[MOD] Tomato by kille72
|
qwerty321 |
Dodano 22-02-2018 10:14
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
W logach od czasu do czasu
eb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1
Użycie procesora, chwilowe i średnie jakby mniejsze ale widać, że czasem idzie do 50%. Już nie do 100%. Potrzeba więcej czasu.
Połączony z 22 luty 2018 10:27:57:
=========================
Name RT
Model Asus RT-N18U
Chipset ARMv7 Processor rev 0 (v7l)
CPU Frequency 800 MHz (single-core)
Flash Size 128MB
Time Thu, 22 Feb 2018 10:27:00 +0100
Uptime 0 days, 08:53:12
CPU Usage 4.14%
CPU Load (1 / 5 / 15 mins) 0.02 / 0.10 / 0.11
Total / Free Memory 249.80 MB / 202.37 MB (81.01%)
Total / Free NVRAM 64.00 KB / 34.09 KB (53.26%)
CPU Temperature 63°C
Wireless Temperature eth1: 2.4G - 47°C
=========================
Jakby lepiej. Powiedz Kille co zrobiłeś?
Edytowany przez qwerty321 dnia 22-02-2018 10:27
|
|
|
|
kille72 |
Dodano 22-02-2018 10:36
|
Administrator
Posty: 2986
Dołączył: 12/02/2007 23:43
|
Cytat qwerty321 napisał(a):
W logach od czasu do czasu
eb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1
Cytat pedro napisał(a):
PS. i skonczmy już z tym "reducing packet size for..."
/* We tried resending to this server with a smaller maximum size and got an answer.
Make that permanent. To avoid reduxing the packet size for a single dropped packet,
only do this when we get a truncated answer, or one larger than the safe size. */
if (server && server->edns_pktsz > SAFE_PKTSZ && (forward->flags & FREC_TEST_PKTSZ) &&.
((header->hb3 & HB3_TC) || n >= SAFE_PKTSZ))
{
server->edns_pktsz = SAFE_PKTSZ;
server->pktsz_reduced = now;
prettyprint_addr(&server->addr, daemon->addrbuff);
my_syslog(LOG_WARNING, _("reducing DNS packet size for nameserver %s to %d"), daemon->addrbuff, SAFE_PKTSZ);
}
Połączony z 22 luty 2018 10:46:45:
@pedro zrobił update dnsmasq do wersji v2.79rc1-2018.02.16 |
|
|
|
qwerty321 |
Dodano 22-02-2018 10:47
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Tylko pytanie jak chcecie to obejść. Czy wstawicie dwa slashe przed my_syslog czy usuniecie całość :-)
ta struktura server->.... coś tam jednak przechowuje w związku z warunkiem zawartym wyżej w if() i nie wiem czy mu wyjdzie na zdrowie usunięcie całości.
Pytanie z czego się biorą te zachowania routera? Ja do końca nie jestem w temacie co robi ten warunek i czemu jest ważne aby nie przekraczać wielkości pakietu. I czemu akurat 1280 skoro ramka ethernetu to 1500.
Połączony z 22 luty 2018 11:07:16:
Najpierw to bym rozpisał tego sysloga na kilka linijek żeby było wiadomo, który warunek to powoduje.
if (server->edns_pktsz > SAFE_PKTSZ) {my_syslog...}
i tak dalej kolejno...
I później trzeba zobaczyć, który to i czemu... No bo chowanie głowy w piasek ukrywając loga jest średnio rozsądne.
Połączony z 22 luty 2018 11:16:39:
Feb 22 11:04:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:08:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:10:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Połączony z 22 luty 2018 11:18:29:
Może ustalmy, która część warunku to robi?
W którym pliku siedzi ten kod?
Kille jakiego środowiska używasz do obrabiania źródeł? Eclipse jest?
Edytowany przez qwerty321 dnia 22-02-2018 11:18
|
|
|
|
kille72 |
Dodano 22-02-2018 11:46
|
Administrator
Posty: 2986
Dołączył: 12/02/2007 23:43
|
https://bitbucket.org/kille72/tomato-...ward.c-861 |
|
|
|
qwerty321 |
Dodano 22-02-2018 11:53
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.
Ponawiam pytanie jakiego IDE używasz pod te projekty z kroskompilacją na routery z arm? |
|
|
|
fenir |
Dodano 22-02-2018 12:23
|
User
Posty: 70
Dołączył: 22/04/2007 15:06
|
Beta 2018.1.029 zainstalowana, zauważyłem że się szybciej wgrała od poprzedniczki i odniosłem wrażenie że działa lepiej. DNSSEC działa od kilku godzin, na razie wszystko jest w porządku.
ASUS RT-N18U + FreshTomato
|
|
|
|
qwerty321 |
Dodano 22-02-2018 12:42
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Cytat fenir napisał(a):
Beta 2018.1.029 zainstalowana, zauważyłem że się szybciej wgrała od poprzedniczki i odniosłem wrażenie że działa lepiej. DNSSEC działa od kilku godzin, na razie wszystko jest w porządku.
Szybciej chyba nie, nie odniosłem takiego wrażenia chociaż zapis do pamięci flash odbywa się na zasadzie update bez kasowania tego czego kasować nie potrzeba. Możliwe, że sektory 029 i 025 były rozlokowane podobnie z tymi samymi danymi i z tego powodu wgrało się szybciej.
Działa faktycznie jakby lepiej. Poczekajmy z 2 kolejne dni. |
|
|
|
kille72 |
Dodano 22-02-2018 15:49
|
Administrator
Posty: 2986
Dołączył: 12/02/2007 23:43
|
Cytat qwerty321 napisał(a):
Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.
https://bitbucket.org/kille72/tomato-...ward.c-870
Ja widzę |
|
|
|
pedro |
Dodano 22-02-2018 15:52
|
Moderator
Posty: 1001
Dołączył: 21/09/2015 15:03
|
Cytat qwerty321 napisał(a):
Tam nie ma w pliku słowa "reducing" to nie ten plik. To by wypadało otworzyć w jakimś przyzwoitym środowisku, które poindeksuje zmienne żeby łatwo było szukać co i gdzie się znajduje.
Ponawiam pytanie jakiego IDE używasz pod te projekty z kroskompilacją na routery z arm?
Ja też
https://bitbucket.org/pedro311/fresht...ward.c-870
Netowski 1Gb/1Gb
Huawei E3372s-153 non-hilink + 2x15dBi MIMO
FreshTomato: Asus RT-AC3200 + RT-N18U + RT-N66U + RT-N12
|
|
|
|
djwujek |
Dodano 22-02-2018 19:13
|
Maxi User
Posty: 861
Dołączył: 29/07/2011 00:09
|
Pedro widzę w stopce że masz Asusa RT-AC3200 czy możesz sprawdzić do jakiej prędkości rozpędzi się ruter przy włączonym qos ? Pytanko drugie ale to chyba do was oboje czy da rade dodać wsparcie do Asusa RT-AC lub GT-AC5300 jeśli ktoś by je wam podesłał albo i bez tego.
---- SIEĆ 1 -----
1.Modem Vectra 600/60 Mbps
2. Edgerouter X - Dom
3. Edgerouter X - Goście
4. Edgeswitch 24 Lite
5. Asus RT-N 12 d1 DD WRT 43012 - Goście
6. Nas QNAP TS-228A + 1 x 4TB
6. UPS 510W
------ SIEĆ 2 -------
1.Modem Livebox 3.0
|
|
|
|
qwerty321 |
Dodano 23-02-2018 16:31
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
No więc miałem przed wywałkę dosyć katastrofalną. Port forwarding nie działał, a ponadto dziwnie się router zachowuje. Telefony przechodzą same na LTE, nie chcą internetu przez wifi.
Forwarding naprawił się po zapisaniu go ponownie, w takim sensie, że wpisy wszystkie były ale nie działały. Zaraz dam loga z całości i muszę go rebootnąć, bo coś niestabilnie mu się zrobiło.
Logi mam i robię restart. Zaraz je wkleję.
Połączony z 23 luty 2018 16:34:33:
To są logi przed kliknięciem zapisywania port forwarding. Po kliknięciu nic się więcej nie dopisało ale dziwnie telefony nie lubią go.
==============================
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 08:09:24 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 08:46:12 rthome daemon.info dnsmasq-dhcp[14663]: DHCPNAK(br0) 192.168.1.44 04:1b:6d:c7:f7:da wrong server-ID
Feb 22 08:59:00 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:00:00 rthome syslog.info root: -- MARK --
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Refetching server certificates
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519210802 received
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 09:09:36 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 09:11:09 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:29:48 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 09:51:21 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:00:00 rthome syslog.info root: -- MARK --
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Refetching server certificates
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519210802 received
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server certificate with serial #1519254002 received
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate is valid
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: This certificate supersedes certificate #1519210802
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:10:30 rthome daemon.info dnscrypt-proxy[14707]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:11:12 rthome daemon.warn dnsmasq[14663]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:15:26 rthome user.info adblock: stopped
Feb 22 10:15:26 rthome user.info adblock: prepare to download ...
Feb 22 10:15:26 rthome user.info adblock: remove cron job
Feb 22 10:15:26 rthome user.info adblock: [1] downloading blacklist - http://winhelp2002.mvps.org/hosts.txt
Feb 22 10:15:26 rthome daemon.info dnsmasq[14663]: exiting on receipt of SIGTERM
Feb 22 10:15:26 rthome daemon.notice dnscrypt-proxy[14707]: Stopping proxy
Feb 22 10:15:26 rthome daemon.info dnscrypt-proxy[14707]: UDP listener shut down
Feb 22 10:15:26 rthome daemon.info dnscrypt-proxy[14707]: TCP listener shut down
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: DNSSEC validation enabled
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: asynchronous logging enabled, queue limit is 5 messages
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: using nameserver 127.0.0.1#40
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: reading /etc/resolv.dnsmasq
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: using nameserver 127.0.0.1#40
Feb 22 10:15:26 rthome daemon.warn dnsmasq[30830]: ignoring nameserver 127.0.0.1 - local interface
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/hosts - 14 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/hosts
Feb 22 10:15:26 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30850]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Ephemeral keys enabled - generating a new seed
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Done
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30852]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30852]: Ephemeral keys enabled - generating a new seed
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30852]: Done
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: now checking DNSSEC signature timestamps
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/hosts - 14 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq[30830]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:15:27 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/hosts
Feb 22 10:15:27 rthome daemon.info dnsmasq-dhcp[30830]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server certificate with serial #1519210802 received
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate is valid
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server certificate with serial #1519254002 received
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate is valid
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: This certificate supersedes certificate #1519210802
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:15:27 rthome daemon.info dnscrypt-proxy[30850]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:15:27 rthome daemon.notice dnscrypt-proxy[30850]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 22 10:15:33 rthome user.info adblock: ... [1] found 14645 entries
Feb 22 10:15:33 rthome user.info adblock: [2] downloading blacklist - http://adaway.org/hosts.txt
Feb 22 10:15:34 rthome user.info adblock: ... [2] found 525 entries
Feb 22 10:15:34 rthome user.info adblock: [3] downloading blacklist - http://hosts-file.net/ad_servers.txt
Feb 22 10:15:40 rthome user.info adblock: ... [3] found 49177 entries
Feb 22 10:15:40 rthome user.info adblock: [4] downloading blacklist - http://www.malwaredomainlist.com/hostslist/hosts.txt
Feb 22 10:15:41 rthome user.info adblock: ... [4] found 1152 entries
Feb 22 10:15:41 rthome user.info adblock: [5] downloading blacklist - http://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&mimetype=plaintext
Feb 22 10:15:42 rthome user.info adblock: ... [5] found 2595 entries
Feb 22 10:15:42 rthome user.info adblock: [6] downloading blacklist - https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
Feb 22 10:15:42 rthome user.info adblock: ... [6] found 166 entries
Feb 22 10:15:42 rthome user.info adblock: [7] downloading blacklist - http://someonewhocares.org/hosts/zero/hosts
Feb 22 10:15:46 rthome user.info adblock: ... [7] found 13605 entries
Feb 22 10:15:46 rthome user.info adblock: [8] downloading blacklist - https://raw.githubusercontent.com/WindowsLies/BlockWindows/master/hosts
Feb 22 10:15:46 rthome user.info adblock: ... [8] found 109 entries
Feb 22 10:15:47 rthome user.info adblock: [9] downloading blacklist - http://sysctl.org/cameleon/hosts
Feb 22 10:15:48 rthome user.info adblock: ... [9] found 20631 entries
Feb 22 10:15:48 rthome user.info adblock: [10] downloading blacklist - http://adblock.gjtech.net/?format=hostfile
Feb 22 10:15:48 rthome daemon.warn dnsmasq[30830]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:15:50 rthome user.info adblock: ... [10] found 54 entries
Feb 22 10:15:50 rthome user.info adblock: [11] downloading blacklist - http://hostsfile.mine.nu/Hosts
Feb 22 10:16:01 rthome user.info adblock: ... [11] found 106360 entries
Feb 22 10:16:01 rthome user.info adblock: [12] downloading blacklist - https://raw.github.com/notracking/hosts-blocklists/master/hostnames.txt
Feb 22 10:16:02 rthome user.info adblock: ... [12] found 38120 entries
Feb 22 10:16:24 rthome user.info adblock: remove whitelisted hosts from blacklist
Feb 22 10:16:35 rthome user.info adblock: activated - 186555 entries
Feb 22 10:16:35 rthome user.info adblock: add cron job
Feb 22 10:16:35 rthome daemon.info dnsmasq[30830]: exiting on receipt of SIGTERM
Feb 22 10:16:35 rthome daemon.notice dnscrypt-proxy[30850]: Stopping proxy
Feb 22 10:16:35 rthome daemon.info dnscrypt-proxy[30850]: UDP listener shut down
Feb 22 10:16:35 rthome daemon.info dnscrypt-proxy[30850]: TCP listener shut down
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: DNSSEC validation enabled
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: asynchronous logging enabled, queue limit is 5 messages
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: using nameserver 127.0.0.1#40
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: reading /etc/resolv.dnsmasq
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: using nameserver 127.0.0.1#40
Feb 22 10:16:37 rthome daemon.warn dnsmasq[31177]: ignoring nameserver 127.0.0.1 - local interface
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/hosts - 10 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/hosts
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31197]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Ephemeral keys enabled - generating a new seed
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Done
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: now checking DNSSEC signature timestamps
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/hosts - 14 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/hosts - 5 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq[31177]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/hosts
Feb 22 10:16:37 rthome daemon.info dnsmasq-dhcp[31177]: read /etc/dnsmasq/dhcp-hosts
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31199]: Starting dnscrypt-proxy 1.9.5
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31199]: Ephemeral keys enabled - generating a new seed
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31199]: Done
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519210802
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 10:16:37 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 10:16:37 rthome daemon.notice dnscrypt-proxy[31197]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 22 10:17:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 10:41:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:00:00 rthome syslog.info root: -- MARK --
Feb 22 11:04:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:08:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:10:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519210802
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519254002 is valid from [2018-02-21] to [2018-02-22]
Feb 22 11:17:22 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 673F:CB0A:37A4:391D:DA99:AD4B:06F5:170D:0138:3AA8:D914:9F7A:0D86:9F39:6AFC:8552
Feb 22 11:19:59 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:23:01 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:24:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:27:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:29:00 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:38:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:39:39 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:44:21 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 11:46:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:00:00 rthome syslog.info root: -- MARK --
Feb 22 12:11:30 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 12:18:02 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 12:38:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:40:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 12:45:34 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:00:00 rthome syslog.info root: -- MARK --
Feb 22 13:08:22 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:10:59 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 13:18:53 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 13:18:54 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 13:24:41 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:38:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:44:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 13:57:39 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:00:00 rthome syslog.info root: -- MARK --
Feb 22 14:02:04 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:18:55 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 14:18:56 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 14:22:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:38:04 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 14:58:13 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 15:00:00 rthome syslog.info root: -- MARK --
Feb 22 15:04:18 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 15:19:44 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 15:19:45 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 16:00:00 rthome syslog.info root: -- MARK --
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 16:20:55 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 17:00:00 rthome syslog.info root: -- MARK --
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 17:21:42 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 18:00:00 rthome syslog.info root: -- MARK --
Feb 22 18:06:23 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 18:10:23 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 18:23:20 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 19:00:00 rthome syslog.info root: -- MARK --
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 19:23:34 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 20:00:00 rthome syslog.info root: -- MARK --
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 20:24:01 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 20:52:20 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:00:01 rthome syslog.info root: -- MARK --
Feb 22 21:04:03 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:09:22 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:18:26 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:20:45 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:24:13 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 21:25:17 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 21:33:28 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 21:39:12 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:00:00 rthome syslog.info root: -- MARK --
Feb 22 22:12:05 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:13:31 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:14:33 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 22:25:19 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 22:42:18 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 22:59:01 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:00:00 rthome syslog.info root: -- MARK --
Feb 22 23:00:31 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:04:09 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:16:56 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:24:54 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:26:17 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519210802 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519254002
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519297201 is valid from [2018-02-22] to [2018-02-23]
Feb 22 23:26:37 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is E498:6105:7387:2133:CA8C:16D1:D641:F4AB:144D:4A5C:6518:4527:9EB3:C609:CE67:647E
Feb 22 23:28:38 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:29:44 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:48:47 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 22 23:59:56 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:00:00 rthome syslog.info root: -- MARK --
Feb 23 00:01:46 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:04:21 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:10:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:17:02 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:19:09 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:21:08 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 00:28:13 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 00:42:35 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 00:55:29 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:00:00 rthome syslog.info root: -- MARK --
Feb 23 01:06:05 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:13:10 rthome daemon.warn dnsmasq[31177]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 01:28:22 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:00:00 rthome syslog.info root: -- MARK --
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Refetching server certificates
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519254002 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate has expired
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519297201 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server certificate with serial #1519340401 received
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate is valid
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: This certificate supersedes certificate #1519297201
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 02:29:01 rthome daemon.info dnscrypt-proxy[31197]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:53:00 rthome user.info adblock: prepare to download ...
Feb 23 02:53:00 rthome user.info adblock: [1] downloading blacklist - http://winhelp2002.mvps.org/hosts.txt
Feb 23 02:53:03 rthome user.info adblock: ... [1] found 14645 entries
Feb 23 02:53:03 rthome user.info adblock: [2] downloading blacklist - http://adaway.org/hosts.txt
Feb 23 02:53:06 rthome user.info adblock: ... [2] found 525 entries
Feb 23 02:53:06 rthome user.info adblock: [3] downloading blacklist - http://hosts-file.net/ad_servers.txt
Feb 23 02:53:09 rthome user.info adblock: ... [3] found 49177 entries
Feb 23 02:53:09 rthome user.info adblock: [4] downloading blacklist - http://www.malwaredomainlist.com/hostslist/hosts.txt
Feb 23 02:53:11 rthome user.info adblock: ... [4] found 1152 entries
Feb 23 02:53:11 rthome user.info adblock: [5] downloading blacklist - http://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&mimetype=plaintext
Feb 23 02:53:12 rthome user.info adblock: ... [5] found 2594 entries
Feb 23 02:53:12 rthome user.info adblock: [6] downloading blacklist - https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt
Feb 23 02:53:13 rthome user.info adblock: ... [6] found 167 entries
Feb 23 02:53:13 rthome user.info adblock: [7] downloading blacklist - http://someonewhocares.org/hosts/zero/hosts
Feb 23 02:53:17 rthome user.info adblock: ... [7] found 13605 entries
Feb 23 02:53:18 rthome user.info adblock: [8] downloading blacklist - https://raw.githubusercontent.com/WindowsLies/BlockWindows/master/hosts
Feb 23 02:53:18 rthome user.info adblock: ... [8] found 109 entries
Feb 23 02:53:18 rthome user.info adblock: [9] downloading blacklist - http://sysctl.org/cameleon/hosts
Feb 23 02:53:20 rthome user.info adblock: ... [9] found 20631 entries
Feb 23 02:53:20 rthome user.info adblock: [10] downloading blacklist - http://adblock.gjtech.net/?format=hostfile
Feb 23 02:53:23 rthome user.info adblock: ... [10] found 54 entries
Feb 23 02:53:23 rthome user.info adblock: [11] downloading blacklist - http://hostsfile.mine.nu/Hosts
Feb 23 02:53:24 rthome user.info adblock: ... [11] download error! Please check URL
Feb 23 02:53:24 rthome user.info adblock: [12] downloading blacklist - https://raw.github.com/notracking/hosts-blocklists/master/hostnames.txt
Feb 23 02:53:25 rthome user.info adblock: ... [12] found 38164 entries
Feb 23 02:53:37 rthome user.info adblock: remove whitelisted hosts from blacklist
Feb 23 02:53:43 rthome user.info adblock: activated - 99947 entries
Feb 23 02:53:43 rthome daemon.info dnsmasq[31177]: exiting on receipt of SIGTERM
Feb 23 02:53:43 rthome daemon.notice dnscrypt-proxy[31197]: Stopping proxy
Feb 23 02:53:43 rthome daemon.info dnscrypt-proxy[31197]: UDP listener shut down
Feb 23 02:53:43 rthome daemon.info dnscrypt-proxy[31197]: TCP listener shut down
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: started, version 2.79rc1-2018.02.16 cachesize 4096
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect inotify
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: DNSSEC validation enabled
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: DNSSEC signature timestamps not checked until receipt of SIGINT
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: asynchronous logging enabled, queue limit is 5 messages
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: DHCP, IP range 10.0.5.210 -- 10.0.5.254, lease time 1d
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: using nameserver 127.0.0.1#40
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: reading /etc/resolv.dnsmasq
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: using nameserver 127.0.0.1#40
Feb 23 02:53:44 rthome daemon.warn dnsmasq[9642]: ignoring nameserver 127.0.0.1 - local interface
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/hosts - 6 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/hosts - 5 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/hosts
Feb 23 02:53:44 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/dhcp-hosts
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9662]: Starting dnscrypt-proxy 1.9.5
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Ephemeral keys enabled - generating a new seed
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Done
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: now checking DNSSEC signature timestamps
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/hosts - 14 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/hosts - 5 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq[9642]: read /etc/dnsmasq/dhcp-hosts - 0 addresses
Feb 23 02:53:45 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/hosts
Feb 23 02:53:45 rthome daemon.info dnsmasq-dhcp[9642]: read /etc/dnsmasq/dhcp-hosts
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9664]: Starting dnscrypt-proxy 1.9.5
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9664]: Ephemeral keys enabled - generating a new seed
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9664]: Done
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 02:53:45 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 02:53:45 rthome daemon.notice dnscrypt-proxy[9662]: Proxying from 127.0.0.1:40 to 178.216.201.222:2053
Feb 23 03:00:00 rthome syslog.info root: -- MARK --
Feb 23 03:05:56 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 03:54:25 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 04:00:00 rthome syslog.info root: -- MARK --
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 04:55:00 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 05:00:00 rthome syslog.info root: -- MARK --
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 05:56:29 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 06:00:00 rthome syslog.info root: -- MARK --
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 06:58:00 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 07:00:00 rthome syslog.info root: -- MARK --
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 07:58:17 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 08:00:00 rthome syslog.info root: -- MARK --
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 08:59:47 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 09:00:00 rthome syslog.info root: -- MARK --
Feb 23 09:19:07 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 09:21:21 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 09:32:09 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:00:00 rthome syslog.info root: -- MARK --
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 10:01:06 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 10:04:24 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:25:06 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 10:37:01 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 11:00:00 rthome syslog.info root: -- MARK --
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519254002 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate has expired
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519297201 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519297201
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519340401 is valid from [2018-02-22] to [2018-02-23]
Feb 23 11:01:58 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 3823:D710:235F:7687:537B:2A53:C49A:DBA5:A901:2535:9548:D2DC:5E23:9C5C:AEC2:D96D
Feb 23 11:17:22 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 11:33:36 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:00:00 rthome syslog.info root: -- MARK --
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 12:02:29 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 12:08:51 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:14:39 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:24:47 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:33:40 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:34:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:42:10 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:44:54 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 12:54:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:00:00 rthome syslog.info root: -- MARK --
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 13:02:55 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 13:05:04 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:15:05 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:25:12 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:28:20 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 13:42:04 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 14:00:00 rthome syslog.info root: -- MARK --
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 14:04:05 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 14:04:48 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 14:21:15 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
Feb 23 15:00:00 rthome syslog.info root: -- MARK --
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 15:05:41 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 16:00:00 rthome syslog.info root: -- MARK --
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Refetching server certificates
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519340401 received
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server certificate with serial #1519383601 received
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate is valid
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: This certificate supersedes certificate #1519340401
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Chosen certificate #1519383601 is valid from [2018-02-23] to [2018-02-24]
Feb 23 16:06:07 rthome daemon.info dnscrypt-proxy[9662]: Server key fingerprint is 1716:1B4D:8578:A7F8:7D39:A2B8:5CFE:CBAA:5C89:6321:6408:C77F:A231:028D:0640:6177
Feb 23 16:23:38 rthome daemon.warn dnsmasq[9642]: reducing DNS packet size for nameserver 127.0.0.1 to 1280
==============================
Połączony z 23 luty 2018 16:49:02:
Już wczoraj wieczorem 22-go sam miałem kłopot aby się połączyć do automatyki domowej. Włączyłem/wyłączyłem wifi i się połączyło. Dzisiaj rano w ogóle nie chciało. WhatsApp działał, Signal dziwnie działał ale działał. Wróciłem teraz i to co zastałem w logach to wkleiłem po czym go rebootnąłem.
Coś mu się grubszego stało i pewnie jak wyłączę DNSSEC to mu przejdzie.
Połączony z 23 luty 2018 16:51:51:
Co do tych telefonów przez wifi. Źle się wyraziłem. Mam kilka routerów i jak telefon łączył się przez wifi Asusa N18U to był ten sam objaw co jak łączył się po lanie przez dalszy AP. Jakby DHCP zwariowało, Port forwarding zwariował i nie wiem co jeszcze świrowało.
Połączony z 23 luty 2018 17:01:24:
Dzisiaj z zewnątrz już w ogóle nie dało się połączyć po forwardowanych portach poprzez LTE. Po lanie niektóre telefony miały problem żeby się dobić do tych urządzeń na liście forwardowanych. Coś się katastrofalnie posypało ale tak jakby to następowało coraz mocniej.
Edytowany przez qwerty321 dnia 23-02-2018 17:01
|
|
|
|
kpietrek |
Dodano 23-02-2018 17:09
|
Power User
Posty: 301
Dołączył: 13/07/2009 21:41
|
U mnie jest tak samo.
Wcześniej myślałem ze to wina dnnsec ale i bez tego na testowym się tak zachowuje. Dopiero wyłączenie i włączenie WiFi pomaga w połączeniu.
Mowa o najnowszym testowym.
Nvram czyszczone.
Netgear R7000 + FreshTomato Firmware 2021.2 K26ARM USB AIO-64K
Asus RT-N18U + FreshTomato Firmware 2021.2 K26ARM USB VPN-64K-NOSMP
Asus RT-AC56U + Tomato Firmware 1.28.0000 -138 K26ARM USB AIO-64K
|
|
|
|
qwerty321 |
Dodano 23-02-2018 17:37
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
A jednak :-) Myślałem, że tylka ja się czepiam :-)
NVRAM zawsze czyszczę dwa razy. |
|
|
|
fenir |
Dodano 23-02-2018 19:57
|
User
Posty: 70
Dołączył: 22/04/2007 15:06
|
U mnie wywalił się tor, chociaż nie mam problemu z internetem na światłowodzie:
Cytat Feb 23 19:38:05 unknown daemon.notice Tor[16680]: Your Guard tripoli3 [xxxxx] is failing to carry more streams on its circuits than usual. Most likely this means the Tor network is overloaded or your network connection is poor. Use counts are 19/24. Success counts are 144/158. 151 circuits completed, 5 were unusable, 2 collapsed, and 20 timed out. For reference, your timeout cutoff is 60 seconds.
Musiałem wejść na router po ftp i wykasować plik state i zrestartować tora. Coś mi się zdaje że za parę godzin znowu go wywali. Coś ta beta ma problemy ze stabilnoscią połączenia, niestety.
Połączony z 24 luty 2018 16:04:33:
W sobotę niestety wszystko padło, brak internetu - nawet po wyłączeniu DNSSEC, musiałem wrócić do wersji grudniowej. Samo dodanie nowego dnsmasq-a bez gruntownego sprawdzenia jadra systemu powoduje błędy i brak możliwości użytkowania takiego pomidora.
Edytowany przez fenir dnia 24-02-2018 16:04
ASUS RT-N18U + FreshTomato
|
|
|
|
qwerty321 |
Dodano 24-02-2018 17:18
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Mnie od restartu jeszcze działa. Coś musi go popchnąć do tej wywałki. Poprzednio też tak było. Wywalał się od minut do kilku dni.
A może twój resolver zdechł ? |
|
|
|
fenir |
Dodano 24-02-2018 17:33
|
User
Posty: 70
Dołączył: 22/04/2007 15:06
|
Cytat qwerty321 napisał(a):
Mnie od restartu jeszcze działa. Coś musi go popchnąć do tej wywałki. Poprzednio też tak było. Wywalał się od minut do kilku dni.
A może twój resolver zdechł ?
Raczej wątpie bo ten sam resolver działa mi na wersji grudniowej. Wczoraj zaczęło się od tora który działa mi na 1 urżądzeniu, a dziś to się pogłebiło na reszte. Wole poczekać na kolejną wersje do testów bo ta mi się nie podoba.
ASUS RT-N18U + FreshTomato
|
|
|
|
qwerty321 |
Dodano 25-02-2018 20:05
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Musiałem zrobić kolejny restart. DHCP się opierało i telefony miały niechęć do łączenia. Ale jeszcze dało się połączyć po 2-3 krotnym rozłączeniu wifi w telefonie.
Jest źle.
A w logach nie było nic niepokojącego. |
|
|
|
kille72 |
Dodano 25-02-2018 20:11
|
Administrator
Posty: 2986
Dołączył: 12/02/2007 23:43
|
2018.1.x i na szczęście zero problemow na AC56U, 15 urządzeń podłączonych po LAN, 2.4 oraz 5 GHz. Wgraj inny firmware bo nie umiem Ci pomóc... |
|
|
|
qwerty321 |
Dodano 25-02-2018 20:16
|
Super User
Posty: 571
Dołączył: 27/04/2014 18:11
|
Ale to nie tylko mnie. Poprzednicy też pisali, że się routery posypały. |
|
|
|
kille72 |
Dodano 25-02-2018 20:25
|
Administrator
Posty: 2986
Dołączył: 12/02/2007 23:43
|
To co mamy zmieniać/naprawiać??? Pisza do mnie 10-tki osób które mówią ze sa bardzo zadowolone z v2018.1.x, na Linksysinfo nikt nie pisał o takich problemach jak Ty, @kpietrek i @fenir.
Powiedz nam co mamy naprawiać to postaramy się naprawić |
|
|