bridge mode not working

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
13 messages Options
Reply | Threaded
Open this post in threaded view
|

bridge mode not working

breda
Hi, I can't seem to use the  Shield in bridge mode I'm using the 1.51 SP1 From ITUS  I have attach the  logs any help would be any help any help appreciated




------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


FW 151 SP1



[    0.000000] Linux version 3.10.20 (daniel@Ayoub) (gcc version 4.7.0 (Cavium Inc. Version: SDK_3_1_0_p2 build 34) ) #165 SMP Mon May 18 23:41:17 PDT 2015
[    0.000000] CVMSEG size: 2 cache lines (256 bytes)
[    0.000000] Cavium Inc. SDK-3.1
[    0.000000] bootconsole [early0] enabled
[    0.000000] CPU revision is: 000d9602 (Cavium Octeon III)
[    0.000000] FPU revision is: 00739600
[    0.000000] Checking for the multiply/shift bug... no.
[    0.000000] Checking for the daddiu bug... no.
[    0.000000] Determined physical RAM map:
[    0.000000]  memory: 000000000c800000 @ 0000000002500000 (usable)
[    0.000000]  memory: 0000000000c00000 @ 000000000f200000 (usable)
[    0.000000]  memory: 000000002f000000 @ 0000000020000000 (usable)
[    0.000000]  memory: 0000000000830000 @ 0000000000100000 (usable)
[    0.000000]  memory: 0000000001a00000 @ 0000000000930000 (usable after init)
[    0.000000] Wasting 896 bytes for tracking 16 unused pages
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Using passed Device Tree <8000000000080000>.
[    0.000000] software IO TLB [mem 0x02670000-0x026b0000] (0MB) mapped at [8000000002670000-80000000026affff]
[    0.000000] Zone ranges:
[    0.000000]   DMA32    [mem 0x00100000-0xefffffff]
[    0.000000]   Normal   empty
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00100000-0x0232ffff]
[    0.000000]   node   0: [mem 0x02500000-0x0ecfffff]
[    0.000000]   node   0: [mem 0x0f200000-0x0fdfffff]
[    0.000000]   node   0: [mem 0x20000000-0x4effffff]
[    0.000000] On node 0 totalpages: 15971
[    0.000000]   DMA32 zone: 14 pages used for memmap
[    0.000000]   DMA32 zone: 0 pages reserved
[    0.000000]   DMA32 zone: 15971 pages, LIFO batch:1
[    0.000000] Cavium Hotplug: Available coremask 0x0
[    0.000000] Primary instruction cache 78kB, virtually tagged, 39 way, 16 sets, linesize 128 bytes.
[    0.000000] Primary data cache 32kB, 32-way, 8 sets, linesize 128 bytes.
[    0.000000] Secondary unified cache 512kB, 4-way, 1024 sets, linesize 128 bytes.
[    0.000000] PERCPU: Embedded 1 pages/cpu @8000000002710000 s12544 r8192 d44800 u65536
[    0.000000] pcpu-alloc: s12544 r8192 d44800 u65536 alloc=1*65536
[    0.000000] pcpu-alloc: [0] 0 [0] 1
[    0.000000] Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 15957
[    0.000000] Kernel command line:  bootoctlinux 0x20000000 numcores=2 serial#=752011191521-36287 console=ttyS0,115200
[    0.000000] PID hash table entries: 4096 (order: -1, 32768 bytes)
[    0.000000] Dentry cache hash table entries: 131072 (order: 4, 1048576 bytes)
[    0.000000] Inode-cache hash table entries: 65536 (order: 3, 524288 bytes)
[    0.000000] Memory: 983296k/1022144k available (5825k kernel code, 38848k reserved, 2536k data, 26624k init, 0k highmem)
[    0.000000] Hierarchical RCU implementation.
[    0.000000] RCU restricting CPUs from NR_CPUS=32 to nr_cpu_ids=2.
[    0.000000] NR_IRQS:512
[    0.000000] CIB interrupt controller probed: 800107000000e000 23 bits
[    0.000000] CIB interrupt controller probed: 800107000000e200 12 bits
[    0.000000] CIB interrupt controller probed: 800107000000e400 6 bits
[    0.000000] CIB interrupt controller probed: 800107000000ec00 15 bits
[    0.000000] CIB interrupt controller probed: 800107000000e600 4 bits
[    0.000000] CIB interrupt controller probed: 800107000000e800 11 bits
[    0.000000] CIB interrupt controller probed: 800107000000e900 11 bits
[   22.725144] Calibrating delay loop (skipped) preset value.. 2000.00 BogoMIPS (lpj=10000000)
[   22.733357] pid_max: default: 32768 minimum: 501
[   22.738073] Security Framework initialized
[   22.742090] Mount-cache hash table entries: 4096
[   22.748345] Checking for the daddi bug... no.
[   22.749135] SMP: Booting CPU01 (CoreId  1)...
[   22.753337] CPU revision is: 000d9602 (Cavium Octeon III)
[   22.753341] FPU revision is: 00739600
[   22.753523] Cpu 1 online
[   22.764938] Brought up 2 CPUs
[   22.767883] Cavium Hotplug: Available coremask 0x0
[   22.774871] NET: Registered protocol family 16
[   22.780284] Installing handlers for error tree at: ffffffff808be430
[   22.797802] PCIe: Initializing port 0
[   24.860345] PCIe: Link timeout on port 0, probably the slot is empty
[   24.860351] PCIe: Initializing port 1
[   24.863847] PCIe: Port 1 not in PCIe mode, skipping
[   24.863852] PCIe: Initializing port 2
[   24.867494] PCIe: Port 2 not in PCIe mode, skipping
[   24.873862] [sched_delayed] sched: RT throttling activated
[   24.887172] bio: create slab <bio-0> at 0
[   24.891594] vgaarb: loaded
[   24.894524] SCSI subsystem initialized
[   24.898373] libata version 3.00 loaded.
[   24.898790] usbcore: registered new interface driver usbfs
[   24.904223] usbcore: registered new interface driver hub
[   24.909519] usbcore: registered new device driver usb
[   24.914669] pps_core: LinuxPPS API ver. 1 registered
[   24.919467] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[   24.928692] PTP clock support registered
[   24.932568] EDAC MC: Ver: 3.0.0
[   24.936245] PCI host bridge to bus 0000:00
[   24.940202] pci_bus 0000:00: root bus resource [mem 0x1000000000000]
[   24.946525] pci_bus 0000:00: root bus resource [io  0x0000]
[   24.952093] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
[   24.960020] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
[   24.960969] Switching to clocksource OCTEON_CVMCOUNT
[   24.967241] NET: Registered protocol family 2
[   24.971884] TCP established hash table entries: 8192 (order: 1, 131072 bytes)
[   24.979001] TCP bind hash table entries: 8192 (order: 1, 131072 bytes)
[   24.985491] TCP: Hash tables configured (established 8192 bind 8192)
[   24.991760] TCP: reno registered
[   24.994941] UDP hash table entries: 2048 (order: 0, 65536 bytes)
[   25.001028] UDP-Lite hash table entries: 2048 (order: 0, 65536 bytes)
[   25.007685] NET: Registered protocol family 1
[   25.011890] PCI: CLS 0 bytes, default 128
[   26.600444] octeon_pci_console: Console not created.
[   26.605246] /proc/octeon_perf: Octeon performance counter interface loaded
[   26.614108] HugeTLB registered 512 MB page size, pre-allocated 0 pages
[   26.621834] sys_fw_version: 0.1.17
[   26.621847] sys_revision: 21
[   26.622197] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[   26.628132] NTFS driver 2.1.30 [Flags: R/W].
[   26.632261] jffs2: version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
[   26.638394] msgmni has been set to 1920
[   26.643138] Key type asymmetric registered
[   26.647125] Asymmetric key parser 'x509' registered
[   26.651948] io scheduler noop registered
[   26.655864] io scheduler deadline registered
[   26.660125] io scheduler cfq registered (default)
[   26.665045] octeon_gpio 1070000000800.gpio-controller: OCTEON GPIO
[   26.720929] Serial: 8250/16550 driver, 6 ports, IRQ sharing disabled
[   26.730581] 1180000000800.serial: ttyS0 at MMIO 0x1180000000800 (irq = 34) is a OCTEON
[   26.738370] console [ttyS0] enabled, bootconsole disabled
[   26.761913] 1180000000c00.serial: ttyS1 at MMIO 0x1180000000c00 (irq = 35) is a OCTEON
[   26.784064] brd: module loaded
[   26.802566] loop: module loaded
[   26.819418] slram: not enough parameters.
[   26.843748] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)
[   26.862833] Hooking IMQ after NAT on PREROUTING.
[   26.879899] Hooking IMQ before NAT on POSTROUTING.
[   26.899358] libphy: mdio-octeon: probed
[   26.916715] mdio-octeon 1180000001800.mdio: Version 1.0
[   26.934436] spi_ks8995: Micrel KS8995 Ethernet switch SPI driver version 0.1.1
[   26.954575] e1000e: Intel(R) PRO/1000 Network Driver - 2.3.2-k
[   26.972715] e1000e: Copyright(c) 1999 - 2013 Intel Corporation.
[   26.991163] octeon-pow-ethernet ERROR: You must specify a broadcast group mask.
[   27.010805] octeon-ethernet 2.0
[   27.027806] Interface 0 has 4 ports (QSGMII)
[   27.027884] Interface 1 has 4 ports (QSGMII)
[   27.027891] Interface 2 has 4 ports (NPI)
[   27.027905] Interface 3 has 4 ports (LOOP)
[   27.027922] Interface 4 has 1 ports (AGL)
[   27.036465] usbcore: registered new interface driver cdc_ether
[   27.054584] usbcore: registered new interface driver plusb
[   27.072325] usbcore: registered new interface driver sierra_net
[   27.091093] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[   27.110068] ehci-pci: EHCI PCI platform driver
[   27.126770] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[   27.145782] usbcore: registered new interface driver usb-storage
[   27.164236] usbcore: registered new interface driver usbserial
[   27.182308] usbcore: registered new interface driver usbserial_generic
[   27.201061] usbserial: USB Serial support registered for generic
[   27.219355] usbcore: registered new interface driver sierra
[   27.237156] usbserial: USB Serial support registered for Sierra USB modem
[   27.256391] i2c /dev entries driver
[   27.272488] i2c-octeon 1180000001000.i2c: version 2.5
[   27.290526] octeon_wdt: Initial granularity 5 Sec
[   27.307634] EDAC DEVICE0: Giving out device to module 'octeon-cpu' controller 'cache': DEV 'octeon_pc_edac' (INTERRUPT)
[   27.330772] EDAC DEVICE1: Giving out device to module 'octeon-l2c' controller 'octeon_l2c_err': DEV 'octeon_l2c_edac' (POLLED)
[   27.354433] octeon_lmc_edac octeon_lmc_edac.0: Disabled (ECC not enabled)
[   29.976006] Netfilter messages via NETLINK v0.30.
[   29.992848] nfnl_acct: registering with nfnetlink.
[   30.009813] nf_conntrack version 0.5.0 (7682 buckets, 30728 max)
[   30.028251] ctnetlink v0.93: registering with nfnetlink.
[   30.046080] xt_time: kernel timezone is -0000
[   30.062571] ip_set: protocol 6
[   30.077871] ipip: IPv4 over IPv4 tunneling driver
[   30.095219] gre: GRE over IPv4 demultiplexor driver
[   30.112243] ip_gre: GRE over IPv4 tunneling driver
[   30.130452] ip_tables: (C) 2000-2006 Netfilter Core Team
[   30.148092] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
[   30.166623] arp_tables: (C) 2002 David S. Miller
[   30.183415] TCP: cubic registered
[   30.198855] Initializing XFRM netlink socket
[   30.215298] NET: Registered protocol family 10
[   30.235090] mip6: Mobile IPv6
[   30.250229] ip6_tables: (C) 2000-2006 Netfilter Core Team
[   30.268046] sit: IPv6 over IPv4 tunneling driver
[   30.286123] ip6_gre: GRE over IPv6 tunneling driver
[   30.303797] NET: Registered protocol family 17
[   30.320410] NET: Registered protocol family 15
[   30.337075] Bridge firewalling registered
[   30.353225] Ebtables v2.0 registered
[   30.415841] 8021q: 802.1Q VLAN Support v1.8
[   30.432228] Key type dns_resolver registered
[   30.448762] L2 lock: TLB refill 256 bytes
[   30.464898] L2 lock: General exception 128 bytes
[   30.481638] L2 lock: low-level interrupt 128 bytes
[   30.498549] L2 lock: interrupt 640 bytes
[   30.514596] L2 lock: memcpy 1152 bytes
[   30.532485] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
[   30.557209] Freeing unused kernel memory: 26624K (ffffffff80930000 - ffffffff82330000)
[   47.009456] mmc1: BKOPS_EN bit is not set
[   47.030164] mmc1: new high speed DDR MMC card at address 0001
[   47.048634] mmcblk0: mmc1:0001 P1XXXX 3.60 GiB
[   47.065612] mmcblk0boot0: mmc1:0001 P1XXXX partition 1 2.00 MiB
[   47.083980] mmcblk0boot1: mmc1:0001 P1XXXX partition 2 2.00 MiB
[   47.102346] mmcblk0rpmb: mmc1:0001 P1XXXX partition 3 128 KiB
[   47.124261]  mmcblk0: p1 p2 p3 p4
[   47.145115]  mmcblk0boot1: unknown partition table
[   47.166615]  mmcblk0boot0: unknown partition table
[   48.224774] kjournald starting.  Commit interval 5 seconds
[   48.225632] EXT3-fs (mmcblk0p4): using internal journal
[   48.226361] EXT3-fs (mmcblk0p4): recovery complete
[   48.226365] EXT3-fs (mmcblk0p4): mounted filesystem with writeback data mode
[   48.518963] init: failed to symlink /tmp -> /var
[   48.536017] init: Console is alive
[   48.551893] init: - watchdog -
[   49.568034] init: - preinit -
[   52.767656] mount_root: mounting /dev/root
[   52.784638] mount_root: loading kmods from internal overlay
[   52.914476] block: attempting to load /etc/config/fstab
[   52.933966] block: extroot: not configured
[   52.954786] procd: - early -
[   52.970129] procd: - watchdog -
[   53.686287] procd: - ubus -
[   54.701879] procd: - init -
[   56.469127] NET: Registered protocol family 38
[   56.492458] tun: Universal TUN/TAP device driver, 1.6
[   56.509808] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[   56.537922] u32 classifier
[   56.552774]     input device check on
[   56.568557]     Actions configured
[   56.585225] Mirror/redirect action on
[   56.609841] PPP generic driver version 2.4.2
[   56.627318] NET: Registered protocol family 24
[   58.643099] SGMII0: Port 1 link timeout
[   58.643323] eth1: 1000 Mbps Full duplex, port 1
[   58.643397] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[   58.644131] device eth1 entered promiscuous mode
[   58.646257] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[   58.653440] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[   58.674891] SGMII0: Port 2 link timeout
[   58.675160] eth2: 1000 Mbps Full duplex, port 2
[   58.675282] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[   59.616006] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[   59.616070] br-lan: port 1(eth1) entered forwarding state
[   59.616095] br-lan: port 1(eth1) entered forwarding state
[   59.616145] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   59.646194] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[   60.666155] eth0: 1000 Mbps Full duplex, port 0
[   60.666182] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   60.697447] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[   61.615827] br-lan: port 1(eth1) entered forwarding state
[   65.749622] eth0: Link down
[   65.800427] eth2: Link down
[   65.856773] br-lan: port 1(eth1) entered disabled state
[   65.857958] device eth1 left promiscuous mode
[   65.857977] br-lan: port 1(eth1) entered disabled state
[   65.877858] eth1: Link down
[   65.881402] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[   67.101529] eth1: 1000 Mbps Full duplex, port 1
[   67.102455] device eth1 entered promiscuous mode
[   67.107694] br-lan: port 1(eth1) entered forwarding state
[   67.107723] br-lan: port 1(eth1) entered forwarding state
[   67.137986] eth0: 1000 Mbps Full duplex, port 0
[   67.159709] eth2: 1000 Mbps Full duplex, port 2
[   69.105840] br-lan: port 1(eth1) entered forwarding state
[   80.135652] eth0: Link down
[   81.149365] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[   83.095606] eth1: Link down
[   83.176053] eth0: 1000 Mbps Full duplex, port 0
[   83.195831] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   84.195883] br-lan: port 1(eth1) entered disabled state
[   86.105975] eth1: 1000 Mbps Full duplex, port 1
[   86.106033] br-lan: port 1(eth1) entered forwarding state
[   86.106065] br-lan: port 1(eth1) entered forwarding state
[   86.165675] eth2: Link down
[   87.159418] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[   88.105824] br-lan: port 1(eth1) entered forwarding state
[   89.176005] eth2: 1000 Mbps Full duplex, port 2
[   89.195851] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  116.245666] eth0: Link down
[  117.240390] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[  118.125582] eth1: Link down
[  119.116017] br-lan: port 1(eth1) entered disabled state
[  120.205583] eth2: Link down
[  120.256063] eth0: 1000 Mbps Full duplex, port 0
[  120.285867] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[  121.224196] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[  122.135950] eth1: 1000 Mbps Full duplex, port 1
[  122.146030] br-lan: port 1(eth1) entered forwarding state
[  122.146069] br-lan: port 1(eth1) entered forwarding state
[  124.145833] br-lan: port 1(eth1) entered forwarding state
[  124.235980] eth2: 1000 Mbps Full duplex, port 2
[  124.239465] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  170.755829] device eth2 entered promiscuous mode
[  170.905826] device eth0 entered promiscuous mode
[  638.155665] eth1: Link down
[  638.155726] br-lan: port 1(eth1) entered disabled state
[  638.255621] eth2: Link down
[  639.155774] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[  639.216238] device eth2 left promiscuous mode
[  639.346151] device eth0 left promiscuous mode
[  641.165908] eth1: 1000 Mbps Full duplex, port 1
[  641.186003] eth2: 1000 Mbps Full duplex, port 2
[  641.186031] br-lan: port 1(eth1) entered forwarding state
[  641.186055] br-lan: port 1(eth1) entered forwarding state
[  641.186106] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  643.185818] br-lan: port 1(eth1) entered forwarding state
[  651.185703] eth1: Link down
[  651.185787] br-lan: port 1(eth1) entered disabled state
[  651.206057] eth2: Link down
[  652.199943] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[  654.195935] eth1: 1000 Mbps Full duplex, port 1
[  654.195972] br-lan: port 1(eth1) entered forwarding state
[  654.196004] br-lan: port 1(eth1) entered forwarding state
[  654.196687] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  654.215940] eth2: 1000 Mbps Full duplex, port 2
[  656.195827] br-lan: port 1(eth1) entered forwarding state
[  662.215671] eth1: Link down
[  662.235857] br-lan: port 1(eth1) entered disabled state
[  663.225953] eth1: 1000 Mbps Full duplex, port 1
[  663.226073] br-lan: port 1(eth1) entered forwarding state
[  663.226102] br-lan: port 1(eth1) entered forwarding state
[  665.225818] br-lan: port 1(eth1) entered forwarding state
[  737.185840] device eth2 entered promiscuous mode
[  737.335825] device eth0 entered promiscuous mode
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] Linux version 3.10.20 (daniel@Ayoub) (gcc version 4.7.0 (Cavium Inc. Version: SDK_3_1_0_p2 build 34) ) #165 SMP Mon May 18 23:41:17 PDT 2015
Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] CVMSEG size: 2 cache lines (256 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Cavium Inc. SDK-3.1
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CPU revision is: 000d9602 (Cavium Octeon III)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] FPU revision is: 00739600
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Checking for the multiply/shift bug... no.
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Checking for the daddiu bug... no.
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Determined physical RAM map:
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000]  memory: 000000000c800000 @ 0000000002500000 (usable)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000]  memory: 0000000000c00000 @ 000000000f200000 (usable)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000]  memory: 000000002f000000 @ 0000000020000000 (usable)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000]  memory: 0000000000830000 @ 0000000000100000 (usable)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000]  memory: 0000000001a00000 @ 0000000000930000 (usable after init)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Wasting 896 bytes for tracking 16 unused pages
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Using passed Device Tree <8000000000080000>.
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] software IO TLB [mem 0x02670000-0x026b0000] (0MB) mapped at [8000000002670000-80000000026affff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Zone ranges:
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   DMA32    [mem 0x00100000-0xefffffff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   Normal   empty
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Movable zone start for each node
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Early memory node ranges
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x00100000-0x0232ffff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x02500000-0x0ecfffff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x0f200000-0x0fdfffff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x20000000-0x4effffff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] On node 0 totalpages: 15971
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 14 pages used for memmap
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 0 pages reserved
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 15971 pages, LIFO batch:1
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Cavium Hotplug: Available coremask 0x0
Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] Primary instruction cache 78kB, virtually tagged, 39 way, 16 sets, linesize 128 bytes.
Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] Primary data cache 32kB, 32-way, 8 sets, linesize 128 bytes.
Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] Secondary unified cache 512kB, 4-way, 1024 sets, linesize 128 bytes.
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] PERCPU: Embedded 1 pages/cpu @8000000002710000 s12544 r8192 d44800 u65536
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] pcpu-alloc: s12544 r8192 d44800 u65536 alloc=1*65536
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0 [0] 1
Fri Feb 19 00:11:06 2016 kern.debug kernel: [    0.000000] Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 15957
Fri Feb 19 00:11:06 2016 kern.notice kernel: [    0.000000] Kernel command line:  bootoctlinux 0x20000000 numcores=2 serial#=752011191521-36287 console=ttyS0,115200
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] PID hash table entries: 4096 (order: -1, 32768 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Dentry cache hash table entries: 131072 (order: 4, 1048576 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Inode-cache hash table entries: 65536 (order: 3, 524288 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Memory: 983296k/1022144k available (5825k kernel code, 38848k reserved, 2536k data, 26624k init, 0k highmem)
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] Hierarchical RCU implementation.
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] RCU restricting CPUs from NR_CPUS=32 to nr_cpu_ids=2.
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] NR_IRQS:512
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e000 23 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e200 12 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e400 6 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000ec00 15 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e600 4 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e800 11 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e900 11 bits
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.725144] Calibrating delay loop (skipped) preset value.. 2000.00 BogoMIPS (lpj=10000000)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.733357] pid_max: default: 32768 minimum: 501
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.738073] Security Framework initialized
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.742090] Mount-cache hash table entries: 4096
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   22.748345] Checking for the daddi bug... no.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.749135] SMP: Booting CPU01 (CoreId  1)...
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.753337] CPU revision is: 000d9602 (Cavium Octeon III)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.753341] FPU revision is: 00739600
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.753523] Cpu 1 online
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.764938] Brought up 2 CPUs
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.767883] Cavium Hotplug: Available coremask 0x0
Fri Feb 19 00:11:06 2016 kern.info kernel: [   22.774871] NET: Registered protocol family 16
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   22.780284] Installing handlers for error tree at: ffffffff808be430
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   22.797802] PCIe: Initializing port 0
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   24.860345] PCIe: Link timeout on port 0, probably the slot is empty
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   24.860351] PCIe: Initializing port 1
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   24.863847] PCIe: Port 1 not in PCIe mode, skipping
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   24.863852] PCIe: Initializing port 2
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   24.867494] PCIe: Port 2 not in PCIe mode, skipping
Fri Feb 19 00:11:06 2016 kern.warn kernel: [   24.873862] [sched_delayed] sched: RT throttling activated
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.887172] bio: create slab <bio-0> at 0
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.891594] vgaarb: loaded
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   24.894524] SCSI subsystem initialized
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   24.898373] libata version 3.00 loaded.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.898790] usbcore: registered new interface driver usbfs
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.904223] usbcore: registered new interface driver hub
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.909519] usbcore: registered new device driver usb
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.914669] pps_core: LinuxPPS API ver. 1 registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.919467] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.928692] PTP clock support registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.932568] EDAC MC: Ver: 3.0.0
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.936245] PCI host bridge to bus 0000:00
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.940202] pci_bus 0000:00: root bus resource [mem 0x1000000000000]
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.946525] pci_bus 0000:00: root bus resource [io  0x0000]
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.952093] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   24.960020] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.960969] Switching to clocksource OCTEON_CVMCOUNT
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.967241] NET: Registered protocol family 2
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.971884] TCP established hash table entries: 8192 (order: 1, 131072 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.979001] TCP bind hash table entries: 8192 (order: 1, 131072 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.985491] TCP: Hash tables configured (established 8192 bind 8192)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.991760] TCP: reno registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   24.994941] UDP hash table entries: 2048 (order: 0, 65536 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   25.001028] UDP-Lite hash table entries: 2048 (order: 0, 65536 bytes)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   25.007685] NET: Registered protocol family 1
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   25.011890] PCI: CLS 0 bytes, default 128
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   26.600444] octeon_pci_console: Console not created.
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   26.605246] /proc/octeon_perf: Octeon performance counter interface loaded
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.614108] HugeTLB registered 512 MB page size, pre-allocated 0 pages
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   26.621834] sys_fw_version: 0.1.17
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   26.621847] sys_revision: 21
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.622197] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.628132] NTFS driver 2.1.30 [Flags: R/W].
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.632261] jffs2: version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.638394] msgmni has been set to 1920
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   26.643138] Key type asymmetric registered
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   26.647125] Asymmetric key parser 'x509' registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.651948] io scheduler noop registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.655864] io scheduler deadline registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.660125] io scheduler cfq registered (default)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.665045] octeon_gpio 1070000000800.gpio-controller: OCTEON GPIO
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.720929] Serial: 8250/16550 driver, 6 ports, IRQ sharing disabled
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.730581] 1180000000800.serial: ttyS0 at MMIO 0x1180000000800 (irq = 34) is a OCTEON
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.738370] console [ttyS0] enabled, bootconsole disabled
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.761913] 1180000000c00.serial: ttyS1 at MMIO 0x1180000000c00 (irq = 35) is a OCTEON
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.784064] brd: module loaded
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.802566] loop: module loaded
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   26.819418] slram: not enough parameters.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.843748] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.862833] Hooking IMQ after NAT on PREROUTING.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.879899] Hooking IMQ before NAT on POSTROUTING.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.899358] libphy: mdio-octeon: probed
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.916715] mdio-octeon 1180000001800.mdio: Version 1.0
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.934436] spi_ks8995: Micrel KS8995 Ethernet switch SPI driver version 0.1.1
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.954575] e1000e: Intel(R) PRO/1000 Network Driver - 2.3.2-k
Fri Feb 19 00:11:06 2016 kern.info kernel: [   26.972715] e1000e: Copyright(c) 1999 - 2013 Intel Corporation.
Fri Feb 19 00:11:06 2016 kern.err kernel: [   26.991163] octeon-pow-ethernet ERROR: You must specify a broadcast group mask.
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   27.010805] octeon-ethernet 2.0
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   27.027806] Interface 0 has 4 ports (QSGMII)
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   27.027884] Interface 1 has 4 ports (QSGMII)
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   27.027891] Interface 2 has 4 ports (NPI)
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   27.027905] Interface 3 has 4 ports (LOOP)
Fri Feb 19 00:11:06 2016 kern.debug kernel: [   27.027922] Interface 4 has 1 ports (AGL)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.036465] usbcore: registered new interface driver cdc_ether
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.054584] usbcore: registered new interface driver plusb
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.072325] usbcore: registered new interface driver sierra_net
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.091093] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.110068] ehci-pci: EHCI PCI platform driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.126770] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.145782] usbcore: registered new interface driver usb-storage
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.164236] usbcore: registered new interface driver usbserial
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.182308] usbcore: registered new interface driver usbserial_generic
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.201061] usbserial: USB Serial support registered for generic
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.219355] usbcore: registered new interface driver sierra
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.237156] usbserial: USB Serial support registered for Sierra USB modem
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.256391] i2c /dev entries driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.272488] i2c-octeon 1180000001000.i2c: version 2.5
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.290526] octeon_wdt: Initial granularity 5 Sec
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.307634] EDAC DEVICE0: Giving out device to module 'octeon-cpu' controller 'cache': DEV 'octeon_pc_edac' (INTERRUPT)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.330772] EDAC DEVICE1: Giving out device to module 'octeon-l2c' controller 'octeon_l2c_err': DEV 'octeon_l2c_edac' (POLLED)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   27.354433] octeon_lmc_edac octeon_lmc_edac.0: Disabled (ECC not enabled)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   29.976006] Netfilter messages via NETLINK v0.30.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   29.992848] nfnl_acct: registering with nfnetlink.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.009813] nf_conntrack version 0.5.0 (7682 buckets, 30728 max)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.028251] ctnetlink v0.93: registering with nfnetlink.
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.046080] xt_time: kernel timezone is -0000
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   30.062571] ip_set: protocol 6
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.077871] ipip: IPv4 over IPv4 tunneling driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.095219] gre: GRE over IPv4 demultiplexor driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.112243] ip_gre: GRE over IPv4 tunneling driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.130452] ip_tables: (C) 2000-2006 Netfilter Core Team
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.148092] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.166623] arp_tables: (C) 2002 David S. Miller
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.183415] TCP: cubic registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.198855] Initializing XFRM netlink socket
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.215298] NET: Registered protocol family 10
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.235090] mip6: Mobile IPv6
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.250229] ip6_tables: (C) 2000-2006 Netfilter Core Team
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.268046] sit: IPv6 over IPv4 tunneling driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.286123] ip6_gre: GRE over IPv6 tunneling driver
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.303797] NET: Registered protocol family 17
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.320410] NET: Registered protocol family 15
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   30.337075] Bridge firewalling registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.353225] Ebtables v2.0 registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.415841] 8021q: 802.1Q VLAN Support v1.8
Fri Feb 19 00:11:06 2016 kern.notice kernel: [   30.432228] Key type dns_resolver registered
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.448762] L2 lock: TLB refill 256 bytes
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.464898] L2 lock: General exception 128 bytes
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.481638] L2 lock: low-level interrupt 128 bytes
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.498549] L2 lock: interrupt 640 bytes
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.514596] L2 lock: memcpy 1152 bytes
Fri Feb 19 00:11:06 2016 kern.err kernel: [   30.532485] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   30.557209] Freeing unused kernel memory: 26624K (ffffffff80930000 - ffffffff82330000)
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.009456] mmc1: BKOPS_EN bit is not set
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.030164] mmc1: new high speed DDR MMC card at address 0001
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.048634] mmcblk0: mmc1:0001 P1XXXX 3.60 GiB
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.065612] mmcblk0boot0: mmc1:0001 P1XXXX partition 1 2.00 MiB
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.083980] mmcblk0boot1: mmc1:0001 P1XXXX partition 2 2.00 MiB
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.102346] mmcblk0rpmb: mmc1:0001 P1XXXX partition 3 128 KiB
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.124261]  mmcblk0: p1 p2 p3 p4
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.145115]  mmcblk0boot1: unknown partition table
Fri Feb 19 00:11:06 2016 kern.info kernel: [   47.166615]  mmcblk0boot0: unknown partition table
Fri Feb 19 00:11:06 2016 kern.info kernel: [   48.224774] kjournald starting.  Commit interval 5 seconds
Fri Feb 19 00:11:06 2016 kern.info kernel: [   48.225632] EXT3-fs (mmcblk0p4): using internal journal
Fri Feb 19 00:11:06 2016 kern.info kernel: [   48.226361] EXT3-fs (mmcblk0p4): recovery complete
Fri Feb 19 00:11:06 2016 kern.info kernel: [   48.226365] EXT3-fs (mmcblk0p4): mounted filesystem with writeback data mode
Fri Feb 19 00:11:06 2016 user.err kernel: [   48.518963] init: failed to symlink /tmp -> /var
Fri Feb 19 00:11:06 2016 user.info kernel: [   48.536017] init: Console is alive
Fri Feb 19 00:11:06 2016 user.info kernel: [   48.551893] init: - watchdog -
Fri Feb 19 00:11:06 2016 user.info kernel: [   49.568034] init: - preinit -
Fri Feb 19 00:11:06 2016 user.notice kernel: [   52.767656] mount_root: mounting /dev/root
Fri Feb 19 00:11:06 2016 user.info kernel: [   52.784638] mount_root: loading kmods from internal overlay
Fri Feb 19 00:11:06 2016 user.info kernel: [   52.914476] block: attempting to load /etc/config/fstab
Fri Feb 19 00:11:06 2016 user.info kernel: [   52.933966] block: extroot: not configured
Fri Feb 19 00:11:06 2016 user.info kernel: [   52.954786] procd: - early -
Fri Feb 19 00:11:06 2016 user.info kernel: [   52.970129] procd: - watchdog -
Fri Feb 19 00:11:06 2016 user.info kernel: [   53.686287] procd: - ubus -
Fri Feb 19 00:11:06 2016 user.info kernel: [   54.701879] procd: - init -
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.469127] NET: Registered protocol family 38
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.492458] tun: Universal TUN/TAP device driver, 1.6
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.509808] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.537922] u32 classifier
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.552774]     input device check on
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.568557]     Actions configured
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.585225] Mirror/redirect action on
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.609841] PPP generic driver version 2.4.2
Fri Feb 19 00:11:06 2016 kern.info kernel: [   56.627318] NET: Registered protocol family 24
Fri Feb 19 00:11:07 2016 user.emerg procd: this file has been obseleted. please call "/sbin/block mount" directly
Fri Feb 19 00:11:07 2016 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Fri Feb 19 00:11:07 2016 kern.debug kernel: [   58.643099] SGMII0: Port 1 link timeout
Fri Feb 19 00:11:07 2016 kern.notice kernel: [   58.643323] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:11:07 2016 kern.info kernel: [   58.643397] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Fri Feb 19 00:11:07 2016 kern.info kernel: [   58.644131] device eth1 entered promiscuous mode
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'lan' is enabled
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'blockdomain' is enabled
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'loopback' is enabled
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'loopback' is setting up now
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'loopback' is now up
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'wan' is enabled
Fri Feb 19 00:11:07 2016 daemon.err block: /dev/mmcblk0p4 is already mounted
Fri Feb 19 00:11:07 2016 kern.info kernel: [   58.646257] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Fri Feb 19 00:11:07 2016 kern.info kernel: [   58.653440] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Fri Feb 19 00:11:07 2016 kern.debug kernel: [   58.674891] SGMII0: Port 2 link timeout
Fri Feb 19 00:11:07 2016 kern.notice kernel: [   58.675160] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:11:07 2016 kern.info kernel: [   58.675282] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Network device 'lo' link is up
Fri Feb 19 00:11:07 2016 daemon.notice netifd: Interface 'loopback' has link connectivity
Fri Feb 19 00:11:07 2016 cron.info crond[3190]: crond (busybox 1.23.2) started, log level 5
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Fri Feb 19 00:11:08 2016 kern.info kernel: [   59.616006] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Fri Feb 19 00:11:08 2016 kern.info kernel: [   59.616070] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:08 2016 kern.info kernel: [   59.616095] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:08 2016 kern.info kernel: [   59.616145] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:11:08 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:11:08 2016 kern.info kernel: [   59.646194] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Fri Feb 19 00:11:08 2016 daemon.notice netifd: lan (3344): udhcpc (v1.23.2) started
Fri Feb 19 00:11:08 2016 daemon.notice netifd: lan (3344): Sending discover...
Fri Feb 19 00:11:09 2016 daemon.notice netifd: Network device 'eth0' link is up
Fri Feb 19 00:11:09 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Feb 19 00:11:09 2016 daemon.notice netifd: Interface 'wan' is setting up now
Fri Feb 19 00:11:09 2016 daemon.notice netifd: Interface 'wan' is now up
Fri Feb 19 00:11:09 2016 kern.notice kernel: [   60.666155] eth0: 1000 Mbps Full duplex, port 0
Fri Feb 19 00:11:09 2016 kern.info kernel: [   60.666182] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Fri Feb 19 00:11:09 2016 kern.info kernel: [   60.697447] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Fri Feb 19 00:11:10 2016 kern.info kernel: [   61.615827] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Enabling inline operation
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Found pid path directive (/var/snort/)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Running in IDS mode
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         --== Initializing Snort ==--
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Initializing Output Plugins!
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Initializing Preprocessors!
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Initializing Plug-ins!
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Parsing Rules file "/etc/snort/snort_bridge.conf"
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: started, version 2.73rc7 cachesize 150
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: DNS service limited to local subnets
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: using local addresses only for domain lan
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'HTTP_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 33300 34412 Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'SHELLCODE_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 1:65535 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'ORACLE_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 1024:65535 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'SSH_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 22 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'FTP_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 21 2100 3535 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'SIP_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 5060:5061 5600 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'FILE_DATA_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 3330Fri Feb 19 00:11:11 2016 daemon.warn dnsmasq[3364]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: read /etc/hosts - 1 addresses
Fri Feb 19 00:11:11 2016 daemon.info dnsmasq[3364]: read /tmp/hosts/dhcp - 0 addresses
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: PortVar 'GTP_PORTS' defined :
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  [ 2123 2152 3386 ]
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Detection:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:    Search-Method = AC-Full
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Search-Method-Optimizations = enabled
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Maximum pattern length = 20
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Found pid path directive (/var/snort/)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Tagged Packet Limit: 256
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: done
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Log directory = /tmp/snort/
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Normalizer config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:          ip4: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      ip4::df: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      ip4::rf: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     ip4::tos: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:    ip4::trim: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     ip4::ttl: on (min=1, new=5)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Normalizer config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:          tcp: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::ecn: stream
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   tcp::block: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::rsv: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::pad: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::req_urg: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::req_pay: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::req_urp: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::urp: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::opt: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     tcp::ips: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::trim_syn: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::trim_rst: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::trim_win: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: tcp::trim_mss: off
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Normalizer config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:        icmp4: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Normalizer config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:          ip6: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:    ip6::hops: on (min=1, new=5)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Normalizer config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:        icmp6: on
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Frag3 global config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max frags: 65536
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Fragment memory cap: 4194304 bytes
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Frag3 engine config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Bound Address: default
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Target-based policy: WINDOWS
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Fragment timeout: 180 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Fragment min_ttl:   1
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Fragment Anomalies: Alert
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Overlap Limit:     10
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Min fragment Length:     100
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Expected Streams: 39
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Stream global config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Track TCP sessions: ACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max TCP sessions: 10000
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     TCP cache pruning timeout: 30 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     TCP cache nominal timeout: 3600 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Memcap (for reassembly packet storage): 8388608
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Track UDP sessions: ACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max UDP sessions: 10000
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     UDP cache pruning timeout: 30 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     UDP cache nominal timeout: 180 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Track ICMP sessions: ACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max ICMP sessions: 65536
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Track IP sessions: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Log info if session memory consumption exceeds 1048576
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Send up to 2 active responses
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Wait at least 5 seconds between responses
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Protocol Aware Flushing: ACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Maximum Flush Point: 16000
Fri Feb 19 00:11:11 2016 daemon.notice netifd: lan (3344): Sending discover...
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Stream TCP Policy config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Bound Address: default
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Reassembly Policy: WINDOWS
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Timeout: 180 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Limit on TCP Overlaps: 10
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Maximum number of bytes to queue per session: 1048576
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Maximum number of segs to queue per session: 2621
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Options:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Require 3-Way Handshake: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         3-Way Handshake Timeout: 180
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Detect Anomalies: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Reassembly Ports:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       21 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       22 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       23 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       25 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       36 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       42 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       53 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       70 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       79 client (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       80 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       81 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       82 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       83 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       84 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       85 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       86 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       87 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       88 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       89 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       90 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       additional ports configured but not printed.
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Stream UDP Policy config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Timeout: 180 seconds
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: HttpInspect Config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     GLOBAL CONFIG
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Detect Proxy Usage:       NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Unicode Map Filename: /etc/snort/unicode.map
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Unicode Map Codepage: 1252
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Memcap used for logging URI and Hostname: 150994944
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Gzip Memory: 838860
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Gzip Sessions: 1807
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Gzip Compress Depth: 65535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Gzip Decompress Depth: 65535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     DEFAULT SERVER CONFIG:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Server profile: All
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000 7001 7071 7144 7145 7510 7770 7777 7778 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090 9091 9111 9290 9443 Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Server Flow Depth: 0
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Client Flow Depth: 0
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Chunk Length: 500000
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Header Field Length: 750
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Number Header Fields: 100
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Number of WhiteSpaces allowed with header folding: 200
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Inspect Pipeline Requests: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       URI Discovery Strict Mode: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Allow Proxy Usage: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Disable Alerting: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Oversize Dir Length: 500
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Only inspect URI: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Normalize HTTP Headers: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Inspect HTTP Cookies: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Inspect HTTP Responses: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Extract Gzip from responses: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Decompress response files:  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Unlimited decompression of gzip data from responses: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Normalize Javascripts in HTTP Responses: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Normalize HTTP Cookies: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Enable XFF and True Client IP: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Log HTTP URI data: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Log HTTP Hostname data: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Extended ASCII code support in URI: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Ascii: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Double Decoding: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       %U Encoding: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Bare Byte: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       UTF 8: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Unicode: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Multiple Slash: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Backslash: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Directory Traversal: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Web Root Traversal: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Apache WhiteSpace: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Delimiter: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Whitespace Characters: 0x09 0x0b 0x0c 0x0d
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: rpc_decode arguments:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     alert_fragments: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     alert_large_fragments: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     alert_incomplete: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     alert_multiple_requests: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Portscan Detection Config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Detect Protocols:  TCP UDP ICMP IP
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Sensitivity Level: Medium
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Memcap (in bytes): 500000
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Number of Nodes:   978
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: FTPTelnet Config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     GLOBAL CONFIG
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Inspection Type: stateful
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Check for Encrypted Traffic: YES alert: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Continue to check encrypted data: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     TELNET CONFIG:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Ports: 23
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Are You There Threshold: 20
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Normalize: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       Detect Anomalies: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     FTP CONFIG:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       FTP Server: default
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Ports (PAF): 21 2100 3535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Ignore open data channels: NO
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       FTP Client: default
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Check for Bounce Attacks: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:         Max Response Length: 256
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: SSH config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Autodetection: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Challenge-Response Overflow Alert: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     SSH1 CRC32 Alert: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Server Version String Overflow Alert: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Protocol Mismatch Alert: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Bad Message Direction Alert: DISABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Bad Payload Size Alert: DISABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Unrecognized Version Alert: DISABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Encrypted Packets: 20  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Server Version String Length: 100  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     MaxClientBytes: 19600 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ports:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: 22
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: DCE/RPC 2 Preprocessor Configuration
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Global Configuration
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     DCE/RPC Defragmentation: Enabled
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Memcap: 102400 KB
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Events: co
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     SMB Fingerprint policy: Disabled
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:   Server Default Configuration
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Policy: WinXP
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Detect ports (PAF)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       SMB: 139 445
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       TCP: 135
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       UDP: 135
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       RPC over HTTP server: 593
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       RPC over HTTP proxy: None
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Autodetect ports (PAF)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       SMB: None
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       TCP: 1025-65535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       UDP: 1025-65535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       RPC over HTTP server: 1025-65535
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       RPC over HTTP proxy: None
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Invalid SMB shares: C$ D$ ADMIN$
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Maximum SMB command chaining: 3 commands
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     SMB file inspection: Disabled
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: DNS config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     DNS Client rdata txt Overflow Alert: ACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Obsolete DNS RR Types Alert: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Experimental DNS RR Types Alert: INACTIVE
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ports:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  53
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: SSLPP config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Encrypted packets: not inspected
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ports:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       443      465      563      636      989
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:       992      993      994      995     7801
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      7802     7900     7901     7902     7903
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      7904     7905     7906     7907     7908
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      7909     7910     7911     7912     7913
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      7914     7915     7916     7917     7918
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:      7919     7920
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Server side data is trusted
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Maximum SSL Heartbeat length: 0
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Sensitive Data preprocessor config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Global Alert Threshold: 25
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Masked Output: DISABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: SIP config:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max number of sessions: 1024  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max number of dialogs in a session: 4 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Status: ENABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ignore media channel: DISABLED
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max URI length: 512  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Call ID length: 80  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Request name length: 20 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max From length: 256 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max To length: 256 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Via length: 1024 (Default)
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Contact length: 512  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Max Content length: 2048  
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Ports:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: 5060
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: 5061
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: 5600
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:     Methods:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  invite
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  cancel
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  ack
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  bye
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  register
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  options
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  refer
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  subscribe
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  update
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  join
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  info
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  message
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  notify
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  benotify
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  do
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  qauth
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  sprack
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  publish
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  service
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  unsubscribe
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:  prack
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]:
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Fri Feb 19 00:11:11 2016 daemon.notice snort[3432]: Initializing rule chains...
Fri Feb 19 00:11:12 2016 daemon.notice snort[3432]: WARNING: /etc/snort/rules/snort.rules(1218) threshold (in rule) is deprecated; use detection_filter instead.

Fri Feb 19 00:11:14 2016 daemon.notice netifd: lan (3344): Sending discover...
Fri Feb 19 00:11:14 2016 daemon.notice netifd: lan (3344): Sending select for 192.168.1.59...
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'blockdomain' is now down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'loopback' is now down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'loopback' is disabled
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Network device 'lo' link is down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan' is now down
Fri Feb 19 00:11:14 2016 kern.notice kernel: [   65.749622] eth0: Link down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan' is disabled
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Network device 'eth0' link is down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Fri Feb 19 00:11:14 2016 daemon.notice netifd: lan (3344): Lease of 192.168.1.59 obtained, lease time 86400
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan6' is now down
Fri Feb 19 00:11:14 2016 kern.notice kernel: [   65.800427] eth2: Link down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan6' is disabled
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Network device 'eth2' link is down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Feb 19 00:11:14 2016 daemon.notice netifd: lan (3344): Command failed: Permission denied
Fri Feb 19 00:11:14 2016 daemon.notice netifd: lan (3344): Received SIGTERM
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'lan' is now down
Fri Feb 19 00:11:14 2016 kern.info kernel: [   65.856773] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:11:14 2016 kern.info kernel: [   65.857958] device eth1 left promiscuous mode
Fri Feb 19 00:11:14 2016 kern.info kernel: [   65.857977] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:11:14 2016 kern.notice kernel: [   65.877858] eth1: Link down
Fri Feb 19 00:11:14 2016 kern.info kernel: [   65.881402] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'lan' is disabled
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'blockdomain' is disabled
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Feb 19 00:11:14 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Fri Feb 19 00:11:15 2016 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Fri Feb 19 00:11:15 2016 kern.notice kernel: [   67.101529] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:11:15 2016 kern.info kernel: [   67.102455] device eth1 entered promiscuous mode
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'lan' is enabled
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'loopback' is enabled
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'loopback' is setting up now
Fri Feb 19 00:11:15 2016 kern.info kernel: [   67.107694] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:15 2016 kern.info kernel: [   67.107723] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'loopback' is now up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan' is enabled
Fri Feb 19 00:11:15 2016 kern.notice kernel: [   67.137986] eth0: 1000 Mbps Full duplex, port 0
Fri Feb 19 00:11:15 2016 kern.notice kernel: [   67.159709] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Network device 'lo' link is up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'loopback' has link connectivity
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Network device 'eth0' link is up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan' is setting up now
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan' is now up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:11:15 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:11:15 2016 daemon.notice netifd: lan (3760): udhcpc (v1.23.2) started
Fri Feb 19 00:11:15 2016 daemon.notice netifd: lan (3760): Sending discover...
Fri Feb 19 00:11:15 2016 daemon.notice netifd: lan (3760): Performing a DHCP renew
Fri Feb 19 00:11:15 2016 daemon.notice netifd: lan (3760): Sending discover...
Fri Feb 19 00:11:16 2016 daemon.notice netifd: lan (3760): Sending select for 192.168.1.59...
Fri Feb 19 00:11:16 2016 daemon.notice netifd: lan (3760): Lease of 192.168.1.59 obtained, lease time 86400
Fri Feb 19 00:11:16 2016 daemon.notice netifd: Interface 'lan' is now up
Fri Feb 19 00:11:16 2016 daemon.info dnsmasq[3364]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:11:16 2016 daemon.info dnsmasq[3364]: using local addresses only for domain lan
Fri Feb 19 00:11:16 2016 daemon.info dnsmasq[3364]: using nameserver 192.168.1.1#53
Fri Feb 19 00:11:17 2016 kern.info kernel: [   69.105840] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:19 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Enabling inline operation
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Found pid path directive (/var/snort/)
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Running in IDS mode
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:         --== Initializing Snort ==--
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Initializing Output Plugins!
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Initializing Preprocessors!
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Initializing Plug-ins!
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Parsing Rules file "/etc/snort/snort_bridge.conf"
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'HTTP_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 33300 34412 Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'SHELLCODE_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 1:65535 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'ORACLE_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 1024:65535 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'SSH_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 22 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'FTP_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 21 2100 3535 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'SIP_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 5060:5061 5600 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'FILE_DATA_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 3330Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: PortVar 'GTP_PORTS' defined :
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:  [ 2123 2152 3386 ]
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Detection:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:    Search-Method = AC-Full
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     Search-Method-Optimizations = enabled
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     Maximum pattern length = 20
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Found pid path directive (/var/snort/)
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Tagged Packet Limit: 256
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so...
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: done
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Log directory = /tmp/snort/
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Normalizer config:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:          ip4: on
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:      ip4::df: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:      ip4::rf: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     ip4::tos: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:    ip4::trim: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     ip4::ttl: on (min=1, new=5)
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]: Normalizer config:
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:          tcp: on
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     tcp::ecn: stream
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:   tcp::block: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     tcp::rsv: off
Fri Feb 19 00:11:21 2016 daemon.notice snort[4001]:     tcp::pad: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::req_urg: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::req_pay: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::req_urp: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     tcp::urp: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     tcp::opt: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     tcp::ips: on
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::trim_syn: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::trim_rst: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::trim_win: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: tcp::trim_mss: off
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Normalizer config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:        icmp4: on
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Normalizer config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:          ip6: on
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:    ip6::hops: on (min=1, new=5)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Normalizer config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:        icmp6: on
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Frag3 global config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max frags: 65536
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Fragment memory cap: 4194304 bytes
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Frag3 engine config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Bound Address: default
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Target-based policy: WINDOWS
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Fragment timeout: 180 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Fragment min_ttl:   1
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Fragment Anomalies: Alert
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Overlap Limit:     10
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Min fragment Length:     100
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Expected Streams: 39
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Stream global config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Track TCP sessions: ACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max TCP sessions: 10000
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     TCP cache pruning timeout: 30 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     TCP cache nominal timeout: 3600 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Memcap (for reassembly packet storage): 8388608
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Track UDP sessions: ACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max UDP sessions: 10000
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     UDP cache pruning timeout: 30 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     UDP cache nominal timeout: 180 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Track ICMP sessions: ACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max ICMP sessions: 65536
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Track IP sessions: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Log info if session memory consumption exceeds 1048576
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Send up to 2 active responses
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Wait at least 5 seconds between responses
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Protocol Aware Flushing: ACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Maximum Flush Point: 16000
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Stream TCP Policy config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Bound Address: default
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Reassembly Policy: WINDOWS
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Timeout: 180 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Limit on TCP Overlaps: 10
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Maximum number of bytes to queue per session: 1048576
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Maximum number of segs to queue per session: 2621
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Options:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Require 3-Way Handshake: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         3-Way Handshake Timeout: 180
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Detect Anomalies: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Reassembly Ports:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       21 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       22 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       23 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       25 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       36 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       42 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       53 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       70 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       79 client (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       80 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       81 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       82 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       83 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       84 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       85 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       86 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       87 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       88 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       89 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       90 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       additional ports configured but not printed.
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Stream UDP Policy config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Timeout: 180 seconds
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: HttpInspect Config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     GLOBAL CONFIG
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Detect Proxy Usage:       NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Unicode Map Filename: /etc/snort/unicode.map
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Unicode Map Codepage: 1252
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Memcap used for logging URI and Hostname: 150994944
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Gzip Memory: 838860
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Gzip Sessions: 1807
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Gzip Compress Depth: 65535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Gzip Decompress Depth: 65535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     DEFAULT SERVER CONFIG:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Server profile: All
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000 7001 7071 7144 7145 7510 7770 7777 7778 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090 9091 9111 9290 9443 Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Server Flow Depth: 0
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Client Flow Depth: 0
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Chunk Length: 500000
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Header Field Length: 750
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Number Header Fields: 100
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Number of WhiteSpaces allowed with header folding: 200
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Inspect Pipeline Requests: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       URI Discovery Strict Mode: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Allow Proxy Usage: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Disable Alerting: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Oversize Dir Length: 500
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Only inspect URI: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Normalize HTTP Headers: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Inspect HTTP Cookies: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Inspect HTTP Responses: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Extract Gzip from responses: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Decompress response files:  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Unlimited decompression of gzip data from responses: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Normalize Javascripts in HTTP Responses: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Normalize HTTP Cookies: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Enable XFF and True Client IP: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Log HTTP URI data: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Log HTTP Hostname data: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Extended ASCII code support in URI: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Ascii: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Double Decoding: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       %U Encoding: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Bare Byte: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       UTF 8: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Unicode: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Multiple Slash: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Backslash: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Directory Traversal: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Web Root Traversal: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Apache WhiteSpace: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Delimiter: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Whitespace Characters: 0x09 0x0b 0x0c 0x0d
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: rpc_decode arguments:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     alert_fragments: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     alert_large_fragments: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     alert_incomplete: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     alert_multiple_requests: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Portscan Detection Config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Detect Protocols:  TCP UDP ICMP IP
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Sensitivity Level: Medium
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Memcap (in bytes): 500000
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Number of Nodes:   978
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: FTPTelnet Config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     GLOBAL CONFIG
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Inspection Type: stateful
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Check for Encrypted Traffic: YES alert: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Continue to check encrypted data: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     TELNET CONFIG:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Ports: 23
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Are You There Threshold: 20
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Normalize: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       Detect Anomalies: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     FTP CONFIG:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       FTP Server: default
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Ports (PAF): 21 2100 3535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Ignore open data channels: NO
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       FTP Client: default
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Check for Bounce Attacks: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:         Max Response Length: 256
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: SSH config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Autodetection: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Challenge-Response Overflow Alert: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     SSH1 CRC32 Alert: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Server Version String Overflow Alert: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Protocol Mismatch Alert: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Bad Message Direction Alert: DISABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Bad Payload Size Alert: DISABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Unrecognized Version Alert: DISABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Encrypted Packets: 20  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Server Version String Length: 100  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     MaxClientBytes: 19600 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ports:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: 22
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: DCE/RPC 2 Preprocessor Configuration
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:   Global Configuration
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     DCE/RPC Defragmentation: Enabled
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Memcap: 102400 KB
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Events: co
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     SMB Fingerprint policy: Disabled
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:   Server Default Configuration
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Policy: WinXP
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Detect ports (PAF)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       SMB: 139 445
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       TCP: 135
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       UDP: 135
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       RPC over HTTP server: 593
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       RPC over HTTP proxy: None
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Autodetect ports (PAF)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       SMB: None
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       TCP: 1025-65535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       UDP: 1025-65535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       RPC over HTTP server: 1025-65535
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       RPC over HTTP proxy: None
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Invalid SMB shares: C$ D$ ADMIN$
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Maximum SMB command chaining: 3 commands
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     SMB file inspection: Disabled
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: DNS config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     DNS Client rdata txt Overflow Alert: ACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Obsolete DNS RR Types Alert: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Experimental DNS RR Types Alert: INACTIVE
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ports:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  53
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: SSLPP config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Encrypted packets: not inspected
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ports:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       443      465      563      636      989
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:       992      993      994      995     7801
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:      7802     7900     7901     7902     7903
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:      7904     7905     7906     7907     7908
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:      7909     7910     7911     7912     7913
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:      7914     7915     7916     7917     7918
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:      7919     7920
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Server side data is trusted
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Maximum SSL Heartbeat length: 0
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Sensitive Data preprocessor config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Global Alert Threshold: 25
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Masked Output: DISABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: SIP config:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max number of sessions: 1024  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max number of dialogs in a session: 4 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Status: ENABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ignore media channel: DISABLED
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max URI length: 512  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Call ID length: 80  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Request name length: 20 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max From length: 256 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max To length: 256 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Via length: 1024 (Default)
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Contact length: 512  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Max Content length: 2048  
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Ports:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: 5060
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: 5061
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: 5600
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:     Methods:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  invite
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  cancel
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  ack
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  bye
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  register
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  options
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  refer
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  subscribe
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  update
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  join
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  info
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  message
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  notify
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  benotify
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  do
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  qauth
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  sprack
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  publish
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  service
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  unsubscribe
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:  prack
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: Initializing rule chains...
Fri Feb 19 00:11:22 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Fri Feb 19 00:11:22 2016 user.notice ddns-scripts[4047]: myddns_ipv4: PID '4047' started at 2016-02-19 00:11
Fri Feb 19 00:11:22 2016 daemon.notice snort[4001]: WARNING: /etc/snort/rules/snort.rules(1218) threshold (in rule) is deprecated; use detection_filter instead.

Fri Feb 19 00:11:22 2016 user.warn ddns-scripts[4047]: myddns_ipv4: Service section disabled! - TERMINATE
Fri Feb 19 00:11:22 2016 user.warn ddns-scripts[4047]: myddns_ipv4: PID '4047' exit WITH ERROR '1' at 2016-02-19 00:11
Fri Feb 19 00:11:26 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Feb 19 00:11:26 2016 user.notice ddns-scripts[4223]: myddns_ipv6: PID '4223' started at 2016-02-19 00:11
Fri Feb 19 00:11:26 2016 user.warn ddns-scripts[4223]: myddns_ipv6: Service section disabled! - TERMINATE
Fri Feb 19 00:11:26 2016 user.warn ddns-scripts[4223]: myddns_ipv6: PID '4223' exit WITH ERROR '1' at 2016-02-19 00:11
Fri Feb 19 00:11:26 2016 user.emerg procd: Cannot change large-receive-offload
Fri Feb 19 00:11:28 2016 kern.notice kernel: [   80.135652] eth0: Link down
Fri Feb 19 00:11:29 2016 daemon.notice netifd: Network device 'eth0' link is down
Fri Feb 19 00:11:29 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Fri Feb 19 00:11:29 2016 daemon.notice netifd: Interface 'wan' is now down
Fri Feb 19 00:11:29 2016 daemon.notice netifd: Interface 'wan' is disabled
Fri Feb 19 00:11:29 2016 daemon.notice netifd: Interface 'wan' is enabled
Fri Feb 19 00:11:29 2016 kern.info kernel: [   81.149365] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Fri Feb 19 00:11:29 2016 user.emerg procd: Cannot change large-receive-offload
Fri Feb 19 00:11:31 2016 kern.notice kernel: [   83.095606] eth1: Link down
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]: 13285 Snort rules read
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]:     13285 detection rules
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]:     0 decoder rules
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]:     0 preprocessor rules
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]: 13285 Option Chains linked into 252 Chain Headers
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]: 0 Dynamic rules
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Fri Feb 19 00:11:31 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:31 2016 kern.notice kernel: [   83.176053] eth0: 1000 Mbps Full duplex, port 0
Fri Feb 19 00:11:31 2016 daemon.notice netifd: Network device 'eth0' link is up
Fri Feb 19 00:11:31 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Feb 19 00:11:31 2016 daemon.notice netifd: Interface 'wan' is setting up now
Fri Feb 19 00:11:31 2016 kern.info kernel: [   83.195831] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Fri Feb 19 00:11:31 2016 daemon.notice netifd: Interface 'wan' is now up
Fri Feb 19 00:11:31 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Fri Feb 19 00:11:32 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:11:32 2016 kern.info kernel: [   84.195883] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:11:32 2016 user.emerg procd: Cannot change large-receive-offload
Fri Feb 19 00:11:33 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Fri Feb 19 00:11:33 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Feb 19 00:11:33 2016 daemon.notice netifd: lan (3760): Received SIGTERM
Fri Feb 19 00:11:34 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:11:34 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:11:34 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:11:34 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:11:34 2016 kern.notice kernel: [   86.105975] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:11:34 2016 kern.info kernel: [   86.106033] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:34 2016 kern.info kernel: [   86.106065] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:34 2016 daemon.notice netifd: lan (4556): udhcpc (v1.23.2) started
Fri Feb 19 00:11:34 2016 kern.notice kernel: [   86.165675] eth2: Link down
Fri Feb 19 00:11:34 2016 daemon.notice netifd: lan (4556): Sending discover...
Fri Feb 19 00:11:34 2016 daemon.notice netifd: lan (4556): Sending select for 192.168.1.59...
Fri Feb 19 00:11:35 2016 daemon.notice netifd: lan (4556): Lease of 192.168.1.59 obtained, lease time 86400
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Interface 'lan' is now up
Fri Feb 19 00:11:35 2016 daemon.warn dnsmasq[3364]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Feb 19 00:11:35 2016 daemon.info dnsmasq[3364]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:11:35 2016 daemon.info dnsmasq[3364]: using local addresses only for domain lan
Fri Feb 19 00:11:35 2016 daemon.info dnsmasq[3364]: using nameserver 192.168.1.1#53
Fri Feb 19 00:11:35 2016 user.notice ddns-scripts[4606]: myddns_ipv4: PID '4606' started at 2016-02-19 00:11
Fri Feb 19 00:11:35 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Feb 19 00:11:35 2016 user.warn ddns-scripts[4606]: myddns_ipv4: Service section disabled! - TERMINATE
Fri Feb 19 00:11:35 2016 user.warn ddns-scripts[4606]: myddns_ipv4: PID '4606' exit WITH ERROR '1' at 2016-02-19 00:11
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Network device 'eth2' link is down
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Interface 'wan6' is now down
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Interface 'wan6' is disabled
Fri Feb 19 00:11:35 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:11:35 2016 kern.info kernel: [   87.159418] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Fri Feb 19 00:11:36 2016 kern.info kernel: [   88.105824] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:11:37 2016 daemon.notice vnstatd[4757]: vnStat daemon 1.12 started. (uid:0 gid:0)
Fri Feb 19 00:11:37 2016 daemon.notice vnstatd[4757]: Monitoring: br-lan (100 Mbit) eth0 (100 Mbit)
Fri Feb 19 00:11:37 2016 user.emerg procd: Stopping strongSwan IPsec failed: starter is not running
Fri Feb 19 00:11:37 2016 kern.notice kernel: [   89.176005] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:11:37 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:11:37 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:11:37 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:11:37 2016 kern.info kernel: [   89.195851] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Fri Feb 19 00:11:37 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:11:39 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Fri Feb 19 00:11:39 2016 daemon.info dnsmasq[3364]: exiting on receipt of SIGTERM
Fri Feb 19 00:11:39 2016 user.emerg procd: uci: Entry not found
Fri Feb 19 00:11:39 2016 user.emerg procd: sh: 192.168.1.112: unknown operand
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-------------------[Rule Port Counts]---------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |             tcp     udp    icmp      ip
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |     src    1980      40       0       0
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |     dst   10553     492       0       0
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |     any     206      16       0       0
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |      nc       7       1       0       0
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: |     s+d      46      15       0       0
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +----------------------------------------------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[detection-filter-config]------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | memory-cap : 1048576 bytes
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[detection-filter-rules]-------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: -------------------------------------------------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[rate-filter-config]-----------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | memory-cap : 1048576 bytes
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[rate-filter-rules]------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | none
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: -------------------------------------------------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]:
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[event-filter-config]----------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | memory-cap : 1048576 bytes
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[event-filter-global]----------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | none
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[event-filter-local]-----------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008663    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008658    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008657    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008643    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008609    type=Threshold tracking=src count=3   seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008603    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008578    type=Limit     tracking=src count=1   seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008577    type=Threshold tracking=dst count=5   seconds=15
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021172    type=Both      tracking=dst count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021171    type=Both      tracking=src count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021170    type=Both      tracking=src count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009833    type=Threshold tracking=dst count=2   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021125    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021124    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008579    type=Threshold tracking=dst count=20  seconds=15
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013547    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2000929    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013492    type=Both      tracking=src count=2   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009703    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018433    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018455    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009646    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018432    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018431    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018430    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018383    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018382    type=Limit     tracking=dst count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018374    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018373    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018372    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018389    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018388    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018316    type=Both      tracking=dst count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002842    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019166    type=Both      tracking=src count=5   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2006546    type=Both      tracking=src count=5   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019102    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011585    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020338    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011497    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020306    type=Both      tracking=dst count=30  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020305    type=Both      tracking=src count=30  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020323    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003930    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003927    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020240    type=Limit     tracking=src count=1   seconds=180
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011403    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011402    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2007583    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2000031    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020167    type=Both      tracking=src count=1   seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2000049    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2000048    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008797    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008413    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008429    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008428    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008427    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008424    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008423    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008422    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021327    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021326    type=Limit     tracking=src count=3   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008756    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008400    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013416    type=Threshold tracking=dst count=10  seconds=20
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008391    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008355    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008353    type=Limit     tracking=src count=1   seconds=3600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008352    type=Limit     tracking=src count=1   seconds=3600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021333    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021332    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021331    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021330    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021329    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021328    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008343    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013385    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008363    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008361    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017162    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017161    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021260    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009547    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018277    type=Both      tracking=src count=5   seconds=90
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009544    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009538    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009537    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018292    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009534    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009512    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001906    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009481    type=Threshold tracking=dst count=20  seconds=40
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009480    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001872    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001864    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018208    type=Both      tracking=src count=100 seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001858    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001855    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009356    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009355    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018094    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018090    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018088    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001795    type=Limit     tracking=src count=30  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014372    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002664    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002677    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010508    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2006365    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010494    type=Threshold tracking=src count=5   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019230    type=Both      tracking=src count=50  seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010513    type=Threshold tracking=src count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010487    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010486    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019211    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020069    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020022    type=Both      tracking=src count=2   seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019966    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019963    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003657    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016212    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011146    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003622    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008571    type=Threshold tracking=dst count=2   seconds=5  
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019922    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019950    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008549    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019897    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008544    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2012306    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2012305    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2012304    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2012303    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019889    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019888    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019887    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003586    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003585    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008564    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003583    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008560    type=Threshold tracking=dst count=4   seconds=15
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003566    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008514    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016101    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008513    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008512    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008510    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008504    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019886    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019885    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019884    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019883    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019882    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019876    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008495    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008494    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008488    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008453    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003497    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016033    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016031    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003493    type=Limit     tracking=src count=2   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016030    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008440    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2012204    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008464    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008463    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008460    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008455    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008454    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008098    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008097    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008096    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016016    type=Both      tracking=dst count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008085    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008084    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021018    type=Both      tracking=dst count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008073    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013036    type=Limit     tracking=src count=1   seconds=3  
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2013017    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017967    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017966    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017965    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014141    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014140    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017921    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017920    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017919    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017918    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014153    type=Both      tracking=src count=225 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009159    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014103    type=Both      tracking=src count=15  seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021691    type=Limit     tracking=src count=3   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001564    type=Limit     tracking=src count=5   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001562    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2005320    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014020    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014002    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019018    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019017    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019016    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019015    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019014    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019013    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019012    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019011    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019010    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019022    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019021    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019020    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019019    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018984    type=Both      tracking=src count=1   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018978    type=Both      tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018977    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011030    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011029    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019778    type=Both      tracking=dst count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010953    type=Limit     tracking=src count=10  seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003387    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2015986    type=Both      tracking=src count=100 seconds=1  
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019749    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003384    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019748    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003397    type=Both      tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019692    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003287    type=Both      tracking=dst count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003286    type=Both      tracking=dst count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008264    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008262    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008259    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019609    type=Both      tracking=src count=50  seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008257    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008255    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008253    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008276    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003263    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003262    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003261    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003260    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003259    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003258    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003257    type=Both      tracking=src count=2   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003256    type=Both      tracking=src count=2   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020853    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003255    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003254    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008266    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008231    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003281    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003280    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008228    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003279    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003278    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003277    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003276    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003275    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003274    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003273    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003272    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003271    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003270    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003269    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003268    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003267    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003266    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008199    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008216    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008215    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008214    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008211    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011975    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011974    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008209    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008208    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008184    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008181    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020742    type=Both      tracking=src count=3   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011915    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011914    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008147    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2004443    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020712    type=Limit     tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020741    type=Both      tracking=src count=3   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016897    type=Limit     tracking=src count=2   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020702    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020661    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020660    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020659    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009040    type=Threshold tracking=src count=20  seconds=10
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020669    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020668    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2016867    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020667    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020666    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020665    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020664    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020663    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020662    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020633    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020632    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020631    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2020630    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017721    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008956    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2017722    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008919    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008916    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008914    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008913    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008912    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008941    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021444    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021443    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001316    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2001315    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021410    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021409    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008847    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018755    type=Both      tracking=src count=5   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002402    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002400    type=Limit     tracking=src count=2   seconds=360
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2002383    type=Threshold tracking=dst count=5   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018666    type=Both      tracking=dst count=12  seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2009867    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2014869    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018607    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018569    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2018568    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010715    type=Limit     tracking=src count=1   seconds=180
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2003171    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019418    type=Both      tracking=src count=50  seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011887    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010643    type=Threshold tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2010642    type=Threshold tracking=src count=5   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019350    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019349    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008043    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019348    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019347    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2019346    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008048    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011809    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011808    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011767    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011766    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2015577    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2011716    type=Limit     tracking=src count=5   seconds=120
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008734    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2008749    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021575    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021574    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021573    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=1      sig-id=2021572    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: +-----------------------[suppression]------------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=129    sig-id=12         tracking=none
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: | gen-id=129    sig-id=20         tracking=none
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: -------------------------------------------------------------------------------
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: Verifying Preprocessor Configurations!
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.pdf.in.http' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.Fareit.chk' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'AnglerEK' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'EXE2' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.http.javaclient.SakuraPorts' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'NuclearEK' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.WinHttpRequest' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.JavaArchiveOrClass' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.MCOFF' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.ButterflyJoin' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.lizkebab' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'SunDown.EK' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.MSSQL' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.Adobe.Site.Download' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ms.rdp.established' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.autoit.ua' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.gadu.loggedin' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.http.javaclient' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.RDP.Morto' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.JS.Obfus.Func' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'FlimKit.SWF.Redirect' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.MS.XMLHTTP.ip.request' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.invalid.cab' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.http.binary' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.lethic.established' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.http.rtf.download' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.MS.XMLHTTP.no.exe.request' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.Onelouder.bin' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'et.http.PK' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.wininet.UA' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.webc2ugx' is set but not ever checked.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: WARNING: flowbits key 'ET.http.javaclient.vulnerable' is checked but not ever set.
Fri Feb 19 00:11:40 2016 daemon.notice snort[4001]: 131 out of 1024 flowbits in use.
Fri Feb 19 00:11:44 2016 user.emerg procd: uci: Entry not found
Fri Feb 19 00:11:45 2016 user.notice ddns-scripts[5032]: myddns_ipv6: PID '5032' started at 2016-02-19 00:11
Fri Feb 19 00:11:46 2016 user.warn ddns-scripts[5032]: myddns_ipv6: Service section disabled! - TERMINATE
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: started, version 2.73rc7 cachesize 150
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: DNS service limited to local subnets
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: using local addresses only for domain lan
Fri Feb 19 00:11:46 2016 user.warn ddns-scripts[5032]: myddns_ipv6: PID '5032' exit WITH ERROR '1' at 2016-02-19 00:11
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: using local addresses only for domain lan
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: using nameserver 192.168.1.1#53
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: read /etc/hosts - 1 addresses
Fri Feb 19 00:11:46 2016 daemon.info dnsmasq[4965]: read /tmp/hosts/dhcp - 1 addresses
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is enabled
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is now down
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Fri Feb 19 00:11:47 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Fri Feb 19 00:11:48 2016 daemon.info dnsmasq[4965]: exiting on receipt of SIGTERM
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5365]: bad option at line 69 of /etc/ITUS_DNS.txt
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5365]: FAILED to start up
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated dnsmasq blacklist
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated network.interface.blockdomain: 192.168.1.112
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated firewall.@redirect[0].Itusfilter: 192.168.1.112
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated firewall.@redirect[1]dns-traffic-to-shield: 192.168.1.112
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated uhttpd.Itusfilter
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5380]: bad option at line 69 of /etc/ITUS_DNS.txt
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5380]: FAILED to start up
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: started, version 2.73rc7 cachesize 150
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: DNS service limited to local subnets
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: using local addresses only for domain lan
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: using local addresses only for domain lan
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: using nameserver 192.168.1.1#53
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: read /etc/hosts - 1 addresses
Fri Feb 19 00:11:58 2016 daemon.info dnsmasq[5500]: read /tmp/hosts/dhcp - 1 addresses
Fri Feb 19 00:12:04 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:12:04 2016 kern.notice kernel: [  116.245666] eth0: Link down
Fri Feb 19 00:12:04 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:12:04 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:12:05 2016 daemon.notice netifd: Network device 'eth0' link is down
Fri Feb 19 00:12:05 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Fri Feb 19 00:12:05 2016 daemon.notice netifd: Interface 'wan' is now down
Fri Feb 19 00:12:05 2016 daemon.notice netifd: Interface 'wan' is disabled
Fri Feb 19 00:12:05 2016 daemon.notice netifd: Interface 'wan' is enabled
Fri Feb 19 00:12:05 2016 kern.info kernel: [  117.240390] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Fri Feb 19 00:12:06 2016 kern.notice kernel: [  118.125582] eth1: Link down
Fri Feb 19 00:12:07 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:12:07 2016 kern.info kernel: [  119.116017] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Fri Feb 19 00:12:08 2016 daemon.notice netifd: lan (4556): Received SIGTERM
Fri Feb 19 00:12:08 2016 kern.notice kernel: [  120.205583] eth2: Link down
Fri Feb 19 00:12:08 2016 kern.notice kernel: [  120.256063] eth0: 1000 Mbps Full duplex, port 0
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Network device 'eth0' link is up
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Interface 'wan' is setting up now
Fri Feb 19 00:12:08 2016 kern.info kernel: [  120.285867] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Fri Feb 19 00:12:08 2016 daemon.notice netifd: Interface 'wan' is now up
Fri Feb 19 00:12:08 2016 daemon.warn dnsmasq[5500]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Feb 19 00:12:09 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Fri Feb 19 00:12:09 2016 daemon.notice netifd: Network device 'eth2' link is down
Fri Feb 19 00:12:09 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Feb 19 00:12:09 2016 daemon.notice netifd: Interface 'wan6' is now down
Fri Feb 19 00:12:09 2016 daemon.notice netifd: Interface 'wan6' is disabled
Fri Feb 19 00:12:09 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:12:09 2016 kern.info kernel: [  121.224196] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Fri Feb 19 00:12:10 2016 kern.notice kernel: [  122.135950] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:12:10 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:12:10 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:12:10 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:12:10 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:12:10 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Fri Feb 19 00:12:10 2016 kern.info kernel: [  122.146030] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:12:10 2016 kern.info kernel: [  122.146069] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:12:10 2016 daemon.info dnsmasq[5500]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Fri Feb 19 00:12:10 2016 daemon.notice netifd: lan (5719): udhcpc (v1.23.2) started
Fri Feb 19 00:12:10 2016 daemon.notice netifd: lan (5719): Sending discover...
Fri Feb 19 00:12:11 2016 daemon.notice netifd: lan (5719): Sending select for 192.168.1.59...
Fri Feb 19 00:12:11 2016 daemon.notice netifd: lan (5719): Lease of 192.168.1.59 obtained, lease time 86400
Fri Feb 19 00:12:11 2016 daemon.notice netifd: Interface 'lan' is now up
Fri Feb 19 00:12:11 2016 daemon.info dnsmasq[5500]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:12:11 2016 daemon.info dnsmasq[5500]: using local addresses only for domain lan
Fri Feb 19 00:12:11 2016 daemon.info dnsmasq[5500]: using nameserver 192.168.1.1#53
Fri Feb 19 00:12:12 2016 user.notice ddns-scripts[5771]: myddns_ipv4: PID '5771' started at 2016-02-19 00:12
Fri Feb 19 00:12:12 2016 kern.info kernel: [  124.145833] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:12:12 2016 user.warn ddns-scripts[5771]: myddns_ipv4: Service section disabled! - TERMINATE
Fri Feb 19 00:12:12 2016 user.warn ddns-scripts[5771]: myddns_ipv4: PID '5771' exit WITH ERROR '1' at 2016-02-19 00:12
Fri Feb 19 00:12:12 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:12:12 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:12:12 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:12:12 2016 kern.notice kernel: [  124.235980] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:12:12 2016 kern.info kernel: [  124.239465] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Fri Feb 19 00:12:12 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:12:12 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Feb 19 00:12:13 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:12:13 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:12:13 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:12:16 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Fri Feb 19 00:12:19 2016 user.notice ddns-scripts[6108]: myddns_ipv6: PID '6108' started at 2016-02-19 00:12
Fri Feb 19 00:12:19 2016 user.warn ddns-scripts[6108]: myddns_ipv6: Service section disabled! - TERMINATE
Fri Feb 19 00:12:19 2016 user.warn ddns-scripts[6108]: myddns_ipv6: PID '6108' exit WITH ERROR '1' at 2016-02-19 00:12
Fri Feb 19 00:12:27 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:12:27 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:12:27 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:12:40 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:12:40 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:12:40 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:12:56 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:12:57 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:12:57 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: [ Port Based Pattern Matching Memory ]
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: +- [ Aho-Corasick Summary ] -------------------------------------
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Storage Format    : Full
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Finite Automaton  : DFA
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Alphabet Size     : 256 Chars
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Sizeof State      : Variable (1,2,4 bytes)
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Instances         : 335
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     1 byte states : 228
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     2 byte states : 107
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     4 byte states : 0
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Characters        : 408795
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | States            : 252270
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Transitions       : 13611564
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | State Density     : 21.1%
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Patterns          : 34402
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Match States      : 30013
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: | Memory (MB)       : 134.67
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |   Patterns        : 3.40
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |   Match Lists     : 8.23
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |   DFA
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     1 byte states : 3.38
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     2 byte states : 119.41
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: |     4 byte states : 0.00
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: +----------------------------------------------------------------
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: [ Number of patterns truncated to 20 bytes: 5427 ]
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: afpacket DAQ configured to inline.
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Acquiring network traffic from "eth0:eth2".
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Initializing daemon mode
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Daemon initialized, signaled parent pid: 1
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Reload thread starting...
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Reload thread started, thread 0xffe93af210 (6157)
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Checking PID path...
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: PID path stat checked out ok, PID path set to /var/snort/
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Writing PID "4001" to file "/var/snort//snort_eth0:eth2.pid"
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:         --== Initialization Complete ==--
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:    ,,_     -*> Snort! <*-
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:   o"  )~   Version 2.9.7.2 GRE (Build 177)
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:    ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Using libpcap version 1.5.3
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Using PCRE version: 8.36 2014-09-26
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Using ZLIB version: 1.2.8
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Rules Engine: SF_SNORT_DETECTION_ENGINE  Version 2.4  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_DCERPC2  Version 1.0  <Build 3>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_DNS  Version 1.1  <Build 4>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_FTPTELNET  Version 1.2  <Build 13>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_SDF  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_SIP  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_POP  Version 1.0  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_DNP3  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_SSLPP  Version 1.1  <Build 4>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_IMAP  Version 1.0  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_MODBUS  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_REPUTATION  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_SMTP  Version 1.1  <Build 9>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_SSH  Version 1.1  <Build 3>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]:            Preprocessor Object: SF_GTP  Version 1.1  <Build 1>
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Commencing packet processing (pid=4001)
Fri Feb 19 00:12:59 2016 daemon.notice snort[4001]: Decoding Ethernet
Fri Feb 19 00:12:59 2016 kern.info kernel: [  170.755829] device eth2 entered promiscuous mode
Fri Feb 19 00:12:59 2016 kern.info kernel: [  170.905826] device eth0 entered promiscuous mode
Fri Feb 19 00:13:06 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:13:06 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:13:06 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:13:17 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:13:17 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:13:17 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:13:32 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:13:32 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:13:33 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:13:46 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:13:46 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:13:46 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:13:56 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:13:56 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:13:56 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:14:12 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:14:12 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:14:12 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:14:31 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:14:31 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:14:31 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:14:37 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:14:37 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:14:37 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:14:49 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:14:49 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:14:49 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:14:57 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:14:57 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:14:57 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:03 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:03 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:03 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:08 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:08 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:09 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:19 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:19 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:19 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:29 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:29 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:29 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:38 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:38 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:38 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:15:54 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:15:54 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:15:54 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:16:11 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:16:11 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:16:11 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:16:19 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:16:19 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:16:19 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:16:32 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:16:32 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:16:32 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:16:51 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:16:51 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:16:52 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:01 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:01 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:01 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:14 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:14 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:14 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:24 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:24 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:24 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:34 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:34 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:34 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:46 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:46 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:46 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:17:53 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:17:53 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:17:53 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:18:04 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:18:04 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:18:04 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:18:13 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:18:13 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:18:13 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:18:30 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:18:30 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:18:31 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:18:44 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:18:44 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:18:44 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:18:52 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:18:52 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:18:52 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:19:02 2016 daemon.info dnsmasq[5500]: query[A] upgrade.meshare.com from 192.168.1.118
Fri Feb 19 00:19:02 2016 daemon.info dnsmasq[5500]: forwarded upgrade.meshare.com to 192.168.1.1
Fri Feb 19 00:19:02 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: upgrade.meshare.com
Fri Feb 19 00:19:05 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:19:05 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:19:05 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:19:20 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:19:20 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:19:21 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:19:33 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:19:33 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:19:33 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:19:51 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:19:51 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:19:51 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:20:00 2016 cron.info crond[3190]: USER root pid 6164 cmd /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Fri Feb 19 00:20:00 2016 user.notice root: NTP eager clock adjust failed.
Fri Feb 19 00:20:00 2016 user.notice root: Restarted ntpclient. NTP server #1 of 4.
Fri Feb 19 00:20:08 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:20:08 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:20:09 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:20:16 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:20:16 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:20:16 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:20:26 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:20:26 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:20:26 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:20:44 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:20:44 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:20:46 2016 kern.notice kernel: [  638.155665] eth1: Link down
Fri Feb 19 00:20:46 2016 kern.info kernel: [  638.155726] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:20:46 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:20:46 2016 kern.notice kernel: [  638.255621] eth2: Link down
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Network device 'eth2' link is down
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'wan6' is now down
Fri Feb 19 00:20:47 2016 daemon.notice snort[4001]: Can't acquire (-1) - afpacket_daq_acquire: Encountered error condition on a packet socket!
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'wan6' is disabled
Fri Feb 19 00:20:47 2016 kern.info kernel: [  639.155774] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Fri Feb 19 00:20:47 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:20:47 2016 daemon.notice netifd: lan (5719): Received SIGTERM
Fri Feb 19 00:20:47 2016 daemon.warn dnsmasq[5500]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Feb 19 00:20:47 2016 kern.info kernel: [  639.216238] device eth2 left promiscuous mode
Fri Feb 19 00:20:47 2016 kern.info kernel: [  639.346151] device eth0 left promiscuous mode
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Memory usage summary:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Total non-mmapped bytes (arena):       243034144
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Bytes in mapped regions (hblkhd):      18939904
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Total allocated space (uordblks):      229600432
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Total free space (fordblks):           13433712
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Topmost releasable block (keepcost):   153360
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Packet I/O Totals:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Received:          737
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Analyzed:          737 (100.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     Dropped:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Filtered:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Outstanding:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Injected:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Breakdown by protocol (includes rebuilt packets):
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         Eth:          737 (100.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        VLAN:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         IP4:           51 (  6.920%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        Frag:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        ICMP:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         UDP:           47 (  6.377%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         TCP:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         IP6:            1 (  0.136%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     IP6 Ext:            1 (  0.136%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    IP6 Opts:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Frag6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       ICMP6:            1 (  0.136%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        UDP6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        TCP6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Teredo:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     ICMP-IP:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     IP4/IP4:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     IP4/IP6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     IP6/IP4:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     IP6/IP6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         GRE:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     GRE Eth:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    GRE VLAN:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     GRE IP4:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     GRE IP6:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: GRE IP6 Ext:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    GRE PPTP:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     GRE ARP:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     GRE IPX:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    GRE Loop:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        MPLS:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         ARP:          685 ( 92.944%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         IPX:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Eth Loop:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    Eth Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    IP4 Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    IP6 Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    TCP Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:    UDP Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   ICMP Disc:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: All Discard:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Other:            4 (  0.543%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Bad Chk Sum:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     Bad TTL:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      S5 G 1:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      S5 G 2:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Total:          737
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Action Stats:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Alerts:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Logged:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Passed:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Limits:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Match:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Queue:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         Log:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Event:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Alert:            0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Verdicts:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Allow:          733 ( 99.457%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Block:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     Replace:            4 (  0.543%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Whitelist:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Blacklist:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Ignore:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Retry:            0 (  0.000%)
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Normalizer statistics:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               ip4::trim: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would         ip4::trim: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                ip4::tos: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          ip4::tos: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                 ip4::df: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would           ip4::df: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                 ip4::rf: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would           ip4::rf: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                ip4::ttl: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          ip4::ttl: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               ip4::opts: 4
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would         ip4::opts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:             icmp4::echo: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would       icmp4::echo: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                ip6::ttl: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          ip6::ttl: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               ip6::opts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would         ip6::opts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:             icmp6::echo: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would       icmp6::echo: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::syn_opt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::syn_opt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                tcp::opt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          tcp::opt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                tcp::pad: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          tcp::pad: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                tcp::rsv: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          tcp::rsv: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                 tcp::ns: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would           tcp::ns: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                tcp::urp: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would          tcp::urp: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::ecn_pkt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::ecn_pkt: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:             tcp::ts_ecr: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would       tcp::ts_ecr: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::req_urg: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::req_urg: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::req_pay: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::req_pay: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::req_urp: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::req_urp: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            tcp::ecn_ssn: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would      tcp::ecn_ssn: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:             tcp::ts_nop: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would       tcp::ts_nop: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           tcp::ips_data: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would     tcp::ips_data: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:              tcp::block: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would        tcp::block: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           tcp::trim_syn: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would     tcp::trim_syn: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           tcp::trim_rst: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would     tcp::trim_rst: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           tcp::trim_win: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would     tcp::trim_win: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           tcp::trim_mss: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Would     tcp::trim_mss: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Frag3 statistics:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:         Total Fragments: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       Frags Reassembled: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                Discards: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:           Memory Faults: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                Timeouts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                Overlaps: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               Anomalies: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                  Alerts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                   Drops: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      FragTrackers Added: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     FragTrackers Dumped: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: FragTrackers Auto Freed: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:     Frag Nodes Inserted: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      Frag Nodes Deleted: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: Stream statistics:
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:             Total sessions: 1
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               TCP sessions: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               UDP sessions: 1
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:              ICMP sessions: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                IP sessions: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                 TCP Prunes: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                 UDP Prunes: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                ICMP Prunes: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                  IP Prunes: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: TCP StreamTrackers Created: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: TCP StreamTrackers Deleted: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               TCP Timeouts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               TCP Overlaps: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        TCP Segments Queued: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:      TCP Segments Released: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:        TCP Rebuilt Packets: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:          TCP Segments Used: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               TCP Discards: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                   TCP Gaps: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       UDP Sessions Created: 1
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:       UDP Sessions Deleted: 1
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               UDP Timeouts: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:               UDP Discards: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                     Events: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            Internal Events: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            TCP Port Filter
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                   Filtered: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                  Inspected: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                    Tracked: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:            UDP Port Filter
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                   Filtered: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                  Inspected: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:                    Tracked: 1
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: dcerpc2 Preprocessor Statistics
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Total sessions: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: SIP Preprocessor Statistics
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]:   Total sessions: 0
Fri Feb 19 00:20:48 2016 daemon.notice snort[4001]: ===============================================================================
Fri Feb 19 00:20:49 2016 daemon.notice snort[4001]: Snort exiting
Fri Feb 19 00:20:49 2016 kern.notice kernel: [  641.165908] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:20:49 2016 kern.notice kernel: [  641.186003] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:20:49 2016 kern.info kernel: [  641.186031] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:20:49 2016 kern.info kernel: [  641.186055] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:20:49 2016 kern.info kernel: [  641.186106] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:20:49 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Fri Feb 19 00:20:49 2016 daemon.notice netifd: lan (6287): udhcpc (v1.23.2) started
Fri Feb 19 00:20:49 2016 daemon.notice netifd: lan (6287): Sending discover...
Fri Feb 19 00:20:49 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Fri Feb 19 00:20:51 2016 kern.info kernel: [  643.185818] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:20:52 2016 daemon.notice netifd: lan (6287): Sending discover...
Fri Feb 19 00:20:53 2016 user.notice ddns-scripts[6407]: myddns_ipv6: PID '6407' started at 2016-02-19 00:20
Fri Feb 19 00:20:53 2016 user.warn ddns-scripts[6407]: myddns_ipv6: Service section disabled! - TERMINATE
Fri Feb 19 00:20:53 2016 user.warn ddns-scripts[6407]: myddns_ipv6: PID '6407' exit WITH ERROR '1' at 2016-02-19 00:20
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Enabling inline operation
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Found pid path directive (/var/snort/)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Running in IDS mode
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         --== Initializing Snort ==--
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Initializing Output Plugins!
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Initializing Preprocessors!
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Initializing Plug-ins!
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Parsing Rules file "/etc/snort/snort_bridge.conf"
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'HTTP_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 33300 34412 Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'SHELLCODE_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 1:65535 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'ORACLE_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 1024:65535 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'SSH_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 22 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'FTP_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 21 2100 3535 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'SIP_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 5060:5061 5600 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'FILE_DATA_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 3330Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: PortVar 'GTP_PORTS' defined :
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  [ 2123 2152 3386 ]
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Detection:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:    Search-Method = AC-Full
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Search-Method-Optimizations = enabled
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Maximum pattern length = 20
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Found pid path directive (/var/snort/)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Tagged Packet Limit: 256
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so...
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: done
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Log directory = /tmp/snort/
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Normalizer config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:          ip4: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      ip4::df: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      ip4::rf: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     ip4::tos: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:    ip4::trim: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     ip4::ttl: on (min=1, new=5)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Normalizer config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:          tcp: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::ecn: stream
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   tcp::block: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::rsv: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::pad: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::req_urg: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::req_pay: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::req_urp: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::urp: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::opt: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     tcp::ips: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::trim_syn: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::trim_rst: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::trim_win: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: tcp::trim_mss: off
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Normalizer config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:        icmp4: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Normalizer config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:          ip6: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:    ip6::hops: on (min=1, new=5)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Normalizer config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:        icmp6: on
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Frag3 global config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max frags: 65536
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Fragment memory cap: 4194304 bytes
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Frag3 engine config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Bound Address: default
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Target-based policy: WINDOWS
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Fragment timeout: 180 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Fragment min_ttl:   1
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Fragment Anomalies: Alert
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Overlap Limit:     10
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Min fragment Length:     100
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Expected Streams: 39
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Stream global config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Track TCP sessions: ACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max TCP sessions: 10000
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     TCP cache pruning timeout: 30 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     TCP cache nominal timeout: 3600 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Memcap (for reassembly packet storage): 8388608
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Track UDP sessions: ACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max UDP sessions: 10000
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     UDP cache pruning timeout: 30 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     UDP cache nominal timeout: 180 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Track ICMP sessions: ACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max ICMP sessions: 65536
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Track IP sessions: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Log info if session memory consumption exceeds 1048576
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Send up to 2 active responses
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Wait at least 5 seconds between responses
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Protocol Aware Flushing: ACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Maximum Flush Point: 16000
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Stream TCP Policy config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Bound Address: default
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Reassembly Policy: WINDOWS
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Timeout: 180 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Limit on TCP Overlaps: 10
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Maximum number of bytes to queue per session: 1048576
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Maximum number of segs to queue per session: 2621
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Options:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Require 3-Way Handshake: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         3-Way Handshake Timeout: 180
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Detect Anomalies: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Reassembly Ports:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       21 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       22 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       23 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       25 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       36 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       42 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       53 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       70 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       79 client (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       80 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       81 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       82 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       83 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       84 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       85 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       86 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       87 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       88 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       89 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       90 client (Footprint-IPS) server (Footprint-IPS)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       additional ports configured but not printed.
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Stream UDP Policy config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Timeout: 180 seconds
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: HttpInspect Config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     GLOBAL CONFIG
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Detect Proxy Usage:       NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Unicode Map Filename: /etc/snort/unicode.map
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Unicode Map Codepage: 1252
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Memcap used for logging URI and Hostname: 150994944
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Gzip Memory: 838860
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Gzip Sessions: 1807
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Gzip Compress Depth: 65535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Gzip Decompress Depth: 65535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     DEFAULT SERVER CONFIG:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Server profile: All
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000 7001 7071 7144 7145 7510 7770 7777 7778 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090 9091 9111 9290 9443 Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Server Flow Depth: 0
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Client Flow Depth: 0
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Chunk Length: 500000
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Header Field Length: 750
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Number Header Fields: 100
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Number of WhiteSpaces allowed with header folding: 200
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Inspect Pipeline Requests: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       URI Discovery Strict Mode: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Allow Proxy Usage: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Disable Alerting: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Oversize Dir Length: 500
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Only inspect URI: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Normalize HTTP Headers: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Inspect HTTP Cookies: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Inspect HTTP Responses: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Extract Gzip from responses: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Decompress response files:  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Unlimited decompression of gzip data from responses: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Normalize Javascripts in HTTP Responses: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Normalize HTTP Cookies: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Enable XFF and True Client IP: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Log HTTP URI data: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Log HTTP Hostname data: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Extended ASCII code support in URI: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Ascii: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Double Decoding: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       %U Encoding: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Bare Byte: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       UTF 8: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Unicode: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Multiple Slash: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Backslash: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Directory Traversal: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Web Root Traversal: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Apache WhiteSpace: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Delimiter: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Whitespace Characters: 0x09 0x0b 0x0c 0x0d
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: rpc_decode arguments:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     alert_fragments: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     alert_large_fragments: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     alert_incomplete: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     alert_multiple_requests: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Portscan Detection Config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Detect Protocols:  TCP UDP ICMP IP
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Sensitivity Level: Medium
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Memcap (in bytes): 500000
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Number of Nodes:   978
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: FTPTelnet Config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     GLOBAL CONFIG
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Inspection Type: stateful
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Check for Encrypted Traffic: YES alert: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Continue to check encrypted data: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     TELNET CONFIG:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Ports: 23
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Are You There Threshold: 20
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Normalize: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       Detect Anomalies: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     FTP CONFIG:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       FTP Server: default
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Ports (PAF): 21 2100 3535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Ignore open data channels: NO
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       FTP Client: default
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Check for Bounce Attacks: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Check for Telnet Cmds: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Ignore Telnet Cmd Operations: YES alert: YES
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:         Max Response Length: 256
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: SSH config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Autodetection: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Challenge-Response Overflow Alert: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     SSH1 CRC32 Alert: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Server Version String Overflow Alert: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Protocol Mismatch Alert: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Bad Message Direction Alert: DISABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Bad Payload Size Alert: DISABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Unrecognized Version Alert: DISABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Encrypted Packets: 20  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Server Version String Length: 100  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     MaxClientBytes: 19600 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ports:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: 22
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: DCE/RPC 2 Preprocessor Configuration
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Global Configuration
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     DCE/RPC Defragmentation: Enabled
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Memcap: 102400 KB
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Events: co
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     SMB Fingerprint policy: Disabled
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:   Server Default Configuration
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Policy: WinXP
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Detect ports (PAF)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       SMB: 139 445
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       TCP: 135
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       UDP: 135
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       RPC over HTTP server: 593
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       RPC over HTTP proxy: None
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Autodetect ports (PAF)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       SMB: None
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       TCP: 1025-65535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       UDP: 1025-65535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       RPC over HTTP server: 1025-65535
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       RPC over HTTP proxy: None
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Invalid SMB shares: C$ D$ ADMIN$
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Maximum SMB command chaining: 3 commands
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     SMB file inspection: Disabled
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: DNS config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     DNS Client rdata txt Overflow Alert: ACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Obsolete DNS RR Types Alert: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Experimental DNS RR Types Alert: INACTIVE
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ports:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  53
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: SSLPP config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Encrypted packets: not inspected
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ports:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       443      465      563      636      989
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:       992      993      994      995     7801
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      7802     7900     7901     7902     7903
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      7904     7905     7906     7907     7908
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      7909     7910     7911     7912     7913
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      7914     7915     7916     7917     7918
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:      7919     7920
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Server side data is trusted
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Maximum SSL Heartbeat length: 0
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Sensitive Data preprocessor config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Global Alert Threshold: 25
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Masked Output: DISABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: SIP config:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max number of sessions: 1024  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max number of dialogs in a session: 4 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Status: ENABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ignore media channel: DISABLED
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max URI length: 512  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Call ID length: 80  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Request name length: 20 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max From length: 256 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max To length: 256 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Via length: 1024 (Default)
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Contact length: 512  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Max Content length: 2048  
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Ports:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: 5060
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: 5061
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: 5600
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:     Methods:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  invite
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  cancel
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  ack
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  bye
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  register
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  options
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  refer
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  subscribe
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  update
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  join
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  info
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  message
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  notify
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  benotify
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  do
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  qauth
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  sprack
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  publish
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  service
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  unsubscribe
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:  prack
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]:
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Fri Feb 19 00:20:54 2016 daemon.notice snort[6456]: Initializing rule chains...
Fri Feb 19 00:20:55 2016 daemon.notice netifd: lan (6287): Sending discover...
Fri Feb 19 00:20:55 2016 daemon.notice snort[6456]: WARNING: /etc/snort/rules/snort.rules(1218) threshold (in rule) is deprecated; use detection_filter instead.

Fri Feb 19 00:20:58 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:20:59 2016 kern.notice kernel: [  651.185703] eth1: Link down
Fri Feb 19 00:20:59 2016 kern.info kernel: [  651.185787] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:20:59 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:20:59 2016 kern.notice kernel: [  651.206057] eth2: Link down
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Network device 'eth2' link is down
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'wan6' is now down
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'wan6' is disabled
Fri Feb 19 00:21:00 2016 daemon.notice netifd: Interface 'wan6' is enabled
Fri Feb 19 00:21:00 2016 kern.info kernel: [  652.199943] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Fri Feb 19 00:21:00 2016 daemon.notice netifd: lan (6287): Received SIGTERM
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Network device 'eth2' link is up
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Feb 19 00:21:02 2016 kern.notice kernel: [  654.195935] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:21:02 2016 kern.info kernel: [  654.195972] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:02 2016 kern.info kernel: [  654.196004] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:02 2016 kern.info kernel: [  654.196687] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'wan6' is now up
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'lan' is setting up now
Fri Feb 19 00:21:02 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Fri Feb 19 00:21:02 2016 kern.notice kernel: [  654.215940] eth2: 1000 Mbps Full duplex, port 2
Fri Feb 19 00:21:02 2016 daemon.notice netifd: lan (6509): udhcpc (v1.23.2) started
Fri Feb 19 00:21:02 2016 daemon.notice netifd: lan (6509): Sending discover...
Fri Feb 19 00:21:02 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]: 13285 Snort rules read
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]:     13285 detection rules
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]:     0 decoder rules
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]:     0 preprocessor rules
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]: 13285 Option Chains linked into 252 Chain Headers
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]: 0 Dynamic rules
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Fri Feb 19 00:21:03 2016 daemon.notice snort[6456]:
Fri Feb 19 00:21:04 2016 kern.info kernel: [  656.195827] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:05 2016 daemon.notice netifd: lan (6509): Sending discover...
Fri Feb 19 00:21:06 2016 user.notice ddns-scripts[6629]: myddns_ipv6: PID '6629' started at 2016-02-19 00:21
Fri Feb 19 00:21:06 2016 user.warn ddns-scripts[6629]: myddns_ipv6: Service section disabled! - TERMINATE
Fri Feb 19 00:21:06 2016 user.warn ddns-scripts[6629]: myddns_ipv6: PID '6629' exit WITH ERROR '1' at 2016-02-19 00:21
Fri Feb 19 00:21:08 2016 daemon.notice netifd: lan (6509): Sending discover...
Fri Feb 19 00:21:10 2016 kern.notice kernel: [  662.215671] eth1: Link down
Fri Feb 19 00:21:10 2016 daemon.notice netifd: Network device 'eth1' link is down
Fri Feb 19 00:21:10 2016 kern.info kernel: [  662.235857] br-lan: port 1(eth1) entered disabled state
Fri Feb 19 00:21:11 2016 daemon.notice netifd: Network device 'eth1' link is up
Fri Feb 19 00:21:11 2016 kern.notice kernel: [  663.225953] eth1: 1000 Mbps Full duplex, port 1
Fri Feb 19 00:21:11 2016 kern.info kernel: [  663.226073] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:11 2016 kern.info kernel: [  663.226102] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-------------------[Rule Port Counts]---------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |             tcp     udp    icmp      ip
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |     src    1980      40       0       0
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |     dst   10553     492       0       0
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |     any     206      16       0       0
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |      nc       7       1       0       0
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: |     s+d      46      15       0       0
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +----------------------------------------------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]:
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[detection-filter-config]------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | memory-cap : 1048576 bytes
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[detection-filter-rules]-------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: -------------------------------------------------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]:
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[rate-filter-config]-----------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | memory-cap : 1048576 bytes
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[rate-filter-rules]------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | none
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: -------------------------------------------------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]:
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[event-filter-config]----------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | memory-cap : 1048576 bytes
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[event-filter-global]----------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | none
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[event-filter-local]-----------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011808    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011809    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011767    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011766    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019211    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019230    type=Both      tracking=src count=50  seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2004443    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011887    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003384    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003387    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003397    type=Both      tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013547    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018292    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021018    type=Both      tracking=dst count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008847    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008919    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008914    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008916    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008912    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008913    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008941    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008956    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019102    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018088    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010643    type=Threshold tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010642    type=Threshold tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003286    type=Both      tracking=dst count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003287    type=Both      tracking=dst count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018094    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018090    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003266    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003267    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003260    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003261    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003262    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003263    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003256    type=Both      tracking=src count=2   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003257    type=Both      tracking=src count=2   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003258    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003259    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003254    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003255    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003280    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003281    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003276    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003277    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003278    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003279    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010715    type=Limit     tracking=src count=1   seconds=180
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003272    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003273    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003274    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003275    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003268    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003269    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003270    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003271    type=Both      tracking=src count=1   seconds=900
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008048    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008043    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018208    type=Both      tracking=src count=100 seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013492    type=Both      tracking=src count=2   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018277    type=Both      tracking=src count=5   seconds=90
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019897    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019887    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019888    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019889    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019883    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019884    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019885    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019886    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002383    type=Threshold tracking=dst count=5   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019882    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019876    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009833    type=Threshold tracking=dst count=2   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019950    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019963    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019966    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002400    type=Limit     tracking=src count=2   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019922    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002402    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020022    type=Both      tracking=src count=2   seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020069    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009159    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019349    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019350    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019346    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019347    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019348    type=Both      tracking=dst count=500 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001795    type=Limit     tracking=src count=30  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011914    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011915    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001872    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019418    type=Both      tracking=src count=50  seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001864    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001858    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001855    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011974    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011975    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001906    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003566    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003583    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003585    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003586    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011029    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011030    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021170    type=Both      tracking=src count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003657    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021171    type=Both      tracking=src count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021172    type=Both      tracking=dst count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018433    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021124    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021125    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018455    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003622    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2006365    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021260    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008085    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008084    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008073    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008097    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008098    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002677    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008096    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021330    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021331    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021332    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021333    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021326    type=Limit     tracking=src count=3   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021327    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021328    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021329    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020305    type=Both      tracking=src count=30  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020306    type=Both      tracking=dst count=30  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008147    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008214    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008215    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008216    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008209    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008211    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008208    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2015577    type=Limit     tracking=src count=1   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008231    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020323    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008228    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008181    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020338    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008184    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008199    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008276    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018316    type=Both      tracking=dst count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008266    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010953    type=Limit     tracking=src count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003497    type=Limit     tracking=src count=3   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003493    type=Limit     tracking=src count=2   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008262    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018430    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018431    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008264    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018432    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008257    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008259    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008253    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008255    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018382    type=Limit     tracking=dst count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018383    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018373    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018374    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018372    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018389    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018388    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009867    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020167    type=Both      tracking=src count=1   seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002664    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2005320    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020240    type=Limit     tracking=src count=1   seconds=180
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009355    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009356    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021572    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014103    type=Both      tracking=src count=15  seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021573    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021574    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021575    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016867    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014153    type=Both      tracking=src count=225 seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014140    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014141    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009480    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009481    type=Threshold tracking=dst count=20  seconds=40
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019609    type=Both      tracking=src count=50  seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016897    type=Limit     tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009544    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009547    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009537    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009538    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009534    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009512    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019692    type=Both      tracking=src count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008494    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008495    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008488    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2012204    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008510    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008504    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008460    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008463    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008453    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008454    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011146    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008455    type=Threshold tracking=src count=5   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008464    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008549    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008544    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008571    type=Threshold tracking=dst count=2   seconds=5  
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008564    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018607    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008560    type=Threshold tracking=dst count=4   seconds=15
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008512    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008513    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008514    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2015986    type=Both      tracking=src count=100 seconds=1  
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2006546    type=Both      tracking=src count=5   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018666    type=Both      tracking=dst count=12  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014002    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018755    type=Both      tracking=src count=5   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021443    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021444    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003930    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003927    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021409    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021410    type=Both      tracking=src count=10  seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014020    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013017    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2002842    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013036    type=Limit     tracking=src count=1   seconds=3  
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2000929    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008361    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008363    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008352    type=Limit     tracking=src count=1   seconds=3600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008353    type=Limit     tracking=src count=1   seconds=3600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008355    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008343    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008428    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008429    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008424    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008427    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008422    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008423    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008440    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008391    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008413    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008400    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018568    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018569    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2000049    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2000048    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014869    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2000031    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017721    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017722    type=Both      tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011585    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2021691    type=Limit     tracking=src count=3   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019019    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019020    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019021    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019022    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019015    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019016    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019017    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019018    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019011    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019012    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019013    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019014    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019010    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009646    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2014372    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009703    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017162    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017161    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008643    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008657    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008658    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008609    type=Threshold tracking=src count=3   seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008603    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013416    type=Threshold tracking=dst count=10  seconds=20
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020853    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016101    type=Limit     tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2013385    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011402    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011403    type=Limit     tracking=src count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008663    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001316    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001315    type=Limit     tracking=src count=1   seconds=360
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016212    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008734    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008756    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008749    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008797    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018984    type=Both      tracking=src count=1   seconds=30
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018977    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2018978    type=Both      tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011497    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010486    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010487    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017919    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017920    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017921    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017918    type=Both      tracking=dst count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020668    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020669    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020664    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020665    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020666    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020667    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020660    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010494    type=Threshold tracking=src count=5   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020661    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020662    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020663    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020659    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010513    type=Threshold tracking=src count=10  seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2010508    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020632    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020633    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017967    type=Both      tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020630    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020631    type=Limit     tracking=dst count=1   seconds=1200
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017965    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2017966    type=Both      tracking=src count=1   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020741    type=Both      tracking=src count=3   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008579    type=Threshold tracking=dst count=20  seconds=15
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020742    type=Both      tracking=src count=3   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008577    type=Threshold tracking=dst count=5   seconds=15
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2008578    type=Limit     tracking=src count=1   seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020702    type=Both      tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2003171    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016030    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016031    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016033    type=Limit     tracking=src count=1   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2020712    type=Limit     tracking=src count=2   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2016016    type=Both      tracking=dst count=5   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2012305    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2012306    type=Limit     tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2012303    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2012304    type=Limit     tracking=src count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019748    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019749    type=Limit     tracking=src count=1   seconds=600
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2007583    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019778    type=Both      tracking=dst count=1   seconds=60
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001564    type=Limit     tracking=src count=5   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2009040    type=Threshold tracking=src count=20  seconds=10
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2001562    type=Limit     tracking=src count=2   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2011716    type=Limit     tracking=src count=5   seconds=120
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=1      sig-id=2019166    type=Both      tracking=src count=5   seconds=300
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: +-----------------------[suppression]------------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=129    sig-id=12         tracking=none
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: | gen-id=129    sig-id=20         tracking=none
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: -------------------------------------------------------------------------------
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: Verifying Preprocessor Configurations!
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.Fareit.chk' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.Onelouder.bin' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.gadu.loggedin' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.ButterflyJoin' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.WinHttpRequest' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.Adobe.Site.Download' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.http.PK' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.JS.Obfus.Func' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.webc2ugx' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.autoit.ua' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.lethic.established' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.MCOFF' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.MSSQL' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ms.rdp.established' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.invalid.cab' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.pdf.in.http' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.http.binary' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'EXE2' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.MS.XMLHTTP.ip.request' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.lizkebab' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.http.javaclient.vulnerable' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.http.javaclient.SakuraPorts' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.JavaArchiveOrClass' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'AnglerEK' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'et.MS.XMLHTTP.no.exe.request' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.http.rtf.download' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.http.javaclient' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'FlimKit.SWF.Redirect' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.wininet.UA' is checked but not ever set.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'SunDown.EK' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'ET.RDP.Morto' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: WARNING: flowbits key 'NuclearEK' is set but not ever checked.
Fri Feb 19 00:21:12 2016 daemon.notice snort[6456]: 131 out of 1024 flowbits in use.
Fri Feb 19 00:21:13 2016 kern.info kernel: [  665.225818] br-lan: port 1(eth1) entered forwarding state
Fri Feb 19 00:21:16 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:21:16 2016 daemon.notice netifd: lan (6509): Sending select for 192.168.1.59...
Fri Feb 19 00:21:16 2016 daemon.notice netifd: lan (6509): Lease of 192.168.1.59 obtained, lease time 86400
Fri Feb 19 00:21:16 2016 daemon.notice netifd: Interface 'lan' is now up
Fri Feb 19 00:21:16 2016 daemon.info dnsmasq[5500]: reading /tmp/resolv.conf.auto
Fri Feb 19 00:21:16 2016 daemon.info dnsmasq[5500]: using local addresses only for domain lan
Fri Feb 19 00:21:16 2016 daemon.info dnsmasq[5500]: using nameserver 192.168.1.1#53
Fri Feb 19 00:21:16 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Feb 19 00:21:31 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:21:31 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:21:31 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:21:48 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:21:48 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:21:48 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:06 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:06 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:06 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:10 2016 user.notice root: Successful NTP clock adjust (0.us.pool.ntp.org).
Fri Feb 19 00:22:11 2016 daemon.info procd: - init complete -
Fri Feb 19 00:22:12 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:12 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:12 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:19 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:19 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:19 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: [ Port Based Pattern Matching Memory ]
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: +- [ Aho-Corasick Summary ] -------------------------------------
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Storage Format    : Full
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Finite Automaton  : DFA
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Alphabet Size     : 256 Chars
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Sizeof State      : Variable (1,2,4 bytes)
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Instances         : 335
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     1 byte states : 228
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     2 byte states : 107
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     4 byte states : 0
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Characters        : 408795
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | States            : 252270
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Transitions       : 13611564
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | State Density     : 21.1%
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Patterns          : 34402
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Match States      : 30013
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: | Memory (MB)       : 134.67
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |   Patterns        : 3.40
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |   Match Lists     : 8.23
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |   DFA
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     1 byte states : 3.38
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     2 byte states : 119.41
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: |     4 byte states : 0.00
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: +----------------------------------------------------------------
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: [ Number of patterns truncated to 20 bytes: 5427 ]
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: afpacket DAQ configured to inline.
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Acquiring network traffic from "eth0:eth2".
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Initializing daemon mode
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Daemon initialized, signaled parent pid: 1
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Reload thread starting...
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Reload thread started, thread 0xffea13f210 (6830)
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Checking PID path...
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: PID path stat checked out ok, PID path set to /var/snort/
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Writing PID "6456" to file "/var/snort//snort_eth0:eth2.pid"
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:         --== Initialization Complete ==--
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:    ,,_     -*> Snort! <*-
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:   o"  )~   Version 2.9.7.2 GRE (Build 177)
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:    ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Using libpcap version 1.5.3
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Using PCRE version: 8.36 2014-09-26
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Using ZLIB version: 1.2.8
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Rules Engine: SF_SNORT_DETECTION_ENGINE  Version 2.4  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_DCERPC2  Version 1.0  <Build 3>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_DNS  Version 1.1  <Build 4>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_FTPTELNET  Version 1.2  <Build 13>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_SDF  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_SIP  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_POP  Version 1.0  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_DNP3  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_SSLPP  Version 1.1  <Build 4>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_IMAP  Version 1.0  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_MODBUS  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_REPUTATION  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_SMTP  Version 1.1  <Build 9>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_SSH  Version 1.1  <Build 3>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]:            Preprocessor Object: SF_GTP  Version 1.1  <Build 1>
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Commencing packet processing (pid=6456)
Fri Feb 19 00:22:25 2016 daemon.notice snort[6456]: Decoding Ethernet
Fri Feb 19 00:22:25 2016 kern.info kernel: [  737.185840] device eth2 entered promiscuous mode
Fri Feb 19 00:22:25 2016 kern.info kernel: [  737.335825] device eth0 entered promiscuous mode
Fri Feb 19 00:22:32 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:32 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:32 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:45 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:45 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:45 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:53 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:53 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:53 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:22:57 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:22:57 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:22:57 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:23:03 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:23:03 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:23:03 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:23:21 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:23:21 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:23:21 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:23:40 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:23:40 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:23:40 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:23:55 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:23:55 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:23:55 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:24:05 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:24:05 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:24:05 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:24:18 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:24:18 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:24:19 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:24:32 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:24:32 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:24:32 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com
Fri Feb 19 00:24:34 2016 daemon.err uhttpd[5285]: cut: standard output: Broken pipe
Fri Feb 19 00:24:35 2016 daemon.err uhttpd[5285]: cat: can't open '/.do_date': No such file or directory
Fri Feb 19 00:24:35 2016 daemon.info dnsmasq[5500]: query[A] yourhost.example.com from 127.0.0.1
Fri Feb 19 00:24:35 2016 daemon.info dnsmasq[5500]: forwarded yourhost.example.com to 192.168.1.1
Fri Feb 19 00:24:35 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: yourhost.example.com
Fri Feb 19 00:24:35 2016 daemon.info dnsmasq[5500]: query[AAAA] yourhost.example.com from 127.0.0.1
Fri Feb 19 00:24:35 2016 daemon.info dnsmasq[5500]: forwarded yourhost.example.com to 192.168.1.1
Fri Feb 19 00:24:40 2016 daemon.info dnsmasq[5500]: query[A] yourhost.example.com from 127.0.0.1
Fri Feb 19 00:24:40 2016 daemon.info dnsmasq[5500]: forwarded yourhost.example.com to 192.168.1.1
Fri Feb 19 00:24:40 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: yourhost.example.com
Fri Feb 19 00:24:40 2016 daemon.info dnsmasq[5500]: query[AAAA] yourhost.example.com from 127.0.0.1
Fri Feb 19 00:24:40 2016 daemon.info dnsmasq[5500]: forwarded yourhost.example.com to 192.168.1.1
Fri Feb 19 00:24:45 2016 daemon.info dnsmasq[5500]: query[A] openapi.meshare.com from 192.168.1.118
Fri Feb 19 00:24:45 2016 daemon.info dnsmasq[5500]: forwarded openapi.meshare.com to 192.168.1.1
Fri Feb 19 00:24:45 2016 daemon.warn dnsmasq[5500]: possible DNS-rebind attack detected: openapi.meshare.com




 
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

hans2
This post was updated on .
Hi Breda

i've scanned your log files for words like: fail, failed, error, can't

this is what i've found:

----
Fri Feb 19 00:11:06 2016 kern.info kernel: [   48.226365] EXT3-fs (mmcblk0p4): mounted filesystem with writeback data mode 
Fri Feb 19 00:11:06 2016 user.err kernel: [   48.518963] init: failed to symlink /tmp -> /var 

unrelated, there is a redundant link option in the startup script.

----
 [   26.991163] octeon-pow-ethernet ERROR: You must specify a broadcast group mask. 

the lack of broadcasting should not cause your network failure. However this can be solved with adding the broadcast address:

in CLI run command:

uci set network.lan.broadcast=x.y.z.255

where x.y.z is your network IP range (example 192.168.0 or 10.10.10)

the other option is to edit the /etc/config/network file and add to the section config interface 'lan'
the line:
        option broadcast 'x.y.x.255'

----
 
Fri Feb 19 00:24:34 2016 daemon.err uhttpd[5285]: cut: standard output: Broken pipe 
Fri Feb 19 00:24:35 2016 daemon.err uhttpd[5285]: cat: can't open '/.do_date': No such file or directory 

unrelated. If you want to remove it, go to CLI and type in

touch /.do_date

however this date will be updated as soon as fwupgrade is run.

----
Fri Feb 19 00:20:00 2016 cron.info crond[3190]: USER root pid 6164 cmd /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart 
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed. 
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed. 
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed. 
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed. 
Fri Feb 19 00:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed. 
Fri Feb 19 00:20:00 2016 user.notice root: NTP eager clock adjust failed. 

This is due to the lack of connection when the NTP client is started - you can ignore this as the default schedule will resolve it in 10 minutes.

----
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5365]: bad option at line 69 of /etc/ITUS_DNS.txt 
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5365]: FAILED to start up 
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated dnsmasq blacklist 
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated network.interface.blockdomain: 192.168.1.112 
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated firewall.@redirect[0].Itusfilter: 192.168.1.112 
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated firewall.@redirect[1]dns-traffic-to-shield: 192.168.1.112 
Fri Feb 19 00:11:53 2016 user.notice update_webfilter: updated uhttpd.Itusfilter 
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5380]: bad option at line 69 of /etc/ITUS_DNS.txt 
Fri Feb 19 00:11:53 2016 daemon.crit dnsmasq[5380]: FAILED to start up 

This could be the cause, DNSMASQ is not starting.

Try to make an update in the online blacklist (LUCI > Services > Web Filter > Black List). With "an update" I mean changing or add/remove a line and press Save&Apply
Once it is done, restart DNSMASQ in the Initscripts (LUCI > System > Startup) and RESTART dnsmasq (prio 60)


Have you installed any of the hotfixes, like Hotfix-160210?

No more: Shield Pro v1, Chaos Calmer, FW 1.51 SP1
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

Wisiwyg
Also, are you able to get it to boot up in Router mode? If so, let it complete the Router mode boot, wait for about 10 minutes, then shut down and reconfigure for Bridge mode. Then reboot.

When switching modes the system mounts hidden partitions and installs a new, blank profile for the mode based on what is stored in the Itusrestore Image in those partitions.
Shield Pro v1, Chaos Calmer, FW 1.51 SP1, v8.3.2, Bridge Mode
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
Hi, thanks everyone for all the help yes it works in Router mode without any problems, after  10 min can I just switch to Bridge mode without  powering down the switch modem and shield? or sold I follow  the setup guide?

Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
also the in CLI run command it that ran via Putty ssh?

thanks
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

hans2
breda wrote
Hi, thanks everyone for all the help yes it works in Router mode without any problems, after  10 min can I just switch to Bridge mode without  powering down the switch modem and shield? or sold I follow  the setup guide?
to switch between router and bridge mode you have to cycle power.

breda wrote
also the in CLI run command it that ran via Putty ssh?
correct, you can use the CLI (command line interface) via SSH (putty etc).
No more: Shield Pro v1, Chaos Calmer, FW 1.51 SP1
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
In reply to this post by Wisiwyg
Thanks Hans no I have not instilled Hotfix-160210 can you walk me Thu the update I'm  I am out of practice.  on my command prompts

thanks
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
In reply to this post by hans2
Hi, also here are Initscripts screen shot


Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
Try to make an update in the online blacklist (LUCI > Services > Web Filter > Black List). With "an update" I mean changing or add/remove a line and press Save&Apply
Once it is done, restart DNSMASQ in the Initscripts (LUCI > System > Startup) and RESTART dnsmasq (prio 60)


I also did restart DNSMASQ and remove a line but it did not fix the problem

Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
Hi, Hans I did Hotfix-160210 and Upgrade to 1.51SP1 but still seems not working here is the System Log


Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] Linux version 3.10.20 (daniel@Ayoub) (gcc version 4.7.0 (Cavium Inc. Version: SDK_3_1_0_p2 build 34) ) #165 SMP Mon May 18 23:41:17 PDT 2015
Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] CVMSEG size: 2 cache lines (256 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Cavium Inc. SDK-3.1
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CPU revision is: 000d9602 (Cavium Octeon III)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] FPU revision is: 00739600
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Checking for the multiply/shift bug... no.
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Checking for the daddiu bug... no.
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Determined physical RAM map:
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000]  memory: 000000000c800000 @ 0000000002500000 (usable)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000]  memory: 0000000000c00000 @ 000000000f200000 (usable)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000]  memory: 000000002f000000 @ 0000000020000000 (usable)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000]  memory: 0000000000830000 @ 0000000000100000 (usable)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000]  memory: 0000000001a00000 @ 0000000000930000 (usable after init)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Wasting 896 bytes for tracking 16 unused pages
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Using passed Device Tree <8000000000080000>.
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] software IO TLB [mem 0x02670000-0x026b0000] (0MB) mapped at [8000000002670000-80000000026affff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Zone ranges:
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   DMA32    [mem 0x00100000-0xefffffff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   Normal   empty
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Movable zone start for each node
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Early memory node ranges
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x00100000-0x0232ffff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x02500000-0x0ecfffff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x0f200000-0x0fdfffff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   node   0: [mem 0x20000000-0x4effffff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] On node 0 totalpages: 15971
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 14 pages used for memmap
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 0 pages reserved
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000]   DMA32 zone: 15971 pages, LIFO batch:1
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Cavium Hotplug: Available coremask 0x0
Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] Primary instruction cache 78kB, virtually tagged, 39 way, 16 sets, linesize 128 bytes.
Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] Primary data cache 32kB, 32-way, 8 sets, linesize 128 bytes.
Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] Secondary unified cache 512kB, 4-way, 1024 sets, linesize 128 bytes.
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] PERCPU: Embedded 1 pages/cpu @8000000002710000 s12544 r8192 d44800 u65536
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] pcpu-alloc: s12544 r8192 d44800 u65536 alloc=1*65536
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0 [0] 1
Sun Feb 28 23:13:55 2016 kern.debug kernel: [    0.000000] Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 15957
Sun Feb 28 23:13:55 2016 kern.notice kernel: [    0.000000] Kernel command line:  bootoctlinux 0x20000000 numcores=2 serial#=752011191521-36287 console=ttyS0,115200
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] PID hash table entries: 4096 (order: -1, 32768 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Dentry cache hash table entries: 131072 (order: 4, 1048576 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Inode-cache hash table entries: 65536 (order: 3, 524288 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Memory: 983296k/1022144k available (5825k kernel code, 38848k reserved, 2536k data, 26624k init, 0k highmem)
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] Hierarchical RCU implementation.
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] RCU restricting CPUs from NR_CPUS=32 to nr_cpu_ids=2.
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] NR_IRQS:512
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e000 23 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e200 12 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e400 6 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000ec00 15 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e600 4 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e800 11 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [    0.000000] CIB interrupt controller probed: 800107000000e900 11 bits
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.523596] Calibrating delay loop (skipped) preset value.. 2000.00 BogoMIPS (lpj=10000000)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.531809] pid_max: default: 32768 minimum: 501
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.536525] Security Framework initialized
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.540542] Mount-cache hash table entries: 4096
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   22.546796] Checking for the daddi bug... no.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.547585] SMP: Booting CPU01 (CoreId  1)...
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.551787] CPU revision is: 000d9602 (Cavium Octeon III)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.551790] FPU revision is: 00739600
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.551973] Cpu 1 online
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.563388] Brought up 2 CPUs
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.566333] Cavium Hotplug: Available coremask 0x0
Sun Feb 28 23:13:55 2016 kern.info kernel: [   22.573324] NET: Registered protocol family 16
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   22.578737] Installing handlers for error tree at: ffffffff808be430
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   22.596255] PCIe: Initializing port 0
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.658791] PCIe: Link timeout on port 0, probably the slot is empty
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   24.658797] PCIe: Initializing port 1
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.662293] PCIe: Port 1 not in PCIe mode, skipping
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   24.662298] PCIe: Initializing port 2
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.665940] PCIe: Port 2 not in PCIe mode, skipping
Sun Feb 28 23:13:55 2016 kern.warn kernel: [   24.672308] [sched_delayed] sched: RT throttling activated
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.685629] bio: create slab <bio-0> at 0
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.690049] vgaarb: loaded
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   24.692979] SCSI subsystem initialized
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.696828] libata version 3.00 loaded.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.697246] usbcore: registered new interface driver usbfs
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.702679] usbcore: registered new interface driver hub
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.707975] usbcore: registered new device driver usb
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.713126] pps_core: LinuxPPS API ver. 1 registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.717923] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.727148] PTP clock support registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.731024] EDAC MC: Ver: 3.0.0
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.734703] PCI host bridge to bus 0000:00
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.738660] pci_bus 0000:00: root bus resource [mem 0x1000000000000]
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.744982] pci_bus 0000:00: root bus resource [io  0x0000]
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.750550] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.758477] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.759427] Switching to clocksource OCTEON_CVMCOUNT
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.765699] NET: Registered protocol family 2
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.770342] TCP established hash table entries: 8192 (order: 1, 131072 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.777460] TCP bind hash table entries: 8192 (order: 1, 131072 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.783949] TCP: Hash tables configured (established 8192 bind 8192)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.790218] TCP: reno registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.793399] UDP hash table entries: 2048 (order: 0, 65536 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.799486] UDP-Lite hash table entries: 2048 (order: 0, 65536 bytes)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   24.806142] NET: Registered protocol family 1
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   24.810347] PCI: CLS 0 bytes, default 128
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.398881] octeon_pci_console: Console not created.
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.403684] /proc/octeon_perf: Octeon performance counter interface loaded
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.412543] HugeTLB registered 512 MB page size, pre-allocated 0 pages
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.420262] sys_fw_version: 0.1.17
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.420275] sys_revision: 21
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.420632] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.426568] NTFS driver 2.1.30 [Flags: R/W].
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.430697] jffs2: version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.436831] msgmni has been set to 1920
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.441572] Key type asymmetric registered
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.445558] Asymmetric key parser 'x509' registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.450382] io scheduler noop registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.454297] io scheduler deadline registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.458559] io scheduler cfq registered (default)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.463488] octeon_gpio 1070000000800.gpio-controller: OCTEON GPIO
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.519297] Serial: 8250/16550 driver, 6 ports, IRQ sharing disabled
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.528951] 1180000000800.serial: ttyS0 at MMIO 0x1180000000800 (irq = 34) is a OCTEON
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.536741] console [ttyS0] enabled, bootconsole disabled
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.560284] 1180000000c00.serial: ttyS1 at MMIO 0x1180000000c00 (irq = 35) is a OCTEON
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.582421] brd: module loaded
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.600915] loop: module loaded
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.617766] slram: not enough parameters.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.642093] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.661176] Hooking IMQ after NAT on PREROUTING.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.678148] Hooking IMQ before NAT on POSTROUTING.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.697506] libphy: mdio-octeon: probed
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.714970] mdio-octeon 1180000001800.mdio: Version 1.0
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.732603] spi_ks8995: Micrel KS8995 Ethernet switch SPI driver version 0.1.1
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.753104] e1000e: Intel(R) PRO/1000 Network Driver - 2.3.2-k
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.771237] e1000e: Copyright(c) 1999 - 2013 Intel Corporation.
Sun Feb 28 23:13:55 2016 kern.err kernel: [   26.789690] octeon-pow-ethernet ERROR: You must specify a broadcast group mask.
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   26.809339] octeon-ethernet 2.0
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.826338] Interface 0 has 4 ports (QSGMII)
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.826416] Interface 1 has 4 ports (QSGMII)
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.826423] Interface 2 has 4 ports (NPI)
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.826437] Interface 3 has 4 ports (LOOP)
Sun Feb 28 23:13:55 2016 kern.debug kernel: [   26.826454] Interface 4 has 1 ports (AGL)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.835008] usbcore: registered new interface driver cdc_ether
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.853149] usbcore: registered new interface driver plusb
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.871031] usbcore: registered new interface driver sierra_net
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.889822] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.908628] ehci-pci: EHCI PCI platform driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.925370] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.944400] usbcore: registered new interface driver usb-storage
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.962830] usbcore: registered new interface driver usbserial
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.980902] usbcore: registered new interface driver usbserial_generic
Sun Feb 28 23:13:55 2016 kern.info kernel: [   26.999657] usbserial: USB Serial support registered for generic
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.017933] usbcore: registered new interface driver sierra
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.035730] usbserial: USB Serial support registered for Sierra USB modem
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.054959] i2c /dev entries driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.071060] i2c-octeon 1180000001000.i2c: version 2.5
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.089094] octeon_wdt: Initial granularity 5 Sec
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.106203] EDAC DEVICE0: Giving out device to module 'octeon-cpu' controller 'cache': DEV 'octeon_pc_edac' (INTERRUPT)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.129339] EDAC DEVICE1: Giving out device to module 'octeon-l2c' controller 'octeon_l2c_err': DEV 'octeon_l2c_edac' (POLLED)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   27.152998] octeon_lmc_edac octeon_lmc_edac.0: Disabled (ECC not enabled)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.774461] Netfilter messages via NETLINK v0.30.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.791302] nfnl_acct: registering with nfnetlink.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.808266] nf_conntrack version 0.5.0 (7682 buckets, 30728 max)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.826704] ctnetlink v0.93: registering with nfnetlink.
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.844539] xt_time: kernel timezone is -0000
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   29.861031] ip_set: protocol 6
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.876330] ipip: IPv4 over IPv4 tunneling driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.893680] gre: GRE over IPv4 demultiplexor driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.910704] ip_gre: GRE over IPv4 tunneling driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.928905] ip_tables: (C) 2000-2006 Netfilter Core Team
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.946545] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.965077] arp_tables: (C) 2002 David S. Miller
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.981870] TCP: cubic registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   29.997310] Initializing XFRM netlink socket
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.013754] NET: Registered protocol family 10
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.033547] mip6: Mobile IPv6
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.048686] ip6_tables: (C) 2000-2006 Netfilter Core Team
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.066501] sit: IPv6 over IPv4 tunneling driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.084597] ip6_gre: GRE over IPv6 tunneling driver
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.102261] NET: Registered protocol family 17
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.118867] NET: Registered protocol family 15
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   30.135531] Bridge firewalling registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.151681] Ebtables v2.0 registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.214298] 8021q: 802.1Q VLAN Support v1.8
Sun Feb 28 23:13:55 2016 kern.notice kernel: [   30.230672] Key type dns_resolver registered
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.247206] L2 lock: TLB refill 256 bytes
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.263342] L2 lock: General exception 128 bytes
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.280083] L2 lock: low-level interrupt 128 bytes
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.296994] L2 lock: interrupt 640 bytes
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.313044] L2 lock: memcpy 1152 bytes
Sun Feb 28 23:13:55 2016 kern.err kernel: [   30.330934] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   30.355657] Freeing unused kernel memory: 26624K (ffffffff80930000 - ffffffff82330000)
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.807914] mmc1: BKOPS_EN bit is not set
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.828613] mmc1: new high speed DDR MMC card at address 0001
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.847085] mmcblk0: mmc1:0001 P1XXXX 3.60 GiB
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.864065] mmcblk0boot0: mmc1:0001 P1XXXX partition 1 2.00 MiB
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.882432] mmcblk0boot1: mmc1:0001 P1XXXX partition 2 2.00 MiB
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.900799] mmcblk0rpmb: mmc1:0001 P1XXXX partition 3 128 KiB
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.922749]  mmcblk0: p1 p2 p3 p4
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.943594]  mmcblk0boot1: unknown partition table
Sun Feb 28 23:13:55 2016 kern.info kernel: [   46.965107]  mmcblk0boot0: unknown partition table
Sun Feb 28 23:13:55 2016 kern.info kernel: [   47.633372] kjournald starting.  Commit interval 5 seconds
Sun Feb 28 23:13:55 2016 kern.info kernel: [   47.652050] EXT3-fs (mmcblk0p4): using internal journal
Sun Feb 28 23:13:55 2016 kern.info kernel: [   47.670324] EXT3-fs (mmcblk0p4): recovery complete
Sun Feb 28 23:13:55 2016 kern.info kernel: [   47.687388] EXT3-fs (mmcblk0p4): mounted filesystem with writeback data mode
Sun Feb 28 23:13:55 2016 user.err kernel: [   47.923225] init: failed to symlink /tmp -> /var
Sun Feb 28 23:13:55 2016 user.info kernel: [   47.940296] init: Console is alive
Sun Feb 28 23:13:55 2016 user.info kernel: [   47.956178] init: - watchdog -
Sun Feb 28 23:13:55 2016 user.info kernel: [   48.972341] init: - preinit -
Sun Feb 28 23:13:55 2016 user.notice kernel: [   52.171844] mount_root: mounting /dev/root
Sun Feb 28 23:13:55 2016 user.info kernel: [   52.188789] mount_root: loading kmods from internal overlay
Sun Feb 28 23:13:55 2016 user.info kernel: [   52.318233] block: attempting to load /etc/config/fstab
Sun Feb 28 23:13:55 2016 user.info kernel: [   52.337726] block: extroot: not configured
Sun Feb 28 23:13:55 2016 user.info kernel: [   52.358585] procd: - early -
Sun Feb 28 23:13:55 2016 user.info kernel: [   52.373926] procd: - watchdog -
Sun Feb 28 23:13:55 2016 user.info kernel: [   53.090601] procd: - ubus -
Sun Feb 28 23:13:55 2016 user.info kernel: [   54.106270] procd: - init -
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.826164] NET: Registered protocol family 38
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.849489] tun: Universal TUN/TAP device driver, 1.6
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.866835] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.894824] u32 classifier
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.909709]     input device check on
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.925499]     Actions configured
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.942165] Mirror/redirect action on
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.966737] PPP generic driver version 2.4.2
Sun Feb 28 23:13:55 2016 kern.info kernel: [   55.984117] NET: Registered protocol family 24
Sun Feb 28 23:13:56 2016 user.emerg procd: this file has been obseleted. please call "/sbin/block mount" directly
Sun Feb 28 23:13:56 2016 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Sun Feb 28 23:13:56 2016 kern.debug kernel: [   58.021469] SGMII0: Port 1 link timeout
Sun Feb 28 23:13:56 2016 kern.notice kernel: [   58.021717] eth1: 1000 Mbps Full duplex, port 1
Sun Feb 28 23:13:56 2016 kern.info kernel: [   58.021791] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Sun Feb 28 23:13:56 2016 kern.info kernel: [   58.022530] device eth1 entered promiscuous mode
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'lan' is enabled
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'blockdomain' is enabled
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'loopback' is enabled
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'loopback' is setting up now
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'loopback' is now up
Sun Feb 28 23:13:56 2016 kern.info kernel: [   58.025041] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Sun Feb 28 23:13:56 2016 kern.notice kernel: [   58.052376] eth0: 1000 Mbps Full duplex, port 0
Sun Feb 28 23:13:56 2016 kern.info kernel: [   58.052466] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'wan' is enabled
Sun Feb 28 23:13:56 2016 daemon.err block: /dev/mmcblk0p4 is already mounted
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'wan6' is enabled
Sun Feb 28 23:13:56 2016 kern.notice kernel: [   58.080471] eth2: 1000 Mbps Full duplex, port 2
Sun Feb 28 23:13:56 2016 kern.info kernel: [   58.080575] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Network device 'lo' link is up
Sun Feb 28 23:13:56 2016 daemon.notice netifd: Interface 'loopback' has link connectivity
Sun Feb 28 23:13:56 2016 cron.info crond[3193]: crond (busybox 1.23.2) started, log level 4
Sun Feb 28 23:13:56 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:13:56 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:13:56 2016 user.emerg procd: interface lan has no physdev or physdev has no suitable ip
Sun Feb 28 23:13:56 2016 authpriv.info dropbear[3226]: Not backgrounding
Sun Feb 28 23:13:56 2016 authpriv.warn dropbear[3225]: Failed listening on '22': Error listening: Address already in use
Sun Feb 28 23:13:56 2016 authpriv.info dropbear[3225]: Early exit: No listening ports available.
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Network device 'eth1' link is up
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'lan' is setting up now
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Sun Feb 28 23:13:57 2016 kern.info kernel: [   58.994691] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Sun Feb 28 23:13:57 2016 kern.info kernel: [   58.994754] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:13:57 2016 kern.info kernel: [   58.994775] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:13:57 2016 kern.info kernel: [   58.994825] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Network device 'eth0' link is up
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan' is setting up now
Sun Feb 28 23:13:57 2016 kern.info kernel: [   59.024490] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan' is now up
Sun Feb 28 23:13:57 2016 daemon.notice netifd: lan (3353): udhcpc (v1.23.2) started
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Network device 'eth2' link is up
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'wan6' is now up
Sun Feb 28 23:13:57 2016 kern.info kernel: [   59.054527] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Sun Feb 28 23:13:57 2016 daemon.notice netifd: lan (3353): Sending discover...
Sun Feb 28 23:13:57 2016 daemon.notice netifd: lan (3353): Sending select for 192.168.1.59...
Sun Feb 28 23:13:57 2016 daemon.notice netifd: lan (3353): Lease of 192.168.1.59 obtained, lease time 86400
Sun Feb 28 23:13:57 2016 daemon.notice netifd: Interface 'lan' is now up
Sun Feb 28 23:13:59 2016 kern.info kernel: [   60.994282] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:00 2016 daemon.crit dnsmasq[3377]: bad option at line 66292 of /etc/ITUS_DNS.txt
Sun Feb 28 23:14:00 2016 daemon.crit dnsmasq[3377]: FAILED to start up
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Enabling inline operation
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Found pid path directive (/var/snort/)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Running in IDS mode
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         --== Initializing Snort ==--
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Initializing Output Plugins!
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Initializing Preprocessors!
Sun Feb 28 23:14:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:14:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:14:00 2016 cron.info crond[3193]: wakeup dt=4
Sun Feb 28 23:14:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:14:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:14:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Initializing Plug-ins!
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Parsing Rules file "/etc/snort/snort_bridge.conf"
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'HTTP_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 33300 34412 Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'SHELLCODE_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 1:65535 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'ORACLE_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 1024:65535 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'SSH_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 22 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'FTP_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 21 2100 3535 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'SIP_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 5060:5061 5600 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'FILE_DATA_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 3330Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: PortVar 'GTP_PORTS' defined :
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:  [ 2123 2152 3386 ]
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Detection:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:    Search-Method = AC-Full
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Search-Method-Optimizations = enabled
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Maximum pattern length = 20
Sun Feb 28 23:14:00 2016 kern.info kernel: [   62.348018] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Found pid path directive (/var/snort/)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Tagged Packet Limit: 256
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so...
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: done
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Log directory = /tmp/snort/
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Normalizer config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:          ip4: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:      ip4::df: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:      ip4::rf: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     ip4::tos: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:    ip4::trim: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     ip4::ttl: on (min=1, new=5)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Normalizer config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:          tcp: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::ecn: stream
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   tcp::block: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::rsv: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::pad: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::req_urg: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::req_pay: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::req_urp: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::urp: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::opt: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     tcp::ips: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::trim_syn: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::trim_rst: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::trim_win: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: tcp::trim_mss: off
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Normalizer config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:        icmp4: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Normalizer config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:          ip6: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:    ip6::hops: on (min=1, new=5)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Normalizer config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:        icmp6: on
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Frag3 global config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max frags: 65536
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Fragment memory cap: 4194304 bytes
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Frag3 engine config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Bound Address: default
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Target-based policy: WINDOWS
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Fragment timeout: 180 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Fragment min_ttl:   1
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Fragment Anomalies: Alert
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Overlap Limit:     10
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Min fragment Length:     100
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Expected Streams: 39
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Stream global config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Track TCP sessions: ACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max TCP sessions: 10000
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     TCP cache pruning timeout: 30 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     TCP cache nominal timeout: 3600 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Memcap (for reassembly packet storage): 8388608
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Track UDP sessions: ACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max UDP sessions: 10000
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     UDP cache pruning timeout: 30 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     UDP cache nominal timeout: 180 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Track ICMP sessions: ACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max ICMP sessions: 65536
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Track IP sessions: INACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Log info if session memory consumption exceeds 1048576
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Send up to 2 active responses
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Wait at least 5 seconds between responses
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Protocol Aware Flushing: ACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Maximum Flush Point: 16000
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Stream TCP Policy config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Bound Address: default
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Reassembly Policy: WINDOWS
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Timeout: 180 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Limit on TCP Overlaps: 10
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Maximum number of bytes to queue per session: 1048576
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Maximum number of segs to queue per session: 2621
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Options:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Require 3-Way Handshake: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         3-Way Handshake Timeout: 180
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Detect Anomalies: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Reassembly Ports:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       21 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       22 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       23 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       25 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       36 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       42 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       53 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       70 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       79 client (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       80 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       81 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       82 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       83 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       84 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       85 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       86 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       87 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       88 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       89 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       90 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       additional ports configured but not printed.
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Stream UDP Policy config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Timeout: 180 seconds
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: HttpInspect Config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     GLOBAL CONFIG
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Detect Proxy Usage:       NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Unicode Map Filename: /etc/snort/unicode.map
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Unicode Map Codepage: 1252
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Memcap used for logging URI and Hostname: 150994944
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Gzip Memory: 838860
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Gzip Sessions: 1807
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Gzip Compress Depth: 65535
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Gzip Decompress Depth: 65535
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     DEFAULT SERVER CONFIG:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Server profile: All
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000 7001 7071 7144 7145 7510 7770 7777 7778 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090 9091 9111 9290 9443 Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Server Flow Depth: 0
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Client Flow Depth: 0
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Chunk Length: 500000
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Header Field Length: 750
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Number Header Fields: 100
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Number of WhiteSpaces allowed with header folding: 200
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Inspect Pipeline Requests: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       URI Discovery Strict Mode: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Allow Proxy Usage: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Disable Alerting: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Oversize Dir Length: 500
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Only inspect URI: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Normalize HTTP Headers: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Inspect HTTP Cookies: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Inspect HTTP Responses: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Extract Gzip from responses: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Decompress response files:  
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Unlimited decompression of gzip data from responses: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Normalize Javascripts in HTTP Responses: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Normalize HTTP Cookies: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Enable XFF and True Client IP: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Log HTTP URI data: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Log HTTP Hostname data: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Extended ASCII code support in URI: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Ascii: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Double Decoding: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       %U Encoding: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Bare Byte: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       UTF 8: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Unicode: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Multiple Slash: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Backslash: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Directory Traversal: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Web Root Traversal: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Apache WhiteSpace: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Delimiter: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Whitespace Characters: 0x09 0x0b 0x0c 0x0d
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: rpc_decode arguments:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     alert_fragments: INACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     alert_large_fragments: INACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     alert_incomplete: INACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     alert_multiple_requests: INACTIVE
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: Portscan Detection Config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Detect Protocols:  TCP UDP ICMP IP
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Sensitivity Level: Medium
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Memcap (in bytes): 500000
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Number of Nodes:   978
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: FTPTelnet Config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     GLOBAL CONFIG
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Inspection Type: stateful
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Check for Encrypted Traffic: YES alert: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Continue to check encrypted data: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     TELNET CONFIG:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Ports: 23
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Are You There Threshold: 20
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Normalize: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       Detect Anomalies: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     FTP CONFIG:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       FTP Server: default
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Ports (PAF): 21 2100 3535
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Check for Telnet Cmds: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Ignore Telnet Cmd Operations: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Ignore open data channels: NO
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:       FTP Client: default
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Check for Bounce Attacks: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Check for Telnet Cmds: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Ignore Telnet Cmd Operations: YES alert: YES
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:         Max Response Length: 256
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: SSH config:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Autodetection: ENABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Challenge-Response Overflow Alert: ENABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     SSH1 CRC32 Alert: ENABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Server Version String Overflow Alert: ENABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Protocol Mismatch Alert: ENABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Bad Message Direction Alert: DISABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Bad Payload Size Alert: DISABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Unrecognized Version Alert: DISABLED
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max Encrypted Packets: 20  
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Max Server Version String Length: 100  
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     MaxClientBytes: 19600 (Default)
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Ports:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: 22
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]: DCE/RPC 2 Preprocessor Configuration
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Global Configuration
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     DCE/RPC Defragmentation: Enabled
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Memcap: 102400 KB
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     Events: co
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:     SMB Fingerprint policy: Disabled
Sun Feb 28 23:14:00 2016 daemon.notice snort[3451]:   Server Default Configuration
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Policy: WinXP
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Detect ports (PAF)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       SMB: 139 445
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       TCP: 135
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       UDP: 135
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       RPC over HTTP server: 593
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       RPC over HTTP proxy: None
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Autodetect ports (PAF)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       SMB: None
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       TCP: 1025-65535
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       UDP: 1025-65535
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       RPC over HTTP server: 1025-65535
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       RPC over HTTP proxy: None
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Invalid SMB shares: C$ D$ ADMIN$
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Maximum SMB command chaining: 3 commands
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     SMB file inspection: Disabled
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: DNS config:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     DNS Client rdata txt Overflow Alert: ACTIVE
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Obsolete DNS RR Types Alert: INACTIVE
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Experimental DNS RR Types Alert: INACTIVE
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Ports:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  53
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: SSLPP config:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Encrypted packets: not inspected
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Ports:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       443      465      563      636      989
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:       992      993      994      995     7801
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:      7802     7900     7901     7902     7903
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:      7904     7905     7906     7907     7908
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:      7909     7910     7911     7912     7913
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:      7914     7915     7916     7917     7918
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:      7919     7920
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Server side data is trusted
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Maximum SSL Heartbeat length: 0
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: Sensitive Data preprocessor config:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Global Alert Threshold: 25
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Masked Output: DISABLED
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: SIP config:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max number of sessions: 1024  
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max number of dialogs in a session: 4 (Default)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Status: ENABLED
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Ignore media channel: DISABLED
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max URI length: 512  
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max Call ID length: 80  
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max Request name length: 20 (Default)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max From length: 256 (Default)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max To length: 256 (Default)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max Via length: 1024 (Default)
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max Contact length: 512  
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Max Content length: 2048  
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Ports:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: 5060
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: 5061
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: 5600
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:     Methods:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  invite
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  cancel
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  ack
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  bye
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  register
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  options
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  refer
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  subscribe
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  update
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  join
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  info
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  message
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  notify
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  benotify
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  do
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  qauth
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  sprack
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  publish
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  service
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  unsubscribe
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:  prack
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]:
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: Initializing rule chains...
Sun Feb 28 23:14:01 2016 daemon.notice snort[3451]: WARNING: /etc/snort/rules/snort.rules(1218) threshold (in rule) is deprecated; use detection_filter instead.

Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'blockdomain' is now down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'loopback' is now down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'loopback' is disabled
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Network device 'lo' link is down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan' is now down
Sun Feb 28 23:14:03 2016 kern.notice kernel: [   65.254179] eth0: Link down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan' is disabled
Sun Feb 28 23:14:03 2016 daemon.notice netifd: lan (3353): Received SIGTERM
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'lan' is now down
Sun Feb 28 23:14:03 2016 kern.info kernel: [   65.281843] br-lan: port 1(eth1) entered disabled state
Sun Feb 28 23:14:03 2016 kern.info kernel: [   65.283161] device eth1 left promiscuous mode
Sun Feb 28 23:14:03 2016 kern.info kernel: [   65.283182] br-lan: port 1(eth1) entered disabled state
Sun Feb 28 23:14:03 2016 kern.notice kernel: [   65.303161] eth1: Link down
Sun Feb 28 23:14:03 2016 kern.info kernel: [   65.304050] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'lan' is disabled
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'blockdomain' is disabled
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan6' is now down
Sun Feb 28 23:14:03 2016 kern.notice kernel: [   65.394884] eth2: Link down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan6' is disabled
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Network device 'eth0' link is down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Network device 'eth1' link is down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Network device 'eth2' link is down
Sun Feb 28 23:14:03 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sun Feb 28 23:14:03 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Sun Feb 28 23:14:04 2016 daemon.crit dnsmasq[3516]: bad address at line 114069 of /etc/ITUS_DNS.txt
Sun Feb 28 23:14:04 2016 daemon.crit dnsmasq[3516]: FAILED to start up
Sun Feb 28 23:14:05 2016 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'lan' is enabled
Sun Feb 28 23:14:05 2016 kern.notice kernel: [   66.986187] eth1: 1000 Mbps Full duplex, port 1
Sun Feb 28 23:14:05 2016 kern.info kernel: [   66.987074] device eth1 entered promiscuous mode
Sun Feb 28 23:14:05 2016 kern.info kernel: [   66.989050] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:05 2016 kern.info kernel: [   66.989083] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'loopback' is enabled
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'loopback' is setting up now
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'loopback' is now up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan' is enabled
Sun Feb 28 23:14:05 2016 kern.notice kernel: [   67.035821] eth0: 1000 Mbps Full duplex, port 0
Sun Feb 28 23:14:05 2016 kern.notice kernel: [   67.057355] eth2: 1000 Mbps Full duplex, port 2
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan6' is enabled
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'lan' is setting up now
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Network device 'eth1' link is up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Network device 'lo' link is up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'loopback' has link connectivity
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Network device 'eth0' link is up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan' is setting up now
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan' is now up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Network device 'eth2' link is up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'wan6' is now up
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): udhcpc (v1.23.2) started
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): Sending discover...
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): Performing a DHCP renew
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): Sending discover...
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): Sending select for 192.168.1.59...
Sun Feb 28 23:14:05 2016 daemon.notice netifd: lan (3732): Lease of 192.168.1.59 obtained, lease time 86400
Sun Feb 28 23:14:05 2016 daemon.notice netifd: Interface 'lan' is now up
Sun Feb 28 23:14:06 2016 kern.notice kernel: [   68.054129] eth2: Link down
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: started, version 2.73rc7 cachesize 150
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: DNS service limited to local subnets
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: using local addresses only for domain lan
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: reading /tmp/resolv.conf.auto
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: using local addresses only for domain lan
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: using nameserver 192.168.1.1#53
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: read /etc/hosts - 1 addresses
Sun Feb 28 23:14:06 2016 daemon.info dnsmasq[3814]: read /tmp/hosts/dhcp - 0 addresses
Sun Feb 28 23:14:06 2016 user.notice ddns-scripts[3848]: myddns_ipv4: PID '3848' started at 2016-02-28 23:14
Sun Feb 28 23:14:07 2016 user.warn ddns-scripts[3848]: myddns_ipv4: Service section disabled! - TERMINATE
Sun Feb 28 23:14:07 2016 user.warn ddns-scripts[3848]: myddns_ipv4: PID '3848' exit WITH ERROR '1' at 2016-02-28 23:14
Sun Feb 28 23:14:07 2016 kern.info kernel: [   68.984301] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:08 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Enabling inline operation
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Found pid path directive (/var/snort/)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Running in IDS mode
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         --== Initializing Snort ==--
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Initializing Output Plugins!
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Initializing Preprocessors!
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Initializing Plug-ins!
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Parsing Rules file "/etc/snort/snort_bridge.conf"
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'HTTP_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 33300 34412 Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'SHELLCODE_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 1:65535 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'ORACLE_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 1024:65535 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'SSH_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 22 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'FTP_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 21 2100 3535 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'SIP_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 5060:5061 5600 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'FILE_DATA_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000:7001 7071 7144:7145 7510 7770 7777:7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090:9091 9111 9290 9443 9999:10000 11371 12601 13014 15489 29991 3330Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: PortVar 'GTP_PORTS' defined :
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  [ 2123 2152 3386 ]
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Detection:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:    Search-Method = AC-Full
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Search-Method-Optimizations = enabled
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Maximum pattern length = 20
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Found pid path directive (/var/snort/)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Tagged Packet Limit: 256
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so...
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: done
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Log directory = /tmp/snort/
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Normalizer config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:          ip4: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      ip4::df: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      ip4::rf: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     ip4::tos: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:    ip4::trim: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     ip4::ttl: on (min=1, new=5)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Normalizer config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:          tcp: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::ecn: stream
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   tcp::block: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::rsv: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::pad: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::req_urg: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::req_pay: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::req_urp: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::urp: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::opt: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     tcp::ips: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::trim_syn: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::trim_rst: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::trim_win: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: tcp::trim_mss: off
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Normalizer config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:        icmp4: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Normalizer config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:          ip6: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:    ip6::hops: on (min=1, new=5)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Normalizer config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:        icmp6: on
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Frag3 global config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max frags: 65536
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Fragment memory cap: 4194304 bytes
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Frag3 engine config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Bound Address: default
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Target-based policy: WINDOWS
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Fragment timeout: 180 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Fragment min_ttl:   1
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Fragment Anomalies: Alert
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Overlap Limit:     10
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Min fragment Length:     100
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Expected Streams: 39
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Stream global config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Track TCP sessions: ACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max TCP sessions: 10000
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     TCP cache pruning timeout: 30 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     TCP cache nominal timeout: 3600 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Memcap (for reassembly packet storage): 8388608
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Track UDP sessions: ACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max UDP sessions: 10000
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     UDP cache pruning timeout: 30 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     UDP cache nominal timeout: 180 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Track ICMP sessions: ACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max ICMP sessions: 65536
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Track IP sessions: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Log info if session memory consumption exceeds 1048576
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Send up to 2 active responses
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Wait at least 5 seconds between responses
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Protocol Aware Flushing: ACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Maximum Flush Point: 16000
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Stream TCP Policy config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Bound Address: default
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Reassembly Policy: WINDOWS
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Timeout: 180 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Limit on TCP Overlaps: 10
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Maximum number of bytes to queue per session: 1048576
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Maximum number of segs to queue per session: 2621
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Options:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Require 3-Way Handshake: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         3-Way Handshake Timeout: 180
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Detect Anomalies: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Reassembly Ports:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       21 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       22 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       23 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       25 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       36 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       42 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       53 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       70 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       79 client (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       80 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       81 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       82 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       83 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       84 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       85 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       86 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       87 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       88 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       89 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       90 client (Footprint-IPS) server (Footprint-IPS)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       additional ports configured but not printed.
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Stream UDP Policy config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Timeout: 180 seconds
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: HttpInspect Config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     GLOBAL CONFIG
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Detect Proxy Usage:       NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Unicode Map Filename: /etc/snort/unicode.map
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Unicode Map Codepage: 1252
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Memcap used for logging URI and Hostname: 150994944
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Gzip Memory: 838860
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Gzip Sessions: 1807
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Gzip Compress Depth: 65535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Gzip Decompress Depth: 65535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     DEFAULT SERVER CONFIG:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Server profile: All
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 1942 2231 2301 2381 2809 2980 3029 3037 3057 3128 3443 3702 4000 4343 4848 5000 5117 5250 5600 6080 6173 6988 7000 7001 7071 7144 7145 7510 7770 7777 7778 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8333 8344 8500 8509 8800 8888 8899 8983 9000 9060 9080 9090 9091 9111 9290 9443 Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Server Flow Depth: 0
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Client Flow Depth: 0
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Chunk Length: 500000
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Header Field Length: 750
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Number Header Fields: 100
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Number of WhiteSpaces allowed with header folding: 200
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Inspect Pipeline Requests: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       URI Discovery Strict Mode: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Allow Proxy Usage: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Disable Alerting: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Oversize Dir Length: 500
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Only inspect URI: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Normalize HTTP Headers: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Inspect HTTP Cookies: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Inspect HTTP Responses: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Extract Gzip from responses: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Decompress response files:  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Unlimited decompression of gzip data from responses: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Normalize Javascripts in HTTP Responses: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Normalize HTTP Cookies: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Enable XFF and True Client IP: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Log HTTP URI data: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Log HTTP Hostname data: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Extended ASCII code support in URI: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Ascii: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Double Decoding: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       %U Encoding: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Bare Byte: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       UTF 8: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Unicode: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Multiple Slash: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Backslash: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Directory Traversal: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Web Root Traversal: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Apache WhiteSpace: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Delimiter: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Whitespace Characters: 0x09 0x0b 0x0c 0x0d
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: rpc_decode arguments:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     alert_fragments: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     alert_large_fragments: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     alert_incomplete: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     alert_multiple_requests: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Portscan Detection Config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Detect Protocols:  TCP UDP ICMP IP
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Sensitivity Level: Medium
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Memcap (in bytes): 500000
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Number of Nodes:   978
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: FTPTelnet Config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     GLOBAL CONFIG
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Inspection Type: stateful
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Check for Encrypted Traffic: YES alert: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Continue to check encrypted data: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     TELNET CONFIG:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Ports: 23
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Are You There Threshold: 20
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Normalize: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       Detect Anomalies: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     FTP CONFIG:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       FTP Server: default
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Ports (PAF): 21 2100 3535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Check for Telnet Cmds: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Ignore Telnet Cmd Operations: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Ignore open data channels: NO
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       FTP Client: default
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Check for Bounce Attacks: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Check for Telnet Cmds: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Ignore Telnet Cmd Operations: YES alert: YES
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:         Max Response Length: 256
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: SSH config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Autodetection: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Challenge-Response Overflow Alert: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     SSH1 CRC32 Alert: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Server Version String Overflow Alert: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Protocol Mismatch Alert: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Bad Message Direction Alert: DISABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Bad Payload Size Alert: DISABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Unrecognized Version Alert: DISABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Encrypted Packets: 20  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Server Version String Length: 100  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     MaxClientBytes: 19600 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ports:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: 22
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: DCE/RPC 2 Preprocessor Configuration
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Global Configuration
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     DCE/RPC Defragmentation: Enabled
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Memcap: 102400 KB
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Events: co
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     SMB Fingerprint policy: Disabled
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:   Server Default Configuration
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Policy: WinXP
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Detect ports (PAF)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       SMB: 139 445
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       TCP: 135
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       UDP: 135
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       RPC over HTTP server: 593
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       RPC over HTTP proxy: None
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Autodetect ports (PAF)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       SMB: None
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       TCP: 1025-65535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       UDP: 1025-65535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       RPC over HTTP server: 1025-65535
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       RPC over HTTP proxy: None
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Invalid SMB shares: C$ D$ ADMIN$
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Maximum SMB command chaining: 3 commands
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     SMB file inspection: Disabled
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: DNS config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     DNS Client rdata txt Overflow Alert: ACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Obsolete DNS RR Types Alert: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Experimental DNS RR Types Alert: INACTIVE
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ports:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  53
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: SSLPP config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Encrypted packets: not inspected
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ports:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       443      465      563      636      989
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:       992      993      994      995     7801
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      7802     7900     7901     7902     7903
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      7904     7905     7906     7907     7908
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      7909     7910     7911     7912     7913
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      7914     7915     7916     7917     7918
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:      7919     7920
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Server side data is trusted
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Maximum SSL Heartbeat length: 0
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Sensitive Data preprocessor config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Global Alert Threshold: 25
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Masked Output: DISABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: SIP config:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max number of sessions: 1024  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max number of dialogs in a session: 4 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Status: ENABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ignore media channel: DISABLED
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max URI length: 512  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Call ID length: 80  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Request name length: 20 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max From length: 256 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max To length: 256 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Via length: 1024 (Default)
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Contact length: 512  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Max Content length: 2048  
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Ports:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: 5060
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: 5061
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: 5600
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:     Methods:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  invite
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  cancel
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  ack
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  bye
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  register
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  options
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  refer
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  subscribe
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  update
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  join
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  info
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  message
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  notify
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  benotify
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  do
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  qauth
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  sprack
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  publish
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  service
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  unsubscribe
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:  prack
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Sun Feb 28 23:14:11 2016 daemon.notice snort[4066]: Initializing rule chains...
Sun Feb 28 23:14:11 2016 user.notice ddns-scripts[4109]: myddns_ipv4: PID '4109' started at 2016-02-28 23:14
Sun Feb 28 23:14:11 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Sun Feb 28 23:14:12 2016 user.warn ddns-scripts[4109]: myddns_ipv4: Service section disabled! - TERMINATE
Sun Feb 28 23:14:12 2016 user.warn ddns-scripts[4109]: myddns_ipv4: PID '4109' exit WITH ERROR '1' at 2016-02-28 23:14
Sun Feb 28 23:14:12 2016 daemon.notice snort[4066]: WARNING: /etc/snort/rules/snort.rules(1218) threshold (in rule) is deprecated; use detection_filter instead.

Sun Feb 28 23:14:15 2016 user.notice ddns-scripts[4285]: myddns_ipv6: PID '4285' started at 2016-02-28 23:14
Sun Feb 28 23:14:15 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sun Feb 28 23:14:15 2016 user.warn ddns-scripts[4285]: myddns_ipv6: Service section disabled! - TERMINATE
Sun Feb 28 23:14:15 2016 user.warn ddns-scripts[4285]: myddns_ipv6: PID '4285' exit WITH ERROR '1' at 2016-02-28 23:14
Sun Feb 28 23:14:16 2016 user.emerg procd: Cannot change large-receive-offload
Sun Feb 28 23:14:17 2016 kern.notice kernel: [   79.054086] eth0: Link down
Sun Feb 28 23:14:18 2016 daemon.notice netifd: Network device 'eth0' link is down
Sun Feb 28 23:14:18 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Sun Feb 28 23:14:18 2016 daemon.notice netifd: Interface 'wan' is now down
Sun Feb 28 23:14:18 2016 daemon.notice netifd: Interface 'wan' is disabled
Sun Feb 28 23:14:18 2016 daemon.notice netifd: Interface 'wan' is enabled
Sun Feb 28 23:14:18 2016 kern.info kernel: [   80.067354] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sun Feb 28 23:14:19 2016 user.emerg procd: Cannot change large-receive-offload
Sun Feb 28 23:14:20 2016 kern.notice kernel: [   82.014029] eth1: Link down
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]: 13285 Snort rules read
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]:     13285 detection rules
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]:     0 decoder rules
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]:     0 preprocessor rules
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]: 13285 Option Chains linked into 252 Chain Headers
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]: 0 Dynamic rules
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]: +++++++++++++++++++++++++++++++++++++++++++++++++++
Sun Feb 28 23:14:21 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:21 2016 daemon.notice netifd: Network device 'eth1' link is down
Sun Feb 28 23:14:21 2016 kern.info kernel: [   83.004476] br-lan: port 1(eth1) entered disabled state
Sun Feb 28 23:14:21 2016 daemon.notice netifd: Network device 'eth0' link is up
Sun Feb 28 23:14:21 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Sun Feb 28 23:14:21 2016 daemon.notice netifd: Interface 'wan' is setting up now
Sun Feb 28 23:14:21 2016 kern.notice kernel: [   83.094405] eth0: 1000 Mbps Full duplex, port 0
Sun Feb 28 23:14:21 2016 kern.info kernel: [   83.094571] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sun Feb 28 23:14:21 2016 daemon.notice netifd: Interface 'wan' is now up
Sun Feb 28 23:14:21 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Sun Feb 28 23:14:22 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Sun Feb 28 23:14:22 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sun Feb 28 23:14:22 2016 user.emerg procd: Cannot change large-receive-offload
Sun Feb 28 23:14:22 2016 daemon.notice netifd: lan (3732): Received SIGTERM
Sun Feb 28 23:14:24 2016 daemon.notice netifd: Network device 'eth1' link is up
Sun Feb 28 23:14:24 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Sun Feb 28 23:14:24 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Sun Feb 28 23:14:24 2016 daemon.notice netifd: Interface 'lan' is setting up now
Sun Feb 28 23:14:24 2016 kern.notice kernel: [   86.024373] eth1: 1000 Mbps Full duplex, port 1
Sun Feb 28 23:14:24 2016 kern.info kernel: [   86.024438] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:24 2016 kern.info kernel: [   86.024474] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:24 2016 daemon.notice netifd: lan (4619): udhcpc (v1.23.2) started
Sun Feb 28 23:14:24 2016 daemon.notice netifd: lan (4619): Sending discover...
Sun Feb 28 23:14:24 2016 daemon.notice netifd: lan (4619): Sending select for 192.168.1.59...
Sun Feb 28 23:14:24 2016 daemon.notice netifd: lan (4619): Lease of 192.168.1.59 obtained, lease time 86400
Sun Feb 28 23:14:24 2016 daemon.warn dnsmasq[3814]: no servers found in /tmp/resolv.conf.auto, will retry
Sun Feb 28 23:14:24 2016 daemon.notice netifd: Interface 'lan' is now up
Sun Feb 28 23:14:24 2016 daemon.info dnsmasq[3814]: reading /tmp/resolv.conf.auto
Sun Feb 28 23:14:24 2016 daemon.info dnsmasq[3814]: using local addresses only for domain lan
Sun Feb 28 23:14:24 2016 daemon.info dnsmasq[3814]: using nameserver 192.168.1.1#53
Sun Feb 28 23:14:24 2016 user.notice ddns-scripts[4668]: myddns_ipv4: PID '4668' started at 2016-02-28 23:14
Sun Feb 28 23:14:24 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sun Feb 28 23:14:25 2016 user.warn ddns-scripts[4668]: myddns_ipv4: Service section disabled! - TERMINATE
Sun Feb 28 23:14:25 2016 user.warn ddns-scripts[4668]: myddns_ipv4: PID '4668' exit WITH ERROR '1' at 2016-02-28 23:14
Sun Feb 28 23:14:25 2016 daemon.notice netifd: Network device 'eth2' link is down
Sun Feb 28 23:14:25 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sun Feb 28 23:14:25 2016 daemon.notice netifd: Interface 'wan6' is now down
Sun Feb 28 23:14:25 2016 daemon.notice netifd: Interface 'wan6' is disabled
Sun Feb 28 23:14:25 2016 daemon.notice netifd: Interface 'wan6' is enabled
Sun Feb 28 23:14:25 2016 kern.info kernel: [   87.048897] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Sun Feb 28 23:14:26 2016 kern.info kernel: [   88.024294] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:26 2016 daemon.notice vnstatd[4819]: vnStat daemon 1.12 started. (uid:0 gid:0)
Sun Feb 28 23:14:26 2016 daemon.notice vnstatd[4819]: Monitoring: br-lan (100 Mbit) eth0 (100 Mbit)
Sun Feb 28 23:14:26 2016 user.emerg procd: Stopping strongSwan IPsec failed: starter is not running
Sun Feb 28 23:14:27 2016 daemon.notice netifd: Network device 'eth2' link is up
Sun Feb 28 23:14:27 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Sun Feb 28 23:14:27 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Sun Feb 28 23:14:27 2016 kern.notice kernel: [   89.064370] eth2: 1000 Mbps Full duplex, port 2
Sun Feb 28 23:14:27 2016 kern.info kernel: [   89.064427] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Sun Feb 28 23:14:27 2016 daemon.notice netifd: Interface 'wan6' is now up
Sun Feb 28 23:14:28 2016 daemon.info dnsmasq[3814]: exiting on receipt of SIGTERM
Sun Feb 28 23:14:28 2016 user.emerg procd: uci: Entry not found
Sun Feb 28 23:14:28 2016 user.emerg procd: sh: 192.168.1.112: unknown operand
Sun Feb 28 23:14:28 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-------------------[Rule Port Counts]---------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |             tcp     udp    icmp      ip
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |     src    1980      40       0       0
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |     dst   10553     492       0       0
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |     any     206      16       0       0
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |      nc       7       1       0       0
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: |     s+d      46      15       0       0
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +----------------------------------------------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[detection-filter-config]------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | memory-cap : 1048576 bytes
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[detection-filter-rules]-------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: -------------------------------------------------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[rate-filter-config]-----------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | memory-cap : 1048576 bytes
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[rate-filter-rules]------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | none
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: -------------------------------------------------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]:
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[event-filter-config]----------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | memory-cap : 1048576 bytes
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[event-filter-global]----------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | none
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[event-filter-local]-----------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019609    type=Both      tracking=src count=50  seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019692    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008043    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008048    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019749    type=Limit     tracking=src count=1   seconds=600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019748    type=Limit     tracking=src count=1   seconds=600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019778    type=Both      tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010487    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010486    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018666    type=Both      tracking=dst count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009355    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009356    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018755    type=Both      tracking=src count=5   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009481    type=Threshold tracking=dst count=20  seconds=40
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009480    type=Limit     tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021125    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021124    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003566    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009512    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003583    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003586    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003585    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009534    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009537    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009538    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009544    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009547    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021171    type=Both      tracking=src count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011915    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021170    type=Both      tracking=src count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011914    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021172    type=Both      tracking=dst count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003622    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003657    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011975    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011974    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021260    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017918    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017920    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017919    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017921    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008578    type=Limit     tracking=src count=1   seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008577    type=Threshold tracking=dst count=5   seconds=15
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008579    type=Threshold tracking=dst count=20  seconds=15
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021327    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021326    type=Limit     tracking=src count=3   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021329    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021328    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021331    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021330    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021333    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021332    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008603    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008609    type=Threshold tracking=src count=3   seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017966    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017965    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017967    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008643    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008658    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008657    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008663    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008734    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013492    type=Both      tracking=src count=2   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019346    type=Both      tracking=dst count=500 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019348    type=Both      tracking=dst count=500 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019347    type=Both      tracking=dst count=500 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019350    type=Both      tracking=dst count=500 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019349    type=Both      tracking=dst count=500 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002842    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013547    type=Limit     tracking=src count=1   seconds=600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019418    type=Both      tracking=src count=50  seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001795    type=Limit     tracking=src count=30  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016016    type=Both      tracking=dst count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001855    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001858    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016031    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016030    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016033    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001864    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001872    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001906    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016101    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018569    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018568    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2000929    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016212    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2004443    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018607    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011716    type=Limit     tracking=src count=5   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021018    type=Both      tracking=dst count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011766    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011767    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003493    type=Limit     tracking=src count=2   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003497    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011808    type=Limit     tracking=src count=1   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011809    type=Limit     tracking=src count=1   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2000031    type=Limit     tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008343    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008353    type=Limit     tracking=src count=1   seconds=3600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2000048    type=Limit     tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008352    type=Limit     tracking=src count=1   seconds=3600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008355    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2000049    type=Limit     tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008361    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008363    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017721    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017722    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008391    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008400    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011887    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008413    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008423    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008422    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008424    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008427    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008429    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008428    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008440    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008453    type=Threshold tracking=src count=5   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008455    type=Threshold tracking=src count=5   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008454    type=Threshold tracking=src count=5   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008460    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008463    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008464    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008488    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008495    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008494    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014372    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008504    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008510    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008513    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008512    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008514    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020167    type=Both      tracking=src count=1   seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008544    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008549    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008560    type=Threshold tracking=dst count=4   seconds=15
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008564    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008571    type=Threshold tracking=dst count=2   seconds=5  
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010953    type=Limit     tracking=src count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002664    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020240    type=Limit     tracking=src count=1   seconds=180
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002677    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016867    type=Limit     tracking=src count=1   seconds=600
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011029    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011030    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2016897    type=Limit     tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019230    type=Both      tracking=src count=50  seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020305    type=Both      tracking=src count=30  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020306    type=Both      tracking=dst count=30  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2007583    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020323    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013416    type=Threshold tracking=dst count=10  seconds=20
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020338    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2006546    type=Both      tracking=src count=5   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021691    type=Limit     tracking=src count=3   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018316    type=Both      tracking=dst count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2015986    type=Both      tracking=src count=100 seconds=1  
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018372    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018374    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018373    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018382    type=Limit     tracking=dst count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018383    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018388    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018389    type=Limit     tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018430    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018432    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018431    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018433    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018455    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009159    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003255    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003254    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003257    type=Both      tracking=src count=2   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003256    type=Both      tracking=src count=2   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003259    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003258    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003261    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003260    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003263    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003262    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003267    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003266    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003269    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003268    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003271    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003270    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003273    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003272    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003275    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003274    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003277    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003276    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003279    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003278    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003281    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003280    type=Both      tracking=src count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003287    type=Both      tracking=dst count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003286    type=Both      tracking=dst count=1   seconds=900
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014002    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014020    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003384    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003387    type=Limit     tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008181    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008184    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003397    type=Both      tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008199    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008208    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008209    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008211    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008214    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008216    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008215    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008228    type=Limit     tracking=src count=3   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008231    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014103    type=Both      tracking=src count=15  seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019876    type=Limit     tracking=src count=1   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008253    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008255    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019882    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008257    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019884    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019883    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008259    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019886    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008262    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019885    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010642    type=Threshold tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019888    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008264    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019887    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008266    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010643    type=Threshold tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019889    type=Both      tracking=src count=12  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019897    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014141    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014140    type=Both      tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008276    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014153    type=Both      tracking=src count=225 seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019922    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019950    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002383    type=Threshold tracking=dst count=5   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010715    type=Limit     tracking=src count=1   seconds=180
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019963    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019966    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002400    type=Limit     tracking=src count=2   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2002402    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020022    type=Both      tracking=src count=2   seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020069    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019102    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019166    type=Both      tracking=src count=5   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009867    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019211    type=Both      tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001562    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001564    type=Limit     tracking=src count=5   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013385    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018088    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018090    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018094    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2012304    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2012303    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2012306    type=Limit     tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2012305    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021572    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021574    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021573    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021575    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008847    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018208    type=Both      tracking=src count=100 seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008913    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008912    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008914    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008916    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008919    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018277    type=Both      tracking=src count=5   seconds=90
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018292    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008941    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008956    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2014869    type=Limit     tracking=src count=1   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020631    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020630    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020633    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020632    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011403    type=Limit     tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011402    type=Limit     tracking=src count=5   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020659    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020661    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020660    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020663    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020662    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020665    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009040    type=Threshold tracking=src count=20  seconds=10
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020664    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020667    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020666    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020669    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020668    type=Limit     tracking=dst count=1   seconds=1200
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020702    type=Both      tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020712    type=Limit     tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020741    type=Both      tracking=src count=3   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011497    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020742    type=Both      tracking=src count=3   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003171    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008073    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008084    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008085    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008096    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011585    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008098    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008097    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2020853    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008147    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010494    type=Threshold tracking=src count=5   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010508    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2010513    type=Threshold tracking=src count=10  seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013017    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2013036    type=Limit     tracking=src count=1   seconds=3  
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001315    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2001316    type=Limit     tracking=src count=1   seconds=360
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018978    type=Both      tracking=dst count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018977    type=Both      tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2018984    type=Both      tracking=src count=1   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009646    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019010    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019012    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019011    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019014    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019013    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019016    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019015    type=Both      tracking=src count=1   seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019018    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019017    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019020    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019019    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019022    type=Both      tracking=src count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2019021    type=Both      tracking=dst count=2   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009703    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2015577    type=Limit     tracking=src count=1   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021410    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021409    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021444    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2021443    type=Both      tracking=src count=10  seconds=120
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2009833    type=Threshold tracking=dst count=2   seconds=30
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2012204    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003927    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2003930    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008749    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008756    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2011146    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2006365    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2008797    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2005320    type=Limit     tracking=src count=2   seconds=300
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017161    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=1      sig-id=2017162    type=Limit     tracking=src count=1   seconds=60
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: +-----------------------[suppression]------------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=129    sig-id=12         tracking=none
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: | gen-id=129    sig-id=20         tracking=none
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: -------------------------------------------------------------------------------
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: Verifying Preprocessor Configurations!
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.http.binary' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.pdf.in.http' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.RDP.Morto' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.Adobe.Site.Download' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.invalid.cab' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.http.rtf.download' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.lizkebab' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'FlimKit.SWF.Redirect' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.Onelouder.bin' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.JavaArchiveOrClass' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.gadu.loggedin' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.http.PK' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.webc2ugx' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'NuclearEK' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.Fareit.chk' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'AnglerEK' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.lethic.established' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.http.javaclient' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.JS.Obfus.Func' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.MCOFF' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'SunDown.EK' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.wininet.UA' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ms.rdp.established' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.autoit.ua' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.http.javaclient.vulnerable' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.MSSQL' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.WinHttpRequest' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.ButterflyJoin' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.MS.XMLHTTP.ip.request' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'EXE2' is set but not ever checked.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'ET.http.javaclient.SakuraPorts' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: WARNING: flowbits key 'et.MS.XMLHTTP.no.exe.request' is checked but not ever set.
Sun Feb 28 23:14:30 2016 daemon.notice snort[4066]: 131 out of 1024 flowbits in use.
Sun Feb 28 23:14:32 2016 user.emerg procd: rm: can't remove '/etc/ITUS_DNS.tmp': No such file or directory
Sun Feb 28 23:14:34 2016 user.emerg procd: uci: Entry not found
Sun Feb 28 23:14:34 2016 user.notice ddns-scripts[5061]: myddns_ipv6: PID '5061' started at 2016-02-28 23:14
Sun Feb 28 23:14:35 2016 user.warn ddns-scripts[5061]: myddns_ipv6: Service section disabled! - TERMINATE
Sun Feb 28 23:14:35 2016 user.warn ddns-scripts[5061]: myddns_ipv6: PID '5061' exit WITH ERROR '1' at 2016-02-28 23:14
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: started, version 2.73rc7 cachesize 150
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: DNS service limited to local subnets
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: using local addresses only for domain lan
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: reading /tmp/resolv.conf.auto
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: using local addresses only for domain lan
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: using nameserver 192.168.1.1#53
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: read /etc/hosts - 1 addresses
Sun Feb 28 23:14:35 2016 daemon.info dnsmasq[5027]: read /tmp/hosts/dhcp - 1 addresses
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is enabled
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is now down
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is setting up now
Sun Feb 28 23:14:37 2016 daemon.notice netifd: Interface 'blockdomain' is now up
Sun Feb 28 23:14:39 2016 daemon.info dnsmasq[5027]: exiting on receipt of SIGTERM
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: started, version 2.73rc7 cachesize 150
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: DNS service limited to local subnets
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: using local addresses only for domain lan
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: reading /tmp/resolv.conf.auto
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: using local addresses only for domain lan
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: using nameserver 192.168.1.1#53
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: read /etc/hosts - 1 addresses
Sun Feb 28 23:14:40 2016 daemon.info dnsmasq[5418]: read /tmp/hosts/dhcp - 1 addresses
Sun Feb 28 23:14:42 2016 user.notice update_webfilter: updated dnsmasq blacklist
Sun Feb 28 23:14:42 2016 user.notice update_webfilter: updated network.interface.blockdomain: 192.168.1.112
Sun Feb 28 23:14:42 2016 user.notice update_webfilter: updated firewall.@redirect[0].Itusfilter: 192.168.1.112
Sun Feb 28 23:14:42 2016 user.notice update_webfilter: updated firewall.@redirect[1]dns-traffic-to-shield: 192.168.1.112
Sun Feb 28 23:14:42 2016 user.notice update_webfilter: updated uhttpd.Itusfilter
Sun Feb 28 23:14:52 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:14:52 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:14:53 2016 kern.notice kernel: [  115.144176] eth0: Link down
Sun Feb 28 23:14:54 2016 daemon.notice netifd: Network device 'eth0' link is down
Sun Feb 28 23:14:54 2016 daemon.notice netifd: Interface 'wan' has link connectivity loss
Sun Feb 28 23:14:54 2016 daemon.notice netifd: Interface 'wan' is now down
Sun Feb 28 23:14:54 2016 daemon.notice netifd: Interface 'wan' is disabled
Sun Feb 28 23:14:54 2016 daemon.notice netifd: Interface 'wan' is enabled
Sun Feb 28 23:14:54 2016 kern.info kernel: [  116.138543] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Sun Feb 28 23:14:56 2016 kern.notice kernel: [  118.074038] eth1: Link down
Sun Feb 28 23:14:57 2016 daemon.notice netifd: Network device 'eth1' link is down
Sun Feb 28 23:14:57 2016 kern.info kernel: [  119.074474] br-lan: port 1(eth1) entered disabled state
Sun Feb 28 23:14:57 2016 daemon.notice netifd: Network device 'eth0' link is up
Sun Feb 28 23:14:57 2016 daemon.notice netifd: Interface 'wan' has link connectivity
Sun Feb 28 23:14:57 2016 daemon.notice netifd: Interface 'wan' is setting up now
Sun Feb 28 23:14:57 2016 daemon.notice netifd: Interface 'wan' is now up
Sun Feb 28 23:14:57 2016 kern.notice kernel: [  119.154493] eth0: 1000 Mbps Full duplex, port 0
Sun Feb 28 23:14:57 2016 kern.info kernel: [  119.154520] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sun Feb 28 23:14:57 2016 user.notice firewall: Reloading firewall due to ifup of wan (eth0)
Sun Feb 28 23:14:58 2016 kern.notice kernel: [  120.084086] eth2: Link down
Sun Feb 28 23:14:58 2016 daemon.notice netifd: Bridge 'br-lan' link is down
Sun Feb 28 23:14:58 2016 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sun Feb 28 23:14:58 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity loss
Sun Feb 28 23:14:58 2016 daemon.notice netifd: lan (4619): Received SIGTERM
Sun Feb 28 23:14:59 2016 kern.notice kernel: [  121.094426] eth1: 1000 Mbps Full duplex, port 1
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Network device 'eth1' link is up
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Network device 'eth2' link is down
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'wan6' is now down
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'wan6' is disabled
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'wan6' is enabled
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Bridge 'br-lan' link is up
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'lan' has link connectivity
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'lan' is setting up now
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'blockdomain' has link connectivity
Sun Feb 28 23:14:59 2016 daemon.warn dnsmasq[5418]: no servers found in /tmp/resolv.conf.auto, will retry
Sun Feb 28 23:14:59 2016 kern.info kernel: [  121.114331] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:59 2016 kern.info kernel: [  121.114374] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:14:59 2016 kern.info kernel: [  121.117823] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
Sun Feb 28 23:14:59 2016 daemon.notice netifd: lan (5784): udhcpc (v1.23.2) started
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:14:59 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:14:59 2016 daemon.notice netifd: lan (5784): Sending discover...
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:14:59 2016 daemon.notice netifd: lan (5784): Sending select for 192.168.1.59...
Sun Feb 28 23:14:59 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:14:59 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:14:59 2016 daemon.notice netifd: lan (5784): Lease of 192.168.1.59 obtained, lease time 86400
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.notice netifd: Interface 'lan' is now up
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: reading /tmp/resolv.conf.auto
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: using local addresses only for domain lan
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: using nameserver 192.168.1.1#53
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:14:59 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:14:59 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:14:59 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:14:59 2016 user.notice root: NTP eager clock adjust failed.
Sun Feb 28 23:15:00 2016 daemon.info procd: - init complete -
Sun Feb 28 23:15:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:15:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:15:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:15:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:15:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:15:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:15:01 2016 kern.info kernel: [  123.114297] br-lan: port 1(eth1) entered forwarding state
Sun Feb 28 23:15:01 2016 kern.notice kernel: [  123.134824] eth2: 1000 Mbps Full duplex, port 2
Sun Feb 28 23:15:01 2016 daemon.notice netifd: Network device 'eth2' link is up
Sun Feb 28 23:15:01 2016 daemon.notice netifd: Interface 'wan6' has link connectivity
Sun Feb 28 23:15:01 2016 daemon.notice netifd: Interface 'wan6' is setting up now
Sun Feb 28 23:15:01 2016 kern.info kernel: [  123.159781] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
Sun Feb 28 23:15:01 2016 daemon.notice netifd: Interface 'wan6' is now up
Sun Feb 28 23:15:01 2016 user.notice ddns-scripts[5888]: myddns_ipv4: PID '5888' started at 2016-02-28 23:15
Sun Feb 28 23:15:01 2016 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sun Feb 28 23:15:01 2016 user.warn ddns-scripts[5888]: myddns_ipv4: Service section disabled! - TERMINATE
Sun Feb 28 23:15:01 2016 user.warn ddns-scripts[5888]: myddns_ipv4: PID '5888' exit WITH ERROR '1' at 2016-02-28 23:15
Sun Feb 28 23:15:01 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:15:01 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:15:05 2016 user.notice firewall: Reloading firewall due to ifup of wan6 (eth2)
Sun Feb 28 23:15:08 2016 user.notice ddns-scripts[6199]: myddns_ipv6: PID '6199' started at 2016-02-28 23:15
Sun Feb 28 23:15:08 2016 user.warn ddns-scripts[6199]: myddns_ipv6: Service section disabled! - TERMINATE
Sun Feb 28 23:15:08 2016 user.warn ddns-scripts[6199]: myddns_ipv6: PID '6199' exit WITH ERROR '1' at 2016-02-28 23:15
Sun Feb 28 23:15:12 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:15:12 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:15:12 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:15:12 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:15:15 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:15:15 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:15:32 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:15:32 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:15:42 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:15:42 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:15:42 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:15:42 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:15:48 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:15:48 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: [ Port Based Pattern Matching Memory ]
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: +- [ Aho-Corasick Summary ] -------------------------------------
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Storage Format    : Full
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Finite Automaton  : DFA
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Alphabet Size     : 256 Chars
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Sizeof State      : Variable (1,2,4 bytes)
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Instances         : 335
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     1 byte states : 228
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     2 byte states : 107
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     4 byte states : 0
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Characters        : 408795
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | States            : 252270
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Transitions       : 13611564
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | State Density     : 21.1%
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Patterns          : 34402
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Match States      : 30013
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: | Memory (MB)       : 134.67
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |   Patterns        : 3.40
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |   Match Lists     : 8.23
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |   DFA
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     1 byte states : 3.38
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     2 byte states : 119.41
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: |     4 byte states : 0.00
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: +----------------------------------------------------------------
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: [ Number of patterns truncated to 20 bytes: 5427 ]
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: afpacket DAQ configured to inline.
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Acquiring network traffic from "eth0:eth2".
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Initializing daemon mode
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Daemon initialized, signaled parent pid: 1
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Reload thread starting...
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Reload thread started, thread 0xffe850f210 (6476)
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Checking PID path...
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: PID path stat checked out ok, PID path set to /var/snort/
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Writing PID "4066" to file "/var/snort//snort_eth0:eth2.pid"
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:         --== Initialization Complete ==--
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:    ,,_     -*> Snort! <*-
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:   o"  )~   Version 2.9.7.2 GRE (Build 177)
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:    ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Copyright (C) 2014 Cisco and/or its affiliates. All rights reserved.
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Using libpcap version 1.5.3
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Using PCRE version: 8.36 2014-09-26
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Using ZLIB version: 1.2.8
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Rules Engine: SF_SNORT_DETECTION_ENGINE  Version 2.4  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_DNP3  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_MODBUS  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_IMAP  Version 1.0  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_SSLPP  Version 1.1  <Build 4>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_DNS  Version 1.1  <Build 4>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_SMTP  Version 1.1  <Build 9>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_FTPTELNET  Version 1.2  <Build 13>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_REPUTATION  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_SIP  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_GTP  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_SSH  Version 1.1  <Build 3>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_SDF  Version 1.1  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_DCERPC2  Version 1.0  <Build 3>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]:            Preprocessor Object: SF_POP  Version 1.0  <Build 1>
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Commencing packet processing (pid=4066)
Sun Feb 28 23:15:51 2016 daemon.notice snort[4066]: Decoding Ethernet
Sun Feb 28 23:15:51 2016 kern.info kernel: [  173.404288] device eth2 entered promiscuous mode
Sun Feb 28 23:15:51 2016 kern.info kernel: [  173.554285] device eth0 entered promiscuous mode
Sun Feb 28 23:16:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:16:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:16:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:16:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:16:06 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:16:06 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:16:14 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:16:14 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:16:15 2016 daemon.err uhttpd[5347]: cut: standard output: Broken pipe
Sun Feb 28 23:16:16 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:16 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:16 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:16 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:21 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:21 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:21 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:21 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:26 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:26 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:26 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:26 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:31 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:16:31 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:16:33 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:33 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:33 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:33 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:38 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:43 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:43 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:43 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:43 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:48 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:48 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:48 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:48 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:53 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:53 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:53 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:53 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:16:56 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:16:56 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:16:58 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:58 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:16:58 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:16:58 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:17:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:17:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:17:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:17:01 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:17:01 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:17:03 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:03 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:03 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:03 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:08 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:08 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:08 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:08 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:13 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:13 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:13 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:13 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:16 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:17:16 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:17:18 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:18 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:18 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:18 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:21 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:17:21 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:17:23 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:23 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:23 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:23 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:28 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:28 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:28 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:28 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:29 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:29 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:29 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:29 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:34 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:34 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:35 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:35 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:40 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:17:40 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:17:49 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:49 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:49 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:49 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:53 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:17:53 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:17:54 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:54 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:54 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:54 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:17:59 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:59 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:17:59 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:17:59 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:18:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:18:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:18:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:18:04 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:04 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:04 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:04 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:12 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:12 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:14 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:14 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:14 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:14 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:18 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:18 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:19 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:19 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:19 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:19 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:24 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:24 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:24 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:24 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:26 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:26 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:34 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:34 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:34 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:34 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:39 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:44 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:44 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:44 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:44 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:46 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:46 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:46 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:46 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:47 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:47 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:52 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:52 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:52 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:52 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:18:54 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:18:54 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:18:57 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:57 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:18:57 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:18:57 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:19:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:19:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:19:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:19:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:19:05 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:05 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:19:17 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:18 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:19:28 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:28 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:19:41 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:41 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:19:54 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:54 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:19:55 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:19:55 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:19:55 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:19:55 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:19:59 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:19:59 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:20:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:20:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:20:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:20:00 2016 cron.info crond[3193]:  job: 0 /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:20:00 2016 cron.info crond[8384]: child running /bin/sh
Sun Feb 28 23:20:00 2016 cron.info crond[3193]: USER root pid 8384 cmd /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: forwarded 0.us.pool.ntp.org to 192.168.1.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: query[A] 0.us.pool.ntp.org.lan from 127.0.0.1
Sun Feb 28 23:20:00 2016 daemon.info dnsmasq[5418]: config 0.us.pool.ntp.org.lan is NXDOMAIN
Sun Feb 28 23:20:00 2016 user.notice root: NTP 0.us.pool.ntp.org failed.
Sun Feb 28 23:20:00 2016 user.notice root: NTP eager clock adjust failed.
Sun Feb 28 23:20:00 2016 user.notice root: Restarted ntpclient. NTP server #1 of 4.
Sun Feb 28 23:20:05 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:05 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:05 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:05 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:10 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:20:10 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:20:10 2016 cron.info crond[3193]: wakeup dt=10
Sun Feb 28 23:20:10 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:10 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:10 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:10 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:13 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:20:13 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:20:14 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:14 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:14 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:14 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:19 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:19 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:19 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:19 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:24 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:24 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:24 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:24 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:26 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:20:26 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:20:29 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:29 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:29 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:29 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:34 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:34 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:34 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:34 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:39 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:39 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:39 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:39 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:40 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:20:40 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:20:44 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:44 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:44 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:44 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:45 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:45 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:45 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:45 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:50 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:50 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:50 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:50 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:20:55 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:00 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:00 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:21:00 2016 cron.info crond[3193]: user:root entry:(null)
Sun Feb 28 23:21:00 2016 cron.info crond[3193]: wakeup dt=50
Sun Feb 28 23:21:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:21:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:21:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:21:00 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:00 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:04 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:21:04 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:21:05 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:05 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:05 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:05 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:10 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:10 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:10 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:10 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:12 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:21:12 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:21:15 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:15 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:15 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:15 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:20 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:20 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:20 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:20 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:22 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:21:22 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:21:25 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:25 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:25 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:25 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:30 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:30 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:30 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:30 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:40 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:40 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:40 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:40 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:41 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:21:41 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:21:45 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:45 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:45 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:45 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:47 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:21:47 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:21:48 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:48 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:48 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:48 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:21:53 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:53 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:21:53 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:21:53 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:22:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:22:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:22:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:22:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:22:04 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:04 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:22:19 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:19 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:22:29 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:29 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:22:45 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:45 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:22:50 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:50 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:22:58 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:22:58 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:23:00 2016 cron.info crond[3193]: wakeup dt=60
Sun Feb 28 23:23:00 2016 cron.info crond[3193]: file root:
Sun Feb 28 23:23:00 2016 cron.info crond[3193]:  line sh /sbin/fw_upgrade
Sun Feb 28 23:23:00 2016 cron.info crond[3193]:  line /usr/sbin/ntpclient -s -p 123 -h 0.us.pool.ntp.org || /etc/init.d/ntpclient restart
Sun Feb 28 23:23:14 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:23:14 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:23:27 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:27 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:23:27 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:27 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:23:28 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:23:28 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:23:33 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:33 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:23:33 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:33 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] upgrade.meshare.com from 192.168.1.118
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: forwarded upgrade.meshare.com to 192.168.1.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:37 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
Sun Feb 28 23:23:41 2016 daemon.info dnsmasq[5418]: query[A] openapi.meshare.com from 192.168.1.118
Sun Feb 28 23:23:41 2016 daemon.info dnsmasq[5418]: forwarded openapi.meshare.com to 192.168.1.1
Sun Feb 28 23:23:42 2016 daemon.info dnsmasq[5418]: query[A] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:42 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is 192.168.1.112
Sun Feb 28 23:23:42 2016 daemon.info dnsmasq[5418]: query[AAAA] yourhost.example.com from 127.0.0.1
Sun Feb 28 23:23:42 2016 daemon.info dnsmasq[5418]: config yourhost.example.com is NODATA-IPv6
 

 --------------------------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------


Kernel Log

[    0.000000] Linux version 3.10.20 (daniel@Ayoub) (gcc version 4.7.0 (Cavium Inc. Version: SDK_3_1_0_p2 build 34) ) #165 SMP Mon May 18 23:41:17 PDT 2015
[    0.000000] CVMSEG size: 2 cache lines (256 bytes)
[    0.000000] Cavium Inc. SDK-3.1
[    0.000000] bootconsole [early0] enabled
[    0.000000] CPU revision is: 000d9602 (Cavium Octeon III)
[    0.000000] FPU revision is: 00739600
[    0.000000] Checking for the multiply/shift bug... no.
[    0.000000] Checking for the daddiu bug... no.
[    0.000000] Determined physical RAM map:
[    0.000000]  memory: 000000000c800000 @ 0000000002500000 (usable)
[    0.000000]  memory: 0000000000c00000 @ 000000000f200000 (usable)
[    0.000000]  memory: 000000002f000000 @ 0000000020000000 (usable)
[    0.000000]  memory: 0000000000830000 @ 0000000000100000 (usable)
[    0.000000]  memory: 0000000001a00000 @ 0000000000930000 (usable after init)
[    0.000000] Wasting 896 bytes for tracking 16 unused pages
[    0.000000] Initrd not found or empty - disabling initrd
[    0.000000] Using passed Device Tree <8000000000080000>.
[    0.000000] software IO TLB [mem 0x02670000-0x026b0000] (0MB) mapped at [8000000002670000-80000000026affff]
[    0.000000] Zone ranges:
[    0.000000]   DMA32    [mem 0x00100000-0xefffffff]
[    0.000000]   Normal   empty
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x00100000-0x0232ffff]
[    0.000000]   node   0: [mem 0x02500000-0x0ecfffff]
[    0.000000]   node   0: [mem 0x0f200000-0x0fdfffff]
[    0.000000]   node   0: [mem 0x20000000-0x4effffff]
[    0.000000] On node 0 totalpages: 15971
[    0.000000]   DMA32 zone: 14 pages used for memmap
[    0.000000]   DMA32 zone: 0 pages reserved
[    0.000000]   DMA32 zone: 15971 pages, LIFO batch:1
[    0.000000] Cavium Hotplug: Available coremask 0x0
[    0.000000] Primary instruction cache 78kB, virtually tagged, 39 way, 16 sets, linesize 128 bytes.
[    0.000000] Primary data cache 32kB, 32-way, 8 sets, linesize 128 bytes.
[    0.000000] Secondary unified cache 512kB, 4-way, 1024 sets, linesize 128 bytes.
[    0.000000] PERCPU: Embedded 1 pages/cpu @8000000002710000 s12544 r8192 d44800 u65536
[    0.000000] pcpu-alloc: s12544 r8192 d44800 u65536 alloc=1*65536
[    0.000000] pcpu-alloc: [0] 0 [0] 1
[    0.000000] Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 15957
[    0.000000] Kernel command line:  bootoctlinux 0x20000000 numcores=2 serial#=752011191521-36287 console=ttyS0,115200
[    0.000000] PID hash table entries: 4096 (order: -1, 32768 bytes)
[    0.000000] Dentry cache hash table entries: 131072 (order: 4, 1048576 bytes)
[    0.000000] Inode-cache hash table entries: 65536 (order: 3, 524288 bytes)
[    0.000000] Memory: 983296k/1022144k available (5825k kernel code, 38848k reserved, 2536k data, 26624k init, 0k highmem)
[    0.000000] Hierarchical RCU implementation.
[    0.000000] RCU restricting CPUs from NR_CPUS=32 to nr_cpu_ids=2.
[    0.000000] NR_IRQS:512
[    0.000000] CIB interrupt controller probed: 800107000000e000 23 bits
[    0.000000] CIB interrupt controller probed: 800107000000e200 12 bits
[    0.000000] CIB interrupt controller probed: 800107000000e400 6 bits
[    0.000000] CIB interrupt controller probed: 800107000000ec00 15 bits
[    0.000000] CIB interrupt controller probed: 800107000000e600 4 bits
[    0.000000] CIB interrupt controller probed: 800107000000e800 11 bits
[    0.000000] CIB interrupt controller probed: 800107000000e900 11 bits
[   22.523596] Calibrating delay loop (skipped) preset value.. 2000.00 BogoMIPS (lpj=10000000)
[   22.531809] pid_max: default: 32768 minimum: 501
[   22.536525] Security Framework initialized
[   22.540542] Mount-cache hash table entries: 4096
[   22.546796] Checking for the daddi bug... no.
[   22.547585] SMP: Booting CPU01 (CoreId  1)...
[   22.551787] CPU revision is: 000d9602 (Cavium Octeon III)
[   22.551790] FPU revision is: 00739600
[   22.551973] Cpu 1 online
[   22.563388] Brought up 2 CPUs
[   22.566333] Cavium Hotplug: Available coremask 0x0
[   22.573324] NET: Registered protocol family 16
[   22.578737] Installing handlers for error tree at: ffffffff808be430
[   22.596255] PCIe: Initializing port 0
[   24.658791] PCIe: Link timeout on port 0, probably the slot is empty
[   24.658797] PCIe: Initializing port 1
[   24.662293] PCIe: Port 1 not in PCIe mode, skipping
[   24.662298] PCIe: Initializing port 2
[   24.665940] PCIe: Port 2 not in PCIe mode, skipping
[   24.672308] [sched_delayed] sched: RT throttling activated
[   24.685629] bio: create slab <bio-0> at 0
[   24.690049] vgaarb: loaded
[   24.692979] SCSI subsystem initialized
[   24.696828] libata version 3.00 loaded.
[   24.697246] usbcore: registered new interface driver usbfs
[   24.702679] usbcore: registered new interface driver hub
[   24.707975] usbcore: registered new device driver usb
[   24.713126] pps_core: LinuxPPS API ver. 1 registered
[   24.717923] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[   24.727148] PTP clock support registered
[   24.731024] EDAC MC: Ver: 3.0.0
[   24.734703] PCI host bridge to bus 0000:00
[   24.738660] pci_bus 0000:00: root bus resource [mem 0x1000000000000]
[   24.744982] pci_bus 0000:00: root bus resource [io  0x0000]
[   24.750550] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
[   24.758477] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
[   24.759427] Switching to clocksource OCTEON_CVMCOUNT
[   24.765699] NET: Registered protocol family 2
[   24.770342] TCP established hash table entries: 8192 (order: 1, 131072 bytes)
[   24.777460] TCP bind hash table entries: 8192 (order: 1, 131072 bytes)
[   24.783949] TCP: Hash tables configured (established 8192 bind 8192)
[   24.790218] TCP: reno registered
[   24.793399] UDP hash table entries: 2048 (order: 0, 65536 bytes)
[   24.799486] UDP-Lite hash table entries: 2048 (order: 0, 65536 bytes)
[   24.806142] NET: Registered protocol family 1
[   24.810347] PCI: CLS 0 bytes, default 128
[   26.398881] octeon_pci_console: Console not created.
[   26.403684] /proc/octeon_perf: Octeon performance counter interface loaded
[   26.412543] HugeTLB registered 512 MB page size, pre-allocated 0 pages
[   26.420262] sys_fw_version: 0.1.17
[   26.420275] sys_revision: 21
[   26.420632] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[   26.426568] NTFS driver 2.1.30 [Flags: R/W].
[   26.430697] jffs2: version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
[   26.436831] msgmni has been set to 1920
[   26.441572] Key type asymmetric registered
[   26.445558] Asymmetric key parser 'x509' registered
[   26.450382] io scheduler noop registered
[   26.454297] io scheduler deadline registered
[   26.458559] io scheduler cfq registered (default)
[   26.463488] octeon_gpio 1070000000800.gpio-controller: OCTEON GPIO
[   26.519297] Serial: 8250/16550 driver, 6 ports, IRQ sharing disabled
[   26.528951] 1180000000800.serial: ttyS0 at MMIO 0x1180000000800 (irq = 34) is a OCTEON
[   26.536741] console [ttyS0] enabled, bootconsole disabled
[   26.560284] 1180000000c00.serial: ttyS1 at MMIO 0x1180000000c00 (irq = 35) is a OCTEON
[   26.582421] brd: module loaded
[   26.600915] loop: module loaded
[   26.617766] slram: not enough parameters.
[   26.642093] IMQ driver loaded successfully. (numdevs = 16, numqueues = 1)
[   26.661176] Hooking IMQ after NAT on PREROUTING.
[   26.678148] Hooking IMQ before NAT on POSTROUTING.
[   26.697506] libphy: mdio-octeon: probed
[   26.714970] mdio-octeon 1180000001800.mdio: Version 1.0
[   26.732603] spi_ks8995: Micrel KS8995 Ethernet switch SPI driver version 0.1.1
[   26.753104] e1000e: Intel(R) PRO/1000 Network Driver - 2.3.2-k
[   26.771237] e1000e: Copyright(c) 1999 - 2013 Intel Corporation.
[   26.789690] octeon-pow-ethernet ERROR: You must specify a broadcast group mask.
[   26.809339] octeon-ethernet 2.0
[   26.826338] Interface 0 has 4 ports (QSGMII)
[   26.826416] Interface 1 has 4 ports (QSGMII)
[   26.826423] Interface 2 has 4 ports (NPI)
[   26.826437] Interface 3 has 4 ports (LOOP)
[   26.826454] Interface 4 has 1 ports (AGL)
[   26.835008] usbcore: registered new interface driver cdc_ether
[   26.853149] usbcore: registered new interface driver plusb
[   26.871031] usbcore: registered new interface driver sierra_net
[   26.889822] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[   26.908628] ehci-pci: EHCI PCI platform driver
[   26.925370] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[   26.944400] usbcore: registered new interface driver usb-storage
[   26.962830] usbcore: registered new interface driver usbserial
[   26.980902] usbcore: registered new interface driver usbserial_generic
[   26.999657] usbserial: USB Serial support registered for generic
[   27.017933] usbcore: registered new interface driver sierra
[   27.035730] usbserial: USB Serial support registered for Sierra USB modem
[   27.054959] i2c /dev entries driver
[   27.071060] i2c-octeon 1180000001000.i2c: version 2.5
[   27.089094] octeon_wdt: Initial granularity 5 Sec
[   27.106203] EDAC DEVICE0: Giving out device to module 'octeon-cpu' controller 'cache': DEV 'octeon_pc_edac' (INTERRUPT)
[   27.129339] EDAC DEVICE1: Giving out device to module 'octeon-l2c' controller 'octeon_l2c_err': DEV 'octeon_l2c_edac' (POLLED)
[   27.152998] octeon_lmc_edac octeon_lmc_edac.0: Disabled (ECC not enabled)
[   29.774461] Netfilter messages via NETLINK v0.30.
[   29.791302] nfnl_acct: registering with nfnetlink.
[   29.808266] nf_conntrack version 0.5.0 (7682 buckets, 30728 max)
[   29.826704] ctnetlink v0.93: registering with nfnetlink.
[   29.844539] xt_time: kernel timezone is -0000
[   29.861031] ip_set: protocol 6
[   29.876330] ipip: IPv4 over IPv4 tunneling driver
[   29.893680] gre: GRE over IPv4 demultiplexor driver
[   29.910704] ip_gre: GRE over IPv4 tunneling driver
[   29.928905] ip_tables: (C) 2000-2006 Netfilter Core Team
[   29.946545] ipt_CLUSTERIP: ClusterIP Version 0.8 loaded successfully
[   29.965077] arp_tables: (C) 2002 David S. Miller
[   29.981870] TCP: cubic registered
[   29.997310] Initializing XFRM netlink socket
[   30.013754] NET: Registered protocol family 10
[   30.033547] mip6: Mobile IPv6
[   30.048686] ip6_tables: (C) 2000-2006 Netfilter Core Team
[   30.066501] sit: IPv6 over IPv4 tunneling driver
[   30.084597] ip6_gre: GRE over IPv6 tunneling driver
[   30.102261] NET: Registered protocol family 17
[   30.118867] NET: Registered protocol family 15
[   30.135531] Bridge firewalling registered
[   30.151681] Ebtables v2.0 registered
[   30.214298] 8021q: 802.1Q VLAN Support v1.8
[   30.230672] Key type dns_resolver registered
[   30.247206] L2 lock: TLB refill 256 bytes
[   30.263342] L2 lock: General exception 128 bytes
[   30.280083] L2 lock: low-level interrupt 128 bytes
[   30.296994] L2 lock: interrupt 640 bytes
[   30.313044] L2 lock: memcpy 1152 bytes
[   30.330934] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
[   30.355657] Freeing unused kernel memory: 26624K (ffffffff80930000 - ffffffff82330000)
[   46.807914] mmc1: BKOPS_EN bit is not set
[   46.828613] mmc1: new high speed DDR MMC card at address 0001
[   46.847085] mmcblk0: mmc1:0001 P1XXXX 3.60 GiB
[   46.864065] mmcblk0boot0: mmc1:0001 P1XXXX partition 1 2.00 MiB
[   46.882432] mmcblk0boot1: mmc1:0001 P1XXXX partition 2 2.00 MiB
[   46.900799] mmcblk0rpmb: mmc1:0001 P1XXXX partition 3 128 KiB
[   46.922749]  mmcblk0: p1 p2 p3 p4
[   46.943594]  mmcblk0boot1: unknown partition table
[   46.965107]  mmcblk0boot0: unknown partition table
[   47.633372] kjournald starting.  Commit interval 5 seconds
[   47.652050] EXT3-fs (mmcblk0p4): using internal journal
[   47.670324] EXT3-fs (mmcblk0p4): recovery complete
[   47.687388] EXT3-fs (mmcblk0p4): mounted filesystem with writeback data mode
[   47.923225] init: failed to symlink /tmp -> /var
[   47.940296] init: Console is alive
[   47.956178] init: - watchdog -
[   48.972341] init: - preinit -
[   52.171844] mount_root: mounting /dev/root
[   52.188789] mount_root: loading kmods from internal overlay
[   52.318233] block: attempting to load /etc/config/fstab
[   52.337726] block: extroot: not configured
[   52.358585] procd: - early -
[   52.373926] procd: - watchdog -
[   53.090601] procd: - ubus -
[   54.106270] procd: - init -
[   55.826164] NET: Registered protocol family 38
[   55.849489] tun: Universal TUN/TAP device driver, 1.6
[   55.866835] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[   55.894824] u32 classifier
[   55.909709]     input device check on
[   55.925499]     Actions configured
[   55.942165] Mirror/redirect action on
[   55.966737] PPP generic driver version 2.4.2
[   55.984117] NET: Registered protocol family 24
[   58.021469] SGMII0: Port 1 link timeout
[   58.021717] eth1: 1000 Mbps Full duplex, port 1
[   58.021791] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[   58.022530] device eth1 entered promiscuous mode
[   58.025041] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[   58.052376] eth0: 1000 Mbps Full duplex, port 0
[   58.052466] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[   58.080471] eth2: 1000 Mbps Full duplex, port 2
[   58.080575] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[   58.994691] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[   58.994754] br-lan: port 1(eth1) entered forwarding state
[   58.994775] br-lan: port 1(eth1) entered forwarding state
[   58.994825] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   59.024490] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   59.054527] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[   60.994282] br-lan: port 1(eth1) entered forwarding state
[   62.348018] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
[   65.254179] eth0: Link down
[   65.281843] br-lan: port 1(eth1) entered disabled state
[   65.283161] device eth1 left promiscuous mode
[   65.283182] br-lan: port 1(eth1) entered disabled state
[   65.303161] eth1: Link down
[   65.304050] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[   65.394884] eth2: Link down
[   66.986187] eth1: 1000 Mbps Full duplex, port 1
[   66.987074] device eth1 entered promiscuous mode
[   66.989050] br-lan: port 1(eth1) entered forwarding state
[   66.989083] br-lan: port 1(eth1) entered forwarding state
[   67.035821] eth0: 1000 Mbps Full duplex, port 0
[   67.057355] eth2: 1000 Mbps Full duplex, port 2
[   68.054129] eth2: Link down
[   68.984301] br-lan: port 1(eth1) entered forwarding state
[   79.054086] eth0: Link down
[   80.067354] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[   82.014029] eth1: Link down
[   83.004476] br-lan: port 1(eth1) entered disabled state
[   83.094405] eth0: 1000 Mbps Full duplex, port 0
[   83.094571] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   86.024373] eth1: 1000 Mbps Full duplex, port 1
[   86.024438] br-lan: port 1(eth1) entered forwarding state
[   86.024474] br-lan: port 1(eth1) entered forwarding state
[   87.048897] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[   88.024294] br-lan: port 1(eth1) entered forwarding state
[   89.064370] eth2: 1000 Mbps Full duplex, port 2
[   89.064427] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  115.144176] eth0: Link down
[  116.138543] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[  118.074038] eth1: Link down
[  119.074474] br-lan: port 1(eth1) entered disabled state
[  119.154493] eth0: 1000 Mbps Full duplex, port 0
[  119.154520] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[  120.084086] eth2: Link down
[  121.094426] eth1: 1000 Mbps Full duplex, port 1
[  121.114331] br-lan: port 1(eth1) entered forwarding state
[  121.114374] br-lan: port 1(eth1) entered forwarding state
[  121.117823] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[  123.114297] br-lan: port 1(eth1) entered forwarding state
[  123.134824] eth2: 1000 Mbps Full duplex, port 2
[  123.159781] IPv6: ADDRCONF(NETDEV_CHANGE): eth2: link becomes ready
[  173.404288] device eth2 entered promiscuous mode
[  173.554285] device eth0 entered promiscuous mode
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

breda
In reply to this post by breda
thanks  for the help
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

amateur user
I am having the same problem as breda. any help greatly appreciated
Reply | Threaded
Open this post in threaded view
|

Re: bridge mode not working

Gnomad
In reply to this post by hans2
In Router mode I spotted some of the same errors you mention here:
...
Mon Mar  7 10:13:10 2016 kern.err kernel: [   32.580766] drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
...
Mon Mar  7 10:13:10 2016 kern.info kernel: [   50.855697] EXT3-fs (mmcblk0p2): mounted filesystem with writeback data mode
Mon Mar  7 10:13:10 2016 user.err kernel: [   51.112977] init: failed to symlink /tmp -> /var
...
Mon Mar  7 10:13:10 2016 kern.err kernel: [   29.911354] octeon-pow-ethernet ERROR: You must specify a broadcast group mask.
...

Tried what you suggested by editing /etc/config/network to fix the last one of these, but did not resolve the error (after clearing the log and a reboot)
...
config interface 'lan'
	option ifname 'eth1 eth2'
	option force_link '1'
	option type 'bridge'
	option proto 'static'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option ipaddr '10.10.10.10'
	option auto '1'
	option enabled '1'
	option broadcast '10.10.10.255'
Any thoughts why that might not be picked up correctly?  
Might just add
uci set network.lan.broadcast=10.10.10.255
 to startup for now, then assume it's safe to ignore the error..
OpenWrt SNAPSHOT, r10391-3d8d528939