quant88
Regular Contributor
		Code:
	
	admin@RT-AC88U-D360:/tmp/home/root# pixelserv-tls -B                         CERT_PATH: /opt/var/cache/pixelserv
CERT_FILE: _.bing.com
 1. generate cert to disk: 544.342 ms   load from disk: 8.402 ms
 2. generate cert to disk: 641.233 ms   load from disk: 8.381 ms
 3. generate cert to disk: 314.647 ms   load from disk: 8.353 ms
 4. generate cert to disk: 333.169 ms   load from disk: 8.368 ms
 5. generate cert to disk: 426.173 ms   load from disk: 8.368 ms
 6. generate cert to disk: 415.442 ms   load from disk: 8.330 ms
 7. generate cert to disk: 413.584 ms   load from disk: 8.427 ms
 8. generate cert to disk: 440.865 ms   load from disk: 8.318 ms
 9. generate cert to disk: 422.609 ms   load from disk: 8.340 ms
10. generate cert to disk: 902.672 ms   load from disk: 8.367 ms
generate to disk average: 485.474 ms
  load from disk average: 8.365 ms
admin@RT-AC88U-D360:/tmp/home/root# 
	
 
 
		 
 
		 
 
		 :
: 
		 
 
		 
 
		
 
 
		 for the good, bad, and ugly.  Interestingly, this capture is not a good indicator of normal LAN use, but rather kids playing some games with discord and other streaming services over a 2-hour period.  In the following 24 hour span from the logs above, I am now at req 174725 compared to the 162452 previously.  I think that it would be necessary to have a larger sample size, but your log level 4 recommendation with syslog-ng will be my next foray.  Using TCPView, I was able to see the process with significant post data and it was what I expected from their use, nothing nefarious at least, and the blocking of it is consistent with their complaint of what we block on our home network
 for the good, bad, and ugly.  Interestingly, this capture is not a good indicator of normal LAN use, but rather kids playing some games with discord and other streaming services over a 2-hour period.  In the following 24 hour span from the logs above, I am now at req 174725 compared to the 162452 previously.  I think that it would be necessary to have a larger sample size, but your log level 4 recommendation with syslog-ng will be my next foray.  Using TCPView, I was able to see the process with significant post data and it was what I expected from their use, nothing nefarious at least, and the blocking of it is consistent with their complaint of what we block on our home network  .
.

 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		