Tue Jan 22 20:08:30 2019 daemon.notice pppd[19804]: Connect: pppoe-wan <--> eth0.2 Tue Jan 22 20:08:30 2019 daemon.info pppd[19804]: CHAP authentication failed: bad username or password Tue Jan 22 20:08:30 2019 daemon.err pppd[19804]: CHAP authentication failed Tue Jan 22 20:08:30 2019 daemon.notice pppd[19804]: Connection terminated. Tue Jan 22 20:08:30 2019 daemon.info pppd[19804]: Exit. Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' is now down Tue Jan 22 20:08:30 2019 kern.info kernel: [ 169.576000] device going down notification eth0.2 Tue Jan 22 20:08:30 2019 kern.info kernel: [ 169.576000] device going down notification eth0.2 Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' is disabled Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' is enabled Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' is setting up now Tue Jan 22 20:08:30 2019 daemon.notice netifd: VLAN 'eth0.2' link is down Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' has link connectivity loss Tue Jan 22 20:08:30 2019 daemon.notice netifd: VLAN 'eth0.2' link is up Tue Jan 22 20:08:30 2019 daemon.notice netifd: Interface 'wan' has link connectivity Tue Jan 22 20:08:30 2019 daemon.info pppd[19896]: Plugin rp-pppoe.so loaded. Tue Jan 22 20:08:30 2019 daemon.info pppd[19896]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.6 Tue Jan 22 20:08:30 2019 daemon.notice pppd[19896]: pppd 2.4.6 started by root, uid 0 Tue Jan 22 20:08:30 2019 daemon.info pppd[19896]: PPP session is 64826 Tue Jan 22 20:08:30 2019 daemon.warn pppd[19896]: Connected to 1c:7e:e5:19:07:53 via interface eth0.2 Tue Jan 22 20:08:30 2019 daemon.info pppd[19896]: Using interface pppoe-wan Tue Jan 22 20:08:30 2019 daemon.notice pppd[19896]: Connect: pppoe-wan <--> eth0.2 Tue Jan 22 20:08:31 2019 daemon.info pppd[19896]: Remote message: Login incorrect Tue Jan 22 20:08:31 2019 daemon.err pppd[19896]: PAP authentication failed Tue Jan 22 20:08:31 2019 daemon.notice pppd[19896]: Connection terminated. Tue Jan 22 20:08:31 2019 daemon.info pppd[19896]: Exit. Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' is now down Tue Jan 22 20:08:31 2019 kern.info kernel: [ 170.932000] device going down notification eth0.2 Tue Jan 22 20:08:31 2019 kern.info kernel: [ 170.932000] device going down notification eth0.2 Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' is disabled Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' is enabled Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' is setting up now Tue Jan 22 20:08:31 2019 daemon.notice netifd: VLAN 'eth0.2' link is down Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' has link connectivity loss Tue Jan 22 20:08:31 2019 daemon.notice netifd: VLAN 'eth0.2' link is up Tue Jan 22 20:08:31 2019 daemon.notice netifd: Interface 'wan' has link connectivity Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: Plugin rp-pppoe.so loaded. Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.6 Tue Jan 22 20:08:32 2019 daemon.notice pppd[20020]: pppd 2.4.6 started by root, uid 0 Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: PPP session is 20215 Tue Jan 22 20:08:32 2019 daemon.warn pppd[20020]: Connected to a0:36:9f:02:e6:14 via interface eth0.2 Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: Using interface pppoe-wan Tue Jan 22 20:08:32 2019 daemon.notice pppd[20020]: Connect: pppoe-wan <--> eth0.2 Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: CHAP authentication failed: bad username or password Tue Jan 22 20:08:32 2019 daemon.err pppd[20020]: CHAP authentication failed Tue Jan 22 20:08:32 2019 daemon.notice pppd[20020]: Connection terminated. Tue Jan 22 20:08:32 2019 daemon.info pppd[20020]: Exit. Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' is now down Tue Jan 22 20:08:32 2019 kern.info kernel: [ 171.504000] device going down notification eth0.2 Tue Jan 22 20:08:32 2019 kern.info kernel: [ 171.504000] device going down notification eth0.2 Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' is disabled Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' is enabled Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' is setting up now Tue Jan 22 20:08:32 2019 daemon.notice netifd: VLAN 'eth0.2' link is down Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' has link connectivity loss Tue Jan 22 20:08:32 2019 daemon.notice netifd: VLAN 'eth0.2' link is up Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' has link connectivity Tue Jan 22 20:08:32 2019 daemon.info pppd[20110]: Plugin rp-pppoe.so loaded. Tue Jan 22 20:08:32 2019 daemon.info pppd[20110]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.6 Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: pppd 2.4.6 started by root, uid 0 Tue Jan 22 20:08:32 2019 daemon.info pppd[20110]: PPP session is 22415 Tue Jan 22 20:08:32 2019 daemon.warn pppd[20110]: Connected to 4c:5e:0c:02:75:c8 via interface eth0.2 Tue Jan 22 20:08:32 2019 daemon.info pppd[20110]: Using interface pppoe-wan Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: Connect: pppoe-wan <--> eth0.2 Tue Jan 22 20:08:32 2019 daemon.info pppd[20110]: Remote message: Login ok Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: PAP authentication succeeded Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: peer from calling number 4C:5E:0C:02:75:C8 authorized Tue Jan 22 20:08:32 2019 daemon.err miniupnpd[7933]: Failed to get IP for interface pppoe-wan Tue Jan 22 20:08:32 2019 daemon.warn miniupnpd[7933]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping Tue Jan 22 20:08:32 2019 daemon.err miniupnpd[7933]: Failed to get IP for interface pppoe-wan Tue Jan 22 20:08:32 2019 daemon.warn miniupnpd[7933]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: local IP address 27.106.95.36 Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: remote IP address 183.87.101.254 Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: primary DNS address 120.138.96.18 Tue Jan 22 20:08:32 2019 daemon.notice pppd[20110]: secondary DNS address 120.138.98.18 Tue Jan 22 20:08:32 2019 daemon.notice netifd: Network device 'pppoe-wan' link is up Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan6' is enabled Tue Jan 22 20:08:32 2019 daemon.notice netifd: Network alias 'pppoe-wan' link is up Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan6' has link connectivity Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan6' is setting up now Tue Jan 22 20:08:32 2019 daemon.notice netifd: Interface 'wan' is now up Tue Jan 22 20:08:32 2019 user.info com.netdumasoftware.qos: hotplug interface wan Tue Jan 22 20:08:33 2019 daemon.notice odhcp6c[20168]: (re)starting transaction on pppoe-wan Tue Jan 22 20:08:33 2019 daemon.notice odhcp6c[20168]: Starting SOLICIT transaction (timeout 4294967295s, max rc 0) Tue Jan 22 20:08:33 2019 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan) Tue Jan 22 20:08:33 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: authenticated Tue Jan 22 20:08:33 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: associated (aid 3) Tue Jan 22 20:08:36 2019 daemon.info dnsmasq[7846]: reading /tmp/resolv.conf.auto Tue Jan 22 20:08:36 2019 daemon.info dnsmasq[7846]: using local addresses only for domain lan Tue Jan 22 20:08:36 2019 daemon.info dnsmasq[7846]: using nameserver 120.138.96.18#53 Tue Jan 22 20:08:36 2019 daemon.info dnsmasq[7846]: using nameserver 120.138.98.18#53 Tue Jan 22 20:08:42 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: deauthenticated due to local deauth request Tue Jan 22 20:08:52 2019 daemon.info dnsmasq-dhcp[7846]: DHCPINFORM(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc Tue Jan 22 20:08:52 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc My-PC Tue Jan 22 20:08:52 2019 user.info com.netdumasoftware.neighwatch: DHCP del event. Tue Jan 22 20:08:52 2019 user.info com.netdumasoftware.neighwatch: DHCP del event. Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:09:45 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: authenticated Tue Jan 22 20:09:45 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: associated (aid 3) Tue Jan 22 20:09:54 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: deauthenticated due to local deauth request Tue Jan 22 20:10:35 2019 daemon.info dnsmasq-dhcp[7846]: DHCPINFORM(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc Tue Jan 22 20:10:35 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc My-PC Tue Jan 22 20:10:44 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:11:29 2019 user.warn com.netdumasoftware.settings: Error opening wireless-mirror with error wireless-mirror: No such file or directory. Tue Jan 22 20:11:44 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.424000] device wlan0 left promiscuous mode Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.424000] br-lan: port 2(wlan0) entered disabled state Tue Jan 22 20:11:47 2019 daemon.notice netifd: Network device 'wlan0' link is down Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.452000] device going down notification wlan0 Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.464000] device going down notification wlan0 Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.968000] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.992000] device wlan0 entered promiscuous mode Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.992000] br-lan: port 2(wlan0) entered forwarding state Tue Jan 22 20:11:47 2019 kern.info kernel: [ 366.992000] br-lan: port 2(wlan0) entered forwarding state Tue Jan 22 20:11:48 2019 kern.info kernel: [ 367.224000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.procmanager: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.systeminfo: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.neighwatch: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.desktop: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.settings: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.qos: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.rappstore: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.autoadmin: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info syslog: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.devicemanager: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 user.info com.netdumasoftware.networkmonitor: Ubus object 'hostapd.wlan0' added, attempting to bind pending Tue Jan 22 20:11:48 2019 daemon.notice netifd: Network device 'wlan0' link is up Tue Jan 22 20:11:49 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: authenticated Tue Jan 22 20:11:49 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: associated (aid 1) Tue Jan 22 20:11:49 2019 kern.info kernel: [ 368.996000] br-lan: port 2(wlan0) entered forwarding state Tue Jan 22 20:11:54 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: authenticated Tue Jan 22 20:11:54 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: associated (aid 1) Tue Jan 22 20:11:58 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: authenticated Tue Jan 22 20:11:58 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: associated (aid 1) Tue Jan 22 20:12:02 2019 daemon.info hostapd: wlan0: STA 90:e7:c4:11:e2:6c IEEE 802.11: authenticated Tue Jan 22 20:12:02 2019 daemon.info hostapd: wlan0: STA 90:e7:c4:11:e2:6c IEEE 802.11: associated (aid 2) Tue Jan 22 20:12:02 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: authenticated Tue Jan 22 20:12:02 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: associated (aid 1) Tue Jan 22 20:12:09 2019 daemon.warn odhcpd[831]: Failed to send to ff02::1%br-lan (Operation not permitted) Tue Jan 22 20:12:10 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: authenticated Tue Jan 22 20:12:10 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc IEEE 802.11: associated (aid 1) Tue Jan 22 20:12:10 2019 daemon.info hostapd: wlan0: STA a0:88:b4:a2:f6:dc WPA: pairwise key handshake completed (RSN) Tue Jan 22 20:12:10 2019 daemon.info dnsmasq-dhcp[7846]: DHCPREQUEST(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc Tue Jan 22 20:12:10 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc My-PC Tue Jan 22 20:12:10 2019 user.info com.netdumasoftware.neighwatch: DHCP new event. Tue Jan 22 20:12:10 2019 user.info com.netdumasoftware.neighwatch: DHCP new lease allocated. Tue Jan 22 20:12:11 2019 daemon.info hostapd: wlan0: STA 90:e7:c4:11:e2:6c IEEE 802.11: deauthenticated due to local deauth request Tue Jan 22 20:12:12 2019 daemon.info hostapd: wlan0: STA bc:d1:1f:be:33:ac IEEE 802.11: authenticated Tue Jan 22 20:12:12 2019 daemon.info hostapd: wlan0: STA bc:d1:1f:be:33:ac IEEE 802.11: associated (aid 2) Tue Jan 22 20:12:12 2019 daemon.info hostapd: wlan0: STA bc:d1:1f:be:33:ac WPA: pairwise key handshake completed (RSN) Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPDISCOVER(br-lan) bc:d1:1f:be:33:ac Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPOFFER(br-lan) 192.168.88.226 bc:d1:1f:be:33:ac Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPINFORM(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.140 a0:88:b4:a2:f6:dc My-PC Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPDISCOVER(br-lan) bc:d1:1f:be:33:ac Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPOFFER(br-lan) 192.168.88.226 bc:d1:1f:be:33:ac Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPREQUEST(br-lan) 192.168.88.226 bc:d1:1f:be:33:ac Tue Jan 22 20:12:16 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.226 bc:d1:1f:be:33:ac Galaxy-A7-2016 Tue Jan 22 20:12:16 2019 user.info com.netdumasoftware.neighwatch: DHCP new event. Tue Jan 22 20:12:16 2019 user.info com.netdumasoftware.neighwatch: DHCP new lease allocated. Tue Jan 22 20:12:16 2019 user.info com.netdumasoftware.qos: applying qos for zone wan Tue Jan 22 20:12:16 2019 user.info com.netdumasoftware.qos: applying qos for zone lan Tue Jan 22 20:12:25 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: authenticated Tue Jan 22 20:12:25 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb IEEE 802.11: associated (aid 3) Tue Jan 22 20:12:25 2019 daemon.info hostapd: wlan0: STA d0:22:be:94:fb:bb WPA: pairwise key handshake completed (RSN) Tue Jan 22 20:12:26 2019 daemon.info dnsmasq-dhcp[7846]: DHCPREQUEST(br-lan) 192.168.88.197 d0:22:be:94:fb:bb Tue Jan 22 20:12:26 2019 daemon.info dnsmasq-dhcp[7846]: DHCPACK(br-lan) 192.168.88.197 d0:22:be:94:fb:bb android-240430f4df637aef Tue Jan 22 20:12:26 2019 user.info com.netdumasoftware.neighwatch: DHCP new event. Tue Jan 22 20:12:26 2019 user.info com.netdumasoftware.neighwatch: DHCP new lease allocated. Tue Jan 22 20:12:26 2019 user.info com.netdumasoftware.qos: applying qos for zone wan Tue Jan 22 20:12:26 2019 user.info com.netdumasoftware.qos: applying qos for zone lan Tue Jan 22 20:12:40 2019 user.warn com.netdumasoftware.settings: Error opening wireless-mirror with error wireless-mirror: No such file or directory. Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:13:44 2019 kern.info dpiclass-daemon: Kill flow due to timeout Tue Jan 22 20:14:14 2019 kern.info dpiclass-daemon: Kill flow due to timeout