-
-
Notifications
You must be signed in to change notification settings - Fork 250
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lots of issues after removing 1 interface #2262
Comments
Please use the template. |
what template? I have 1 interface set as master. |
These templates you get when opening an issue: https://github.com/Ysurac/openmptcprouter/issues/new/choose I would need the config from System->OpenMPTCProuter->Show all settings |
Sorry they didnt pop up for some reason, will make sure next time!! Hope I removed anything sensitive ` ` |
I don't see issue here. |
Thank you so much for checking, I got back to somewhat working by : Udating VPS to Version 0.1027-test 5.4.132-mptcp
I do still have some odd behaviour on client devices (discord doesnt load images would be one) I even checked IPv4 and V6 and they are both working, speedtest is fast also. used the same DNS (NextDNS ) on 4G and through the openmptcprouter and there still is something funky hmm.. Errors stopped appearing in my logs though. only think I get as a error right now is " Can't contact Server Admin Script (No result)" I doublechecked the Key but its all there and fine... Pings are also fine now.. weird! |
I really do not get it, I reinstalled (factory reset) the router with latest beta also.. [openmptcprouter v0.58.5 r0+16328-f441be3921] no V2Ray connection possible , I tried with 1 interface even. Gloryturn works of course but I am just getting "Cant Get Public IP adress from V2RAY and still CANT contact Server Admin Script ... |
OK so what fixed it for me: -Reinstalled both router and VPS from scratch using latest STABLE build. V2Ray just went up and seems to be saying up , no errors all is well. I have 0 ideas why removing a connection caused this but hey.. I am happy |
I saw this in the past too, since that i just disable interfaces for MPTCP, i never remove one. |
So my contract on 1 of my DSL lines ended.
after the contract period was up they started syncronising my router at like 480kbps -
When this happend weird things started to happen, some images on websites wouldnt load, discord messages took forever to send , weird ping spikes to 8.8.8.8.
So allright Ill jsut remove that interface.. done, restarted everything.. (router and VPS)
Now I am not able to ping 8.8.8.8 anymore but some websites still works, which I think has something to do with ipv6/v4 but then for some seconds I can ping it again. Ping to my VPS is running constantly without problems
There also seems to be a issue with V2Ray all of the sudden.
What are my next moves here? reinstall vps? reinstall router? Dont know where to start , everything was working just fine before I remove the dsl line. DSL line was NOT my multipath master.
Right now in status I see:
Router:
No IPv6 Access
VPS:
No Output
No Server IP adress
No Public IP adress
Cant get Public Ip from V2Ray
But them after some minutes it goes all fine but then goes back to this error, sometimes it only shows V2ray not running.
And then sometimes the router interface just murders itself with some
TypeError
undefined is not an object (evaluating 'boardinfo.release.description')
Logs from the last 10minutes, as you can see its getting a bit crazy
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.4.138.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.4.138.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.4.138.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:21:59 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.info dnsmasq-dhcp[14679]: DHCPRELEASE(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:00 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.133.53 port 53
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:01 2022 user.notice omr-bypass: Restart dnsmasq...
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:01 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:01 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:22:02 2022 daemon.info v2ray: DNS disabled: main_dns
Fri Feb 4 16:22:02 2022 daemon.err omr-tracker[19722]: [info] DNS disabled: main_dns
Fri Feb 4 16:22:02 2022 daemon.info v2ray: Setting transparent proxy on port: 1897
Fri Feb 4 16:22:02 2022 daemon.err omr-tracker[19722]: [info] Setting transparent proxy on port: 1897
Fri Feb 4 16:22:02 2022 daemon.info v2ray: Transparent proxy mode: default
Fri Feb 4 16:22:02 2022 daemon.err omr-tracker[19722]: [info] Transparent proxy mode: default
Fri Feb 4 16:22:02 2022 user.notice v2ray: add rules
Fri Feb 4 16:22:02 2022 daemon.err omr-tracker[19722]: Flush terminated
Fri Feb 4 16:22:02 2022 daemon.err omr-tracker[19722]: ss-rules6: unknown option def
Fri Feb 4 16:22:02 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:22:02 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.135.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 199.43.134.53 port 53
Fri Feb 4 16:22:03 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:03 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[14679]: DHCPDISCOVER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[14679]: DHCPOFFER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[14679]: exiting on receipt of SIGTERM
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: started, version 2.84 cachesize 150
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: DNS service limited to local subnets
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: DNSSEC validation enabled
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: configured with trust anchor for keytag 20326
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[21112]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain test
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain onion
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain localhost
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain local
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain invalid
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain bind
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using nameserver 45.90.30.81#53
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using nameserver 45.90.28.81#53
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: using only locally-known addresses for domain lan
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: read /etc/hosts - 4 addresses
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq[21112]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[21112]: read /etc/ethers - 0 addresses
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[21112]: DHCPREQUEST(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:22:04 2022 daemon.info dnsmasq-dhcp[21112]: DHCPACK(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 203.119.95.53 port 53
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 203.119.95.53 port 53
Fri Feb 4 16:22:04 2022 user.notice SQM: Starting SQM script: piece_of_cake.qos on tun0, in: 0 Kbps, out: 0 Kbps
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:04 2022 user.notice SQM: piece_of_cake.qos was started on tun0 successfully
Fri Feb 4 16:22:04 2022 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:04 2022 user.notice ModemManager: hotplug: add network interface ifb4tun0: event processed
Fri Feb 4 16:22:04 2022 user.notice ModemManager: hotplug: event reported: action=add, name=ifb4tun0, subsystem=net
Fri Feb 4 16:22:04 2022 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:04 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:05 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:06 2022 user.notice post-tracking-post-tracking: Set firewall on server
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:06 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:07 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:07 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:07 2022 daemon.debug dnsmasq[21112]: listening on tun0(#23): 10.255.255.2 port 53
Fri Feb 4 16:22:07 2022 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:08 2022 user.notice firewall: Reloading firewall due to ifup of wan3 (eth3)
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:08 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:09 2022 user.notice mptcp: Reloading mptcp config due to ifup of wan3 (eth3)
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:09 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:10 2022 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Fri Feb 4 16:22:10 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:10 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:10 2022 user.notice firewall: Reloading firewall due to ifup of wan4 (eth5)
Fri Feb 4 16:22:12 2022 user.notice mptcp: Reloading mptcp config due to ifup of wan4 (eth5)
Fri Feb 4 16:22:12 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:12 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:13 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:14 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:15 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:16 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:17 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:18 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.47.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:19 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.36.252 port 53
Fri Feb 4 16:22:20 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:20 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:20 2022 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Fri Feb 4 16:22:20 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:20 2022 daemon.err unbound: [18658:0] error: read (in tcp s): Connection refused for 192.0.32.252 port 53
Fri Feb 4 16:22:45 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[21112]: exiting on receipt of SIGTERM
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: started, version 2.84 cachesize 150
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: DNS service limited to local subnets
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: DNSSEC validation enabled
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: configured with trust anchor for keytag 20326
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq-dhcp[8334]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain test
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain onion
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain localhost
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain local
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain invalid
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain bind
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using nameserver 45.90.30.81#53
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using nameserver 45.90.28.81#53
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: using only locally-known addresses for domain lan
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: read /etc/hosts - 4 addresses
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq-dhcp[8334]: read /etc/ethers - 0 addresses
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: read /etc/hosts - 4 addresses
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq[8334]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:22:45 2022 daemon.info dnsmasq-dhcp[8334]: read /etc/ethers - 0 addresses
Fri Feb 4 16:22:45 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:22:46 2022 daemon.info v2ray: DNS disabled: main_dns
Fri Feb 4 16:22:46 2022 daemon.err omr-tracker[19721]: [info] DNS disabled: main_dns
Fri Feb 4 16:22:46 2022 daemon.info v2ray: Setting transparent proxy on port: 1897
Fri Feb 4 16:22:46 2022 daemon.err omr-tracker[19721]: [info] Setting transparent proxy on port: 1897
Fri Feb 4 16:22:46 2022 daemon.info v2ray: Transparent proxy mode: default
Fri Feb 4 16:22:46 2022 daemon.err omr-tracker[19721]: [info] Transparent proxy mode: default
Fri Feb 4 16:22:46 2022 user.notice v2ray: add rules
Fri Feb 4 16:22:47 2022 daemon.err omr-tracker[19721]: Flush terminated
Fri Feb 4 16:22:47 2022 daemon.err omr-tracker[19721]: ss-rules6: unknown option def
Fri Feb 4 16:22:47 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:22:47 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:22:48 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:48 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:48 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:48 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:48 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:49 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:49 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:49 2022 daemon.err omr-tracker[19721]: iptables-restore: line 2 failed
Fri Feb 4 16:22:56 2022 user.notice post-tracking-post-tracking: Can't find V2Ray, restart it...
Fri Feb 4 16:23:20 2022 user.notice omr-bypass: Restart dnsmasq...
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[8334]: exiting on receipt of SIGTERM
Fri Feb 4 16:23:21 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Feb 4 16:23:21 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: started, version 2.84 cachesize 150
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: DNS service limited to local subnets
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: DNSSEC validation enabled
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: configured with trust anchor for keytag 20326
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq-dhcp[14832]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:23:21 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain test
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain onion
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain localhost
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain local
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain invalid
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain bind
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using nameserver 45.90.30.81#53
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using nameserver 45.90.28.81#53
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: using only locally-known addresses for domain lan
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: read /etc/hosts - 4 addresses
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq[14832]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:23:21 2022 daemon.info dnsmasq-dhcp[14832]: read /etc/ethers - 0 addresses
Fri Feb 4 16:23:30 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[14832]: exiting on receipt of SIGTERM
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: started, version 2.84 cachesize 150
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: DNS service limited to local subnets
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: DNSSEC validation enabled
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: configured with trust anchor for keytag 20326
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq-dhcp[18408]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain test
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain onion
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain localhost
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain local
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain invalid
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain bind
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using nameserver 45.90.30.81#53
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using nameserver 45.90.28.81#53
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: using only locally-known addresses for domain lan
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: read /etc/hosts - 4 addresses
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq-dhcp[18408]: read /etc/ethers - 0 addresses
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: read /etc/hosts - 4 addresses
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq[18408]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:23:30 2022 daemon.info dnsmasq-dhcp[18408]: read /etc/ethers - 0 addresses
Fri Feb 4 16:23:30 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:23:30 2022 user.notice v2ray: Rules DOWN
Fri Feb 4 16:23:30 2022 daemon.info v2ray[18496]: V2Ray 4.35.1 (V2Fly, a community-driven edition of V2Ray.) OpenWrt R1 (go1.15.2 linux/amd64)
Fri Feb 4 16:23:30 2022 daemon.info v2ray[18496]: A unified platform for anti-censorship.
Fri Feb 4 16:23:30 2022 daemon.info v2ray[18496]: 2022/02/04 15:23:30 [Info] github.com/v2fly/v2ray-core/v4/main/jsonem: Reading config: /var/etc/v2ray/v2ray.main.json
Fri Feb 4 16:23:31 2022 daemon.info v2ray: DNS disabled: main_dns
Fri Feb 4 16:23:31 2022 daemon.notice procd: /etc/rc.d/S99v2ray: [info] DNS disabled: main_dns
Fri Feb 4 16:23:31 2022 daemon.info v2ray: Setting transparent proxy on port: 1897
Fri Feb 4 16:23:31 2022 daemon.notice procd: /etc/rc.d/S99v2ray: [info] Setting transparent proxy on port: 1897
Fri Feb 4 16:23:31 2022 daemon.info v2ray: Transparent proxy mode: default
Fri Feb 4 16:23:31 2022 daemon.notice procd: /etc/rc.d/S99v2ray: [info] Transparent proxy mode: default
Fri Feb 4 16:23:31 2022 user.notice v2ray: add rules
Fri Feb 4 16:23:32 2022 daemon.notice procd: /etc/rc.d/S99v2ray: Flush terminated
Fri Feb 4 16:23:32 2022 daemon.notice procd: /etc/rc.d/S99v2ray: ss-rules6: unknown option def
Fri Feb 4 16:23:32 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:23:32 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:23:32 2022 user.notice post-tracking-post-tracking: omrvpn down because gateway down, interface have no IPv6, interface have no IPv6 gateway
Fri Feb 4 16:23:32 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:32 2022 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it
Fri Feb 4 16:23:32 2022 daemon.info glorytun[21583]: STOPPED tun0
Fri Feb 4 16:23:32 2022 daemon.notice netifd: Network device 'tun0' link is down
Fri Feb 4 16:23:32 2022 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss
Fri Feb 4 16:23:32 2022 daemon.notice netifd: Interface 'omrvpn' is now down
Fri Feb 4 16:23:32 2022 daemon.debug dnsmasq[18408]: stopped listening on tun0(#23): fe80::1f75:1f19:7191:ff3b port 53
Fri Feb 4 16:23:32 2022 daemon.debug dnsmasq[18408]: stopped listening on tun0(#23): 10.255.255.2 port 53
Fri Feb 4 16:23:32 2022 daemon.info glorytun: starting glorytun vpn instance vpn
Fri Feb 4 16:23:32 2022 daemon.notice netifd: Interface 'omrvpn' is disabled
Fri Feb 4 16:23:33 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:33 2022 daemon.info glorytun[19684]: INITIALIZED tun0
Fri Feb 4 16:23:33 2022 daemon.notice netifd: Interface 'omrvpn' is enabled
Fri Feb 4 16:23:33 2022 daemon.notice netifd: Network device 'tun0' link is up
Fri Feb 4 16:23:33 2022 daemon.notice netifd: Interface 'omrvpn' has link connectivity
Fri Feb 4 16:23:33 2022 daemon.notice netifd: Interface 'omrvpn' is setting up now
Fri Feb 4 16:23:33 2022 daemon.notice netifd: Interface 'omrvpn' is now up
Fri Feb 4 16:23:33 2022 daemon.debug dnsmasq[18408]: listening on tun0(#27): fe80::776c:1ea3:6243:9576%tun0 port 53
Fri Feb 4 16:23:33 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:33 2022 user.notice SQM: Stopping SQM on tun0
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev tun0 ingress
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev tun0 root
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev ifb4tun0 root
Fri Feb 4 16:23:33 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: add network interface tun0: event processed
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Fri Feb 4 16:23:33 2022 user.notice SQM: Starting SQM script: piece_of_cake.qos on tun0, in: 0 Kbps, out: 0 Kbps
Fri Feb 4 16:23:33 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:33 2022 user.notice SQM: piece_of_cake.qos was started on tun0 successfully
Fri Feb 4 16:23:33 2022 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Fri Feb 4 16:23:33 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: add network interface ifb4tun0: event processed
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: event reported: action=add, name=ifb4tun0, subsystem=net
Fri Feb 4 16:23:33 2022 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Fri Feb 4 16:23:34 2022 daemon.debug dnsmasq[18408]: listening on tun0(#27): 10.255.255.2 port 53
Fri Feb 4 16:23:34 2022 daemon.err glorytun[19684]: 202.61.249.125.65001: connected
Fri Feb 4 16:23:34 2022 daemon.info glorytun[19684]: STARTED tun0
Fri Feb 4 16:23:34 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:35 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:35 2022 daemon.notice procd: /etc/rc.d/S99v2ray: iptables-restore: line 2 failed
Fri Feb 4 16:23:35 2022 user.notice post-tracking-post-tracking: Set firewall on server
Fri Feb 4 16:23:40 2022 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Fri Feb 4 16:23:40 2022 daemon.info omr-tracker-v2ray: V2Ray is up (can contact via http 151.101.129.164)
Fri Feb 4 16:23:50 2022 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Fri Feb 4 16:24:06 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[18408]: exiting on receipt of SIGTERM
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: started, version 2.84 cachesize 150
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: DNS service limited to local subnets
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: DNSSEC validation enabled
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: configured with trust anchor for keytag 20326
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq-dhcp[27557]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain test
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain onion
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain localhost
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain local
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain invalid
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain bind
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using nameserver 45.90.30.81#53
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using nameserver 45.90.28.81#53
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: using only locally-known addresses for domain lan
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: read /etc/hosts - 4 addresses
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq-dhcp[27557]: read /etc/ethers - 0 addresses
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: read /etc/hosts - 4 addresses
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq[27557]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:24:06 2022 daemon.info dnsmasq-dhcp[27557]: read /etc/ethers - 0 addresses
Fri Feb 4 16:24:06 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:24:06 2022 daemon.notice procd: /etc/rc.d/S99v2ray: Warning: Section 'zone_vpn' cannot resolve device of network 'glorytun'
Fri Feb 4 16:24:06 2022 daemon.notice procd: /etc/rc.d/S99v2ray: Warning: Section @rule[9] (Allow-All-LAN-to-VPN) does not specify a protocol, assuming TCP+UDP
Fri Feb 4 16:24:06 2022 daemon.notice procd: /etc/rc.d/S99v2ray: Warning: Section @rule[12] (Allow-Lan-to-Wan) does not specify a protocol, assuming TCP+UDP
Fri Feb 4 16:24:06 2022 daemon.notice procd: /etc/rc.d/S99v2ray: Warning: Section @reDIrect[1] (serveroutside) does not specify a protocol, assuming TCP+UDP
Fri Feb 4 16:24:07 2022 daemon.info procd: - init complete -
Fri Feb 4 16:24:07 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:24:07 2022 daemon.info v2ray: DNS disabled: main_dns
Fri Feb 4 16:24:07 2022 daemon.err omr-tracker[19722]: [info] DNS disabled: main_dns
Fri Feb 4 16:24:07 2022 daemon.info v2ray: Setting transparent proxy on port: 1897
Fri Feb 4 16:24:07 2022 daemon.err omr-tracker[19722]: [info] Setting transparent proxy on port: 1897
Fri Feb 4 16:24:07 2022 daemon.info v2ray: Transparent proxy mode: default
Fri Feb 4 16:24:07 2022 daemon.err omr-tracker[19722]: [info] Transparent proxy mode: default
Fri Feb 4 16:24:07 2022 user.notice v2ray: add rules
Fri Feb 4 16:24:08 2022 daemon.err omr-tracker[19722]: Flush terminated
Fri Feb 4 16:24:08 2022 daemon.err omr-tracker[19722]: ss-rules6: unknown option def
Fri Feb 4 16:24:08 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:24:08 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:24:09 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:09 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:09 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:10 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:10 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:10 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:10 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:11 2022 daemon.err omr-tracker[19722]: iptables-restore: line 2 failed
Fri Feb 4 16:24:15 2022 daemon.info omr-tracker-v2ray: V2Ray is down (can't contact via http 74.82.42.42, 198.41.212.162, 1.0.0.1)
Fri Feb 4 16:24:50 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[27557]: exiting on receipt of SIGTERM
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: started, version 2.84 cachesize 150
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: DNS service limited to local subnets
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: DNSSEC validation enabled
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: configured with trust anchor for keytag 20326
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq-dhcp[14652]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain test
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain onion
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain localhost
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain local
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain invalid
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain bind
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using nameserver 45.90.30.81#53
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using nameserver 45.90.28.81#53
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: using only locally-known addresses for domain lan
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: read /etc/hosts - 4 addresses
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq-dhcp[14652]: read /etc/ethers - 0 addresses
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: read /etc/hosts - 4 addresses
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq[14652]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:24:50 2022 daemon.info dnsmasq-dhcp[14652]: read /etc/ethers - 0 addresses
Fri Feb 4 16:24:50 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:25:01 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[14652]: exiting on receipt of SIGTERM
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: started, version 2.84 cachesize 150
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: DNS service limited to local subnets
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: DNSSEC validation enabled
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: configured with trust anchor for keytag 20326
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq-dhcp[18249]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain test
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain onion
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain localhost
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain local
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain invalid
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain bind
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using nameserver 45.90.30.81#53
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using nameserver 45.90.28.81#53
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: using only locally-known addresses for domain lan
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: read /etc/hosts - 4 addresses
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq-dhcp[18249]: read /etc/ethers - 0 addresses
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: read /etc/hosts - 4 addresses
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq[18249]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:25:01 2022 daemon.info dnsmasq-dhcp[18249]: read /etc/ethers - 0 addresses
Fri Feb 4 16:25:01 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:25:01 2022 daemon.info v2ray[18501]: V2Ray 4.35.1 (V2Fly, a community-driven edition of V2Ray.) OpenWrt R1 (go1.15.2 linux/amd64)
Fri Feb 4 16:25:01 2022 daemon.info v2ray[18501]: A unified platform for anti-censorship.
Fri Feb 4 16:25:01 2022 daemon.info v2ray[18501]: 2022/02/04 15:25:01 [Info] github.com/v2fly/v2ray-core/v4/main/jsonem: Reading config: /var/etc/v2ray/v2ray.main.json
Fri Feb 4 16:25:01 2022 user.notice v2ray: Rules DOWN
Fri Feb 4 16:25:01 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:25:12 2022 daemon.info dnsmasq-dhcp[18249]: DHCPRELEASE(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:13 2022 daemon.info omr-tracker-v2ray: V2Ray is up (can contact via http 212.27.48.10)
Fri Feb 4 16:25:13 2022 daemon.info omr-tracker-v2ray: Reload V2Ray rules
Fri Feb 4 16:25:13 2022 user.notice v2ray: Rules UP
Fri Feb 4 16:25:14 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:25:14 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPDISCOVER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPOFFER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPDISCOVER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPOFFER(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPREQUEST(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:17 2022 daemon.info dnsmasq-dhcp[18249]: DHCPACK(eth0) 192.168.33.205 8c:85:80:a1:a1:52
Fri Feb 4 16:25:23 2022 daemon.info dnsmasq-dhcp[18249]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:25:23 2022 daemon.info dnsmasq-dhcp[18249]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:25:23 2022 daemon.info dnsmasq-dhcp[18249]: DHCPREQUEST(eth0) 192.168.33.244 9c:9c:1f:e3:53:80
Fri Feb 4 16:25:23 2022 daemon.info dnsmasq-dhcp[18249]: DHCPACK(eth0) 192.168.33.244 9c:9c:1f:e3:53:80 myStrom-Switch-E35380
Fri Feb 4 16:25:42 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:25:42 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[18249]: DHCPDISCOVER(eth0) 8c:aa:b5:95:6a:74
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[18249]: DHCPOFFER(eth0) 192.168.33.154 8c:aa:b5:95:6a:74
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[18249]: exiting on receipt of SIGTERM
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: started, version 2.84 cachesize 150
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: DNS service limited to local subnets
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: DNSSEC validation enabled
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: configured with trust anchor for keytag 20326
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[4590]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain test
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain onion
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain localhost
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain local
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain invalid
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain bind
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using nameserver 45.90.30.81#53
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using nameserver 45.90.28.81#53
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: using only locally-known addresses for domain lan
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: read /etc/hosts - 4 addresses
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq[4590]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[4590]: read /etc/ethers - 0 addresses
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[4590]: DHCPREQUEST(eth0) 192.168.33.154 8c:aa:b5:95:6a:74
Fri Feb 4 16:25:45 2022 daemon.info dnsmasq-dhcp[4590]: DHCPACK(eth0) 192.168.33.154 8c:aa:b5:95:6a:74 myStrom-Switch-956A74
Fri Feb 4 16:26:01 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[4590]: exiting on receipt of SIGTERM
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: started, version 2.84 cachesize 150
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: DNS service limited to local subnets
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: DNSSEC validation enabled
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: configured with trust anchor for keytag 20326
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq-dhcp[13818]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain test
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain onion
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain localhost
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain local
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain invalid
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain bind
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using nameserver 45.90.30.81#53
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using nameserver 45.90.28.81#53
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: using only locally-known addresses for domain lan
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: read /etc/hosts - 4 addresses
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq-dhcp[13818]: read /etc/ethers - 0 addresses
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: read /etc/hosts - 4 addresses
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq[13818]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:26:01 2022 daemon.info dnsmasq-dhcp[13818]: read /etc/ethers - 0 addresses
Fri Feb 4 16:26:01 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:26:01 2022 user.notice v2ray: Reload omr-bypass rules
Fri Feb 4 16:26:01 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:26:09 2022 daemon.info glorytun[19684]: STOPPED tun0
Fri Feb 4 16:26:10 2022 daemon.err glorytun[19684]: 202.61.249.125.65001: connected
Fri Feb 4 16:26:11 2022 daemon.info glorytun[19684]: STARTED tun0
Fri Feb 4 16:26:19 2022 daemon.info dnsmasq-dhcp[13818]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:26:19 2022 daemon.info dnsmasq-dhcp[13818]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:26:41 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[13818]: exiting on receipt of SIGTERM
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: started, version 2.84 cachesize 150
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: DNS service limited to local subnets
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: DNSSEC validation enabled
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: configured with trust anchor for keytag 20326
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq-dhcp[26518]: DHCP, IP range 192.168.33.100 -- 192.168.33.254, lease time 12h
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain test
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain onion
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain localhost
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain local
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain invalid
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain bind
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using nameserver 45.90.30.81#53
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using nameserver 45.90.28.81#53
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: using only locally-known addresses for domain lan
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: read /etc/hosts - 4 addresses
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq-dhcp[26518]: read /etc/ethers - 0 addresses
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: read /etc/hosts - 4 addresses
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq[26518]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:26:41 2022 daemon.info dnsmasq-dhcp[26518]: read /etc/ethers - 0 addresses
Fri Feb 4 16:26:41 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:26:47 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:26:47 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:27:11 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:27:11 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:27:43 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:27:43 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:28:07 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:28:07 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:28:53 2022 user.notice post-tracking-post-tracking: omrvpn down because gateway down, interface have no IPv6, interface have no IPv6 gateway
Fri Feb 4 16:28:53 2022 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it
Fri Feb 4 16:28:53 2022 daemon.info glorytun[19684]: STOPPED tun0
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Network device 'tun0' link is down
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' is now down
Fri Feb 4 16:28:53 2022 daemon.debug dnsmasq[26518]: stopped listening on tun0(#27): fe80::776c:1ea3:6243:9576 port 53
Fri Feb 4 16:28:53 2022 daemon.debug dnsmasq[26518]: stopped listening on tun0(#27): 10.255.255.2 port 53
Fri Feb 4 16:28:53 2022 daemon.info glorytun: starting glorytun vpn instance vpn
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' is disabled
Fri Feb 4 16:28:53 2022 daemon.info glorytun[22449]: INITIALIZED tun0
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' is enabled
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Network device 'tun0' link is up
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' has link connectivity
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' is setting up now
Fri Feb 4 16:28:53 2022 daemon.notice netifd: Interface 'omrvpn' is now up
Fri Feb 4 16:28:53 2022 daemon.debug dnsmasq[26518]: listening on tun0(#31): fe80::7bde:4c5a:9e1e:f4c2%tun0 port 53
Fri Feb 4 16:28:53 2022 user.notice SQM: Stopping SQM on tun0
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev tun0 ingress
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev tun0 root
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: FAILURE (2): /sbin/tc qdisc del dev ifb4tun0 root
Fri Feb 4 16:28:53 2022 user.notice SQM: ERROR: cmd_wrapper: tc: LAST ERROR: RTNETLINK answers: No such file or directory
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: add network interface tun0: event processed
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Fri Feb 4 16:28:54 2022 user.notice SQM: Starting SQM script: piece_of_cake.qos on tun0, in: 0 Kbps, out: 0 Kbps
Fri Feb 4 16:28:54 2022 user.notice SQM: piece_of_cake.qos was started on tun0 successfully
Fri Feb 4 16:28:54 2022 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: add network interface ifb4tun0: event processed
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: event reported: action=add, name=ifb4tun0, subsystem=net
Fri Feb 4 16:28:54 2022 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Fri Feb 4 16:28:54 2022 user.notice post-tracking-post-tracking: Set firewall on server
Fri Feb 4 16:28:55 2022 daemon.err glorytun[22449]: 202.61.249.125.65001: connected
Fri Feb 4 16:28:55 2022 daemon.info glorytun[22449]: STARTED tun0
Fri Feb 4 16:28:56 2022 daemon.debug dnsmasq[26518]: listening on tun0(#31): 10.255.255.2 port 53
Fri Feb 4 16:28:56 2022 user.notice omr-bypass: Starting OMR-ByPass...
Fri Feb 4 16:29:03 2022 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Fri Feb 4 16:29:07 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:29:07 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
Fri Feb 4 16:29:10 2022 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Fri Feb 4 16:29:22 2022 user.notice omr-bypass: Reload dnsmasq...
Fri Feb 4 16:29:22 2022 daemon.info dnsmasq[26518]: read /etc/hosts - 4 addresses
Fri Feb 4 16:29:22 2022 daemon.info dnsmasq[26518]: read /tmp/hosts/dhcp.cfg01411c - 5 addresses
Fri Feb 4 16:29:22 2022 daemon.info dnsmasq-dhcp[26518]: read /etc/ethers - 0 addresses
Fri Feb 4 16:29:22 2022 user.notice omr-bypass: OMR-ByPass is running
Fri Feb 4 16:30:03 2022 daemon.info dnsmasq-dhcp[26518]: DHCPDISCOVER(eth0) c0:c9:e3:a3:30:34
Fri Feb 4 16:30:03 2022 daemon.info dnsmasq-dhcp[26518]: DHCPOFFER(eth0) 192.168.33.237 c0:c9:e3:a3:30:34
The text was updated successfully, but these errors were encountered: