Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:22 user warn kernel: eth0: MAC Address: 1C:BD:B9:8A:84:55
Jan 1 00:00:22 user warn kernel: Broadcom BCM6358A1 USB Network Device v0.4 Dec 3 2010 19:12:21
Jan 1 00:00:22 user warn kernel: usb0: MAC Address: 1C BD B9 8A 84 56
Jan 1 00:00:22 user warn kernel: usb0: Host MAC Address: 1C BD B9 8A 84 57
Jan 1 00:00:22 user debug kernel: PCI: Setting latency timer of device 0000:00:01.0 to 64
Jan 1 00:00:22 user warn kernel: PCI: Enabling device 0000:00:01.0 (0004 -> 0006)
Jan 1 00:00:22 user warn kernel: wl: srom not detected, using main memory mapped srom info (wombo board)
Jan 1 00:00:22 user warn kernel: wl0: wlc_attach: use mac addr from the system pool by id: 0x776c0000
Jan 1 00:00:22 user warn kernel: wl0: MAC Address: 1C:BD:B9:8A:84:58
Jan 1 00:00:22 user warn kernel: wl0: Broadcom BCM4318 802.11 Wireless Controller 4.100.27.0.cpe2.1
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:22 user crit kernel: eth0 Link UP.
Jan 1 00:00:22 user warn kernel: BcmAdsl_Initialize=0xC006B808, g_pFnNotifyCallback=0xC0084834
Jan 1 00:00:22 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:22 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B78C1 0xDEADBEEF
Jan 1 00:00:22 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FFD3D4
Jan 1 00:00:22 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:22 user warn kernel: ATM proc init !!!
Jan 1 00:00:22 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:22 user warn kernel: ip_conntrack version 2.1 (253 buckets, 0 max) - 376 bytes per conntrack
Jan 1 00:00:22 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:22 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:22 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:22 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:22 user crit kernel: ADSL G.994 training
Jan 1 00:00:22 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:22 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:22 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(usb0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 1(usb0) entering forwarding state
Jan 1 00:00:22 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:22 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 3(wl0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 3(wl0) entering forwarding state
Jan 1 00:00:22 user info kernel: device nas_0_0_33 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 4(nas_0_0_33) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 4(nas_0_0_33) entering forwarding state
Jan 1 00:00:22 user info kernel: device usb0 left promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(usb0) entering disabled state
Jan 1 00:00:22 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 2(eth0) entering disabled state
Jan 1 00:00:22 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 3(wl0) entering disabled state
Jan 1 00:00:22 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(usb0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 1(usb0) entering forwarding state
Jan 1 00:00:22 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:22 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 3(wl0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 3(wl0) entering forwarding state
Jan 1 00:00:22 user debug syslog: sntp -s clock.fmt.he.net -s none -t "Moscow, St. Petersburg, Volgograd" &
Jan 1 00:00:22 user debug syslog: echo > /var/snmpd.conf
Jan 1 00:00:22 user debug syslog: echo > /var/hosts
Jan 1 00:00:23 user warn kernel:
Jan 1 00:00:23 user warn kernel: ioctl, p_name=diapd
Jan 1 00:00:23 user emerg kernel: gpio_fasync
Jan 1 00:00:23 user warn kernel: Pasync_queue->magic = 0x4601
Jan 1 00:00:23 user debug syslog: mount -o remount,size=1M /var
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/var/locks
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/private
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/lib/vfs
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/lib/pdb
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/lib/rpc
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/lib/atuh
Jan 1 00:00:23 user debug syslog: mkdir -p /var/samba/lib/config
Jan 1 00:00:23 user debug syslog: smbd -s /var/smb.conf
Jan 1 00:00:25 user debug syslog: nmbd -s /var/smb.conf
Jan 1 00:00:26 user crit kernel: ADSL G.992 started
Jan 1 00:00:26 user debug syslog: pppd plugin pppoe oldsession 286ed4105226/6e7a nas_0_0_33 nodetach user '7033180-1@jay' password ********** interface_name 0_0_33_1 usepeerdns refuse-eap persist lcp-echo-interval 30 holdoff 3 lcp-echo-fai
Jan 1 00:00:27 daemon info pppd[646]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Jan 1 00:00:27 daemon info pppd[646]: Plugin pppoe called.
Jan 1 00:00:27 user info kernel: br0: port 1(usb0) entering disabled state
Jan 1 00:00:29 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:33 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:34 user crit kernel: ADSL link up, interleaved, us=1024, ds=8000
Jan 1 00:00:34 user warn kernel: ADSL1 connection
Jan 1 00:00:35 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.11.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:35 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.11.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:57 daemon notice pppd[646]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:00:57 daemon info pppd[646]: Sent PADT
Jan 1 00:01:00 daemon info pppd[646]: PPP session is 648
Jan 1 00:01:00 daemon info pppd[646]: Using interface ppp0_0_33_1
Jan 1 00:01:00 daemon crit pppd[646]: Connect: ppp_0_0_33_1 <--> nas_0_0_33
Jan 1 00:01:00 daemon warn pppd[646]: Couldn't increase MRU to 1500
Jan 1 00:01:04 daemon info pppd[646]: Remote message: Authentication success,Welcome!
Jan 1 00:01:04 daemon notice pppd[646]: PAP authentication succeeded
Jan 1 00:01:04 daemon notice pppd[646]: peer from calling number 28:6E:D4:10:52:26 authorized
Jan 1 00:01:04 daemon notice pppd[646]: local IP address 109.184.228.74
Jan 1 00:01:04 daemon notice pppd[646]: remote IP address 109.184.128.1
Jan 1 00:01:04 daemon notice pppd[646]: primary DNS address 213.177.97.201
Jan 1 00:01:04 daemon notice pppd[646]: secondary DNS address 213.177.97.1
Jan 1 00:01:04 user debug syslog: kill -9 620
Jan 1 00:01:04 user debug syslog: echo > /var/hosts
Jan 1 00:01:04 user debug syslog: cp /proc/var/fyi/wan/ppp_0_0_33_1/dns /var/fyi/sys/dns
Jan 1 00:01:04 user debug syslog: cp /proc/var/fyi/wan/ppp_0_0_33_1/gateway /var/fyi/sys/gateway
Jan 1 00:01:04 user debug syslog: route add default gw 109.184.128.1 2>/dev/null
Jan 1 00:01:04 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:01:04 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:01:04 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:01:04 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:01:04 user debug syslog: echo 2000 > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:01:04 user debug syslog: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_generic_timeout
Jan 1 00:01:04 user debug syslog: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_established
Jan 1 00:01:04 user debug syslog: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_fin_wait
Jan 1 00:01:04 user debug syslog: echo 120 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_time_wait
Jan 1 00:01:04 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:01:04 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:01:04 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:01:04 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.11.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:01:05 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_1 -s 192.168.11.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:01:05 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.11.0/255.255.255.0 -j MASQUERADE
Jan 1 00:01:05 user debug syslog: kill -9 906
Jan 1 00:01:05 user debug syslog: echo > /var/hosts
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=194.54.160.5 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=32812 DF PROTO=TCP SPT=1926 DPT=33234 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=87.76.91.139 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=19097 DF PROTO=TCP SPT=65450 DPT=33234 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=31.133.75.2 DST=109.184.228.74 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=11844 DF PROTO=TCP SPT=61489 DPT=33234 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:01:05 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_1 -p tcp --dport 30005
Jan 1 00:01:05 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_1 -p tcp --dport 30005
Jan 1 00:01:05 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_1 -p udp -s 192.168.11.1/24 --dport 30006
Jan 1 00:01:05 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_1 -p udp -s 192.168.11.1/24 --dport 30006
Jan 1 00:01:05 daemon err user: No server certificate found. Skip checking on certificate.
Jan 1 00:01:05 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=109.172.15.27 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=14476 DF PROTO=TCP SPT=1580 DPT=33234 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:01:05 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:01:05 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=91.203.168.132 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=28607 DF PROTO=TCP SPT=49745 DPT=33234 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:01:05 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=194.54.160.5 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=32883 DF PROTO=TCP SPT=1926 DPT=33234 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:01:06 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=31.133.75.2 DST=109.184.228.74 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=11870 DF PROTO=TCP SPT=61489 DPT=33234 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:01:06 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.79.236.214 DST=109.184.228.74 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=16335 DF PROTO=TCP SPT=62282 DPT=33234 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:01:07 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl_authe
Jan 1 00:01:07 daemon debug user: wlctl -i wl0 assoclist > /var/wl_assoc
Jan 1 00:01:07 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl_autho
Jan 1 00:01:08 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:01:08 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:01:12 user warn kernel: do_page_fault() #2: sending SIGSEGV to dproxy for invalid read access from
Jan 1 00:01:12 user warn kernel: 00ff6723 (epc == 004027f8, ra == 00402e04)
Dec 16 22:51:34 user debug syslog: echo > /var/hosts
Dec 16 22:51:34 user debug syslog: kill -9 1056
Dec 16 22:51:34 user debug syslog: echo > /var/hosts
Dec 16 22:51:38 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl_authe
Dec 16 22:51:38 daemon debug user: wlctl -i wl0 assoclist > /var/wl_assoc
Dec 16 22:51:38 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl_autho
Dec 16 22:51:46 user warn kernel: do_page_fault() #2: sending SIGSEGV to dproxy for invalid read access from
Dec 16 22:51:46 user warn kernel: 00ff6723 (epc == 004027f8, ra == 00402e04)
Dec 16 23:01:02 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=46.72.20.1 DST=109.184.228.74 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=17406 DF PROTO=TCP SPT=62606 DPT=53583 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 16 23:05:50 user debug syslog: echo > /var/hosts
Dec 16 23:05:50 user debug syslog: kill -9 1106
Dec 16 23:05:50 user debug syslog: echo > /var/hosts
Dec 16 23:05:54 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl_authe
Dec 16 23:05:54 daemon debug user: wlctl -i wl0 assoclist > /var/wl_assoc
Dec 16 23:05:54 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl_autho