23 Listopada 2024 23:31:44
Nawigacja
· Strona Główna
· Forum

· Tomato by Shibby
· FreshTomato


Wątki na forum
Najnowsze dyskusje
· [S] Asus RT-AC56U
· DIR868l OFW asus vs ...
· Szukam zaproszenia n...
· [MOD] FreshTomato-AR...
· Asus RT-AC5300 ,prob...
· archer c6 v3.20
· [S] Nighthawk R7000P...
· [S]Asus RT-AC5300 - ...
· Tanie N100 na promce...
· net z telefonu wifi+...
· Tomato - bugi/proble...
· HUAWEI z światłowodem
· Asus TUF-AX3000_V2 p...
· rt-ax88upro częste ...
· [Howto] Xpenology na...
· Jaki router pod Open...
· Ruter z tomato
· Czy to jeszcze NAS?
· RT AC66U B1
· Wireguard na FreshTo...
Najpopularniejsze obecnie wątki
· DIR868l OFW asus ... [8]
· [S] Asus RT-AC56U [0]
Ankieta
Jaki procesor posiada twój router?

Broadcom MIPSEL
Broadcom MIPSEL
36% [151 głosów]

Broadcom ARM
Broadcom ARM
52% [219 głosów]

Atheros
Atheros
5% [22 głosów]

Marvell
Marvell
1% [4 głosów]

Ralink
Ralink
1% [3 głosów]

Intel/AMD/VIA
Intel/AMD/VIA
1% [5 głosów]

Żaden z powyższych
Żaden z powyższych
4% [15 głosów]

Ogółem głosów: 419
Musisz zalogować się, aby móc zagłosować.
Rozpoczęto: 02/02/2015 09:38
Twoje IP
3.17.166.157
Zobacz wątek
OpenLinksys » :: OPROGRAMOWANIE :: » Tomato - firmware
 Drukuj wątek
[MOD] Tomato by kille72
qwerty321
W logach od czasu do czasu


eb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1


Użycie procesora, chwilowe i średnie jakby mniejsze ale widać, że czasem idzie do 50%. Już nie do 100%. Potrzeba więcej czasu.

Połączony z 22 luty 2018 10:27:57:
=========================
Name RT
Model Asus RT-N18U
Chipset ARMv7 Processor rev 0 (v7l)
CPU Frequency 800 MHz (single-core)
Flash Size 128MB

Time Thu, 22 Feb 2018 10:27:00 +0100
Uptime 0 days, 08:53:12
CPU Usage 4.14%
CPU Load (1 / 5 / 15 mins) 0.02 / 0.10 / 0.11
Total / Free Memory 249.80 MB / 202.37 MB (81.01%)
Total / Free NVRAM 64.00 KB / 34.09 KB (53.26%)

CPU Temperature 63°C
Wireless Temperature eth1: 2.4G - 47°C
=========================
Jakby lepiej. Powiedz Kille co zrobiłeś?


Edytowany przez qwerty321 dnia 22-02-2018 10:27
 
kille72

Cytat

qwerty321 napisał(a):

W logach od czasu do czasu


eb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1



Cytat

pedro napisał(a):

PS. i skonczmy już z tym "reducing packet size for..."


  /* We tried resending to this server with a smaller maximum size and got an answer.
     Make that permanent. To avoid reduxing the packet size for a single dropped packet,
     only do this when we get a truncated answer, or one larger than the safe size. */
  if (server && server->edns_pktsz > SAFE_PKTSZ && (forward->flags & FREC_TEST_PKTSZ) &&.
      ((header->hb3 & HB3_TC) || n >= SAFE_PKTSZ))
    {
      server->edns_pktsz = SAFE_PKTSZ;
      server->pktsz_reduced = now;
      prettyprint_addr(&server->addr, daemon->addrbuff);
      my_syslog(LOG_WARNING, _("reducing DNS packet size for nameserver %s to %d"), daemon->addrbuff, SAFE_PKTSZ);
    }


Połączony z 22 luty 2018 10:46:45:

Cytat

qwerty321 napisał(a):

jakby lepiej. Powiedz Kille co zrobiłeś?


@pedro zrobił update dnsmasq do wersji v2.79rc1-2018.02.16

 
qwerty321
Tylko pytanie jak chcecie to obejść. Czy wstawicie dwa slashe przed my_syslog czy usuniecie całość :-)
ta struktura server->.... coś tam jednak przechowuje w związku z warunkiem zawartym wyżej w if() i nie wiem czy mu wyjdzie na zdrowie usunięcie całości.
Pytanie z czego się biorą te zachowania routera? Ja do końca nie jestem w temacie co robi ten warunek i czemu jest ważne aby nie przekraczać wielkości pakietu. I czemu akurat 1280 skoro ramka ethernetu to 1500.

Połączony z 22 luty 2018 11:07:16:
Najpierw to bym rozpisał tego sysloga na kilka linijek żeby było wiadomo, który warunek to powoduje.

if (server->edns_pktsz > SAFE_PKTSZ) {my_syslog...}
i tak dalej kolejno...
I później trzeba zobaczyć, który to i czemu... No bo chowanie głowy w piasek ukrywając loga jest średnio rozsądne.

Połączony z 22 luty 2018 11:16:39:


Feb 22 11:04:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:08:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:10:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280


Połączony z 22 luty 2018 11:18:29:
Może ustalmy, która część warunku to robi?
W którym pliku siedzi ten kod?
Kille jakiego środowiska używasz do obrabiania źródeł? Eclipse jest?


Edytowany przez qwerty321 dnia 22-02-2018 11:18
 
kille72

 
qwerty321
Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.

Ponawiam pytanie jakiego IDE używasz pod te projekty z kroskompilacją na routery z arm?

 
fenir
Beta 2018.1.029 zainstalowana, zauważyłem że się szybciej wgrała od poprzedniczki i odniosłem wrażenie że działa lepiej. DNSSEC działa od kilku godzin, na razie wszystko jest w porządku.


ASUS RT-N18U + FreshTomato
 
qwerty321

Cytat

fenir napisał(a):

Beta 2018.1.029 zainstalowana, zauważyłem że się szybciej wgrała od poprzedniczki i odniosłem wrażenie że działa lepiej. DNSSEC działa od kilku godzin, na razie wszystko jest w porządku.


Szybciej chyba nie, nie odniosłem takiego wrażenia chociaż zapis do pamięci flash odbywa się na zasadzie update bez kasowania tego czego kasować nie potrzeba. Możliwe, że sektory 029 i 025 były rozlokowane podobnie z tymi samymi danymi i z tego powodu wgrało się szybciej.

Działa faktycznie jakby lepiej. Poczekajmy z 2 kolejne dni.

 
kille72

Cytat

qwerty321 napisał(a):

Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.


https://bitbucket.org/kille72/tomato-...ward.c-870

Ja widzę Grin

 
pedro

Cytat

qwerty321 napisał(a):

Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.

Ponawiam pytanie jakiego IDE używasz pod te projekty z kroskompilacją na routery z arm?


Ja też Pfft

https://bitbucket.org/pedro311/fresht...ward.c-870


Netowski 1Gb/1Gb
Huawei E3372s-153 non-hilink + 2x15dBi MIMO
FreshTomato: Asus RT-AC3200 + RT-N18U + RT-N66U + RT-N12
 
djwujek
Pedro widzę w stopce że masz Asusa RT-AC3200 czy możesz sprawdzić do jakiej prędkości rozpędzi się ruter przy włączonym qos ? Pytanko drugie ale to chyba do was oboje czy da rade dodać wsparcie do Asusa RT-AC lub GT-AC5300 jeśli ktoś by je wam podesłał albo i bez tego.


---- SIEĆ 1 -----

1.Modem Vectra 600/60 Mbps
2. Edgerouter X - Dom
3. Edgerouter X - Goście
4. Edgeswitch 24 Lite
5. Asus RT-N 12 d1 DD WRT 43012 - Goście
6. Nas QNAP TS-228A + 1 x 4TB
6. UPS 510W

------ SIEĆ 2 -------
1.Modem Livebox 3.0
 
qwerty321
No więc miałem przed wywałkę dosyć katastrofalną. Port forwarding nie działał, a ponadto dziwnie się router zachowuje. Telefony przechodzą same na LTE, nie chcą internetu przez wifi.
Forwarding naprawił się po zapisaniu go ponownie, w takim sensie, że wpisy wszystkie były ale nie działały. Zaraz dam loga z całości i muszę go rebootnąć, bo coś niestabilnie mu się zrobiło.
Logi mam i robię restart. Zaraz je wkleję.

Połączony z 23 luty 2018 16:34:33:
To są logi przed kliknięciem zapisywania port forwarding. Po kliknięciu nic się więcej nie dopisało ale dziwnie telefony nie lubią go.
==============================


Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 08:46:12 rthome daemon.info dnsmasq-dhcp[14663]: DHCPNAK(br0) 192.168.1.44 04:1b:6d:c7:f7:da wrong server-ID
Feb 22 08:59:00 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:00:00 rthome syslog.info root: -- MARK --
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Refetching server certificates
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519210802 received
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:00:00 rthome syslog.info root: -- MARK --
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Refetching server certificates
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519210802 received
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:11:12 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:15:26 rthome user.info adblock: stopped
Feb 22 10:15:26 rthome user.info adblock: prepare to download ...
Feb 22 10:15:26 rthome user.info adblock: remove cron job
Feb 22 10:15:26 rthome user.info adblock: [1] downloading blacklist - http://winhelp2002.mvps.org/hosts.txt
Feb 22 10:15:26 rthome daemon.info dnsmasq[14663]: exiting on receipt of SIGTERM
Feb 22 10:15:26 rthome daemon.notice dnscrypt-proxy[14707]: Stopping proxy
Feb 22 10:15:26 rthome daemon.info dnscrypt-proxy[14707]: UDP listener shut down
Feb 22 10:15:26 rthome daemon.info dnscrypt-proxy[14707]: TCP listener shut down
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: DNSSEC validation enabled
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: asynchronous logging enabled, queue limit is 5 messages
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: using nameserver 127.0.0.1#40
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: reading /etc/resolv.dnsmasq
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: using nameserver 127.0.0.1#40
Feb 22 10:15:26 rthome daemon.warn dnsmasq[30830]: ignoring nameserver 127.0.0.1 - local interface
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/hosts - 14 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/hosts
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30850]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Ephemeral keys enabled - generating a new seed
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Done
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30852]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30852]: Ephemeral keys enabled - generating a new seed
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30852]: Done
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: now checking DNSSEC signature timestamps
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/hosts - 14 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/hosts
Feb 22 10:15:27 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server certificate with serial #1519210802 received
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate is valid
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server certificate with serial #1519254002 received
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate is valid
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate supersedes certificate #1519210802
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30850]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 22 10:15:33 rthome user.info adblock: ... [1] found 14645 entries
Feb 22 10:15:33 rthome user.info adblock: [2] downloading blacklist - http://adaway.org/hosts.txt
Feb 22 10:15:34 rthome user.info adblock: ... [2] found 525 entries
Feb 22 10:15:34 rthome user.info adblock: [3] downloading blacklist - http://hosts-file.net/ad_servers.txt
Feb 22 10:15:40 rthome user.info adblock: ... [3] found 49177 entries
Feb 22 10:15:40 rthome user.info adblock: [4] downloading blacklist - http://www.malwaredomainlist.com/hostslist/hosts.txt
Feb 22 10:15:41 rthome user.info adblock: ... [4] found 1152 entries
Feb 22 10:15:41 rthome user.info adblock: [5] downloading blacklist - http://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&mimetype=plaintext
Feb 22 10:15:42 rthome user.info adblock: ... [5] found 2595 entries
Feb 22 10:15:42 rthome user.info adblock: [6] downloading blacklist - https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
Feb 22 10:15:42 rthome user.info adblock: ... [6] found 166 entries
Feb 22 10:15:42 rthome user.info adblock: [7] downloading blacklist - http://someonewhocares.org/hosts/zero/hosts
Feb 22 10:15:46 rthome user.info adblock: ... [7] found 13605 entries
Feb 22 10:15:46 rthome user.info adblock: [8] downloading blacklist - https://raw.githubusercontent.com/WindowsLies/BlockWindows/master/hosts
Feb 22 10:15:46 rthome user.info adblock: ... [8] found 109 entries
Feb 22 10:15:47 rthome user.info adblock: [9] downloading blacklist - http://sysctl.org/cameleon/hosts
Feb 22 10:15:48 rthome user.info adblock: ... [9] found 20631 entries
Feb 22 10:15:48 rthome user.info adblock: [10] downloading blacklist - http://adblock.gjtech.net/?format=hostfile
Feb 22 10:15:48 rthome daemon.warn dnsmasq[30830]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:15:50 rthome user.info adblock: ... [10] found 54 entries
Feb 22 10:15:50 rthome user.info adblock: [11] downloading blacklist - http://hostsfile.mine.nu/Hosts
Feb 22 10:16:01 rthome user.info adblock: ... [11] found 106360 entries
Feb 22 10:16:01 rthome user.info adblock: [12] downloading blacklist - https://raw.github.com/notracking/hosts-blocklists/master/hostnames.txt
Feb 22 10:16:02 rthome user.info adblock: ... [12] found 38120 entries
Feb 22 10:16:24 rthome user.info adblock: remove whitelisted hosts from blacklist
Feb 22 10:16:35 rthome user.info adblock: activated - 186555 entries
Feb 22 10:16:35 rthome user.info adblock: add cron job
Feb 22 10:16:35 rthome daemon.info dnsmasq[30830]: exiting on receipt of SIGTERM
Feb 22 10:16:35 rthome daemon.notice dnscrypt-proxy[30850]: Stopping proxy
Feb 22 10:16:35 rthome daemon.info dnscrypt-proxy[30850]: UDP listener shut down
Feb 22 10:16:35 rthome daemon.info dnscrypt-proxy[30850]: TCP listener shut down
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: DNSSEC validation enabled
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: asynchronous logging enabled, queue limit is 5 messages
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: using nameserver 127.0.0.1#40
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: reading /etc/resolv.dnsmasq
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: using nameserver 127.0.0.1#40
Feb 22 10:16:37 rthome daemon.warn dnsmasq[31177]: ignoring nameserver 127.0.0.1 - local interface
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/hosts - 10 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/hosts
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31197]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Ephemeral keys enabled - generating a new seed
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Done
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: now checking DNSSEC signature timestamps
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/hosts - 14 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/hosts
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31199]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31199]: Ephemeral keys enabled - generating a new seed
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31199]: Done
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519210802
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31197]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 22 10:17:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:41:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:00:00 rthome syslog.info root: -- MARK --
Feb 22 11:04:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:08:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:10:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519210802
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 11:19:59 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:23:01 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:24:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:27:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:29:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:38:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:39:39 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:44:21 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:46:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:00:00 rthome syslog.info root: -- MARK --
Feb 22 12:11:30 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 12:38:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:40:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:45:34 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:00:00 rthome syslog.info root: -- MARK --
Feb 22 13:08:22 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:10:59 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 13:24:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:38:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:44:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:57:39 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:00:00 rthome syslog.info root: -- MARK --
Feb 22 14:02:04 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:18:55 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 14:22:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:38:04 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:58:13 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 15:00:00 rthome syslog.info root: -- MARK --
Feb 22 15:04:18 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 15:19:44 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 16:00:00 rthome syslog.info root: -- MARK --
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 17:00:00 rthome syslog.info root: -- MARK --
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 18:00:00 rthome syslog.info root: -- MARK --
Feb 22 18:06:23 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 18:10:23 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 19:00:00 rthome syslog.info root: -- MARK --
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 20:00:00 rthome syslog.info root: -- MARK --
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 20:52:20 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:00:01 rthome syslog.info root: -- MARK --
Feb 22 21:04:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:09:22 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:18:26 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:20:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:24:13 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 21:33:28 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:39:12 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:00:00 rthome syslog.info root: -- MARK --
Feb 22 22:12:05 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:13:31 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:14:33 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 22:42:18 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:59:01 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:00:00 rthome syslog.info root: -- MARK --
Feb 22 23:00:31 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:04:09 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:16:56 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:24:54 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:26:17 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 23:28:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:29:44 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:48:47 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:59:56 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:00:00 rthome syslog.info root: -- MARK --
Feb 23 00:01:46 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:04:21 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:10:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:17:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:19:09 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:21:08 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 00:42:35 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:55:29 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:00:00 rthome syslog.info root: -- MARK --
Feb 23 01:06:05 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:13:10 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:00:00 rthome syslog.info root: -- MARK --
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:53:00 rthome user.info adblock: prepare to download ...
Feb 23 02:53:00 rthome user.info adblock: [1] downloading blacklist - http://winhelp2002.mvps.org/hosts.txt
Feb 23 02:53:03 rthome user.info adblock: ... [1] found 14645 entries
Feb 23 02:53:03 rthome user.info adblock: [2] downloading blacklist - http://adaway.org/hosts.txt
Feb 23 02:53:06 rthome user.info adblock: ... [2] found 525 entries
Feb 23 02:53:06 rthome user.info adblock: [3] downloading blacklist - http://hosts-file.net/ad_servers.txt
Feb 23 02:53:09 rthome user.info adblock: ... [3] found 49177 entries
Feb 23 02:53:09 rthome user.info adblock: [4] downloading blacklist - http://www.malwaredomainlist.com/hostslist/hosts.txt
Feb 23 02:53:11 rthome user.info adblock: ... [4] found 1152 entries
Feb 23 02:53:11 rthome user.info adblock: [5] downloading blacklist - http://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&mimetype=plaintext
Feb 23 02:53:12 rthome user.info adblock: ... [5] found 2594 entries
Feb 23 02:53:12 rthome user.info adblock: [6] downloading blacklist - https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
Feb 23 02:53:13 rthome user.info adblock: ... [6] found 167 entries
Feb 23 02:53:13 rthome user.info adblock: [7] downloading blacklist - http://someonewhocares.org/hosts/zero/hosts
Feb 23 02:53:17 rthome user.info adblock: ... [7] found 13605 entries
Feb 23 02:53:18 rthome user.info adblock: [8] downloading blacklist - https://raw.githubusercontent.com/WindowsLies/BlockWindows/master/hosts
Feb 23 02:53:18 rthome user.info adblock: ... [8] found 109 entries
Feb 23 02:53:18 rthome user.info adblock: [9] downloading blacklist - http://sysctl.org/cameleon/hosts
Feb 23 02:53:20 rthome user.info adblock: ... [9] found 20631 entries
Feb 23 02:53:20 rthome user.info adblock: [10] downloading blacklist - http://adblock.gjtech.net/?format=hostfile
Feb 23 02:53:23 rthome user.info adblock: ... [10] found 54 entries
Feb 23 02:53:23 rthome user.info adblock: [11] downloading blacklist - http://hostsfile.mine.nu/Hosts
Feb 23 02:53:24 rthome user.info adblock: ... [11] download error! Please check URL
Feb 23 02:53:24 rthome user.info adblock: [12] downloading blacklist - https://raw.github.com/notracking/hosts-blocklists/master/hostnames.txt
Feb 23 02:53:25 rthome user.info adblock: ... [12] found 38164 entries
Feb 23 02:53:37 rthome user.info adblock: remove whitelisted hosts from blacklist
Feb 23 02:53:43 rthome user.info adblock: activated - 99947 entries
Feb 23 02:53:43 rthome daemon.info dnsmasq[31177]: exiting on receipt of SIGTERM
Feb 23 02:53:43 rthome daemon.notice dnscrypt-proxy[31197]: Stopping proxy
Feb 23 02:53:43 rthome daemon.info dnscrypt-proxy[31197]: UDP listener shut down
Feb 23 02:53:43 rthome daemon.info dnscrypt-proxy[31197]: TCP listener shut down
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: DNSSEC validation enabled
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: asynchronous logging enabled, queue limit is 5 messages
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: using nameserver 127.0.0.1#40
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: reading /etc/resolv.dnsmasq
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: using nameserver 127.0.0.1#40
Feb 23 02:53:44 rthome daemon.warn dnsmasq[9642]: ignoring nameserver 127.0.0.1 - local interface
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/hosts - 6 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/hosts - 5 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/hosts
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/dhcp-hosts
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9662]: Starting dnscrypt-proxy 1.9.5
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Ephemeral keys enabled - generating a new seed
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Done
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: now checking DNSSEC signature timestamps
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/hosts - 14 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/hosts - 5 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/hosts
Feb 23 02:53:45 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/dhcp-hosts
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9664]: Starting dnscrypt-proxy 1.9.5
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9664]: Ephemeral keys enabled - generating a new seed
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9664]: Done
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9662]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 23 03:00:00 rthome syslog.info root: -- MARK --
Feb 23 03:05:56 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 04:00:00 rthome syslog.info root: -- MARK --
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 05:00:00 rthome syslog.info root: -- MARK --
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 06:00:00 rthome syslog.info root: -- MARK --
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 07:00:00 rthome syslog.info root: -- MARK --
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 08:00:00 rthome syslog.info root: -- MARK --
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 09:00:00 rthome syslog.info root: -- MARK --
Feb 23 09:19:07 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 09:21:21 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 09:32:09 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:00:00 rthome syslog.info root: -- MARK --
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 10:04:24 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:25:06 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:37:01 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 11:00:00 rthome syslog.info root: -- MARK --
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 11:17:22 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 11:33:36 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:00:00 rthome syslog.info root: -- MARK --
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 12:08:51 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:14:39 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:24:47 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:33:40 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:34:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:42:10 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:44:54 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:54:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:00:00 rthome syslog.info root: -- MARK --
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 13:05:04 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:15:05 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:25:12 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:28:20 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:42:04 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 14:00:00 rthome syslog.info root: -- MARK --
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 14:04:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 14:21:15 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 15:00:00 rthome syslog.info root: -- MARK --
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 16:00:00 rthome syslog.info root: -- MARK --
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 16:23:38 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280

==============================

Połączony z 23 luty 2018 16:49:02:
Już wczoraj wieczorem 22-go sam miałem kłopot aby się połączyć do automatyki domowej. Włączyłem/wyłączyłem wifi i się połączyło. Dzisiaj rano w ogóle nie chciało. WhatsApp działał, Signal dziwnie działał ale działał. Wróciłem teraz i to co zastałem w logach to wkleiłem po czym go rebootnąłem.
Coś mu się grubszego stało i pewnie jak wyłączę DNSSEC to mu przejdzie.

Połączony z 23 luty 2018 16:51:51:
Co do tych telefonów przez wifi. Źle się wyraziłem. Mam kilka routerów i jak telefon łączył się przez wifi Asusa N18U to był ten sam objaw co jak łączył się po lanie przez dalszy AP. Jakby DHCP zwariowało, Port forwarding zwariował i nie wiem co jeszcze świrowało.

Połączony z 23 luty 2018 17:01:24:
Dzisiaj z zewnątrz już w ogóle nie dało się połączyć po forwardowanych portach poprzez LTE. Po lanie niektóre telefony miały problem żeby się dobić do tych urządzeń na liście forwardowanych. Coś się katastrofalnie posypało ale tak jakby to następowało coraz mocniej.


Edytowany przez qwerty321 dnia 23-02-2018 17:01
 
kpietrek
U mnie jest tak samo.
Wcześniej myślałem ze to wina dnnsec ale i bez tego na testowym się tak zachowuje. Dopiero wyłączenie i włączenie WiFi pomaga w połączeniu.
Mowa o najnowszym testowym.
Nvram czyszczone.


Netgear R7000 + FreshTomato Firmware 2021.2 K26ARM USB AIO-64K
Asus RT-N18U + FreshTomato Firmware 2021.2 K26ARM USB VPN-64K-NOSMP
Asus RT-AC56U + Tomato Firmware 1.28.0000 -138 K26ARM USB AIO-64K
 
qwerty321
A jednak :-) Myślałem, że tylka ja się czepiam :-)
NVRAM zawsze czyszczę dwa razy.

 
fenir
U mnie wywalił się tor, chociaż nie mam problemu z internetem na światłowodzie:

Cytat

Feb 23 19:38:05 unknown daemon.notice Tor[16680]: Your Guard tripoli3 [xxxxx] is failing to carry more streams on its circuits than usual. Most likely this means the Tor network is overloaded or your network connection is poor. Use counts are 19/24. Success counts are 144/158. 151 circuits completed, 5 were unusable, 2 collapsed, and 20 timed out. For reference, your timeout cutoff is 60 seconds.


Musiałem wejść na router po ftp i wykasować plik state i zrestartować tora. Coś mi się zdaje że za parę godzin znowu go wywali. Coś ta beta ma problemy ze stabilnoscią połączenia, niestety.Sad

Połączony z 24 luty 2018 16:04:33:
W sobotę niestety wszystko padło, brak internetu - nawet po wyłączeniu DNSSEC, musiałem wrócić do wersji grudniowej. Samo dodanie nowego dnsmasq-a bez gruntownego sprawdzenia jadra systemu powoduje błędy i brak możliwości użytkowania takiego pomidora.


Edytowany przez fenir dnia 24-02-2018 16:04
ASUS RT-N18U + FreshTomato
 
qwerty321
Mnie od restartu jeszcze działa. Coś musi go popchnąć do tej wywałki. Poprzednio też tak było. Wywalał się od minut do kilku dni.
A może twój resolver zdechł ?

 
fenir

Cytat

qwerty321 napisał(a):

Mnie od restartu jeszcze działa. Coś musi go popchnąć do tej wywałki. Poprzednio też tak było. Wywalał się od minut do kilku dni.
A może twój resolver zdechł ?


Raczej wątpie bo ten sam resolver działa mi na wersji grudniowej. Wczoraj zaczęło się od tora który działa mi na 1 urżądzeniu, a dziś to się pogłebiło na reszte. Wole poczekać na kolejną wersje do testów bo ta mi się nie podoba.


ASUS RT-N18U + FreshTomato
 
qwerty321
Musiałem zrobić kolejny restart. DHCP się opierało i telefony miały niechęć do łączenia. Ale jeszcze dało się połączyć po 2-3 krotnym rozłączeniu wifi w telefonie.
Jest źle.
A w logach nie było nic niepokojącego.

 
kille72
2018.1.x i na szczęście zero problemow na AC56U, 15 urządzeń podłączonych po LAN, 2.4 oraz 5 GHz. Wgraj inny firmware bo nie umiem Ci pomóc...

 
qwerty321
Ale to nie tylko mnie. Poprzednicy też pisali, że się routery posypały.

 
kille72
To co mamy zmieniać/naprawiać??? Pisza do mnie 10-tki osób które mówią ze sa bardzo zadowolone z v2018.1.x, na Linksysinfo nikt nie pisał o takich problemach jak Ty, @kpietrek i @fenir.
Powiedz nam co mamy naprawiać to postaramy się naprawić Smile

 
Przejdź do forum
Zaloguj
Wprowadź adres e-mail lub nazwę użytkownika

Hasło



Nie masz jeszcze konta? Zarejestruj się.

Zapomniałeś/aś hasła?
Aktualnie online
· Gości online: 97

· Użytkowników online: 0

· Łącznie użytkowników: 24,115
· Najnowszy użytkownik: Ja
Czat
Musisz się zalogować, aby opublikować wiadomość.

Maniek91PL
06-11-2024 22:37
dzięki !Grin

maxikaaz
29-10-2024 14:27
@Maniek91PL - Administration=> Admin Access, i tam masz "Allow Wireless Access" do zaznaczenia

Maniek91PL
26-10-2024 22:07
siemka! ktoś przypomni co się ustawiało jeśli nie mogę wejść od strony wifi do tomato? od lan działa

overflow2
04-10-2024 17:34
Kupowałem Asusy n10u albo n12d1 ale nie widzę ich, chyba już nie produkują, Chodzi o coś nowego i taniego. Transfery niewielkie.

maxikaaz
04-10-2024 09:38
@overflow2 patrząc po dostępności funkcji w nowych kompilacjach, to chyba nawet WRT54G/GL jeszcze ma OpenVPN, albo jakiś odpowiednik... zależy, na jakie transfery liczysz.

overflow2
30-09-2024 20:53
Jaki aktualnie najtańszy router do tomato do openvpn?

maxikaaz
27-07-2024 15:07
@servee - na początek router do rozebrania i obejrzenia, ciężko wróżyć tak tylko po objawach

maxikaaz
27-07-2024 14:55
@servee - cały kontroler nie pada tak sobie z powodu "zbiegu okoliczności",
więc prawdopodobnie gdzieś przepięcie.

servee
25-07-2024 13:33
@maxikaaz: działało, aż pewnego pięknego dnia przestało działać. W tym dniu była też burza, ale to raczej zbieg okoliczności.

maxikaaz
25-07-2024 11:38
@servee - o ile problem jest w obrębie samych wyjść (dławiki, warystory), to naprawialne, ale jeśli w samym SoC - to nienaprawialne ze względu na koszta. A co było przyczyną?

95,476,379 unikalnych wizyt