  25. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  26. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain test
  27. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain onion
  28. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain localhost
  29. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain local
  30. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain invalid
  31. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain bind
  32. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5056
  33. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5055
  34. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5054
  35. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5053
  36. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain lan
  37. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: read /etc/hosts - 57 addresses
  38. Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: read /tmp/hosts/dhcp.cfg01411c - 132 addresses
  39. Wed Nov 11 01:27:24 2020 authpriv.info dropbear[1111]: Not backgrounding
  40. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: 8021ad
  41. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: 8021q
  42. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: macvlan
  43. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: veth
  44. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: bridge
  45. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: Network device
  46. Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: tunnel
  47. Wed Nov 11 01:27:25 2020 user.info adblock-4.0.7[1232]: adblock instance started ::: action: start, priority: 0, pid: 1232
  48. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.979573] Generic PHY fixed-0:01: attached PHY driver [Generic PHY] (mii_bus:phy_addr=fixed-0:01, irq=POLL)
  49. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.980718] dwmac1000: Master AXI performs any burst length
  50. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.988580] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
  51. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.994052] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
  52. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.003071] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
  53. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.026879] br-lan: port 1(eth1.1) entered blocking state
  54. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.026944] br-lan: port 1(eth1.1) entered disabled state
  55. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.031600] device eth1.1 entered promiscuous mode
  56. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.036748] device eth1 entered promiscuous mode
  57. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is enabled
  58. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is setting up now
  59. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is now up
  60. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is enabled
  61. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is setting up now
  62. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is now up
  63. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.053720] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
  64. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.065507] Generic PHY fixed-0:00: attached PHY driver [Generic PHY] (mii_bus:phy_addr=fixed-0:00, irq=POLL)
  65. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.066828] dwmac1000: Master AXI performs any burst length
  66. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.074483] ipq806x-gmac-dwmac 37200000.ethernet eth0: IEEE 1588-2008 Advanced Timestamp supported
  67. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.079950] ipq806x-gmac-dwmac 37200000.ethernet eth0: registered PTP clock
  68. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.089657] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
  69. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'wan' is enabled
  70. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'wan6' is enabled
  71. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Network device 'lo' link is up
  72. Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
  73. Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.114522] IPv6: ADDRCONF(NETDEV_UP): eth0.2: link is not ready
  74. Wed Nov 11 01:27:27 2020 daemon.warn dnsmasq[1078]: Ignoring query from non-local network
  75. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.674669] print_req_error: I/O error, dev mtdblock0, sector 0
  76. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.675103] print_req_error: I/O error, dev mtdblock0, sector 8
  77. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.679797] print_req_error: I/O error, dev mtdblock0, sector 16
  78. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.687053] print_req_error: I/O error, dev mtdblock0, sector 24
  79. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.695442] print_req_error: I/O error, dev mtdblock0, sector 0
  80. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.697534] Buffer I/O error on dev mtdblock0, logical block 0, async page read
  81. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.705132] print_req_error: I/O error, dev mtdblock1, sector 0
  82. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.710871] print_req_error: I/O error, dev mtdblock1, sector 8
  83. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.716820] print_req_error: I/O error, dev mtdblock1, sector 16
  84. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.722659] print_req_error: I/O error, dev mtdblock1, sector 24
  85. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.729074] print_req_error: I/O error, dev mtdblock1, sector 0
  86. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.734518] Buffer I/O error on dev mtdblock1, logical block 0, async page read
  87. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.845326] ntfs: (device sda2): parse_ntfs_boot_sector(): Volume size (2TiB) is too large for this architecture. Maximum supported is 2TiB. Sorry.
  88. Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.845361] ntfs: (device sda2): ntfs_fill_super(): Unsupported NTFS filesystem.
  89. Wed Nov 11 01:27:27 2020 daemon.err block: mounting /dev/sda2 (ntfs) as /mnt/sda2 failed (22) - Not a tty
  90. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.019652] ath: EEPROM regdomain: 0x807c
  91. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.019672] ath: EEPROM indicates we should expect a country code
  92. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.022633] ath: doing EEPROM country->regdmn map search
  93. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.028821] ath: country maps to regdmn code: 0x3a
  94. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.034139] ath: Country alpha2 being used: CA
  95. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.038691] ath: Regpair used: 0x3a
  96. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.043117] ath: regdomain 0x807c dynamically updated by user
  97. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.046595] ath: EEPROM regdomain: 0x807c
  98. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.052404] ath: EEPROM indicates we should expect a country code
  99. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.056474] ath: doing EEPROM country->regdmn map search
  100. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.062477] ath: country maps to regdmn code: 0x3a
  101. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.067909] ath: Country alpha2 being used: CA
  102. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.072460] ath: Regpair used: 0x3a
  103. Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.076940] ath: regdomain 0x807c dynamically updated by user
  104. Wed Nov 11 01:27:27 2020 cron.info crond[1733]: crond (busybox 1.30.1) started, log level 5
  105. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.117017] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
  106. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Network device 'eth1' link is up
  107. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.121647] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  108. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.126310] br-lan: port 1(eth1.1) entered blocking state
  109. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.130951] br-lan: port 1(eth1.1) entered forwarding state
  110. Wed Nov 11 01:27:27 2020 daemon.notice netifd: VLAN 'eth1.1' link is up
  111. Wed Nov 11 01:27:27 2020 daemon.notice netifd: bridge 'br-lan' link is up
  112. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'lan' has link connectivity
  113. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.140046] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
  114. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.154234] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
  115. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.154277] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  116. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Network device 'eth0' link is up
  117. Wed Nov 11 01:27:27 2020 daemon.notice netifd: VLAN 'eth0.2' link is up
  118. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan' has link connectivity
  119. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan' is setting up now
  120. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
  121. Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan6' is setting up now
  122. Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.166612] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready
  123. Wed Nov 11 01:27:27 2020 daemon.notice netifd: wan (1799): udhcpc: started, v1.30.1
  124. Wed Nov 11 01:27:28 2020 daemon.err odhcp6c[1810]: Failed to send RS (Address not available)
  125. Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: sending discover
  126. Wed Nov 11 01:27:28 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  127. Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: sending select for 24.57.18.56
  128. Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: lease of 24.57.18.56 obtained, lease time 37887
  129. Wed Nov 11 01:27:28 2020 user.notice SQM: Starting SQM script: simple.qos on eth1, in: 85000 Kbps, out: 10000 Kbps
  130. Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: Starting SQM script: simple.qos on eth1, in: 85000 Kbps, out: 10000 Kbps
  131. Wed Nov 11 01:27:28 2020 user.notice SQM: Using generic sqm_start_default function.
  132. Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: Using generic sqm_start_default function.
  133. Wed Nov 11 01:27:28 2020 daemon.notice netifd: Interface 'wan' is now up
  134. Wed Nov 11 01:27:28 2020 daemon.notice netifd: radio1 (1382): command failed: Not supported (-95)
  135. Wed Nov 11 01:27:28 2020 user.notice mac80211: Failed command: iw phy phy1 set distance 0
  136. Wed Nov 11 01:27:28 2020 daemon.err odhcp6c[1810]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  137. Wed Nov 11 01:27:28 2020 daemon.notice netifd: radio0 (1381): command failed: Not supported (-95)
  138. Wed Nov 11 01:27:28 2020 user.notice mac80211: Failed command: iw phy phy0 set distance 0
  139. Wed Nov 11 01:27:28 2020 user.notice SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
  140. Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
  141. Wed Nov 11 01:27:28 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
  142. Wed Nov 11 01:27:28 2020 user.notice SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
  143. Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
  144. Wed Nov 11 01:27:29 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  145. Wed Nov 11 01:27:29 2020 daemon.err odhcpd[1570]: Failed to send to ff02::1%lan@br-lan (Address not available)
  146. Wed Nov 11 01:27:29 2020 daemon.err odhcp6c[1810]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
  147. Wed Nov 11 01:27:30 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  148. Wed Nov 11 01:27:31 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  149. Wed Nov 11 01:27:32 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  150. Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'youtube' failed, url: https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 19, log: 11/11 01:27:26 [NOTICE] Downloading 1 item(s) 11/11 01:27:32 [ERROR] CUID#7 - Download aborted. URI=https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname raw.githubusercontent.com, cause: Try again 11/11 01:27:32 [NOTICE] Download GID#d0dffe0d24a9bf5d not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.youtube.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= d0dffe|ERR | 0B/s|//tmp/tmp.aIpjnk/
  151. Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'adguard' failed, url: https://filters.adtidy.org/windows/filters/15.txt, rule: BEGIN{FS="[/|^|\r]"}/^\|\|([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+[\/\^\r]+$/{print tolower($3)}, categories: -, rc: 19, log: 11/11 01:27:26 [NOTICE] Downloading 1 item(s) 11/11 01:27:32 [ERROR] CUID#7 - Download aborted. URI=https://filters.adtidy.org/windows/filters/15.txt Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://filters.adtidy.org/windows/filters/15.txt -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname filters.adtidy.org, cause: Try again 11/11 01:27:32 [NOTICE] Download GID#0848868e2928c62c not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.adguard.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= 084886|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.adguard.load Status Legend: (ERR):error occurred. aria2 will resume download
  152. Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'malwarelist' failed, url: https://www.malwaredomainlist.com/hostslist/hosts.txt, rule: /^127\.0\.0\.1[[:space:]]+([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($2)}, categories: -, rc: 19, log: 11/11 01:27:26 [NOTICE] Downloading 1 item(s) 11/11 01:27:32 [ERROR] CUID#7 - Download aborted. URI=https://www.malwaredomainlist.com/hostslist/hosts.txt Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://www.malwaredomainlist.com/hostslist/hosts.txt -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname www.malwaredomainlist.com, cause: Try again 11/11 01:27:32 [NOTICE] Download GID#f84a8848dfa62cb1 not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.malwarelist.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= f84a88|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.malwarelist.load Status Legend: (ERR):error oc
  153. Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'malwaredomains' failed, url: https://mirror1.malwaredomains.com/files/justdomains, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 19, log: 11/11 01:27:26 [NOTICE] Downloading 1 item(s) 11/11 01:27:32 [ERROR] CUID#7 - Download aborted. URI=https://mirror1.malwaredomains.com/files/justdomains Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://mirror1.malwaredomains.com/files/justdomains -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname mirror1.malwaredomains.com, cause: Try again 11/11 01:27:32 [NOTICE] Download GID#4ff11352faddb678 not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.malwaredomains.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= 4ff113|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.malwaredomains.load Status Legend: (ERR):error occurred. aria2 wi
  154. Wed Nov 11 01:27:33 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  155. Wed Nov 11 01:27:34 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  156. Wed Nov 11 01:27:34 2020 kern.warn kernel: [ 49.256043] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  157. Wed Nov 11 01:27:34 2020 kern.warn kernel: [ 49.256070] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
  158. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.339877] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  159. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.340771] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
  160. Wed Nov 11 01:27:35 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  161. Wed Nov 11 01:27:35 2020 kern.warn kernel: [ 49.746003] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  162. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.746281] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
  163. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.766063] br-lan: port 2(wlan1) entered blocking state
  164. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.766089] br-lan: port 2(wlan1) entered disabled state
  165. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.770607] device wlan1 entered promiscuous mode
  166. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.775871] br-lan: port 2(wlan1) entered blocking state
  167. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.780340] br-lan: port 2(wlan1) entered forwarding state
  168. Wed Nov 11 01:27:35 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
  169. Wed Nov 11 01:27:35 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
  170. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.824367] br-lan: port 2(wlan1) entered disabled state
  171. Wed Nov 11 01:27:35 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
  172. Wed Nov 11 01:27:35 2020 kern.info kernel: [ 50.254934] ath10k_pci 0001:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
  173. Wed Nov 11 01:27:36 2020 daemon.info dnsmasq[1078]: exiting on receipt of SIGTERM
  174. Wed Nov 11 01:27:36 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  175. Wed Nov 11 01:27:36 2020 user.info : dnscrypt-proxy - [fvz-anyone] does not support DNS Security Extensions
  176. Wed Nov 11 01:27:36 2020 user.info : dnscrypt-proxy + Provider supposedly doesn't keep logs
  177. Wed Nov 11 01:27:36 2020 daemon.notice dnscrypt-proxy[3087]: dnscrypt-proxy Starting dnscrypt-proxy 1.9.5
  178. Wed Nov 11 01:27:36 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Generating a new session key pair
  179. Wed Nov 11 01:27:37 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Done
  180. Wed Nov 11 01:27:37 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  181. Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: Giving up on getting lock after 10 attempts
  182. Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: This is a bug; please report it at https://github.com/tohojo/sqm-scripts/issues
  183. Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: Then, to re-enable sqm-scripts, manually remove /var/run/sqm/sqm-run.lock
  184. Wed Nov 11 01:27:38 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  185. Wed Nov 11 01:27:39 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  186. Wed Nov 11 01:27:40 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  187. Wed Nov 11 01:27:41 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  188. Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.327720] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
  189. Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.327746] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
  190. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.409606] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
  191. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.410430] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
  192. Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.761788] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
  193. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.761911] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
  194. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: started, version 2.80 cachesize 150
  195. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: DNS service limited to local subnets
  196. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  197. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq-dhcp[3030]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
  198. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain test
  199. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain onion
  200. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain localhost
  201. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain local
  202. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain invalid
  203. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain bind
  204. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5056
  205. Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' is now up
  206. Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' has lost the connection
  207. Wed Nov 11 01:27:42 2020 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=6 sec=10 based on overlapping BSSes
  208. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5055
  209. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5054
  210. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5053
  211. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain lan
  212. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
  213. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  214. Wed Nov 11 01:27:42 2020 daemon.err hostapd: Using interface wlan1 with hwaddr dc:ef:09:e5:75:3d and ssid "733MCKAY"
  215. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.826536] br-lan: port 3(wlan0) entered blocking state
  216. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.826562] br-lan: port 3(wlan0) entered disabled state
  217. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.831132] device wlan0 entered promiscuous mode
  218. Wed Nov 11 01:27:42 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
  219. Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
  220. Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
  221. Wed Nov 11 01:27:42 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  222. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.158374] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
  223. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.158500] br-lan: port 2(wlan1) entered blocking state
  224. Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.163788] br-lan: port 2(wlan1) entered forwarding state
  225. Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' is now up
  226. Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
  227. Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan1: AP-ENABLED
  228. Wed Nov 11 01:27:42 2020 daemon.err hostapd: Using interface wlan0 with hwaddr dc:ef:09:e5:75:3c and ssid "733MCKAY-5GHz"
  229. Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.508930] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
  230. Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.509074] br-lan: port 3(wlan0) entered blocking state
  231. Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.514438] br-lan: port 3(wlan0) entered forwarding state
  232. Wed Nov 11 01:27:43 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
  233. Wed Nov 11 01:27:43 2020 daemon.notice hostapd: wlan0: AP-ENABLED
  234. Wed Nov 11 01:27:43 2020 daemon.notice netifd: Network device 'wlan1' link is up
  235. Wed Nov 11 01:27:43 2020 daemon.notice netifd: Network device 'wlan0' link is up
  236. Wed Nov 11 01:27:43 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
  237. Wed Nov 11 01:27:43 2020 daemon.warn odhcpd[1570]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
  238. Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPDISCOVER(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
  239. Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPOFFER(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
  240. Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
  241. Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee PHENOM-II-X6
  242. Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
  243. Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c.3208 - 53 addresses
  244. Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 0 addresses
  245. Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  246. Wed Nov 11 01:27:44 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
  247. Wed Nov 11 01:27:44 2020 user.info banIP-0.3.11[3206]: banIP is currently disabled, please set ban_enabled to '1' to use this service
  248. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 IEEE 802.11: authenticated
  249. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 IEEE 802.11: associated (aid 1)
  250. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.569838] br-lan: port 4(wlan1.sta1) entered blocking state
  251. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.569864] br-lan: port 4(wlan1.sta1) entered disabled state
  252. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.574781] device wlan1.sta1 entered promiscuous mode
  253. Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: WDS-STA-INTERFACE-ADDED ifname=wlan1.sta1 sta_addr=84:c9:b2:58:77:63
  254. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.581391] br-lan: port 4(wlan1.sta1) entered blocking state
  255. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.585375] br-lan: port 4(wlan1.sta1) entered forwarding state
  256. Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:c9:b2:58:77:63
  257. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 RADIUS: starting accounting session BE43098CB13A5B31
  258. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 WPA: pairwise key handshake completed (RSN)
  259. Wed Nov 11 01:27:44 2020 user.notice SQM: simple.qos was started on eth1 successfully
  260. Wed Nov 11 01:27:44 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: simple.qos was started on eth1 successfully
  261. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de IEEE 802.11: authenticated
  262. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de IEEE 802.11: associated (aid 2)
  263. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.174616] br-lan: port 5(wlan1.sta2) entered blocking state
  264. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.174641] br-lan: port 5(wlan1.sta2) entered disabled state
  265. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.179521] device wlan1.sta2 entered promiscuous mode
  266. Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: WDS-STA-INTERFACE-ADDED ifname=wlan1.sta2 sta_addr=00:26:5a:c8:e8:de
  267. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.199334] br-lan: port 5(wlan1.sta2) entered blocking state
  268. Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.199363] br-lan: port 5(wlan1.sta2) entered forwarding state
  269. Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 00:26:5a:c8:e8:de
  270. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de RADIUS: starting accounting session BCB5334CDB422B2F
  271. Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de WPA: pairwise key handshake completed (RSN)
  272. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
  273. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 2 addresses
  274. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  275. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
  276. Wed Nov 11 01:27:45 2020 daemon.notice procd: /etc/rc.d/S60dbus: dbus[3727]: Unknown group "netdev" in message bus configuration file
  277. Wed Nov 11 01:27:45 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  278. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
  279. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 2 addresses
  280. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  281. Wed Nov 11 01:27:45 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
  282. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
  283. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Successfully dropped root privileges.
  284. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: avahi-daemon 0.8 starting up.
  285. Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
  286. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: No service file found in /etc/avahi/services.
  287. Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: *** WARNING: Detected another IPv4 mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***
  288. Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: bind() failed: Address in use
  289. Wed Nov 11 01:27:45 2020 daemon.notice avahi-daemon[3813]: Failed to create IPv4 socket, proceeding in IPv6 only mode
  290. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.sta2.IPv6 with address fe80::deef:9ff:fee5:753d.
  291. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.sta2.IPv6 for mDNS.
  292. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.sta1.IPv6 with address fe80::deef:9ff:fee5:753d.
  293. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.sta1.IPv6 for mDNS.
  294. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan0.IPv6 with address fe80::deef:9ff:fee5:753c.
  295. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan0.IPv6 for mDNS.
  296. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.IPv6 with address fe80::deef:9ff:fee5:753d.
  297. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.IPv6 for mDNS.
  298. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth0.2.IPv6 with address 2001:1970:4000:d8:9d78:fc30:66e3:45df.
  299. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth0.2.IPv6 for mDNS.
  300. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface br-lan.IPv6 with address fd7d:6174:287a::1.
  301. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface br-lan.IPv6 for mDNS.
  302. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::deef:9ff:fee5:753a.
  303. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth1.IPv6 for mDNS.
  304. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::deef:9ff:fee5:753b.
  305. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth0.IPv6 for mDNS.
  306. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
  307. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface lo.IPv6 for mDNS.
  308. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Network interface enumeration completed.
  309. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.sta2.*.
  310. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.sta1.*.
  311. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753c on wlan0.*.
  312. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.*.
  313. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for 2001:1970:4000:d8:9d78:fc30:66e3:45df on eth0.2.*.
  314. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fd7d:6174:287a::1 on br-lan.*.
  315. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for 2001:1970:5d2a:c500::1 on br-lan.*.
  316. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753a on eth1.*.
  317. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753b on eth0.*.
  318. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for ::1 on lo.*.
  319. Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering HINFO record with values 'ARMV7L'/'LINUX'.
  320. Wed Nov 11 01:27:45 2020 daemon.notice ntpd[3911]: ntpd 4.2.8p15@1.3728-o Sun Sep 6 16:19:39 UTC 2020 (1): Starting
  321. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: Command line: /sbin/ntpd -g -u ntp:ntp -p /var/run/ntpd.pid -n -c /var/etc/ntpd.conf
  322. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ----------------------------------------------------
  323. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ntp-4 is maintained by Network Time Foundation,
  324. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
  325. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: corporation. Support and training for ntp-4 are
  326. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: available at https://www.nwtime.org/support
  327. Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ----------------------------------------------------
  328. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: proto: precision = 2.560 usec (-18)
  329. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: basedate set to 2020-08-25
  330. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: gps base set to 2020-08-30 (week 2121)
  331. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen and drop on 0 v6wildcard [::]:123
  332. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen and drop on 1 v4wildcard 0.0.0.0:123
  333. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 2 lo 127.0.0.1:123
  334. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 3 br-lan 192.168.1.1:123
  335. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 4 eth0.2 24.57.18.56:123
  336. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 5 lo [::1]:123
  337. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 6 eth0 [fe80::deef:9ff:fee5:753b%2]:123
  338. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 7 eth1 [fe80::deef:9ff:fee5:753a%3]:123
  339. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 8 br-lan [2001:1970:5d2a:c500::1]:123
  340. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 9 br-lan [fd7d:6174:287a::1]:123
  341. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 10 br-lan [fe80::deef:9ff:fee5:753a%10]:123
  342. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 11 eth0.2 [2001:1970:4000:d8:9d78:fc30:66e3:45df]:123
  343. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 12 eth0.2 [fe80::deef:9ff:fee5:753b%12]:123
  344. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 13 ifb4eth1 [fe80::a049:9bff:fee8:cd9b%20]:123
  345. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 14 wlan1 [fe80::deef:9ff:fee5:753d%21]:123
  346. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 15 wlan0 [fe80::deef:9ff:fee5:753c%22]:123
  347. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 16 wlan1.sta1 [fe80::deef:9ff:fee5:753d%24]:123
  348. Wed Nov 11 01:27:46 2020 daemon.err ntpd[3911]: bind(65) AF_INET6 fe80::deef:9ff:fee5:753d%25#123 flags 0x11 failed: Address not available
  349. Wed Nov 11 01:27:46 2020 daemon.err ntpd[3911]: unable to create socket on wlan1.sta2 (17) for fe80::deef:9ff:fee5:753d%25#123
  350. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: failed to init interface for address fe80::deef:9ff:fee5:753d%25
  351. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listening on routing socket on fd #65 for interface updates
  352. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
  353. Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
  354. Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe IEEE 802.11: authenticated
  355. Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe IEEE 802.11: associated (aid 3)
  356. Wed Nov 11 01:27:46 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED ac:ae:19:b4:ba:fe
  357. Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe RADIUS: starting accounting session 978D305E157CFC4B
  358. Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe WPA: pairwise key handshake completed (RSN)
  359. Wed Nov 11 01:27:46 2020 daemon.info avahi-daemon[3813]: Server startup complete. Host name is Nighthawk.local. Local service cookie is 4000022860.
  360. Wed Nov 11 01:27:46 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.242 ac:ae:19:b4:ba:fe
  361. Wed Nov 11 01:27:46 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.242 ac:ae:19:b4:ba:fe RokuBox
  362. Wed Nov 11 01:27:47 2020 user.info banIP-0.3.11[4004]: banIP is currently disabled, please set ban_enabled to '1' to use this service
  363. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: configfile: stat (/etc/collectd/conf.d) failed: No such file or directory
  364. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "iwinfo" successfully loaded.
  365. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "memory" successfully loaded.
  366. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "cpu" successfully loaded.
  367. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "rrdtool" successfully loaded.
  368. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: rrdtool plugin: RRASingle = true: creating only AVERAGE RRAs
  369. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "interface" successfully loaded.
  370. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "sensors" successfully loaded.
  371. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "load" successfully loaded.
  372. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "thermal" successfully loaded.
  373. Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f IEEE 802.11: authenticated
  374. Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f IEEE 802.11: associated (aid 1)
  375. Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: Initialization complete, entering read-loop.
  376. Wed Nov 11 01:27:47 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:b6:d0:0f:b6:2f
  377. Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f RADIUS: starting accounting session 9532EDC3A17CDF85
  378. Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f WPA: pairwise key handshake completed (RSN)
  379. Wed Nov 11 01:27:47 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.200 9c:b6:d0:0f:b6:2f
  380. Wed Nov 11 01:27:47 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.200 9c:b6:d0:0f:b6:2f XOTICPC
  381. Wed Nov 11 01:27:49 2020 daemon.info ntpd[3911]: Listen normally on 18 wlan1.sta2 [fe80::deef:9ff:fee5:753d%25]:123
  382. Wed Nov 11 01:27:49 2020 daemon.debug ntpd[3911]: new interface(s) found: waking up resolver
  383. Wed Nov 11 01:27:49 2020 daemon.info dnsmasq[3030]: exiting on receipt of SIGTERM
  384. Wed Nov 11 01:27:50 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  385. Wed Nov 11 01:27:50 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  386. Wed Nov 11 01:27:50 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  387. Wed Nov 11 01:27:50 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  388. Wed Nov 11 01:27:50 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 IEEE 802.11: authenticated
  389. Wed Nov 11 01:27:50 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 IEEE 802.11: associated (aid 4)
  390. Wed Nov 11 01:27:52 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED c8:d3:ff:57:d5:c4
  391. Wed Nov 11 01:27:52 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 RADIUS: starting accounting session 206DCD5F02CA28B5
  392. Wed Nov 11 01:27:52 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 WPA: pairwise key handshake completed (RSN)
  393. Wed Nov 11 01:27:52 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  394. Wed Nov 11 01:27:52 2020 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
  395. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[3911]: ntpd exiting on signal 15 (Terminated)
  396. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 45.55.9.9 local addr 24.57.18.56 -> <null>
  397. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 108.59.2.24 local addr 24.57.18.56 -> <null>
  398. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 2001:470:1d:1bb::1 local addr 2001:1970:5d2a:c500::1 -> <null>
  399. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 198.27.76.102 local addr 24.57.18.56 -> <null>
  400. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 206.108.0.133 local addr 24.57.18.56 -> <null>
  401. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 209.115.181.102 local addr 24.57.18.56 -> <null>
  402. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 162.159.200.1 local addr 24.57.18.56 -> <null>
  403. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 13.86.101.172 local addr 24.57.18.56 -> <null>
  404. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 2610:20:6f15:15::27 local addr 2001:1970:5d2a:c500::1 -> <null>
  405. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 131.107.13.100 local addr 24.57.18.56 -> <null>
  406. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 129.6.15.28 local addr 24.57.18.56 -> <null>
  407. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 129.6.15.29 local addr 24.57.18.56 -> <null>
  408. Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 52.1.151.223 local addr 24.57.18.56 -> <null>
  409. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ntpd 4.2.8p15@1.3728-o Sun Sep 6 16:19:39 UTC 2020 (1): Starting
  410. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: Command line: /sbin/ntpd -g -u ntp:ntp -p /var/run/ntpd.pid -n -c /var/etc/ntpd.conf
  411. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ----------------------------------------------------
  412. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ntp-4 is maintained by Network Time Foundation,
  413. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
  414. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: corporation. Support and training for ntp-4 are
  415. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: available at https://www.nwtime.org/support
  416. Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ----------------------------------------------------
  417. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: proto: precision = 2.400 usec (-19)
  418. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: basedate set to 2020-08-25
  419. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: gps base set to 2020-08-30 (week 2121)
  420. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen and drop on 0 v6wildcard [::]:123
  421. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen and drop on 1 v4wildcard 0.0.0.0:123
  422. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 2 lo 127.0.0.1:123
  423. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 3 br-lan 192.168.1.1:123
  424. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 4 eth0.2 24.57.18.56:123
  425. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 5 lo [::1]:123
  426. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 6 eth0 [fe80::deef:9ff:fee5:753b%2]:123
  427. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 7 eth1 [fe80::deef:9ff:fee5:753a%3]:123
  428. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 8 br-lan [2001:1970:5d2a:c500::1]:123
  429. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 9 br-lan [fd7d:6174:287a::1]:123
  430. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 10 br-lan [fe80::deef:9ff:fee5:753a%10]:123
  431. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 11 eth0.2 [2001:1970:4000:d8:9d78:fc30:66e3:45df]:123
  432. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 12 eth0.2 [fe80::deef:9ff:fee5:753b%12]:123
  433. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 13 ifb4eth1 [fe80::a049:9bff:fee8:cd9b%20]:123
  434. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 14 wlan1 [fe80::deef:9ff:fee5:753d%21]:123
  435. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 15 wlan0 [fe80::deef:9ff:fee5:753c%22]:123
  436. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 16 wlan1.sta1 [fe80::deef:9ff:fee5:753d%24]:123
  437. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 17 wlan1.sta2 [fe80::deef:9ff:fee5:753d%25]:123
  438. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listening on routing socket on fd #66 for interface updates
  439. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
  440. Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
  441. Wed Nov 11 01:27:52 2020 user.info banIP-0.3.11[4873]: banIP is currently disabled, please set ban_enabled to '1' to use this service
  442. Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: HTTP listening on port 5000
  443. Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: HTTP IPv6 address given to control points : [fd7d:6174:287a::1]
  444. Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: Listening for NAT-PMP/PCP traffic on port 5351
  445. Wed Nov 11 01:27:53 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  446. Wed Nov 11 01:27:53 2020 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
  447. Wed Nov 11 01:27:53 2020 user.notice ddns-scripts[5075]: myddns_ipv4: PID '5075' started at 2020-11-11 01:27
  448. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: started, version 2.80 cachesize 150
  449. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: DNS service limited to local subnets
  450. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  451. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq-dhcp[5229]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
  452. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain test
  453. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain onion
  454. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain localhost
  455. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain local
  456. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain invalid
  457. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain bind
  458. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain googlevideo.com
  459. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain checkmyip.torrentprivacy.com
  460. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain torrentprivacy.com
  461. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain cbcdn.com
  462. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain httpi.jsrdn.com
  463. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain windsorstar.com
  464. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain postmedia.digital
  465. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain beap.gemini.yahoo.com
  466. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5056
  467. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5055
  468. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5054
  469. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5053
  470. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain lan
  471. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
  472. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 4 addresses
  473. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c.4437 - 132 addresses
  474. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  475. Wed Nov 11 01:27:53 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
  476. Wed Nov 11 01:27:53 2020 user.warn ddns-scripts[5075]: myddns_ipv4: Service section disabled! - TERMINATE
  477. Wed Nov 11 01:27:53 2020 user.warn ddns-scripts[5075]: myddns_ipv4: PID '5075' exit WITH ERROR '1' at 2020-11-11 01:27
  478. Wed Nov 11 01:27:54 2020 user.info banIP-0.3.11[5416]: banIP is currently disabled, please set ban_enabled to '1' to use this service
  479. Wed Nov 11 01:27:54 2020 user.notice ddns-scripts[5469]: myddns_ipv6: PID '5469' started at 2020-11-11 01:27
  480. Wed Nov 11 01:27:54 2020 user.warn ddns-scripts[5469]: myddns_ipv6: Service section disabled! - TERMINATE
  481. Wed Nov 11 01:27:54 2020 user.warn ddns-scripts[5469]: myddns_ipv6: PID '5469' exit WITH ERROR '1' at 2020-11-11 01:27
  482. Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
  483. Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
  484. Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
  485. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
  486. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
  487. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
  488. Wed Nov 11 01:27:55 2020 user.info adblock-4.0.7[1232]: blocklist with overall 42174 blocked domains loaded successfully (Netgear Nighthawk X4S R7800, OpenWrt 19.07.4 r11208-ce6496d796)
  489. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/sqm
  490. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
  491. Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  492. Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  493. Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
  494. Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
  495. Wed Nov 11 01:27:57 2020 daemon.notice procd: /etc/rc.d/S90noddos:
  496. Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
  497. Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 6 addresses
  498. Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  499. Wed Nov 11 01:27:58 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
  500. Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a4312115 does not match aorg 0000000000.00000000 from server@129.6.15.28 xmt 0xe3560677.bf6c56c0
  501. Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a446b428 does not match aorg 0000000000.00000000 from server@209.115.181.102 xmt 0xe3560677.c27d57cc
  502. Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a424a04e does not match aorg 0000000000.00000000 from server@52.1.151.223 xmt 0xe3560677.c21d5f53
  503. Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a461c4c1 does not match aorg 0000000000.00000000 from server@129.128.12.20 xmt 0xe3560677.c3aea06e
  504. Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 IEEE 802.11: authenticated
  505. Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 IEEE 802.11: associated (aid 2)
  506. Wed Nov 11 01:43:04 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 30:fd:38:bd:98:f8
  507. Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 RADIUS: starting accounting session 0C93371292843DC8
  508. Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 WPA: pairwise key handshake completed (RSN)
  509. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.236 30:fd:38:bd:98:f8
  510. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.236 30:fd:38:bd:98:f8 Chromecast5893
  511. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef IEEE 802.11: authenticated
  512. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef IEEE 802.11: associated (aid 5)
  513. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 IEEE 802.11: authenticated
  514. Wed Nov 11 01:43:05 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:10:0d:99:42:ef
  515. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef RADIUS: starting accounting session 967A35D685B9E456
  516. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef WPA: pairwise key handshake completed (RSN)
  517. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 IEEE 802.11: associated (aid 6)
  518. Wed Nov 11 01:43:05 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:10:0d:99:98:03
  519. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 RADIUS: starting accounting session 8FB80587E1F773CE
  520. Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 WPA: pairwise key handshake completed (RSN)
  521. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) 84:10:0d:99:42:ef
  522. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.229 84:10:0d:99:42:ef
  523. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.229 84:10:0d:99:42:ef
  524. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.229 84:10:0d:99:42:ef Moto-G-Dad
  525. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) 84:10:0d:99:98:03
  526. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.228 84:10:0d:99:98:03
  527. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.228 84:10:0d:99:98:03
  528. Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.228 84:10:0d:99:98:03 Moto-G-Mom
  529. Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
  530. Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 8 addresses
  531. Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  532. Wed Nov 11 01:43:07 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
  533. Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) c8:d3:ff:57:d5:c4
  534. Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4
  535. Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4
  536. Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4 OfficeJet3830
  537. Wed Nov 11 01:43:12 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  538. Wed Nov 11 01:43:15 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  539. Wed Nov 11 01:43:21 2020 daemon.err collectd[4336]: Sleeping only 2s because the next interval is 874.096 seconds in the past!
  540. Wed Nov 11 01:43:30 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  541. Wed Nov 11 01:43:31 2020 authpriv.info dropbear[6051]: Child connection from 192.168.1.200:52986
  542. Wed Nov 11 01:43:31 2020 authpriv.notice dropbear[6051]: Password auth succeeded for 'root' from 192.168.1.200:52986
  543. Wed Nov 11 01:43:36 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  544. Wed Nov 11 01:43:41 2020 daemon.err uhttpd[3691]: luci: accepted login on / for root from 192.168.1.200
  545. Wed Nov 11 01:43:51 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  546. Wed Nov 11 01:43:55 2020 kern.warn kernel: [ 125.745618] ath10k_pci 0000:01:00.0: Invalid VHT mcs 15 peer stats
  547. Wed Nov 11 01:44:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  548. Wed Nov 11 01:44:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  549. Wed Nov 11 01:44:27 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  550. Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 IEEE 802.11: authenticated
  551. Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: STA-OPMODE-MAX-BW-CHANGED b8:78:26:3f:36:e3 20
  552. Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: STA-OPMODE-N_SS-CHANGED b8:78:26:3f:36:e3 2
  553. Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 IEEE 802.11: associated (aid 3)
  554. Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b8:78:26:3f:36:e3
  555. Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 RADIUS: starting accounting session D102084CDCFF6F81
  556. Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 WPA: pairwise key handshake completed (RSN)
  557. Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) b8:78:26:3f:36:e3
  558. Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.239 b8:78:26:3f:36:e3
  559. Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.239 b8:78:26:3f:36:e3
  560. Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.239 b8:78:26:3f:36:e3 FoxSwitch
  561. Wed Nov 11 01:44:42 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  562. Wed Nov 11 01:44:57 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  563. Wed Nov 11 01:45:12 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  564. Wed Nov 11 01:45:30 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  565. Wed Nov 11 01:45:45 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  566. Wed Nov 11 01:45:58 2020 daemon.notice miniupnpd[5020]: remove port mapping 52028 TCP because it has expired
  567. Wed Nov 11 01:46:06 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  568. Wed Nov 11 01:46:20 2020 daemon.info procd: - shutdown -
  569. Wed Nov 11 01:46:21 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  570. Wed Nov 11 01:46:44 2020 daemon.warn miniupnpd[5020]: upnp_event_process_notify: connect(192.168.1.200:7652): Operation timed out
  571. Wed Nov 11 01:46:44 2020 daemon.err miniupnpd[5020]: upnpevents_processfds: 0x41f30, remove subscriber uuid:1665be55-03cd-4764-bfff-92f008938b23 after an ERROR cb: http://192.168.1.200:7652/evetSub
  572. Wed Nov 11 01:46:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  573. Wed Nov 11 01:47:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  574. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.262249] print_req_error: I/O error, dev mtdblock0, sector 0
  575. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.262693] print_req_error: I/O error, dev mtdblock0, sector 8
  576. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.267496] print_req_error: I/O error, dev mtdblock0, sector 16
  577. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.273288] print_req_error: I/O error, dev mtdblock0, sector 24
  578. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.279954] print_req_error: I/O error, dev mtdblock0, sector 0
  579. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.285116] Buffer I/O error on dev mtdblock0, logical block 0, async page read
  580. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.291846] print_req_error: I/O error, dev mtdblock1, sector 0
  581. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.298735] print_req_error: I/O error, dev mtdblock1, sector 8
  582. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.304535] print_req_error: I/O error, dev mtdblock1, sector 16
  583. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.310379] print_req_error: I/O error, dev mtdblock1, sector 24
  584. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.316868] print_req_error: I/O error, dev mtdblock1, sector 0
  585. Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.322093] Buffer I/O error on dev mtdblock1, logical block 0, async page read
  586. Wed Nov 11 01:47:27 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  587. Wed Nov 11 01:47:42 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  588. Wed Nov 11 01:48:12 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  589. Wed Nov 11 01:48:16 2020 authpriv.info dropbear[6768]: Child connection from 192.168.1.200:61107
  590. Wed Nov 11 01:48:16 2020 authpriv.notice dropbear[6768]: Password auth succeeded for 'root' from 192.168.1.200:61107
  591. Wed Nov 11 01:48:27 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  592. Wed Nov 11 01:49:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  593. Wed Nov 11 01:49:00 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
  594. Wed Nov 11 01:49:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  595. Wed Nov 11 01:49:51 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  596. Wed Nov 11 01:50:06 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  597. Wed Nov 11 01:50:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  598. Wed Nov 11 01:51:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  599. Wed Nov 11 01:51:42 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  600. Wed Nov 11 01:51:55 2020 authpriv.info dropbear[6985]: Child connection from 192.168.1.200:49415
  601. Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a IEEE 802.11: authenticated
  602. Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a IEEE 802.11: associated (aid 4)
  603. Wed Nov 11 01:51:55 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 2c:59:8a:61:c6:6a
  604. Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a RADIUS: starting accounting session 31592ADBE87655CF
  605. Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a WPA: pairwise key handshake completed (RSN)
  606. Wed Nov 11 01:51:56 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.198 2c:59:8a:61:c6:6a
  607. Wed Nov 11 01:51:56 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.198 2c:59:8a:61:c6:6a Shawn-LG-G4
  608. Wed Nov 11 01:51:57 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  609. Wed Nov 11 01:51:58 2020 authpriv.notice dropbear[6985]: Password auth succeeded for 'root' from 192.168.1.200:49415
  610. Wed Nov 11 01:52:04 2020 daemon.info dnsmasq[5229]: exiting on receipt of SIGTERM
  611. Wed Nov 11 01:52:04 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  612. Wed Nov 11 01:52:04 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  613. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: started, version 2.80 cachesize 150
  614. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: DNS service limited to local subnets
  615. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
  616. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq-dhcp[7093]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
  617. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain test
  618. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain onion
  619. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain localhost
  620. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain local
  621. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain invalid
  622. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain bind
  623. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain googlevideo.com
  624. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain checkmyip.torrentprivacy.com
  625. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain torrentprivacy.com
  626. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain cbcdn.com
  627. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain httpi.jsrdn.com
  628. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain windsorstar.com
  629. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain postmedia.digital
  630. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain beap.gemini.yahoo.com
  631. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5056
  632. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5055
  633. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5054
  634. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5053
  635. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain lan
  636. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /etc/hosts - 57 addresses
  637. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /tmp/hosts/odhcpd - 8 addresses
  638. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
  639. Wed Nov 11 01:52:08 2020 daemon.info dnsmasq-dhcp[7093]: read /etc/ethers - 0 addresses
  640. Wed Nov 11 01:52:42 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  641. Wed Nov 11 01:52:57 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  642. Wed Nov 11 01:52:58 2020 daemon.warn miniupnpd[5020]: upnp_event_process_notify: connect(192.168.1.200:7652): Operation timed out
  643. Wed Nov 11 01:52:58 2020 daemon.err miniupnpd[5020]: upnpevents_processfds: 0x41e20, remove subscriber uuid:ca5ea599-de58-4e4c-8c75-ab09824f6294 after an ERROR cb: http://192.168.1.200:7652/evetSub
  644. Wed Nov 11 01:53:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  645. Wed Nov 11 01:54:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  646. Wed Nov 11 01:54:51 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  647. Wed Nov 11 01:55:06 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  648. Wed Nov 11 01:55:28 2020 user.err kernel: [ 818.221732] procd: Failed to add object: Invalid argument
  649. Wed Nov 11 01:56:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
  650. Wed Nov 11 01:56:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
  651.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement