Dit staat er in de log file. Ik heb mijn externe ip adres weg gehaald.
Jan 1 01:00:17 et8000 syslog.info syslogd started: BusyBox v1.24.1
Jan 1 01:00:17 et8000 user.notice kernel: klogd started: BusyBox v1.24.1 (2018-05-08 13:39:50 CEST)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.054000] workingset: timestamp_bits=14 max_order=17 bucket_order=3
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.055000] NFS: Registering the id_resolver key type
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.055000] Key type id_resolver registered
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.055000] Key type id_legacy registered
Jan 1 01:00:17 et8000 user.info kernel: [ 0.055000] nfs4filelayout_init: NFSv4 File Layout Driver Registering...
Jan 1 01:00:17 et8000 user.info kernel: [ 0.055000] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Jan 1 01:00:17 et8000 user.info kernel: [ 0.055000] fuse init (API version 7.26)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.061000] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 253)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.061000] io scheduler noop registered
Jan 1 01:00:17 et8000 user.info kernel: [ 0.061000] io scheduler cfq registered (default)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.061000] Serial: 8250/16550 driver, 4 ports, IRQ sharing disabled
Jan 1 01:00:17 et8000 user.info kernel: [ 0.062000] serial8250.0: ttyS0 at MMIO 0x10406700 (irq = 52, base_baud = 5062500) is a 16550A
Jan 1 01:00:17 et8000 user.info kernel: [ 0.062000] serial8250.0: ttyS1 at MMIO 0x10406740 (irq = 53, base_baud = 5062500) is a 16550A
Jan 1 01:00:17 et8000 user.info kernel: [ 0.063000] serial8250.0: ttyS2 at MMIO 0x10406780 (irq = 54, base_baud = 5062500) is a 16550A
Jan 1 01:00:17 et8000 user.info kernel: [ 0.069000] loop: module loaded
Jan 1 01:00:17 et8000 user.info kernel: [ 0.069000] ahci ahci.0: SSS flag set, parallel bus scan disabled
Jan 1 01:00:17 et8000 user.info kernel: [ 0.079000] ahci ahci.0: AHCI 0001.0300 32 slots 3 ports 6 Gbps 0x3 impl platform mode
Jan 1 01:00:17 et8000 user.info kernel: [ 0.079000] ahci ahci.0: flags: ncq sntf stag clo pmp slum part
Jan 1 01:00:17 et8000 user.info kernel: [ 0.084000] scsi host0: ahci
Jan 1 01:00:17 et8000 user.info kernel: [ 0.084000] scsi host1: ahci
Jan 1 01:00:17 et8000 user.info kernel: [ 0.085000] scsi host2: ahci
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.085000] ata1: FORCE: PHY spd limit set to 3.0Gbps
Jan 1 01:00:17 et8000 user.info kernel: [ 0.085000] ata1: SATA max UDMA/133 mmio [mem 0x10181000-0x10190fff] port 0x100 irq 33
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.085000] ata2: FORCE: PHY spd limit set to 3.0Gbps
Jan 1 01:00:17 et8000 user.info kernel: [ 0.085000] ata2: SATA max UDMA/133 mmio [mem 0x10181000-0x10190fff] port 0x180 irq 33
Jan 1 01:00:17 et8000 user.info kernel: [ 0.085000] ata3: DUMMY
Jan 1 01:00:17 et8000 user.info kernel: [ 0.085000] brcmstb_nand: NAND controller driver is loaded
Jan 1 01:00:17 et8000 user.info kernel: [ 0.086000] libphy: Fixed MDIO Bus: probed
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.086000] __clk_enable: network [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.086000] bcm7429_pm_network_enable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.086000] __clk_enable: enet [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.086000] bcm40nm_pm_genet_enable 00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.088000] bcmgenet: configuring instance #0 for external RGMII
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] __clk_disable: enet [0]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] bcm40nm_pm_genet_disable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] __clk_disable: network [0]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] bcm7429_pm_network_disable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] __clk_enable: network [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] bcm7429_pm_network_enable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] __clk_enable: moca_genet [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] bcm40nm_pm_genet1_enable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] __clk_enable: moca [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.088000] bcm40nm_pm_moca_enable 00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.397000] ata1: SATA link down (SStatus 0 SControl 320)
Jan 1 01:00:17 et8000 user.err kernel: [ 0.400000] ata1: exception Emask 0x10 SAct 0x0 SErr 0x4000000 action 0xe frozen
Jan 1 01:00:17 et8000 user.err kernel: [ 0.400000] ata1: irq_stat 0x00000040, connection status changed
Jan 1 01:00:17 et8000 user.err kernel: [ 0.400000] ata1: SError: { DevExch }
Jan 1 01:00:17 et8000 user.info kernel: [ 0.400000] ata1: hard resetting link
Jan 1 01:00:17 et8000 user.err kernel: [ 0.442000] No PHY detected, not registering interface:1
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] __clk_disable: moca [0]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] bcm40nm_pm_moca_disable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] __clk_disable: moca_genet [0]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] bcm40nm_pm_genet1_disable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] __clk_disable: network [0]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.442000] bcm7429_pm_network_disable 00
Jan 1 01:00:17 et8000 user.warn kernel: [ 0.450000] bcmgenet: probe of bcmgenet.1 failed with error -5
Jan 1 01:00:17 et8000 user.info kernel: [ 0.450000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.450000] __clk_enable: usb [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 0.450000] bcm40nm_pm_usb_enable 00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.450000] ehci-brcm ehci-brcm.0: Broadcom STB EHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.450000] ehci-brcm ehci-brcm.0: new USB bus registered, assigned bus number 1
Jan 1 01:00:17 et8000 user.info kernel: [ 0.460000] ehci-brcm ehci-brcm.0: irq 56, io mem 0x10480300
Jan 1 01:00:17 et8000 user.info kernel: [ 0.467000] ehci-brcm ehci-brcm.0: USB 0.0 started, EHCI 1.00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.467000] hub 1-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.467000] hub 1-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.467000] ehci-brcm ehci-brcm.1: Broadcom STB EHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.467000] ehci-brcm ehci-brcm.1: new USB bus registered, assigned bus number 2
Jan 1 01:00:17 et8000 user.info kernel: [ 0.478000] ehci-brcm ehci-brcm.1: irq 57, io mem 0x10480500
Jan 1 01:00:17 et8000 user.info kernel: [ 0.485000] ehci-brcm ehci-brcm.1: USB 0.0 started, EHCI 1.00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.485000] hub 2-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.485000] hub 2-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.485000] ehci-brcm ehci-brcm.2: Broadcom STB EHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.485000] ehci-brcm ehci-brcm.2: new USB bus registered, assigned bus number 3
Jan 1 01:00:17 et8000 user.info kernel: [ 0.496000] ehci-brcm ehci-brcm.2: irq 61, io mem 0x10490300
Jan 1 01:00:17 et8000 user.info kernel: [ 0.503000] ehci-brcm ehci-brcm.2: USB 0.0 started, EHCI 1.00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.503000] hub 3-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.503000] hub 3-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.503000] ehci-brcm ehci-brcm.3: Broadcom STB EHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.503000] ehci-brcm ehci-brcm.3: new USB bus registered, assigned bus number 4
Jan 1 01:00:17 et8000 user.info kernel: [ 0.514000] ehci-brcm ehci-brcm.3: irq 62, io mem 0x10490500
Jan 1 01:00:17 et8000 user.info kernel: [ 0.521000] ehci-brcm ehci-brcm.3: USB 0.0 started, EHCI 1.00
Jan 1 01:00:17 et8000 user.info kernel: [ 0.521000] hub 4-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.521000] hub 4-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.521000] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Jan 1 01:00:17 et8000 user.info kernel: [ 0.521000] ohci-brcm ohci-brcm.0: Broadcom STB OHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.522000] ohci-brcm ohci-brcm.0: new USB bus registered, assigned bus number 5
Jan 1 01:00:17 et8000 user.info kernel: [ 0.522000] ohci-brcm ohci-brcm.0: irq 58, io mem 0x10480400
Jan 1 01:00:17 et8000 user.info kernel: [ 0.588000] hub 5-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.588000] hub 5-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.588000] ohci-brcm ohci-brcm.1: Broadcom STB OHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.588000] ohci-brcm ohci-brcm.1: new USB bus registered, assigned bus number 6
Jan 1 01:00:17 et8000 user.info kernel: [ 0.589000] ohci-brcm ohci-brcm.1: irq 59, io mem 0x10480600
Jan 1 01:00:17 et8000 user.info kernel: [ 0.655000] hub 6-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.655000] hub 6-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.656000] ohci-brcm ohci-brcm.2: Broadcom STB OHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.656000] ohci-brcm ohci-brcm.2: new USB bus registered, assigned bus number 7
Jan 1 01:00:17 et8000 user.info kernel: [ 0.656000] ohci-brcm ohci-brcm.2: irq 63, io mem 0x10490400
Jan 1 01:00:17 et8000 user.info kernel: [ 0.701000] ata2: SATA link down (SStatus 0 SControl 320)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.722000] hub 7-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.722000] hub 7-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.722000] ohci-brcm ohci-brcm.3: Broadcom STB OHCI
Jan 1 01:00:17 et8000 user.info kernel: [ 0.723000] ohci-brcm ohci-brcm.3: new USB bus registered, assigned bus number 8
Jan 1 01:00:17 et8000 user.info kernel: [ 0.723000] ohci-brcm ohci-brcm.3: irq 64, io mem 0x10490600
Jan 1 01:00:17 et8000 user.info kernel: [ 0.789000] hub 8-0:1.0: USB hub found
Jan 1 01:00:17 et8000 user.info kernel: [ 0.789000] hub 8-0:1.0: 1 port detected
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] usbcore: registered new interface driver usb-storage
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] mousedev: PS/2 mouse device common for all mice
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] i2c /dev entries driver
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] usbcore: registered new interface driver btusb
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] sdhci: Secure Digital Host Controller Interface driver
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] sdhci: Copyright(c) Pierre Ossman
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] sdhci-pltfm: SDHCI platform and OF driver helper
Jan 1 01:00:17 et8000 user.info kernel: [ 0.790000] sdhci-brcmstb sdhci-brcmstb.0: Enabling controller
Jan 1 01:00:17 et8000 user.warn kernel: [ 0.791000] mmc0: Failed to set 32-bit DMA mask.
Jan 1 01:00:17 et8000 user.warn kernel: [ 0.791000] mmc0: No suitable DMA available - falling back to PIO
Jan 1 01:00:17 et8000 user.info kernel: [ 0.824000] mmc0: SDHCI controller on sdhci-brcmstb.0 [sdhci-brcmstb.0] using PIO
Jan 1 01:00:17 et8000 user.info kernel: [ 0.824000] sdhci-brcmstb sdhci-brcmstb.1: Disabled by bootloader
Jan 1 01:00:17 et8000 user.info kernel: [ 0.824000] hidraw: raw HID events driver (C) Jiri Kosina
Jan 1 01:00:17 et8000 user.info kernel: [ 0.824000] usbcore: registered new interface driver usbhid
Jan 1 01:00:17 et8000 user.info kernel: [ 0.824000] usbhid: USB HID core driver
Jan 1 01:00:17 et8000 user.info kernel: [ 0.825000] NET: Registered protocol family 17
Jan 1 01:00:17 et8000 user.info kernel: [ 0.826000] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
Jan 1 01:00:17 et8000 user.info kernel: [ 0.826000] Bluetooth: HIDP socket layer initialized
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.826000] Key type dns_resolver registered
Jan 1 01:00:17 et8000 user.info kernel: [ 0.826000] PM: CP0 COUNT/COMPARE frequency does not depend on divisor
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] EBI CS1: setting up NAND flash (primary)
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] nand: device found, Manufacturer ID: 0xec, Chip ID: 0xdc
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] nand: Samsung NAND 512MiB 3,3V 8-bit
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] nand: 512 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] brcmnand brcmnand.0: 512MiB total, 128KiB blocks, 2KiB pages, 16B OOB, 8-bit, BCH-4
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000]
Jan 1 01:00:17 et8000 user.info kernel: [ 0.827000] Bad block table found at page 262080, version 0x01
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] Bad block table found at page 262016, version 0x01
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x000000580000
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x000005380000
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x00000cbe0000
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x000016a00000
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x00001db00000
Jan 1 01:00:17 et8000 user.info kernel: [ 0.828000] nand_read_bbt: bad block at 0x00001df20000
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.829000] Creating 3 MTD partitions on "brcmnand.0":
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.829000] 0x000000000000-0x000020000000 : "complete"
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.832000] 0x000000000000-0x000000600000 : "kernel"
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.833000] 0x000000600000-0x000020000000 : "rootfs"
Jan 1 01:00:17 et8000 user.info kernel: [ 0.836000] EBI CS0: setting up SPI flash
Jan 1 01:00:17 et8000 user.warn kernel: [ 0.837000] brcm_setup_spi_flash: can't locate SPI master
Jan 1 01:00:17 et8000 user.warn kernel: [ 0.837000] brcm_setup_cs: can't register SPI flash (error -19)
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.837000] ubi0: default fastmap pool size: 200
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.837000] ubi0: default fastmap WL pool size: 100
Jan 1 01:00:17 et8000 user.notice kernel: [ 0.837000] ubi0: attaching mtd2
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.101000] ubi0: attached by fastmap
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.101000] ubi0: fastmap pool size: 200
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.101000] ubi0: fastmap WL pool size: 100
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: attached mtd2 (name "rootfs", size 506 MiB)
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: good PEBs: 4039, bad PEBs: 9, corrupted PEBs: 0
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: user volume: 1, internal volumes: 1, max. volumes count: 128
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: max/mean erase counter: 3/0, WL threshold: 4096, image sequence number: 1428988142
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: available PEBs: 0, total reserved PEBs: 4039, PEBs reserved for bad PEB handling: 71
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.113000] ubi0: background thread "ubi_bgt0d" started, PID 87
Jan 1 01:00:17 et8000 user.info kernel: [ 1.113000] ALSA device list:
Jan 1 01:00:17 et8000 user.info kernel: [ 1.113000] No soundcards found.
Jan 1 01:00:17 et8000 user.err kernel: [ 1.113000] Warning: unable to open an initial console.
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.115000] UBIFS (ubi0:0): background thread "ubifs_bgt0_0" started, PID 88
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.154000] UBIFS (ubi0:0): recovery needed
Jan 1 01:00:17 et8000 user.info kernel: [ 1.165000] usb 8-1: new full-speed USB device number 2 using ohci-brcm
Jan 1 01:00:17 et8000 user.info kernel: [ 1.289000] ata1: SATA link up 3.0 Gbps (SStatus 123 SControl 320)
Jan 1 01:00:17 et8000 user.info kernel: [ 1.295000] ata1.00: ATA-7: SAMSUNG HD322HJ, 1AC01118, max UDMA7
Jan 1 01:00:17 et8000 user.info kernel: [ 1.295000] ata1.00: 625142448 sectors, multi 0: LBA48 NCQ (depth 31/32)
Jan 1 01:00:17 et8000 user.info kernel: [ 1.301000] ata1.00: configured for UDMA/133
Jan 1 01:00:17 et8000 user.info kernel: [ 1.301000] ata1: EH complete
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.302000] scsi 0:0:0:0: Direct-Access ATA SAMSUNG HD322HJ 1118 PQ: 0 ANSI: 5
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.310000] sd 0:0:0:0: Attached scsi generic sg0 type 0
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.310000] sd 0:0:0:0: [sda] 625142448 512-byte logical blocks: (320 GB/298 GiB)
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.310000] sd 0:0:0:0: [sda] Write Protect is off
Jan 1 01:00:17 et8000 user.debug kernel: [ 1.310000] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.310000] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Jan 1 01:00:17 et8000 user.info kernel: [ 1.315000] sda: sda1
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.316000] sd 0:0:0:0: [sda] Attached SCSI disk
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): recovery completed
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): UBIFS: mounted UBI device 0, volume 0, name "rootfs"
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): FS size: 501682176 bytes (478 MiB, 3951 LEBs), journal size 9023488 bytes (8 MiB, 72 LEBs)
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): reserved for root: 0 bytes (0 KiB)
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.349000] UBIFS (ubi0:0): media format: w4/r0 (latest is w5/r0), UUID 204EDFB5-70D2-4291-B44B-4FDD3463F7B6, small LPT model
Jan 1 01:00:17 et8000 user.info kernel: [ 1.351000] VFS: Mounted root (ubifs filesystem) on device 0:12.
Jan 1 01:00:17 et8000 user.info kernel: [ 1.352000] devtmpfs: mounted
Jan 1 01:00:17 et8000 user.info kernel: [ 1.352000] Freeing unused kernel memory: 284K
Jan 1 01:00:17 et8000 user.warn kernel: [ 1.352000] This architecture does not have kernel memory protection.
Jan 1 01:00:17 et8000 user.notice kernel: [ 1.496000] random: crng init done
Jan 1 01:00:17 et8000 user.info kernel: [ 1.979000] EXT4-fs (sda1): recovery complete
Jan 1 01:00:17 et8000 user.info kernel: [ 2.009000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Jan 1 01:00:17 et8000 user.warn kernel: [ 2.154000] tpm: loading out-of-tree module taints kernel.
Jan 1 01:00:17 et8000 user.info kernel: [ 2.157000] usbcore: registered new interface driver tpm
Jan 1 01:00:17 et8000 user.warn kernel: [ 5.215000] dvb: module_layout: kernel tainted.
Jan 1 01:00:17 et8000 user.warn kernel: [ 5.215000] Disabling lock debugging due to kernel taint
Jan 1 01:00:17 et8000 user.info kernel: [ 7.984000] input: dreambox remote control (native) as /devices/virtual/input/input0
Jan 1 01:00:17 et8000 user.info kernel: [ 7.985000] input: dreambox advanced remote control (native) as /devices/virtual/input/input1
Jan 1 01:00:17 et8000 user.info kernel: [ 8.061000] dvbdev: DVB: registering new adapter (dvb0)
Jan 1 01:00:17 et8000 user.info kernel: [ 8.062000] platform dvb0.0: DVB: registering adapter 0 frontend 0 (DVB-C)...
Jan 1 01:00:17 et8000 user.info kernel: [ 8.408000] input: front panel as /devices/virtual/input/input2
Jan 1 01:00:17 et8000 user.info kernel: [ 9.110000] Registered IR keymap rc-cec
Jan 1 01:00:17 et8000 user.info kernel: [ 9.110000] input: RC for hdmi_cec as /devices/platform/hdmi.0/rc/rc0/input3
Jan 1 01:00:17 et8000 user.info kernel: [ 9.110000] rc rc0: RC for hdmi_cec as /devices/platform/hdmi.0/rc/rc0
Jan 1 01:00:17 et8000 user.debug kernel: [ 10.794000] __clk_enable: network [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 10.794000] bcm7429_pm_network_enable 00
Jan 1 01:00:17 et8000 user.debug kernel: [ 10.794000] __clk_enable: enet [1]
Jan 1 01:00:17 et8000 user.debug kernel: [ 10.794000] bcm40nm_pm_genet_enable 00
Jan 1 01:00:17 et8000 user.info kernel: [ 10.894000] bcmgenet bcmgenet.0 eth0: link up, 1000 Mbps, full duplex
Jan 1 01:00:17 et8000 user.info kernel: [ 14.510000] NET: Registered protocol family 10
Jan 1 01:00:17 et8000 user.info kernel: [ 14.512000] Segment Routing with IPv6
Jan 1 01:00:17 et8000 user.info kernel: [ 14.780000] tun: Universal TUN/TAP device driver, 1.6
Jan 1 01:00:17 et8000 user.info kernel: [ 14.780000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Found user 'avahi' (UID 996) and group 'avahi' (GID 995).
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully dropped root privileges.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: avahi-daemon 0.6.32 starting up.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully called chroot().
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully dropped remaining capabilities.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Loading service file /services/sftp-ssh.service.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Loading service file /services/ssh.service.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv6 for mDNS.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv4 for mDNS.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Network interface enumeration completed.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Registering new address record for fe80::216:b4ff:fe06:1a5 on eth0.*.
Jan 1 01:00:17 et8000 daemon.info avahi-daemon[514]: Registering new address record for 192.168.1.10 on eth0.IPv4.
Jan 1 01:00:18 et8000 daemon.info avahi-daemon[514]: Server startup complete. Host name is et8000.local. Local service cookie is 4203160540.
Jan 1 01:00:19 et8000 daemon.info avahi-daemon[514]: Service "et8000" (/services/ssh.service) successfully established.
Jan 1 01:00:19 et8000 daemon.info avahi-daemon[514]: Service "et8000" (/services/sftp-ssh.service) successfully established.
Jan 1 01:00:21 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan 1 01:00:21 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET] (extern ip) [nonblock]
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extren ip):443
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=671ab887 6827a099
Jan 1 01:00:22 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan 1 01:00:22 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan 1 01:00:22 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan 1 01:00:22 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan 1 01:00:22 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan 1 01:00:22 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Jan 1 01:00:27 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan 1 01:00:27 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extren ip):443 [nonblock]
Jan 1 01:00:28 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Jan 1 01:00:28 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan 1 01:00:28 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan 1 01:00:28 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=95ac7213 feec05e9
Jan 1 01:00:29 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan 1 01:00:29 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan 1 01:00:29 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan 1 01:00:29 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan 1 01:00:29 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan 1 01:00:29 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan 1 01:00:29 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan 1 01:00:29 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Jan 1 01:00:34 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan 1 01:00:34 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=f6ae1d54 44baedae
Jan 1 01:00:35 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan 1 01:00:35 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan 1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan 1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan 1 01:00:35 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan 1 01:00:35 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Nov 17 17:05:05 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: LZO compression initialized
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=128c130b 07e260bb
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: [netgear] Peer Connection Initiated with [AF_INET](extern ip):443
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 192.168.254.1,route-gateway 192.168.254.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.254.2 255.25
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: timers and/or timeouts modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: --ifconfig/up options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: route options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: route-related options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: ROUTE_GATEWAY 192.168.1.2/255.255.255.0 IFACE=eth0 HWADDR=00:16:b4:06:01:a5
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: TUN/TAP device tun0 opened
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: TUN/TAP TX queue length set to 100
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip link set dev tun0 up mtu 1500
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip addr add dev tun0 192.168.254.2/24 broadcast 192.168.254.255
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add (extern ip)/32 via 192.168.1.2
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route del 0.0.0.0/0
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add 0.0.0.0/0 via 192.168.254.1
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add 192.168.1.0/24 via 192.168.254.1
Nov 17 17:05:09 et8000 daemon.warn openvpn[485]: ERROR: Linux route add command failed: external program exited with error status: 2
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: Initialization Sequence Completed
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Withdrawing address record for 192.168.1.10 on eth0.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Leaving mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Interface eth0.IPv4 no longer relevant for mDNS.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Withdrawing address record for fe80::216:b4ff:fe06:1a5 on eth0.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Leaving mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Interface eth0.IPv6 no longer relevant for mDNS.
Nov 17 17:05:40 et8000 user.debug kernel: [ 75.050000] __clk_disable: enet [0]
Nov 17 17:05:40 et8000 user.debug kernel: [ 75.050000] bcm40nm_pm_genet_disable 00
Nov 17 17:05:40 et8000 user.debug kernel: [ 75.050000] __clk_disable: network [0]
Nov 17 17:05:40 et8000 user.debug kernel: [ 75.050000] bcm7429_pm_network_disable 00
Nov 17 17:05:45 et8000 user.debug kernel: [ 80.645000] __clk_enable: network [1]
Nov 17 17:05:45 et8000 user.debug kernel: [ 80.645000] bcm7429_pm_network_enable 00
Nov 17 17:05:45 et8000 user.debug kernel: [ 80.645000] __clk_enable: enet [1]
Nov 17 17:05:45 et8000 user.debug kernel: [ 80.645000] bcm40nm_pm_genet_enable 00
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv4 for mDNS.
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: Registering new address record for 192.168.1.10 on eth0.IPv4.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv6 for mDNS.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: Registering new address record for fe80::216:b4ff:fe06:1a5 on eth0.*.
Nov 17 18:05:07 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=251489/0 pkts=1780/0
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 19:05:07 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=443611/0 pkts=2408/0
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 20:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 20:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 21:05:08 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 22:05:09 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=343063/0 pkts=2058/0
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 23:05:09 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=184822/0 pkts=1350/0
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 02:05:09 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 03:05:10 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=146779/0 pkts=1199/0
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 04:05:11 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 06:05:12 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 06:05:13 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=155815/0 pkts=1234/0
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 07:05:13 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 07:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 07:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 08:05:14 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=-1 bytes=151558/0 pkts=1218/0
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=149747/0 pkts=1217/0
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 12:05:16 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=191176/0 pkts=1438/0
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=209773/0 pkts=1471/0
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 14:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 15:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 15:16:47 et8000 authpriv.warn login[17989]: pam_lastlog(login:session): file /var/log/lastlog created
Nov 18 15:16:47 et8000 authpriv.info login[17989]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Nov 18 15:16:47 et8000 authpriv.notice login[18010]: ROOT LOGIN on '/dev/pts/0' from '192.168.254.3:59567'
Nov 18 16:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 17:00:42 et8000 authpriv.err vsftpd: pam_listfile(vsftpd:auth): Couldn't open /etc/vsftpd.ftpusers
Nov 18 17:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA