OpenVPN Client Disconnecting/Dropping

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page 1, 2, 3, 4  Next
Author Message
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Wed Jun 22, 2022 21:00    Post subject: OpenVPN Client Disconnecting/Dropping Reply with quote
Hi,

I have a Netgear WNDR3700 V4 on build DD-WRT v3.0-r48567 std (03/23/2022)

When connecting to thr router ssid, several times the OpenVPN client disconnects and causes no internet until sometimes I have to reboot the router which works other times, changing Nord VPN servers etc. I have put up with it for a while but now it disconnected about 5 times in an hour so was basically unusable

I have multiple servers ticked with NordVPN servers listed with the port 1194 (default) and even tried the tick 'Random Server' and trying other servers from Nords website
Under additional config I have,
verb 5
reneg-sec 0
keepalive 10 60

(From what I read from another forum had these reneg and keepalive)

Any suggestions please
Sponsor
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Wed Jun 22, 2022 22:42    Post subject: Reply with quote
You need to post the syslog so we can really see what's happening. It's hard to tell if the problem is a failed OpenVPN connection, wireless, etc., or some combination.

Code:
cat /var/log/messages


If it's particularly big, it might be better posted on PasteBin and provide a link.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
foz111
DD-WRT Guru


Joined: 01 Oct 2017
Posts: 704
Location: Earth

PostPosted: Thu Jun 23, 2022 15:13    Post subject: Reply with quote
It will be hardware, CPU MHz:560, this will not be fast enough to give a good throughput, may not even connect.
_________________
Netgear R7800 PPPoE Main Router
Network IPV4 - Isolated Vlan's with IoT Devices. Unifi AC-Pro x 3 AP's, Router Wi-Fi Disabled. OVPN Server With Paid Commercial Wireguard Client's. Gateway Mode, DNSMasq, Static Leases & DHCP, Pi-Hole DNS & Running Unbound.

No one can build you the bridge on which you, and only you, must cross the river of life!
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Thu Jun 23, 2022 16:26    Post subject: Reply with quote
Hi,

The hardware is fine, always used to work fine and it does work fine till it has this blip - it's almost like the killswitch is enabled and just reboots the router every so often as it lost the date/time randomly. It also said about it couldn't resolve one of the nord servers listed eventhough that's one recommended on the website & correct format/port

Quote:
Jan 1 00:00:22 DD-WRT syslog.info syslogd started: BusyBox v1.35.0
Jan 1 00:00:22 DD-WRT user.info : [klogd] : daemon successfully started
Jan 1 00:00:22 DD-WRT kern.notice kernel: klogd started: BusyBox v1.35.0 (2022-03-23 07:26:41 +07)
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.000000] Linux version 3.18.140-d6 (root@linux) (gcc version 11.1.0 (OpenWrt GCC 11.1.0 r16592-aabc632023) ) #139422 Wed Mar 23 07:26:17 +07 2022
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] bootconsole [early0] enabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] CPU0 revision is: 0001974c (MIPS 74Kc)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] cpu srif ddr srif cpu 560 ddr 400 ahb 200
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] sys id = 2122 Atheros AR9344 ver 1 rev 1.2 (0x2122)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Determined physical RAM map:
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Zone ranges:
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Normal [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Movable zone start for each node
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Early memory node ranges
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] node 0: [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 80372930, node_mem_map 81000000
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Primary instruction cache 64kB, 4-way, VIPT, I-cache aliases, linesize 32 bytes.
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200 root=1f02 rootfstype=squashfs noinitrd init=/sbin/init
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Writing ErrCtl register=00000000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Readback ErrCtl register=00000000
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Memory: 125948K/131072K available (2490K kernel code, 167K rwdata, 588K rodata, 136K init, 176K bss, 5124K reserved, 0K cma-reserved)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] NR_IRQS:83
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.060000] Calibrating delay loop... 278.93 BogoMIPS (lpj=1394688)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.070000] pid_max: default: 32768 minimum: 301
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.070000] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.080000] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.090000] NET: Registered protocol family 16
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.090000] ar71xx: using random MAC address for eth0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.310000] Switched to clocksource MIPS
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.310000] NET: Registered protocol family 2
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.320000] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.320000] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.330000] TCP: Hash tables configured (established 1024 bind 1024)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.330000] TCP: reno registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.340000] UDP hash table entries: 256 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.340000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.350000] NET: Registered protocol family 1
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.350000] PCI: CLS 0 bytes, default 32
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.350000] gpio_proc: module loaded and /proc/gpio/ created (cool)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.360000] fixup WNDR3700v4 wifi led
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.360000] wl0gpio_proc: module loaded and /proc/wl0gpio/ created
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.370000] futex hash table entries: 256 (order: -1, 3072 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.380000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.390000] msgmni has been set to 245
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.390000] io scheduler noop registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.400000] io scheduler deadline registered (default)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.400000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.410000] console [ttyS0] disabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.430000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 2500000) is a 16550A
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.440000] console [ttyS0] enabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.450000] bootconsole [early0] disabled
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.460000] Atheros on-chip NAND FLash Controller Driver, Version 0.1 (c) 2010 Atheros Communications, Ltd.
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.470000] Ath Nand ID[87c721e0]: 2c:f1:80:95:02
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.470000] ONFI MICRON MT29F1G08ABADAWP
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.480000] Micron
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 1.490000]
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 1.490000] found squashfs at 0x7E0000
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.490000] Creating 7 MTD partitions on "ath-nand":
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.500000] 0x000000000000-0x000000080000 : "RedBoot"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.510000] 0x0000006c0000-0x000008000000 : "linux"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.560000] 0x0000007e0000-0x000001d40000 : "rootfs"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.930000] mtd: partition "rootfs" set to be root filesystem
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.930000] 0x000001d40000-0x000008000000 : "ddwrt"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.600000] 0x000000340000-0x0000003c0000 : "nvram"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.620000] 0x000000080000-0x0000000c0000 : "board_config"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.630000] 0x000000000000-0x000008000000 : "fullflash"
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] ====== NAND Parameters ======
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] sc = 0x87c72000 bbt = 0x87d00500 bbt_size = 0x100 nf_ctrl = 0x344
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] page = 0x800 block = 0x20000 oob = 0x40
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.840000] registering PCI controller with io_map_base unset
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.850000] PCI host bridge to bus 0000:00
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.850000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.860000] pci_bus 0000:00: root bus resource [io 0x0000]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.870000] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.870000] pci 0000:00:00.0: [168c:0033] type 00 class 0x028000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.870000] pci 0000:00:00.0: fixup device configuration
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 7.880000] bootstrap returns device 168C:33
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: supports D1
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.880000] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.890000] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.900000] pci 0000:00:00.0: using irq 72 for pin 1
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.900000] libphy: Fixed MDIO Bus: probed
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.910000] PPP generic driver version 2.4.2
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.910000] PPP BSD Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.920000] PPP Deflate Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.920000] PPP MPPE Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.930000] NET: Registered protocol family 24
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.940000] u32 classifier
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.940000] Performance counters on
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] input device check on
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] Actions configured
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] Netfilter messages via NETLINK v0.30.
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.960000] nf_conntrack version 0.5.0 (1967 buckets, 7868 max)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.960000] nf_conntrack_rtsp v0.7 loading
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.970000] nf_nat_rtsp v0.7 loading
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.970000] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.980000] TCP: westwood registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.980000] TCP: hybla registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] TCP: vegas registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] NET: Registered protocol family 17
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 8.010000] Bridge firewalling registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.010000] 8021q: 802.1Q VLAN Support v1.8
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.020000] searching for nvram
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.020000] nvram size = 524288
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.060000] Atheros AR71xx hardware watchdog driver version 0.1.0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.070000] ar71xx-wdt: timeout=15 secs (max=107) ref freq=40000000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.110000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.110000] Freeing unused kernel memory: 136K
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 15.250000] switch0: Atheros AR8327 rev. 4 switch registered on ag71xx-mdio.0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 15.970000] libphy: ag71xx_mdio: probed
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 16.560000] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd034, driver=Atheros AR8216/AR8236/AR8316]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 16.570000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 17.990000] Loading modules backported from Linux version v5.10-rc6-0-gb65054597872
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 18.000000] Backport generated by backports.git v5.10-rc6-1-0-g3a9d70a3
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.700000] eth0: link up (1000Mbps/Full duplex)
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.760000] ath: EEPROM regdomain sanitized
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.760000] ath: EEPROM regdomain: 0x64
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.760000] ath: EEPROM indicates we should expect a direct regpair map
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.760000] ath: Country alpha2 being used: 00
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.760000] ath: Regpair used: 0x64
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.780000] initialize fq_codel with 262144 bytes memory limit
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.780000] ieee80211_txq_setup_flows: set limit to 262144 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.790000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.790000] ieee80211 phy0: Atheros AR9340 Rev:0 mem=0xb8100000, irq=78
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 19.800000] 2 vs 0
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 19.800000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.820000] ath: EEPROM regdomain sanitized
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.820000] ath: EEPROM regdomain: 0x64
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.820000] ath: EEPROM indicates we should expect a direct regpair map
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.820000] ath: Country alpha2 being used: 00
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.820000] ath: Regpair used: 0x64
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.830000] initialize fq_codel with 262144 bytes memory limit
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.840000] ieee80211_txq_setup_flows: set limit to 262144 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.840000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.850000] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=72
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 20.710000] ar71xx-wdt: enabling watchdog timer
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 21.710000] Atheros AR8216/AR8236/AR8316 ag71xx-mdio.0:00: Port 4 is up
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 21.710000] Atheros AR8216/AR8236/AR8316 ag71xx-mdio.0:00: Port 5 is up
Jan 1 00:00:22 DD-WRT user.info : [resetbutton] : resetbutton daemon successfully started
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.info : [bridge] : bridge br0 successfully added
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.850000] device br0 entered promiscuous mode
Jan 1 00:00:22 DD-WRT user.info : [bridge] : interface vlan1 successfully added to bridge br0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.980000] device vlan1 entered promiscuous mode
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.980000] device eth0 entered promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.010000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.010000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.020000] device br0 left promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.030000] device br0 entered promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.050000] device br0 left promiscuous mode
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: EEPROM regdomain: 0x833a
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: EEPROM indicates we should expect a country code
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: doing EEPROM country->regdmn map search
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: country maps to regdmn code: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: Country alpha2 being used: GB
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: Regpair used: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: regdomain 0x833a dynamically updated by user
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: EEPROM regdomain: 0x833a
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: EEPROM indicates we should expect a country code
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: doing EEPROM country->regdmn map search
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: country maps to regdmn code: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: Country alpha2 being used: GB
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: Regpair used: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.200000] ath: regdomain 0x833a dynamically updated by user
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start configure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start setRTS
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave setRTS
Jan 1 00:00:24 DD-WRT kern.info kernel: [ 24.820000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2452 qual:96 noise:-93 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2432 qual:94 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2412 qual:87 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2422 qual:68 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2442 qual:67 noise:-94 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2462 qual:59 noise:-94 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2457 qual:49 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2427 qual:49 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2447 qual:48 noise:-94 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2467 qual:45 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2417 qual:45 noise:-95 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2437 qual:43 noise:-93 eirp: 20
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2732 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2727 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2722 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2717 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2712 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2707 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2702 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2697 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2692 qual:0 noise:-93 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2687 qual:0 noise:-91 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2682 qual:0 noise:-88 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2677 qual:0 noise:-88 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2672 qual:0 noise:-92 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2667 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2662 qual:0 noise:-88 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2657 qual:0 noise:-89 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2652 qual:0 noise:-92 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2647 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2642 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2637 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2632 qual:0 noise:-93 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2627 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2622 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2617 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2612 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2607 qual:0 noise:-92 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2602 qual:0 noise:-93 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2597 qual:0 noise:-93 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2592 qual:0 noise:-93 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2587 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2582 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2577 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2572 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2567 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2562 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2557 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2552 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2547 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2542 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2537 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2532 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2527 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2522 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2517 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2512 qual:0 noise:-94 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2507 qual:0 noise:-86 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2502 qual:0 noise:-87 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2497 qual:0 noise:-87 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2492 qual:0 noise:-88 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2487 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2484 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2482 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2477 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq:2472 qual:0 noise:-95 eirp: 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2452 default quality 96
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2432 default quality 94
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2412 default quality 87
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2422 default quality 68
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2442 default quality 67
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2462 default quality 59
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2457 default quality 49
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2427 default quality 49
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2447 default quality 48
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2467 default quality 45
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2417 default quality 45
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2437 default quality 43
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2472 default quality 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: selected: 2452
Jan 1 00:00:35 DD-WRT user.debug : mac80211: start setMacFilter
Jan 1 00:00:35 DD-WRT user.debug : mac80211: leave setMacFilter
Jan 1 00:00:37 DD-WRT kern.info kernel: [ 37.390000] device wlan0 entered promiscuous mode
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.180000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.240000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.240000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:38 DD-WRT user.info : [bridge] : interface wlan0 successfully added to bridge br0
Jan 1 00:00:38 DD-WRT user.debug : mac80211: start configure_single_ath9k
Jan 1 00:00:38 DD-WRT user.debug : mac80211: start setRTS
Jan 1 00:00:38 DD-WRT user.debug : mac80211: leave setRTS
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5825 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5785 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5765 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5745 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5700 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5660 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5580 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5540 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5805 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5725 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5720 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5680 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5620 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5500 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5730 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5640 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5520 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5600 qual:96 noise:-87 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5560 qual:96 noise:-87 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5300 qual:96 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5280 qual:96 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5260 qual:96 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5320 qual:95 noise:-88 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5180 qual:93 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5220 qual:92 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5200 qual:83 noise:-85 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5240 qual:79 noise:-87 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5885 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5880 qual:0 noise:-91 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5875 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5870 qual:0 noise:-91 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5865 qual:0 noise:-91 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5845 qual:0 noise:-91 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5825 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5785 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5765 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5745 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5700 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5660 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5580 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5540 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5805 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5725 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5720 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5680 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5620 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5500 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5730 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5640 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5520 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5600 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5560 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5300 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5280 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5260 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5320 default quality 95
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5180 default quality 93
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5220 default quality 92
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5200 default quality 83
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5240 default quality 79
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: selected: 5540
Jan 1 00:00:44 DD-WRT user.debug : mac80211: start setMacFilter
Jan 1 00:00:44 DD-WRT user.debug : mac80211: leave setMacFilter
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.300000] device wlan1 entered promiscuous mode
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.480000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.480000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:44 DD-WRT user.info : [bridge] : interface wlan1 successfully added to bridge br0
Jan 1 00:00:45 DD-WRT kern.info kernel: [ 45.520000] device vlan2 entered promiscuous mode
Jan 1 00:00:45 DD-WRT user.info : [klogd] : kernel log daemon successfully stopped
Jan 1 00:00:46 DD-WRT kern.notice kernel: klogd: exiting
Jan 1 00:00:46 DD-WRT user.info : [telnetd] : daemon successfully started
Jan 1 00:00:46 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:46 DD-WRT user.info : [syslogd] : syslog daemon successfully stopped
Jan 1 00:00:46 DD-WRT syslog.info syslogd exiting
Jan 1 00:00:46 DD-WRT syslog.info syslogd started: BusyBox v1.35.0
Jan 1 00:00:46 DD-WRT user.info : [wland] : daemon successfully started
Jan 1 00:00:47 DD-WRT kern.notice kernel: [ 47.250000] random: nonblocking pool is initialized
Jan 1 00:00:47 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:48 DD-WRT kern.alert kernel: [ 48.240000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:48 DD-WRT kern.alert kernel: [ 48.240000] fast-classifier: registered
Jan 1 00:00:48 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:48 DD-WRT user.info : [dnsmasq] : daemon successfully started
Jan 1 00:00:49 DD-WRT user.info : [cron] : daemon successfully started
Jan 1 00:00:49 DD-WRT cron.info cron[914]: (CRON) STARTUP (fork ok)
Jan 1 00:00:50 DD-WRT daemon.info httpd[882]: [httpd] : httpd server started at port 80
Jan 1 00:00:50 DD-WRT user.info : [httpd] : http daemon successfully started
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[901]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: Current Parameter Settings:
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: mode = 0
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: NOTE: --mute triggered...
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[901]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[938]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[938]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[938]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[938]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[938]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[938]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jan 1 00:00:50 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:51 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jan 1 00:00:51 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:52 DD-WRT kern.info kernel: [ 52.410000] ip6_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:53 DD-WRT kern.info kernel: [ 53.280000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:53 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:53 DD-WRT kern.info kernel: [ 53.620000] device vlan2 left promiscuous mode
Jan 1 00:00:53 DD-WRT user.info : [ttraff] : traffic counter daemon successfully started
Jan 1 00:00:53 DD-WRT user.info : [httpd] : daemon successfully stopped
Jan 1 00:00:53 DD-WRT daemon.info httpd[935]: [httpd] : httpd server shutdown
Jan 1 00:00:53 DD-WRT daemon.info httpd[1166]: [httpd] : httpd server started at port 80
Jan 1 00:00:54 DD-WRT user.info : [httpd] : http daemon successfully started
Jan 1 00:00:54 DD-WRT user.info : [resetbutton] : daemon successfully stopped
Jan 1 00:00:54 DD-WRT user.info : [resetbutton] : resetbutton daemon successfully started
Jan 1 00:00:55 DD-WRT kern.alert kernel: [ 55.460000] fast-classifier: shutting down
Jan 1 00:00:55 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:55 DD-WRT daemon.err openvpn[938]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[938]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[938]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[938]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jan 1 00:00:55 DD-WRT user.notice WDS_Watchdog[1272]: Started
Jan 1 00:00:55 DD-WRT kern.alert kernel: [ 55.770000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:55 DD-WRT kern.alert kernel: [ 55.780000] fast-classifier: registered
Jan 1 00:00:55 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:56 DD-WRT user.info : [wland] : daemon successfully stopped
Jan 1 00:00:56 DD-WRT user.info : [wland] : daemon successfully started
Jan 1 00:00:56 DD-WRT user.info : [wan] : WAN is up. IP: 192.168.1.122
Jan 1 00:00:56 DD-WRT user.info : [dnsmasq] : daemon successfully stopped
Jan 1 00:00:56 DD-WRT user.info : [dnsmasq] : daemon successfully started
Jan 1 00:00:56 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: RESOLVE: signal received during DNS resolution attempt
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: Could not determine IPv4/IPv6 protocol
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: SIGHUP[hard,close_context usr1 to hup] received, process restarting
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[938]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: Current Parameter Settings:
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: mode = 0
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: NOTE: --mute triggered...
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[938]: Restart pause, 5 second(s)
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) hanging, send SIGKILL
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.230000] fast-classifier: shutting down
Jan 1 00:00:59 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.310000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.320000] fast-classifier: registered
Jan 1 00:00:59 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1484]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: Current Parameter Settings:
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: mode = 0
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: NOTE: --mute triggered...
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1484]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1487]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1487]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: UDPv4 link local: (not bound)
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=28c6667d 8ee0882e
Jan 1 00:00:59 DD-WRT kern.info kernel: [ 59.520000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Server) starting/restarting...
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1487]: VERIFY ERROR: depth=2, error=certificate is not yet valid: C=PA, O=NordVPN, CN=NordVPN Root CA, serial=1
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1487]: OpenSSL: error:1416F086:lib(20):func(367):reason(134)
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1487]: TLS_ERROR: BIO read tls_read_plaintext error
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: NOTE: --mute triggered...
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: 2 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: TCP/UDP: Closing socket
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: SIGUSR1[soft,tls-error] received, process restarting
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1487]: Restart pause, 5 second(s)
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1504]: Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve.
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.800000] fast-classifier: shutting down
Jan 1 00:00:59 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:01:00 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jan 1 00:01:00 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jan 1 00:01:00 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jan 1 00:01:00 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jan 1 00:01:00 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.120000] ACCEPT IN=br0 OUT= MAC= SRC= DST= LEN=348 TOS=0x10 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=68 DPT=67 LEN=328
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.350000] DROP IN=br0 OUT=vlan2 MAC= SRC= DST= LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=35488 DF PROTO=TCP SPT=38772 DPT=80 SEQ=3008581679 ACK=0 WINDOW=65535 RE
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.380000] ACCEPT IN=br0 OUT= MAC= SRC= DST= LEN=69 TOS=0x00 PREC=0x00 TTL=64 ID=33362 DF PROTO=UDP SPT=38585 DPT=53 LEN=49
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.400000] DROP IN=br0 OUT=vlan2 MAC= SRC= DST= LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=57177 DF PROTO=TCP SPT=38024 DPT=80 SEQ=3739485248 ACK=0 WINDOW=65535 RES=
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.510000] DROP IN=br0 OUT=vlan2 MAC= SRC= DST= LEN=771 TOS=0x00 PREC=0x00 TTL=62 ID=0 DF PROTO=TCP SPT=27486 DPT=51413 SEQ=1191460070 ACK=3566316715 WINDOW=
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.540000] ACCEPT IN=br0 OUT= MAC= SRC=192.168.3.140 DST= LEN=63 TOS=0x00 PREC=0x00 TTL=64 ID=22852 DF PROTO=UDP SPT=49955 DPT=53 LEN=43
Jan 1 00:01:01 DD-WRT kern.warn kernel: [ 61.590000] DROP IN=br0 OUT=vlan2 MAC= SRC= DST= LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=18852 DF PROTO=TCP SPT=42728 DPT=443 SEQ=3066991247 ACK=0 WINDOW=65535 RES
Jan 1 00:01:01 DD-WRT kern.alert kernel: [ 61.640000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:01:01 DD-WRT kern.alert kernel: [ 61.650000] fast-classifier: registered
Jan 1 00:01:01 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:01:01 DD-WRT auth.warn login[954]: invalid password for 'root' on 'pts/0'
Jan 1 00:01:03 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:01:03 DD-WRT user.info : [process_monitor] : successfully started
Jan 1 00:01:03 DD-WRT daemon.debug ntpclient[1793]: Connecting to 2.pool.ntp.org [194.25.134.196] ...
Jun 23 17:09:00 DD-WRT daemon.info ntpclient[1793]: Time set from 2.pool.ntp.org [194.25.134.196].
Jun 23 17:09:00 DD-WRT daemon.info process_monitor[1791]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 23 17:09:01 DD-WRT daemon.warn openvpn[1487]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 23 17:09:01 DD-WRT daemon.warn openvpn[1487]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.12.220.227:1194
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: UDPv4 link local: (not bound)
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: UDPv4 link remote: [AF_INET]45.12.220.227:1194
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: TLS: Initial packet from [AF_INET]45.12.220.227:1194, sid=47d3f1d7 cf9b4cca
Jun 23 17:09:01 DD-WRT kern.alert kernel: [ 63.910000] fast-classifier: shutting down
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 23 17:09:01 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 23 17:09:01 DD-WRT daemon.notice openvpn[1487]: NOTE: --mute triggered...
Jun 23 17:09:01 DD-WRT kern.alert kernel: [ 64.140000] fast-classifier (PBR safe v2.1.6b): starting up
Jun 23 17:09:01 DD-WRT kern.alert kernel: [ 64.150000] fast-classifier: registered
Jun 23 17:09:01 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 23 17:09:02 DD-WRT kern.alert kernel: [ 65.260000] fast-classifier: shutting down
Jun 23 17:09:02 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jun 23 17:09:02 DD-WRT daemon.notice openvpn[1487]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 23 17:09:02 DD-WRT daemon.warn openvpn[1487]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1501', remote='link-mtu 1634'
Jun 23 17:09:02 DD-WRT daemon.warn openvpn[1487]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 23 17:09:02 DD-WRT daemon.warn openvpn[1487]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Jun 23 17:09:02 DD-WRT daemon.notice openvpn[1487]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 23 17:09:02 DD-WRT daemon.notice openvpn[1487]: [se515.nordvpn.com] Peer Connection Initiated with [AF_INET]45.12.220.227:1194
Jun 23 17:09:03 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 23 17:09:03 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 23 17:09:03 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 23 17:09:03 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 23 17:09:03 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 23 17:09:03 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: SENT CONTROL [se515.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 23 17:09:04 DD-WRT kern.alert kernel: [ 66.700000] fast-classifier (PBR safe v2.1.6b): starting up
Jun 23 17:09:04 DD-WRT kern.alert kernel: [ 66.710000] fast-classifier: registered
Jun 23 17:09:04 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology s
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: NOTE: --mute triggered...
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: OPTIONS IMPORT: route options modified
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: OPTIONS IMPORT: route-related options modified
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: NOTE: --mute triggered...
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Data Channel MTU parms [ L:1452 D:1450 EF:52 EB:389 ET:0 EL:3 ]
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: TUN/TAP device tun1 opened
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: do_ifconfig, ipv4=1, ipv6=0
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_iface_mtu_set: mtu 1400 for tun1
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_iface_up: set tun1 up
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_addr_v4_add: 10.8.2.9/24 dev tun1
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_route_v4_add: 45.12.220.227/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_route_v4_add: 0.0.0.0/1 via 10.8.2.1 dev [NULL] table 0 metric -1
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: net_route_v4_add: 128.0.0.0/1 via 10.8.2.1 dev [NULL] table 0 metric -1
Jun 23 17:09:04 DD-WRT auth.info login[954]: root login on 'pts/0'
Jun 23 17:09:04 DD-WRT daemon.warn openvpn[1487]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 23 17:09:04 DD-WRT daemon.notice openvpn[1487]: Initialization Sequence Completed
Jun 23 17:09:06 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 23 17:09:06 DD-WRT daemon.debug process_monitor[1791]: Restarting cron (time sync change)
Jun 23 17:09:06 DD-WRT user.debug : ttraff: data collection started
Jun 23 17:09:06 DD-WRT user.info : [cron] : daemon successfully stopped
Jun 23 17:09:06 DD-WRT user.info : [cron] : daemon successfully started
Jun 23 17:09:06 DD-WRT cron.info cron[2330]: (CRON) STARTUP (fork ok)
Jun 23 17:09:06 DD-WRT user.info : [process_monitor] : daemon successfully stopped
Jun 23 17:09:06 DD-WRT daemon.info process_monitor[1791]: [process_monitor] : cleanup timers
Jun 23 17:09:06 DD-WRT user.info : [process_monitor] : successfully started
Jun 23 17:09:06 DD-WRT daemon.debug process_monitor[2335]: We need to re-update after 3600 seconds
Jun 23 17:09:06 DD-WRT daemon.info process_monitor[2335]: [process_monitor] : set timer: 3600 seconds, callback: ntp_main()
dale_gribble39
DD-WRT Guru


Joined: 11 Jun 2022
Posts: 1899

PostPosted: Thu Jun 23, 2022 16:34    Post subject: Reply with quote
Picking a wifi channel after scanning with a wifi analyzer app would probably alleviate some of your troubles. It's not recommended to use Auto for channel selection, even if it's working slightly better than it used to.
_________________
"The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost

"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio

<fact>code knows no gender</fact>

This is me, knowing I've ruffled your feathers, and not giving a ****
Some people are still hard-headed.

--------------------------------------
Mac Pro (Mid 2012) - Two 2.4GHz 6-Core Intel Xeon E5645 processors 64GB 1333MHz DDR3 ECC SDRAM OpenSUSE Leap 15.5
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 6407
Location: UK, London, just across the river..

PostPosted: Thu Jun 23, 2022 19:55    Post subject: Reply with quote
so you are connected..but it drops and than long time nothing...and you have a few servers...optional plus watchdog and those lines
reneg-sec 0
keepalive 10 60

hmm you should be fine..but lets see what the VPN gurus will say...

also make sure VPN LZO compression is turned off

i also would ve turn off SFE from basic setup page..as well i can see your security log is turned on form security page and this will flood the syslog..you don't need it in general...all important security events will be reported in the normal syslog...where this extra logs you turned on could be a cons...as well as dale said it could be more likely your bad wifi settings...did you try the router via wire...when internet drops on wifi...

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 55179 WAP
TP-Link WR1043NDv2 -DD-WRT 55303 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55460 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55460 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55363 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12834
Location: Netherlands

PostPosted: Fri Jun 24, 2022 6:29    Post subject: Reply with quote
What we see is what happens when the router is booting up, But what we want to see is what happens if you have a disconnection.

Your settings are not optimal (not related to your problem though) have a look at the OpenVPN Client setup guide there is a link to the Nord VPN settings

You have the OpenVPN watchdog enabled which is fine, that should restart the OpenVPN client if the connection is lost so we should see in the log what is happening.

I also saw a mentioning of the WDS/Connection Watchdog do you have that enabled also?

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Fri Jun 24, 2022 15:54    Post subject: Reply with quote
Alozaros wrote:
so you are connected..but it drops and than long time nothing...and you have a few servers...optional plus watchdog and those lines
reneg-sec 0
keepalive 10 60

hmm you should be fine..but lets see what the VPN gurus will say...

also make sure VPN LZO compression is turned off

i also would ve turn off SFE from basic setup page..as well i can see your security log is turned on form security page and this will flood the syslog..you don't need it in general...all important security events will be reported in the normal syslog...where this extra logs you turned on could be a cons...as well as dale said it could be more likely your bad wifi settings...did you try the router via wire...when internet drops on wifi...


VPN LZO compression was already disabled from following the Nord guide, I've just disabled SFE & changed the logging from high to low - thanks
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Fri Jun 24, 2022 16:01    Post subject: Reply with quote
egc wrote:
What we see is what happens when the router is booting up, But what we want to see is what happens if you have a disconnection.

Your settings are not optimal (not related to your problem though) have a look at the OpenVPN Client setup guide there is a link to the Nord VPN settings

You have the OpenVPN watchdog enabled which is fine, that should restart the OpenVPN client if the connection is lost so we should see in the log what is happening.

I also saw a mentioning of the WDS/Connection Watchdog do you have that enabled also?


I've just checked the NordVPN Settings against this and there was 1 change about the DNS strict order & DNS servers -
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=327398
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=328049&highlight=nordvpn

Should I have the Nord server IP than hostname to save resources on resolution etc?

WDS/Connection Watchdog?

Trying to get logs of the disconnection, tried to get it last time but the logs were empty soon as I re-connected suggesting it had rebooted
dale_gribble39
DD-WRT Guru


Joined: 11 Jun 2022
Posts: 1899

PostPosted: Fri Jun 24, 2022 16:05    Post subject: Reply with quote
WDS/Connection Watchdog is on the Administration -> Keep Alive tab. If the connection dies, it reboots the router as best I understand it. Same is true for the Proxy / Connection Watchdog, I believe.
_________________
"The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost

"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio

<fact>code knows no gender</fact>

This is me, knowing I've ruffled your feathers, and not giving a ****
Some people are still hard-headed.

--------------------------------------
Mac Pro (Mid 2012) - Two 2.4GHz 6-Core Intel Xeon E5645 processors 64GB 1333MHz DDR3 ECC SDRAM OpenSUSE Leap 15.5
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Fri Jun 24, 2022 16:23    Post subject: Reply with quote
dale_gribble39 wrote:
WDS/Connection Watchdog is on the Administration -> Keep Alive tab. If the connection dies, it reboots the router as best I understand it. Same is true for the Proxy / Connection Watchdog, I believe.


Yes this is enabled already
Interval: 1000
Ping timeout in seconds: 10
IP Addresses: 8.8.8.8
Mode : Any dropped IP's for reboot
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Fri Jun 24, 2022 16:25    Post subject: Reply with quote
egc wrote:
What we see is what happens when the router is booting up, But what we want to see is what happens if you have a disconnection.

Your settings are not optimal (not related to your problem though) have a look at the OpenVPN Client setup guide there is a link to the Nord VPN settings

You have the OpenVPN watchdog enabled which is fine, that should restart the OpenVPN client if the connection is lost so we should see in the log what is happening.

I also saw a mentioning of the WDS/Connection Watchdog do you have that enabled also?


Just rebooted the router after these changes (was working fine before reboot)

These are the logs

Quote:
cat /var/log/messages
Jan 1 00:00:22 DD-WRT syslog.info syslogd started: BusyBox v1.35.0
Jan 1 00:00:22 DD-WRT user.info : [klogd] : daemon successfully started
Jan 1 00:00:22 DD-WRT kern.notice kernel: klogd started: BusyBox v1.35.0 (2022-03-23 07:26:41 +07)
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.000000] Linux version 3.18.140-d6 (root@linux) (gcc version 11.1.0 (OpenWrt GCC 11.1.0 r16592-aabc632023) ) #139422 Wed Mar 23 07:26:17 +07 2022
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] bootconsole [early0] enabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] CPU0 revision is: 0001974c (MIPS 74Kc)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] cpu srif ddr srif cpu 560 ddr 400 ahb 200
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] sys id = 2122 Atheros AR9344 ver 1 rev 1.2 (0x2122)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Determined physical RAM map:
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] memory: 08000000 @ 00000000 (usable)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Zone ranges:
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Normal [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Movable zone start for each node
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Early memory node ranges
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] node 0: [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Initmem setup node 0 [mem 0x00000000-0x07ffffff]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] On node 0 totalpages: 32768
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] free_area_init_node: node 0, pgdat 80372930, node_mem_map 81000000
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 256 pages used for memmap
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 0 pages reserved
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] Normal zone: 32768 pages, LIFO batch:7
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Primary instruction cache 64kB, 4-way, VIPT, I-cache aliases, linesize 32 bytes.
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Primary data cache 32kB, 4-way, VIPT, cache aliases, linesize 32 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.000000] pcpu-alloc: [0] 0
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 32512
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.000000] Kernel command line: console=ttyS0,115200 root=1f02 rootfstype=squashfs noinitrd init=/sbin/init
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Writing ErrCtl register=00000000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] Readback ErrCtl register=00000000
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.000000] Memory: 125948K/131072K available (2490K kernel code, 167K rwdata, 588K rodata, 136K init, 176K bss, 5124K reserved, 0K cma-reserved)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.000000] NR_IRQS:83
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.060000] Calibrating delay loop... 278.93 BogoMIPS (lpj=1394688)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.070000] pid_max: default: 32768 minimum: 301
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.070000] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.080000] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.090000] NET: Registered protocol family 16
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.090000] ar71xx: using random MAC address for eth0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.310000] Switched to clocksource MIPS
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.310000] NET: Registered protocol family 2
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.320000] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.320000] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.330000] TCP: Hash tables configured (established 1024 bind 1024)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.330000] TCP: reno registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.340000] UDP hash table entries: 256 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.340000] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.350000] NET: Registered protocol family 1
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 0.350000] PCI: CLS 0 bytes, default 32
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.350000] gpio_proc: module loaded and /proc/gpio/ created (cool)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.360000] fixup WNDR3700v4 wifi led
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 0.360000] wl0gpio_proc: module loaded and /proc/wl0gpio/ created
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.370000] futex hash table entries: 256 (order: -1, 3072 bytes)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.380000] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.390000] msgmni has been set to 245
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.390000] io scheduler noop registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.400000] io scheduler deadline registered (default)
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.400000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.410000] console [ttyS0] disabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.430000] serial8250.0: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 2500000) is a 16550A
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.440000] console [ttyS0] enabled
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 0.450000] bootconsole [early0] disabled
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.460000] Atheros on-chip NAND FLash Controller Driver, Version 0.1 (c) 2010 Atheros Communications, Ltd.
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.470000] Ath Nand ID[87c721e0]: 2c:f1:80:95:02
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.470000] ONFI MICRON MT29F1G08ABADAWP
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 0.480000] Micron
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 1.490000]
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 1.490000] found squashfs at 0x7E0000
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.490000] Creating 7 MTD partitions on "ath-nand":
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.500000] 0x000000000000-0x000000080000 : "RedBoot"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 1.510000] 0x0000006c0000-0x000008000000 : "linux"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.560000] 0x0000007e0000-0x000001d40000 : "rootfs"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.930000] mtd: partition "rootfs" set to be root filesystem
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 3.930000] 0x000001d40000-0x000008000000 : "ddwrt"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.600000] 0x000000340000-0x0000003c0000 : "nvram"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.620000] 0x000000080000-0x0000000c0000 : "board_config"
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 5.630000] 0x000000000000-0x000008000000 : "fullflash"
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] ====== NAND Parameters ======
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] sc = 0x87c72000 bbt = 0x87d00500 bbt_size = 0x100 nf_ctrl = 0x344
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.790000] page = 0x800 block = 0x20000 oob = 0x40
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.840000] registering PCI controller with io_map_base unset
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.850000] PCI host bridge to bus 0000:00
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.850000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.860000] pci_bus 0000:00: root bus resource [io 0x0000]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.870000] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.870000] pci 0000:00:00.0: [168c:0033] type 00 class 0x028000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.870000] pci 0000:00:00.0: fixup device configuration
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 7.880000] bootstrap returns device 168C:33
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: supports D1
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 7.880000] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.880000] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.890000] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.900000] pci 0000:00:00.0: using irq 72 for pin 1
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.900000] libphy: Fixed MDIO Bus: probed
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.910000] PPP generic driver version 2.4.2
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.910000] PPP BSD Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.920000] PPP Deflate Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.920000] PPP MPPE Compression module registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.930000] NET: Registered protocol family 24
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.940000] u32 classifier
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.940000] Performance counters on
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] input device check on
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] Actions configured
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.950000] Netfilter messages via NETLINK v0.30.
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.960000] nf_conntrack version 0.5.0 (1967 buckets, 7868 max)
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.960000] nf_conntrack_rtsp v0.7 loading
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 7.970000] nf_nat_rtsp v0.7 loading
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.970000] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.980000] TCP: westwood registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.980000] TCP: hybla registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] TCP: vegas registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] NET: Registered protocol family 17
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 7.990000] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Jan 1 00:00:22 DD-WRT kern.notice kernel: [ 8.010000] Bridge firewalling registered
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.010000] 8021q: 802.1Q VLAN Support v1.8
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.020000] searching for nvram
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.020000] nvram size = 524288
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.060000] Atheros AR71xx hardware watchdog driver version 0.1.0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.070000] ar71xx-wdt: timeout=15 secs (max=107) ref freq=40000000
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.110000] VFS: Mounted root (squashfs filesystem) readonly on device 31:2.
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 8.110000] Freeing unused kernel memory: 136K
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 15.210000] switch0: Atheros AR8327 rev. 4 switch registered on ag71xx-mdio.0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 15.930000] libphy: ag71xx_mdio: probed
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 16.520000] ag71xx ag71xx.0: connected to PHY at ag71xx-mdio.0:00 [uid=004dd034, driver=Atheros AR8216/AR8236/AR8316]
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 16.530000] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode:RGMII
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 17.950000] Loading modules backported from Linux version v5.10-rc6-0-gb65054597872
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 17.960000] Backport generated by backports.git v5.10-rc6-1-0-g3a9d70a3
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.660000] eth0: link up (1000Mbps/Full duplex)
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.720000] ath: EEPROM regdomain sanitized
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.720000] ath: EEPROM regdomain: 0x64
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.720000] ath: EEPROM indicates we should expect a direct regpair map
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.720000] ath: Country alpha2 being used: 00
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.720000] ath: Regpair used: 0x64
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.740000] initialize fq_codel with 262144 bytes memory limit
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.740000] ieee80211_txq_setup_flows: set limit to 262144 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.750000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.750000] ieee80211 phy0: Atheros AR9340 Rev:0 mem=0xb8100000, irq=78
Jan 1 00:00:22 DD-WRT kern.emerg kernel: [ 19.760000] 2 vs 0
Jan 1 00:00:22 DD-WRT kern.warn kernel: [ 19.760000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.780000] ath: EEPROM regdomain sanitized
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.780000] ath: EEPROM regdomain: 0x64
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.780000] ath: EEPROM indicates we should expect a direct regpair map
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.780000] ath: Country alpha2 being used: 00
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.780000] ath: Regpair used: 0x64
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.790000] initialize fq_codel with 262144 bytes memory limit
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.800000] ieee80211_txq_setup_flows: set limit to 262144 bytes
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 19.800000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 19.810000] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=72
Jan 1 00:00:22 DD-WRT kern.debug kernel: [ 20.670000] ar71xx-wdt: enabling watchdog timer
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 21.670000] Atheros AR8216/AR8236/AR8316 ag71xx-mdio.0:00: Port 4 is up
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 21.670000] Atheros AR8216/AR8236/AR8316 ag71xx-mdio.0:00: Port 5 is up
Jan 1 00:00:22 DD-WRT user.info : [resetbutton] : resetbutton daemon successfully started
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:22 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:22 DD-WRT user.info : [bridge] : bridge br0 successfully added
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.830000] device br0 entered promiscuous mode
Jan 1 00:00:22 DD-WRT user.info : [bridge] : interface vlan1 successfully added to bridge br0
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.950000] device vlan1 entered promiscuous mode
Jan 1 00:00:22 DD-WRT kern.info kernel: [ 22.960000] device eth0 entered promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 22.980000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 22.990000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 22.990000] device br0 left promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.000000] device br0 entered promiscuous mode
Jan 1 00:00:23 DD-WRT kern.info kernel: [ 23.020000] device br0 left promiscuous mode
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave delete_ath9k_devices
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave deconfigure_single_ath9k
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: EEPROM regdomain: 0x833a
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: EEPROM indicates we should expect a country code
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: doing EEPROM country->regdmn map search
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: country maps to regdmn code: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: Country alpha2 being used: GB
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: Regpair used: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: regdomain 0x833a dynamically updated by user
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: EEPROM regdomain: 0x833a
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: EEPROM indicates we should expect a country code
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: doing EEPROM country->regdmn map search
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: country maps to regdmn code: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: Country alpha2 being used: GB
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: Regpair used: 0x37
Jan 1 00:00:23 DD-WRT kern.debug kernel: [ 23.170000] ath: regdomain 0x833a dynamically updated by user
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start configure_single_ath9k
Jan 1 00:00:23 DD-WRT user.debug : mac80211: start setRTS
Jan 1 00:00:23 DD-WRT user.debug : mac80211: leave setRTS
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2432 qual:97 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2452 qual:96 noise:-93 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2412 qual:90 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2442 qual:70 noise:-93 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2462 qual:68 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2422 qual:68 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2447 qual:49 noise:-94 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2467 qual:48 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2427 qual:48 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2437 qual:47 noise:-94 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2457 qual:46 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2417 qual:45 noise:-95 eirp: 20
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2732 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2727 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2722 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2717 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2712 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2707 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2702 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2697 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2692 qual:0 noise:-92 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2687 qual:0 noise:-90 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2682 qual:0 noise:-90 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2677 qual:0 noise:-90 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2672 qual:0 noise:-88 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2667 qual:0 noise:-90 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2662 qual:0 noise:-91 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2657 qual:0 noise:-92 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2652 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2647 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2642 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2637 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2632 qual:0 noise:-93 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2627 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2622 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2617 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2612 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2607 qual:0 noise:-92 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2602 qual:0 noise:-93 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2597 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2592 qual:0 noise:-93 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2587 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2582 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2577 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2572 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2567 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2562 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2557 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2552 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2547 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2542 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2537 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2532 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2527 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2522 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2517 qual:0 noise:-94 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2512 qual:0 noise:-93 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2507 qual:0 noise:-85 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2502 qual:0 noise:-87 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2497 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2492 qual:0 noise:-87 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2487 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2484 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2482 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2477 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq:2472 qual:0 noise:-95 eirp: 0
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2432 default quality 97
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2452 default quality 96
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2412 default quality 90
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2442 default quality 70
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2462 default quality 68
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2422 default quality 68
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2447 default quality 49
Jan 1 00:00:34 DD-WRT user.info : [autochannel] : wlan0: freq: 2467 default quality 48
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2427 default quality 48
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2437 default quality 47
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2457 default quality 46
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2417 default quality 45
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: freq: 2472 default quality 0
Jan 1 00:00:35 DD-WRT user.info : [autochannel] : wlan0: selected: 2432
Jan 1 00:00:35 DD-WRT user.debug : mac80211: start setMacFilter
Jan 1 00:00:35 DD-WRT user.debug : mac80211: leave setMacFilter
Jan 1 00:00:37 DD-WRT kern.info kernel: [ 37.350000] device wlan0 entered promiscuous mode
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.000000] br0: port 1(vlan1) entered forwarding state
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.200000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:38 DD-WRT kern.info kernel: [ 38.200000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:38 DD-WRT user.info : [bridge] : interface wlan0 successfully added to bridge br0
Jan 1 00:00:38 DD-WRT user.debug : mac80211: start configure_single_ath9k
Jan 1 00:00:38 DD-WRT user.debug : mac80211: start setRTS
Jan 1 00:00:38 DD-WRT user.debug : mac80211: leave setRTS
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5825 qual:100 noise:-91 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5785 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5700 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5660 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5620 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5580 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5500 qual:99 noise:-90 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5765 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5745 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5730 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5725 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5720 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5680 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5540 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5520 qual:98 noise:-89 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5805 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5640 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5560 qual:97 noise:-88 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5600 qual:96 noise:-87 eirp: 22
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5280 qual:96 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5260 qual:96 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5300 qual:95 noise:-88 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5320 qual:94 noise:-87 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5220 qual:91 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5180 qual:89 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5200 qual:82 noise:-85 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5240 qual:77 noise:-89 eirp: 20
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5885 qual:0 noise:-91 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5880 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5875 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5870 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5865 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq:5845 qual:0 noise:-90 eirp: 0
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5825 default quality 100
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5785 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5700 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5660 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5620 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5580 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5500 default quality 99
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5765 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5745 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5730 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5725 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5720 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5680 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5540 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5520 default quality 98
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5805 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5640 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5560 default quality 97
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5600 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5280 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5260 default quality 96
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5300 default quality 95
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5320 default quality 94
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5220 default quality 91
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5180 default quality 89
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5200 default quality 82
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: freq: 5240 default quality 77
Jan 1 00:00:44 DD-WRT user.info : [autochannel] : wlan1: selected: 5825
Jan 1 00:00:44 DD-WRT user.debug : mac80211: start setMacFilter
Jan 1 00:00:44 DD-WRT user.debug : mac80211: leave setMacFilter
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.270000] device wlan1 entered promiscuous mode
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.450000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:44 DD-WRT kern.info kernel: [ 44.450000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:44 DD-WRT user.info : [bridge] : interface wlan1 successfully added to bridge br0
Jan 1 00:00:45 DD-WRT user.info : [klogd] : kernel log daemon successfully stopped
Jan 1 00:00:45 DD-WRT kern.notice kernel: klogd: exiting
Jan 1 00:00:46 DD-WRT user.info : [telnetd] : daemon successfully started
Jan 1 00:00:46 DD-WRT user.info : [syslogd] : syslog daemon successfully stopped
Jan 1 00:00:46 DD-WRT syslog.info syslogd exiting
Jan 1 00:00:47 DD-WRT syslog.info syslogd started: BusyBox v1.35.0
Jan 1 00:00:47 DD-WRT user.info : [klogd] : daemon successfully started
Jan 1 00:00:47 DD-WRT kern.notice kernel: klogd started: BusyBox v1.35.0 (2022-03-23 07:26:41 +07)
Jan 1 00:00:47 DD-WRT kern.info kernel: [ 46.210000] device vlan2 entered promiscuous mode
Jan 1 00:00:47 DD-WRT user.info : [wland] : daemon successfully started
Jan 1 00:00:47 DD-WRT kern.notice kernel: [ 47.430000] random: nonblocking pool is initialized
Jan 1 00:00:48 DD-WRT kern.info kernel: [ 48.150000] tun: Universal TUN/TAP device driver, 1.6
Jan 1 00:00:48 DD-WRT kern.info kernel: [ 48.150000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Jan 1 00:00:48 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jan 1 00:00:48 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jan 1 00:00:48 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:49 DD-WRT user.info : [dnsmasq] : daemon successfully started
Jan 1 00:00:49 DD-WRT kern.alert kernel: [ 49.190000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:49 DD-WRT kern.alert kernel: [ 49.190000] fast-classifier: registered
Jan 1 00:00:49 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:49 DD-WRT user.info : [cron] : daemon successfully started
Jan 1 00:00:49 DD-WRT cron.info cron[915]: (CRON) STARTUP (fork ok)
Jan 1 00:00:49 DD-WRT daemon.info httpd[889]: [httpd] : httpd server started at port 80
Jan 1 00:00:49 DD-WRT user.info : [httpd] : http daemon successfully started
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[923]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: Current Parameter Settings:
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: mode = 0
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: NOTE: --mute triggered...
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[923]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[936]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[936]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[936]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[936]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:50 DD-WRT daemon.warn openvpn[936]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jan 1 00:00:50 DD-WRT daemon.notice openvpn[936]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jan 1 00:00:50 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:51 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jan 1 00:00:51 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jan 1 00:00:51 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jan 1 00:00:51 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jan 1 00:00:51 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jan 1 00:00:51 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jan 1 00:00:51 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jan 1 00:00:52 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:52 DD-WRT kern.info kernel: [ 52.720000] ip6_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:53 DD-WRT kern.info kernel: [ 53.240000] br0: port 2(wlan0) entered forwarding state
Jan 1 00:00:53 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:54 DD-WRT kern.info kernel: [ 53.990000] device vlan2 left promiscuous mode
Jan 1 00:00:54 DD-WRT user.info : [ttraff] : traffic counter daemon successfully started
Jan 1 00:00:54 DD-WRT user.info : [httpd] : daemon successfully stopped
Jan 1 00:00:54 DD-WRT daemon.info httpd[926]: [httpd] : httpd server shutdown
Jan 1 00:00:54 DD-WRT daemon.info httpd[1195]: [httpd] : httpd server started at port 80
Jan 1 00:00:54 DD-WRT user.info : [httpd] : http daemon successfully started
Jan 1 00:00:54 DD-WRT user.info : [resetbutton] : daemon successfully stopped
Jan 1 00:00:54 DD-WRT user.info : [resetbutton] : resetbutton daemon successfully started
Jan 1 00:00:55 DD-WRT daemon.err openvpn[936]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[936]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[936]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jan 1 00:00:55 DD-WRT daemon.notice openvpn[936]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jan 1 00:00:55 DD-WRT kern.alert kernel: [ 55.750000] fast-classifier: shutting down
Jan 1 00:00:55 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:56 DD-WRT kern.alert kernel: [ 56.090000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:56 DD-WRT kern.alert kernel: [ 56.100000] fast-classifier: registered
Jan 1 00:00:56 DD-WRT user.notice WDS_Watchdog[1309]: Started
Jan 1 00:00:56 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:57 DD-WRT user.info : [wland] : daemon successfully stopped
Jan 1 00:00:57 DD-WRT user.info : [wland] : daemon successfully started
Jan 1 00:00:57 DD-WRT user.info : [wan] : WAN is up. IP: 192.168.1.122
Jan 1 00:00:57 DD-WRT user.info : [dnsmasq] : daemon successfully stopped
Jan 1 00:00:57 DD-WRT user.info : [dnsmasq] : daemon successfully started
Jan 1 00:00:57 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: RESOLVE: signal received during DNS resolution attempt
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: Could not determine IPv4/IPv6 protocol
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: SIGHUP[hard,close_context usr1 to hup] received, process restarting
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.warn openvpn[936]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: Current Parameter Settings:
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: mode = 0
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: NOTE: --mute triggered...
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:58 DD-WRT daemon.notice openvpn[936]: Restart pause, 5 second(s)
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) hanging, send SIGKILL
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:59 DD-WRT kern.info kernel: [ 59.480000] br0: port 3(wlan1) entered forwarding state
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.540000] fast-classifier: shutting down
Jan 1 00:00:59 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.620000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:00:59 DD-WRT kern.alert kernel: [ 59.630000] fast-classifier: registered
Jan 1 00:00:59 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1515]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: Current Parameter Settings:
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: config = '/tmp/openvpncl/openvpn.conf'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: mode = 0
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: NOTE: --mute triggered...
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1515]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1518]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1518]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: UDPv4 link local: (not bound)
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=b4f80301 aad53916
Jan 1 00:00:59 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jan 1 00:00:59 DD-WRT user.info : [openvpn] : OpenVPN daemon (Server) starting/restarting...
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1518]: VERIFY ERROR: depth=2, error=certificate is not yet valid: C=PA, O=NordVPN, CN=NordVPN Root CA, serial=1
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1518]: OpenSSL: error:1416F086:lib(20):func(367):reason(134)
Jan 1 00:00:59 DD-WRT daemon.err openvpn[1518]: TLS_ERROR: BIO read tls_read_plaintext error
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: NOTE: --mute triggered...
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: 2 variation(s) on previous 3 message(s) suppressed by --mute
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: TCP/UDP: Closing socket
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: SIGUSR1[soft,tls-error] received, process restarting
Jan 1 00:00:59 DD-WRT daemon.notice openvpn[1518]: Restart pause, 5 second(s)
Jan 1 00:00:59 DD-WRT daemon.warn openvpn[1535]: Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve.
Jan 1 00:01:00 DD-WRT kern.alert kernel: [ 60.110000] fast-classifier: shutting down
Jan 1 00:01:00 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:01:01 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jan 1 00:01:01 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jan 1 00:01:01 DD-WRT kern.alert kernel: [ 61.690000] fast-classifier (PBR safe v2.1.6b): starting up
Jan 1 00:01:01 DD-WRT kern.alert kernel: [ 61.690000] fast-classifier: registered
Jan 1 00:01:01 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:01:02 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jan 1 00:01:02 DD-WRT user.info : [process_monitor] : successfully started
Jan 1 00:01:03 DD-WRT daemon.debug ntpclient[1816]: Connecting to 2.pool.ntp.org [185.17.70.106] ...
Jun 24 17:12:10 DD-WRT daemon.info ntpclient[1816]: Time set from 2.pool.ntp.org [185.17.70.106].
Jun 24 17:12:10 DD-WRT daemon.info process_monitor[1814]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 17:12:10 DD-WRT kern.alert kernel: [ 63.540000] fast-classifier: shutting down
Jun 24 17:12:10 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jun 24 17:12:10 DD-WRT kern.alert kernel: [ 63.680000] fast-classifier (PBR safe v2.1.6b): starting up
Jun 24 17:12:10 DD-WRT kern.alert kernel: [ 63.680000] fast-classifier: registered
Jun 24 17:12:10 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 24 17:12:11 DD-WRT daemon.warn openvpn[1518]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 24 17:12:11 DD-WRT daemon.warn openvpn[1518]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Control Channel MTU parms [ L:1521 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Data Channel MTU parms [ L:1521 D:1450 EF:121 EB:389 ET:0 EL:3 ]
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1501,tun-mtu 1400,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.12.220.227:1194
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: UDPv4 link local: (not bound)
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: UDPv4 link remote: [AF_INET]45.12.220.227:1194
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: TLS: Initial packet from [AF_INET]45.12.220.227:1194, sid=8da3b16f fa6ee78c
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: NOTE: --mute triggered...
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 17:12:11 DD-WRT daemon.warn openvpn[1518]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1501', remote='link-mtu 1634'
Jun 24 17:12:11 DD-WRT daemon.warn openvpn[1518]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 17:12:11 DD-WRT daemon.warn openvpn[1518]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 17:12:11 DD-WRT daemon.notice openvpn[1518]: [se515.nordvpn.com] Peer Connection Initiated with [AF_INET]45.12.220.227:1194
Jun 24 17:12:11 DD-WRT kern.alert kernel: [ 64.860000] fast-classifier: shutting down
Jun 24 17:12:12 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully stopped
Jun 24 17:12:12 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 24 17:12:12 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 24 17:12:12 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 24 17:12:12 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 24 17:12:12 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 24 17:12:12 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: SENT CONTROL [se515.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology s
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: NOTE: --mute triggered...
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: OPTIONS IMPORT: route options modified
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: OPTIONS IMPORT: route-related options modified
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: NOTE: --mute triggered...
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Data Channel MTU parms [ L:1452 D:1450 EF:52 EB:389 ET:0 EL:3 ]
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: TUN/TAP device tun1 opened
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: do_ifconfig, ipv4=1, ipv6=0
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_iface_mtu_set: mtu 1400 for tun1
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_iface_up: set tun1 up
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_addr_v4_add: 10.8.0.5/24 dev tun1
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_route_v4_add: 45.12.220.227/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 24 17:12:13 DD-WRT daemon.warn openvpn[1518]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 24 17:12:13 DD-WRT daemon.notice openvpn[1518]: Initialization Sequence Completed
Jun 24 17:12:13 DD-WRT kern.alert kernel: [ 66.560000] fast-classifier (PBR safe v2.1.6b): starting up
Jun 24 17:12:13 DD-WRT kern.alert kernel: [ 66.570000] fast-classifier: registered
Jun 24 17:12:13 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 24 17:12:14 DD-WRT user.info : [sfe] : shortcut forwarding engine successfully started
Jun 24 17:12:14 DD-WRT daemon.debug process_monitor[1814]: Restarting cron (time sync change)
Jun 24 17:12:15 DD-WRT user.info : [cron] : daemon successfully stopped
Jun 24 17:12:15 DD-WRT user.info : [cron] : daemon successfully started
Jun 24 17:12:15 DD-WRT cron.info cron[2346]: (CRON) STARTUP (fork ok)
Jun 24 17:12:15 DD-WRT user.info : [process_monitor] : daemon successfully stopped
Jun 24 17:12:15 DD-WRT daemon.info process_monitor[1814]: [process_monitor] : cleanup timers
Jun 24 17:12:15 DD-WRT user.info : [process_monitor] : successfully started
Jun 24 17:12:15 DD-WRT daemon.debug process_monitor[2351]: We need to re-update after 3600 seconds
Jun 24 17:12:15 DD-WRT daemon.info process_monitor[2351]: [process_monitor] : set timer: 3600 seconds, callback: ntp_main()
Jun 24 17:12:16 DD-WRT user.debug : ttraff: data collection started
Jun 24 17:13:32 DD-WRT kern.info kernel: [ 145.340000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Jun 24 17:14:33 DD-WRT auth.info login[2383]: root login on 'pts/0'
Jun 24 17:18:12 DD-WRT auth.info login[2454]: root login on 'pts/1'
Jun 24 17:19:11 DD-WRT auth.info login[2473]: root login on 'pts/1'
Jun 24 17:19:49 DD-WRT auth.info login[2487]: root login on 'pts/0'
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12834
Location: Netherlands

PostPosted: Fri Jun 24, 2022 16:38    Post subject: Reply with quote
The NordVPN instructions are not "optimal" actually there is no VPN provider with adequate instructions to setup for DDWRT that I know of.

See this from the log:
Quote:
Jun 23 17:09:02 DD-WRT daemon.warn openvpn[1487]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'


Yes they tell you to Set Compression to Disabled but that is wrong it should be set to No and that is just one example.

Do not use any scripts, do not put anything in the Additional config (few exceptions detailed in the guide which you can use to mitigate disconnectons), follow the links you already have how to setup NordVPN.

However that is probably not the explanation for your current problem (the frequent disconnections)

and as you enabled the WDS Connection watchdog we can not investigate your problem because that lets the router reboot Sad

So please disable the WDS connection and any other watchdog except the OpenVPN watchdog.
The OpenVPN watchdog normally only restarts OpenVPN (unless you have set vpn_onfail_reboot manually)

Maybe it is a smart idea to just reset to defaults and start from scratch (never restore from a backup) and if you plan on doing it first upgrade to the latest build and *after* upgrading reset

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12834
Location: Netherlands

PostPosted: Fri Jun 24, 2022 16:40    Post subject: Reply with quote
It looks like you still have not chosen a Wifi channel.

It is already advised to do so (not related to the frequent disconnecions though)

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
dale_gribble39
DD-WRT Guru


Joined: 11 Jun 2022
Posts: 1899

PostPosted: Fri Jun 24, 2022 17:07    Post subject: Reply with quote
egc wrote:
It looks like you still have not chosen a Wifi channel.

It is already advised to do so (not related to the frequent disconnecions though)

dale_gribble39 wrote:
Picking a wifi channel after scanning with a wifi analyzer app would probably alleviate some of your troubles. It's not recommended to use Auto for channel selection, even if it's working slightly better than it used to.

egc wrote:
You have the OpenVPN watchdog enabled which is fine, that should restart the OpenVPN client if the connection is lost so we should see in the log what is happening.

I also saw a mentioning of the WDS/Connection Watchdog do you have that enabled also?

Jord9857 wrote:
dale_gribble39 wrote:
WDS/Connection Watchdog is on the Administration -> Keep Alive tab. If the connection dies, it reboots the router as best I understand it. Same is true for the Proxy / Connection Watchdog, I believe.


Yes this is enabled already
Interval: 1000
Ping timeout in seconds: 10
IP Addresses: 8.8.8.8
Mode : Any dropped IP's for reboot

Pretty sure that you need to disable the WDS/Connection Watchdog and pick a wifi channel.

_________________
"The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost

"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio

<fact>code knows no gender</fact>

This is me, knowing I've ruffled your feathers, and not giving a ****
Some people are still hard-headed.

--------------------------------------
Mac Pro (Mid 2012) - Two 2.4GHz 6-Core Intel Xeon E5645 processors 64GB 1333MHz DDR3 ECC SDRAM OpenSUSE Leap 15.5
Goto page 1, 2, 3, 4  Next Display posts from previous:    Page 1 of 4
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum