Mar 2 12:35:21 acsd: eth6: selected_chspec is 0x1003 Mar 2 12:35:21 acsd: eth6: Adjusted channel spec: 0x1003 Mar 2 12:35:21 acsd: eth6: selected channel spec: 0x1003 Mar 2 12:48:17 dnsmasq-dhcp[1524]: DHCPREQUEST(br0) 192.168.50.20 58:fd:b1:59:69:08 Mar 2 12:48:17 dnsmasq-dhcp[1524]: DHCPACK(br0) 192.168.50.20 58:fd:b1:59:69:08 LGwebOSTV Mar 2 13:03:16 dnsmasq-dhcp[1524]: DHCPREQUEST(br0) 192.168.50.247 00:09:b0:ef:14:8a Mar 2 13:03:16 dnsmasq-dhcp[1524]: DHCPACK(br0) 192.168.50.247 00:09:b0:ef:14:8a Pioneer-VSX-832-EF148A Mar 2 13:12:42 ovpn-client3[9341]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 2 13:12:42 ovpn-client3[9341]: VERIFY KU OK Mar 2 13:12:42 ovpn-client3[9341]: Validating certificate extended key usage Mar 2 13:12:42 ovpn-client3[9341]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 2 13:12:42 ovpn-client3[9341]: VERIFY EKU OK Mar 2 13:12:42 ovpn-client3[9341]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org Mar 2 13:12:42 ovpn-client3[9341]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 2 13:12:42 ovpn-client3[9341]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 2 13:12:42 ovpn-client3[9341]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Mar 2 13:18:51 acsd: acs_set_chspec: 0x1002 (2) for reason APCS_CSTIMER Mar 2 13:18:51 acsd: eth6: selected_chspec is 0x1002 Mar 2 13:18:51 acsd: eth6: Adjusted channel spec: 0x1002 Mar 2 13:18:51 acsd: eth6: selected channel spec: 0x1002 Mar 2 13:21:20 rc_service: httpd 1533:notify_rc restart_vpnrouting0 Mar 2 13:21:20 vpndirector: Routing steelcurtain77 from 192.168.50.42 to any through ovpnc3 Mar 2 13:21:20 vpndirector: Routing JUICE from 192.168.1.172 to any through ovpnc3 Mar 2 13:21:20 vpndirector: Routing JUICE2 from 192.168.1.128 to any through ovpnc3 Mar 2 13:21:20 openvpn: Forcing 192.168.50.42 to use DNS server 10.23.94.1 for OVPNC3 Mar 2 13:21:20 openvpn: Forcing 192.168.50.172 to use DNS server 10.23.94.1 for OVPNC3 Mar 2 13:21:20 openvpn: Forcing 192.168.50.246 to use DNS server 10.23.94.1 for OVPNC3 Mar 2 13:21:20 vpndirector: Routing STEELCURTAIN33 from 192.168.50.28 to any through ovpnc1 Mar 2 13:33:38 dnsmasq-dhcp[1524]: DHCPREQUEST(br0) 192.168.50.137 a4:2b:8c:06:70:15 Mar 2 13:33:38 dnsmasq-dhcp[1524]: DHCPACK(br0) 192.168.50.137 a4:2b:8c:06:70:15 Mar 2 13:52:18 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER Mar 2 13:52:18 acsd: eth6: selected_chspec is 0x1004 Mar 2 13:52:18 acsd: eth6: Adjusted channel spec: 0x1004 Mar 2 13:52:18 acsd: eth6: selected channel spec: 0x1004 Mar 2 14:10:00 ovpn-client3[9341]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 2 14:10:00 ovpn-client3[9341]: VERIFY KU OK Mar 2 14:10:00 ovpn-client3[9341]: Validating certificate extended key usage Mar 2 14:10:00 ovpn-client3[9341]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 2 14:10:00 ovpn-client3[9341]: VERIFY EKU OK Mar 2 14:10:00 ovpn-client3[9341]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org Mar 2 14:10:00 ovpn-client3[9341]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 2 14:10:00 ovpn-client3[9341]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 2 14:10:00 ovpn-client3[9341]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Mar 2 14:25:46 acsd: acs_set_chspec: 0x1002 (2) for reason APCS_CSTIMER Mar 2 14:25:46 acsd: eth6: selected_chspec is 0x1002 Mar 2 14:25:46 acsd: eth6: Adjusted channel spec: 0x1002 Mar 2 14:25:46 acsd: eth6: selected channel spec: 0x1002