DD-WRT v3.0-r34015M kongat (c) 2017 NewMedia-NET GmbH

Release: 12/10/17

==========================================================

 

     ___  ___     _      _____  ______       ____  ___ 

    / _ \/ _ \___| | /| / / _ \/_  __/ _  __|_  / / _ \

   / // / // /___/ |/ |/ / , _/ / /   | |/ //_ <_/ // /

  /____/____/    |__/|__/_/|_| /_/    |___/____(_)___/ 

                                                     

                       DD-WRT v3.0

                   http://www.dd-wrt.com

 

==========================================================



BusyBox v1.27.2 (2017-12-10 15:33:31 CET) built-in shell (ash)


root@~~:~# dmesg

[    0.000000] Booting Linux on physical CPU 0x0

[    0.000000] Linux version 3.18.86 (bluebat@opensuse.site) (gcc version 6.3.0 (LEDE GCC 6.3.0 r4639-eb43a817f7) ) #234 SMP PREEMPT Sat Dec 9 14:36:00 CET 2017

[    0.000000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5787d

[    0.000000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache

[    0.000000] Machine model: Linksys EA8500 WiFi Router

[    0.000000] Ignoring memory range 0x41500000 - 0x42000000

[    0.000000] Memory policy: Data cache writealloc

[    0.000000] On node 0 totalpages: 122880

[    0.000000] free_area_init_node: node 0, pgdat c0730840, node_mem_map ddb40000

[    0.000000]   Normal zone: 960 pages used for memmap

[    0.000000]   Normal zone: 0 pages reserved

[    0.000000]   Normal zone: 122880 pages, LIFO batch:31

[    0.000000] PERCPU: Embedded 9 pages/cpu @ddfd3000 s7552 r8192 d21120 u36864

[    0.000000] pcpu-alloc: s7552 r8192 d21120 u36864 alloc=9*4096

[    0.000000] pcpu-alloc: [0] 0 [0] 1 

[    0.000000] Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 121920

[    0.000000] Kernel command line: console=ttyMSM0,115200n8 rootfstype=squashfs noinitrd console=ttyHSL1,115200n8 init=/sbin/init rootfstype=squashfs root=31:16

[    0.000000] PID hash table entries: 2048 (order: 1, 8192 bytes)

[    0.000000] Dentry cache hash table entries: 65536 (order: 6, 262144 bytes)

[    0.000000] Inode-cache hash table entries: 32768 (order: 5, 131072 bytes)

[    0.000000] Memory: 481248K/491520K available (3902K kernel code, 283K rwdata, 1120K rodata, 192K init, 310K bss, 10272K reserved, 0K cma-reserved, 0K highmem)

[    0.000000] Virtual kernel memory layout:

[    0.000000]     vector  : 0xffff0000 - 0xffff1000   (   4 kB)

[    0.000000]     fixmap  : 0xffc00000 - 0xffe00000   (2048 kB)

[    0.000000]     vmalloc : 0xde800000 - 0xff000000   ( 520 MB)

[    0.000000]     lowmem  : 0xc0000000 - 0xde000000   ( 480 MB)

[    0.000000]     pkmap   : 0xbfe00000 - 0xc0000000   (   2 MB)

[    0.000000]     modules : 0xbf000000 - 0xbfe00000   (  14 MB)

[    0.000000]       .text : 0xc0208000 - 0xc06efe04   (5024 kB)

[    0.000000]       .init : 0xc06f0000 - 0xc0720000   ( 192 kB)

[    0.000000]       .data : 0xc0720000 - 0xc0766cc4   ( 284 kB)

[    0.000000]        .bss : 0xc0766cc4 - 0xc07b4788   ( 311 kB)

[    0.000000] Preemptible hierarchical RCU implementation.

[    0.000000]  RCU restricting CPUs from NR_CPUS=4 to nr_cpu_ids=2.

[    0.000000] RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2

[    0.000000] NR_IRQS:16 nr_irqs:16 16

[    0.000012] sched_clock: 32 bits at 6MHz, resolution 160ns, wraps every 687194767200ns

[    0.000028] Switching to timer-based delay loop, resolution 160ns

[    0.000446] Calibrating delay loop (skipped), value calculated using timer frequency.. 12.50 BogoMIPS (lpj=62500)

[    0.000466] pid_max: default: 32768 minimum: 301

[    0.000656] Security Framework initialized

[    0.000765] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)

[    0.000781] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)

[    0.001452] CPU: Testing write buffer coherency: ok

[    0.001725] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000

[    0.002236] Setting up static identity map for 0x42213188 - 0x422131e0

[    0.063464] CPU1: Booted secondary processor

[    0.063564] CPU1: thread -1, cpu 1, socket 0, mpidr 80000001

[    0.063678] Brought up 2 CPUs

[    0.063702] SMP: Total of 2 processors activated (25.00 BogoMIPS).

[    0.063713] CPU: All CPU(s) started in SVC mode.

[    0.078222] VFP support v0.3: implementor 51 architecture 0 part 4d variant 2 rev 0

[    0.078727] pinctrl core: initialized pinctrl subsystem

[    0.089151] NET: Registered protocol family 16

[    0.089489] DMA: preallocated 256 KiB pool for atomic coherent allocations

[    0.113855] cpuidle: using governor ladder

[    0.144869] cpuidle: using governor menu

[    0.164102] qcom_rpm 108000.rpm: RPM firmware 3.0.16777342

[    0.164179] qcom_rpm 108000.rpm: failed to mark ack irq as wakeup

[    0.164237] qcom_rpm 108000.rpm: failed to mark wakeup irq as wakeup

[    0.199482] pps_core: LinuxPPS API ver. 1 registered

[    0.199497] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>

[    0.199540] PTP clock support registered

[    0.200648] pcie_init: pcie_init: unable to create IPC log context for pcie0-short

[    0.200663] pcie_init: pcie_init: unable to create IPC log context for pcie0-long

[    0.200673] pcie_init: pcie_init: unable to create IPC log context for pcie1-short

[    0.200683] pcie_init: pcie_init: unable to create IPC log context for pcie1-long

[    0.201087] Switched to clocksource dg_timer

[    0.202436] NET: Registered protocol family 2

[    0.203150] TCP established hash table entries: 4096 (order: 2, 16384 bytes)

[    0.203190] TCP bind hash table entries: 4096 (order: 3, 32768 bytes)

[    0.203243] TCP: Hash tables configured (established 4096 bind 4096)

[    0.203289] TCP: reno registered

[    0.203309] UDP hash table entries: 256 (order: 1, 8192 bytes)

[    0.203329] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)

[    0.203560] NET: Registered protocol family 1

[    0.203625] PCI: CLS 0 bytes, default 64

[    0.204798] futex hash table entries: 512 (order: 3, 32768 bytes)

[    0.204901] Crashlog allocated RAM at address 0x5ff00000

[    0.205774] squashfs: version 4.0 (2009/01/31) Phillip Lougher

[    0.205806] msgmni has been set to 939

[    0.207631] io scheduler noop registered

[    0.207652] io scheduler deadline registered (default)

[    0.209018] 1b500000.pci supply vdda not found, using dummy regulator

[    0.209117] 1b500000.pci supply vdda_phy not found, using dummy regulator

[    0.209197] 1b500000.pci supply vdda_refclk not found, using dummy regulator

[    0.240163] qcom-pcie 1b500000.pci: PCI host bridge to bus 0000:00

[    0.240186] pci_bus 0000:00: root bus resource [io  0xfe00000-0xfffff] (bus address [0x1fc00000-0xfefffff])

[    0.240200] pci_bus 0000:00: root bus resource [mem 0x08000000-0x0fdfffff]

[    0.240215] pci_bus 0000:00: root bus resource [bus 00-ff]

[    0.240265] pci 0000:00:00.0: [17cb:0101] type 01 class 0x060400

[    0.240400] pci 0000:00:00.0: supports D1

[    0.240413] pci 0000:00:00.0: PME# supported from D0 D1 D3hot

[    0.240735] PCI: bus0: Fast back to back transfers disabled

[    0.241077] pci 0000:01:00.0: [168c:0040] type 00 class 0x028000

[    0.241373] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]

[    0.242317] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold

[    0.242743] PCI: bus1: Fast back to back transfers disabled

[    0.242762] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01

[    0.242913] pci 0000:00:00.0: BAR 8: assigned [mem 0x08000000-0x081fffff]

[    0.242936] pci 0000:01:00.0: BAR 0: assigned [mem 0x08000000-0x081fffff 64bit]

[    0.243046] pci 0000:00:00.0: PCI bridge to [bus 01]

[    0.243066] pci 0000:00:00.0:   bridge window [mem 0x08000000-0x081fffff]

[    0.243521] aer 0000:00:00.0:pcie02: service driver aer loaded

[    0.243891] 1b700000.pci supply vdda not found, using dummy regulator

[    0.243975] 1b700000.pci supply vdda_phy not found, using dummy regulator

[    0.244066] 1b700000.pci supply vdda_refclk not found, using dummy regulator

[    0.274291] qcom-pcie 1b700000.pci: PCI host bridge to bus 0001:00

[    0.274311] pci_bus 0001:00: root bus resource [io  0x31e10000-0xfffff] (bus address [0x63c00000-0x31eeffff])

[    0.274326] pci_bus 0001:00: root bus resource [mem 0x2e000000-0x31dfffff]

[    0.274340] pci_bus 0001:00: root bus resource [bus 00-ff]

[    0.274383] pci 0001:00:00.0: [17cb:0101] type 01 class 0x060400

[    0.274516] pci 0001:00:00.0: supports D1

[    0.274530] pci 0001:00:00.0: PME# supported from D0 D1 D3hot

[    0.274822] PCI: bus0: Fast back to back transfers disabled

[    0.275153] pci 0001:01:00.0: [168c:0040] type 00 class 0x028000

[    0.275350] pci 0001:01:00.0: reg 0x10: [mem 0x00000000-0x001fffff 64bit]

[    0.276287] pci 0001:01:00.0: PME# supported from D0 D3hot D3cold

[    0.276703] PCI: bus1: Fast back to back transfers disabled

[    0.276720] pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01

[    0.276936] pci 0001:00:00.0: BAR 8: assigned [mem 0x2e000000-0x2e1fffff]

[    0.276957] pci 0001:01:00.0: BAR 0: assigned [mem 0x2e000000-0x2e1fffff 64bit]

[    0.277062] pci 0001:00:00.0: PCI bridge to [bus 01]

[    0.277080] pci 0001:00:00.0:   bridge window [mem 0x2e000000-0x2e1fffff]

[    0.277471] aer 0001:00:00.0:pcie02: service driver aer loaded

[    0.277830] 1b900000.pci supply vdda not found, using dummy regulator

[    0.277913] 1b900000.pci supply vdda_phy not found, using dummy regulator

[    0.277992] 1b900000.pci supply vdda_refclk not found, using dummy regulator

[    0.412807] qcom-pcie 1b900000.pci: link initialization failed

[    0.414422] qcom-pcie 1b900000.pci: PCI host bridge to bus 0002:00

[    0.414441] pci_bus 0002:00: root bus resource [io  0x35e20000-0xfffff] (bus address [0x6bc00000-0x35edffff])

[    0.414455] pci_bus 0002:00: root bus resource [mem 0x32000000-0x35dfffff]

[    0.414470] pci_bus 0002:00: root bus resource [bus 00-ff]

[    0.414518] PCI: bus0: Fast back to back transfers enabled

[    0.417069] gsbi 16300000.gsbi: GSBI port protocol: 6 crci: 0

[    0.418392] Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled

[    0.419391] msm_serial 16340000.serial: msm_serial: detected port #0

[    0.419488] msm_serial 16340000.serial: uartclk = 1843200

[    0.419544] 16340000.serial: ttyMSM0 at MMIO 0x16340000 (irq = 184, base_baud = 115200) is a MSM

[    0.419601] msm_serial: console setup on port #0

[    1.138507] console [ttyMSM0] enabled

[    1.143345] msm_serial: driver initialized

[    1.150047] nand: device found, Manufacturer ID: 0x01, Chip ID: 0xa1

[    1.150556] nand: AMD/Spansion S34MS01G2

[    1.157131] nand: 128MiB, SLC, page size: 2048, OOB size: 64

[    1.160980] Scanning device for bad blocks

[    1.572553] random: nonblocking pool is initialized

[    1.875006] 19 ofpart partitions found on MTD device qcom-nandc

[    1.875036] Creating 19 MTD partitions on "qcom-nandc":

[    1.879734] 0x000000000000-0x000000040000 : "SBL1"

[    1.885922] 0x000000040000-0x000000180000 : "MIBIB"

[    1.890584] 0x000000180000-0x0000002c0000 : "SBL2"

[    1.895402] 0x0000002c0000-0x000000540000 : "SBL3"

[    1.900177] 0x000000540000-0x000000660000 : "DDRCONFIG"

[    1.905039] 0x000000660000-0x000000780000 : "SSD"

[    1.910076] 0x000000780000-0x000000a00000 : "TZ"

[    1.915044] 0x000000a00000-0x000000c80000 : "RPM"

[    1.919650] 0x000000c80000-0x000000dc0000 : "art"

[    1.924306] 0x000000dc0000-0x000000ec0000 : "APPSBL"

[    1.928945] 0x000000ec0000-0x000000f00000 : "u_env"

[    1.934051] 0x000000f00000-0x000000f40000 : "s_env"

[    1.938585] 0x000000f40000-0x000000f80000 : "devinfo"

[    1.943509] 0x000000f80000-0x000003780000 : "linux"

[    1.948670] 0x000001280000-0x000003780000 : "rootfs"

[    1.953431] mtd: partition "rootfs" set to be root filesystem

[    1.957783] 0x000003780000-0x000005f40000 : "linux2"

[    1.964268] 0x000003a80000-0x000005f40000 : "rootfs2"

[    1.969262] 0x000005f40000-0x000005f80000 : "nvram"

[    1.974251] 0x000005f80000-0x000008000000 : "ddwrt"

[    1.980138] IMQ: autocreate imq0  NS c0760f80

[    1.983560] IMQ: autocreate imq1  NS c0760f80

[    1.987460] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)

[    1.991857]  Hooking IMQ after NAT on PREROUTING.

[    1.998562]  Hooking IMQ before NAT on POSTROUTING.

[    2.003645] libphy: Fixed MDIO Bus: probed

[    2.008370] libphy: GPIO Bitbanged MDIO: probed

[    2.033191] switch0: Atheros AR8337 rev. 2 switch registered on gpio-0

[    2.830396] tun: Universal TUN/TAP device driver, 1.6

[    2.830423] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>

[    2.835970] stmmac - user ID: 0x10, Synopsys ID: 0x37

[    2.840499]  Ring mode enabled

[    2.845726]  DMA HW capability register supported

[    2.848570]  Enhanced/Alternate descriptors

[    2.853343]  Enabled extended descriptors

[    2.857336]  RX Checksum Offload Engine supported (type 2)

[    2.861581]  TX Checksum insertion supported

[    2.866886]  Wake-Up On Lan supported

[    2.871374]  Enable RX Mitigation via HW Watchdog Timer

[    2.876216] stmmac - user ID: 0x10, Synopsys ID: 0x37

[    2.879907]  Ring mode enabled

[    2.885211]  DMA HW capability register supported

[    2.888066]  Enhanced/Alternate descriptors

[    2.892838]  Enabled extended descriptors

[    2.896833]  RX Checksum Offload Engine supported (type 2)

[    2.901001]  TX Checksum insertion supported

[    2.906447]  Wake-Up On Lan supported

[    2.910864]  Enable RX Mitigation via HW Watchdog Timer

[    2.915144] PPP generic driver version 2.4.2

[    2.919549] PPP BSD Compression module registered

[    2.924013] PPP Deflate Compression module registered

[    2.928539] PPP MPPE Compression module registered

[    2.933645] NET: Registered protocol family 24

[    2.938285] PPTP driver version 0.8.5

[    2.942884] i2c /dev entries driver

[    2.951984] Speed bin: 0

[    2.952005] PVS bin: 1

[    2.953994] platform cpufreq-krait.0: Driver cpufreq-krait requests probe deferral

[    2.957688] L2 @ QSB rate. Forcing new rate.

[    2.963639] L2 @ 387500 KHz

[    2.967852] CPU0 @ 800000 KHz

[    2.970245] CPU1 @ QSB rate. Forcing new rate.

[    2.973543] CPU1 @ 384000 KHz

[    2.978010] GACT probability NOT on

[    2.980765] Mirror/redirect action on

[    2.984182] Simple TC action Loaded

[    2.988704] netem: version 1.3

[    2.991232] u32 classifier

[    2.994386]     Performance counters on

[    2.996979]     input device check on

[    3.000710]     Actions configured

[    3.004659] Netfilter messages via NETLINK v0.30.

[    3.007900] nf_conntrack version 0.5.0 (7519 buckets, 30076 max)

[    3.013044] nf_conntrack_rtsp v0.7 loading

[    3.019282] xt_time: kernel timezone is -0000

[    3.022726] ip_set: protocol 6

[    3.027299] gre: GRE over IPv4 demultiplexor driver

[    3.030207] nf_nat_rtsp v0.7 loading

[    3.034858] ip_tables: (C) 2000-2006 Netfilter Core Team

[    3.038800] TCP: bic registered

[    3.043940] TCP: cubic registered

[    3.046729] TCP: westwood registered

[    3.050200] TCP: highspeed registered

[    3.054030] TCP: hybla registered

[    3.057404] TCP: htcp registered

[    3.060705] TCP: vegas registered

[    3.064088] TCP: veno registered

[    3.067214] TCP: scalable registered

[    3.070511] TCP: lp registered

[    3.074148] TCP: yeah registered

[    3.076936] TCP: illinois registered

[    3.080327] NET: Registered protocol family 17

[    3.084032] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.

[    3.088185] Bridge firewalling registered

[    3.100984] 8021q: 802.1Q VLAN Support v1.8

[    3.105025] Registering SWP/SWPB emulation handler

[    3.112698] trying to register driver generic_krait

[    3.113666] Frequency table not initialized.

[    3.118536] Frequency table not initialized.

[    3.123102] Frequency table not initialized.

[    3.127189] Frequency table not initialized.

[    3.131563] Frequency table not initialized.

[    3.137449] Frequency table not initialized.

[    3.140015] Frequency table not initialized.

[    3.144283] Frequency table not initialized.

[    3.148453] Frequency table not initialized.

[    3.152785] Frequency table not initialized.

[    3.156977] driver generic_krait up and running

[    3.161263] searching for nvram

[    3.165561] nvram size = -1066920090

[    3.189869] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)

[    3.197778] UBIFS error (pid 1): ubifs_mount: cannot open "ubi0:rootfs", error -19

[    3.200893] VFS: Mounted root (squashfs filesystem) readonly on device 31:16.

[    3.204500] Freeing unused kernel memory: 192K

[    5.656853] UBIFS error (pid 712): ubifs_mount: cannot open "ubi0:rootfs_data", error -19

[    6.811948] Loading modules backported from Linux version wireless-drivers-next-for-davem-2017-09-01-0-geb464d4a8d09

[    6.811984] Backport generated by backports.git backports-20160324-111-g97b8d7c4

[    7.429941] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142)

[    7.430533] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0

[    7.563758] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:01:00.0.bin failed with error -2

[    7.563807] ath10k_pci 0000:01:00.0: Falling back to user helper

[    7.576261] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2

[    7.579528] ath10k_pci 0000:01:00.0: Falling back to user helper

[    7.961312] ath10k_pci 0000:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003801ff sub 168c:0002

[    7.961570] ath10k_pci 0000:01:00.0: kconfig debug 1 debugfs 1 tracing 0 dfs 0 testmode 0

[    7.973712] ath10k_pci 0000:01:00.0: firmware ver 10.4-3.5.3-00038 api 5 features no-p2p,mfp,peer-flow-ctrl,allows-mesh-bcast,no-ps crc32 b1d4e84d

[    8.671491] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off

[    8.737787] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off

[   10.271784] ath10k_pci 0000:01:00.0: failed to fetch board data for bus=pci,vendor=168c,device=0040,subsystem-vendor=168c,subsystem-device=0002 from ath10k/QCA99X0/hw2.0/board-2.bin

[   10.271977] ath10k_pci 0000:01:00.0: board_file api 1 bmi_id N/A crc32 3e376c3f

[   11.477561] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal file max-sta 512 raw 0 hwcrypto 1

[   11.543181] ath: EEPROM regdomain: 0x0

[   11.543194] ath: EEPROM indicates default country code should be used

[   11.543203] ath: doing EEPROM country->regdmn map search

[   11.543215] ath: country maps to regdmn code: 0x3a

[   11.543224] ath: Country alpha2 being used: US

[   11.543232] ath: Regpair used: 0x3a

[   11.550726] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)

[   11.551286] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0

[   11.683905] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/pre-cal-pci-0001:01:00.0.bin failed with error -2

[   11.683964] ath10k_pci 0001:01:00.0: Falling back to user helper

[   11.696755] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2

[   11.699681] ath10k_pci 0001:01:00.0: Falling back to user helper

[   11.712949] ath10k_pci 0001:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003801ff sub 168c:0002

[   11.716352] ath10k_pci 0001:01:00.0: kconfig debug 1 debugfs 1 tracing 0 dfs 0 testmode 0

[   11.731571] ath10k_pci 0001:01:00.0: firmware ver 10.4-3.5.3-00038 api 5 features no-p2p,mfp,peer-flow-ctrl,allows-mesh-bcast,no-ps crc32 b1d4e84d

[   14.024391] ath10k_pci 0001:01:00.0: failed to fetch board data for bus=pci,vendor=168c,device=0040,subsystem-vendor=168c,subsystem-device=0002 from ath10k/QCA99X0/hw2.0/board-2.bin

[   14.024593] ath10k_pci 0001:01:00.0: board_file api 1 bmi_id N/A crc32 eca6e637

[   15.231155] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal file max-sta 512 raw 0 hwcrypto 1

[   15.313963] ath: EEPROM regdomain: 0x0

[   15.313985] ath: EEPROM indicates default country code should be used

[   15.314001] ath: doing EEPROM country->regdmn map search

[   15.314021] ath: country maps to regdmn code: 0x3a

[   15.314038] ath: Country alpha2 being used: US

[   15.314052] ath: Regpair used: 0x3a

[   15.486327] usbcore: registered new interface driver usbfs

[   15.487028] usbcore: registered new interface driver hub

[   15.491078] usbcore: registered new device driver usb

[   15.534914] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver

[   15.543798] ehci-platform: EHCI generic platform driver

[   15.565172] ehci-pci: EHCI PCI platform driver

[   15.626201] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver

[   15.823435] soc:usb30@0 supply gdsc not found, using dummy regulator

[   15.824265] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.829095] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.835351] soc:usb30@1 supply gdsc not found, using dummy regulator

[   15.842584] platform 10000000.dwc3: Driver dwc3 requests probe deferral

[   15.848625] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.855626] platform 10000000.dwc3: Driver dwc3 requests probe deferral

[   15.884558] 100f8800.phy supply vddcx not found, using dummy regulator

[   15.884656] 100f8800.phy supply v3p3 not found, using dummy regulator

[   15.890042] 100f8800.phy supply v1p8 not found, using dummy regulator

[   15.896626] 100f8800.phy supply vbus not found, using dummy regulator

[   15.903134] 110f8800.phy supply vddcx not found, using dummy regulator

[   15.903233] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.903353] platform 10000000.dwc3: Driver dwc3 requests probe deferral

[   15.922398] 110f8800.phy supply v3p3 not found, using dummy regulator

[   15.928916] 110f8800.phy supply v1p8 not found, using dummy regulator

[   15.935575] 110f8800.phy supply vbus not found, using dummy regulator

[   15.942169] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.948723] platform 10000000.dwc3: Driver dwc3 requests probe deferral

[   15.963106] 100f8830.phy supply vddcx not found, using dummy regulator

[   15.963199] 100f8830.phy supply v1p8 not found, using dummy regulator

[   15.968642] qcom-dwc3-ssphy 100f8830.phy: cannot get HSIO settings from device node, using default values

[   15.975172] 110f8830.phy supply vddcx not found, using dummy regulator

[   15.975268] platform 11000000.dwc3: Driver dwc3 requests probe deferral

[   15.975465] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for vddcx

[   15.975470] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for v3p3

[   15.975474] qcom-dwc3-hsphy 100f8800.phy: cannot set voltage for v1p8

[   15.977916] qcom-dwc3-ssphy 100f8830.phy: cannot set voltage for vddcx

[   16.017176] 110f8830.phy supply v1p8 not found, using dummy regulator

[   16.023669] qcom-dwc3-ssphy 110f8830.phy: cannot get HSIO settings from device node, using default values

[   16.212546] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller

[   16.212640] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1

[   16.217119] xhci-hcd xhci-hcd.0.auto: irq 237, io mem 0x10000000

[   16.225940] hub 1-0:1.0: USB hub found

[   16.230846] hub 1-0:1.0: 1 port detected

[   16.235055] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller

[   16.238381] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2

[   16.244997] hub 2-0:1.0: USB hub found

[   16.251335] hub 2-0:1.0: 1 port detected

[   16.256150] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for vddcx

[   16.259110] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for v3p3

[   16.265605] qcom-dwc3-hsphy 110f8800.phy: cannot set voltage for v1p8

[   16.274445] qcom-dwc3-ssphy 110f8830.phy: cannot set voltage for vddcx

[   16.522530] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller

[   16.522585] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3

[   16.527095] xhci-hcd xhci-hcd.1.auto: irq 142, io mem 0x11000000

[   16.535286] hub 3-0:1.0: USB hub found

[   16.540730] hub 3-0:1.0: 1 port detected

[   16.544726] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller

[   16.548363] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4

[   16.553725] usb 1-1: new high-speed USB device number 2 using xhci-hcd

[   16.562120] hub 4-0:1.0: USB hub found

[   16.567899] hub 4-0:1.0: 1 port detected

[   21.037357] xhci-hcd xhci-hcd.1.auto: remove, state 1

[   21.037401] usb usb4: USB disconnect, device number 1

[   21.043204] xhci-hcd xhci-hcd.1.auto: USB bus 4 deregistered

[   21.046461] xhci-hcd xhci-hcd.1.auto: remove, state 1

[   21.057779] usb usb3: USB disconnect, device number 1

[   21.060128] xhci-hcd xhci-hcd.1.auto: USB bus 3 deregistered

[   21.062328] xhci-hcd xhci-hcd.0.auto: remove, state 1

[   21.067879] usb usb2: USB disconnect, device number 1

[   21.075208] xhci-hcd xhci-hcd.0.auto: USB bus 2 deregistered

[   21.077885] xhci-hcd xhci-hcd.0.auto: remove, state 1

[   21.090656] usb usb1: USB disconnect, device number 1

[   21.090689] usb 1-1: USB disconnect, device number 2

[   21.100407] xhci-hcd xhci-hcd.0.auto: USB bus 1 deregistered

[   21.125745] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller

[   21.125857] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 1

[   21.130527] xhci-hcd xhci-hcd.0.auto: irq 237, io mem 0x10000000

[   21.139836] hub 1-0:1.0: USB hub found

[   21.144418] hub 1-0:1.0: 1 port detected

[   21.148117] xhci-hcd xhci-hcd.0.auto: xHCI Host Controller

[   21.152083] xhci-hcd xhci-hcd.0.auto: new USB bus registered, assigned bus number 2

[   21.159013] hub 2-0:1.0: USB hub found

[   21.168911] hub 2-0:1.0: 1 port detected

[   21.169723] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller

[   21.172448] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 3

[   21.177854] xhci-hcd xhci-hcd.1.auto: irq 142, io mem 0x11000000

[   21.186390] hub 3-0:1.0: USB hub found

[   21.198399] hub 3-0:1.0: 1 port detected

[   21.199110] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller

[   21.201524] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 4

[   21.207922] hub 4-0:1.0: USB hub found

[   21.221288] hub 4-0:1.0: 1 port detected

[   21.267855] SCSI subsystem initialized

[   21.380331] usbcore: registered new interface driver usb-storage

[   21.468885] usb 1-1: new high-speed USB device number 2 using xhci-hcd

[   21.474833] libata version 3.00 loaded.

[   21.567977] ahci 29000000.sata: forcing port_map 0x0 -> 0x1

[   21.568048] ahci 29000000.sata: AHCI 0001.0300 32 slots 1 ports 6 Gbps 0x1 impl platform mode

[   21.572478] ahci 29000000.sata: flags: ncq sntf pm led clo only pmp pio slum part ccc apst 

[   21.582374] scsi host0: ahci_platform

[   21.589801] ata1: SATA max UDMA/133 mmio [mem 0x29000000-0x2900017f] port 0x100 irq 241

[   21.615115] usb-storage 1-1:1.0: USB Mass Storage device detected

[   21.622711] scsi host1: usb-storage 1-1:1.0

[   21.941770] ata1: SATA link down (SStatus 0 SControl 300)

[   22.628459] scsi 1:0:0:0: Direct-Access     PNY      USB 2.0 FD       0.00 PQ: 0 ANSI: 2

[   22.630688] sd 1:0:0:0: [sda] 31711232 512-byte logical blocks: (16.2 GB/15.1 GiB)

[   22.636452] sd 1:0:0:0: [sda] Write Protect is off

[   22.643068] sd 1:0:0:0: [sda] Mode Sense: 00 00 00 00

[   22.643916] sd 1:0:0:0: [sda] Asking for cache data failed

[   22.647769] sd 1:0:0:0: [sda] Assuming drive cache: write through

[   22.656896]  sda: sda1

[   22.671253] sd 1:0:0:0: [sda] Attached SCSI removable disk

[   22.943441] FAT-fs (sda1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!

[   22.951688] FAT-fs (sda1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.

[   23.166538] using kernel STP

[   23.512575] device br0 entered promiscuous mode

[   23.569029] device vlan1 entered promiscuous mode

[   23.569056] device eth0 entered promiscuous mode

[   23.572858] br0: port 1(vlan1) entered forwarding state

[   23.577423] br0: port 1(vlan1) entered forwarding state

[   23.589816] device br0 left promiscuous mode

[   23.592771] device br0 entered promiscuous mode

[   23.643378] device br0 left promiscuous mode

[   23.706848] ath: EEPROM regdomain: 0x8348

[   23.706860] ath: EEPROM indicates we should expect a country code

[   23.706871] ath: doing EEPROM country->regdmn map search

[   23.706882] ath: country maps to regdmn code: 0x3a

[   23.706891] ath: Country alpha2 being used: US

[   23.706899] ath: Regpair used: 0x3a

[   23.706908] ath: regdomain 0x8348 dynamically updated by user

[   23.706933] ath: EEPROM regdomain: 0x8348

[   23.706943] ath: EEPROM indicates we should expect a country code

[   23.706951] ath: doing EEPROM country->regdmn map search

[   23.706960] ath: country maps to regdmn code: 0x3a

[   23.706967] ath: Country alpha2 being used: US

[   23.706974] ath: Regpair used: 0x3a

[   23.706982] ath: regdomain 0x8348 dynamically updated by user

[   25.571468] br0: port 1(vlan1) entered forwarding state

[   29.491070] device ath0 entered promiscuous mode

[   31.650161] br0: port 2(ath0) entered forwarding state

[   31.650204] br0: port 2(ath0) entered forwarding state

[   31.659031] device ath0.1 entered promiscuous mode

[   31.667639] br1: port 1(ath0.1) entered listening state

[   31.667673] br1: port 1(ath0.1) entered listening state

[   33.233143] device ath1 entered promiscuous mode

[   33.641476] br0: port 2(ath0) entered forwarding state

[   33.661469] br1: port 1(ath0.1) entered learning state

[   33.970395] br0: port 3(ath1) entered forwarding state

[   33.970433] br0: port 3(ath1) entered forwarding state

[   33.977303] device ath1.1 entered promiscuous mode

[   33.994387] br1: port 2(ath1.1) entered listening state

[   33.994419] br1: port 2(ath1.1) entered listening state

[   34.419804] device vlan2 entered promiscuous mode

[   34.887355] device vlan2 left promiscuous mode

[   35.661455] br1: topology change detected, propagating

[   35.661492] br1: port 1(ath0.1) entered forwarding state

[   35.961455] br0: port 3(ath1) entered forwarding state

[   35.991448] br1: port 2(ath1.1) entered learning state

[   36.596043] device vlan4 entered promiscuous mode

[   36.596456] br1: port 3(vlan4) entered listening state

[   36.599748] br1: port 3(vlan4) entered listening state

[   37.991458] br1: topology change detected, propagating

[   37.991487] br1: port 2(ath1.1) entered forwarding state

[   38.591457] br1: port 3(vlan4) entered learning state

[   40.591471] br1: topology change detected, propagating

[   40.591501] br1: port 3(vlan4) entered forwarding state

[   43.644931] Ebtables v2.0 registered

[ 1382.558702] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.

[29764.667026] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[29764.699051] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[29764.701130] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[29764.733348] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[30527.286940] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[30527.300670] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[30527.301218] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[30527.317868] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

[85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

[85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

[92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

[120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

[120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925




root@~~:~# cat /tmp/var/log/messages

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 07CB362F5673BDB3

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 12 21:13:35 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session FDFA03599CE8739E

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session C22737AE5B604139

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 12 21:16:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPRELEASE(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 00:0a:95:d5:77:8c 

Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 93B5371F665E8788

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 12 21:18:25 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 12 21:18:26 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)

Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17

Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 01C22BC56A2483C1

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c 

Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad

Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)

Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17

Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:53:46 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session D770113B3769F967

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri

Dec 12 21:53:47 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513129562 received

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513129562 is valid from [2017-12-13] to [2017-12-14]

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 71BE:560C:F97D:FB6E:A677:B06A:2A37:D4BE:FACD:384D:7CE2:5D75:1741:8A3C:40E8:904F

Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89 

Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb

Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 6EE7076F52C88372

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 12 22:23:24 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 1A924B48555F3BED

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 22:27:22 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity

Dec 12 22:27:23 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.10 48:5b:39:f2:73:26 

Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.10 48:5b:39:f2:73:26 Dawn-James

Dec 12 22:50:19 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 12 22:50:20 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:55 ~~ kern.warn kernel: [92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:55 ~~ kern.warn kernel: [92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:28:19 ~~ kern.warn kernel: [92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:28:19 ~~ kern.warn kernel: [92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:29:20 ~~ kern.warn kernel: [92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:29:20 ~~ kern.warn kernel: [92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:32:23 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: disassociated due to inactivity

Dec 12 23:32:24 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61 

Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain

Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.9 00:0a:95:d5:61:80 

Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.9 00:0a:95:d5:61:80 Barb

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 23:59:13 ~~ user.debug : ttraff: data for 12-12-2017 commited to nvram

Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 00:03:56 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: disassociated

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 01:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee 

Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache

Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 

Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: authenticated

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: associated (aid 2)

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec RADIUS: starting accounting session B7C49F6CF993BB50

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: pairwise key handshake completed (RSN)

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: authenticated

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: associated (aid 6)

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 RADIUS: starting accounting session C79895AC58F005F7

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 WPA: pairwise key handshake completed (RSN)

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:09:37 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: disassociated

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.6 00:14:51:16:d2:78 

Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.6 00:14:51:16:d2:78 DogCow

Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 03:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.12 54:ab:3a:19:07:3e 

Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.12 54:ab:3a:19:07:3e QTAIR7-pri

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: authenticated

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: associated (aid 1)

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f RADIUS: starting accounting session 534CCC3F0172DFB1

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: pairwise key handshake completed (RSN)

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast

Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.8 c8:60:00:8d:89:d8 

Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.8 c8:60:00:8d:89:d8 BARB-PC

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.147 d0:e1:40:a6:00:b1 

Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.147 d0:e1:40:a6:00:b1 Barbaras-iPad

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 05:14:06 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 7CC4257E4153379A

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 13 05:14:07 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61 

Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.133 40:33:1a:f2:9f:12 

Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.133 40:33:1a:f2:9f:12 Tisha_iPhone-6s

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.11 00:15:f2:eb:05:44 

Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.11 00:15:f2:eb:05:44 lildeb

Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: authenticated

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: associated (aid 2)

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 RADIUS: starting accounting session 530F7BA419D3E125

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: pairwise key handshake completed (RSN)

Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.130 40:16:3b:ae:ee:e6 

Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.130 40:16:3b:ae:ee:e6 Tisha-TV

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 07:08:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity

Dec 13 07:08:48 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 07:19:46 ~~ kern.warn kernel: [120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:46 ~~ kern.warn kernel: [120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:47 ~~ kern.warn kernel: [120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:47 ~~ kern.warn kernel: [120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:50 ~~ kern.warn kernel: [120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:50 ~~ kern.warn kernel: [120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:52 ~~ kern.warn kernel: [120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:52 ~~ kern.warn kernel: [120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:53 ~~ kern.warn kernel: [120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:53 ~~ kern.warn kernel: [120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:56 ~~ kern.warn kernel: [120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:56 ~~ kern.warn kernel: [120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:20:29 ~~ kern.warn kernel: [120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:20:29 ~~ kern.warn kernel: [120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 07:25:12 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity

Dec 13 07:25:13 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: authenticated

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: associated (aid 5)

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 RADIUS: starting accounting session C56027198357E771

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: pairwise key handshake completed (RSN)

Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 

Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 4D386E15359E9793

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 13 07:50:43 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 13 07:50:44 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 07:51:46 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake failed (RSN) after 4 tries

Dec 13 07:51:51 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to local deauth request

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 3C45C8FA693622A1

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 13 08:00:29 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity

Dec 13 08:00:30 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:00:31 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: disassociated due to inactivity

Dec 13 08:00:32 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 08:07:25 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated

Dec 13 08:07:26 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.125 50:82:d5:c3:86:4d 

Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.125 50:82:d5:c3:86:4d Barb-iPhone

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session F54B4D31360B57BF

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri

Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437

Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.5 00:0a:95:b5:1c:38 

Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.5 00:0a:95:b5:1c:38 1505

Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee 

Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89 

Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb

Dec 13 08:53:58 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 13 08:53:59 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437

Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c 

Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad

Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: authenticated

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: associated (aid 3)

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 RADIUS: starting accounting session A2F8346B873B7913

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: pairwise key handshake completed (RSN)

Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:17:53 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:08 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:27 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:42 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:03 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:19:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:19:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:20:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:20:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:20:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:20:45 ~~ authpriv.info dropbear[23922]: Child connection from 10.72.29.7:51308

Dec 13 10:20:45 ~~ authpriv.notice dropbear[23922]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51308

Dec 13 10:20:57 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:21:18 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:21:33 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:21:57 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:22:12 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

### Release & renew WAN --- although it was no problem...

Dec 13 10:22:37 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:38 ~~ user.info : process_monitor : Process Monitor successfully stopped

Dec 13 10:22:38 ~~ user.info : process_monitor successfully started

Dec 13 10:22:38 ~~ daemon.debug process_monitor[24098]: We need to re-update after 3600 seconds

Dec 13 10:22:38 ~~ daemon.info process_monitor[24098]: set timer: 3600 seconds, callback: ntp_main()

Dec 13 10:22:39 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:22:39 ~~ user.info : wland : WLAN daemon successfully stopped

Dec 13 10:22:40 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:41 ~~ user.info : wland : WLAN daemon successfully started

Dec 13 10:22:41 ~~ user.info : WAN is up. IP: 96.46.208.155

Dec 13 10:22:41 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped

Dec 13 10:22:41 ~~ daemon.err openvpn[3372]: event_wait : Interrupted system call (code=4)

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: Closing TUN/TAP interface

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /sbin/ifconfig tun2 0.0.0.0

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: SIGTERM[hard,] received, process exiting

Dec 13 10:22:41 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...

Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017

Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.09

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14

Dec 13 10:22:41 ~~ daemon.warn openvpn[24670]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Diffie-Hellman initialized with 4096 bit key

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP device tun2 opened

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP TX queue length set to 100

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Socket Buffers: R=[180224->180224] S=[180224->180224]

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link local (bound): [AF_INET][undef]:42257

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link remote: [AF_UNSPEC]

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MULTI: multi_init called, r=256 v=256

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: succeeded -> ifconfig_pool_set()

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL LIST

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: mrjcd101,10.172.128.242

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Initialization Sequence Completed

Dec 13 10:22:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

### Apply Settings in ../Services.asp and log back in


root@~~:~# Connection to ~~.mrjcd.com closed by remote host.

Connection to ~~.mrjcd.com closed.


da-box:~ mrjcd$ ssh root@~~.mrjcd.com -p xxxxxxx

DD-WRT v3.0-r34015M kongat (c) 2017 NewMedia-NET GmbH

Release: 12/10/17

==========================================================

 

     ___  ___     _      _____  ______       ____  ___ 

    / _ \/ _ \___| | /| / / _ \/_  __/ _  __|_  / / _ \

   / // / // /___/ |/ |/ / , _/ / /   | |/ //_ <_/ // /

  /____/____/    |__/|__/_/|_| /_/    |___/____(_)___/ 

                                                     

                       DD-WRT v3.0

                   http://www.dd-wrt.com

 

==========================================================



BusyBox v1.27.2 (2017-12-10 15:33:31 CET) built-in shell (ash)


root@~~:~# cat /tmp/var/log/messages

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 07CB362F5673BDB3

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 21:13:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 12 21:13:35 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session FDFA03599CE8739E

Dec 12 21:13:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 21:13:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 12 21:14:58 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:15:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.52 c0:56:27:08:b2:93 EA8500-openVPN

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session C22737AE5B604139

Dec 12 21:15:14 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 12 21:15:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 12 21:16:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPRELEASE(br0) 10.72.29.52 c0:56:27:08:b2:93 

Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 21:17:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 00:0a:95:d5:77:8c 

Dec 12 21:17:18 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 12 21:17:19 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 93B5371F665E8788

Dec 12 21:18:18 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 12 21:18:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 12 21:18:25 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 12 21:18:26 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:20:31 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)

Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17

Dec 12 21:20:32 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 01C22BC56A2483C1

Dec 12 21:31:30 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 12 21:31:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537960] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.537992] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:38:08 ~~ kern.warn kernel: [85620.545195] ath10k_pci 0000:01:00.0: received unexpected tx_fetch_ind event: in push mode

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 21:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 21:51:43 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c 

Dec 12 21:51:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad

Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:51:55 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 2)

Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session 5A38FD9959F5EA17

Dec 12 21:51:56 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:53:46 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session D770113B3769F967

Dec 12 21:53:46 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 12 21:53:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri

Dec 12 21:53:47 ~~ daemon.info hostapd: ath0: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513129562 received

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513129562 is valid from [2017-12-13] to [2017-12-14]

Dec 12 22:09:40 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 71BE:560C:F97D:FB6E:A677:B06A:2A37:D4BE:FACD:384D:7CE2:5D75:1741:8A3C:40E8:904F

Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89 

Dec 12 22:10:22 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb

Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 22:12:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 6EE7076F52C88372

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 22:23:23 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 12 22:23:24 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 1A924B48555F3BED

Dec 12 22:23:26 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 12 22:23:26 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 12 22:27:22 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity

Dec 12 22:27:23 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.10 48:5b:39:f2:73:26 

Dec 12 22:33:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.10 48:5b:39:f2:73:26 Dawn-James

Dec 12 22:50:19 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 12 22:50:20 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 12 22:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 22:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 12 23:07:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 12 23:10:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.106275] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.116800] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.117420] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:35 ~~ kern.warn kernel: [92187.130749] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:55 ~~ kern.warn kernel: [92207.193994] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:27:55 ~~ kern.warn kernel: [92207.228740] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:28:19 ~~ kern.warn kernel: [92231.720310] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:28:19 ~~ kern.warn kernel: [92231.797515] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:29:20 ~~ kern.warn kernel: [92292.461557] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:29:20 ~~ kern.warn kernel: [92292.499514] ath10k_pci 0001:01:00.0: Unknown eventid: 36925

Dec 12 23:32:23 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: disassociated due to inactivity

Dec 12 23:32:24 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61 

Dec 12 23:37:34 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain

Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.9 00:0a:95:d5:61:80 

Dec 12 23:50:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.9 00:0a:95:d5:61:80 Barb

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 12 23:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 12 23:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 12 23:59:13 ~~ user.debug : ttraff: data for 12-12-2017 commited to nvram

Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 00:02:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 00:03:56 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: disassociated

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 00:05:27 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 00:05:27 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 13 00:11:07 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 00:23:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 00:51:42 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 00:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 00:57:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513140421 received

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513140421 is valid from [2017-12-13] to [2017-12-14]

Dec 13 01:12:06 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is 1F82:C3D8:1E4A:5536:0C01:8710:B383:2F20:0B2A:314B:208B:F244:F25C:A185:2BC8:1852

Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 01:35:05 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 01:51:42 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 01:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 01:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 01:52:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 02:12:48 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee 

Dec 13 02:25:21 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache

Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 02:47:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 

Dec 13 02:51:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 02:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 02:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 02:53:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: authenticated

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec IEEE 802.11: associated (aid 2)

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec RADIUS: starting accounting session B7C49F6CF993BB50

Dec 13 03:05:28 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: pairwise key handshake completed (RSN)

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.132 a4:77:33:80:1a:ec 

Dec 13 03:05:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.132 a4:77:33:80:1a:ec Tisha-Chromecast

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: authenticated

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: associated (aid 6)

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 RADIUS: starting accounting session C79895AC58F005F7

Dec 13 03:08:36 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 WPA: pairwise key handshake completed (RSN)

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:08:40 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.156 f0:a2:25:1f:db:09 

Dec 13 03:09:37 ~~ daemon.info hostapd: ath0.1: STA f0:a2:25:1f:db:09 IEEE 802.11: disassociated

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 03:13:05 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.6 00:14:51:16:d2:78 

Dec 13 03:28:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.6 00:14:51:16:d2:78 DogCow

Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 03:42:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 03:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 03:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 03:51:44 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.12 54:ab:3a:19:07:3e 

Dec 13 03:59:14 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.12 54:ab:3a:19:07:3e QTAIR7-pri

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513151281 received

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513151281 is valid from [2017-12-13] to [2017-12-14]

Dec 13 04:13:38 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A294:431D:5240:CA10:532B:59AF:0EF5:3E72:0E0C:6760:9D27:0FC8:FE39:C5BE:A700:132F

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: authenticated

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f IEEE 802.11: associated (aid 1)

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f RADIUS: starting accounting session 534CCC3F0172DFB1

Dec 13 04:31:46 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: pairwise key handshake completed (RSN)

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br1) 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.139 08:9e:08:48:4a:7f 

Dec 13 04:31:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.139 08:9e:08:48:4a:7f mrjcd-Chromecast

Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 04:37:08 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.8 c8:60:00:8d:89:d8 

Dec 13 04:41:41 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.8 c8:60:00:8d:89:d8 BARB-PC

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 04:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 04:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.147 d0:e1:40:a6:00:b1 

Dec 13 05:04:37 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.147 d0:e1:40:a6:00:b1 Barbaras-iPad

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 05:13:32 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 05:13:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 05:14:06 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 7CC4257E4153379A

Dec 13 05:14:06 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 05:14:07 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 13 05:14:07 ~~ daemon.info hostapd: ath0: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 05:15:10 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 05:32:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.145 20:ee:28:47:2b:61 

Dec 13 05:36:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.145 20:ee:28:47:2b:61 HarlowRain

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 05:51:42 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 05:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.133 40:33:1a:f2:9f:12 

Dec 13 06:05:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.133 40:33:1a:f2:9f:12 Tisha_iPhone-6s

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 06:15:23 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.11 00:15:f2:eb:05:44 

Dec 13 06:22:20 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.11 00:15:f2:eb:05:44 lildeb

Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 06:27:09 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: authenticated

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: associated (aid 2)

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 RADIUS: starting accounting session 530F7BA419D3E125

Dec 13 06:48:38 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: pairwise key handshake completed (RSN)

Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.130 40:16:3b:ae:ee:e6 

Dec 13 06:48:38 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.130 40:16:3b:ae:ee:e6 Tisha-TV

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake completed (RSN)

Dec 13 06:51:42 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 06:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 07:08:47 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated due to inactivity

Dec 13 07:08:48 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:10:15 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:10:15 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:10:52 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:10:52 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513162081 received

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513162081 is valid from [2017-12-13] to [2017-12-14]

Dec 13 07:16:42 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is BC5D:2EAB:0607:8125:3B45:E240:3846:C8AD:B080:3F30:D57E:9DE8:83BE:5B12:5B0B:EE35

Dec 13 07:19:46 ~~ kern.warn kernel: [120518.154360] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:46 ~~ kern.warn kernel: [120518.167459] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:47 ~~ kern.warn kernel: [120518.949841] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:47 ~~ kern.warn kernel: [120518.971804] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:50 ~~ kern.warn kernel: [120521.945271] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:50 ~~ kern.warn kernel: [120521.958422] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120522.732073] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120522.744327] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120523.356604] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:51 ~~ kern.warn kernel: [120523.371688] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:52 ~~ kern.warn kernel: [120524.082703] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:52 ~~ kern.warn kernel: [120524.096593] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:53 ~~ kern.warn kernel: [120525.188920] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:53 ~~ kern.warn kernel: [120525.342917] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:56 ~~ kern.warn kernel: [120527.626787] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:19:56 ~~ kern.warn kernel: [120527.640233] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:20:29 ~~ kern.warn kernel: [120561.150890] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:20:29 ~~ kern.warn kernel: [120561.185105] ath10k_pci 0000:01:00.0: Unknown eventid: 36925

Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 07:22:10 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 07:25:12 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity

Dec 13 07:25:13 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: authenticated

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: associated (aid 5)

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 RADIUS: starting accounting session C56027198357E771

Dec 13 07:36:23 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: pairwise key handshake completed (RSN)

Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 

Dec 13 07:36:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.166 f8:95:c7:9f:ee:f1 android-4ee60273029ebb3f

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: authenticated

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 IEEE 802.11: associated (aid 1)

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 RADIUS: starting accounting session D1AB140D89B24621

Dec 13 07:37:47 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: pairwise key handshake completed (RSN)

Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.56 1c:3e:84:8d:15:99 

Dec 13 07:37:47 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.56 1c:3e:84:8d:15:99 Will-Be-Was

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: authenticated

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: associated (aid 6)

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b RADIUS: starting accounting session 4D386E15359E9793

Dec 13 07:49:59 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b WPA: pairwise key handshake completed (RSN)

Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.153 48:d7:05:c6:fc:1b 

Dec 13 07:50:01 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.153 48:d7:05:c6:fc:1b C17MWG9MG085

Dec 13 07:50:43 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: disassociated

Dec 13 07:50:44 ~~ daemon.info hostapd: ath0.1: STA 48:d7:05:c6:fc:1b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 07:51:36 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 07:51:42 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 07:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 07:51:46 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 WPA: group key handshake failed (RSN) after 4 tries

Dec 13 07:51:51 ~~ daemon.info hostapd: ath1.1: STA 40:16:3b:ae:ee:e6 IEEE 802.11: deauthenticated due to local deauth request

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: authenticated

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: associated (aid 2)

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 RADIUS: starting accounting session 3C45C8FA693622A1

Dec 13 07:57:34 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: pairwise key handshake completed (RSN)

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPDISCOVER(br0) ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPOFFER(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.13 ec:88:92:6d:e8:e2 

Dec 13 07:57:35 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.13 ec:88:92:6d:e8:e2 JCD-Droid-Turbo-pri

Dec 13 08:00:29 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: disassociated due to inactivity

Dec 13 08:00:30 ~~ daemon.info hostapd: ath0.1: STA f8:95:c7:9f:ee:f1 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:00:31 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: disassociated due to inactivity

Dec 13 08:00:32 ~~ daemon.info hostapd: ath0.1: STA 40:33:1a:f2:9f:12 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 08:03:28 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 08:07:25 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: disassociated

Dec 13 08:07:26 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.125 50:82:d5:c3:86:4d 

Dec 13 08:09:32 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.125 50:82:d5:c3:86:4d Barb-iPhone

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: authenticated

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc IEEE 802.11: associated (aid 4)

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc RADIUS: starting accounting session F54B4D31360B57BF

Dec 13 08:09:45 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: pairwise key handshake completed (RSN)

Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.4 78:1f:db:9c:53:bc 

Dec 13 08:09:46 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.4 78:1f:db:9c:53:bc Note-8-pri

Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 08:17:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]

Dec 13 08:17:20 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437

Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.5 00:0a:95:b5:1c:38 

Dec 13 08:19:50 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.5 00:0a:95:b5:1c:38 1505

Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.2 00:14:51:03:e5:ee 

Dec 13 08:27:57 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.2 00:14:51:03:e5:ee Apache

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 08:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 08:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.1 20:cf:30:9b:5a:89 

Dec 13 08:51:56 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.1 20:cf:30:9b:5a:89 bigdeb

Dec 13 08:53:58 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: disassociated

Dec 13 08:53:59 ~~ daemon.info hostapd: ath1: STA ec:88:92:6d:e8:e2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 09:12:12 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.7 00:0a:95:d5:77:8c 

Dec 13 09:17:16 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.7 00:0a:95:d5:77:8c da-Box

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server certificate with serial #1513172882 received

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: This certificate is valid

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]

Dec 13 09:17:24 ~~ daemon.info dnscrypt-proxy[2322]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437

Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.28.109 e4:e4:ab:39:8f:6d 

Dec 13 09:33:39 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.28.109 e4:e4:ab:39:8f:6d Carrolls-iPhone

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0: STA 1c:3e:84:8d:15:99 WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA a4:77:33:80:1a:ec WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA 08:9e:08:48:4a:7f WPA: group key handshake completed (RSN)

Dec 13 09:51:42 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 54:ab:3a:19:07:3e WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1.1: STA 20:ee:28:47:2b:61 WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 78:1f:db:9c:53:bc WPA: group key handshake completed (RSN)

Dec 13 09:51:43 ~~ daemon.info hostapd: ath1: STA 70:8b:cd:48:ca:3c WPA: group key handshake completed (RSN)

Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.45 70:8b:cd:48:ca:3c 

Dec 13 09:51:48 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.45 70:8b:cd:48:ca:3c ZenPad

Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br0) 10.72.29.59 a4:5d:36:f8:af:ec 

Dec 13 10:07:13 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br0) 10.72.29.59 a4:5d:36:f8:af:ec JonSteevPrinter

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: authenticated

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 IEEE 802.11: associated (aid 3)

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 RADIUS: starting accounting session A2F8346B873B7913

Dec 13 10:16:23 ~~ daemon.info hostapd: ath0.1: STA c0:33:5e:3f:9c:56 WPA: pairwise key handshake completed (RSN)

Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:23 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPREQUEST(br1) 10.15.26.135 c0:33:5e:3f:9c:56 

Dec 13 10:16:24 ~~ daemon.info dnsmasq-dhcp[2416]: DHCPACK(br1) 10.15.26.135 c0:33:5e:3f:9c:56 JonXboxOne

Dec 13 10:17:53 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:08 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:27 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:18:42 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:18:48 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:03 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:19:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:19:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:19:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:20:09 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:20:24 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:20:42 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:20:45 ~~ authpriv.info dropbear[23922]: Child connection from 10.72.29.7:51308

Dec 13 10:20:45 ~~ authpriv.notice dropbear[23922]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51308

Dec 13 10:20:57 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:21:18 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:21:33 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:21:57 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:22:12 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

### Release & renew WAN --- although it was no problem...

Dec 13 10:22:37 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:37 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:38 ~~ user.info : process_monitor : Process Monitor successfully stopped

Dec 13 10:22:38 ~~ user.info : process_monitor successfully started

Dec 13 10:22:38 ~~ daemon.debug process_monitor[24098]: We need to re-update after 3600 seconds

Dec 13 10:22:38 ~~ daemon.info process_monitor[24098]: set timer: 3600 seconds, callback: ntp_main()

Dec 13 10:22:39 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:39 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:39 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:22:39 ~~ user.info : wland : WLAN daemon successfully stopped

Dec 13 10:22:40 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:22:40 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:22:41 ~~ user.info : wland : WLAN daemon successfully started

Dec 13 10:22:41 ~~ user.info : WAN is up. IP: 96.46.208.155

Dec 13 10:22:41 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped

Dec 13 10:22:41 ~~ daemon.err openvpn[3372]: event_wait : Interrupted system call (code=4)

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: Closing TUN/TAP interface

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: /sbin/ifconfig tun2 0.0.0.0

Dec 13 10:22:41 ~~ daemon.notice openvpn[3372]: SIGTERM[hard,] received, process exiting

Dec 13 10:22:41 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...

Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017

Dec 13 10:22:41 ~~ daemon.notice openvpn[24668]: library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.09

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14

Dec 13 10:22:41 ~~ daemon.warn openvpn[24670]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Diffie-Hellman initialized with 4096 bit key

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP device tun2 opened

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: TUN/TAP TX queue length set to 100

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Socket Buffers: R=[180224->180224] S=[180224->180224]

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link local (bound): [AF_INET][undef]:42257

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: UDPv4 link remote: [AF_UNSPEC]

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: MULTI: multi_init called, r=256 v=256

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: succeeded -> ifconfig_pool_set()

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: IFCONFIG POOL LIST

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: mrjcd101,10.172.128.242

Dec 13 10:22:41 ~~ daemon.notice openvpn[24670]: Initialization Sequence Completed

Dec 13 10:22:54 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:23:24 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:23:39 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

Dec 13 10:24:12 ~~ daemon.info dnscrypt-proxy[2322]: Refetching server certificates

Dec 13 10:24:27 ~~ daemon.err dnscrypt-proxy[2322]: Unable to retrieve server certificates

### Apply Settings in ../Services.asp and log back in

Dec 13 10:24:45 ~~ user.info : klogd : kernel log daemon successfully stopped

Dec 13 10:24:45 ~~ user.info : ttraff : traffic counter daemon successfully stopped

Dec 13 10:24:45 ~~ kern.notice kernel: klogd: exiting

Dec 13 10:24:45 ~~ user.info : ttraff : traffic counter daemon successfully started

Dec 13 10:24:45 ~~ user.info : syslogd : syslog daemon successfully stopped

Dec 13 10:24:45 ~~ user.debug : ttraff: data collection started

Dec 13 10:24:45 ~~ syslog.info syslogd exiting

Dec 13 10:24:45 ~~ syslog.info syslogd started: BusyBox v1.27.2

Dec 13 10:24:45 ~~ user.info : klogd : klog daemon successfully started

Dec 13 10:24:45 ~~ kern.notice kernel: klogd started: BusyBox v1.27.2 (2017-12-10 15:33:31 CET)

Dec 13 10:24:46 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:24:46 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:24:46 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:24:46 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:24:46 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:24:46 ~~ user.info : dropbear : ssh daemon successfully stopped

Dec 13 10:24:46 ~~ user.info : telnetd : telnet daemon successfully stopped

Dec 13 10:24:46 ~~ user.info : dnsmasq : dnsmasq daemon successfully stopped

Dec 13 10:24:46 ~~ user.info : pptpd : pptp daemon successfully stopped

Dec 13 10:24:46 ~~ daemon.info dnsmasq[2416]: exiting on receipt of SIGTERM

Dec 13 10:24:46 ~~ user.info : telnetd : telnet daemon successfully started

Dec 13 10:24:46 ~~ user.info : hwmon successfully started

Dec 13 10:24:46 ~~ authpriv.info dropbear[23922]: Exit (root): Terminated by signal

Dec 13 10:24:46 ~~ authpriv.info dropbear[1253]: Early exit: Terminated by signal

Dec 13 10:24:46 ~~ user.info : dropbear : ssh daemon successfully started

Dec 13 10:24:46 ~~ authpriv.info dropbear[24922]: Running in background

Dec 13 10:24:46 ~~ daemon.notice dnscrypt-proxy[2322]: Stopping proxy

Dec 13 10:24:46 ~~ daemon.info dnscrypt-proxy[2322]: UDP listener shut down

Dec 13 10:24:46 ~~ daemon.info dnscrypt-proxy[2322]: TCP listener shut down

Dec 13 10:24:47 ~~ user.info : + DNS Security Extensions are supported

Dec 13 10:24:47 ~~ user.info : + Provider supposedly doesn't keep logs

Dec 13 10:24:47 ~~ daemon.notice dnscrypt-proxy[24938]: Starting dnscrypt-proxy 1.9.5

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Generating a new session key pair

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Done

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: started, version 2.78 cachesize 6144

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth DNSSEC loop-detect no-inotify

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: DNSSEC validation enabled

Dec 13 10:24:47 ~~ daemon.warn dnsmasq[24948]: warning: ignoring resolv-file flag because no-resolv is set

Dec 13 10:24:47 ~~ daemon.info dnsmasq-dhcp[24948]: DHCP, IP range 10.15.26.130 -- 10.15.26.189, lease time 12h

Dec 13 10:24:47 ~~ daemon.info dnsmasq-dhcp[24948]: DHCP, IP range 10.72.28.100 -- 10.72.28.174, lease time 1d

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain test

Dec 13 10:24:47 ~~ user.info : dnsmasq : dnsmasq daemon successfully started

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain onion

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain localhost

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain local

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain invalid

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.net

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.org

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using local addresses only for domain example.com

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using nameserver 127.0.0.1#30

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: using 2 more local addresses

Dec 13 10:24:47 ~~ daemon.info dnsmasq[24948]: read /etc/hosts - 42 addresses

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Server certificate with serial #1513172882 received

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: This certificate is valid

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Chosen certificate #1513172882 is valid from [2017-12-13] to [2017-12-14]

Dec 13 10:24:47 ~~ daemon.info dnscrypt-proxy[24938]: Server key fingerprint is A0A8:B422:BF3B:BF0B:73B1:E9D1:978D:6B80:B56E:BB1E:5F23:B374:B4F7:4A4B:8891:F437

Dec 13 10:24:47 ~~ daemon.notice dnscrypt-proxy[24938]: Proxying from 127.0.0.1:30 to 107.181.168.52:443

Dec 13 10:24:47 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:24:47 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:24:47 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:24:47 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:24:47 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:24:47 ~~ user.info : openvpnserver : OpenVPN daemon (Server) successfully stopped

Dec 13 10:24:47 ~~ daemon.err openvpn[24670]: event_wait : Interrupted system call (code=4)

Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: /tmp/openvpn/route-down.sh tun2 1500 1622 10.172.128.241 255.255.255.240 init

Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: Closing TUN/TAP interface

Dec 13 10:24:47 ~~ daemon.notice openvpn[24670]: /sbin/ifconfig tun2 0.0.0.0

Dec 13 10:24:47 ~~ user.info : klogd : kernel log daemon successfully stopped

Dec 13 10:24:47 ~~ kern.notice kernel: klogd: exiting

Dec 13 10:24:47 ~~ user.info : syslogd : syslog daemon successfully stopped

Dec 13 10:24:47 ~~ syslog.info syslogd exiting

Dec 13 10:24:47 ~~ syslog.info syslogd started: BusyBox v1.27.2

Dec 13 10:24:47 ~~ user.info : klogd : klog daemon successfully started

Dec 13 10:24:47 ~~ kern.notice kernel: klogd started: BusyBox v1.27.2 (2017-12-10 15:33:31 CET)

Dec 13 10:24:47 ~~ user.info : openvpn : OpenVPN daemon (Server) starting/restarting...

Dec 13 10:24:47 ~~ daemon.notice openvpn[25095]: OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 10 2017

Dec 13 10:24:47 ~~ daemon.notice openvpn[25095]: library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.09

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14

Dec 13 10:24:47 ~~ daemon.warn openvpn[25099]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Diffie-Hellman initialized with 4096 bit key

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: TUN/TAP device tun2 opened

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: TUN/TAP TX queue length set to 100

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: /sbin/ifconfig tun2 10.172.128.241 netmask 255.255.255.240 mtu 1500 broadcast 10.172.128.255

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Socket Buffers: R=[180224->180224] S=[180224->180224]

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: UDPv4 link local (bound): [AF_INET][undef]:42257

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: UDPv4 link remote: [AF_UNSPEC]

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: MULTI: multi_init called, r=256 v=256

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: IFCONFIG POOL: base=10.172.128.242 size=12, ipv6=0

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: ifconfig_pool_read(), in='mrjcd101,10.172.128.242', TODO: IPv6

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: succeeded -> ifconfig_pool_set()

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: IFCONFIG POOL LIST

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: mrjcd101,10.172.128.242

Dec 13 10:24:47 ~~ daemon.notice openvpn[25099]: Initialization Sequence Completed

Dec 13 10:24:48 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:24:48 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:24:48 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:24:48 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:24:48 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:24:49 ~~ user.info : vpn modules : vpn modules successfully unloaded

Dec 13 10:24:49 ~~ user.info : vpn modules : nf_conntrack_proto_gre successfully loaded

Dec 13 10:24:49 ~~ user.info : vpn modules : nf_nat_proto_gre successfully loaded

Dec 13 10:24:49 ~~ user.info : vpn modules : nf_conntrack_pptp successfully loaded

Dec 13 10:24:49 ~~ user.info : vpn modules : nf_nat_pptp successfully loaded

Dec 13 10:25:12 ~~ authpriv.info dropbear[25630]: Child connection from 10.72.29.7:51439

Dec 13 10:25:13 ~~ authpriv.notice dropbear[25630]: Pubkey auth succeeded for 'root' with key md5 ac:53:94:a4:75:d2:b7:95:be:69:5e:c3:cb:7c:3b:72 from 10.72.29.7:51439

root@~~:~# uptime

 10:26:29 up 1 day, 12:35,  load average: 0.02, 0.04, 0.00

root@~~:~# Connection to ~~.mrjcd.com closed by remote host.

Connection to ~~.mrjcd.com closed.

da-box:~ mrjcd$