Syslog (Initial Flash) Dec 31 16:00:08 R7000 syslog.info syslogd started: BusyBox v1.31.1 Dec 31 16:00:08 R7000 user.info : syslogd : daemon successfully started Dec 31 16:00:08 R7000 user.info : klogd : daemon successfully started Dec 31 16:00:08 R7000 kern.notice kernel: klogd started: BusyBox v1.31.1 (2020-02-10 10:37:13 +04) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x14: [mem 0x18002000-0x18002fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: [14e4:0502] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x10: [mem 0x1802c000-0x1802cfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x10: [mem 0x18024000-0x18024fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x10: [mem 0x18025000-0x18025fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x10: [mem 0x18026000-0x18026fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x10: [mem 0x18027000-0x18027fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x10: [mem 0x18012000-0x18012fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x10: [mem 0x18013000-0x18013fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x10: [mem 0x18014000-0x18014fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: [14e4:0510] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x1800b000-0x1800bfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x14: [mem 0x1800c000-0x1800cfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: [14e4:471a] type 00 class 0x0c0310 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x10: [mem 0x18022000-0x18022fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: [14e4:471a] type 00 class 0x0c0320 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x10: [mem 0x18021000-0x18021fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: [14e4:472a] type 00 class 0x0c0330 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x10: [mem 0x18023000-0x18023fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: [14e4:0503] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x10: [mem 0x18020000-0x18020fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: [14e4:4711] type 00 class 0x040100 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x1802a000-0x1802afff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: [14e4:0506] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x10: [mem 0x18210000-0x1821ffff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: [14e4:0507] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x10: [mem 0x18010000-0x18010fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:11.0: [14e4:0508] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.info kernel: pci 0000:00:11.0: [Firmware Bug]: reg 0x10: invalid BAR (can't size) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:11.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: [14e4:0509] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x10: [mem 0x18028000-0x18028fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: [14e4:050a] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x10: [mem 0x18029000-0x18029fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 0 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 switching to GEN2 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCI host bridge to bus 0001:00 Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0001:00: root bus resource [mem 0x08000000-0x0fffffff] Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0001:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 1 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: reg 0x10: [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: supports D1 D2 Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 1 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0001:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 switching to GEN2 Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCI host bridge to bus 0002:00 Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0002:00: root bus resource [mem 0x40000000-0x47ffffff] Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0002:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 2 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: reg 0x10: [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: supports D1 D2 Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 2 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0002:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0002:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:01:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] Dec 31 16:00:08 R7000 kern.info kernel: PCIE3 link=0 Dec 31 16:00:08 R7000 kern.info kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 31 16:00:08 R7000 kern.info kernel: io scheduler noop registered (default) Dec 31 16:00:08 R7000 kern.info kernel: io scheduler cfq registered Dec 31 16:00:08 R7000 kern.info kernel: serial8250_init Dec 31 16:00:08 R7000 kern.info kernel: Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled Dec 31 16:00:08 R7000 kern.info kernel: console [ttyS0] disabled Dec 31 16:00:08 R7000 kern.info kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:08 R7000 kern.info kernel: console [ttyS0] enabled Dec 31 16:00:08 R7000 kern.info kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:08 R7000 kern.info kernel: brd: module loaded Dec 31 16:00:08 R7000 kern.info kernel: loop: module loaded Dec 31 16:00:08 R7000 kern.err kernel: bcmsflash: found no supported devices Dec 31 16:00:08 R7000 kern.warn kernel: Boot partition size = 524288(0x80000) Dec 31 16:00:08 R7000 kern.warn kernel: lookup_nflash_rootfs_offset: offset = 0x200000 size = 0x2000000, 0x20000 Dec 31 16:00:08 R7000 kern.info kernel: found TRX Header on nflash! Dec 31 16:00:08 R7000 kern.notice kernel: nflash: squash filesystem with lzma found at block 29 Dec 31 16:00:08 R7000 kern.notice kernel: Creating 5 MTD partitions on "nflash": Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000000000-0x000000080000 : "boot" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000080000-0x000000200000 : "nvram" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000200000-0x000002200000 : "linux" Dec 31 16:00:08 R7000 kern.notice kernel: 0x0000003a0000-0x000002200000 : "rootfs" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000002200000-0x000002240000 : "board_data" Dec 31 16:00:08 R7000 kern.info kernel: PPP generic driver version 2.4.2 Dec 31 16:00:08 R7000 kern.info kernel: PPP BSD Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: PPP Deflate Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: PPP MPPE Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: NET: Registered protocol family 24 Dec 31 16:00:08 R7000 kern.info kernel: i2c /dev entries driver Dec 31 16:00:08 R7000 kern.info kernel: GACT probability NOT on Dec 31 16:00:08 R7000 kern.info kernel: Mirror/redirect action on Dec 31 16:00:08 R7000 kern.info kernel: Simple TC action Loaded Dec 31 16:00:08 R7000 kern.info kernel: netem: version 1.3 Dec 31 16:00:08 R7000 kern.info kernel: u32 classifier Dec 31 16:00:08 R7000 kern.info kernel: Performance counters on Dec 31 16:00:08 R7000 kern.info kernel: input device check on Dec 31 16:00:08 R7000 kern.info kernel: Actions configured Dec 31 16:00:08 R7000 kern.info kernel: Netfilter messages via NETLINK v0.30. Dec 31 16:00:08 R7000 kern.info kernel: nf_conntrack version 0.5.0 (3970 buckets, 15880 max) Dec 31 16:00:08 R7000 kern.warn kernel: nf_conntrack_rtsp v0.7 loading Dec 31 16:00:08 R7000 kern.info kernel: xt_time: kernel timezone is -0000 Dec 31 16:00:08 R7000 kern.info kernel: ip_set: protocol 6 Dec 31 16:00:08 R7000 kern.info kernel: gre: GRE over IPv4 demultiplexor driver Dec 31 16:00:08 R7000 kern.warn kernel: nf_nat_rtsp v0.7 loading Dec 31 16:00:08 R7000 kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team Dec 31 16:00:08 R7000 kern.info kernel: NET: Registered protocol family 17 Dec 31 16:00:08 R7000 kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Dec 31 16:00:08 R7000 kern.notice kernel: Bridge firewalling registered Dec 31 16:00:08 R7000 kern.info kernel: 8021q: 802.1Q VLAN Support v1.8 Dec 31 16:00:08 R7000 kern.notice kernel: Registering SWP/SWPB emulation handler Dec 31 16:00:08 R7000 kern.info kernel: max nvram space = 131072 Dec 31 16:00:08 R7000 kern.info kernel: read 65536 bytes to offset 0 Dec 31 16:00:08 R7000 kern.info kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 Dec 31 16:00:08 R7000 kern.info kernel: nand: device found, Manufacturer ID: 0xc2, Chip ID: 0xf1 Dec 31 16:00:08 R7000 kern.info kernel: nand: Macronix NAND 128MiB 3,3V 8-bit Dec 31 16:00:08 R7000 kern.info kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64 Dec 31 16:00:08 R7000 kern.warn kernel: Spare area=64 eccbytes 56, ecc bytes located at: Dec 31 16:00:08 R7000 kern.warn kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 Dec 31 16:00:08 R7000 kern.warn kernel: Available 7 bytes at (off,len): Dec 31 16:00:08 R7000 kern.warn kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) Dec 31 16:00:08 R7000 kern.info kernel: Scanning device for bad blocks Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 58 at 0x000000740000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 148 at 0x000001280000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 526 at 0x0000041c0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 642 at 0x000005040000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 758 at 0x000005ec0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 766 at 0x000005fc0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 787 at 0x000006260000 Dec 31 16:00:08 R7000 kern.warn kernel: Options: NO_SUBPAGE_WRITE, Dec 31 16:00:08 R7000 kern.notice kernel: Creating 1 MTD partitions on "brcmnand": Dec 31 16:00:08 R7000 kern.notice kernel: 0x000002240000-0x000008000000 : "ddwrt" Dec 31 16:00:08 R7000 kern.info kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. Dec 31 16:00:08 R7000 kern.info kernel: Freeing unused kernel memory: 344K Dec 31 16:00:08 R7000 user.info : resetbutton : resetbutton daemon successfully started Dec 31 16:00:08 R7000 kern.warn kernel: et: module license 'Proprietary' taints kernel. Dec 31 16:00:08 R7000 kern.warn kernel: Disabling lock debugging due to kernel taint Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: passivemode set to 0x0 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: txworkq set to 0x1 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_txq_thresh set to 0x400 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_timeout set to 0x3e8 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_framecnt set to 0x20 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_dyn_thresh set to 0 Dec 31 16:00:08 R7000 kern.info kernel: ET Corerev 5 Dec 31 16:00:08 R7000 kern.warn kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: Probing device 'eth0' Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: trying a 53012! at eth0 Dec 31 16:00:08 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: found a 53012! at eth0 Dec 31 16:00:08 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:08 R7000 kern.warn kernel: wl_module_init: passivemode set to 0x0 Dec 31 16:00:08 R7000 kern.warn kernel: wl_module_init: txworkq set to 0x1 Dec 31 16:00:08 R7000 kern.warn kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.warn kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.warn kernel: eth0: mixed HW and IP checksum settings. Dec 31 16:00:08 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:08 R7000 daemon.info mstpd[614]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:08 R7000 daemon.info mstpd[614]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:08 R7000 daemon.info mstpd[614]: error, CTL_set_msti_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:09 R7000 daemon.info mstpd[614]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:09 R7000 daemon.info mstpd[614]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : bridge : interface vlan1 successfully added to bridge br0 Dec 31 16:00:09 R7000 kern.info kernel: device vlan1 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: device eth0 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:09 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:09 R7000 user.info : bridge : interface eth1 successfully added to bridge br0 Dec 31 16:00:09 R7000 kern.info kernel: device eth1 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:09 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:10 R7000 user.info : bridge : interface eth2 successfully added to bridge br0 Dec 31 16:00:10 R7000 kern.info kernel: device eth2 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 user.info : wland : daemon successfully started Dec 31 16:00:10 R7000 kern.notice kernel: random: startservices: uninitialized urandom read (4 bytes read, 114 bits of entropy available) Dec 31 16:00:10 R7000 user.info : klogd : kernel log daemon successfully stopped Dec 31 16:00:10 R7000 kern.notice kernel: klogd: exiting Dec 31 16:00:10 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:10 R7000 user.info : syslogd : syslog daemon successfully stopped Dec 31 16:00:10 R7000 syslog.info syslogd exiting Dec 31 16:00:10 R7000 syslog.info syslogd started: BusyBox v1.31.1 Dec 31 16:00:10 R7000 kern.notice kernel: klogd started: BusyBox v1.31.1 (2020-02-10 10:37:13 +04) Dec 31 16:00:10 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 16:00:10 R7000 kern.alert kernel: fast-classifier: registered Dec 31 16:00:10 R7000 kern.notice kernel: random: dropbearconvert: uninitialized urandom read (32 bytes read, 125 bits of entropy available) Dec 31 16:00:10 R7000 kern.notice kernel: random: dropbear: uninitialized urandom read (32 bytes read, 128 bits of entropy available) Dec 31 16:00:10 R7000 kern.info kernel: device vlan2 entered promiscuous mode Dec 31 16:00:10 R7000 user.info : cron : daemon successfully started Dec 31 16:00:10 R7000 cron.info cron[861]: (CRON) STARTUP (fork ok) Dec 31 16:00:10 R7000 kern.notice kernel: random: nonblocking pool is initialized Dec 31 16:00:10 R7000 user.info : dropbear : ssh daemon successfully started Dec 31 16:00:10 R7000 authpriv.info dropbear[868]: Running in background Dec 31 16:00:10 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Dec 31 16:00:10 R7000 user.info : + Namecoin domains can be resolved Dec 31 16:00:10 R7000 user.info : + Provider supposedly doesn't keep logs Dec 31 16:00:10 R7000 daemon.notice dnscrypt-proxy[872]: Starting dnscrypt-proxy 1.9.5 Dec 31 16:00:10 R7000 daemon.info dnscrypt-proxy[872]: Generating a new session key pair Dec 31 16:00:10 R7000 daemon.info dnscrypt-proxy[872]: Done Dec 31 16:00:11 R7000 daemon.crit dnsmasq[876]: conntrack support not available: set HAVE_CONNTRACK in src/config.h Dec 31 16:00:11 R7000 daemon.crit dnsmasq[876]: FAILED to start up Dec 31 16:00:11 R7000 user.info : dnsmasq : daemon successfully started Dec 31 16:00:11 R7000 user.info : vpn modules : vpn modules successfully unloaded Dec 31 16:00:11 R7000 kern.info kernel: device vlan2 left promiscuous mode Dec 31 16:00:11 R7000 user.info : ttraff : traffic counter daemon successfully started Dec 31 16:00:11 R7000 user.info wsdd2[1004]: starting. Dec 31 16:00:11 R7000 user.info : smbd : samba started Dec 31 16:00:11 R7000 user.err wsdd2[1004]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Dec 31 16:00:11 R7000 local5.err usmbd: [usmbd-worker/1019]: ERROR: Can't open `/tmp/smb.db': No such file or directory Dec 31 16:00:11 R7000 local5.err usmbd: [usmbd-worker/1019]: ERROR: User database file does not exist. Only guest sessions (if permitted) will work. Dec 31 16:00:11 R7000 kern.warn kernel: ACCEPT IN= OUT=br0 SRC=192.168.1.1 DST=224.0.0.22 LEN=48 TOS=0x00 PREC=0xC0 TTL=1 ID=0 DF OPT (94040000) PROTO=2 MARK=0x154 Dec 31 16:00:12 R7000 kern.warn kernel: ACCEPT IN= OUT=br0 SRC=192.168.1.1 DST=224.0.0.22 LEN=48 TOS=0x00 PREC=0xC0 TTL=1 ID=0 DF OPT (94040000) PROTO=2 MARK=0x154 Dec 31 16:00:12 R7000 daemon.info httpd[1037]: httpd : httpd SSL server started at port 443 Dec 31 16:00:13 R7000 user.info : nas : wait for network init Dec 31 16:00:13 R7000 user.info : httpd : https daemon successfully started Dec 31 16:00:14 R7000 user.info : dnscrypt-proxy : daemon successfully stopped Dec 31 16:00:14 R7000 daemon.notice dnscrypt-proxy[872]: Stopping proxy Dec 31 16:00:14 R7000 daemon.info dnscrypt-proxy[872]: TCP listener shut down Dec 31 16:00:14 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Dec 31 16:00:14 R7000 user.info : + Namecoin domains can be resolved Dec 31 16:00:14 R7000 user.info : + Provider supposedly doesn't keep logs Dec 31 16:00:14 R7000 daemon.notice dnscrypt-proxy[1065]: Starting dnscrypt-proxy 1.9.5 Dec 31 16:00:14 R7000 daemon.info dnscrypt-proxy[1065]: Generating a new session key pair Dec 31 16:00:14 R7000 daemon.info dnscrypt-proxy[1065]: Done Dec 31 16:00:14 R7000 daemon.crit dnsmasq[1067]: conntrack support not available: set HAVE_CONNTRACK in src/config.h Dec 31 16:00:14 R7000 daemon.crit dnsmasq[1067]: FAILED to start up Dec 31 16:00:14 R7000 user.info : dnsmasq : daemon successfully started Dec 31 16:00:14 R7000 user.info : wland : daemon successfully stopped Dec 31 16:00:14 R7000 user.info : wland : daemon successfully started Dec 31 16:00:14 R7000 user.info : wan : WAN is up. IP: 66.189.252.17 Dec 31 16:00:14 R7000 user.info : process_monitor : successfully started Dec 31 16:00:15 R7000 user.info : vpn modules : vpn modules successfully unloaded Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=164 TOS=0x00 PREC=0x00 TTL=64 ID=30306 PROTO=UDP SPT=27036 DPT=27036 LEN=144 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=69 TOS=0x00 PREC=0x00 TTL=64 ID=30307 PROTO=UDP SPT=27036 DPT=27036 LEN=49 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=63 ID=47307 PROTO=UDP SPT=58537 DPT=53 LEN=54 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=78 TOS=0x00 PREC=0x00 TTL=63 ID=47309 PROTO=UDP SPT=56606 DPT=53 LEN=58 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN= OUT=br0 SRC=192.168.1.1 DST=224.0.0.22 LEN=48 TOS=0x00 PREC=0xC0 TTL=1 ID=0 DF OPT (94040000) PROTO=2 MARK=0x154 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:00:00:fc:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=224.0.0.252 LEN=54 TOS=0x00 PREC=0x00 TTL=1 ID=63610 PROTO=UDP SPT=56246 DPT=5355 LEN=34 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=47308 PROTO=UDP SPT=62071 DPT=53 LEN=50 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30308 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30309 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30310 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.62.236.171 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=32210 DF PROTO=TCP SPT=27166 DPT=80 SEQ=3781761646 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=63 ID=47311 PROTO=UDP SPT=60098 DPT=53 LEN=47 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=185.25.182.77 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=1101 DF PROTO=TCP SPT=27167 DPT=443 SEQ=1129815084 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=63 ID=47310 PROTO=UDP SPT=64061 DPT=53 LEN=54 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=47312 PROTO=UDP SPT=51990 DPT=53 LEN=56 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=162.254.192.34 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=24998 DF PROTO=TCP SPT=27168 DPT=80 SEQ=11331004 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=47313 PROTO=UDP SPT=56328 DPT=53 LEN=56 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=63 ID=47314 PROTO=UDP SPT=55206 DPT=53 LEN=47 Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=162.254.196.84 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=17335 DF PROTO=TCP SPT=27169 DPT=443 SEQ=2624993922 ACK=0 WINDOW=64240 RES=0x00 SYN URG Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=155.133.248.53 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=16582 DF PROTO=TCP SPT=27170 DPT=27020 SEQ=3422299339 ACK=0 WINDOW=64240 RES=0x00 SYN U Dec 31 16:00:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=155.133.248.51 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=16985 DF PROTO=TCP SPT=27171 DPT=27021 SEQ=1757187353 ACK=0 WINDOW=64240 RES=0x00 SYN U Dec 31 16:00:15 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30311 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30312 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30313 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=47315 PROTO=UDP SPT=49775 DPT=53 LEN=42 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=47316 PROTO=UDP SPT=61791 DPT=53 LEN=49 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=56592 PROTO=UDP SPT=61791 DPT=53 LEN=49 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=13.107.4.52 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=47905 DF PROTO=TCP SPT=27172 DPT=80 SEQ=1692149097 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=155.133.248.53 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=16588 DF PROTO=TCP SPT=27173 DPT=27021 SEQ=879681048 ACK=0 WINDOW=64240 RES=0x00 SYN UR Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=63 ID=47317 PROTO=UDP SPT=49509 DPT=53 LEN=54 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=155.133.246.69 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=24462 DF PROTO=TCP SPT=27174 DPT=27020 SEQ=1580533365 ACK=0 WINDOW=64240 RES=0x00 SYN U Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=63 ID=47318 PROTO=UDP SPT=63621 DPT=53 LEN=54 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=162.254.195.82 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=52811 DF PROTO=TCP SPT=27175 DPT=443 SEQ=1424205703 ACK=0 WINDOW=64240 RES=0x00 SYN URG Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=63 ID=47319 PROTO=UDP SPT=62741 DPT=53 LEN=54 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=162.254.192.100 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=43878 DF PROTO=TCP SPT=27176 DPT=27020 SEQ=2580795449 ACK=0 WINDOW=64240 RES=0x00 SYN Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30314 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30315 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30316 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=47320 PROTO=UDP SPT=54713 DPT=53 LEN=40 Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=42.1.63.122 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=36711 DF PROTO=TCP SPT=27177 DPT=80 SEQ=102476032 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 O Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=164 TOS=0x00 PREC=0x00 TTL=64 ID=30317 PROTO=UDP SPT=27036 DPT=27036 LEN=144 Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30318 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30319 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=30320 PROTO=UDP SPT=137 DPT=137 LEN=76 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52784 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=47321 PROTO=UDP SPT=58556 DPT=53 LEN=49 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=69 TOS=0x00 PREC=0x00 TTL=64 ID=30321 PROTO=UDP SPT=27036 DPT=27036 LEN=49 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.46.210.226 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=12638 DF PROTO=TCP SPT=27178 DPT=443 SEQ=3107961598 ACK=0 WINDOW=64240 RES=0x00 SYN URGP Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.46.210.226 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=12639 DF PROTO=TCP SPT=27179 DPT=443 SEQ=2475442186 ACK=0 WINDOW=64240 RES=0x00 SYN URGP Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=71 TOS=0x00 PREC=0x00 TTL=63 ID=47322 PROTO=UDP SPT=56669 DPT=53 LEN=51 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.55.37.193 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=50833 DF PROTO=TCP SPT=27180 DPT=443 SEQ=1416193371 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.46.210.226 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=12642 DF PROTO=TCP SPT=27181 DPT=443 SEQ=4151739671 ACK=0 WINDOW=64240 RES=0x00 SYN URGP Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.55.37.193 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=50835 DF PROTO=TCP SPT=27183 DPT=443 SEQ=2595698082 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52785 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=23.55.37.193 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=50834 DF PROTO=TCP SPT=27182 DPT=443 SEQ=1583578601 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=47323 PROTO=UDP SPT=62596 DPT=53 LEN=40 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.90.23.208 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=4352 DF PROTO=TCP SPT=27185 DPT=443 SEQ=1608047994 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.90.23.208 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=4351 DF PROTO=TCP SPT=27184 DPT=443 SEQ=2218327410 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=63 ID=47324 PROTO=UDP SPT=49736 DPT=53 LEN=43 Dec 31 16:00:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=72.21.91.29 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=10947 DF PROTO=TCP SPT=27186 DPT=80 SEQ=2314464373 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=47325 PROTO=UDP SPT=56796 DPT=53 LEN=48 Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=52.230.222.68 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=14037 DF PROTO=TCP SPT=27187 DPT=443 SEQ=1957604819 ACK=0 WINDOW=64240 RES=0x00 SYN URGP Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.90.23.208 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=4391 DF PROTO=TCP SPT=27188 DPT=443 SEQ=313752888 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52786 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Dec 31 16:00:19 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.3 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=55630 PROTO=TCP SPT=443 DPT=27065 SEQ=3936889586 ACK=1727085609 WINDOW=248 RES=0 Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=7181 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=79 Dec 31 16:00:19 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:d7 SRC=52.230.222.68 DST=66.189.252.17 LEN=215 TOS=0x00 PREC=0x00 TTL=108 ID=9205 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Dec 31 16:00:19 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:d7 SRC=52.230.222.68 DST=66.189.252.17 LEN=215 TOS=0x00 PREC=0x00 TTL=108 ID=9206 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062281 ACK=4121569832 WINDOW=6960 Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=72 TOS=0x00 PREC=0x00 TTL=63 ID=47326 PROTO=UDP SPT=65033 DPT=53 LEN=52 Dec 31 16:00:19 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:86 SRC=52.230.222.68 DST=66.189.252.17 LEN=390 TOS=0x00 PREC=0x00 TTL=108 ID=9207 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Dec 31 16:00:19 R7000 daemon.err ntpclient[1074]: Failed resolving address to hostname 2.pool.ntp.org: Try again Dec 31 16:00:19 R7000 daemon.err ntpclient[1074]: Failed resolving server 2.pool.ntp.org: Network is down Dec 31 16:00:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.91.76.238 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=10588 DF PROTO=TCP SPT=27189 DPT=443 SEQ=1197407626 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Dec 31 16:00:19 R7000 daemon.notice ntpclient[1074]: Network up, resolved address to hostname 212.18.3.19 Dec 31 16:00:19 R7000 daemon.debug ntpclient[1074]: Connecting to 212.18.3.19 [212.18.3.19] ... Feb 10 09:46:45 R7000 daemon.info ntpclient[1074]: Time set from 212.18.3.19 [212.18.3.19]. Feb 10 09:46:45 R7000 daemon.info process_monitor[1073]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22) Feb 10 09:46:45 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=38.90.226.13 DST=66.189.252.17 LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=180 DF PROTO=TCP SPT=80 DPT=39244 SEQ=1071962584 ACK=2178493046 WINDOW=568 RES=0 Feb 10 09:46:45 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:86 SRC=52.230.222.68 DST=66.189.252.17 LEN=390 TOS=0x00 PREC=0x00 TTL=108 ID=9208 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Feb 10 09:46:45 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.91.76.238 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=10602 DF PROTO=TCP SPT=27190 DPT=443 SEQ=1904846450 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Feb 10 09:46:45 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=216.58.192.99 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=38313 PROTO=TCP SPT=443 DPT=27066 SEQ=3996364767 ACK=1472499978 WINDOW=246 RES Feb 10 09:46:45 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.34 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=24062 PROTO=TCP SPT=443 DPT=27072 SEQ=231735853 ACK=4090606241 WINDOW=258 RES=0 Feb 10 09:46:45 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=47327 PROTO=UDP SPT=50961 DPT=53 LEN=45 Feb 10 09:46:45 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.34 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=51655 PROTO=TCP SPT=443 DPT=27068 SEQ=427126473 ACK=2271089717 WINDOW=250 RES=0 Feb 10 09:46:45 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=47328 PROTO=UDP SPT=54868 DPT=53 LEN=50 Feb 10 09:46:45 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=47329 PROTO=UDP SPT=58481 DPT=53 LEN=50 Feb 10 09:46:46 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=61440 PROTO=TCP SPT=58024 DPT=22760 SEQ=3913241849 ACK=0 WINDOW=1024 RES=0x00 Feb 10 09:46:46 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=40.91.76.238 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=10616 DF PROTO=TCP SPT=27191 DPT=443 SEQ=2945590612 ACK=0 WINDOW=64240 RES=0x00 SYN URGP= Feb 10 09:46:46 R7000 daemon.debug process_monitor[1073]: Restarting cron (time sync change) Feb 10 09:46:46 R7000 user.info : cron : daemon successfully stopped Feb 10 09:46:46 R7000 daemon.debug process_monitor[1073]: Restarting dnsmasq (time sync change) Feb 10 09:46:46 R7000 user.info : dnscrypt-proxy : daemon successfully stopped Feb 10 09:46:46 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:86 SRC=52.230.222.68 DST=66.189.252.17 LEN=390 TOS=0x00 PREC=0x00 TTL=108 ID=9209 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Feb 10 09:46:46 R7000 daemon.notice dnscrypt-proxy[1065]: Stopping proxy Feb 10 09:46:46 R7000 daemon.info dnscrypt-proxy[1065]: TCP listener shut down Feb 10 09:46:46 R7000 user.info : process_monitor : daemon successfully stopped Feb 10 09:46:46 R7000 daemon.info process_monitor[1073]: process_monitor : cleanup timers Feb 10 09:46:46 R7000 user.info : cron : daemon successfully started Feb 10 09:46:46 R7000 cron.info cron[1251]: (CRON) STARTUP (fork ok) Feb 10 09:46:46 R7000 user.info : process_monitor : successfully started Feb 10 09:46:46 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Feb 10 09:46:46 R7000 user.info : + Namecoin domains can be resolved Feb 10 09:46:46 R7000 user.info : + Provider supposedly doesn't keep logs Feb 10 09:46:46 R7000 daemon.notice dnscrypt-proxy[1253]: Starting dnscrypt-proxy 1.9.5 Feb 10 09:46:46 R7000 daemon.info dnscrypt-proxy[1253]: Generating a new session key pair Feb 10 09:46:46 R7000 daemon.info dnscrypt-proxy[1253]: Done Feb 10 09:46:46 R7000 daemon.debug process_monitor[1252]: We need to re-update after 3600 seconds Feb 10 09:46:46 R7000 daemon.info process_monitor[1252]: process_monitor : set timer: 3600 seconds, callback: ntp_main() Feb 10 09:46:46 R7000 daemon.crit dnsmasq[1255]: conntrack support not available: set HAVE_CONNTRACK in src/config.h Feb 10 09:46:46 R7000 daemon.crit dnsmasq[1255]: FAILED to start up Feb 10 09:46:46 R7000 user.info : dnsmasq : daemon successfully started Feb 10 09:46:46 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52787 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Feb 10 09:46:47 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:86 SRC=52.230.222.68 DST=66.189.252.17 LEN=390 TOS=0x00 PREC=0x00 TTL=108 ID=9210 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Feb 10 09:46:47 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=54060 PROTO=TCP SPT=58024 DPT=59503 SEQ=2797061970 ACK=0 WINDOW=1024 RES=0x00 Feb 10 09:46:47 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52788 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Feb 10 09:46:48 R7000 user.info : nas : start nas lan Feb 10 09:46:48 R7000 user.info : nas : start nas for wl0 Feb 10 09:46:48 R7000 user.info : nas : NAS lan (wl0 interface) successfully started Feb 10 09:46:48 R7000 user.info : nas : start nas lan Feb 10 09:46:48 R7000 user.info : nas : start nas for wl1 Feb 10 09:46:48 R7000 user.info : nas : NAS lan (wl1 interface) successfully started Feb 10 09:46:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=69 TOS=0x00 PREC=0x00 TTL=64 ID=30322 PROTO=UDP SPT=27036 DPT=27036 LEN=49 Feb 10 09:46:49 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a8 SRC=157.240.28.18 DST=66.189.252.17 LEN=168 TOS=0x00 PREC=0x00 TTL=85 ID=18658 DF PROTO=TCP SPT=443 DPT=51837 SEQ=3128374762 ACK=537413483 WINDOW=2185 Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=7185 DF PROTO=TCP SPT=27192 DPT=443 SEQ=383323876 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (0 Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=47330 PROTO=UDP SPT=56682 DPT=53 LEN=60 Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=13.225.146.115 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=12039 DF PROTO=TCP SPT=27193 DPT=443 SEQ=527623462 ACK=0 WINDOW=64240 RES=0x00 SYN URGP Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=47331 PROTO=UDP SPT=57420 DPT=53 LEN=60 Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=13.225.146.115 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=12041 DF PROTO=TCP SPT=27195 DPT=443 SEQ=3867208375 ACK=0 WINDOW=64240 RES=0x00 SYN URG Feb 10 09:46:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=47332 PROTO=UDP SPT=62723 DPT=53 LEN=60 Feb 10 09:46:49 R7000 user.info : nas : daemon successfully stopped Feb 10 09:46:49 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:86 SRC=52.230.222.68 DST=66.189.252.17 LEN=390 TOS=0x00 PREC=0x00 TTL=108 ID=9211 DF PROTO=TCP SPT=443 DPT=15392 SEQ=3929062106 ACK=4121569832 WINDOW=6960 Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:74 SRC=157.240.28.25 DST=66.189.252.17 LEN=116 TOS=0x00 PREC=0x00 TTL=85 ID=2273 DF PROTO=TCP SPT=443 DPT=49378 SEQ=2343683920 ACK=4069745118 WINDOW=139 R Feb 10 09:46:50 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:5b SRC=157.240.28.16 DST=66.189.252.17 LEN=91 TOS=0x00 PREC=0x00 TTL=85 ID=29494 DF PROTO=TCP SPT=443 DPT=48529 SEQ=3964638968 ACK=581356291 WINDOW=133 RE Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.4 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=50392 PROTO=TCP SPT=443 DPT=27036 SEQ=2167544537 ACK=2595064080 WINDOW=323 RES=0 Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=172.217.3.4 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=119 ID=50393 PROTO=TCP SPT=443 DPT=27036 SEQ=2167544593 ACK=2595064080 WINDOW=323 RES=0 Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=172.217.3.4 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=119 ID=50411 PROTO=TCP SPT=443 DPT=27036 SEQ=2167544593 ACK=2595064080 WINDOW=323 RES=0 Feb 10 09:46:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=52789 PROTO=UDP SPT=56608 DPT=1900 LEN=145 Feb 10 09:46:50 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Feb 10 09:46:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.4 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=50590 PROTO=TCP SPT=443 DPT=27036 SEQ=2167544537 ACK=2595064080 WINDOW=323 RES=0 Feb 10 09:46:51 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=39095 DF PROTO=UDP SPT=5691 DPT=53 LEN=49 Feb 10 09:46:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=172.217.3.4 DST=66.189.252.17 LEN=96 TOS=0x00 PREC=0x00 TTL=119 ID=50876 PROTO=TCP SPT=443 DPT=27036 SEQ=2167544537 ACK=2595064080 WINDOW=323 RES=0 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=18.215.1.131 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=57882 DF PROTO=TCP SPT=34551 DPT=80 SEQ=150580788 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=192.168.1.1 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=34012 DF PROTO=ICMP TYPE=8 CODE=0 ID=567 SEQ=3247 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=12786 DF PROTO=ICMP TYPE=8 CODE=0 ID=567 SEQ=3247 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=39111 DF PROTO=UDP SPT=3752 DPT=53 LEN=45 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=157.240.28.25 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22456 DF PROTO=TCP SPT=49551 DPT=443 SEQ=2820873091 ACK=0 WINDOW=65535 RES=0x00 SYN URGP Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=39116 DF PROTO=UDP SPT=31895 DPT=53 LEN=48 Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=52.94.228.85 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=11693 DF PROTO=TCP SPT=58211 DPT=443 SEQ=1930912236 ACK=0 WINDOW=65535 RES=0x00 SYN URGP= Feb 10 09:46:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=63 ID=39121 DF PROTO=UDP SPT=23706 DPT=53 LEN=47 Feb 10 09:46:51 R7000 user.info : nas : daemon hanging, send SIGKILL Feb 10 09:46:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=12533 PROTO=TCP SPT=58024 DPT=33158 SEQ=172248418 ACK=0 WINDOW=1024 RES=0x00 S Feb 10 09:46:51 R7000 user.info : nas : start nas lan Feb 10 09:46:51 R7000 user.info : nas : start nas for wl0 Feb 10 09:46:51 R7000 user.info : nas : NAS lan (wl0 interface) successfully started Feb 10 09:46:51 R7000 user.info : nas : start nas lan Feb 10 09:46:51 R7000 user.info : nas : start nas for wl1 Feb 10 09:46:51 R7000 user.info : nas : NAS lan (wl1 interface) successfully started Feb 10 09:46:51 R7000 user.info : httpd : daemon successfully stopped Feb 10 09:46:51 R7000 daemon.info httpd[1041]: httpd : httpd server shutdown Feb 10 09:46:52 R7000 user.debug : ttraff: data collection started Feb 10 09:46:52 R7000 daemon.info httpd[1273]: httpd : httpd SSL server started at port 443 Syslog (After Power Cycle) Dec 31 16:00:08 R7000 syslog.info syslogd started: BusyBox v1.31.1 Dec 31 16:00:08 R7000 user.info : klogd : daemon successfully started Dec 31 16:00:08 R7000 kern.notice kernel: klogd started: BusyBox v1.31.1 (2020-02-10 10:37:13 +04) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x14: [mem 0x18002000-0x18002fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: [14e4:0502] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x10: [mem 0x1802c000-0x1802cfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x10: [mem 0x18024000-0x18024fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x10: [mem 0x18025000-0x18025fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x10: [mem 0x18026000-0x18026fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x10: [mem 0x18027000-0x18027fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x10: [mem 0x18012000-0x18012fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x10: [mem 0x18013000-0x18013fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x10: [mem 0x18014000-0x18014fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: [14e4:0510] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x1800b000-0x1800bfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x14: [mem 0x1800c000-0x1800cfff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: [14e4:471a] type 00 class 0x0c0310 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x10: [mem 0x18022000-0x18022fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: [14e4:471a] type 00 class 0x0c0320 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x10: [mem 0x18021000-0x18021fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: [14e4:472a] type 00 class 0x0c0330 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x10: [mem 0x18023000-0x18023fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: [14e4:0503] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x10: [mem 0x18020000-0x18020fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: [14e4:4711] type 00 class 0x040100 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x1802a000-0x1802afff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: [14e4:0506] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x10: [mem 0x18210000-0x1821ffff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: [14e4:0507] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x10: [mem 0x18010000-0x18010fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:11.0: [14e4:0508] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.info kernel: pci 0000:00:11.0: [Firmware Bug]: reg 0x10: invalid BAR (can't size) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:11.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: [14e4:0509] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x10: [mem 0x18028000-0x18028fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: [14e4:050a] type 00 class 0xffffff Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x10: [mem 0x18029000-0x18029fff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 0 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 switching to GEN2 Dec 31 16:00:08 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCI host bridge to bus 0001:00 Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0001:00: root bus resource [mem 0x08000000-0x0fffffff] Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0001:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 1 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: reg 0x10: [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0001:01:00.0: supports D1 D2 Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 1 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0001:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:08 R7000 kern.info kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 switching to GEN2 Dec 31 16:00:08 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:08 R7000 kern.info kernel: PCI host bridge to bus 0002:00 Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0002:00: root bus resource [mem 0x40000000-0x47ffffff] Dec 31 16:00:08 R7000 kern.info kernel: pci_bus 0002:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 2 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: reg 0x10: [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:08 R7000 kern.debug kernel: pci 0002:01:00.0: supports D1 D2 Dec 31 16:00:08 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 2 Dec 31 16:00:08 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0002:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.debug kernel: pci_bus 0002:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:01:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:08 R7000 kern.info kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] Dec 31 16:00:08 R7000 kern.info kernel: PCIE3 link=0 Dec 31 16:00:08 R7000 kern.info kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 31 16:00:08 R7000 kern.info kernel: io scheduler noop registered (default) Dec 31 16:00:08 R7000 kern.info kernel: io scheduler cfq registered Dec 31 16:00:08 R7000 kern.info kernel: serial8250_init Dec 31 16:00:08 R7000 kern.info kernel: Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled Dec 31 16:00:08 R7000 kern.info kernel: console [ttyS0] disabled Dec 31 16:00:08 R7000 kern.info kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:08 R7000 kern.info kernel: console [ttyS0] enabled Dec 31 16:00:08 R7000 kern.info kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:08 R7000 kern.info kernel: brd: module loaded Dec 31 16:00:08 R7000 kern.info kernel: loop: module loaded Dec 31 16:00:08 R7000 kern.err kernel: bcmsflash: found no supported devices Dec 31 16:00:08 R7000 kern.warn kernel: Boot partition size = 524288(0x80000) Dec 31 16:00:08 R7000 kern.warn kernel: lookup_nflash_rootfs_offset: offset = 0x200000 size = 0x2000000, 0x20000 Dec 31 16:00:08 R7000 kern.info kernel: found TRX Header on nflash! Dec 31 16:00:08 R7000 kern.notice kernel: nflash: squash filesystem with lzma found at block 29 Dec 31 16:00:08 R7000 kern.notice kernel: Creating 5 MTD partitions on "nflash": Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000000000-0x000000080000 : "boot" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000080000-0x000000200000 : "nvram" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000000200000-0x000002200000 : "linux" Dec 31 16:00:08 R7000 kern.notice kernel: 0x0000003a0000-0x000002200000 : "rootfs" Dec 31 16:00:08 R7000 kern.notice kernel: 0x000002200000-0x000002240000 : "board_data" Dec 31 16:00:08 R7000 kern.info kernel: PPP generic driver version 2.4.2 Dec 31 16:00:08 R7000 kern.info kernel: PPP BSD Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: PPP Deflate Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: PPP MPPE Compression module registered Dec 31 16:00:08 R7000 kern.info kernel: NET: Registered protocol family 24 Dec 31 16:00:08 R7000 kern.info kernel: i2c /dev entries driver Dec 31 16:00:08 R7000 kern.info kernel: GACT probability NOT on Dec 31 16:00:08 R7000 kern.info kernel: Mirror/redirect action on Dec 31 16:00:08 R7000 kern.info kernel: Simple TC action Loaded Dec 31 16:00:08 R7000 kern.info kernel: netem: version 1.3 Dec 31 16:00:08 R7000 kern.info kernel: u32 classifier Dec 31 16:00:08 R7000 kern.info kernel: Performance counters on Dec 31 16:00:08 R7000 kern.info kernel: input device check on Dec 31 16:00:08 R7000 kern.info kernel: Actions configured Dec 31 16:00:08 R7000 kern.info kernel: Netfilter messages via NETLINK v0.30. Dec 31 16:00:08 R7000 kern.info kernel: nf_conntrack version 0.5.0 (3970 buckets, 15880 max) Dec 31 16:00:08 R7000 kern.warn kernel: nf_conntrack_rtsp v0.7 loading Dec 31 16:00:08 R7000 kern.info kernel: xt_time: kernel timezone is -0000 Dec 31 16:00:08 R7000 kern.info kernel: ip_set: protocol 6 Dec 31 16:00:08 R7000 kern.info kernel: gre: GRE over IPv4 demultiplexor driver Dec 31 16:00:08 R7000 kern.warn kernel: nf_nat_rtsp v0.7 loading Dec 31 16:00:08 R7000 kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team Dec 31 16:00:08 R7000 kern.info kernel: NET: Registered protocol family 17 Dec 31 16:00:08 R7000 kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Dec 31 16:00:08 R7000 kern.notice kernel: Bridge firewalling registered Dec 31 16:00:08 R7000 kern.info kernel: 8021q: 802.1Q VLAN Support v1.8 Dec 31 16:00:08 R7000 kern.notice kernel: Registering SWP/SWPB emulation handler Dec 31 16:00:08 R7000 kern.info kernel: max nvram space = 131072 Dec 31 16:00:08 R7000 kern.info kernel: read 65536 bytes to offset 0 Dec 31 16:00:08 R7000 kern.info kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 Dec 31 16:00:08 R7000 kern.info kernel: nand: device found, Manufacturer ID: 0xc2, Chip ID: 0xf1 Dec 31 16:00:08 R7000 kern.info kernel: nand: Macronix NAND 128MiB 3,3V 8-bit Dec 31 16:00:08 R7000 kern.info kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64 Dec 31 16:00:08 R7000 kern.warn kernel: Spare area=64 eccbytes 56, ecc bytes located at: Dec 31 16:00:08 R7000 kern.warn kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 Dec 31 16:00:08 R7000 kern.warn kernel: Available 7 bytes at (off,len): Dec 31 16:00:08 R7000 kern.warn kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) Dec 31 16:00:08 R7000 kern.info kernel: Scanning device for bad blocks Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 58 at 0x000000740000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 148 at 0x000001280000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 526 at 0x0000041c0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 642 at 0x000005040000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 758 at 0x000005ec0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 766 at 0x000005fc0000 Dec 31 16:00:08 R7000 kern.warn kernel: Bad eraseblock 787 at 0x000006260000 Dec 31 16:00:08 R7000 kern.warn kernel: Options: NO_SUBPAGE_WRITE, Dec 31 16:00:08 R7000 user.info : resetbutton : resetbutton daemon successfully started Dec 31 16:00:08 R7000 kern.notice kernel: Creating 1 MTD partitions on "brcmnand": Dec 31 16:00:08 R7000 kern.notice kernel: 0x000002240000-0x000008000000 : "ddwrt" Dec 31 16:00:08 R7000 kern.info kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. Dec 31 16:00:08 R7000 kern.info kernel: Freeing unused kernel memory: 344K Dec 31 16:00:08 R7000 kern.warn kernel: et: module license 'Proprietary' taints kernel. Dec 31 16:00:08 R7000 kern.warn kernel: Disabling lock debugging due to kernel taint Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: passivemode set to 0x0 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: txworkq set to 0x1 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_txq_thresh set to 0x400 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_timeout set to 0x3e8 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_framecnt set to 0x20 Dec 31 16:00:08 R7000 kern.warn kernel: et_module_init: et_rxlazy_dyn_thresh set to 0 Dec 31 16:00:08 R7000 kern.info kernel: ET Corerev 5 Dec 31 16:00:08 R7000 kern.warn kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: Probing device 'eth0' Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: trying a 53012! at eth0 Dec 31 16:00:08 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:08 R7000 kern.info kernel: roboswitch: found a 53012! at eth0 Dec 31 16:00:08 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:08 R7000 kern.warn kernel: wl_module_init: passivemode set to 0x0 Dec 31 16:00:08 R7000 kern.warn kernel: wl_module_init: txworkq set to 0x1 Dec 31 16:00:08 R7000 kern.warn kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.warn kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:08 R7000 kern.warn kernel: eth0: mixed HW and IP checksum settings. Dec 31 16:00:08 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:08 R7000 daemon.info mstpd[613]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:08 R7000 daemon.info mstpd[613]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:08 R7000 daemon.info mstpd[613]: error, CTL_set_msti_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:09 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:09 R7000 daemon.info mstpd[613]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 daemon.info mstpd[613]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : bridge : interface vlan1 successfully added to bridge br0 Dec 31 16:00:09 R7000 kern.info kernel: device vlan1 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: device eth0 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:09 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:09 R7000 user.info : bridge : interface eth1 successfully added to bridge br0 Dec 31 16:00:09 R7000 kern.info kernel: device eth1 entered promiscuous mode Dec 31 16:00:09 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:09 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:10 R7000 user.info : bridge : interface eth2 successfully added to bridge br0 Dec 31 16:00:10 R7000 kern.info kernel: device eth2 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 user.info : klogd : kernel log daemon successfully stopped Dec 31 16:00:10 R7000 user.info : wland : daemon successfully started Dec 31 16:00:10 R7000 kern.notice kernel: klogd: exiting Dec 31 16:00:10 R7000 user.info : syslogd : syslog daemon successfully stopped Dec 31 16:00:10 R7000 syslog.info syslogd exiting Dec 31 16:00:10 R7000 syslog.info syslogd started: BusyBox v1.31.1 Dec 31 16:00:10 R7000 user.info : klogd : daemon successfully started Dec 31 16:00:10 R7000 kern.notice kernel: klogd started: BusyBox v1.31.1 (2020-02-10 10:37:13 +04) Dec 31 16:00:10 R7000 kern.notice kernel: random: startservices: uninitialized urandom read (4 bytes read, 115 bits of entropy available) Dec 31 16:00:10 R7000 kern.info kernel: device vlan2 entered promiscuous mode Dec 31 16:00:10 R7000 kern.notice kernel: random: dropbearconvert: uninitialized urandom read (32 bytes read, 124 bits of entropy available) Dec 31 16:00:10 R7000 user.info : cron : daemon successfully started Dec 31 16:00:10 R7000 cron.info cron[866]: (CRON) STARTUP (fork ok) Dec 31 16:00:10 R7000 kern.notice kernel: random: dropbear: uninitialized urandom read (32 bytes read, 128 bits of entropy available) Dec 31 16:00:10 R7000 user.info : dropbear : ssh daemon successfully started Dec 31 16:00:10 R7000 kern.notice kernel: random: nonblocking pool is initialized Dec 31 16:00:10 R7000 authpriv.info dropbear[875]: Running in background Dec 31 16:00:10 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:10 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 16:00:10 R7000 kern.alert kernel: fast-classifier: registered Dec 31 16:00:10 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Dec 31 16:00:10 R7000 user.info : + Namecoin domains can be resolved Dec 31 16:00:10 R7000 user.info : + Provider supposedly doesn't keep logs dmesg ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26494 DF PROTO=TCP SPT=53776 DPT=443 SEQ=58394690 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40103030 01010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26495 DF PROTO=TCP SPT=53777 DPT=443 SEQ=2938669051 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=170.130.187.30 DST=66.189.252.17 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=25028 PROTO=TCP SPT=52340 DPT=5060 SEQ=1185975825 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (020405B4 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=216.58.192.106 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=9754 DF PROTO=TCP SPT=53392 DPT=443 SEQ=1946559223 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 00304ED0000000001030307) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=40619 PROTO=TCP SPT=58024 DPT=10501 SEQ=164514751 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54122 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937702 WINDOW=117 RES=0x00 ACK PSH FIN URGP 0 OPT (0101080AEA68E26000021A72) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11197 DF PROTO=TCP SPT=27753 DPT=443 SEQ=2239586645 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=185.153.199.102 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=227 ID=34586 PROTO=TCP SPT=41812 DPT=1433 SEQ=251821714 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40403 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450620 WINDOW=121 RES=0x00 ACK PSH FIN URGP 0 OPT (0101080AC94021CB00021A97) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=62791 DF PROTO=UDP SPT=37091 DPT=53 LEN=67 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=62792 DF PROTO=UDP SPT=37091 DPT=53 LEN=67 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=52.72.91.214 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=27112 DF PROTO=TCP SPT=60052 DPT=443 SEQ=1416206513 ACK=0 WINDOW=14600 RES=0x00 SYN URGP=0 OPT (020405B40402080A 3B5F1590000000001030306) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=62799 DF PROTO=UDP SPT=43773 DPT=53 LEN=55 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.3.3 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=61828 DF PROTO=UDP SPT=52497 DPT=443 LEN=1358 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.3.3 LEN=367 TOS=0x00 PREC=0x00 TTL=63 ID=61829 DF PROTO=UDP SPT=52497 DPT=443 LEN=347 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11207 DF PROTO=TCP SPT=27755 DPT=443 SEQ=3514518711 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11230 DF PROTO=TCP SPT=27756 DPT=443 SEQ=3236428753 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11231 DF PROTO=TCP SPT=27757 DPT=443 SEQ=1482458134 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6306 DF PROTO=TCP SPT=53594 DPT=443 SEQ=614664641 ACK=1345215178 WINDOW=8212 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6307 DF PROTO=TCP SPT=53598 DPT=443 SEQ=251654938 ACK=1302217770 WINDOW=511 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=82 TOS=0x00 PREC=0x00 TTL=127 ID=17281 PROTO=UDP SPT=52346 DPT=53 LEN=62 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=104.69.25.46 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=64899 DF PROTO=TCP SPT=53778 DPT=443 SEQ=2483981371 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030 01010402) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11251 DF PROTO=TCP SPT=27758 DPT=443 SEQ=1927455708 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11265 DF PROTO=TCP SPT=27759 DPT=443 SEQ=2297005784 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11266 DF PROTO=TCP SPT=27760 DPT=443 SEQ=63655952 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26567 DF PROTO=TCP SPT=53780 DPT=443 SEQ=1129852444 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26568 DF PROTO=TCP SPT=53779 DPT=443 SEQ=3563541156 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.59 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=5628 DF PROTO=TCP SPT=53592 DPT=443 SEQ=2405728552 ACK=682703742 WINDOW=513 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6309 DF PROTO=TCP SPT=53605 DPT=443 SEQ=648903485 ACK=369342499 WINDOW=513 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6310 DF PROTO=TCP SPT=53595 DPT=443 SEQ=4137094959 ACK=783455502 WINDOW=513 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6311 DF PROTO=TCP SPT=53607 DPT=443 SEQ=563949867 ACK=1847014293 WINDOW=513 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6312 DF PROTO=TCP SPT=53608 DPT=443 SEQ=3841709666 ACK=2217282085 WINDOW=513 RES=0x00 ACK URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=17282 PROTO=UDP SPT=59720 DPT=53 LEN=41 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=17283 PROTO=UDP SPT=64469 DPT=53 LEN=47 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32447 DF PROTO=TCP SPT=53785 DPT=443 SEQ=1433331145 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40103 30801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32448 DF PROTO=TCP SPT=53786 DPT=443 SEQ=167158715 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=17284 PROTO=UDP SPT=64953 DPT=53 LEN=43 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11287 DF PROTO=TCP SPT=27763 DPT=443 SEQ=820804490 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11288 DF PROTO=TCP SPT=27764 DPT=443 SEQ=2044560933 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11291 DF PROTO=TCP SPT=27767 DPT=443 SEQ=4139934781 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11286 DF PROTO=TCP SPT=27762 DPT=443 SEQ=3444469178 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11289 DF PROTO=TCP SPT=27765 DPT=443 SEQ=3536501850 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11290 DF PROTO=TCP SPT=27766 DPT=443 SEQ=2602135249 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.60 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=8771 DF PROTO=TCP SPT=53787 DPT=443 SEQ=1389612618 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40103030 01010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.60 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=8772 DF PROTO=TCP SPT=53788 DPT=443 SEQ=105891056 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030308 1010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=25372 PROTO=UDP SPT=64953 DPT=53 LEN=43 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32451 DF PROTO=TCP SPT=53789 DPT=443 SEQ=2649792715 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103 30801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32452 DF PROTO=TCP SPT=53790 DPT=443 SEQ=3991559411 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103 30801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.84 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=12884 DF PROTO=TCP SPT=53791 DPT=443 SEQ=3135444434 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.84 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=12885 DF PROTO=TCP SPT=53792 DPT=443 SEQ=896641493 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4010303 801010402) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11311 DF PROTO=TCP SPT=27768 DPT=443 SEQ=3763515072 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11321 DF PROTO=TCP SPT=27769 DPT=443 SEQ=117918262 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11331 DF PROTO=TCP SPT=27770 DPT=443 SEQ=2599924228 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26620 DF PROTO=TCP SPT=53793 DPT=443 SEQ=219342972 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4010303 801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26621 DF PROTO=TCP SPT=53794 DPT=443 SEQ=1748252307 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401030 0801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17285 PROTO=UDP SPT=62545 DPT=53 LEN=39 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.3.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=14648 DF PROTO=TCP SPT=53795 DPT=80 SEQ=2929578420 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B401030308 1010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26645 DF PROTO=TCP SPT=53796 DPT=443 SEQ=854531276 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4010303 801010402) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26646 DF PROTO=TCP SPT=53797 DPT=443 SEQ=436086255 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4010303 801010402) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11377 DF PROTO=TCP SPT=27771 DPT=443 SEQ=354982059 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11380 DF PROTO=TCP SPT=27772 DPT=443 SEQ=2707384772 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) cat /var/log/messages Feb 10 10:15:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=157.240.28.25 DST=66.189.252.17 LEN=52 TOS=0x00 PREC=0x00 TTL=85 ID=40394 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803163 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=157.240.28.25 DST=66.189.252.17 LEN=52 TOS=0x00 PREC=0x00 TTL=85 ID=40395 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803163 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=7303 DF PROTO=TCP SPT=443 DPT=53604 SEQ=160536786 ACK=2049150044 WINDOW=265 RES= Feb 10 10:15:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40396 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40397 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:32 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=12855 PROTO=UDP SPT=137 DPT=137 LEN=58 Feb 10 10:15:33 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=104.18.24.243 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=40845 DF PROTO=TCP SPT=80 DPT=53653 SEQ=3435691649 ACK=98660437 WINDOW=66 RES= Feb 10 10:15:33 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40398 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:33 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=104.18.24.243 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=40846 DF PROTO=TCP SPT=80 DPT=53653 SEQ=3435691649 ACK=98660437 WINDOW=66 RES= Feb 10 10:15:33 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=216.58.192.78 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=65499 DF PROTO=TCP SPT=34939 DPT=443 SEQ=3095529326 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:15:33 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=12856 PROTO=UDP SPT=137 DPT=137 LEN=58 Feb 10 10:15:33 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=104.18.24.243 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=40847 DF PROTO=TCP SPT=80 DPT=53653 SEQ=3435691649 ACK=98660437 WINDOW=66 RES= Feb 10 10:15:33 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=71 TOS=0x00 PREC=0x00 TTL=63 ID=63720 DF PROTO=UDP SPT=41108 DPT=53 LEN=51 Feb 10 10:15:33 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=99.84.195.49 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=32690 DF PROTO=TCP SPT=46010 DPT=443 SEQ=2071037762 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:15:34 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=104.18.24.243 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=40848 DF PROTO=TCP SPT=80 DPT=53653 SEQ=3435691649 ACK=98660437 WINDOW=66 RES= Feb 10 10:15:34 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40399 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=63823 DF PROTO=UDP SPT=56600 DPT=53 LEN=48 Feb 10 10:15:34 R7000 daemon.err dnscrypt-proxy[1447]: Unable to retrieve server certificates Feb 10 10:15:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=23.212.16.215 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=8739 DF PROTO=TCP SPT=33674 DPT=443 SEQ=419027828 ACK=0 WINDOW=65535 RES 0x00 SYN URGP=0 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=72 TOS=0x00 PREC=0x00 TTL=63 ID=63849 DF PROTO=UDP SPT=45361 DPT=53 LEN=52 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=63855 DF PROTO=UDP SPT=57369 DPT=443 LEN=1358 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=63856 DF PROTO=UDP SPT=57369 DPT=443 LEN=1358 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=63857 DF PROTO=UDP SPT=57369 DPT=443 LEN=1358 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=130 TOS=0x00 PREC=0x00 TTL=63 ID=63858 DF PROTO=UDP SPT=57369 DPT=443 LEN=110 Feb 10 10:15:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=443 TOS=0x00 PREC=0x00 TTL=63 ID=63859 DF PROTO=UDP SPT=57369 DPT=443 LEN=423 Feb 10 10:15:35 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=38577 DF PROTO=TCP SPT=443 DPT=53599 SEQ=1766392338 ACK=13526915 0 WINDOW=291 RE Feb 10 10:15:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=216.58.192.74 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=34070 DF PROTO=TCP SPT=38831 DPT=443 SEQ=1120254418 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:15:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11126 DF PROTO=TCP SPT=27745 DPT=443 SEQ=2663892453 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:15:36 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40400 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=216.58.192.74 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=40861 DF PROTO=TCP SPT=44356 DPT=443 SEQ=2796397212 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:15:36 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.219.38.59 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=53268 DF PROTO=TCP SPT=443 DPT=53591 SEQ=3502175946 ACK=5167071 INDOW=368 RES=0 Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.219.38.19 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=22521 DF PROTO=TCP SPT=443 DPT=53629 SEQ=3052780554 ACK=18795002 6 WINDOW=263 RE Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=57497 DF PROTO=TCP SPT=443 DPT=53596 SEQ=3492846031 ACK=10885845 2 WINDOW=368 RE Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=20791 DF PROTO=TCP SPT=443 DPT=53606 SEQ=397861477 ACK=248120336 WINDOW=263 RES Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=57195 DF PROTO=TCP SPT=443 DPT=53587 SEQ=1242634334 ACK=40154606 9 WINDOW=394 RE Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=40146 DF PROTO=TCP SPT=443 DPT=53588 SEQ=3003336107 ACK=21571506 0 WINDOW=329 RE Feb 10 10:15:37 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=59448 DF PROTO=TCP SPT=443 DPT=53586 SEQ=3479280368 ACK=23891849 1 WINDOW=433 RE Feb 10 10:15:39 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11136 DF PROTO=TCP SPT=27746 DPT=443 SEQ=3559008162 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:15:40 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=64354 DF PROTO=UDP SPT=39431 DPT=53 LEN=50 Feb 10 10:15:40 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=23.15.130.141 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=52774 DF PROTO=TCP SPT=36746 DPT=443 SEQ=803419468 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:15:40 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=52.94.228.85 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=24805 DF PROTO=TCP SPT=443 DPT=58211 SEQ=1407210617 ACK=1930917 34 WINDOW=9300 Feb 10 10:15:41 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11146 DF PROTO=TCP SPT=27747 DPT=443 SEQ=984376282 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Feb 10 10:15:41 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40401 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:41 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=58 TOS=0x00 PREC=0x00 TTL=127 ID=17245 PROTO=UDP SPT=54731 DPT=53 LEN=38 Feb 10 10:15:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=77 TOS=0x00 PREC=0x00 TTL=127 ID=17246 PROTO=UDP SPT=55544 DPT=53 LEN=57 Feb 10 10:15:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=77 TOS=0x00 PREC=0x00 TTL=127 ID=25343 PROTO=UDP SPT=55544 DPT=53 LEN=57 Feb 10 10:15:42 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=23.48.32.137 DST=66.189.252.17 LEN=64 TOS=0x00 PREC=0x00 TTL=52 ID=7304 DF PROTO=TCP SPT=443 DPT=53604 SEQ=160536786 ACK=2049150044 WINDOW=265 RES= Feb 10 10:15:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=58 TOS=0x00 PREC=0x00 TTL=127 ID=25344 PROTO=UDP SPT=54731 DPT=53 LEN=38 Feb 10 10:15:43 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=17248 PROTO=UDP SPT=58914 DPT=53 LEN=42 Feb 10 10:15:43 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=25345 PROTO=UDP SPT=58914 DPT=53 LEN=42 Feb 10 10:15:46 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11156 DF PROTO=TCP SPT=27749 DPT=443 SEQ=3865657651 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:15:46 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=5678 PROTO=UDP SPT=63067 DPT=1900 LEN=145 Feb 10 10:15:46 R7000 daemon.info dnscrypt-proxy[1447]: Refetching server certificates Feb 10 10:15:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=127 ID=17251 PROTO=UDP SPT=56863 DPT=53 LEN=48 Feb 10 10:15:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=52.230.222.68 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=56907 DF PROTO=TCP SPT=53719 DPT=443 SEQ=901763777 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:15:48 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=118.233.62.107 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=49066 DF PROTO=TCP SPT=10204 DPT=23 SEQ=3576939220 ACK=0 WIND W=14600 RES=0x0 Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=28484 DF PROTO=UDP SPT=27363 DPT=53 LEN=42 Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=104.26.9.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=7127 DF PROTO=TCP SPT=47703 DPT=80 SEQ=2323339834 ACK=0 WINDOW=65535 RES= x00 SYN URGP=0 Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=104.26.9.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=61420 DF PROTO=TCP SPT=43856 DPT=80 SEQ=2571742721 ACK=0 WINDOW=65535 RES 0x00 SYN URGP=0 Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=5679 PROTO=UDP SPT=63067 DPT=1900 LEN=145 Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=104.26.9.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=12247 DF PROTO=TCP SPT=51884 DPT=443 SEQ=2914610731 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:15:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:B8:1D:AA:**:**:**:08:00 SRC=192.168.1.8 DST=104.26.9.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=7983 DF PROTO=TCP SPT=48891 DPT=443 SEQ=1925930287 ACK=0 WINDOW=65535 RES 0x00 SYN URGP=0 Feb 10 10:15:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=203.191.149.41 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=101 ID=256 PROTO=TCP SPT=6000 DPT=3389 SEQ=1679949824 ACK=0 WINDOW=1 384 RES=0x00 SY Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=157.240.28.34 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=16369 DF PROTO=TCP SPT=42378 DPT=443 SEQ=2815672507 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=65354 DF PROTO=UDP SPT=1725 DPT=53 LEN=48 Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=58 TOS=0x00 PREC=0x00 TTL=127 ID=17252 PROTO=UDP SPT=58470 DPT=53 LEN=38 Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16140 DF PROTO=TCP SPT=53720 DPT=443 SEQ=3567258851 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16144 DF PROTO=TCP SPT=53721 DPT=443 SEQ=3285330349 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16149 DF PROTO=TCP SPT=53722 DPT=443 SEQ=2130682730 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:50 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40402 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:15:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=17253 PROTO=UDP SPT=64000 DPT=53 LEN=40 Feb 10 10:15:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=40.90.23.206 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=29008 DF PROTO=TCP SPT=53723 DPT=443 SEQ=3806996091 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=40.90.23.206 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=29010 DF PROTO=TCP SPT=53724 DPT=443 SEQ=2155145908 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:15:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11166 DF PROTO=TCP SPT=27750 DPT=443 SEQ=92775905 ACK=0 WINDOW=64240 RES=0x00 S N URGP=0 OPT (0 Feb 10 10:15:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16188 DF PROTO=TCP SPT=53729 DPT=443 SEQ=2497926865 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54113 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=157.240.28.34 DST=66.189.252.17 LEN=52 TOS=0x00 PREC=0x00 TTL=85 ID=54114 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634467 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=157.240.28.34 DST=66.189.252.17 LEN=52 TOS=0x00 PREC=0x00 TTL=85 ID=54115 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634467 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54116 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=40.90.23.206 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=29026 DF PROTO=TCP SPT=53730 DPT=443 SEQ=2670195015 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:52 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54117 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:52 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=01:00:5e:7f:ff:fa:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=239.255.255.250 LEN=165 TOS=0x00 PREC=0x00 TTL=4 ID=5680 PROTO=UDP SPT=63067 DPT=1900 LEN=145 Feb 10 10:15:52 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=12857 PROTO=UDP SPT=137 DPT=137 LEN=58 Feb 10 10:15:52 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54118 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:52 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=44271 PROTO=TCP SPT=58024 DPT=26172 SEQ=201864898 ACK=0 WINDOW 1024 RES=0x00 S Feb 10 10:15:53 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=12858 PROTO=UDP SPT=137 DPT=137 LEN=58 Feb 10 10:15:53 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54119 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:53 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=12859 PROTO=UDP SPT=137 DPT=137 LEN=58 Feb 10 10:15:54 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=17254 PROTO=UDP SPT=53529 DPT=53 LEN=40 Feb 10 10:15:55 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54120 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=17255 PROTO=UDP SPT=50383 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26392 DF PROTO=TCP SPT=53733 DPT=443 SEQ=3256204114 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17258 PROTO=UDP SPT=55199 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=127 ID=17260 PROTO=UDP SPT=54207 DPT=53 LEN=44 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=17256 PROTO=UDP SPT=59562 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17257 PROTO=UDP SPT=63584 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=25348 PROTO=UDP SPT=59562 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25350 PROTO=UDP SPT=55199 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25352 PROTO=UDP SPT=59538 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26391 DF PROTO=TCP SPT=53732 DPT=443 SEQ=605388023 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17259 PROTO=UDP SPT=59538 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=25347 PROTO=UDP SPT=50383 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25349 PROTO=UDP SPT=63584 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=64 TOS=0x00 PREC=0x00 TTL=127 ID=25351 PROTO=UDP SPT=54207 DPT=53 LEN=44 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=62447 DF PROTO=TCP SPT=53735 DPT=443 SEQ=3417617734 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17262 PROTO=UDP SPT=57006 DPT=53 LEN=39 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=17265 PROTO=UDP SPT=62599 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=127 ID=17267 PROTO=UDP SPT=50319 DPT=53 LEN=50 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.103 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=23187 DF PROTO=TCP SPT=53734 DPT=443 SEQ=2695339524 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.138 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=39827 DF PROTO=TCP SPT=53736 DPT=443 SEQ=3600624668 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=64 TOS=0x00 PREC=0x00 TTL=127 ID=25355 PROTO=UDP SPT=65456 DPT=53 LEN=44 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=25358 PROTO=UDP SPT=62599 DPT=53 LEN=43 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=127 ID=17263 PROTO=UDP SPT=65456 DPT=53 LEN=44 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=17264 PROTO=UDP SPT=55096 DPT=53 LEN=41 Feb 10 10:15:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=17266 PROTO=UDP SPT=64766 DPT=53 LEN=42 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25354 PROTO=UDP SPT=57006 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=25356 PROTO=UDP SPT=55096 DPT=53 LEN=41 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=25357 PROTO=UDP SPT=64766 DPT=53 LEN=42 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=70 TOS=0x00 PREC=0x00 TTL=127 ID=25359 PROTO=UDP SPT=50319 DPT=53 LEN=50 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.138 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=39829 DF PROTO=TCP SPT=53737 DPT=443 SEQ=2080227209 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.173 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=41623 DF PROTO=TCP SPT=53738 DPT=443 SEQ=2344070645 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.173 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=41624 DF PROTO=TCP SPT=53739 DPT=443 SEQ=774873181 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.34 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16570 DF PROTO=TCP SPT=53741 DPT=443 SEQ=2963862229 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.175 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=45385 DF PROTO=TCP SPT=53743 DPT=443 SEQ=527405644 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.175 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=45386 DF PROTO=TCP SPT=53744 DPT=443 SEQ=565681624 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.175 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=45387 DF PROTO=TCP SPT=53746 DPT=443 SEQ=4212837338 ACK=0 WINDOW=655 5 RES=0x00 SYN Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=17269 PROTO=UDP SPT=65428 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=17271 PROTO=UDP SPT=63296 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=17272 PROTO=UDP SPT=60506 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=17273 PROTO=UDP SPT=65347 DPT=53 LEN=47 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=25360 PROTO=UDP SPT=60615 DPT=53 LEN=42 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25362 PROTO=UDP SPT=63554 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=25363 PROTO=UDP SPT=63296 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=25365 PROTO=UDP SPT=65347 DPT=53 LEN=47 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.173 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=41625 DF PROTO=TCP SPT=53740 DPT=443 SEQ=1005769159 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26397 DF PROTO=TCP SPT=53742 DPT=443 SEQ=187440899 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.32 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32760 DF PROTO=TCP SPT=53745 DPT=443 SEQ=2036023143 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=17268 PROTO=UDP SPT=60615 DPT=53 LEN=42 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26398 DF PROTO=TCP SPT=53747 DPT=443 SEQ=1607645906 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17270 PROTO=UDP SPT=63554 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=25361 PROTO=UDP SPT=65428 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=65 TOS=0x00 PREC=0x00 TTL=127 ID=25364 PROTO=UDP SPT=60506 DPT=53 LEN=45 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11176 DF PROTO=TCP SPT=27751 DPT=443 SEQ=2064009776 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.34 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16572 DF PROTO=TCP SPT=53748 DPT=443 SEQ=4095336246 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.189 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=63214 DF PROTO=TCP SPT=53749 DPT=443 SEQ=1254151613 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.189 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=63215 DF PROTO=TCP SPT=53750 DPT=443 SEQ=3402858651 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26406 DF PROTO=TCP SPT=53752 DPT=443 SEQ=3814324602 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.45 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=27533 DF PROTO=TCP SPT=53753 DPT=443 SEQ=2659875569 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17276 PROTO=UDP SPT=58199 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17277 PROTO=UDP SPT=57170 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17278 PROTO=UDP SPT=50454 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17279 PROTO=UDP SPT=49853 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25369 PROTO=UDP SPT=58199 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25370 PROTO=UDP SPT=49853 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17275 PROTO=UDP SPT=60284 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.189 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=63216 DF PROTO=TCP SPT=53751 DPT=443 SEQ=4142908775 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25367 PROTO=UDP SPT=60284 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25368 PROTO=UDP SPT=57170 DPT=53 LEN=39 Feb 10 10:15:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=25371 PROTO=UDP SPT=50454 DPT=53 LEN=39 Feb 10 10:15:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16267 DF PROTO=TCP SPT=53754 DPT=443 SEQ=3867083367 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.107.21.200 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16268 DF PROTO=TCP SPT=53755 DPT=443 SEQ=2651162919 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=62457 DF PROTO=TCP SPT=53758 DPT=443 SEQ=3262532467 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:15:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.34 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16585 DF PROTO=TCP SPT=53759 DPT=443 SEQ=518456662 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:15:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.42 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=46032 DF PROTO=TCP SPT=53762 DPT=443 SEQ=3509902679 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.175 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=45416 DF PROTO=TCP SPT=53763 DPT=443 SEQ=299157342 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.175 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=45422 DF PROTO=TCP SPT=53764 DPT=443 SEQ=3837464142 ACK=0 WINDOW=655 5 RES=0x00 SYN Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26461 DF PROTO=TCP SPT=53765 DPT=443 SEQ=356139904 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=77 TOS=0x00 PREC=0x00 TTL=127 ID=17280 PROTO=UDP SPT=51913 DPT=53 LEN=57 Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26467 DF PROTO=TCP SPT=53766 DPT=443 SEQ=3826735173 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:15:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54121 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=52.114.88.22 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=7662 DF PROTO=TCP SPT=53767 DPT=443 SEQ=462419331 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=52.114.88.22 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=7664 DF PROTO=TCP SPT=53768 DPT=443 SEQ=4023850712 ACK=0 WINDOW=64240 R S=0x00 SYN URGP Feb 10 10:15:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.116 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=52421 DF PROTO=TCP SPT=53769 DPT=443 SEQ=3913978554 ACK=0 WINDOW=655 5 RES=0x00 SYN Feb 10 10:16:00 R7000 user.info : dnsmasq : maybe died, we need to re-exec it Feb 10 10:16:00 R7000 user.info : dnscrypt-proxy : daemon successfully stopped Feb 10 10:16:00 R7000 daemon.notice dnscrypt-proxy[1447]: Stopping proxy Feb 10 10:16:00 R7000 daemon.info dnscrypt-proxy[1447]: TCP listener shut down Feb 10 10:16:00 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Feb 10 10:16:00 R7000 user.info : + Namecoin domains can be resolved Feb 10 10:16:00 R7000 user.info : + Provider supposedly doesn't keep logs Feb 10 10:16:00 R7000 daemon.notice dnscrypt-proxy[1498]: Starting dnscrypt-proxy 1.9.5 Feb 10 10:16:00 R7000 daemon.info dnscrypt-proxy[1498]: Generating a new session key pair Feb 10 10:16:00 R7000 daemon.info dnscrypt-proxy[1498]: Done Feb 10 10:16:00 R7000 daemon.crit dnsmasq[1500]: conntrack support not available: set HAVE_CONNTRACK in src/config.h Feb 10 10:16:00 R7000 daemon.crit dnsmasq[1500]: FAILED to start up Feb 10 10:16:00 R7000 user.info : dnsmasq : daemon successfully started Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.45 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=27546 DF PROTO=TCP SPT=53770 DPT=443 SEQ=1188447288 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=62479 DF PROTO=TCP SPT=53771 DPT=443 SEQ=801408094 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.34 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16612 DF PROTO=TCP SPT=53772 DPT=443 SEQ=522918861 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=62480 DF PROTO=TCP SPT=53773 DPT=443 SEQ=4127167657 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11187 DF PROTO=TCP SPT=27752 DPT=443 SEQ=1023376452 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6299 DF PROTO=TCP SPT=53606 DPT=443 SEQ=2481203364 ACK=397861477 WINDOW 512 RES=0x00 AC Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6300 DF PROTO=TCP SPT=53587 DPT=443 SEQ=4015460698 ACK=1242634334 WINDO =8212 RES=0x00 Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6301 DF PROTO=TCP SPT=53588 DPT=443 SEQ=2157150609 ACK=3003336107 WINDO =1026 RES=0x00 Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6302 DF PROTO=TCP SPT=53604 DPT=443 SEQ=2049150043 ACK=160536786 WINDOW 513 RES=0x00 AC Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6303 DF PROTO=TCP SPT=53596 DPT=443 SEQ=1088584591 ACK=3492846031 WINDO =1026 RES=0x00 Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6305 DF PROTO=TCP SPT=53586 DPT=443 SEQ=2389184900 ACK=3479280368 WINDO =8223 RES=0x00 Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6304 DF PROTO=TCP SPT=53599 DPT=443 SEQ=1352691549 ACK=1766392338 WINDO =513 RES=0x00 A Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.19 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=60729 DF PROTO=TCP SPT=53629 DPT=443 SEQ=1879500295 ACK=3052780554 WIND W=513 RES=0x00 Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.59 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=5627 DF PROTO=TCP SPT=53591 DPT=443 SEQ=5167070 ACK=3502175946 WINDOW=5 3 RES=0x00 ACK Feb 10 10:16:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.42 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=46047 DF PROTO=TCP SPT=53774 DPT=443 SEQ=3799484049 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:03 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=52.119.168.148 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=228 ID=52201 DF PROTO=TCP SPT=443 DPT=56918 SEQ=20646260 ACK=3273348 67 WINDOW=9300 Feb 10 10:16:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26493 DF PROTO=TCP SPT=53775 DPT=443 SEQ=346379712 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26494 DF PROTO=TCP SPT=53776 DPT=443 SEQ=58394690 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:16:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26495 DF PROTO=TCP SPT=53777 DPT=443 SEQ=2938669051 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:04 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=170.130.187.30 DST=66.189.252.17 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=25028 PROTO=TCP SPT=52340 DPT=5060 SEQ=1185975825 ACK=0 WINDO =1024 RES=0x00 Feb 10 10:16:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=216.58.192.106 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=9754 DF PROTO=TCP SPT=53392 DPT=443 SEQ=1946559223 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:06 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=40619 PROTO=TCP SPT=58024 DPT=10501 SEQ=164514751 ACK=0 WINDOW 1024 RES=0x00 S Feb 10 10:16:06 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54122 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:16:07 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11197 DF PROTO=TCP SPT=27753 DPT=443 SEQ=2239586645 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=185.153.199.102 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=227 ID=34586 PROTO=TCP SPT=41812 DPT=1433 SEQ=251821714 ACK=0 WINDO =1024 RES=0x00 Feb 10 10:16:08 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40403 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:16:09 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=62791 DF PROTO=UDP SPT=37091 DPT=53 LEN=67 Feb 10 10:16:09 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=62792 DF PROTO=UDP SPT=37091 DPT=53 LEN=67 Feb 10 10:16:09 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=52.72.91.214 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=27112 DF PROTO=TCP SPT=60052 DPT=443 SEQ=1416206513 ACK=0 WINDOW=14600 R S=0x00 SYN URGP Feb 10 10:16:09 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=62799 DF PROTO=UDP SPT=43773 DPT=53 LEN=55 Feb 10 10:16:10 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.3.3 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=61828 DF PROTO=UDP SPT=52497 DPT=443 LEN=1358 Feb 10 10:16:10 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.3.3 LEN=367 TOS=0x00 PREC=0x00 TTL=63 ID=61829 DF PROTO=UDP SPT=52497 DPT=443 LEN=347 Feb 10 10:16:11 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11207 DF PROTO=TCP SPT=27755 DPT=443 SEQ=3514518711 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:11 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11230 DF PROTO=TCP SPT=27756 DPT=443 SEQ=3236428753 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:11 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11231 DF PROTO=TCP SPT=27757 DPT=443 SEQ=1482458134 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:12 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6306 DF PROTO=TCP SPT=53594 DPT=443 SEQ=614664641 ACK=1345215178 WINDOW 8212 RES=0x00 A Feb 10 10:16:12 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6307 DF PROTO=TCP SPT=53598 DPT=443 SEQ=251654938 ACK=1302217770 WINDOW 511 RES=0x00 AC Feb 10 10:16:13 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=82 TOS=0x00 PREC=0x00 TTL=127 ID=17281 PROTO=UDP SPT=52346 DPT=53 LEN=62 Feb 10 10:16:13 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=104.69.25.46 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=64899 DF PROTO=TCP SPT=53778 DPT=443 SEQ=2483981371 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:13 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11251 DF PROTO=TCP SPT=27758 DPT=443 SEQ=1927455708 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:13 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11265 DF PROTO=TCP SPT=27759 DPT=443 SEQ=2297005784 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:13 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11266 DF PROTO=TCP SPT=27760 DPT=443 SEQ=63655952 ACK=0 WINDOW=64240 RES=0x00 S N URGP=0 OPT (0 Feb 10 10:16:14 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26567 DF PROTO=TCP SPT=53780 DPT=443 SEQ=1129852444 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:14 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26568 DF PROTO=TCP SPT=53779 DPT=443 SEQ=3563541156 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.219.38.59 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=5628 DF PROTO=TCP SPT=53592 DPT=443 SEQ=2405728552 ACK=682703742 WINDOW 513 RES=0x00 AC Feb 10 10:16:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6309 DF PROTO=TCP SPT=53605 DPT=443 SEQ=648903485 ACK=369342499 WINDOW= 13 RES=0x00 ACK Feb 10 10:16:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6310 DF PROTO=TCP SPT=53595 DPT=443 SEQ=4137094959 ACK=783455502 WINDOW 513 RES=0x00 AC Feb 10 10:16:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6311 DF PROTO=TCP SPT=53607 DPT=443 SEQ=563949867 ACK=1847014293 WINDOW 513 RES=0x00 AC Feb 10 10:16:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6312 DF PROTO=TCP SPT=53608 DPT=443 SEQ=3841709666 ACK=2217282085 WINDO =513 RES=0x00 A Feb 10 10:16:15 R7000 daemon.err dnscrypt-proxy[1498]: Unable to retrieve server certificates Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=17282 PROTO=UDP SPT=59720 DPT=53 LEN=41 Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=17283 PROTO=UDP SPT=64469 DPT=53 LEN=47 Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32447 DF PROTO=TCP SPT=53785 DPT=443 SEQ=1433331145 ACK=0 WINDOW=655 5 RES=0x00 SYN Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32448 DF PROTO=TCP SPT=53786 DPT=443 SEQ=167158715 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:16 R7000 daemon.info dnscrypt-proxy[1498]: Refetching server certificates Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=17284 PROTO=UDP SPT=64953 DPT=53 LEN=43 Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11287 DF PROTO=TCP SPT=27763 DPT=443 SEQ=820804490 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11288 DF PROTO=TCP SPT=27764 DPT=443 SEQ=2044560933 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11291 DF PROTO=TCP SPT=27767 DPT=443 SEQ=4139934781 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11286 DF PROTO=TCP SPT=27762 DPT=443 SEQ=3444469178 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11289 DF PROTO=TCP SPT=27765 DPT=443 SEQ=3536501850 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:16 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11290 DF PROTO=TCP SPT=27766 DPT=443 SEQ=2602135249 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.60 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=8771 DF PROTO=TCP SPT=53787 DPT=443 SEQ=1389612618 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.60 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=8772 DF PROTO=TCP SPT=53788 DPT=443 SEQ=105891056 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=63 TOS=0x00 PREC=0x00 TTL=127 ID=25372 PROTO=UDP SPT=64953 DPT=53 LEN=43 Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32451 DF PROTO=TCP SPT=53789 DPT=443 SEQ=2649792715 ACK=0 WINDOW=642 0 RES=0x00 SYN Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.164.110 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=32452 DF PROTO=TCP SPT=53790 DPT=443 SEQ=3991559411 ACK=0 WINDOW=642 0 RES=0x00 SYN Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.84 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=12884 DF PROTO=TCP SPT=53791 DPT=443 SEQ=3135444434 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.84 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=12885 DF PROTO=TCP SPT=53792 DPT=443 SEQ=896641493 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11311 DF PROTO=TCP SPT=27768 DPT=443 SEQ=3763515072 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11321 DF PROTO=TCP SPT=27769 DPT=443 SEQ=117918262 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11331 DF PROTO=TCP SPT=27770 DPT=443 SEQ=2599924228 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26620 DF PROTO=TCP SPT=53793 DPT=443 SEQ=219342972 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26621 DF PROTO=TCP SPT=53794 DPT=443 SEQ=1748252307 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=127 ID=17285 PROTO=UDP SPT=62545 DPT=53 LEN=39 Feb 10 10:16:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=172.217.3.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=14648 DF PROTO=TCP SPT=53795 DPT=80 SEQ=2929578420 ACK=0 WINDOW=64240 R S=0x00 SYN URGP Feb 10 10:16:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26645 DF PROTO=TCP SPT=53796 DPT=443 SEQ=854531276 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26646 DF PROTO=TCP SPT=53797 DPT=443 SEQ=436086255 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11377 DF PROTO=TCP SPT=27771 DPT=443 SEQ=354982059 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Feb 10 10:16:18 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11380 DF PROTO=TCP SPT=27772 DPT=443 SEQ=2707384772 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26666 DF PROTO=TCP SPT=53798 DPT=443 SEQ=1375629032 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26667 DF PROTO=TCP SPT=53799 DPT=443 SEQ=1760256340 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6313 DF PROTO=TCP SPT=53590 DPT=443 SEQ=444091613 ACK=1236792497 WINDOW 2053 RES=0x00 A Feb 10 10:16:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11408 DF PROTO=TCP SPT=27773 DPT=443 SEQ=2857440920 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11409 DF PROTO=TCP SPT=27774 DPT=443 SEQ=2413049543 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:21 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=31131 PROTO=TCP SPT=58024 DPT=46649 SEQ=3880006579 ACK=0 WINDO =1024 RES=0x00 Feb 10 10:16:22 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=49363 PROTO=TCP SPT=58024 DPT=54615 SEQ=1616308629 ACK=0 WINDO =1024 RES=0x00 Feb 10 10:16:22 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.42 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=46079 DF PROTO=TCP SPT=53800 DPT=443 SEQ=1363038140 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:22 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54123 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:16:22 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=185.175.93.34 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=43705 PROTO=TCP SPT=57682 DPT=3300 SEQ=2304531020 ACK=0 WINDOW 1024 RES=0x00 S Feb 10 10:16:23 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.42 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=46095 DF PROTO=TCP SPT=53801 DPT=443 SEQ=2958986076 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:23 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26695 DF PROTO=TCP SPT=53802 DPT=443 SEQ=1291055647 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:23 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26696 DF PROTO=TCP SPT=53803 DPT=443 SEQ=2992455412 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:24 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.48.32.137 LEN=41 TOS=0x00 PREC=0x00 TTL=127 ID=6314 DF PROTO=TCP SPT=53593 DPT=443 SEQ=3696640267 ACK=1520491678 WINDO =5167 RES=0x00 Feb 10 10:16:25 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=3323 DF PROTO=UDP SPT=52694 DPT=53 LEN=50 Feb 10 10:16:25 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=172.217.3.14 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=28097 DF PROTO=TCP SPT=55212 DPT=443 SEQ=2882560194 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:16:25 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11430 DF PROTO=TCP SPT=27775 DPT=443 SEQ=3460378777 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:25 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=82 TOS=0x00 PREC=0x00 TTL=127 ID=17286 PROTO=UDP SPT=59983 DPT=53 LEN=62 Feb 10 10:16:25 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=104.69.25.46 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=64913 DF PROTO=TCP SPT=53804 DPT=443 SEQ=1444367007 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:29 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=194.26.29.117 DST=66.189.252.17 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=6194 PROTO=TCP SPT=58024 DPT=41199 SEQ=1997030604 ACK=0 WINDOW 1024 RES=0x00 S Feb 10 10:16:30 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11440 DF PROTO=TCP SPT=27776 DPT=443 SEQ=2723878577 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:30 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=32641 DF PROTO=UDP SPT=23084 DPT=53 LEN=45 Feb 10 10:16:31 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=65396 DF PROTO=UDP SPT=48664 DPT=53 LEN=45 Feb 10 10:16:31 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.4.142 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=543 DF PROTO=UDP SPT=57230 DPT=443 LEN=1358 Feb 10 10:16:31 R7000 daemon.err dnscrypt-proxy[1498]: Unable to retrieve server certificates Feb 10 10:16:31 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.45 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=27572 DF PROTO=TCP SPT=53805 DPT=443 SEQ=1663921941 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:32 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:64 SRC=157.240.28.25 DST=66.189.252.17 LEN=100 TOS=0x00 PREC=0x00 TTL=85 ID=45980 DF PROTO=TCP SPT=443 DPT=49551 SEQ=3563183700 ACK=282087 766 WINDOW=148 Feb 10 10:16:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=157.240.28.18 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=7016 DF PROTO=TCP SPT=37803 DPT=443 SEQ=2300834768 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Feb 10 10:16:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=66 TOS=0x00 PREC=0x00 TTL=63 ID=32674 DF PROTO=UDP SPT=9036 DPT=53 LEN=46 Feb 10 10:16:34 R7000 daemon.info dnscrypt-proxy[1498]: Refetching server certificates Feb 10 10:16:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=63 ID=47734 PROTO=UDP SPT=49641 DPT=53 LEN=39 Feb 10 10:16:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=157.240.28.18 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=28653 DF PROTO=TCP SPT=37804 DPT=443 SEQ=4112942798 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=32712 DF PROTO=UDP SPT=33100 DPT=53 LEN=44 Feb 10 10:16:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=91.228.166.45 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=45080 DF PROTO=TCP SPT=27779 DPT=80 SEQ=886963368 ACK=0 WINDOW=64240 RES 0x00 SYN URGP=0 Feb 10 10:16:35 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11450 DF PROTO=TCP SPT=27780 DPT=443 SEQ=301497329 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Feb 10 10:16:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=92 TOS=0x00 PREC=0x00 TTL=127 ID=17287 PROTO=UDP SPT=59984 DPT=53 LEN=72 Feb 10 10:16:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=58 TOS=0x00 PREC=0x00 TTL=127 ID=17288 PROTO=UDP SPT=53143 DPT=53 LEN=38 Feb 10 10:16:36 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=13.91.57.145 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=19641 DF PROTO=TCP SPT=53806 DPT=443 SEQ=3220570761 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:40 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11460 DF PROTO=TCP SPT=27781 DPT=443 SEQ=3165461685 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=66 TOS=0x00 PREC=0x00 TTL=127 ID=17289 PROTO=UDP SPT=58436 DPT=53 LEN=46 Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26730 DF PROTO=TCP SPT=53807 DPT=443 SEQ=396434789 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26731 DF PROTO=TCP SPT=53808 DPT=443 SEQ=1839652727 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=157.240.28.16 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=48373 DF PROTO=TCP SPT=48880 DPT=443 SEQ=3123009301 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=63 ID=32879 DF PROTO=UDP SPT=16587 DPT=53 LEN=47 Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26736 DF PROTO=TCP SPT=53809 DPT=443 SEQ=709255852 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26737 DF PROTO=TCP SPT=53810 DPT=443 SEQ=2789055191 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=17290 PROTO=UDP SPT=58943 DPT=53 LEN=41 Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:5C:C4:**:**:**:08:00 SRC=192.168.1.9 DST=157.240.28.16 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=20466 DF PROTO=TCP SPT=48881 DPT=443 SEQ=3402933267 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.0.0.1 LEN=61 TOS=0x00 PREC=0x00 TTL=127 ID=25374 PROTO=UDP SPT=58943 DPT=53 LEN=41 Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.108 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=5906 DF PROTO=TCP SPT=53811 DPT=443 SEQ=4130234640 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:42 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.113.108 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=5907 DF PROTO=TCP SPT=53812 DPT=443 SEQ=965496458 ACK=0 WINDOW=65535 RES=0x00 SYN UR Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=127 ID=17291 PROTO=UDP SPT=57708 DPT=53 LEN=54 Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.212.25.253 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=9982 DF PROTO=TCP SPT=53813 DPT=443 SEQ=4007477088 ACK=0 WINDOW=65535 ES=0x00 SYN URG Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=72.21.91.29 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=2587 DF PROTO=TCP SPT=53814 DPT=80 SEQ=1693027410 ACK=0 WINDOW=64240 RES 0x00 SYN URGP=0 Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=38.90.226.15 LEN=232 TOS=0x00 PREC=0x00 TTL=127 ID=50668 PROTO=UDP SPT=57709 DPT=53535 LEN=212 Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=78 TOS=0x00 PREC=0x00 TTL=127 ID=17293 PROTO=UDP SPT=58911 DPT=53 LEN=58 Feb 10 10:16:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.152 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=21601 DF PROTO=TCP SPT=53815 DPT=443 SEQ=3475283115 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:45 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11470 DF PROTO=TCP SPT=27782 DPT=443 SEQ=3542461608 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:46 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.152 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=21618 DF PROTO=TCP SPT=53816 DPT=443 SEQ=1434755698 ACK=0 WINDOW=6553 RES=0x00 SYN U Feb 10 10:16:47 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.25 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=40404 DF PROTO=TCP SPT=443 DPT=56539 SEQ=2917803132 ACK=3512450 20 WINDOW=121 R Feb 10 10:16:47 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.212.25.253 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=9994 DF PROTO=TCP SPT=53817 DPT=443 SEQ=3705161013 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:47 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.152 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=21631 DF PROTO=TCP SPT=53818 DPT=443 SEQ=2453401707 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=17294 PROTO=UDP SPT=58032 DPT=53 LEN=40 Feb 10 10:16:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26780 DF PROTO=TCP SPT=53819 DPT=443 SEQ=1427815759 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:48 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26781 DF PROTO=TCP SPT=53820 DPT=443 SEQ=1668039164 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=127 ID=17295 PROTO=UDP SPT=64656 DPT=53 LEN=42 Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.42 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=46126 DF PROTO=TCP SPT=53821 DPT=443 SEQ=943740321 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26822 DF PROTO=TCP SPT=53822 DPT=443 SEQ=387842685 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26823 DF PROTO=TCP SPT=53823 DPT=443 SEQ=414947906 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26824 DF PROTO=TCP SPT=53824 DPT=443 SEQ=3285321680 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=17296 PROTO=UDP SPT=57278 DPT=53 LEN=40 Feb 10 10:16:49 R7000 daemon.err dnscrypt-proxy[1498]: Unable to retrieve server certificates Feb 10 10:16:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26831 DF PROTO=TCP SPT=53825 DPT=443 SEQ=647706859 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26873 DF PROTO=TCP SPT=53826 DPT=443 SEQ=1486565616 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.45.25 LEN=1480 TOS=0x00 PREC=0x00 TTL=127 ID=44140 DF PROTO=UDP SPT=57279 DPT=52228 LEN=1460 Feb 10 10:16:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11480 DF PROTO=TCP SPT=27783 DPT=443 SEQ=2455847758 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=66 TOS=0x00 PREC=0x00 TTL=127 ID=17297 PROTO=UDP SPT=50795 DPT=53 LEN=46 Feb 10 10:16:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=209.206.41.86 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=59854 DF PROTO=TCP SPT=53827 DPT=443 SEQ=1276627318 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26890 DF PROTO=TCP SPT=53828 DPT=443 SEQ=2750476026 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26891 DF PROTO=TCP SPT=53829 DPT=443 SEQ=2212881336 ACK=0 WINDOW=6424 RES=0x00 SYN U Feb 10 10:16:51 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26892 DF PROTO=TCP SPT=53830 DPT=443 SEQ=689626448 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:52 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=157.240.28.34 DST=66.189.252.17 LEN=83 TOS=0x00 PREC=0x00 TTL=85 ID=54124 DF PROTO=TCP SPT=443 DPT=41937 SEQ=1243634436 ACK=4001937 02 WINDOW=117 R Feb 10 10:16:54 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=127 ID=17298 PROTO=UDP SPT=53008 DPT=53 LEN=50 Feb 10 10:16:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=128.116.112.44 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=26917 DF PROTO=TCP SPT=53831 DPT=443 SEQ=894789998 ACK=0 WINDOW=64240 RES=0x00 SYN UR Feb 10 10:16:55 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11490 DF PROTO=TCP SPT=27785 DPT=443 SEQ=2727603210 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Feb 10 10:16:55 R7000 daemon.info dnscrypt-proxy[1498]: Refetching server certificates Feb 10 10:16:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=1.1.1.1 LEN=82 TOS=0x00 PREC=0x00 TTL=127 ID=17299 PROTO=UDP SPT=51080 DPT=53 LEN=62 Feb 10 10:16:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:38:00:25:**:**:**:08:00 SRC=192.168.1.29 DST=23.64.176.147 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=16973 DF PROTO=TCP SPT=53832 DPT=443 SEQ=320269627 ACK=0 WINDOW=64240 ES=0x00 SYN URG Feb 10 10:16:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:1C:87:2C:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11500 DF PROTO=TCP SPT=27786 DPT=443 SEQ=1386142168 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT cat /proc/cpuinfo model name : ARMv7 Processor rev 0 (v7l) processor : 0 BogoMIPS : 1987.37 Features : half fastmult edsp tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x3 CPU part : 0xc09 CPU revision : 0 model name : ARMv7 Processor rev 0 (v7l) processor : 1 BogoMIPS : 1993.93 Features : half fastmult edsp tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x3 CPU part : 0xc09 CPU revision : 0 Hardware : Northstar Prototype Revision : 0000 Serial : 0000000000000000 grep -i err /var/log/messages Feb 10 10:18:50 R7000 daemon.err dnscrypt-proxy[1566]: Unable to retrieve server certificates Feb 10 10:19:11 R7000 daemon.err dnscrypt-proxy[1566]: Unable to retrieve server certificates Feb 10 10:19:35 R7000 daemon.err dnscrypt-proxy[1566]: Unable to retrieve server certificates