DD-WRT v3.0-r34015M kongat (c) 2017 NewMedia-NET GmbH
Release: 12/10/17
==========================================================
___ ___ _ _____ ______ ____ ___
/ _ \/ _ \___| | /| / / _ \/_ __/ _ __|_ / / _ \
/ // / // /___/ |/ |/ / , _/ / / | |/ //_ <_/ // /
/____/____/ |__/|__/_/|_| /_/ |___/____(_)___/
DD-WRT v3.0
http://www.dd-wrt.com
==========================================================
BusyBox v1.27.2 (2017-12-10 15:33:31 CET) built-in shell (ash)
root@~~:~# dmesg
[ 0.000000] Booting Linux on physical CPU 0x0
[ 0.000000] Linux version 3.18.86 (bluebat@opensuse.site) (gcc version 6.3.0 (LEDE GCC 6.3.0 r4639-eb43a817f7) ) #234 SMP PREEMPT Sat Dec 9 14:36:00 CET 2017
[ 0.000000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5787d
[ 0.000000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[ 0.000000] Machine model: Linksys EA8500 WiFi Router
[ 0.000000] Ignoring memory range 0x41500000 - 0x42000000
[ 0.000000] Memory policy: Data cache writealloc
[ 0.000000] On node 0 totalpages: 122880
[ 0.000000] free_area_init_node: node 0, pgdat c0730840, node_mem_map ddb40000
[ 0.000000] Normal zone: 960 pages used for memmap
[ 0.000000] Normal zone: 0 pages reserved
[ 0.000000] Normal zone: 122880 pages, LIFO batch:31
[ 0.000000] PERCPU: Embedded 9 pages/cpu @ddfd3000 s7552 r8192 d21120 u36864
[ 0.000000] pcpu-alloc: s7552 r8192 d21120 u36864 alloc=9*4096
[ 0.000000] pcpu-alloc: [0] 0 [0] 1
[ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 121920
[ 0.000000] Kernel command line: console=ttyMSM0,115200n8 rootfstype=squashfs noinitrd console=ttyHSL1,115200n8 init=/sbin/init rootfstype=squashfs root=31:16
[ 0.000000] PID hash table entries: 2048 (order: 1, 8192 bytes)
[ 0.000000] Dentry cache hash table entries: 65536 (order: 6, 262144 bytes)
[ 0.000000] Inode-cache hash table entries: 32768 (order: 5, 131072 bytes)
[ 0.000000] Memory: 481248K/491520K available (3902K kernel code, 283K rwdata, 1120K rodata, 192K init, 310K bss, 10272K reserved, 0K cma-reserved, 0K highmem)
[ 0.000000] Virtual kernel memory layout:
[ 0.000000] vector : 0xffff0000 - 0xffff1000 ( 4 kB)
[ 0.000000] fixmap : 0xffc00000 - 0xffe00000 (2048 kB)
[ 0.000000] vmalloc : 0xde800000 - 0xff000000 ( 520 MB)
[ 0.000000] lowmem : 0xc0000000 - 0xde000000 ( 480 MB)
[ 0.000000] pkmap : 0xbfe00000 - 0xc0000000 ( 2 MB)
[ 0.000000] modules : 0xbf000000 - 0xbfe00000 ( 14 MB)
[ 0.000000] .text : 0xc0208000 - 0xc06efe04 (5024 kB)
[ 0.000000] .init : 0xc06f0000 - 0xc0720000 ( 192 kB)
[ 0.000000] .data : 0xc0720000 - 0xc0766cc4 ( 284 kB)
[ 0.000000] .bss : 0xc0766cc4 - 0xc07b4788 ( 311 kB)
[ 0.000000] Preemptible hierarchical RCU implementation.
[ 0.000000] RCU restricting CPUs from NR_CPUS=4 to nr_cpu_ids=2.
[ 0.000000] RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
[ 0.000000] NR_IRQS:16 nr_irqs:16 16
[ 0.000012] sched_clock: 32 bits at 6MHz, resolution 160ns, wraps every 687194767200ns
[ 0.000028] Switching to timer-based delay loop, resolution 160ns
[ 0.000446] Calibrating delay loop (skipped), value calculated using timer frequency.. 12.50 BogoMIPS (lpj=62500)
[ 0.000466] pid_max: default: 32768 minimum: 301
[ 0.000656] Security Framework initialized
[ 0.000765] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.000781] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
[ 0.001452] CPU: Testing write buffer coherency: ok
[ 0.001725] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000
[ 0.002236] Setting up static identity map for 0x42213188 - 0x422131e0
[ 0.063464] CPU1: Booted secondary processor
[ 0.063564] CPU1: thread -1, cpu 1, socket 0, mpidr 80000001
[ 0.063678] Brought up 2 CPUs
[ 0.063702] SMP: Total of 2 processors activated (25.00 BogoMIPS).
[ 0.063713] CPU: All CPU(s) started in SVC mode.
[ 0.078222] VFP support v0.3: implementor 51 architecture 0 part 4d variant 2 rev 0
[ 0.078727] pinctrl core: initialized pinctrl subsystem
[ 0.089151] NET: Registered protocol family 16
[ 0.089489] DMA: preallocated 256 KiB pool for atomic coherent allocations
[ 0.113855] cpuidle: using governor ladder
[ 0.144869] cpuidle: using governor menu
[ 0.164102] qcom_rpm 108000.rpm: RPM firmware 3.0.16777342
[ 0.164179] qcom_rpm 108000.rpm: failed to mark ack irq as wakeup
[ 0.164237] qcom_rpm 108000.rpm: failed to mark wakeup irq as wakeup
[ 0.199482] pps_core: LinuxPPS API ver. 1 registered
[ 0.199497] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[ 0.199540] PTP clock support registered
[ 0.200648] pcie_init: pcie_init: unable to create IPC log context for pcie0-short
[ 0.200663] pcie_init: pcie_init: unable to create IPC log context for pcie0-long
[ 0.200673] pcie_init: pcie_init: unable to create IPC log context for pcie1-short
[ 0.200683] pcie_init: pcie_init: unable to create IPC log context for pcie1-long
[ 0.201087] Switched to clocksource dg_timer
[ 0.202436] NET: Registered protocol family 2
[ 0.203150] TCP established hash table entries: 4096 (order: 2, 16384 bytes)
[ 0.203190] TCP bind hash table entries: 4096 (order: 3, 32768 bytes)
[ 0.203243] TCP: Hash tables configured (established 4096 bind 4096)
[ 0.203289] TCP: reno registered
[ 0.203309] UDP hash table entries: 256 (order: 1, 8192 bytes)
[ 0.203329] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
[ 0.203560] NET: Registered protocol family 1
[ 0.203625] PCI: CLS 0 bytes, default 64
[ 0.204798] futex hash table entries: 512 (order: 3, 32768 bytes)
[ 0.204901] Crashlog allocated RAM at address 0x5ff00000
[ 0.205774] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[ 0.205806] msgmni has been set to 939
[ 0.207631] io scheduler noop registered
[ 0.207652] io scheduler deadline registered (default)
[ 0.209018] 1b500000.pci supply vdda not found, using dummy regulator
[ 0.209117] 1b500000.pci supply vdda_phy not found, using dummy regulator
[ 0.209197] 1b500000.pci supply vdda_refclk not found, using dummy regulator
[ 0.240163] qcom-pcie 1b500000.pci: PCI host bridge to bus 0000:00
[ 0.240186] pci_bus 0000:00: root bus resource [io 0xfe00000-0xfffff] (bus address [0x1fc00000-0xfefffff])
[ 0.240200] pci_bus 0000:00: root bus resource [mem 0x08000000-0x0fdfffff]
[ 0.240215] pci_bus 0000:00: root bus resource [bus 00-ff]
[ 0.240265] pci 0000:00:00.0: [17cb:0101] type 01 class 0x060400
[ 0.240400] pci 0000:00:00.0: supports D1
[ 0.240413] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
[ 0.240735] PCI: bus0: Fast back to back transfers disabled
[ 0.241077] pci 0000:01:00.0: [168c:0040] type 00 class 0x028000
[ 0.241373] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
[ 0.242317] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
[ 0.242743] PCI: bus1: Fast back to back transfers disabled
[ 0.242762] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
[ 0.242913] pci 0000:00:00.0: BAR 8: assigned [mem 0x08000000-0x081fffff]
[ 0.242936] pci 0000:01:00.0: BAR 0: assigned [mem 0x08000000-0x081fffff 64bit]
[ 0.243046] pci 0000:00:00.0: PCI bridge to [bus 01]
[ 0.243066] pci 0000:00:00.0: bridge window [mem 0x08000000-0x081fffff]
[ 0.243521] aer 0000:00:00.0:pcie02: service driver aer loaded
[ 0.243891] 1b700000.pci supply vdda not found, using dummy regulator
[ 0.243975] 1b700000.pci supply vdda_phy not found, using dummy regulator
[ 0.244066] 1b700000.pci supply vdda_refclk not found, using dummy regulator
[ 0.274291] qcom-pcie 1b700000.pci: PCI host bridge to bus 0001:00
[ 0.274311] pci_bus 0001:00: root bus resource [io 0x31e10000-0xfffff] (bus address [0x63c00000-0x31eeffff])
[ 0.274326] pci_bus 0001:00: root bus resource [mem 0x2e000000-0x31dfffff]
[ 0.274340] pci_bus 0001:00: root bus resource [bus 00-ff]
[ 0.274383] pci 0001:00:00.0: [17cb:0101] type 01 class 0x060400
[ 0.274516] pci 0001:00:00.0: supports D1
[ 0.274530] pci 0001:00:00.0: PME# supported from D0 D1 D3hot
[ 0.274822] PCI: bus0: Fast back to back transfers disabled
[ 0.275153] pci 0001:01:00.0: [168c:0040] type 00 class 0x028000
[ 0.275350] pci 0001:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]
[ 0.276287] pci 0001:01:00.0: PME# supported from D0 D3hot D3cold
[ 0.276703] PCI: bus1: Fast back to back transfers disabled
[ 0.276720] pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01
[ 0.276936] pci 0001:00:00.0: BAR 8: assigned [mem 0x2e000000-0x2e1fffff]
[ 0.276957] pci 0001:01:00.0: BAR 0: assigned [mem 0x2e000000-0x2e1fffff 64bit]
[ 0.277062] pci 0001:00:00.0: PCI bridge to [bus 01]
[ 0.277080] pci 0001:00:00.0: bridge window [mem 0x2e000000-0x2e1fffff]
[ 0.277471] aer 0001:00:00.0:pcie02: service driver aer loaded
[ 0.277830] 1b900000.pci supply vdda not found, using dummy regulator
[ 0.277913] 1b900000.pci supply vdda_phy not found, using dummy regulator
[ 0.277992] 1b900000.pci supply vdda_refclk not found, using dummy regulator
[ 0.412807] qcom-pcie 1b900000.pci: link initialization failed
[ 0.414422] qcom-pcie 1b900000.pci: PCI host bridge to bus 0002:00
[ 0.414441] pci_bus 0002:00: root bus resource [io 0x35e20000-0xfffff] (bus address [0x6bc00000-0x35edffff])
[ 0.414455] pci_bus 0002:00: root bus resource [mem 0x32000000-0x35dfffff]
[ 0.414470] pci_bus 0002:00: root bus resource [bus 00-ff]
[ 0.414518] PCI: bus0: Fast back to back transfers enabled
[ 0.417069] gsbi 16300000.gsbi: GSBI port protocol: 6 crci: 0
[ 0.418392] Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled
[ 0.419391] msm_serial 16340000.serial: msm_serial: detected port #0
[ 0.419488] msm_serial 16340000.serial: uartclk = 1843200
[ 0.419544] 16340000.serial: ttyMSM0 at MMIO 0x16340000 (irq = 184, base_baud = 115200) is a MSM
[ 0.419601] msm_serial: console setup on port #0
[ 1.138507] console [ttyMSM0] enabled
[ 1.143345] msm_serial: driver initialized
[ 1.150047] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xa1
[ 1.150556] nand: AMD/Spansion S34MS01G2
[ 1.157131] nand: 128MiB, SLC, page size: 2048, OOB size: 64
[ 1.160980] Scanning device for bad blocks
[ 1.572553] random: nonblocking pool is initialized
[ 1.875006] 19 ofpart partitions found on MTD device qcom-nandc
[ 1.875036] Creating 19 MTD partitions on "qcom-nandc":
[ 1.879734] 0x000000000000-0x000000040000 : "SBL1"
[ 1.885922] 0x000000040000-0x000000180000 : "MIBIB"
[ 1.890584] 0x000000180000-0x0000002c0000 : "SBL2"
[ 1.895402] 0x0000002c0000-0x000000540000 : "SBL3"
[ 1.900177] 0x000000540000-0x000000660000 : "DDRCONFIG"
[ 1.905039] 0x000000660000-0x000000780000 : "SSD"
[ 1.910076] 0x000000780000-0x000000a00000 : "TZ"
[ 1.915044] 0x000000a00000-0x000000c80000 : "RPM"
[ 1.919650] 0x000000c80000-0x000000dc0000 : "art"
[ 1.924306] 0x000000dc0000-0x000000ec0000 : "APPSBL"
[ 1.928945] 0x000000ec0000-0x000000f00000 : "u_env"
[ 1.934051] 0x000000f00000-0x000000f40000 : "s_env"
[ 1.938585] 0x000000f40000-0x000000f80000 : "devinfo"
[ 1.943509] 0x000000f80000-0x000003780000 : "linux"
[ 1.948670] 0x000001280000-0x000003780000 : "rootfs"
[ 1.953431] mtd: partition "rootfs" set to be root filesystem
[ 1.957783] 0x000003780000-0x000005f40000 : "linux2"
[ 1.964268] 0x000003a80000-0x000005f40000 : "rootfs2"
[ 1.969262] 0x000005f40000-0x000005f80000 : "nvram"
[ 1.974251] 0x000005f80000-0x000008000000 : "ddwrt"
[ 1.980138] IMQ: autocreate imq0 NS c0760f80
[ 1.983560] IMQ: autocreate imq1 NS c0760f80
[ 1.987460] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)
[ 1.991857] Hooking IMQ after NAT on PREROUTING.
[ 1.998562] Hooking IMQ before NAT on POSTROUTING.
[ 2.003645] libphy: Fixed MDIO Bus: probed
[ 2.008370] libphy: GPIO Bitbanged MDIO: probed
[ 2.033191] switch0: Atheros AR8337 rev. 2 switch registered on gpio-0
[ 2.830396] tun: Universal TUN/TAP device driver, 1.6
[ 2.830423] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[ 2.835970] stmmac - user ID: 0x10, Synopsys ID: 0x37
[ 2.840499] Ring mode enabled
[ 2.845726] DMA HW capability register supported
[ 2.848570] Enhanced/Alternate descriptors
[ 2.853343] Enabled extended descriptors
[ 2.857336] RX Checksum Offload Engine supported (type 2)
[ 2.861581] TX Checksum insertion supported
[ 2.866886] Wake-Up On Lan supported
[ 2.871374] Enable RX Mitigation via HW Watchdog Timer
[ 2.876216] stmmac - user ID: 0x10, Synopsys ID: 0x37
[ 2.879907] Ring mode enabled
[ 2.885211] DMA HW capability register supported
[ 2.888066] Enhanced/Alternate descriptors
[ 2.892838] Enabled extended descriptors
[ 2.896833] RX Checksum Offload Engine supported (type 2)
[ 2.901001] TX Checksum insertion supported
[ 2.906447] Wake-Up On Lan supported
[ 2.910864] Enable RX Mitigation via HW Watchdog Timer
[ 2.915144] PPP generic driver version 2.4.2
[ 2.919549] PPP BSD Compression module registered
[ 2.924013] PPP Deflate Compression module registered
[ 2.928539] PPP MPPE Compression module registered
[ 2.933645] NET: Registered protocol family 24
[ 2.938285] PPTP driver version 0.8.5
[ 2.942884] i2c /dev entries driver
[ 2.951984] Speed bin: 0
[ 2.952005] PVS bin: 1
[ 2.953994] platform cpufreq-krait.0: Driver cpufreq-krait requests probe deferral
[ 2.957688] L2 @ QSB rate. Forcing new rate.
[ 2.963639] L2 @ 387500 KHz
[ 2.967852] CPU0 @ 800000 KHz
[ 2.970245] CPU1 @ QSB rate. Forcing new rate.
[ 2.973543] CPU1 @ 384000 KHz
[ 2.978010] GACT probability NOT on
[ 2.980765] Mirror/redirect action on
[ 2.984182] Simple TC action Loaded
[ 2.988704] netem: version 1.3
[ 2.991232] u32 classifier
[ 2.994386] Performance counters on
[ 2.996979] input device check on
[ 3.000710] Actions configured
[ 3.004659] Netfilter messages via NETLINK v0.30.
[ 3.007900] nf_conntrack version 0.5.0 (7519 buckets, 30076 max)
[ 3.013044] nf_conntrack_rtsp v0.7 loading
[ 3.019282] xt_time: kernel timezone is -0000
[ 3.022726] ip_set: protocol 6
[ 3.027299] gre: GRE over IPv4 demultiplexor driver
[ 3.030207] nf_nat_rtsp v0.7 loading
[ 3.034858] ip_tables: (C) 2000-2006 Netfilter Core Team
[ 3.038800] TCP: bic registered
[ 3.043940] TCP: cubic registered
[ 3.046729] TCP: westwood registered
[ 3.050200] TCP: highspeed registered
[ 3.054030] TCP: hybla registered
[ 3.057404] TCP: htcp registered
[ 3.060705] TCP: vegas registered
[ 3.064088] TCP: veno registered
[ 3.067214] TCP: scalable registered
[ 3.070511] TCP: lp registered
[ 3.074148] TCP: yeah registered
[ 3.076936] TCP: illinois registered
[ 3.080327] NET: Registered protocol family 17
[ 3.084032] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
[ 3.088185] Bridge firewalling registered
[ 3.100984] 8021q: 802.1Q VLAN Support v1.8
[ 3.105025] Registering SWP/SWPB emulation handler
[ 3.112698] trying to register driver generic_krait
[ 3.113666] Frequency table not initialized.
[ 3.118536] Frequency table not initialized.
[ 3.123102] Frequency table not initialized.
[ 3.127189] Frequency table not initialized.
[ 3.131563] Frequency table not initialized.
[ 3.137449] Frequency table not initialized.
[ 3.140015] Frequency table not initialized.
[ 3.144283] Frequency table not initialized.
[ 3.148453] Frequency table not initialized.
[ 3.152785] Frequency table not initialized.
[ 3.156977] driver generic_krait up and running
[ 3.161263] searching for nvram
[ 3.165561] nvram size = -1066920090
[ 3.189869] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
[ 3.197778] UBIFS error (pid 1): ubifs_mount: cannot open "ubi0:rootfs", error -19
[ 3.200893] VFS: Mounted root (squashfs filesystem) readonly on device 31:16.
[ 3.204500] Freeing unused kernel memory: 192K
[ 5.656853] UBIFS error (pid 712): ubifs_mount: cannot open "ubi0:rootfs_data", error -19
[ 6.811948] Loading modules backported from Linux version wireless-drivers-next-for-davem-2017-09-01-0-geb464d4a8d09
[ 6.811984] Backport generated by backports.git backports-20160324-111-g97b8d7c4
[ 7.429941] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142)
[ 7.430533] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
[ 7.563758] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin failed with error -2
[ 7.563807] ath10k_pci 0000:01:00.0: Falling back to user helper
[ 7.576261] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2
[ 7.579528] ath10k_pci 0000:01:00.0: Falling back to user helper
[ 7.961312] ath10k_pci 0000:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003801ff sub 168c:0002
[ 7.961570] ath10k_pci 0000:01:00.0: kconfig debug 1 debugfs 1 tracing 0 dfs 0 testmode 0
[ 7.973712] ath10k_pci 0000:01:00.0: firmware ver 10.4-3.5.3-00038 api 5 features no-p2p,mfp,peer-flow-ctrl,allows-mesh-bcast,no-ps crc32 b1d4e84d
[ 8.671491] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
[ 8.737787] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
[ 10.271784] ath10k_pci 0000:01:00.0: failed to fetch board data for bus=pci,vendor=168c,device=0040,subsystem-vendor=168c,subsystem-device=0002 from ath10k/QCA99X0/hw2.0/board-2.bin
[ 10.271977] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 3e376c3f
[ 11.477561] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal file max-sta 512 raw 0 hwcrypto 1
[ 11.543181] ath: EEPROM regdomain: 0x0
[ 11.543194] ath: EEPROM indicates default country code should be used
[ 11.543203] ath: doing EEPROM country->regdmn map search
[ 11.543215] ath: country maps to regdmn code: 0x3a
[ 11.543224] ath: Country alpha2 being used: US
[ 11.543232] ath: Regpair used: 0x3a
[ 11.550726] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
[ 11.551286] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
[ 11.683905] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0001:01:00.0.bin failed with error -2
[ 11.683964] ath10k_pci 0001:01:00.0: Falling back to user helper
[ 11.696755] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2
[ 11.699681] ath10k_pci 0001:01:00.0: Falling back to user helper
[ 11.712949] ath10k_pci 0001:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003801ff sub 168c:0002
[ 11.716352] ath10k_pci 0001:01:00.0: kconfig debug 1 debugfs 1 tracing 0 dfs 0 testmode 0
[ 11.731571] ath10k_pci 0001:01:00.0: firmware ver 10.4-3.5.3-00038 api 5 features no-p2p,mfp,peer-flow-ctrl,allows-mesh-bcast,no-ps crc32 b1d4e84d
[ 14.024391] ath10k_pci 0001:01:00.0: failed to fetch board data for bus=pci,vendor=168c,device=0040,subsystem-vendor=168c,subsystem-device=0002 from ath10k/QCA99X0/hw2.0/board-2.bin
[ 14.024593] ath10k_pci 0001:01:00.0: board_file api 1 bmi_id N/A crc32 eca6e637
[ 15.231155] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal file max-sta 512 raw 0 hwcrypto 1
[ 15.313963] ath: EEPROM regdomain: 0x0
[ 15.313985] ath: EEPROM indicates default country code should be used
[ 15.314001] ath: doing EEPROM country->regdmn map search
[ 15.314021] ath: country maps to regdmn code: 0x3a
[ 15.314038] ath: Country alpha2 being used: US
[ 15.314052] ath: Regpair used: 0x3a
[ 15.486327] usbcore: registered new interface driver usbfs
[ 15.487028] usbcore: registered new interface driver hub
[ 15.491078] usbcore: registered new device driver usb
[ 15.534914] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[ 15.543798] ehci-platform: EHCI generic platform driver
[ 15.565172] ehci-pci: EHCI PCI platform driver
[ 15.626201] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[ 15.823435] soc:usb30@0 supply gdsc not found, using dummy regulator
[ 15.824265] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.829095] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.835351] soc:usb30@1 supply gdsc not found, using dummy regulator
[ 15.842584] platform 10000000.dwc3: Driver dwc3 requests probe deferral
[ 15.848625] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.855626] platform 10000000.dwc3: Driver dwc3 requests probe deferral
[ 15.884558] 100f8800.phy supply vddcx not found, using dummy regulator
[ 15.884656] 100f8800.phy supply v3p3 not found, using dummy regulator
[ 15.890042] 100f8800.phy supply v1p8 not found, using dummy regulator
[ 15.896626] 100f8800.phy supply vbus not found, using dummy regulator
[ 15.903134] 110f8800.phy supply vddcx not found, using dummy regulator
[ 15.903233] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.903353] platform 10000000.dwc3: Driver dwc3 requests probe deferral
[ 15.922398] 110f8800.phy supply v3p3 not found, using dummy regulator
[ 15.928916] 110f8800.phy supply v1p8 not found, using dummy regulator
[ 15.935575] 110f8800.phy supply vbus not found, using dummy regulator
[ 15.942169] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.948723] platform 10000000.dwc3: Driver dwc3 requests probe deferral
[ 15.963106] 100f8830.phy supply vddcx not found, using dummy regulator
[ 15.963199] 100f8830.phy supply v1p8 not found, using dummy regulator
[ 15.968642] qcom-dwc3-ssphy 100f8830.phy: cannot get HSIO settings from device node, using default values
[ 15.975172] 110f8830.phy supply vddcx not found, using dummy regulator
[ 15.975268] platform 11000000.dwc3: Driver dwc3 requests probe deferral
[ 15.975465] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for vddcx
[ 15.975470] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for v3p3
[ 15.975474] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for v1p8
[ 15.977916] qcom-dwc3-ssphy 100f8830.phy: cannot set voltage for vddcx
[ 16.017176] 110f8830.phy supply v1p8 not found, using dummy regulator
[ 16.023669] qcom-dwc3-ssphy 110f8830.phy: cannot get HSIO settings from device node, using default values
[ 16.212546] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
[ 16.212640] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
[ 16.217119] xhci-hcd xhci-hcd.0.auto: irq 237, io mem 0x10000000
[ 16.225940] hub 1-0:1.0: USB hub found
[ 16.230846] hub 1-0:1.0: 1 port detected
[ 16.235055] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
[ 16.238381] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
[ 16.244997] hub 2-0:1.0: USB hub found
[ 16.251335] hub 2-0:1.0: 1 port detected
[ 16.256150] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for vddcx
[ 16.259110] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for v3p3
[ 16.265605] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for v1p8
[ 16.274445] qcom-dwc3-ssphy 110f8830.phy: cannot set voltage for vddcx
[ 16.522530] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 16.522585] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3
[ 16.527095] xhci-hcd xhci-hcd.1.auto: irq 142, io mem 0x11000000
[ 16.535286] hub 3-0:1.0: USB hub found
[ 16.540730] hub 3-0:1.0: 1 port detected
[ 16.544726] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 16.548363] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4
[ 16.553725] usb 1-1: new high-speed USB device number 2 using xhci-hcd
[ 16.562120] hub 4-0:1.0: USB hub found
[ 16.567899] hub 4-0:1.0: 1 port detected
[ 21.037357] xhci-hcd xhci-hcd.1.auto: remove, state 1
[ 21.037401] usb usb4: USB disconnect, device number 1
[ 21.043204] xhci-hcd xhci-hcd.1.auto: USB bus 4 deregistered
[ 21.046461] xhci-hcd xhci-hcd.1.auto: remove, state 1
[ 21.057779] usb usb3: USB disconnect, device number 1
[ 21.060128] xhci-hcd xhci-hcd.1.auto: USB bus 3 deregistered
[ 21.062328] xhci-hcd xhci-hcd.0.auto: remove, state 1
[ 21.067879] usb usb2: USB disconnect, device number 1
[ 21.075208] xhci-hcd xhci-hcd.0.auto: USB bus 2 deregistered
[ 21.077885] xhci-hcd xhci-hcd.0.auto: remove, state 1
[ 21.090656] usb usb1: USB disconnect, device number 1
[ 21.090689] usb 1-1: USB disconnect, device number 2
[ 21.100407] xhci-hcd xhci-hcd.0.auto: USB bus 1 deregistered
[ 21.125745] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
[ 21.125857] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1
[ 21.130527] xhci-hcd xhci-hcd.0.auto: irq 237, io mem 0x10000000
[ 21.139836] hub 1-0:1.0: USB hub found
[ 21.144418] hub 1-0:1.0: 1 port detected
[ 21.148117] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller
[ 21.152083] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2
[ 21.159013] hub 2-0:1.0: USB hub found
[ 21.168911] hub 2-0:1.0: 1 port detected
[ 21.169723] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 21.172448] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3
[ 21.177854] xhci-hcd xhci-hcd.1.auto: irq 142, io mem 0x11000000
[ 21.186390] hub 3-0:1.0: USB hub found
[ 21.198399] hub 3-0:1.0: 1 port detected
[ 21.199110] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 21.201524] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4
[ 21.207922] hub 4-0:1.0: USB hub found
[ 21.221288] hub 4-0:1.0: 1 port detected
[ 21.267855] SCSI subsystem initialized
[ 21.380331] usbcore: registered new interface driver usb-storage
[ 21.468885] usb 1-1: new high-speed USB device number 2 using xhci-hcd
[ 21.474833] libata version 3.00 loaded.
[ 21.567977] ahci 29000000.sata: forcing port_map 0x0 -> 0x1
[ 21.568048] ahci 29000000.sata: AHCI 0001.0300 32 slots 1 ports 6 Gbps 0x1 impl platform mode
[ 21.572478] ahci 29000000.sata: flags: ncq sntf pm led clo only pmp pio slum part ccc apst
[ 21.582374] scsi host0: ahci_platform
[ 21.589801] ata1: SATA max UDMA/133 mmio [mem 0x29000000-0x2900017f] port 0x100 irq 241
[ 21.615115] usb-storage 1-1:1.0: USB Mass Storage device detected
[ 21.622711] scsi host1: usb-storage 1-1:1.0
[ 21.941770] ata1: SATA link down (SStatus 0 SControl 300)
[ 22.628459] scsi 1:0:0:0: Direct-Access PNY USB 2.0 FD 0.00 PQ: 0 ANSI: 2
[ 22.630688] sd 1:0:0:0: [sda] 31711232 512-byte logical blocks: (16.2 GB/15.1 GiB)
[ 22.636452] sd 1:0:0:0: [sda] Write Protect is off
[ 22.643068] sd 1:0:0:0: [sda] Mode Sense: 00 00 00 00
[ 22.643916] sd 1:0:0:0: [sda] Asking for cache data failed
[ 22.647769] sd 1:0:0:0: [sda] Assuming drive cache: write through
[ 22.656896] sda: sda1
[ 22.671253] sd 1:0:0:0: [sda] Attached SCSI removable disk
[ 22.943441] FAT-fs (sda1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!
[ 22.951688] FAT-fs (sda1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
[ 23.166538] using kernel STP
[ 23.512575] device br0 entered promiscuous mode
[ 23.569029] device vlan1 entered promiscuous mode
[ 23.569056] device eth0 entered promiscuous mode
[ 23.572858] br0: port 1(vlan1) entered forwarding state
[ 23.577423] br0: port 1(vlan1) entered forwarding state
[ 23.589816] device br0 left promiscuous mode
[ 23.592771] device br0 entered promiscuous mode
[ 23.643378] device br0 left promiscuous mode
[ 23.706848] ath: EEPROM regdomain: 0x8348
[ 23.706860] ath: EEPROM indicates we should expect a country code
[ 23.706871] ath: doing EEPROM country->regdmn map search
[ 23.706882] ath: country maps to regdmn code: 0x3a
[ 23.706891] ath: Country alpha2 being used: US
[ 23.706899] ath: Regpair used: 0x3a
[ 23.706908] ath: regdomain 0x8348 dynamically updated by user
[ 23.706933] ath: EEPROM regdomain: 0x8348
[ 23.706943] ath: EEPROM indicates we should expect a country code
[ 23.706951] ath: doing EEPROM country->regdmn map search
[ 23.706960] ath: country maps to regdmn code: 0x3a
[ 23.706967] ath: Country alpha2 being used: US
[ 23.706974] ath: Regpair used: 0x3a
[ 23.706982] ath: regdomain 0x8348 dynamically updated by user
[ 25.571468] br0: port 1(vlan1) entered forwarding state
[ 29.491070] device ath0 entered promiscuous mode
[ 31.650161] br0: port 2(ath0) entered forwarding state
[ 31.650204] br0: port 2(ath0) entered forwarding state
[ 31.659031] device ath0.1 entered promiscuous mode
[ 31.667639] br1: port 1(ath0.1) entered listening state
[ 31.667673] br1: port 1(ath0.1) entered listening state
[ 33.233143] device ath1 entered promiscuous mode
[ 33.641476] br0: port 2(ath0) entered forwarding state
[ 33.661469] br1: port 1(ath0.1) entered learning state
[ 33.970395] br0: port 3(ath1) entered forwarding state
[ 33.970433] br0: port 3(ath1) entered forwarding state
[ 33.977303] device ath1.1 entered promiscuous mode
[ 33.994387] br1: port 2(ath1.1) entered listening state
[ 33.994419] br1: port 2(ath1.1) entered listening state
[ 34.419804] device vlan2 entered promiscuous mode
[ 34.887355] device vlan2 left promiscuous mode
[ 35.661455] br1: topology change detected, propagating
[ 35.661492] br1: port 1(ath0.1) entered forwarding state
[ 35.961455] br0: port 3(ath1) entered forwarding state
[ 35.991448] br1: port 2(ath1.1) entered learning state
[ 36.596043] device vlan4 entered promiscuous mode
[ 36.596456] br1: port 3(vlan4) entered listening state
[ 36.599748] br1: port 3(vlan4) entered listening state
[ 37.991458] br1: topology change detected, propagating
[ 37.991487] br1: port 2(ath1.1) entered forwarding state
[ 38.591457] br1: port 3(vlan4) entered learning state
[ 40.591471] br1: topology change detected, propagating
[ 40.591501] br1: port 3(vlan4) entered forwarding state
[ 43.644931] Ebtables v2.0 registered
[ 1382.558702] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[29764.667026] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[29764.699051] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[29764.701130] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[29764.733348] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[30527.286940] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[30527.300670] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[30527.301218] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[30527.317868] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
[85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
[85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
[92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
[120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
[120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
root@~~:~# cat /tmp/var/log/messages
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 07CB362F5673BDB3
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 12 21:13:35 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session FDFA03599CE8739E
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session C22737AE5B604139
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 12 21:16:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPRELEASE(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 00:0a:95:d5:77:8c
Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 93B5371F665E8788
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 12 21:18:25 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 12 21:18:26 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)
Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17
Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 01C22BC56A2483C1
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c
Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad
Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)
Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17
Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:53:46 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session D770113B3769F967
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri
Dec 12 21:53:47 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513129562 received
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513129562 is valid from [2017-12-13] to [2017-12-14]
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 71BE:560C:F97D:FB6E:A677:B06A:2A37:D4BE:FACD:384D:7CE2:5D75:1741:8A3C:40E8:904F
Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89
Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb
Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 6EE7076F52C88372
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 12 22:23:24 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 1A924B48555F3BED
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 22:27:22 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity
Dec 12 22:27:23 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.10 48:5b:39:f2:73:26
Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.10 48:5b:39:f2:73:26 Dawn-James
Dec 12 22:50:19 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 12 22:50:20 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:55 ~~ kern.warn kernel: [92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:55 ~~ kern.warn kernel: [92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:28:19 ~~ kern.warn kernel: [92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:28:19 ~~ kern.warn kernel: [92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:29:20 ~~ kern.warn kernel: [92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:29:20 ~~ kern.warn kernel: [92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:32:23 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: disassociated due to inactivity
Dec 12 23:32:24 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61
Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain
Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.9 00:0a:95:d5:61:80
Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.9 00:0a:95:d5:61:80 Barb
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 23:59:13 ~~ user.debug : ttraff: data for 12-12-2017 commited to nvram
Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 00:03:56 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: disassociated
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 01:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee
Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache
Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1
Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: authenticated
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: associated (aid 2)
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec RADIUS: starting accounting session B7C49F6CF993BB50
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: pairwise key handshake completed (RSN)
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: authenticated
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: associated (aid 6)
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 RADIUS: starting accounting session C79895AC58F005F7
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 WPA: pairwise key handshake completed (RSN)
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:09:37 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: disassociated
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.6 00:14:51:16:d2:78
Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.6 00:14:51:16:d2:78 DogCow
Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 03:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.12 54:ab:3a:19:07:3e
Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.12 54:ab:3a:19:07:3e QTAIR7-pri
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: authenticated
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: associated (aid 1)
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f RADIUS: starting accounting session 534CCC3F0172DFB1
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: pairwise key handshake completed (RSN)
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast
Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.8 c8:60:00:8d:89:d8
Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.8 c8:60:00:8d:89:d8 BARB-PC
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.147 d0:e1:40:a6:00:b1
Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.147 d0:e1:40:a6:00:b1 Barbaras-iPad
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 05:14:06 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 7CC4257E4153379A
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 13 05:14:07 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61
Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.133 40:33:1a:f2:9f:12
Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.133 40:33:1a:f2:9f:12 Tisha_iPhone-6s
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.11 00:15:f2:eb:05:44
Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.11 00:15:f2:eb:05:44 lildeb
Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: authenticated
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: associated (aid 2)
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 RADIUS: starting accounting session 530F7BA419D3E125
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: pairwise key handshake completed (RSN)
Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.130 40:16:3b:ae:ee:e6
Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.130 40:16:3b:ae:ee:e6 Tisha-TV
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 07:08:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity
Dec 13 07:08:48 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 07:19:46 ~~ kern.warn kernel: [120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:46 ~~ kern.warn kernel: [120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:47 ~~ kern.warn kernel: [120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:47 ~~ kern.warn kernel: [120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:50 ~~ kern.warn kernel: [120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:50 ~~ kern.warn kernel: [120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:52 ~~ kern.warn kernel: [120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:52 ~~ kern.warn kernel: [120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:53 ~~ kern.warn kernel: [120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:53 ~~ kern.warn kernel: [120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:56 ~~ kern.warn kernel: [120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:56 ~~ kern.warn kernel: [120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:20:29 ~~ kern.warn kernel: [120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:20:29 ~~ kern.warn kernel: [120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 07:25:12 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity
Dec 13 07:25:13 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: authenticated
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: associated (aid 5)
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 RADIUS: starting accounting session C56027198357E771
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: pairwise key handshake completed (RSN)
Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1
Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 4D386E15359E9793
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 13 07:50:43 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 13 07:50:44 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 07:51:46 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake failed (RSN) after 4 tries
Dec 13 07:51:51 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to local deauth request
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 3C45C8FA693622A1
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 13 08:00:29 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity
Dec 13 08:00:30 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:00:31 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: disassociated due to inactivity
Dec 13 08:00:32 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 08:07:25 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated
Dec 13 08:07:26 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.125 50:82:d5:c3:86:4d
Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.125 50:82:d5:c3:86:4d Barb-iPhone
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session F54B4D31360B57BF
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri
Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437
Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.5 00:0a:95:b5:1c:38
Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.5 00:0a:95:b5:1c:38 1505
Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee
Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89
Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb
Dec 13 08:53:58 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 13 08:53:59 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437
Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c
Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad
Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: authenticated
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: associated (aid 3)
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 RADIUS: starting accounting session A2F8346B873B7913
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: pairwise key handshake completed (RSN)
Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:17:53 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:08 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:27 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:42 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:03 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:19:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:19:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:20:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:20:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:20:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:20:45 ~~ authpriv.info dropbear[23922]: Child connection from 10.72.29.7:51308
Dec 13 10:20:45 ~~ authpriv.notice dropbear[23922]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51308
Dec 13 10:20:57 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:21:18 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:21:33 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:21:57 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:22:12 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
### Release & renew WAN --- although it was no problem...
Dec 13 10:22:37 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:38 ~~ user.info : process_monitor : Process Monitor successfully stopped
Dec 13 10:22:38 ~~ user.info : process_monitor successfully started
Dec 13 10:22:38 ~~ daemon.debug process_monitor[24098]: We need to re-update after 3600 seconds
Dec 13 10:22:38 ~~ daemon.info process_monitor[24098]: set timer: 3600 seconds, callback: ntp_main()
Dec 13 10:22:39 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:22:39 ~~ user.info : wland : WLAN daemon successfully stopped
Dec 13 10:22:40 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:41 ~~ user.info : wland : WLAN daemon successfully started
Dec 13 10:22:41 ~~ user.info : WAN is up. IP: 96.46.208.155
Dec 13 10:22:41 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped
Dec 13 10:22:41 ~~ daemon.err openvpn[3372]: event_wait : Interrupted system call (code=4)
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: Closing TUN/TAP interface
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /sbin/ifconfig tun2 0.0.0.0
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: SIGTERM[hard,] received, process exiting
Dec 13 10:22:41 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...
Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017
Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.09
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14
Dec 13 10:22:41 ~~ daemon.warn openvpn[24670]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Diffie-Hellman initialized with 4096 bit key
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP device tun2 opened
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP TX queue length set to 100
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link local (bound): [AF_INET][undef]:42257
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link remote: [AF_UNSPEC]
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MULTI: multi_init called, r=256 v=256
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: succeeded -> ifconfig_pool_set()
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL LIST
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: mrjcd101,10.172.128.242
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Initialization Sequence Completed
Dec 13 10:22:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
### Apply Settings in ../Services.asp and log back in
root@~~:~# Connection to ~~.mrjcd.com closed by remote host.
Connection to ~~.mrjcd.com closed.
da-box:~ mrjcd$ ssh root@~~.mrjcd.com -p xxxxxxx
DD-WRT v3.0-r34015M kongat (c) 2017 NewMedia-NET GmbH
Release: 12/10/17
==========================================================
___ ___ _ _____ ______ ____ ___
/ _ \/ _ \___| | /| / / _ \/_ __/ _ __|_ / / _ \
/ // / // /___/ |/ |/ / , _/ / / | |/ //_ <_/ // /
/____/____/ |__/|__/_/|_| /_/ |___/____(_)___/
DD-WRT v3.0
http://www.dd-wrt.com
==========================================================
BusyBox v1.27.2 (2017-12-10 15:33:31 CET) built-in shell (ash)
root@~~:~# cat /tmp/var/log/messages
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 07CB362F5673BDB3
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 12 21:13:35 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session FDFA03599CE8739E
Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session C22737AE5B604139
Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 12 21:16:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPRELEASE(br0) 10.72.29.52 c0:56:27:08:b2:93
Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 00:0a:95:d5:77:8c
Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 93B5371F665E8788
Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 12 21:18:25 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 12 21:18:26 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)
Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17
Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 01C22BC56A2483C1
Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:38:08 ~~ kern.warn kernel: [85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 21:51:43 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c
Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad
Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)
Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17
Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:53:46 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session D770113B3769F967
Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri
Dec 12 21:53:47 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513129562 received
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513129562 is valid from [2017-12-13] to [2017-12-14]
Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 71BE:560C:F97D:FB6E:A677:B06A:2A37:D4BE:FACD:384D:7CE2:5D75:1741:8A3C:40E8:904F
Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89
Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb
Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 6EE7076F52C88372
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 12 22:23:24 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 1A924B48555F3BED
Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 12 22:27:22 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity
Dec 12 22:27:23 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.10 48:5b:39:f2:73:26
Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.10 48:5b:39:f2:73:26 Dawn-James
Dec 12 22:50:19 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 12 22:50:20 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 12 22:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:35 ~~ kern.warn kernel: [92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:55 ~~ kern.warn kernel: [92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:27:55 ~~ kern.warn kernel: [92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:28:19 ~~ kern.warn kernel: [92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:28:19 ~~ kern.warn kernel: [92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:29:20 ~~ kern.warn kernel: [92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:29:20 ~~ kern.warn kernel: [92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925
Dec 12 23:32:23 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: disassociated due to inactivity
Dec 12 23:32:24 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61
Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain
Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.9 00:0a:95:d5:61:80
Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.9 00:0a:95:d5:61:80 Barb
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 12 23:59:13 ~~ user.debug : ttraff: data for 12-12-2017 commited to nvram
Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 00:03:56 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: disassociated
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]
Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852
Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 01:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 01:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee
Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache
Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1
Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: authenticated
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: associated (aid 2)
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec RADIUS: starting accounting session B7C49F6CF993BB50
Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: pairwise key handshake completed (RSN)
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec
Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: authenticated
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: associated (aid 6)
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 RADIUS: starting accounting session C79895AC58F005F7
Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 WPA: pairwise key handshake completed (RSN)
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.156 f0:a2:25:1f:db:09
Dec 13 03:09:37 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: disassociated
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.6 00:14:51:16:d2:78
Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.6 00:14:51:16:d2:78 DogCow
Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 03:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 03:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.12 54:ab:3a:19:07:3e
Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.12 54:ab:3a:19:07:3e QTAIR7-pri
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]
Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: authenticated
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: associated (aid 1)
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f RADIUS: starting accounting session 534CCC3F0172DFB1
Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: pairwise key handshake completed (RSN)
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f
Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast
Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.8 c8:60:00:8d:89:d8
Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.8 c8:60:00:8d:89:d8 BARB-PC
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.147 d0:e1:40:a6:00:b1
Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.147 d0:e1:40:a6:00:b1 Barbaras-iPad
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 05:14:06 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 7CC4257E4153379A
Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 13 05:14:07 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61
Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 05:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.133 40:33:1a:f2:9f:12
Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.133 40:33:1a:f2:9f:12 Tisha_iPhone-6s
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.11 00:15:f2:eb:05:44
Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.11 00:15:f2:eb:05:44 lildeb
Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: authenticated
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: associated (aid 2)
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 RADIUS: starting accounting session 530F7BA419D3E125
Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: pairwise key handshake completed (RSN)
Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.130 40:16:3b:ae:ee:e6
Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.130 40:16:3b:ae:ee:e6 Tisha-TV
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)
Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 07:08:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity
Dec 13 07:08:48 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]
Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35
Dec 13 07:19:46 ~~ kern.warn kernel: [120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:46 ~~ kern.warn kernel: [120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:47 ~~ kern.warn kernel: [120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:47 ~~ kern.warn kernel: [120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:50 ~~ kern.warn kernel: [120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:50 ~~ kern.warn kernel: [120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:51 ~~ kern.warn kernel: [120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:52 ~~ kern.warn kernel: [120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:52 ~~ kern.warn kernel: [120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:53 ~~ kern.warn kernel: [120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:53 ~~ kern.warn kernel: [120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:56 ~~ kern.warn kernel: [120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:19:56 ~~ kern.warn kernel: [120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:20:29 ~~ kern.warn kernel: [120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:20:29 ~~ kern.warn kernel: [120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925
Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 07:25:12 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity
Dec 13 07:25:13 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: authenticated
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: associated (aid 5)
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 RADIUS: starting accounting session C56027198357E771
Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: pairwise key handshake completed (RSN)
Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1
Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621
Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)
Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99
Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 4D386E15359E9793
Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)
Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b
Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085
Dec 13 07:50:43 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated
Dec 13 07:50:44 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 07:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 07:51:46 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake failed (RSN) after 4 tries
Dec 13 07:51:51 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to local deauth request
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 3C45C8FA693622A1
Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2
Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri
Dec 13 08:00:29 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity
Dec 13 08:00:30 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:00:31 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: disassociated due to inactivity
Dec 13 08:00:32 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 08:07:25 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated
Dec 13 08:07:26 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.125 50:82:d5:c3:86:4d
Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.125 50:82:d5:c3:86:4d Barb-iPhone
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session F54B4D31360B57BF
Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)
Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc
Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri
Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]
Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437
Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.5 00:0a:95:b5:1c:38
Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.5 00:0a:95:b5:1c:38 1505
Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee
Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89
Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb
Dec 13 08:53:58 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated
Dec 13 08:53:59 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c
Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]
Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437
Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d
Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)
Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)
Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)
Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c
Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad
Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec
Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: authenticated
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: associated (aid 3)
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 RADIUS: starting accounting session A2F8346B873B7913
Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: pairwise key handshake completed (RSN)
Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56
Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne
Dec 13 10:17:53 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:08 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:27 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:18:42 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:18:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:03 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:19:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:19:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:19:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:20:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:20:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:20:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:20:45 ~~ authpriv.info dropbear[23922]: Child connection from 10.72.29.7:51308
Dec 13 10:20:45 ~~ authpriv.notice dropbear[23922]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51308
Dec 13 10:20:57 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:21:18 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:21:33 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:21:57 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:22:12 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
### Release & renew WAN --- although it was no problem...
Dec 13 10:22:37 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:38 ~~ user.info : process_monitor : Process Monitor successfully stopped
Dec 13 10:22:38 ~~ user.info : process_monitor successfully started
Dec 13 10:22:38 ~~ daemon.debug process_monitor[24098]: We need to re-update after 3600 seconds
Dec 13 10:22:38 ~~ daemon.info process_monitor[24098]: set timer: 3600 seconds, callback: ntp_main()
Dec 13 10:22:39 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:22:39 ~~ user.info : wland : WLAN daemon successfully stopped
Dec 13 10:22:40 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:22:41 ~~ user.info : wland : WLAN daemon successfully started
Dec 13 10:22:41 ~~ user.info : WAN is up. IP: 96.46.208.155
Dec 13 10:22:41 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped
Dec 13 10:22:41 ~~ daemon.err openvpn[3372]: event_wait : Interrupted system call (code=4)
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: Closing TUN/TAP interface
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /sbin/ifconfig tun2 0.0.0.0
Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: SIGTERM[hard,] received, process exiting
Dec 13 10:22:41 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...
Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017
Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.09
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14
Dec 13 10:22:41 ~~ daemon.warn openvpn[24670]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Diffie-Hellman initialized with 4096 bit key
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP device tun2 opened
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP TX queue length set to 100
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link local (bound): [AF_INET][undef]:42257
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link remote: [AF_UNSPEC]
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MULTI: multi_init called, r=256 v=256
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: succeeded -> ifconfig_pool_set()
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL LIST
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: mrjcd101,10.172.128.242
Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Initialization Sequence Completed
Dec 13 10:22:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:23:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:23:39 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
Dec 13 10:24:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates
Dec 13 10:24:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates
### Apply Settings in ../Services.asp and log back in
Dec 13 10:24:45 ~~ user.info : klogd : kernel log daemon successfully stopped
Dec 13 10:24:45 ~~ user.info : ttraff : traffic counter daemon successfully stopped
Dec 13 10:24:45 ~~ kern.notice kernel: klogd: exiting
Dec 13 10:24:45 ~~ user.info : ttraff : traffic counter daemon successfully started
Dec 13 10:24:45 ~~ user.info : syslogd : syslog daemon successfully stopped
Dec 13 10:24:45 ~~ user.debug : ttraff: data collection started
Dec 13 10:24:45 ~~ syslog.info syslogd exiting
Dec 13 10:24:45 ~~ syslog.info syslogd started: BusyBox v1.27.2
Dec 13 10:24:45 ~~ user.info : klogd : klog daemon successfully started
Dec 13 10:24:45 ~~ kern.notice kernel: klogd started: BusyBox v1.27.2 (2017-12-10 15:33:31 CET)
Dec 13 10:24:46 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:24:46 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:24:46 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:24:46 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:24:46 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:24:46 ~~ user.info : dropbear : ssh daemon successfully stopped
Dec 13 10:24:46 ~~ user.info : telnetd : telnet daemon successfully stopped
Dec 13 10:24:46 ~~ user.info : dnsmasq : dnsmasq daemon successfully stopped
Dec 13 10:24:46 ~~ user.info : pptpd : pptp daemon successfully stopped
Dec 13 10:24:46 ~~ daemon.info dnsmasq[2416]: exiting on receipt of SIGTERM
Dec 13 10:24:46 ~~ user.info : telnetd : telnet daemon successfully started
Dec 13 10:24:46 ~~ user.info : hwmon successfully started
Dec 13 10:24:46 ~~ authpriv.info dropbear[23922]: Exit (root): Terminated by signal
Dec 13 10:24:46 ~~ authpriv.info dropbear[1253]: Early exit: Terminated by signal
Dec 13 10:24:46 ~~ user.info : dropbear : ssh daemon successfully started
Dec 13 10:24:46 ~~ authpriv.info dropbear[24922]: Running in background
Dec 13 10:24:46 ~~ daemon.notice dnscrypt-proxy[2322]: Stopping proxy
Dec 13 10:24:46 ~~ daemon.info dnscrypt-proxy[2322]: UDP listener shut down
Dec 13 10:24:46 ~~ daemon.info dnscrypt-proxy[2322]: TCP listener shut down
Dec 13 10:24:47 ~~ user.info : + DNS Security Extensions are supported
Dec 13 10:24:47 ~~ user.info : + Provider supposedly doesn't keep logs
Dec 13 10:24:47 ~~ daemon.notice dnscrypt-proxy[24938]: Starting dnscrypt-proxy 1.9.5
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Generating a new session key pair
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Done
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: started, version 2.78 cachesize 6144
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth DNSSEC loop-detect no-inotify
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: DNSSEC validation enabled
Dec 13 10:24:47 ~~ daemon.warn dnsmasq[24948]: warning: ignoring resolv-file flag because no-resolv is set
Dec 13 10:24:47 ~~ daemon.info dnsmasq-dhcp[24948]: DHCP, IP range 10.15.26.130 -- 10.15.26.189, lease time 12h
Dec 13 10:24:47 ~~ daemon.info dnsmasq-dhcp[24948]: DHCP, IP range 10.72.28.100 -- 10.72.28.174, lease time 1d
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain test
Dec 13 10:24:47 ~~ user.info : dnsmasq : dnsmasq daemon successfully started
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain onion
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain localhost
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain local
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain invalid
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.net
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.org
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.com
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using nameserver 127.0.0.1#30
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using 2 more local addresses
Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: read /etc/hosts - 42 addresses
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Server certificate with serial #1513172882 received
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: This certificate is valid
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]
Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437
Dec 13 10:24:47 ~~ daemon.notice dnscrypt-proxy[24938]: Proxying from 127.0.0.1:30 to 107.181.168.52:443
Dec 13 10:24:47 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:24:47 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:24:47 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:24:47 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:24:47 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:24:47 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped
Dec 13 10:24:47 ~~ daemon.err openvpn[24670]: event_wait : Interrupted system call (code=4)
Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init
Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: Closing TUN/TAP interface
Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 0.0.0.0
Dec 13 10:24:47 ~~ user.info : klogd : kernel log daemon successfully stopped
Dec 13 10:24:47 ~~ kern.notice kernel: klogd: exiting
Dec 13 10:24:47 ~~ user.info : syslogd : syslog daemon successfully stopped
Dec 13 10:24:47 ~~ syslog.info syslogd exiting
Dec 13 10:24:47 ~~ syslog.info syslogd started: BusyBox v1.27.2
Dec 13 10:24:47 ~~ user.info : klogd : klog daemon successfully started
Dec 13 10:24:47 ~~ kern.notice kernel: klogd started: BusyBox v1.27.2 (2017-12-10 15:33:31 CET)
Dec 13 10:24:47 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...
Dec 13 10:24:47 ~~ daemon.notice openvpn[25095]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017
Dec 13 10:24:47 ~~ daemon.notice openvpn[25095]: library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.09
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14
Dec 13 10:24:47 ~~ daemon.warn openvpn[25099]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Diffie-Hellman initialized with 4096 bit key
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: TUN/TAP device tun2 opened
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: TUN/TAP TX queue length set to 100
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: UDPv4 link local (bound): [AF_INET][undef]:42257
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: UDPv4 link remote: [AF_UNSPEC]
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: MULTI: multi_init called, r=256 v=256
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: succeeded -> ifconfig_pool_set()
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: IFCONFIG POOL LIST
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: mrjcd101,10.172.128.242
Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Initialization Sequence Completed
Dec 13 10:24:48 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:24:48 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:24:48 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:24:48 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:24:48 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:24:49 ~~ user.info : vpn modules : vpn modules successfully unloaded
Dec 13 10:24:49 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
Dec 13 10:24:49 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded
Dec 13 10:24:49 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded
Dec 13 10:24:49 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded
Dec 13 10:25:12 ~~ authpriv.info dropbear[25630]: Child connection from 10.72.29.7:51439
Dec 13 10:25:13 ~~ authpriv.notice dropbear[25630]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51439
root@~~:~# uptime
10:26:29 up 1 day, 12:35, load average: 0.02, 0.04, 0.00
root@~~:~# Connection to ~~.mrjcd.com closed by remote host.
Connection to ~~.mrjcd.com closed.
da-box:~ mrjcd$