Снова было подвисание. После перезагрузки соединение восстановилось, но в логе опять ошибки:
Date/Time Facility Severity Message
Jan 1 00:00:29 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:29 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:29 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:29 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:29 user info kernel: Freeing unused kernel memory: 72k freed
Jan 1 00:00:29 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:29 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:29 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:29 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:29 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:29 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Jan 8 2010 14:51:54
Jan 1 00:00:29 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:29 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:29 user warn kernel: eth0: MAC Address: 00:19:5B:42:D5:19
Jan 1 00:00:29 user debug kernel: PCI: Setting latency timer of device 0000:00:01.0 to 64
Jan 1 00:00:29 user warn kernel: PCI: Enabling device 0000:00:01.0 (0004 -> 0006)
Jan 1 00:00:29 user warn kernel: wl0: Broadcom BCM4329 802.11 Wireless Controller 4.174.64.12.cpe1.1
Jan 1 00:00:29 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:29 user crit kernel: eth0 Link UP.
Jan 1 00:00:29 user warn kernel: BcmAdsl_Initialize=0xC00613F8, g_pFnNotifyCallback=0xC0079C74
Jan 1 00:00:29 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:29 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B79A7 0xDEADBEEF
Jan 1 00:00:29 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FFBD24
Jan 1 00:00:29 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:29 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:29 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:29 user warn kernel: ip_conntrack version 2.1 (253 buckets, 0 max) - 368 bytes per conntrack
Jan 1 00:00:29 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:29 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:29 user crit kernel: ADSL G.994 training
Jan 1 00:00:29 user warn kernel: ip_conntrack_dns: init
Jan 1 00:00:29 user warn kernel: ipt_time loading
Jan 1 00:00:29 user warn kernel: ip_nat_dns: init
Jan 1 00:00:29 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:29 user crit kernel: ADSL G.992 started
Jan 1 00:00:29 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:29 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:29 user info kernel: g state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:29 user info kernel: device wl0.1 entered promiscuous mode
Jan 1 00:00:29 user info kernel: device wl0.2 entered promiscuous mode
Jan 1 00:00:29 user info kernel: device wl0.3 entered promiscuous mode
Jan 1 00:00:29 user crit kernel: ADSL link up, interleaved, us=763, ds=5472
Jan 1 00:00:29 user info kernel: device nas_0_35 entered promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 6(nas_0_35) entering learning state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 6(nas_0_35) entering forwarding state
Jan 1 00:00:29 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering disabled state
Jan 1 00:00:29 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:29 user info kernel: device wl0.1 left promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 3(wl0.1) entering disabled state
Jan 1 00:00:29 user info kernel: device wl0.1 entered promiscuous mode
Jan 1 00:00:29 user info kernel: device wl0.2 left promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 4(wl0.2) entering disabled state
Jan 1 00:00:29 user info kernel: device wl0.2 entered promiscuous mode
Jan 1 00:00:29 user info kernel: device wl0.3 left promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 5(wl0.3) entering disabled state
Jan 1 00:00:29 user info kernel: device wl0.3 entered promiscuous mode
Jan 1 00:00:29 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:00:29 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:29 user debug syslog: snmp -f &
Jan 1 00:00:30 user debug syslog: fwscheduler
Jan 1 00:00:30 user debug syslog: pppd plugin pppoe nas_0_35 linkname nas_0_35 interface_name 0_35_1 nodetach user ptn password ptn debug persist mtu 1492 usepeerdns refuse-eap lcp-echo-interval 15 lcp-echo-failure 4 holdoff 3 oldsession 00
Jan 1 00:00:31 daemon info pppd[805]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Jan 1 00:00:31 daemon info pppd[805]: Plugin pppoe called.
Jan 1 00:00:31 daemon notice pppd[805]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:00:31 daemon err pppd[805]: Failed to create /etc/pppmsg: No such file or directory
Jan 1 00:00:31 user debug syslog: iptables -t nat -I DNS_RELAY 1 -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:32 daemon info pppd[805]: Sent PADT
Jan 1 00:00:32 daemon err pppd[805]: PADS: System-Error: No resources
Jan 1 00:00:32 daemon info pppd[805]: PPP session is 0
Jan 1 00:00:32 daemon err pppd[805]: Access concentrator used a session value of 0 -- the AC is violating RFC 2516
Jan 1 00:00:32 daemon err pppd[805]: Couldn't get channel number: Transport endpoint is not connected
Jan 1 00:00:36 daemon debug pppd[805]: PADS: Service-Name: ''
Jan 1 00:00:36 daemon info pppd[805]: PPP session is 943
Jan 1 00:00:36 daemon debug pppd[805]: using channel 1
Jan 1 00:00:36 daemon info pppd[805]: Using interface ppp_0_35_1
Jan 1 00:00:36 daemon notice pppd[805]: Connect: ppp_0_35_1 <--> nas_0_35
Jan 1 00:00:36 daemon warn pppd[805]: Couldn't increase MTU to 1500
Jan 1 00:00:36 daemon warn pppd[805]: Couldn't increase MRU to 1500
Jan 1 00:00:36 daemon debug pppd[805]: sent [LCP ConfReq id=0x1 ]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [LCP ConfReq id=0x1a ]
Jan 1 00:00:36 daemon debug pppd[805]: sent [LCP ConfAck id=0x1a ]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [LCP ConfAck id=0x1 ]
Jan 1 00:00:36 daemon warn pppd[805]: Couldn't increase MRU to 1500
Jan 1 00:00:36 daemon debug pppd[805]: sent [LCP EchoReq id=0x0 magic=0xc8fc70f6]
Jan 1 00:00:36 daemon debug pppd[805]: sent [PAP AuthReq id=0x1 user="ptn" password=]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [LCP EchoRep id=0x0 magic=0x67755731]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [PAP AuthAck id=0x1 ""]
Jan 1 00:00:36 daemon notice pppd[805]: PAP authentication succeeded
Jan 1 00:00:36 daemon notice pppd[805]: peer from calling number 00:90:1A:41:FB:83 authorized
Jan 1 00:00:36 daemon debug pppd[805]: sent [CCP ConfReq id=0x1 ]
Jan 1 00:00:36 daemon debug pppd[805]: sent [IPCP ConfReq id=0x1 ]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [LCP ProtRej id=0x1b 80 fd 01 01 00 0a 12 06 00 00 00 01]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [IPCP ConfNak id=0x1 ]
Jan 1 00:00:36 daemon debug pppd[805]: sent [IPCP ConfReq id=0x2 ]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [IPCP ConfAck id=0x2 ]
Jan 1 00:00:36 daemon debug pppd[805]: rcvd [IPCP ConfReq id=0xef ]
Jan 1 00:00:36 daemon debug pppd[805]: sent [IPCP ConfAck id=0xef ]
Jan 1 00:00:36 daemon notice pppd[805]: local IP address 78.37.236.227
Jan 1 00:00:36 daemon notice pppd[805]: remote IP address 78.37.192.1
Jan 1 00:00:36 daemon notice pppd[805]: primary DNS address 213.158.7.2
Jan 1 00:00:36 daemon notice pppd[805]: secondary DNS address 212.48.193.37
Jan 1 00:00:36 user debug syslog: ifconfig ppp_0_35_1 mtu 1492 &
Jan 1 00:00:37 daemon debug pppd[805]: Script /etc/ppp/ip-up started (pid 901)
Jan 1 00:00:37 daemon debug pppd[805]: Script /etc/ppp/ip-up finished (pid 901), status = 0x0
Jan 1 00:00:39 user debug syslog: ddnsd /var/ddnsd.cfg /var/ddnsd.cache &
Jan 1 00:00:39 user debug syslog: route add default dev ppp_0_35_1 2>/dev/null
Jan 1 00:00:39 user debug syslog: route add -net netmask 255.255.255.255 dev ppp_0_35_1 2>/dev/null
Jan 1 00:00:39 user debug syslog: iptables -F CH_TCPMSS
Jan 1 00:00:39 user debug syslog: iptables -A CH_TCPMSS -o ppp_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:39 user debug syslog: iptables -A CH_TCPMSS -i ppp_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:39 user debug syslog: iptables -A CH_TCPMSS -j RETURN
Jan 1 00:00:39 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:39 user debug syslog: echo "4096" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:39 user debug syslog: iptables -t nat -F DNS_RELAY
Jan 1 00:00:39 user debug syslog: iptables -t nat -A DNS_RELAY -j RETURN
Jan 1 00:00:39 user debug syslog: iptables -t nat -D ENABLE_NAT -o ppp_0_35_1 -s 192.168.1.0/255.255.255.240 -j MASQUERADE 2>/dev/null
Jan 1 00:00:39 user debug syslog: iptables -t nat -I ENABLE_NAT -o ppp_0_35_1 -s 192.168.1.0/255.255.255.240 -j MASQUERADE
Jan 1 00:00:39 user debug syslog: iptables -t nat -D ENABLE_NAT -j RETURN 2>/dev/null
Jan 1 00:00:39 user debug syslog: iptables -t nat -A ENABLE_NAT -j RETURN
Jan 1 00:00:39 user debug syslog: iptables -t nat -F DNS_RELAY
Jan 1 00:00:39 user debug syslog: iptables -t nat -I DNS_RELAY 1 -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 213.158.7.2
Jan 1 00:00:39 user debug syslog: iptables -t nat -A DNS_RELAY -j RETURN
Jan 1 00:00:39 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:39 user notice dnsprobe[961]: dnsprobe started!
Jan 1 00:00:40 user debug syslog: upnp -L br0 -W ppp_0_35_1 -D
Jan 1 00:00:40 user debug syslog: iptables -I UPNP_DROP -o ppp_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:40 user debug syslog: iptables -A VRTSRV -j RETURN;iptables -t nat -A NAT_VRTSRV -j RETURN
Jan 1 00:00:40 user warn kernel: entry 0:
Jan 1 00:00:40 user warn kernel: proto 0: outgoing: 4899 - 4899
Jan 1 00:00:40 user warn kernel: proto 0: incoming: 4899 - 4899
Jan 1 00:00:40 user warn kernel:
Jan 1 00:00:40 user warn kernel: entry 0:
Jan 1 00:00:40 user warn kernel: proto 0: outgoing: 4899 - 4899
Jan 1 00:00:40 user warn kernel: proto 0: incoming: 4899 - 4899
Jan 1 00:00:40 user warn kernel:
Jan 1 00:00:42 user debug syslog: iptables -F SIP_ALLOW
Jan 1 00:00:42 user debug syslog: iptables -A SIP_ALLOW -j RETURN
Jan 1 00:00:42 user debug syslog: iptables -F SIP_ALLOW
Jan 1 00:00:42 user debug syslog: iptables -I SIP_ALLOW 1 -i ppp_0_35_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -F SIP_ALLOW
Jan 1 00:00:42 user debug syslog: iptables -t nat -I SIP_ALLOW 1 -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -A SIP_ALLOW -j RETURN
Jan 1 00:00:42 user debug syslog: iptables -A SIP_ALLOW -j RETURN
Jan 1 00:00:42 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:00:42 user debug syslog: iptables -F TR069_ALLOW
Jan 1 00:00:42 user debug syslog: iptables -I TR069_ALLOW 1 -j ACCEPT -i ppp_0_35_1 -p tcp --dport 30005
Jan 1 00:00:42 user notice syslog: siproxd.c:180 INFO:siproxd-0.5.13-2903 i686-pc-linux-gnu starting up
Jan 1 00:00:42 user debug syslog: iptables -I TR069_ALLOW 1 -j ACCEPT -i ppp_0_35_1 -p udp -s 192.168.1.1/28 --dport 30006
Jan 1 00:00:43 user debug syslog: iptables -A TR069_ALLOW -j RETURN
Jan 1 00:00:43 user notice syslog: siproxd.c:216 INFO:daemonized, pid=1121
Jan 1 00:00:43 user info udhcpd: sending OFFER of 192.168.1.2
Jan 1 00:00:43 user notice syslog: sock.c:65 INFO:bound to port 5060
Jan 1 00:00:43 user notice syslog: register.c:72 WARNING:registration file not found, starting with empty table
Jan 1 00:00:43 user notice syslog: siproxd.c:263 INFO:siproxd-0.5.13-2903 i686-pc-linux-gnu started
Jan 1 00:00:43 user debug syslog: echo "0"> /var/ppp/pptpstate
Jan 1 00:00:43 user info udhcpd: sending ACK to 192.168.1.2
Jan 1 00:00:43 user debug syslog: chmod +rx /var/ppp/ip-up.local
Jan 1 00:00:45 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:00:45 daemon err user: Stored Parameter Attribute data is corrupt or missing
Feb 7 23:49:52 user info udhcpd: sending OFFER of 192.168.1.10
Feb 7 23:49:52 user info udhcpd: sending ACK to 192.168.1.10
|