Firewall reloading every time when different lease time is obtained after udhcpc: sending renew

I have a router TP-Link TL-WDR4300 v1 with latest OpenWRT version 21.02
This is what I have in the system log every half an hour.

Thu Jan 27 18:20:12 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Thu Jan 27 18:20:12 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Thu Jan 27 18:20:12 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Thu Jan 27 18:20:18 2022 user.info adblock-4.1.3[19430]: adblock instance started ::: action: start, priority: 10, pid: 19430
Thu Jan 27 18:21:05 2022 daemon.info dnsmasq[19026]: exiting on receipt of SIGTERM

followed by a sequencing restart of all the daemons (adblock, dnsmasq, etc.) that depend on the previously restarted ones.
I can't understand the reason for this behaviour.
I'm certain this didn't happen several weeks ago but cannot say exactly when all of this started.

Your DHCP lease time is only 1 hour. This means that the DHCP renew will happen every 30 minutes (1/2 of the lease duration). If I had to guess, your actual IP address is indeed changing each time, causing the firewall to reload as a result.

You can confirm or refute my hypothesis by looking at sequential udhcpc "lease obtained" lines in the log... if the IP is the same, it shouldn't trigger a firewall reload. But if it is different, I think the FW reload is normal.

1 Like

Thanks for your answer.
Just checked the logs and the IP obtained is always the same.

daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200

Well, there goes my theory. My lease is always the same and it does not trigger the firewall reload. Hopefully someone else will have some insight into why yours is doing that.

The upstream DHCP lease time (and IP addresses issued) are outside your control... that is from your ISP. However, your router'd behavior should be predictable when the renewal occurs, and I don't know why it is triggering that reload.

This line could be a hint for the problem. What do you have in the log during the 10-15minutes before the firewall reload line?

Do you have any cron job for adblocker?

Adblock is about DNS and the dnsmasq daemon. No hard to see that it would trigger firewall restart. (And log pretty clearly talks about ifup action.)

I never said adblocker did the problem! I did say he has obviously have addons he doesn’t mention and I ask for the complete log sequence. He only showed the restart line but both you and me know the firewall doesn’t restart by it own so something happend before the restart.

Interesting...but I observe that this occurred when the NIC/VLAN connections goes up/down on my device.

But...my logs do not show a correlation to a DHCP renewal; mine was related to a physical flapping of the interface (done when I tested changing the MTU). None of my DHCP renewals caused it. I've also experienced it whenever I do something to take down the PHY (e.g. rebooting the connected switch, unplug of WAN from the ISP, unplug of LAN from switch, editing the tag ports on the switch, etc.).

I would agree.

  • What's the etc. part???
  • Does it have a trigger setting based on the WAN interface

I also have Adblock installed, so it's not that.

This is the whole log from the last night

Fri Jan 28 00:54:00 2022 daemon.info dnsmasq-dhcp[26140]: DHCPACK(br-lan) 192.168.1.4 xx:xx:xx:xx:xx:xx TV
Fri Jan 28 00:56:51 2022 daemon.info hostapd: wlan1: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 00:56:51 2022 daemon.info hostapd: wlan1: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 00:56:51 2022 daemon.info hostapd: wlan1: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 00:56:51 2022 daemon.info hostapd: wlan1: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 01:18:51 2022 daemon.info hostapd: wlan0: STA dxx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 01:18:51 2022 daemon.info hostapd: wlan0: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 01:18:52 2022 daemon.info hostapd: wlan0: STA xx:xx:xx:xx:xx:xx WPA: group key handshake completed (RSN)
Fri Jan 28 01:20:13 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 01:20:13 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3600
Fri Jan 28 01:20:14 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 01:20:19 2022 user.info adblock-4.1.3[26652]: adblock instance started ::: action: start, priority: 10, pid: 26652
Fri Jan 28 01:21:01 2022 daemon.info dnsmasq[26140]: exiting on receipt of SIGTERM
Fri Jan 28 01:21:02 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 01:21:02 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: Connected to system UBus
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: started, version 2.85 cachesize 150
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: DNS service limited to local subnets
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: UBus support enabled: connected to system bus
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq-dhcp[26995]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain test
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain onion
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain localhost
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain local
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain invalid
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain bind
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using standard nameservers for domain example.org
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain lan
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain test
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain onion
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain localhost
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain local
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain invalid
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain bind
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using standard nameservers for domain example.org
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using only locally-known addresses for domain lan
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: read /etc/hosts - 4 addresses
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq[26995]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 01:21:07 2022 daemon.info dnsmasq-dhcp[26995]: read /etc/ethers - 0 addresses
Fri Jan 28 01:21:08 2022 user.info adblock-4.1.3[26652]: blocklist with overall 48814 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 01:50:13 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 01:50:13 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 01:50:13 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 01:50:19 2022 user.info adblock-4.1.3[27402]: adblock instance started ::: action: start, priority: 10, pid: 27402
Fri Jan 28 01:51:00 2022 daemon.info dnsmasq[26995]: exiting on receipt of SIGTERM
Fri Jan 28 01:51:01 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 01:51:01 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: Connected to system UBus
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: started, version 2.85 cachesize 150
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: DNS service limited to local subnets
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: UBus support enabled: connected to system bus
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq-dhcp[27745]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain test
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain onion
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain localhost
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain local
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain invalid
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain bind
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using standard nameservers for domain example.org
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain lan
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain test
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain onion
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain localhost
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain local
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain invalid
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain bind
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using standard nameservers for domain example.org
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using only locally-known addresses for domain lan
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: read /etc/hosts - 4 addresses
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq[27745]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 01:51:06 2022 daemon.info dnsmasq-dhcp[27745]: read /etc/ethers - 0 addresses
Fri Jan 28 01:51:07 2022 user.info adblock-4.1.3[27402]: blocklist with overall 48814 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 01:53:19 2022 daemon.info dnsmasq-dhcp[27745]: DHCPREQUEST(br-lan) 192.168.1.106 xx:xx:xx:xx:xx:xx
Fri Jan 28 01:53:19 2022 daemon.info dnsmasq-dhcp[27745]: DHCPACK(br-lan) 192.168.1.106 xx:xx:xx:xx:xx:xx
Fri Jan 28 01:57:05 2022 kern.info kernel: [867648.654717] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is down
Fri Jan 28 01:57:12 2022 kern.info kernel: [867655.822212] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is up
Fri Jan 28 01:57:13 2022 kern.info kernel: [867656.846528] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is down
Fri Jan 28 01:57:16 2022 kern.info kernel: [867659.918158] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is up
Fri Jan 28 01:57:22 2022 kern.info kernel: [867666.062231] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is down
Fri Jan 28 01:57:25 2022 kern.info kernel: [867669.133845] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is up
Fri Jan 28 01:57:29 2022 daemon.info dnsmasq-dhcp[27745]: DHCPREQUEST(br-lan) 192.168.1.2 xx.xx.xx.xx.xx.xx
Fri Jan 28 01:57:29 2022 daemon.info dnsmasq-dhcp[27745]: DHCPACK(br-lan) 192.168.1.2 xx.xx.xx.xx.xx.xx
Fri Jan 28 01:58:00 2022 kern.info kernel: [867703.949180] Atheros AR8216/AR8236/AR8316 mdio.0:00: Port 5 is down
Fri Jan 28 02:05:02 2022 daemon.info dnsmasq-dhcp[27745]: DHCPREQUEST(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 02:05:02 2022 daemon.info dnsmasq-dhcp[27745]: DHCPACK(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 02:09:49 2022 authpriv.info dropbear[27878]: Child connection from xx.xx.xx.xx:yyyy
Fri Jan 28 02:09:49 2022 authpriv.notice dropbear[27878]: Pubkey auth succeeded for 'root' with key sha1!! xx.xx.xx.xx.xx.xx.xx.xx.xx from xx.xx.xx.xx:yyyy
Fri Jan 28 02:10:55 2022 user.info : luci: accepted login on / for root from 192.168.1.1
Fri Jan 28 02:44:21 2022 authpriv.info dropbear[27878]: Exit (root) from <xx.xx.xx.xx:yyyy>: Exited normally
Fri Jan 28 02:50:13 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 02:50:13 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3600
Fri Jan 28 02:50:13 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 02:50:19 2022 user.info adblock-4.1.3[28345]: adblock instance started ::: action: start, priority: 10, pid: 28345
Fri Jan 28 02:50:58 2022 daemon.info dnsmasq[27745]: exiting on receipt of SIGTERM
Fri Jan 28 02:50:58 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 02:50:58 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: Connected to system UBus
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: started, version 2.85 cachesize 150
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: DNS service limited to local subnets
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: UBus support enabled: connected to system bus
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq-dhcp[28688]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain test
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain onion
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain localhost
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain local
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain invalid
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain bind
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using standard nameservers for domain example.org
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain lan
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain test
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain onion
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain localhost
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain local
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain invalid
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain bind
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using standard nameservers for domain example.org
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using only locally-known addresses for domain lan
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: read /etc/hosts - 4 addresses
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq[28688]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 02:51:04 2022 daemon.info dnsmasq-dhcp[28688]: read /etc/ethers - 0 addresses
Fri Jan 28 02:51:05 2022 user.info adblock-4.1.3[28345]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 03:20:13 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 03:20:13 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 03:20:14 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 03:20:19 2022 user.info adblock-4.1.3[29095]: adblock instance started ::: action: start, priority: 10, pid: 29095
Fri Jan 28 03:20:59 2022 daemon.info dnsmasq[28688]: exiting on receipt of SIGTERM
Fri Jan 28 03:20:59 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 03:20:59 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: Connected to system UBus
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: started, version 2.85 cachesize 150
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: DNS service limited to local subnets
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: UBus support enabled: connected to system bus
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq-dhcp[29439]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain test
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain onion
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain localhost
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain local
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain invalid
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain bind
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using standard nameservers for domain example.org
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain lan
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain test
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain onion
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain localhost
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain local
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain invalid
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain bind
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using standard nameservers for domain example.org
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using only locally-known addresses for domain lan
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: read /etc/hosts - 4 addresses
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq[29439]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 03:21:05 2022 daemon.info dnsmasq-dhcp[29439]: read /etc/ethers - 0 addresses
Fri Jan 28 03:21:06 2022 user.info adblock-4.1.3[29095]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 03:54:49 2022 daemon.info dnsmasq-dhcp[29439]: DHCPREQUEST(br-lan) 192.168.1.124 xx:xx:xx:xx:xx:xx
Fri Jan 28 03:54:49 2022 daemon.info dnsmasq-dhcp[29439]: DHCPACK(br-lan) 192.168.1.124 xx:xx:xx:xx:xx:xx
Fri Jan 28 04:20:13 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 04:20:14 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3600
Fri Jan 28 04:20:14 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 04:20:20 2022 user.info adblock-4.1.3[29942]: adblock instance started ::: action: start, priority: 10, pid: 29942
Fri Jan 28 04:20:58 2022 daemon.info dnsmasq[29439]: exiting on receipt of SIGTERM
Fri Jan 28 04:20:59 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 04:20:59 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: Connected to system UBus
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: started, version 2.85 cachesize 150
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: DNS service limited to local subnets
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: UBus support enabled: connected to system bus
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq-dhcp[30285]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain test
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain onion
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain localhost
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain local
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain invalid
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain bind
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using standard nameservers for domain example.org
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain lan
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain test
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain onion
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain localhost
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain local
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain invalid
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain bind
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using standard nameservers for domain example.org
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using only locally-known addresses for domain lan
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: read /etc/hosts - 4 addresses
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq[30285]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 04:21:04 2022 daemon.info dnsmasq-dhcp[30285]: read /etc/ethers - 0 addresses
Fri Jan 28 04:21:05 2022 user.info adblock-4.1.3[29942]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 04:45:25 2022 daemon.info dnsmasq-dhcp[30285]: DHCPREQUEST(br-lan) 192.168.1.103 dxx:xx:xx:xx:xx:xx
Fri Jan 28 04:45:25 2022 daemon.info dnsmasq-dhcp[30285]: DHCPACK(br-lan) 192.168.1.103 dxx:xx:xx:xx:xx:xx
Fri Jan 28 04:46:55 2022 daemon.info dnsmasq-dhcp[30285]: DHCPREQUEST(br-lan) 192.168.1.120 xx:xx:xx:xx:xx:xx
Fri Jan 28 04:46:55 2022 daemon.info dnsmasq-dhcp[30285]: DHCPACK(br-lan) 192.168.1.120 xx:xx:xx:xx:xx:xx smartphone
Fri Jan 28 04:50:14 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 04:50:14 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 04:50:14 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 04:50:20 2022 user.info adblock-4.1.3[30692]: adblock instance started ::: action: start, priority: 10, pid: 30692
Fri Jan 28 04:51:00 2022 daemon.info dnsmasq[30285]: exiting on receipt of SIGTERM
Fri Jan 28 04:51:00 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 04:51:01 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: Connected to system UBus
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: started, version 2.85 cachesize 150
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: DNS service limited to local subnets
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: UBus support enabled: connected to system bus
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq-dhcp[31036]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain test
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain onion
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain localhost
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain local
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain invalid
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain bind
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using standard nameservers for domain example.org
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain lan
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain test
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain onion
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain localhost
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain local
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain invalid
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain bind
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using standard nameservers for domain example.org
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using only locally-known addresses for domain lan
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: read /etc/hosts - 4 addresses
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq[31036]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 04:51:06 2022 daemon.info dnsmasq-dhcp[31036]: read /etc/ethers - 0 addresses
Fri Jan 28 04:51:07 2022 user.info adblock-4.1.3[30692]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 05:09:29 2022 daemon.info dnsmasq-dhcp[31036]: DHCPREQUEST(br-lan) 192.168.1.122 xx:xx:xx:xx:xx:xx
Fri Jan 28 05:09:29 2022 daemon.info dnsmasq-dhcp[31036]: DHCPACK(br-lan) 192.168.1.122 xx:xx:xx:xx:xx:xx

I've redacted private data only.
I didn't mention in my first post that a week ago I've updated OpenWRT to OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb but the issue remained.

continue from previous post

Fri Jan 28 05:50:14 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 05:50:14 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3600
Fri Jan 28 05:50:15 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 05:50:20 2022 user.info adblock-4.1.3[31538]: adblock instance started ::: action: start, priority: 10, pid: 31538
Fri Jan 28 05:51:01 2022 daemon.info dnsmasq[31036]: exiting on receipt of SIGTERM
Fri Jan 28 05:51:02 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 05:51:02 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: Connected to system UBus
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: started, version 2.85 cachesize 150
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: DNS service limited to local subnets
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: UBus support enabled: connected to system bus
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq-dhcp[31881]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain test
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain onion
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain localhost
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain local
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain invalid
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain bind
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using standard nameservers for domain example.org
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain lan
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain test
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain onion
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain localhost
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain local
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain invalid
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain bind
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using standard nameservers for domain example.org
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using only locally-known addresses for domain lan
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: read /etc/hosts - 4 addresses
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq[31881]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 05:51:07 2022 daemon.info dnsmasq-dhcp[31881]: read /etc/ethers - 0 addresses
Fri Jan 28 05:51:08 2022 user.info adblock-4.1.3[31538]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 06:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 06:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 06:20:15 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 06:20:21 2022 user.info adblock-4.1.3[32288]: adblock instance started ::: action: start, priority: 10, pid: 32288
Fri Jan 28 06:20:59 2022 daemon.info dnsmasq[31881]: exiting on receipt of SIGTERM
Fri Jan 28 06:21:00 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 06:21:00 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: Connected to system UBus
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: started, version 2.85 cachesize 150
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: DNS service limited to local subnets
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: UBus support enabled: connected to system bus
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq-dhcp[32631]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain test
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain onion
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain localhost
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain local
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain invalid
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain bind
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using standard nameservers for domain example.org
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain lan
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain test
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain onion
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain localhost
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain local
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain invalid
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain bind
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using standard nameservers for domain example.org
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using only locally-known addresses for domain lan
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: read /etc/hosts - 4 addresses
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq[32631]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 06:21:05 2022 daemon.info dnsmasq-dhcp[32631]: read /etc/ethers - 0 addresses
Fri Jan 28 06:21:06 2022 user.info adblock-4.1.3[32288]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 06:21:20 2022 daemon.info dnsmasq-dhcp[32631]: DHCPREQUEST(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 06:21:20 2022 daemon.info dnsmasq-dhcp[32631]: DHCPACK(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 06:30:00 2022 cron.err crond[1851]: USER root pid 32735 cmd /etc/init.d/adblock restart
Fri Jan 28 06:30:01 2022 daemon.info dnsmasq[32631]: exiting on receipt of SIGTERM
Fri Jan 28 06:30:01 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 06:30:01 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: Connected to system UBus
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: started, version 2.85 cachesize 150
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: DNS service limited to local subnets
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: UBus support enabled: connected to system bus
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq-dhcp[573]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain test
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain onion
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain localhost
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain local
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain invalid
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain bind
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain lan
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain test
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain onion
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain localhost
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain local
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain invalid
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain bind
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using only locally-known addresses for domain lan
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: read /etc/hosts - 4 addresses
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq[573]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 06:30:06 2022 daemon.info dnsmasq-dhcp[573]: read /etc/ethers - 0 addresses
Fri Jan 28 06:30:06 2022 user.info adblock-4.1.3[328]: adblock instance started ::: action: restart, priority: 10, pid: 328
Fri Jan 28 06:30:46 2022 daemon.info dnsmasq[573]: exiting on receipt of SIGTERM
Fri Jan 28 06:30:46 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 06:30:46 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: Connected to system UBus
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: started, version 2.85 cachesize 150
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: DNS service limited to local subnets
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: UBus support enabled: connected to system bus
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq-dhcp[894]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain test
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain onion
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain localhost
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain local
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain invalid
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain bind
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using standard nameservers for domain example.org
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain lan
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain test
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain onion
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain localhost
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain local
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain invalid
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain bind
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using standard nameservers for domain example.org
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using only locally-known addresses for domain lan
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: read /etc/hosts - 4 addresses
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq[894]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 06:30:52 2022 daemon.info dnsmasq-dhcp[894]: read /etc/ethers - 0 addresses
Fri Jan 28 06:30:53 2022 user.info adblock-4.1.3[328]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 06:54:00 2022 daemon.info dnsmasq-dhcp[894]: DHCPREQUEST(br-lan) 192.168.1.4 xx:xx:xx:xx:xx:xx
Fri Jan 28 06:54:00 2022 daemon.info dnsmasq-dhcp[894]: DHCPACK(br-lan) 192.168.1.4 xx:xx:xx:xx:xx:xx TV
Fri Jan 28 07:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 07:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3601
Fri Jan 28 07:20:15 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 07:20:21 2022 user.info adblock-4.1.3[1370]: adblock instance started ::: action: start, priority: 10, pid: 1370
Fri Jan 28 07:21:00 2022 daemon.info dnsmasq[894]: exiting on receipt of SIGTERM
Fri Jan 28 07:21:01 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 07:21:01 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: Connected to system UBus
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: started, version 2.85 cachesize 150
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: DNS service limited to local subnets
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: UBus support enabled: connected to system bus
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq-dhcp[1717]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain test
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain onion
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain localhost
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain local
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain invalid
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain bind
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using standard nameservers for domain example.org
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain lan
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain test
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain onion
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain localhost
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain local
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain invalid
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain bind
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using standard nameservers for domain example.org
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using only locally-known addresses for domain lan
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: read /etc/hosts - 4 addresses
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq[1717]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 07:21:06 2022 daemon.info dnsmasq-dhcp[1717]: read /etc/ethers - 0 addresses
Fri Jan 28 07:21:07 2022 user.info adblock-4.1.3[1370]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 07:26:07 2022 daemon.info dnsmasq-dhcp[1717]: DHCPREQUEST(br-lan) 192.168.1.106 xx:xx:xx:xx:xx:xx
Fri Jan 28 07:26:07 2022 daemon.info dnsmasq-dhcp[1717]: DHCPACK(br-lan) 192.168.1.106 xx:xx:xx:xx:xx:xx
Fri Jan 28 07:30:03 2022 daemon.info hostapd: wlan0: STA xx.xx.xx.xx.xx.xx IEEE 802.11: authenticated
Fri Jan 28 07:30:03 2022 daemon.info hostapd: wlan0: STA xx.xx.xx.xx.xx.xx IEEE 802.11: associated (aid 1)
Fri Jan 28 07:30:03 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED xx.xx
Fri Jan 28 07:30:03 2022 daemon.info hostapd: wlan0: STA xx.xx WPA: pairwise key handshake completed (RSN)
Fri Jan 28 07:30:03 2022 daemon.info dnsmasq-dhcp[1717]: DHCPREQUEST(br-lan) 192.168.1.3 xx.xx.xx.xx.xx.xx
Fri Jan 28 07:30:03 2022 daemon.info dnsmasq-dhcp[1717]: DHCPACK(br-lan) 192.168.1.3 xx.xx.xx.xx.xx.xx desktop
Fri Jan 28 07:44:09 2022 daemon.notice hostapd: wlan0: STA-OPMODE-MAX-BW-CHANGED xx.xx.xx.xx.xx.xx 20
Fri Jan 28 07:44:11 2022 daemon.notice hostapd: wlan0: STA-OPMODE-MAX-BW-CHANGED xx.xx.xx.xx.xx.xx 40
Fri Jan 28 07:50:15 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 07:50:15 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 07:50:16 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 07:50:21 2022 user.info adblock-4.1.3[2118]: adblock instance started ::: action: start, priority: 10, pid: 2118
Fri Jan 28 07:51:00 2022 daemon.info dnsmasq[1717]: exiting on receipt of SIGTERM
Fri Jan 28 07:51:01 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 07:51:01 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: Connected to system UBus
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: started, version 2.85 cachesize 150
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: DNS service limited to local subnets
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: UBus support enabled: connected to system bus
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq-dhcp[2463]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain test
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain onion
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain localhost
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain local
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain invalid
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain bind
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using standard nameservers for domain example.org
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain lan
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain test
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain onion
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain localhost
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain local
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain invalid
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain bind
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using standard nameservers for domain example.org
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using only locally-known addresses for domain lan
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: read /etc/hosts - 4 addresses
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq[2463]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 07:51:06 2022 daemon.info dnsmasq-dhcp[2463]: read /etc/ethers - 0 addresses
Fri Jan 28 07:51:07 2022 user.info adblock-4.1.3[2118]: blocklist with overall 48821 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 08:46:16 2022 daemon.info dnsmasq-dhcp[2463]: DHCPDISCOVER(br-lan) xx.xx.xx.xx.xx.xx
Fri Jan 28 08:46:16 2022 daemon.info dnsmasq-dhcp[2463]: DHCPOFFER(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 08:46:16 2022 daemon.info dnsmasq-dhcp[2463]: DHCPDISCOVER(br-lan) xx.xx.xx.xx.xx.xx
Fri Jan 28 08:46:16 2022 daemon.info dnsmasq-dhcp[2463]: DHCPOFFER(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 08:46:17 2022 daemon.info dnsmasq-dhcp[2463]: DHCPREQUEST(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 08:46:17 2022 daemon.info dnsmasq-dhcp[2463]: DHCPACK(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 08:50:15 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 08:50:15 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 3600
Fri Jan 28 08:50:16 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 08:50:22 2022 user.info adblock-4.1.3[2969]: adblock instance started ::: action: start, priority: 10, pid: 2969
Fri Jan 28 08:51:03 2022 daemon.info dnsmasq[2463]: exiting on receipt of SIGTERM
Fri Jan 28 08:51:04 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 08:51:04 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: Connected to system UBus
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: started, version 2.85 cachesize 150
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: DNS service limited to local subnets
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: UBus support enabled: connected to system bus
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq-dhcp[3314]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain test
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain onion
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain localhost
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain local
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain invalid
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain bind
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using standard nameservers for domain example.org
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain lan
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain test
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain onion
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain localhost
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain local
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain invalid
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain bind
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using standard nameservers for domain example.org
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using only locally-known addresses for domain lan
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: read /etc/hosts - 4 addresses
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq[3314]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 08:51:09 2022 daemon.info dnsmasq-dhcp[3314]: read /etc/ethers - 0 addresses
Fri Jan 28 08:51:10 2022 user.info adblock-4.1.3[2969]: blocklist with overall 48832 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 09:02:48 2022 daemon.info dnsmasq-dhcp[3314]: DHCPDISCOVER(br-lan) xx:xx:xx:xx:xx:xx
Fri Jan 28 09:02:48 2022 daemon.info dnsmasq-dhcp[3314]: DHCPOFFER(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 09:02:49 2022 daemon.info dnsmasq-dhcp[3314]: DHCPREQUEST(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 09:02:49 2022 daemon.info dnsmasq-dhcp[3314]: DHCPACK(br-lan) 192.168.1.102 xx:xx:xx:xx:xx:xx
Fri Jan 28 09:07:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED xx:xx:xx:xx:xx:xx
Fri Jan 28 09:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: sending renew to xx.xx.32.1
Fri Jan 28 09:20:15 2022 daemon.notice netifd: wan (2326): udhcpc: lease of xx.xx.32.172 obtained, lease time 7200
Fri Jan 28 09:20:15 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Fri Jan 28 09:20:21 2022 user.info adblock-4.1.3[3713]: adblock instance started ::: action: start, priority: 10, pid: 3713
Fri Jan 28 09:21:04 2022 daemon.info dnsmasq[3314]: exiting on receipt of SIGTERM
Fri Jan 28 09:21:05 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Jan 28 09:21:05 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: Connected to system UBus
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: started, version 2.85 cachesize 150
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: DNS service limited to local subnets
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: UBus support enabled: connected to system bus
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq-dhcp[4064]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain test
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain onion
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain localhost
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain local
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain invalid
Fri Jan 28 09:21:10 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain bind
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using standard nameservers for domain example.org
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain lan
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain test
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain onion
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain localhost
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain local
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain invalid
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain bind
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using standard nameservers for domain example.org
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using only locally-known addresses for domain lan
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: using nameserver xx.xx.xx.xx#53
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: read /etc/hosts - 4 addresses
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq[4064]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Jan 28 09:21:11 2022 daemon.info dnsmasq-dhcp[4064]: read /etc/ethers - 0 addresses
Fri Jan 28 09:21:12 2022 user.info adblock-4.1.3[3713]: blocklist with overall 48832 blocked domains loaded successfully (TP-Link TL-WDR4300 v1, OpenWrt 21.02-SNAPSHOT r16471-cd5ba0cfbb)
Fri Jan 28 09:27:12 2022 daemon.info dnsmasq-dhcp[4064]: DHCPREQUEST(br-lan) 192.168.1.3 xx.xx.xx.xx.xx.xx
Fri Jan 28 09:27:12 2022 daemon.info dnsmasq-dhcp[4064]: DHCPACK(br-lan) 192.168.1.3 xx.xx.xx.xx.xx.xx desktop
Fri Jan 28 09:31:26 2022 daemon.info dnsmasq-dhcp[4064]: DHCPREQUEST(br-lan) 192.168.1.124 xx:xx:xx:xx:xx:xx
Fri Jan 28 09:50:51 2022 daemon.info dnsmasq-dhcp[4064]: DHCPDISCOVER(br-lan) xx.xx.xx.xx.xx.xx
Fri Jan 28 09:50:51 2022 daemon.info dnsmasq-dhcp[4064]: DHCPOFFER(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 09:50:53 2022 daemon.info dnsmasq-dhcp[4064]: DHCPDISCOVER(br-lan) xx.xx.xx.xx.xx.xx
Fri Jan 28 09:50:53 2022 daemon.info dnsmasq-dhcp[4064]: DHCPOFFER(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 09:50:54 2022 daemon.info dnsmasq-dhcp[4064]: DHCPREQUEST(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx
Fri Jan 28 09:50:54 2022 daemon.info dnsmasq-dhcp[4064]: DHCPACK(br-lan) 192.168.1.126 xx.xx.xx.xx.xx.xx

removed some daemon.notice hostapd: wlan1: AP-STA-CONNECTED messages to save space.

Wow...

I honestly cannot see anything but your DHCP renewal...so...

"Remained"?

Curious, what version were you running previously?

I don't think this is it...but I suggest:

  1. checking the cable between the OpenWrt and the ISP jack; if that doesn't work
  2. try version 21.02.1

Also I have a weird one:

  • stare at the ISP interface on your device and see if it in fact flaps every 30 minutes :man_shrugging:

The logs really make it seem that the ISP flaps the interface every 30 mins...how long have you observed this behavior???

The router previously had version 21.02.1
Honestly as I can remember this started with 21.02.1
Before that the router had current master snapshot for several months without all of this.

Is your Internet cable/DOCSIS-based?

SSH in to the router and run the following...

uci export network; uci export firewall; head -n -0 /etc/firewall.*

Redact any passwords and public IPs and post the results in preformatted text.

1 Like

@lleachii
It's fiber optics.
@anon89577378 here is the output

config interface 'loopback'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'
        option device 'lo'

config globals 'globals'
        option ula_prefix 'fdb5:b083:e3f7::/48'

config interface 'lan'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option device 'br-lan'

config interface 'wan'
        option proto 'dhcp'
        option device 'eth0.2'
        option hostname '*'
        option delegate '0'

config device 'wan_eth0_2_dev'
        option name 'eth0.2'
        option macaddr 'xx:xx:xx:xx'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '2 3 4 5 0t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '1 0t'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'eth0.1'

package firewall

config defaults
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option flow_offloading '1'

config zone
        option name 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        list network 'lan'

config zone
        option name 'wan'
        option output 'ACCEPT'
        option masq '1'
        option mtu_fix '1'
        option input 'DROP'
        option forward 'DROP'
        list network 'wan'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'
        option enabled '0'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fc00::/6'
        option dest_ip 'fc00::/6'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config rule
        option src 'wan'
        option dest_port '22'
        option target 'ACCEPT'
        list proto 'tcp'
        option name 'Allow-ssh-wan'
        option family 'ipv4'

config rule
        option name 'Support-UDP-Traceroute'
        option src 'wan'
        option dest_port '33434:33689'
        option proto 'udp'
        option family 'ipv4'
        option target 'REJECT'
        option enabled '0'

config include
        option path '/etc/firewall.user'

config rule
        option name 'Kids restriction'
        option src 'lan'
        option dest 'wan'
        option target 'REJECT'
        option enabled '0'

Do you happen to:

  • know what snapshot; and possibly
  • still have a copy???
  • and if not...have an estimated date you downloaded it?

Reasons:

  • if there was a change, the serial number will allow us to consult the Master software's running change log (there's even a way to cross reference different ones; I'm sure others know how)
  • you can re-install it and see if the issue disappears

The reason is that the WAN was down.

Reloading firewall due to ifupdate of wan

If you are using IPv6, try turning off flow offloading.

I have backup of firmware images from one year ago but I don't know if I can downgrade keeping the settings. The router is on remote location and if I reset the settings to default I'll have to take more actions to recover the connection.

That's clear to me, but why it happens at a regular pattern bothers me.

1 Like

Could coincide with the lease renewal for the WAN IP.

1 Like