Jan 1 00:00:23 user notice kernel: SCSI device sda: 4067328 512-byte hdwr sectors (2082 MB)
Jan 1 00:00:23 user notice kernel: sda: assuming Write Enabled
Jan 1 00:00:23 user err kernel: sda: assuming drive cache: write through
Jan 1 00:00:23 user info kernel: sda:<6>Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:23 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Dec 3 2010 17:45:26
Jan 1 00:00:23 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:23 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:23 user warn kernel: eth0: MAC Address: 00:22:B0:62:E1:98
Jan 1 00:00:23 user warn kernel: sda1
Jan 1 00:00:23 user notice kernel: Attached scsi removable disk sda at scsi0, channel 0, id 0, lun 0
Jan 1 00:00:23 user debug kernel: USB Mass Storage device found at 2
Jan 1 00:00:23 user warn kernel: Broadcom BCM6358A1 USB Network Device v0.4 Dec 3 2010 17:45:27
Jan 1 00:00:23 user warn kernel: usb0: MAC Address: 00 22 B0 62 E1 99
Jan 1 00:00:23 user warn kernel: usb0: Host MAC Address: 00 22 B0 62 E1 9A
Jan 1 00:00:23 user err kernel: FAT: utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!
Jan 1 00:00:23 user debug kernel: PCI: Setting latency timer of device 0000:00:01.0 to 64
Jan 1 00:00:23 user warn kernel: PCI: Enabling device 0000:00:01.0 (0004 -> 0006)
Jan 1 00:00:23 user warn kernel: wl: srom not detected, using main memory mapped srom info (wombo board)
Jan 1 00:00:23 user warn kernel: wl0: wlc_attach: use mac addr from the system pool by id: 0x776c0000
Jan 1 00:00:23 user warn kernel: wl0: MAC Address: 00:22:B0:62:E1:9B
Jan 1 00:00:23 user warn kernel: wl0: Broadcom BCM4318 802.11 Wireless Controller 4.100.27.0.cpe2.1
Jan 1 00:00:23 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:23 user crit kernel: eth0 Link UP.
Jan 1 00:00:23 user warn kernel: BcmAdsl_Initialize=0xC006B808, g_pFnNotifyCallback=0xC0084834
Jan 1 00:00:23 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:23 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x0 0x0
Jan 1 00:00:23 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FFD3D4
Jan 1 00:00:23 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:23 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:23 user warn kernel: ATM proc init !!!
Jan 1 00:00:23 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:23 user warn kernel: ip_conntrack version 2.1 (253 buckets, 0 max) - 376 bytes per conntrack
Jan 1 00:00:23 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:23 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:23 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:23 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:23 user debug syslog: echo > /var/snmpd.conf
Jan 1 00:00:23 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:23 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:23 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 1(usb0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 1(usb0) entering forwarding state
Jan 1 00:00:23 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:23 user crit kernel: ADSL G.994 training
Jan 1 00:00:23 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 3(wl0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 3(wl0) entering forwarding state
Jan 1 00:00:23 user info kernel: device usb0 left promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 1(usb0) entering disabled state
Jan 1 00:00:23 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 2(eth0) entering disabled state
Jan 1 00:00:23 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 3(wl0) entering disabled state
Jan 1 00:00:23 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 1(usb0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 1(usb0) entering forwarding state
Jan 1 00:00:23 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:23 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:23 user info kernel: br0: port 3(wl0) entering learning state
Jan 1 00:00:23 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:23 user info kernel: br0: port 3(wl0) entering forwarding state
Jan 1 00:00:23 user debug syslog: echo > /var/hosts
Jan 1 00:00:24 user warn kernel:
Jan 1 00:00:24 user warn kernel: ioctl, p_name=diapd
Jan 1 00:00:24 user emerg kernel: gpio_fasync
Jan 1 00:00:24 user warn kernel: Pasync_queue->magic = 0x4601
Jan 1 00:00:24 user debug syslog: mount -o remount,size=1M /var
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/var/locks
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/private
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/lib/vfs
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/lib/pdb
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/lib/rpc
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/lib/atuh
Jan 1 00:00:24 user debug syslog: mkdir -p /var/samba/lib/config
Jan 1 00:00:24 user debug syslog: smbd -s /var/smb.conf
Jan 1 00:00:26 user debug syslog: nmbd -s /var/smb.conf
Jan 1 00:00:29 user debug syslog: pppd plugin pppoe oldsession 003088189006/373f nas_0_0_33 nodetach user '' password ************ interface_name 0_0_33_1 usepeerdns refuse-eap persist lcp-echo-interval 30 holdoff 3 lcp-
Jan 1 00:00:30 daemon info pppd[693]: Plugin pppoe loaded.
Jan 1 00:00:30 daemon info pppd[693]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Jan 1 00:00:30 daemon info pppd[693]: Plugin pppoe called.
Jan 1 00:00:30 daemon notice pppd[693]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:00:30 user info kernel: br0: port 1(usb0) entering disabled state
Jan 1 00:00:32 user crit kernel: ADSL G.992 started
Jan 1 00:00:33 user crit kernel: ADSL link down
Jan 1 00:00:34 user crit kernel: ADSL G.994 training
Jan 1 00:00:43 user crit kernel: ADSL G.992 started
Jan 1 00:00:47 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:53 user crit kernel: ADSL link up, interleaved, us=700, ds=10236
Jan 1 00:00:53 user warn kernel: ADSL2/ADSL2+ connection
Jan 1 00:00:55 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 10.2.54.13 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:55 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 10.2.54.13 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:55 daemon info pppd[693]: Sent PADT
Jan 1 00:00:58 daemon info pppd[693]: PPP session is 1476
Jan 1 00:00:58 daemon info pppd[693]: Using interface ppp0_0_33_1
Jan 1 00:00:58 daemon crit pppd[693]: Connect: ppp_0_0_33_1 <--> nas_0_0_33
Jan 1 00:00:58 daemon warn pppd[693]: Couldn't increase MRU to 1500
Jan 1 00:00:58 daemon info pppd[693]: CHAP authentication succeeded: CHAP authentication success, unit 3607
Jan 1 00:00:58 daemon notice pppd[693]: peer from calling number 00:30:88:17:67:BA authorized
Jan 1 00:00:59 daemon notice pppd[693]: local IP address 1.8.157.166
Jan 1 00:00:59 daemon notice pppd[693]: remote IP address 1.8.128.1
Jan 1 00:00:59 daemon notice pppd[693]: primary DNS address 82.209.240.241
Jan 1 00:00:59 daemon notice pppd[693]: secondary DNS address 82.209.243.241
Jan 1 00:00:59 user debug syslog: kill -9 660
Jan 1 00:00:59 user debug syslog: echo > /var/hosts
Jan 1 00:00:59 user debug syslog: cp /proc/var/fyi/wan/ppp_0_0_33_1/dns /var/fyi/sys/dns
Jan 1 00:00:59 user debug syslog: cp /proc/var/fyi/wan/ppp_0_0_33_1/gateway /var/fyi/sys/gateway
Jan 1 00:00:59 user debug syslog: route add default gw 1.8.128.1 2>/dev/null
Jan 1 00:00:59 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:59 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:59 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:59 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:59 user debug syslog: echo 2000 > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:59 user debug syslog: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_generic_timeout
Jan 1 00:00:59 user debug syslog: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_established
Jan 1 00:00:59 user debug syslog: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_fin_wait
Jan 1 00:00:59 user debug syslog: echo 120 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_time_wait
Jan 1 00:00:59 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:00:59 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:00:59 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:00:59 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 10.2.54.13 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:59 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_1 -s 10.2.54.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:01:00 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 10.2.54.0/255.255.255.0 -j MASQUERADE
Jan 1 00:01:00 user debug syslog: kill -9 1102
Jan 1 00:01:00 user debug syslog: echo > /var/hosts
Jan 1 00:01:00 user debug syslog: upnp -L br0 -W ppp_0_0_33_1 -D
Jan 1 00:01:00 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_0_33_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:01:00 user debug syslog: route add -host dev ppp_0_0_33_1
Jan 1 00:01:00 user debug syslog: echo "#!/bin/sh" > /var/ppp/ip-up.local
Jan 1 00:01:00 user debug syslog: echo "#!/bin/sh" > /var/ppp/ip-down.local
Jan 1 00:01:00 user debug syslog: echo "route add default dev \$1" >> /var/ppp/ip-up.local
Jan 1 00:01:01 user debug syslog: echo "route del default dev \$1" >> /var/ppp/ip-down.local
Jan 1 00:01:01 user debug syslog: echo "iptables -t nat -A POSTROUTING -o \$1 -j MASQUERADE" >> /var/ppp/ip-up.local
Jan 1 00:01:01 user debug syslog: echo "iptables -A FORWARD -o \$1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu" >> /var/ppp/ip-up.local
Jan 1 00:01:01 user debug syslog: echo "iptables -A FORWARD -i \$1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu" >> /var/ppp/ip-up.local
Jan 1 00:01:01 user debug syslog: chmod +rx /var/ppp/ip-up.local
Jan 1 00:01:01 user debug syslog: echo "iptables -t nat -D POSTROUTING -o \$1 -j MASQUERADE" >> /var/ppp/ip-down.local
Jan 1 00:01:01 user debug syslog: echo "iptables -D FORWARD -o \$1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu" >> /var/ppp/ip-down.local
Jan 1 00:01:01 user debug syslog: echo "iptables -D FORWARD -i \$1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu" >> /var/ppp/ip-down.local
Jan 1 00:01:01 user debug syslog: chmod +rx /var/ppp/ip-down.local
Jan 1 00:01:01 user debug syslog: kill -9 659
Jan 1 00:01:01 user emerg kernel: gpio_release
Jan 1 00:01:01 user debug syslog: pppd call vpnuser
Jan 1 00:01:01 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_1 -p tcp --dport 30005
Jan 1 00:01:01 daemon notice pppd[1200]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:01:01 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_1 -p tcp --dport 30005
Jan 1 00:01:01 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_1 -p udp -s 10.2.54.13/24 --dport 30006
Jan 1 00:01:01 daemon info pppd[1200]: Using interface ppp0
Jan 1 00:01:01 daemon crit pppd[1200]: Connect: ppp0 <--> /dev/ttyp0
Jan 1 00:01:01 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_1 -p udp -s 10.2.54.13/24 --dport 30006
Jan 1 00:01:01 daemon err user: No server certificate found. Skip checking on certificate.
Jan 1 00:01:01 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:01:02 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:01:02 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:01:02 daemon warn pppd[1200]: Warning - secret file /etc/ppp/pap-secrets has world and/or group access
Jan 1 00:01:03 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl_authe
Jan 1 00:01:03 daemon debug user: wlctl -i wl0 assoclist > /var/wl_assoc
Jan 1 00:01:03 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl_autho
Jan 1 00:01:04 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:01:04 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:01:08 daemon warn pppd[1200]: Warning - secret file /etc/ppp/chap-secrets has world and/or group access
Jan 1 00:01:08 daemon info pppd[1200]: CHAP authentication succeeded: Access granted
Jan 1 00:01:08 daemon notice pppd[1200]: Deflate (15) transmit compression enabled
Jan 1 00:01:08 daemon notice pppd[1200]: local IP address 192.168.253.172
Jan 1 00:01:08 daemon notice pppd[1200]: remote IP address 192.168.100.1