Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTTPS-DNS-Proxy not starting properly after reboot #25797

Open
ob45 opened this issue Jan 20, 2025 · 33 comments
Open

HTTPS-DNS-Proxy not starting properly after reboot #25797

ob45 opened this issue Jan 20, 2025 · 33 comments

Comments

@ob45
Copy link

ob45 commented Jan 20, 2025

Describe the bug

After restarting the router the HTTPS-DNS-Proxy service does not start and work properly despite it being set to "Enabled".

It does show up as "Enabled" and the service appears to be running but the service does not actually work.

I have to manually press the button "Restart" to make it run.

It is not possible that this is a RAM issue because enough RAM is available.

Image

Steps to reproduce

  1. Install HTTPS-DNS-Proxy
  2. Configure the https-DNS servers in the service tab
  3. Restart the router
  4. Look at the HTTPS DNS Proxy tab and check the U.I
  5. Check if HTTPS over DNS is working (it is not)

I've tried waiting up to half an hour after the restart because "maybe it just takes some time" but the only thing which actually makes it work is restarting the service manually - after which all blocked sites become accessible.

Actual behaviour

The service appears to be running in the U.I but is extremely buggy.
I have to manually restart the service after restarting the router because the service does not automatically start properly.

Stopping the service can lead to nothing happening and the U.I keep showing that it is running.

Image

Expected behaviour

The service should start and work automatically after a router restart and route all DNS requests to the configured DNS servers and use DNS over HTTPS when the service is set as "Enabled".

The U.I should show th ecorrect status of the service.

Additional info

This is my device and formware:

  • Device: Xiaomi Mi Router 4A (100M International Edition V2)
  • OpenWrt Version: r28304-6dacba30a7
  • OpenWrt release: 24.10.0-rc5
  • OpenWrt target/subtarget: ramips/mt76x8

This is a 64MB device but as shown in the screenshot enough RAM is available.

For me it is quite easy to check if it works or not because my ISP DNS blocks certain sites, which I cannot access without using DNS over HTTPS so I can just try to hit the site after a router restart and easily check it that way too.

I'm unsure if I am encountering the same issue like #23469 because it seems to be similar but in my case something gets loaded, just not the entire config.

During normal operation:

root@OpenWrt:~# uci show dhcp.@dnsmasq[0].server
dhcp.cfg01411c.server='127.0.0.1#5053' '127.0.0.1#5054' '/mask.icloud.com/' '/mask-h2.icloud.com/' '/use-application-dns.net/' '127.0.0.1#5050' '127.0.0.1#5051' '127.0.0.1#5052'

After a reboot:

root@OpenWrt:~# uci show dhcp.@dnsmasq[0].server
dhcp.cfg01411c.server='127.0.0.1#5053' '127.0.0.1#5054' '/mask.icloud.com/' '/mask-h2.icloud.com/' '/use-application-dns.net/'

Looks like something gets loaded but not the entire / my config.

After restarting the service it looks normal again:

root@OpenWrt:~# uci show dhcp.@dnsmasq[0].server
dhcp.cfg01411c.server='127.0.0.1#5053' '127.0.0.1#5054' '/mask.icloud.com/' '/mask-h2.icloud.com/' '/use-application-dns.net/' '127.0.0.1#5050' '127.0.0.1#5051' '127.0.0.1#5052'

Idk what to make of this. The op in #23469 did say he got nothing at all... meanwhile I do get something but not my entire valid config and I have to manually restart the service each time after reboot.

@stangri
Copy link
Member

stangri commented Jan 20, 2025

@ob45
Copy link
Author

ob45 commented Jan 21, 2025

@ob45: https://docs.openwrt.melmac.net/https-dns-proxy/#GettingHelp

After device restart:

root@OpenWrt:~# ubus call system board
{
        "kernel": "6.6.69",
        "hostname": "OpenWrt",
        "system": "MediaTek MT7628AN ver:1 eco:2",
        "model": "Xiaomi Mi Router 4A (100M International Edition V2)",
        "board_name": "xiaomi,mi-router-4a-100m-intl-v2",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.0-rc5",
                "revision": "r28304-6dacba30a7",
                "target": "ramips/mt76x8",
                "description": "OpenWrt 24.10.0-rc5 r28304-6dacba30a7",
                "builddate": "1736026537"
        }
}
root@OpenWrt:~# curl -V
curl 8.10.1 (mipsel-openwrt-linux-gnu) libcurl/8.10.1 mbedTLS/3.6.2 nghttp2/1.63.0
Release-Date: 2024-09-18
Protocols: file ftp ftps http https ipfs ipns mqtt
Features: alt-svc HSTS HTTP2 HTTPS-proxy IPv6 Largefile SSL threadsafe UnixSockets
root@OpenWrt:~# dnsmasq --version
Dnsmasq version 2.90  Copyright (c) 2000-2024 Simon Kelley
Compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile

This software comes with ABSOLUTELY NO WARRANTY.
Dnsmasq is free software, and you are welcome to redistribute it
under the terms of the GNU General Public License, version 2 or 3.
root@OpenWrt:~# https-dns-proxy -V
2023.12.26-1
root@OpenWrt:~# uci export dhcp
package dhcp

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option cachesize '1000'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'
        option ednspacket_max '1232'
        option filter_aaaa '0'
        option filter_a '0'
        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

root@OpenWrt:~# uci export network
package network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd3c:c7ad:bedc::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'eth0.1'
        option macaddr '00:20:91:FE:66:10'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option delegate '0'

config device
        option name 'eth0.2'
        option macaddr '00:20:91:FE:66:11'

config interface 'wan'
        option device 'eth0.2'
        option proto 'dhcp'
        option delegate '0'
        option hostname 'OpenWrt'

config interface 'wan6'
        option device 'eth0.2'
        option proto 'dhcpv6'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '4 2 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '0 6t'

root@OpenWrt:~# uci export https-dns-proxy
package https-dns-proxy

config main 'config'
        option canary_domains_icloud '1'
        option canary_domains_mozilla '1'
        option dnsmasq_config_update '*'
        option force_dns '1'
        list force_dns_port '53'
        list force_dns_port '853'
        option procd_trigger_wan6 '0'

config https-dns-proxy
        option resolver_url 'https://208.67.220.220/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5050'
        option user 'nobody'
        option group 'nogroup'

config https-dns-proxy
        option resolver_url 'https://45.11.45.11/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5051'
        option user 'nobody'
        option group 'nogroup'

config https-dns-proxy
        option resolver_url 'https://208.67.222.222/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5052'
        option user 'nobody'
        option group 'nogroup'

root@OpenWrt:~# service https-dns-proxy status
running
root@OpenWrt:~# service https-dns-proxy info
{
        "https-dns-proxy": {
                "instances": {
                        "instance1": {
                                "running": true,
                                "pid": 2777,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://208.67.220.220/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5050",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "firewall": [
                                                {
                                                        "type": "redirect",
                                                        "target": "DNAT",
                                                        "src": "lan",
                                                        "proto": "tcp udp",
                                                        "src_dport": "53",
                                                        "dest_port": "53",
                                                        "family": "any",
                                                        "reflection": false
                                                },
                                                {
                                                        "type": "rule",
                                                        "src": "lan",
                                                        "dest": "*",
                                                        "proto": "tcp udp",
                                                        "dest_port": "853",
                                                        "target": "REJECT"
                                                }
                                        ],
                                        "mdns": {
                                                "https-dns-proxy_5053": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5053,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        },
                        "instance2": {
                                "running": true,
                                "pid": 2778,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://45.11.45.11/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5051",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "mdns": {
                                                "https-dns-proxy_5054": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5054,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        },
                        "instance3": {
                                "running": true,
                                "pid": 2779,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://208.67.222.222/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5052",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "mdns": {
                                                "https-dns-proxy_5055": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5055,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        }
                },
                "triggers": [
                        [
                                "interface.*.up",
                                [
                                        [
                                                "run_script",
                                                "/etc/init.d/https-dns-proxy",
                                                "restart",
                                                "on_interface_up"
                                        ]
                                ],
                                3000
                        ],
                        [
                                "config.change",
                                [
                                        "if",
                                        [
                                                "eq",
                                                "package",
                                                "https-dns-proxy"
                                        ],
                                        [
                                                "run_script",
                                                "/etc/init.d/https-dns-proxy",
                                                "reload",
                                                "on_config_change"
                                        ]
                                ],
                                1000
                        ]
                ]
        }
}
root@OpenWrt:~# nslookup google.com 127.0.0.1:5053
nslookup: write to '127.0.0.1:5053': Connection refused
;; connection timed out; no servers could be reached

After restarting the service again:

root@OpenWrt:~# ubus call system board
{
        "kernel": "6.6.69",
        "hostname": "OpenWrt",
        "system": "MediaTek MT7628AN ver:1 eco:2",
        "model": "Xiaomi Mi Router 4A (100M International Edition V2)",
        "board_name": "xiaomi,mi-router-4a-100m-intl-v2",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.0-rc5",
                "revision": "r28304-6dacba30a7",
                "target": "ramips/mt76x8",
                "description": "OpenWrt 24.10.0-rc5 r28304-6dacba30a7",
                "builddate": "1736026537"
        }
}
root@OpenWrt:~# curl -V
curl 8.10.1 (mipsel-openwrt-linux-gnu) libcurl/8.10.1 mbedTLS/3.6.2 nghttp2/1.63.0
Release-Date: 2024-09-18
Protocols: file ftp ftps http https ipfs ipns mqtt
Features: alt-svc HSTS HTTP2 HTTPS-proxy IPv6 Largefile SSL threadsafe UnixSockets
root@OpenWrt:~# dnsmasq --version
Dnsmasq version 2.90  Copyright (c) 2000-2024 Simon Kelley
Compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile

This software comes with ABSOLUTELY NO WARRANTY.
Dnsmasq is free software, and you are welcome to redistribute it
under the terms of the GNU General Public License, version 2 or 3.
root@OpenWrt:~# https-dns-proxy -V
2023.12.26-1
root@OpenWrt:~# uci export dhcp
package dhcp

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option cachesize '1000'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'
        option ednspacket_max '1232'
        option filter_aaaa '0'
        option filter_a '0'
        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'
        list server '127.0.0.1#5050'
        list server '127.0.0.1#5051'
        list server '127.0.0.1#5052'
        option doh_backup_noresolv '-1'
        option noresolv '1'
        list doh_backup_server '127.0.0.1#5053'
        list doh_backup_server '127.0.0.1#5054'
        list doh_backup_server '/mask.icloud.com/'
        list doh_backup_server '/mask-h2.icloud.com/'
        list doh_backup_server '/use-application-dns.net/'
        list doh_server '127.0.0.1#5050'
        list doh_server '127.0.0.1#5051'
        list doh_server '127.0.0.1#5052'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

root@OpenWrt:~# uci export network
package network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd3c:c7ad:bedc::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'eth0.1'
        option macaddr '00:20:91:FE:66:10'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option delegate '0'

config device
        option name 'eth0.2'
        option macaddr '00:20:91:FE:66:11'

config interface 'wan'
        option device 'eth0.2'
        option proto 'dhcp'
        option delegate '0'
        option hostname 'OpenWrt'

config interface 'wan6'
        option device 'eth0.2'
        option proto 'dhcpv6'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '4 2 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '0 6t'

root@OpenWrt:~# uci export https-dns-proxy
package https-dns-proxy

config main 'config'
        option canary_domains_icloud '1'
        option canary_domains_mozilla '1'
        option dnsmasq_config_update '*'
        option force_dns '1'
        list force_dns_port '53'
        list force_dns_port '853'
        option procd_trigger_wan6 '0'

config https-dns-proxy
        option resolver_url 'https://208.67.220.220/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5050'
        option user 'nobody'
        option group 'nogroup'

config https-dns-proxy
        option resolver_url 'https://45.11.45.11/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5051'
        option user 'nobody'
        option group 'nogroup'

config https-dns-proxy
        option resolver_url 'https://208.67.222.222/dns-query'
        option listen_addr '127.0.0.1'
        option listen_port '5052'
        option user 'nobody'
        option group 'nogroup'

root@OpenWrt:~# service https-dns-proxy status
running
root@OpenWrt:~# service https-dns-proxy info
{
        "https-dns-proxy": {
                "instances": {
                        "instance1": {
                                "running": true,
                                "pid": 4968,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://208.67.220.220/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5050",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "firewall": [
                                                {
                                                        "type": "redirect",
                                                        "target": "DNAT",
                                                        "src": "lan",
                                                        "proto": "tcp udp",
                                                        "src_dport": "53",
                                                        "dest_port": "53",
                                                        "family": "any",
                                                        "reflection": false
                                                },
                                                {
                                                        "type": "rule",
                                                        "src": "lan",
                                                        "dest": "*",
                                                        "proto": "tcp udp",
                                                        "dest_port": "853",
                                                        "target": "REJECT"
                                                }
                                        ],
                                        "mdns": {
                                                "https-dns-proxy_5053": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5053,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        },
                        "instance2": {
                                "running": true,
                                "pid": 4967,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://45.11.45.11/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5051",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "mdns": {
                                                "https-dns-proxy_5054": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5054,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        },
                        "instance3": {
                                "running": true,
                                "pid": 4966,
                                "command": [
                                        "/usr/sbin/https-dns-proxy",
                                        "-r",
                                        "https://208.67.222.222/dns-query",
                                        "-a",
                                        "127.0.0.1",
                                        "-p",
                                        "5052",
                                        "-b",
                                        "1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4",
                                        "-4",
                                        "-u",
                                        "nobody",
                                        "-g",
                                        "nogroup"
                                ],
                                "term_timeout": 5,
                                "data": {
                                        "mdns": {
                                                "https-dns-proxy_5055": {
                                                        "service": "_https-dns-proxy._udp.local",
                                                        "port": 5055,
                                                        "txt": [
                                                                "DNS over HTTPS proxy"
                                                        ]
                                                }
                                        }
                                },
                                "respawn": {
                                        "threshold": 3600,
                                        "timeout": 5,
                                        "retry": 5
                                }
                        }
                },
                "triggers": [
                        [
                                "interface.*",
                                [
                                        "if",
                                        [
                                                "eq",
                                                "interface",
                                                "wan"
                                        ],
                                        [
                                                "run_script",
                                                "/etc/init.d/https-dns-proxy",
                                                "restart",
                                                "on_interface_trigger"
                                        ]
                                ],
                                1000
                        ],
                        [
                                "config.change",
                                [
                                        "if",
                                        [
                                                "eq",
                                                "package",
                                                "https-dns-proxy"
                                        ],
                                        [
                                                "run_script",
                                                "/etc/init.d/https-dns-proxy",
                                                "reload",
                                                "on_config_change"
                                        ]
                                ],
                                1000
                        ]
                ]
        }
}
root@OpenWrt:~# nslookup google.com 127.0.0.1:5053
nslookup: write to '127.0.0.1:5053': Connection refused
;; connection timed out; no servers could be reached

What I've noticed are that some entries in dnsmasq seem to be missing.

These entries for example only exist after I restart the service:

list server '127.0.0.1#5050'
        list server '127.0.0.1#5051'
        list server '127.0.0.1#5052'
        option doh_backup_noresolv '-1'
        option noresolv '1'
        list doh_backup_server '127.0.0.1#5053'
        list doh_backup_server '127.0.0.1#5054'
        list doh_backup_server '/mask.icloud.com/'
        list doh_backup_server '/mask-h2.icloud.com/'
        list doh_backup_server '/use-application-dns.net/'
        list doh_server '127.0.0.1#5050'
        list doh_server '127.0.0.1#5051'
        list doh_server '127.0.0.1#5052'

I think it might be the same issue #23469 faced back then...

@stangri
Copy link
Member

stangri commented Jan 21, 2025

There may be an issue when no servers are defined for the dnsmasq instance.

If you capture the output of logread -ehttps-dns-proxy -- right after reboot and the once again after service restart, what does it say? The default behaviour is to stop the service if it's started too early and with no servers defined for dnsmasq your DNS would be broken then.

@Angel996
Copy link

Angel996 commented Jan 21, 2025

Confirmed, got exactly the same issue. Just installed https-dns-proxy today. Could the reason be that dnsmasq starts before https-dns-proxy and fails to connect to it so defaults to DNS provided by the ISP?

Can check the DNS setting by using a web service http://edns.ip-api.com/

@ob45
Copy link
Author

ob45 commented Jan 21, 2025

There may be an issue when no servers are defined for the dnsmasq instance.

If you capture the output of logread -ehttps-dns-proxy -- right after reboot and the once again after service restart, what does it say?

Right after device reboot:

root@OpenWrt:~# logread -ehttps-dns-proxy
Tue Jan 21 17:56:34 2025 user.notice https-dns-proxy: Starting service instances on_boot ✓✓✓
Tue Jan 21 17:56:35 2025 user.notice https-dns-proxy: Updating dnsmasq config ✓
Tue Jan 21 17:56:42 2025 user.notice https-dns-proxy: Restarting dnsmasq on_config_update ✓
Tue Jan 21 17:56:43 2025 user.notice https-dns-proxy: Setting service raw_trigger for 'interface.*.up'✓
Tue Jan 21 17:56:58 2025 user.notice https-dns-proxy: Stopping service on_failed_health_check ✓
Tue Jan 21 17:56:58 2025 user.notice https-dns-proxy: Setting service raw_trigger for 'interface.*.up'✓

After manually restarting the service:

root@OpenWrt:~# logread -ehttps-dns-proxy
Tue Jan 21 17:56:34 2025 user.notice https-dns-proxy: Starting service instances on_boot ✓✓✓
Tue Jan 21 17:56:35 2025 user.notice https-dns-proxy: Updating dnsmasq config ✓
Tue Jan 21 17:56:42 2025 user.notice https-dns-proxy: Restarting dnsmasq on_config_update ✓
Tue Jan 21 17:56:43 2025 user.notice https-dns-proxy: Setting service raw_trigger for 'interface.*.up'✓
Tue Jan 21 17:56:58 2025 user.notice https-dns-proxy: Stopping service on_failed_health_check ✓
Tue Jan 21 17:56:58 2025 user.notice https-dns-proxy: Setting service raw_trigger for 'interface.*.up'✓
Tue Jan 21 18:01:33 2025 user.notice https-dns-proxy: Starting service instances ✓✓✓
Tue Jan 21 18:01:33 2025 user.notice https-dns-proxy: Updating dnsmasq config ✓
Tue Jan 21 18:01:40 2025 user.notice https-dns-proxy: Restarting dnsmasq on_config_update ✓

I think that @Shine- might be onto something openwrt/openwrt#17651 (comment)

@stangri
Copy link
Member

stangri commented Jan 21, 2025

I don't understand why you have:

        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

In your dhcp config when the service isn't running. It doesn't look like you've added those manually, it may be an artefact from the older version not cleaning up after itself.

I'd recommend you stop the https-dns-proxy service, delete those entries if they persist and then start the https-dns-proxy service again. You may want to add some non-encrypted servers to your dhcp config first, after cleaning erroneous entries and starting the https-dns-proxy again.

@ob45
Copy link
Author

ob45 commented Jan 21, 2025

I don't understand why you have:

        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

In your dhcp config when the service isn't running. It doesn't look like you've added those manually, it may be an artefact from the older version not cleaning up after itself.

I don't understand either. I haven't added them and it can't be an artefact from an older version because it is a fresh OpenWrt installation, where I had to add this service again.

I had this issue on the 24.10.0-rc4 and 24.10.0-rc3 release too...

I am unsre but if I remember correctly I didn't have this issue on one of the older LuCI less snapshots of the device.

@stangri
Copy link
Member

stangri commented Jan 21, 2025

it can't be an artefact from an older version because it is a fresh OpenWrt installation, where I had to add this service again.

I'll have to review the code, but if it's a fresh install it's definitely a bug most likely due to the fact that no servers are defined for dnsmasq instance before the proxy starts.

@ve1mi
Copy link

ve1mi commented Jan 21, 2025

I have the same problem on versions of routers xiaomi 4ac, 4c. Tested on both versions on both routers 23.05.5 and 24.10 rc5.
The problem is full static from the provider, as well as dhcp from another provider.
After a reboot or new installation, doh doesnt work without rebooting HTTPS-DNS-Proxy
same this
list server '127.0.0.1#5053'
list server '127.0.0.1#5054'
list server '/mask.icloud.com/'
list server '/mask-h2.icloud.com/'
list server '/use-application-dns.net/'

@Angel996
Copy link

I have these entries too, fresh https-dns-proxy install, never used it before. The lines also appear in /etc/config/dhcp file.

@ob45
Copy link
Author

ob45 commented Jan 22, 2025

The problem is full static from the provider, as well as dhcp from another provider.'

Do you mean a static IP address from the ISP? I live in a student dorm and all rooms have a static IP assigned to them so maybe that's one of the reasons?

@ve1mi
Copy link

ve1mi commented Jan 22, 2025

Do you mean a static IP address from the ISP? I live in a student dorm and all rooms have a static IP assigned to them so maybe that's one of the reasons?

This is a bug in this package, it is not about isp and router settings. The same problem on different isp (static and dhcp)

@sinancetinkaya
Copy link

I don't understand why you have:

        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

In your dhcp config when the service isn't running. It doesn't look like you've added those manually, it may be an artefact from the older version not cleaning up after itself.

I don't understand either. I haven't added them and it can't be an artefact from an older version because it is a fresh OpenWrt installation, where I had to add this service again.

I had this issue on the 24.10.0-rc4 and 24.10.0-rc3 release too...

I am unsre but if I remember correctly I didn't have this issue on one of the older LuCI less snapshots of the device.

He adds them himself 🤦‍♀️ https://github.com/stangri/https-dns-proxy/blob/db135baeca1a9fa263ff77c66dcd56ccd0a77e5d/files/etc/init.d/https-dns-proxy#L362

@ob45
Copy link
Author

ob45 commented Jan 22, 2025

He adds them himself 🤦‍♀️ https://github.com/stangri/https-dns-proxy/blob/db135baeca1a9fa263ff77c66dcd56ccd0a77e5d/files/etc/init.d/https-dns-proxy#L362

I just looked the entries up and it seems like you're right 😂

Now we just need to know why this default config gets loaded on every restart instead of our actual config ^_^

@stangri
Copy link
Member

stangri commented Jan 22, 2025

I haven't added them and it can't be an artefact from an older version because it is a fresh OpenWrt installation, where I had to add this service again.

Can you walk me thru steps how you got from default install to your current setup?

For the issue at hand -- can you try:

  1. stop https-dns-proxy
  2. remove the following from dhcp config
        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
  1. start https-dns-proxy, make sure it works
  2. reboot your router, immediately after it boots up capture the output of logread -ehttps
  3. check if dns resolution works

@ob45
Copy link
Author

ob45 commented Jan 23, 2025

Can you walk me thru steps how you got from default install to your current setup?

Sure!

  1. I just open LuCI, go to System > Software
  2. Click on "Update Lists"
  3. After it is done updating the list I search for "HTTPS-DNS-Proxy"
  4. Then I download "luci-app-https-dns-proxy" because it installs the "HTTPS-DNS-Proxy" package too
  5. After it is done I lose the ability to use the normal net because this package configures google and cloudflare DNS servers and my ISP is seething at the thought of people using their own DNS servers
  6. I logout & login again for luci to load the "Services tab"
  7. I go to Services > HTTPS-DNS-Proxy and delete the default DNS servers, which are pre configured
  8. I configure the DNS servers, which can be seen above
  9. Internet works again because these DNS servers haven't been blacklisted

That's basically it. After I restart the router my internet is gone again because the default config gets loaded with ISP banned DNS servers. Then I restart the service, which loads my DNS servers mentioned above and the internet works again.

The question now is why the default stuff gets loaded on router restart...

@Angel996
Copy link

Manual says after installation we must run:

root@OpenWrt:~# /etc/init.d/https-dns-proxy enable
root@OpenWrt:~# /etc/init.d/https-dns-proxy start

Does this actually do anything?

@stangri
Copy link
Member

stangri commented Jan 25, 2025

the default config gets loaded with ISP banned DNS servers.

Are you saying that after reboot, the https-dns-proxy config contains default resolvers and not the ones you have previosuly configured?

@stangri
Copy link
Member

stangri commented Jan 25, 2025

Manual says after installation we must run:

Refer to support thread on the forum with your question, this is not an AMA.

@ob45
Copy link
Author

ob45 commented Jan 26, 2025

the default config gets loaded with ISP banned DNS servers.

Are you saying that after reboot, the https-dns-proxy config contains default resolvers and not the ones you have previosuly configured?

I guess so, because I did not put these things here anywhere:

        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

@ob45
Copy link
Author

ob45 commented Jan 26, 2025

Manual says after installation we must run:

root@OpenWrt:~# /etc/init.d/https-dns-proxy enable
root@OpenWrt:~# /etc/init.d/https-dns-proxy start

Does this actually do anything?

It restarts the service.

Enable is that it starts u on restart of the device and start is actually staring the service if I understand it correctly

@stangri
Copy link
Member

stangri commented Jan 27, 2025

Earlier in the thread you stated:

the default config gets loaded with ISP banned DNS servers.

So let me ask you again:

Are you saying that after reboot, the https-dns-proxy config contains default resolvers and not the ones you have previosuly configured?

@ob45
Copy link
Author

ob45 commented Jan 30, 2025

So let me ask you again:

Are you saying that after reboot, the https-dns-proxy config contains default resolvers and not the ones you have previosuly configured?

If you mean by "default resolvers" the standard DNS servers of Google and Cloudflare, which are preconfigured on a fresh install, then no.

I meant these


        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'

@p0k33m0n
Copy link

p0k33m0n commented Feb 6, 2025

After the update on 24.10 also something strange happened with this service. It did not start when booting the router. However, after rebooting and a few more restarts, the problem disappeared (for now). I don't know what to think about it myself, however, on the previous firmware I never had such a situation. Oh, the entries in the configuration file are correct.

@ob45
Copy link
Author

ob45 commented Feb 6, 2025

After the update on 24.10 also something strange happened with this service. It did not start when booting the router. However, after rebooting and a few more restarts, the problem disappeared (for now). I don't know what to think about it myself, however, on the previous firmware I never had such a situation. Oh, the entries in the configuration file are correct.

What device are you using?

@p0k33m0n
Copy link

p0k33m0n commented Feb 6, 2025

What device are you using?

Model | Netgear WNDR4300
Architecture | Atheros AR9344 rev 2
Target Platform | ath79/nand
Firmware Version | OpenWrt 24.10.0 r28427-6df0e3d02a / LuCI openwrt-24.10 branch 25.035.62793~4f7a183
Kernel Version | 6.6.73

But it doesn't matter, today was the update of these packages, so maybe it will change something - maybe this is the reason that the problem has disappeared. I will let you know.

@p0k33m0n
Copy link

p0k33m0n commented Feb 7, 2025

Unfortunately, but still after a cold boot, the service does not start. Log below. Service launched manually (Thu Feb 6 11:27:23 2025). Service do not autostart after upgrade to 24.10, on 23.xx (and older) it has been flawlessly over the years.

Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.103048] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.110870] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.130328] RCU Tasks Trace: Setting shift to 0 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=1.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.146990] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.157528] futex hash table entries: 256 (order: -1, 3072 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.168239] pinctrl core: initialized pinctrl subsystem
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.177869] NET: Registered PF_NETLINK/PF_ROUTE protocol family
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.184851] thermal_sys: Registered thermal governor 'step_wise'
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.187528] /ahb/apb: Fixed dependency cycle(s) with /ahb/apb/interrupt-controller@18060010
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.219064] clocksource: Switched to clocksource MIPS
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.238639] NET: Registered PF_INET protocol family
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.244189] IP idents hash table entries: 2048 (order: 2, 16384 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.253769] tcp_listen_portaddr_hash hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.262856] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.271130] TCP established hash table entries: 1024 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.279303] TCP bind hash table entries: 1024 (order: 1, 8192 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.286837] TCP: Hash tables configured (established 1024 bind 1024)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.294498] MPTCP token hash table entries: 512 (order: 0, 6144 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.302568] UDP hash table entries: 256 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.309579] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes, linear)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.318244] NET: Registered PF_UNIX/PF_LOCAL protocol family
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.324425] PCI: CLS 0 bytes, default 32
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.334402] workingset: timestamp_bits=14 max_order=15 bucket_order=1
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.343525] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.349795] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.370340] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.382657] pinctrl-single 1804002c.pinmux: 544 pins, size 68
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.390410] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.403658] printk: console [ttyS0] disabled
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.408742] 18020000.uart: ttyS0 at MMIO 0x18020000 (irq = 11, base_baud = 2500000) is a 16550A
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.418120] printk: console [ttyS0] enabled
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.427036] printk: bootconsole [early0] disabled
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.475115] nand: device found, Manufacturer ID: 0x2c, Chip ID: 0xf1
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.481635] nand: Micron NAND 128MiB 3,3V 8-bit
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.486234] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Thu Feb  6 11:19:53 2025 kern.info kernel: [    0.493982] Scanning device for bad blocks
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.581478] 10 fixed-partitions partitions found on MTD device ar934x-nand
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.588833] Creating 10 MTD partitions on "ar934x-nand":
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.594289] 0x000000000000-0x000000040000 : "u-boot"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.602851] 0x000000040000-0x000000080000 : "u-boot-env"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.610734] 0x000000080000-0x0000000c0000 : "caldata"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.618834] 0x0000000c0000-0x000000140000 : "pot"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.626560] 0x000000140000-0x000000340000 : "language"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.634214] 0x000000340000-0x0000003c0000 : "config"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.641730] 0x0000003c0000-0x0000006c0000 : "traffic_meter"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.649977] 0x0000006c0000-0x000001fc0000 : "firmware"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.657750] 2 fixed-partitions partitions found on MTD device firmware
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.664458] Creating 2 MTD partitions on "firmware":
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.669520] 0x000000000000-0x000000400000 : "kernel"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.677006] 0x000000400000-0x000001900000 : "ubiconcat0"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.685032] 0x000001fc0000-0x000002000000 : "caldata_backup"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.693336] 0x000002000000-0x000008000000 : "ubiconcat1"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.709522] Concatenating MTD devices:
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.713347] (0): "ubiconcat0"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.716362] (1): "ubiconcat1"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.719418] into device "ubi-concat"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.723080] 1 fixed-partitions partitions found on MTD device ubi-concat
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.729916] Creating 1 MTD partitions on "ubi-concat":
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    0.735139] 0x000000000000-0x000007500000 : "ubi"
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.116592] switch0: Atheros AR8327 rev. 4 switch registered on mdio.0
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.769581] ag71xx-legacy 19000000.eth: connected to PHY at mdio.0:00 [uid=004dd034, driver=Atheros AR8216/AR8236/AR8316]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.781649] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: rgmii
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.793779] NET: Registered PF_INET6 protocol family
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.815723] Segment Routing with IPv6
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.819625] In-situ OAM (IOAM) with IPv6
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.823835] NET: Registered PF_PACKET protocol family
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.829103] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.842584] 8021q: 802.1Q VLAN Support v1.8
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.896245] PCI host bridge to bus 0000:00
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.900492] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.907481] pci_bus 0000:00: root bus resource [io  0x0000]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.913154] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.921260] pci 0000:00:00.0: [168c:0033] type 00 class 0x028000
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.927400] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.934358] pci 0000:00:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.941259] pci 0000:00:00.0: supports D1
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.945337] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.952768] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 00
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.959569] pci 0000:00:00.0: BAR 0: assigned [mem 0x10000000-0x1001ffff 64bit]
Thu Feb  6 11:19:53 2025 kern.info kernel: [    1.967014] pci 0000:00:00.0: BAR 6: assigned [mem 0x10020000-0x1002ffff pref]
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    1.977136] UBI: auto-attach mtd12
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    1.980681] ubi0: attaching mtd12
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.920480] ubi0: scanning is finished
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.936542] ubi0: attached mtd12 (name "ubi", size 117 MiB)
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.942288] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.949285] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.956173] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.963252] ubi0: good PEBs: 936, bad PEBs: 0, corrupted PEBs: 0
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.969364] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.976695] ubi0: max/mean erase counter: 26/13, WL threshold: 4096, image sequence number: 1635066095
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.986154] ubi0: available PEBs: 0, total reserved PEBs: 936, PEBs reserved for bad PEB handling: 19
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    2.995565] ubi0: background thread "ubi_bgt0d" started, PID 324
Thu Feb  6 11:19:53 2025 kern.info kernel: [    3.002945] block ubiblock0_0: created from ubi0:0(rootfs)
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    3.008537] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
Thu Feb  6 11:19:53 2025 kern.info kernel: [    3.015911] clk: Disabling unused clocks
Thu Feb  6 11:19:53 2025 kern.info kernel: [    3.027578] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    3.040776] Freeing unused kernel image (initmem) memory: 1240K
Thu Feb  6 11:19:53 2025 kern.warn kernel: [    3.046797] This architecture does not have kernel memory protection.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    3.053367] Run /sbin/init as init process
Thu Feb  6 11:19:53 2025 kern.debug kernel: [    3.057523]   with arguments:
Thu Feb  6 11:19:53 2025 kern.debug kernel: [    3.057529]     /sbin/init
Thu Feb  6 11:19:53 2025 kern.debug kernel: [    3.057536]   with environment:
Thu Feb  6 11:19:53 2025 kern.debug kernel: [    3.057543]     HOME=/
Thu Feb  6 11:19:53 2025 kern.debug kernel: [    3.057549]     TERM=linux
Thu Feb  6 11:19:53 2025 user.info kernel: [    3.650239] init: Console is alive
Thu Feb  6 11:19:53 2025 user.info kernel: [    3.654145] init: - watchdog -
Thu Feb  6 11:19:53 2025 user.info kernel: [    3.657646] init: Watchdog has previously reset the system
Thu Feb  6 11:19:53 2025 user.info kernel: [    4.744622] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.817308] usbcore: registered new interface driver usbfs
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.823044] usbcore: registered new interface driver hub
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.828582] usbcore: registered new device driver usb
Thu Feb  6 11:19:53 2025 kern.warn kernel: [    4.845561] gpio_button_hotplug: loading out-of-tree module taints kernel.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.867324] ehci-platform 1b000000.usb: EHCI Host Controller
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.873230] ehci-platform 1b000000.usb: new USB bus registered, assigned bus number 1
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.881358] ehci-platform 1b000000.usb: irq 3, io mem 0x1b000000
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.909087] ehci-platform 1b000000.usb: USB 2.0 started, EHCI 1.00
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.916524] hub 1-0:1.0: USB hub found
Thu Feb  6 11:19:53 2025 kern.info kernel: [    4.921477] hub 1-0:1.0: 1 port detected
Thu Feb  6 11:19:53 2025 user.info kernel: [    4.936449] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Thu Feb  6 11:19:53 2025 user.info kernel: [    4.954456] init: - preinit -
Thu Feb  6 11:19:53 2025 kern.notice kernel: [    6.989119] random: crng init done
Thu Feb  6 11:19:53 2025 kern.warn kernel: [    7.411461] mtdblock: MTD device 'caldata' is NAND, please consider using UBI block devices instead.
Thu Feb  6 11:19:53 2025 kern.info kernel: [    9.486639] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 2 is up
Thu Feb  6 11:19:53 2025 kern.info kernel: [    9.493251] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is up
Thu Feb  6 11:19:53 2025 kern.info kernel: [    9.500803] eth0: link up (1000Mbps/Full duplex)
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   13.890554] UBIFS (ubi0:1): Mounting in unauthenticated mode
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   13.896535] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 510
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   13.971822] UBIFS (ubi0:1): recovery needed
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.137013] UBIFS (ubi0:1): recovery completed
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.141701] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.149680] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.159754] UBIFS (ubi0:1): FS size: 110469120 bytes (105 MiB, 870 LEBs), max 881 LEBs, journal size 5586944 bytes (5 MiB, 44 LEBs)
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.171787] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Thu Feb  6 11:19:53 2025 kern.notice kernel: [   14.178505] UBIFS (ubi0:1): media format: w5/r0 (latest is w5/r0), UUID 33344444-4DED-44FE-B3A2-C94D7AC46073, small LPT model
Thu Feb  6 11:19:53 2025 user.info kernel: [   14.201284] mount_root: switching to ubifs overlay
Thu Feb  6 11:19:53 2025 user.warn kernel: [   14.219608] urandom-seed: Seeding with /etc/urandom.seed
Thu Feb  6 11:19:53 2025 kern.info kernel: [   14.312663] eth0: link down
Thu Feb  6 11:19:53 2025 user.info kernel: [   14.347284] procd: - early -
Thu Feb  6 11:19:53 2025 user.info kernel: [   14.350684] procd: - watchdog -
Thu Feb  6 11:19:53 2025 user.info kernel: [   14.354246] procd: Watchdog has previously reset the system
Thu Feb  6 11:19:53 2025 user.info kernel: [   15.127757] procd: - watchdog -
Thu Feb  6 11:19:53 2025 user.info kernel: [   15.131135] procd: Watchdog has previously reset the system
Thu Feb  6 11:19:53 2025 user.info kernel: [   15.139564] procd: - ubus -
Thu Feb  6 11:19:53 2025 user.info kernel: [   15.234173] procd: - init -
Thu Feb  6 11:19:53 2025 user.info kernel: [   16.875757] kmodloader: loading kernel modules from /etc/modules.d/*
Thu Feb  6 11:19:53 2025 kern.info kernel: [   18.360362] Loading modules backported from Linux version v6.12.6-0-ge9d65b48ce1a
Thu Feb  6 11:19:53 2025 kern.info kernel: [   18.367978] Backport generated by backports.git v6.1.110-1-35-g410656ef04d2
Thu Feb  6 11:19:53 2025 user.info kernel: [   19.311161] urngd: v1.0.2 started.
Thu Feb  6 11:19:53 2025 kern.info kernel: [   19.432674] PPP generic driver version 2.4.2
Thu Feb  6 11:19:53 2025 kern.info kernel: [   19.452753] NET: Registered PF_PPPOX protocol family
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633907] ath: EEPROM regdomain: 0x0
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633939] ath: EEPROM indicates default country code should be used
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633948] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633968] ath: country maps to regdmn code: 0x3a
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633978] ath: Country alpha2 being used: US
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.633987] ath: Regpair used: 0x3a
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.647519] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Thu Feb  6 11:19:53 2025 kern.info kernel: [   19.648640] ieee80211 phy0: Atheros AR9340 Rev:2 mem=0x869cbb8b, irq=13
Thu Feb  6 11:19:53 2025 kern.info kernel: [   19.655894] ath9k 0000:00:00.0: enabling device (0000 -> 0002)
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724462] ath: EEPROM regdomain: 0x0
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724493] ath: EEPROM indicates default country code should be used
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724502] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724522] ath: country maps to regdmn code: 0x3a
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724532] ath: Country alpha2 being used: US
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.724541] ath: Regpair used: 0x3a
Thu Feb  6 11:19:53 2025 kern.debug kernel: [   19.736027] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Thu Feb  6 11:19:53 2025 kern.info kernel: [   19.737357] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0x146b8df1, irq=14
Thu Feb  6 11:19:53 2025 user.info kernel: [   19.821253] kmodloader: done loading kernel modules from /etc/modules.d/*
Thu Feb  6 11:19:55 2025 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Feb  6 11:19:55 2025 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 150
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:19:56 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 0 names
Thu Feb  6 11:19:56 2025 daemon.info dropbear: Option 'Interface' binds to address(es) but not to interface
Thu Feb  6 11:19:56 2025 daemon.info dropbear: Consider using option 'DirectInterface' to bind directly to interface
Thu Feb  6 11:20:01 2025 daemon.notice wpa_supplicant[1387]: Successfully initialized wpa_supplicant
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: bonding
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: 8021ad
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: 8021q
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: macvlan
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: veth
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: bridge
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: Network device
Thu Feb  6 11:20:02 2025 user.notice : Added device handler type: tunnel
Thu Feb  6 11:20:07 2025 cron.err crond[1746]: crond (busybox 1.36.1) started, log level 5
Thu Feb  6 11:20:09 2025 user.notice ucitrack: Setting up /etc/config/luci-splash reload dependency on /etc/config/firewall
Thu Feb  6 11:20:09 2025 user.notice ucitrack: Setting up /etc/config/qos reload dependency on /etc/config/firewall
Thu Feb  6 11:20:09 2025 user.notice ucitrack: Setting up /etc/config/miniupnpd reload dependency on /etc/config/firewall
Thu Feb  6 11:20:10 2025 user.notice ucitrack: Setting up /etc/config/odhcpd reload dependency on /etc/config/dhcp
Thu Feb  6 11:20:11 2025 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/network
Thu Feb  6 11:20:11 2025 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/wireless
Thu Feb  6 11:20:12 2025 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Thu Feb  6 11:20:12 2025 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Thu Feb  6 11:20:12 2025 user.notice ucitrack: Setting up /etc/config/luci_statistics reload dependency on /etc/config/system
Thu Feb  6 11:20:13 2025 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/system
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.503547] eth0: link up (1000Mbps/Full duplex)
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.527285] br-lan: port 1(eth0.1) entered blocking state
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.532925] br-lan: port 1(eth0.1) entered disabled state
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.538493] eth0.1: entered allmulticast mode
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.543021] ag71xx-legacy 19000000.eth eth0: entered allmulticast mode
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.550045] eth0.1: entered promiscuous mode
Thu Feb  6 11:20:13 2025 kern.info kernel: [   45.554454] ag71xx-legacy 19000000.eth eth0: entered promiscuous mode
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' is enabled
Thu Feb  6 11:20:14 2025 kern.info kernel: [   45.605845] br-lan: port 1(eth0.1) entered blocking state
Thu Feb  6 11:20:14 2025 kern.info kernel: [   45.611435] br-lan: port 1(eth0.1) entered forwarding state
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' is setting up now
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' is now up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: bridge 'br-lan' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Feb  6 11:20:14 2025 daemon.notice netifd: VLAN 'eth0.1' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'loopback' is enabled
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'loopback' is setting up now
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'loopback' is now up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan' is enabled
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan6' is enabled
Thu Feb  6 11:20:14 2025 daemon.notice netifd: bridge 'br-lan' link is down
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' has link connectivity loss
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Network device 'eth0' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: VLAN 'eth0.1' link is down
Thu Feb  6 11:20:14 2025 daemon.notice netifd: VLAN 'eth0.1' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: bridge 'br-lan' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'lan' has link connectivity
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Network device 'lo' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'loopback' has link connectivity
Thu Feb  6 11:20:14 2025 daemon.notice netifd: VLAN 'eth0.2' link is up
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan' has link connectivity
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan' is setting up now
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan6' has link connectivity
Thu Feb  6 11:20:14 2025 daemon.notice netifd: Interface 'wan6' is setting up now
Thu Feb  6 11:20:15 2025 daemon.notice netifd: wan (2142): udhcpc: started, v1.36.1
Thu Feb  6 11:20:16 2025 daemon.notice netifd: radio0 (2089): WARNING: Variable 'data' does not exist or is not an array/object
Thu Feb  6 11:20:16 2025 daemon.notice netifd: radio1 (2090): WARNING: Variable 'data' does not exist or is not an array/object
Thu Feb  6 11:20:17 2025 daemon.notice netifd: wan (2142): udhcpc: broadcasting discover
Thu Feb  6 11:20:17 2025 daemon.notice netifd: wan (2142): udhcpc: broadcasting select for xxx, server 172.16.184.227
Thu Feb  6 11:20:17 2025 daemon.notice netifd: wan (2142): udhcpc: lease of xxx obtained from xxx, lease time 28800
Thu Feb  6 11:20:17 2025 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Thu Feb  6 11:20:18 2025 daemon.info dropbear: Option 'Interface' binds to address(es) but not to interface
Thu Feb  6 11:20:18 2025 daemon.info dropbear: Consider using option 'DirectInterface' to bind directly to interface
Thu Feb  6 11:20:19 2025 daemon.notice netifd: Interface 'wan' is now up
Thu Feb  6 11:20:20 2025 authpriv.info dropbear[2371]: Not backgrounding
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.883493] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.887669] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.894036] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.899514] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.904424] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.908962] ath: Regpair used: 0x37
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.912591] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.918559] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.922743] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.928996] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.934469] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.939462] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.944004] ath: Regpair used: 0x37
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   52.947593] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:21 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.265635] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.269912] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.276175] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.281681] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.286589] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.291203] ath: Regpair used: 0x3d
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.294789] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.300817] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.304898] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.311209] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.316646] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.321616] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.326163] ath: Regpair used: 0x3d
Thu Feb  6 11:20:21 2025 kern.debug kernel: [   53.329801] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:22 2025 daemon.notice hostapd: Set new config for phy phy0:
Thu Feb  6 11:20:22 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy0
Thu Feb  6 11:20:22 2025 daemon.notice hostapd: Set new config for phy phy1:
Thu Feb  6 11:20:22 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy1
Thu Feb  6 11:20:26 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy1
Thu Feb  6 11:20:26 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy0
Thu Feb  6 11:20:26 2025 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
Thu Feb  6 11:20:26 2025 daemon.notice hostapd: Restart interface for phy phy1
Thu Feb  6 11:20:27 2025 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=RU ieee80211d=1 ieee80211h=1 hw_mode=a beacon_int=100 stationary_ap=1 chanlist=48 #num_global_macaddr=1 #macaddr_base= ieee80211n=1 ht_coex=0 ht_capab=[HT40-][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][DSSS_CCK-40] channel=48  interface=phy1-ap0 bssid=a4:2b:8c:0d:43:da ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=1 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=xxx wpa_psk_file=/var/run/hostapd-phy1-ap0.psk auth_algs=1 wpa=2 wpa_pairwise=CCMP ssid=ssid-p0kNET-N bridge=br-lan wds_bridge= snoop_iface=br-lan wpa_disable_eapol_key_retries=0 wpa_key_mgmt=WPA-PSK okc=0 disable_pmksa_caching=1 dynamic_vlan=0 vlan_naming=1 vlan_no_bridge=1 vlan_file=/var/run/hostapd-phy1-ap0.
Thu Feb  6 11:20:27 2025 kern.info kernel: [   59.089702] br-lan: port 2(phy1-ap0) entered blocking state
Thu Feb  6 11:20:27 2025 kern.info kernel: [   59.095511] br-lan: port 2(phy1-ap0) entered disabled state
Thu Feb  6 11:20:27 2025 kern.info kernel: [   59.101388] ath9k 0000:00:00.0 phy1-ap0: entered allmulticast mode
Thu Feb  6 11:20:27 2025 kern.info kernel: [   59.108295] ath9k 0000:00:00.0 phy1-ap0: entered promiscuous mode
Thu Feb  6 11:20:27 2025 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb  6 11:20:27 2025 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->HT_SCAN
Thu Feb  6 11:20:27 2025 daemon.notice hostapd: Set new config for phy phy0: /var/run/hostapd-phy0.conf
Thu Feb  6 11:20:27 2025 daemon.notice hostapd: Restart interface for phy phy0
Thu Feb  6 11:20:28 2025 daemon.notice hostapd: Switch own primary and secondary channel to get secondary channel with no Beacons from other BSSes
Thu Feb  6 11:20:28 2025 daemon.notice netifd: Wireless device 'radio1' is now up
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.318081] br-lan: port 2(phy1-ap0) entered blocking state
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.323829] br-lan: port 2(phy1-ap0) entered forwarding state
Thu Feb  6 11:20:28 2025 daemon.notice netifd: Network device 'phy1-ap0' link is up
Thu Feb  6 11:20:28 2025 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=PL ieee80211d=1 hw_mode=g supported_rates=60 90 120 180 240 360 480 540 basic_rates=60 120 240 beacon_int=100 stationary_ap=1 chanlist=13 #num_global_macaddr=1 #macaddr_base= ieee80211n=1 ht_coex=0 ht_capab=[LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][DSSS_CCK-40] channel=13  interface=phy0-ap0 bssid=a4:2b:8c:0d:43:d8 ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=1 preamble=1 wmm_enabled=0 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=xxx wpa_psk_file=/var/run/hostapd-phy0-ap0.psk auth_algs=1 wpa=2 wpa_pairwise=CCMP ssid=ssid-p0kNET-G bridge=br-lan wds_bridge= snoop_iface=br-lan wpa_disable_eapol_key_retries=0 wpa_key_mgmt=WPA-PSK okc=0 disable_pmksa_caching=1 dynamic_vlan=0 vlan_naming=1 vlan
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.519806] br-lan: port 3(phy0-ap0) entered blocking state
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.525765] br-lan: port 3(phy0-ap0) entered disabled state
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.531833] ath9k 18100000.wmac phy0-ap0: entered allmulticast mode
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.538944] ath9k 18100000.wmac phy0-ap0: entered promiscuous mode
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.545770] br-lan: port 3(phy0-ap0) entered blocking state
Thu Feb  6 11:20:28 2025 kern.info kernel: [   60.551542] br-lan: port 3(phy0-ap0) entered forwarding state
Thu Feb  6 11:20:29 2025 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.363690] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.367947] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.374315] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.379965] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.384932] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.389497] ath: Regpair used: 0x37
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.393137] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.399481] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.403703] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.410158] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.415763] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.421009] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.425717] ath: Regpair used: 0x37
Thu Feb  6 11:20:31 2025 kern.debug kernel: [   63.429694] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:31 2025 kern.info kernel: [   63.451382] br-lan: port 3(phy0-ap0) entered disabled state
Thu Feb  6 11:20:31 2025 daemon.notice hostapd: phy1-ap0: interface state HT_SCAN->ENABLED
Thu Feb  6 11:20:31 2025 daemon.notice hostapd: phy1-ap0: AP-ENABLED
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 150
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.0.100 -- 192.168.0.199, lease time 1d
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:20:31 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:20:31 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:20:31 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Stopping https-dns-proxy 2023.12.26-r2 on_failed_health_check ✓
Thu Feb  6 11:20:32 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:20:32 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:20:32 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Setting trigger (on_boot) ✓
Thu Feb  6 11:20:32 2025 daemon.notice netifd: Wireless device 'radio0' is now up
Thu Feb  6 11:20:32 2025 kern.info kernel: [   64.192811] br-lan: port 3(phy0-ap0) entered blocking state
Thu Feb  6 11:20:32 2025 kern.info kernel: [   64.198550] br-lan: port 3(phy0-ap0) entered forwarding state
Thu Feb  6 11:20:32 2025 daemon.notice netifd: Network device 'phy0-ap0' link is up
Thu Feb  6 11:20:32 2025 daemon.notice hostapd: phy0-ap0: interface state COUNTRY_UPDATE->ENABLED
Thu Feb  6 11:20:32 2025 daemon.notice hostapd: phy0-ap0: AP-ENABLED
Thu Feb  6 11:20:33 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 IEEE 802.11: authenticated
Thu Feb  6 11:20:33 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 IEEE 802.11: associated (aid 1)
Thu Feb  6 11:20:33 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 18:cf:5e:4d:fb:27 auth_alg=open
Thu Feb  6 11:20:33 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:20:33 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 18:cf:5e:4d:fb:27
Thu Feb  6 11:20:35 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 IEEE 802.11: authenticated
Thu Feb  6 11:20:35 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 IEEE 802.11: associated (aid 2)
Thu Feb  6 11:20:35 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED d8:f7:10:c6:14:74 auth_alg=open
Thu Feb  6 11:20:35 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:20:35 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED d8:f7:10:c6:14:74
Thu Feb  6 11:20:35 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.197 d8:f7:10:c6:14:74
Thu Feb  6 11:20:35 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.197 d8:f7:10:c6:14:74
Thu Feb  6 11:20:37 2025 daemon.notice miniupnpd[3297]: Listening for NAT-PMP/PCP traffic on port 5351
Thu Feb  6 11:20:37 2025 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
Thu Feb  6 11:20:38 2025 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN (amber)
Thu Feb  6 11:20:42 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:20:42 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:20:42 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:20:45 2025 cron.err crond[3930]: crond (busybox 1.36.1) started, log level 5
Thu Feb  6 11:20:47 2025 daemon.info procd: - init complete -
Thu Feb  6 11:20:47 2025 user.info adblock-4.2.4-r1[3220]: adblock instance started ::: action: start, priority: 10, pid: 3220
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: Set new config for phy phy1:
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: Remove interface 'phy1'
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED d8:f7:10:c6:14:74
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 18:cf:5e:4d:fb:27
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
Thu Feb  6 11:20:47 2025 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Feb  6 11:20:47 2025 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Thu Feb  6 11:20:47 2025 daemon.notice netifd: Network device 'phy1-ap0' link is down
Thu Feb  6 11:20:47 2025 kern.info kernel: [   79.428705] br-lan: port 2(phy1-ap0) entered disabled state
Thu Feb  6 11:20:47 2025 kern.info kernel: [   79.467062] br-lan: port 2(phy1-ap0) entered disabled state
Thu Feb  6 11:20:47 2025 kern.info kernel: [   79.484460] ath9k 0000:00:00.0 phy1-ap0: left allmulticast mode
Thu Feb  6 11:20:47 2025 kern.info kernel: [   79.490691] ath9k 0000:00:00.0 phy1-ap0: left promiscuous mode
Thu Feb  6 11:20:47 2025 kern.info kernel: [   79.496864] br-lan: port 2(phy1-ap0) entered disabled state
Thu Feb  6 11:20:48 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy1
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: Set new config for phy phy0:
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: Remove interface 'phy0'
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: phy0-ap0: interface state ENABLED->DISABLED
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: phy0-ap0: AP-DISABLED
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: phy0-ap0: CTRL-EVENT-TERMINATING
Thu Feb  6 11:20:48 2025 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Feb  6 11:20:48 2025 daemon.notice hostapd: nl80211: deinit ifname=phy0-ap0 disabled_11b_rates=0
Thu Feb  6 11:20:48 2025 kern.info kernel: [   79.772516] br-lan: port 3(phy0-ap0) entered disabled state
Thu Feb  6 11:20:48 2025 kern.info kernel: [   79.839616] ath9k 18100000.wmac phy0-ap0 (unregistering): left allmulticast mode
Thu Feb  6 11:20:48 2025 kern.info kernel: [   79.847282] ath9k 18100000.wmac phy0-ap0 (unregistering): left promiscuous mode
Thu Feb  6 11:20:48 2025 kern.info kernel: [   79.854867] br-lan: port 3(phy0-ap0) entered disabled state
Thu Feb  6 11:20:48 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy0
Thu Feb  6 11:20:49 2025 daemon.notice netifd: Wireless device 'radio0' is now down
Thu Feb  6 11:20:50 2025 daemon.notice netifd: Wireless device 'radio1' is now down
Thu Feb  6 11:20:51 2025 daemon.notice netifd: radio0 (4031): WARNING: Variable 'data' does not exist or is not an array/object
Thu Feb  6 11:20:51 2025 daemon.notice netifd: radio1 (4032): WARNING: Variable 'data' does not exist or is not an array/object
Thu Feb  6 11:20:52 2025 daemon.notice hostapd: Set new config for phy phy0:
Thu Feb  6 11:20:52 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy0
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.545068] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.549314] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.555589] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.561126] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.566072] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.570684] ath: Regpair used: 0x3d
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.574293] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.583877] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.588054] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.594341] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.599839] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.604757] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.609398] ath: Regpair used: 0x3d
Thu Feb  6 11:20:53 2025 kern.debug kernel: [   84.612982] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:53 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy0
Thu Feb  6 11:20:54 2025 daemon.notice hostapd: Set new config for phy phy1:
Thu Feb  6 11:20:54 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy1
Thu Feb  6 11:20:54 2025 daemon.notice hostapd: Set new config for phy phy0: /var/run/hostapd-phy0.conf
Thu Feb  6 11:20:54 2025 daemon.notice hostapd: Restart interface for phy phy0
Thu Feb  6 11:20:54 2025 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=PL ieee80211d=1 hw_mode=g supported_rates=60 90 120 180 240 360 480 540 basic_rates=60 120 240 beacon_int=100 stationary_ap=1 chanlist=13 #num_global_macaddr=1 #macaddr_base= ieee80211n=1 ht_coex=0 ht_capab=[LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][DSSS_CCK-40] channel=13  interface=phy0-ap0 bssid=a4:2b:8c:0d:43:d8 ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=1 preamble=1 wmm_enabled=0 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=xxx wpa_psk_file=/var/run/hostapd-phy0-ap0.psk auth_algs=1 wpa=2 wpa_pairwise=CCMP ssid=ssid-p0kNET-G bridge=br-lan wds_bridge= snoop_iface=br-lan wpa_disable_eapol_key_retries=0 wpa_key_mgmt=WPA-PSK okc=0 disable_pmksa_caching=1 dynamic_vlan=0 vlan_naming=1 vlan
Thu Feb  6 11:20:54 2025 kern.info kernel: [   86.495533] br-lan: port 2(phy0-ap0) entered blocking state
Thu Feb  6 11:20:54 2025 kern.info kernel: [   86.501365] br-lan: port 2(phy0-ap0) entered disabled state
Thu Feb  6 11:20:54 2025 kern.info kernel: [   86.507230] ath9k 18100000.wmac phy0-ap0: entered allmulticast mode
Thu Feb  6 11:20:54 2025 kern.info kernel: [   86.514120] ath9k 18100000.wmac phy0-ap0: entered promiscuous mode
Thu Feb  6 11:20:55 2025 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.593654] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.597870] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.604215] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.609718] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.614660] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.619269] ath: Regpair used: 0x37
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.622816] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.628753] ath: EEPROM regdomain: 0x8268
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.633016] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.639489] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.644990] ath: country maps to regdmn code: 0x37
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.649965] ath: Country alpha2 being used: PL
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.654533] ath: Regpair used: 0x37
Thu Feb  6 11:20:55 2025 kern.debug kernel: [   86.658204] ath: regdomain 0x8268 dynamically updated by user
Thu Feb  6 11:20:55 2025 kern.info kernel: [   87.073344] br-lan: port 2(phy0-ap0) entered blocking state
Thu Feb  6 11:20:55 2025 kern.info kernel: [   87.079046] br-lan: port 2(phy0-ap0) entered forwarding state
Thu Feb  6 11:20:55 2025 daemon.notice netifd: Network device 'phy0-ap0' link is up
Thu Feb  6 11:20:55 2025 daemon.notice hostapd: phy0-ap0: interface state COUNTRY_UPDATE->ENABLED
Thu Feb  6 11:20:55 2025 daemon.notice hostapd: phy0-ap0: AP-ENABLED
Thu Feb  6 11:20:55 2025 daemon.notice netifd: Wireless device 'radio0' is now up
Thu Feb  6 11:20:56 2025 daemon.notice wpa_supplicant[1387]: Set new config for phy phy1
Thu Feb  6 11:20:56 2025 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
Thu Feb  6 11:20:56 2025 daemon.notice hostapd: Restart interface for phy phy1
Thu Feb  6 11:20:56 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Thu Feb  6 11:20:56 2025 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=RU ieee80211d=1 ieee80211h=1 hw_mode=a beacon_int=100 stationary_ap=1 chanlist=48 #num_global_macaddr=1 #macaddr_base= ieee80211n=1 ht_coex=0 ht_capab=[HT40-][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][DSSS_CCK-40] channel=48  interface=phy1-ap0 bssid=a4:2b:8c:0d:43:da ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=1 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=xxx wpa_psk_file=/var/run/hostapd-phy1-ap0.psk auth_algs=1 wpa=2 wpa_pairwise=CCMP ssid=ssid-p0kNET-N bridge=br-lan wds_bridge= snoop_iface=br-lan wpa_disable_eapol_key_retries=0 wpa_key_mgmt=WPA-PSK okc=0 disable_pmksa_caching=1 dynamic_vlan=0 vlan_naming=1 vlan_no_bridge=1 vlan_file=/var/run/hostapd-phy1-ap0.
Thu Feb  6 11:20:57 2025 kern.info kernel: [   88.573342] br-lan: port 3(phy1-ap0) entered blocking state
Thu Feb  6 11:20:57 2025 kern.info kernel: [   88.579037] br-lan: port 3(phy1-ap0) entered disabled state
Thu Feb  6 11:20:57 2025 kern.info kernel: [   88.585007] ath9k 0000:00:00.0 phy1-ap0: entered allmulticast mode
Thu Feb  6 11:20:57 2025 kern.info kernel: [   88.592127] ath9k 0000:00:00.0 phy1-ap0: entered promiscuous mode
Thu Feb  6 11:20:57 2025 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.634106] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.638347] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.644681] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.650409] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.655380] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.660006] ath: Regpair used: 0x3d
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.663666] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.669719] ath: EEPROM regdomain: 0x8283
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.673945] ath: EEPROM indicates we should expect a country code
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.680283] ath: doing EEPROM country->regdmn map search
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.685892] ath: country maps to regdmn code: 0x3d
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.690965] ath: Country alpha2 being used: RU
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.695699] ath: Regpair used: 0x3d
Thu Feb  6 11:20:57 2025 kern.debug kernel: [   88.699550] ath: regdomain 0x8283 dynamically updated by user
Thu Feb  6 11:20:57 2025 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->HT_SCAN
Thu Feb  6 11:20:57 2025 daemon.notice hostapd: Switch own primary and secondary channel to get secondary channel with no Beacons from other BSSes
Thu Feb  6 11:20:57 2025 daemon.notice netifd: Network device 'phy1-ap0' link is up
Thu Feb  6 11:20:57 2025 kern.info kernel: [   89.104916] br-lan: port 3(phy1-ap0) entered blocking state
Thu Feb  6 11:20:57 2025 kern.info kernel: [   89.110680] br-lan: port 3(phy1-ap0) entered forwarding state
Thu Feb  6 11:20:57 2025 daemon.notice hostapd: phy1-ap0: interface state HT_SCAN->ENABLED
Thu Feb  6 11:20:57 2025 daemon.notice hostapd: phy1-ap0: AP-ENABLED
Thu Feb  6 11:20:57 2025 daemon.notice netifd: Wireless device 'radio1' is now up
Thu Feb  6 11:20:58 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 IEEE 802.11: authenticated
Thu Feb  6 11:20:58 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 IEEE 802.11: associated (aid 1)
Thu Feb  6 11:20:58 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED d8:f7:10:c6:14:74 auth_alg=open
Thu Feb  6 11:20:58 2025 daemon.info hostapd: phy1-ap0: STA d8:f7:10:c6:14:74 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:20:58 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED d8:f7:10:c6:14:74
Thu Feb  6 11:20:59 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 IEEE 802.11: authenticated
Thu Feb  6 11:20:59 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 IEEE 802.11: associated (aid 2)
Thu Feb  6 11:21:00 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 18:cf:5e:4d:fb:27 auth_alg=open
Thu Feb  6 11:21:00 2025 daemon.info hostapd: phy1-ap0: STA 18:cf:5e:4d:fb:27 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:21:00 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 18:cf:5e:4d:fb:27
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 150
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.0.100 -- 192.168.0.199, lease time 1d
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:21:01 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:21:01 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:21:01 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:21:02 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.197 d8:f7:10:c6:14:74
Thu Feb  6 11:21:02 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.197 d8:f7:10:c6:14:74
Thu Feb  6 11:21:38 2025 daemon.info hostapd: phy1-ap0: STA 78:d6:dc:aa:52:58 IEEE 802.11: authenticated
Thu Feb  6 11:21:38 2025 daemon.info hostapd: phy1-ap0: STA 78:d6:dc:aa:52:58 IEEE 802.11: associated (aid 3)
Thu Feb  6 11:21:38 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 78:d6:dc:aa:52:58 auth_alg=open
Thu Feb  6 11:21:38 2025 daemon.info hostapd: phy1-ap0: STA 78:d6:dc:aa:52:58 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:21:38 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 78:d6:dc:aa:52:58
Thu Feb  6 11:21:39 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.130 78:d6:dc:aa:52:58
Thu Feb  6 11:21:39 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.130 78:d6:dc:aa:52:58
Thu Feb  6 11:21:46 2025 daemon.info hostapd: phy1-ap0: STA e0:1f:fc:1c:87:25 IEEE 802.11: authenticated
Thu Feb  6 11:21:46 2025 daemon.info hostapd: phy1-ap0: STA e0:1f:fc:1c:87:25 IEEE 802.11: associated (aid 4)
Thu Feb  6 11:21:46 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e0:1f:fc:1c:87:25 auth_alg=open
Thu Feb  6 11:21:46 2025 daemon.info hostapd: phy1-ap0: STA e0:1f:fc:1c:87:25 WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:21:46 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e0:1f:fc:1c:87:25
Thu Feb  6 11:21:46 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.185 e0:1f:fc:1c:87:25
Thu Feb  6 11:21:46 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.185 e0:1f:fc:1c:87:25
Thu Feb  6 11:22:14 2025 daemon.info hostapd: phy1-ap0: STA c6:91:8a:55:ec:ed IEEE 802.11: authenticated
Thu Feb  6 11:22:14 2025 daemon.info hostapd: phy1-ap0: STA c6:91:8a:55:ec:ed IEEE 802.11: associated (aid 5)
Thu Feb  6 11:22:14 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED c6:91:8a:55:ec:ed auth_alg=open
Thu Feb  6 11:22:14 2025 daemon.info hostapd: phy1-ap0: STA c6:91:8a:55:ec:ed WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:22:14 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c6:91:8a:55:ec:ed
Thu Feb  6 11:22:14 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.151 c6:91:8a:55:ec:ed
Thu Feb  6 11:22:14 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.151 c6:91:8a:55:ec:ed Urzadzenie-S10e-uzytkownika-Adam
Thu Feb  6 11:22:42 2025 kern.info kernel: [  194.039888] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 4 is up
Thu Feb  6 11:22:46 2025 daemon.info hostapd: phy1-ap0: STA 24:18:c6:be:e9:1c IEEE 802.11: authenticated
Thu Feb  6 11:22:46 2025 daemon.info hostapd: phy1-ap0: STA 24:18:c6:be:e9:1c IEEE 802.11: associated (aid 6)
Thu Feb  6 11:22:46 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 24:18:c6:be:e9:1c auth_alg=open
Thu Feb  6 11:22:46 2025 daemon.info hostapd: phy1-ap0: STA 24:18:c6:be:e9:1c WPA: pairwise key handshake completed (RSN)
Thu Feb  6 11:22:46 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 24:18:c6:be:e9:1c
Thu Feb  6 11:22:47 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.0.179 24:18:c6:be:e9:1c
Thu Feb  6 11:22:47 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.0.179 24:18:c6:be:e9:1c
Thu Feb  6 11:25:02 2025 user.info adblock-4.2.4-r1[3220]: download of 'adaway' failed, url: https://raw.githubusercontent.com/AdAway/adaway.github.io/master/hosts.txt, rule: /^127\.0\.0\.1[[:space:]]+([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($2)}, categories: -, rc: 4, log: Downloading 'https://raw.githubusercontent.com/AdAway/adaway.github.io/master/hosts.txt' Failed to send request: Operation not permitted
Thu Feb  6 11:25:07 2025 user.info adblock-4.2.4-r1[3220]: download of 'adguard' failed, url: https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt, rule: BEGIN{FS="[/|^|\r]"}/^\|\|([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+[\/\^\r]+$/{print tolower($3)}, categories: -, rc: 4, log: Downloading 'https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt' Failed to send request: Operation not permitted
Thu Feb  6 11:25:12 2025 user.info adblock-4.2.4-r1[3220]: download of 'disconnect' failed, url: https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 4, log: Downloading 'https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt' Failed to send request: Operation not permitted
Thu Feb  6 11:25:17 2025 user.info adblock-4.2.4-r1[3220]: download of 'yoyo' failed, url: https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&showintro=0&mimetype=plaintext, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 4, log: Downloading 'https://pgl.yoyo.org/adservers/serverlist.php?hostformat=nohtml&showintro=0&mimetype=plaintext' Failed to send request: Operation not permitted
Thu Feb  6 11:25:18 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 150
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.0.100 -- 192.168.0.199, lease time 1d
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:25:22 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:25:22 2025 daemon.warn dnsmasq[1]: ignoring nameserver 127.0.0.1 - local interface
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:25:22 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:25:47 2025 daemon.err uhttpd[1817]: [info] luci: accepted login on / for root from 192.168.0.5
Thu Feb  6 11:26:56 2025 authpriv.info dropbear[5396]: Child connection from 192.168.0.5:1817
Thu Feb  6 11:27:00 2025 authpriv.notice dropbear[5396]: Password auth succeeded for 'root' from 192.168.0.5:1817
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Starting https-dns-proxy 2023.12.26-r2 instances ✓
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Updating dnsmasq config ✓
Thu Feb  6 11:27:23 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 150
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.0.100 -- 192.168.0.199, lease time 1d
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using nameserver 127.0.0.1#5053
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for use-application-dns.net
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using only locally-known addresses for mask-h2.icloud.com
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: using 2 more local addresses
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Thu Feb  6 11:27:28 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Restarting dnsmasq on_config_update ✓
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Setting trigger for wan ✓✓
Thu Feb  6 11:27:35 2025 user.info adblock-4.2.4-r1[3220]: blocklist with overall 0 blocked domains loaded successfully (Netgear WNDR4300, ath79/nand, OpenWrt 24.10.0 r28427-6df0e3d02a )
Fri Feb  7 09:14:19 2025 cron.err crond[3930]: time disparity of 1304 minutes detected

@stangri
Copy link
Member

stangri commented Feb 7, 2025

Unfortunately, but still after a cold boot, the service does not start. Log below. Service launched manually (Thu Feb 6 11:27:23 2025). Service do not autostart after upgrade to 24.10, on 23.xx (and older) it has been flawlessly over the years.

The log you provided says otherwise:

Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Stopping https-dns-proxy 2023.12.26-r2 on_failed_health_check ✓
Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Setting trigger (on_boot) ✓
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Starting https-dns-proxy 2023.12.26-r2 instances ✓
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Updating dnsmasq config ✓
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Restarting dnsmasq on_config_update ✓
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Setting trigger for wan ✓✓

@p0k33m0n
Copy link

p0k33m0n commented Feb 7, 2025

Unfortunately, but still after a cold boot, the service does not start. Log below. Service launched manually (Thu Feb 6 11:27:23 2025). Service do not autostart after upgrade to 24.10, on 23.xx (and older) it has been flawlessly over the years.

The log you provided says otherwise:

Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Stopping https-dns-proxy 2023.12.26-r2 on_failed_health_check ✓
Thu Feb  6 11:20:32 2025 user.notice https-dns-proxy [2037]: Setting trigger (on_boot) ✓
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Starting https-dns-proxy 2023.12.26-r2 instances ✓
Thu Feb  6 11:27:23 2025 user.notice https-dns-proxy [5568]: Updating dnsmasq config ✓
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Restarting dnsmasq on_config_update ✓
Thu Feb  6 11:27:28 2025 user.notice https-dns-proxy [5568]: Setting trigger for wan ✓✓

Quote: service launched manually (Thu Feb 6 11:27:23 2025).

@stangri
Copy link
Member

stangri commented Feb 7, 2025

Quote: service launched manually (Thu Feb 6 11:27:23 2025).

Oh, right, should have noticed the time gap.

On the next reboot, before you manually start service, can you capture the output of: service https-dns-proxy info?

@tmcqueen-materials
Copy link

tmcqueen-materials commented Feb 8, 2025

@stangri : I am also seeing this issue. On boot I see two lines related to https-dns-proxy:

Fri Feb  7 22:12:22 2025 user.notice https-dns-proxy [4995]: Stopping https-dns-proxy 2023.12.26-r2 on_failed_health_check ✓
Fri Feb  7 22:12:22 2025 user.notice https-dns-proxy [4995]: Setting trigger (on_boot) ✓

And it is not running. As soon as I issue service https-dns-proxy restart, it properly starts and everything works fine.

It does look like there is some problem with the start script, since I see these errors when doing so:

Starting https-dns-proxy 2023.12.26-r2 instances /sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
✓/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
/sbin/uci: Invalid argument
✓
Setting trigger for wan ✓✓

While my uci configuration for it is pretty vanilla:

https-dns-proxy.config=main
https-dns-proxy.config.canary_domains_icloud='1'
https-dns-proxy.config.canary_domains_mozilla='1'
https-dns-proxy.config.dnsmasq_config_update='-'
https-dns-proxy.config.force_dns='1'
https-dns-proxy.config.force_dns_port='53' '853'
https-dns-proxy.config.procd_trigger_wan6='0'
https-dns-proxy.@https-dns-proxy[0]=https-dns-proxy
https-dns-proxy.@https-dns-proxy[0].bootstrap_dns='1.1.1.1,1.0.0.1'
https-dns-proxy.@https-dns-proxy[0].resolver_url='https://mozilla.cloudflare-dns.com/dns-query'
https-dns-proxy.@https-dns-proxy[0].listen_addr='127.0.0.1'
https-dns-proxy.@https-dns-proxy[0].listen_port='5053'
https-dns-proxy.@https-dns-proxy[0].user='nobody'
https-dns-proxy.@https-dns-proxy[0].group='nogroup'
https-dns-proxy.@https-dns-proxy[1]=https-dns-proxy
https-dns-proxy.@https-dns-proxy[1].bootstrap_dns='9.9.9.9'
https-dns-proxy.@https-dns-proxy[1].resolver_url='https://private.canadianshield.cira.ca/dns-query'
https-dns-proxy.@https-dns-proxy[1].listen_addr='127.0.0.1'
https-dns-proxy.@https-dns-proxy[1].listen_port='5054'
https-dns-proxy.@https-dns-proxy[1].user='nobody'
https-dns-proxy.@https-dns-proxy[1].group='nogroup'

As with others, adding sleep 10 && service https-dns-proxy restart to rc.local works around the issue.

Edit: here is the requested service https-dns-proxy info after boot before my restart:

{
	"https-dns-proxy": {
		"triggers": [
			[
				"interface.*.up",
				[
					[
						"run_script",
						"/etc/init.d/https-dns-proxy",
						"restart",
						"on_interface_up"
					]
				],
				5000
			]
		]
	}
}

@tmcqueen-materials
Copy link

So I think I know what is going on. The problems arise if the system resolver (dnsmasq/unbound/whatever) is manually configured to only use the https-dns-proxys as upstreams. The reason is that then this line:

https://github.com/openwrt/packages/blob/master/net/https-dns-proxy/files/etc/init.d/https-dns-proxy#L138

is always false because

https://github.com/openwrt/packages/blob/master/net/https-dns-proxy/files/etc/init.d/https-dns-proxy#L40

will never work because https-dns-proxy is not yet up and any dns resolution relies on https-dns-proxy being up.

I suspect the reason this sometimes works and sometimes doesnt across reboots is a race between interfaces coming up and the initial boot call for https-dns-proxy completing -- if the initial boot call for https-dns-proxy completes before all interfaces are up, then https-dns-proxy is restarted by the trigger once another interface is up, and that brings up https-dns-proxy. However, if all interfaces are up before the boot call completes, then https-dns-proxy never gets automatically restarted, and therefore gets left in the stopped state.

So the fix seems pretty straightforward: remove the resolveip check in the boot block, because it is not needed to bring up https-dns-proxy (as https-dns-proxy does its own bootstrap queries to bring things up...)

@p0k33m0n
Copy link

p0k33m0n commented Feb 8, 2025

service https-dns-proxy info

{
        "https-dns-proxy": {
                "triggers": [
                        [
                                "interface.*.up",
                                [
                                        [
                                                "run_script",
                                                "/etc/init.d/https-dns-proxy",
                                                "restart",
                                                "on_interface_up"
                                        ]
                                ],
                                5000
                        ]
                ]
        }
}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants